text
stringlengths
2.85k
2.55M
label
class label
11 classes
Space-Efficient Algorithms for Longest Increasing Subsequence∗ Masashi Kiyomi† Hirotaka Ono‡ Yota Otachi§ Pascal Schweitzer¶ Jun Taruik December 27, 2017 arXiv:1712.09230v1 [cs.DS] 26 Dec 2017 Abstract Given a sequence of integers, we want to find a longest increasing subsequence of the sequence. It is known that this problem can be solved in O(n log n) time and space. Our goal √ in this paper is to reduce the space consumption while keeping the time complexity small. For n ≤ s ≤ n, we present algorithms that use O(s log n) bits and O( 1s · n2 · log n) time for computing the length of a longest increasing subsequence, and O( 1s · n2 · log2 n) time for finding an actual subsequence. We also show that the time complexity of our algorithms is optimal up to polylogarithmic factors in the framework of sequential access algorithms with the prescribed amount of space. 1 Introduction Given a sequence of integers (possibly with repetitions), the problem of finding a longest increasing subsequence (LIS, for short) is a classic problem in computer science which has many application areas including bioinfomatics and physics (see [38] and the references therein). It is known that LIS admits an O(n log n)-time algorithm that uses O(n log n) bits of working space [37, 17, 2], where n is the length of the sequence. A wide-spread algorithm achieving these bounds is Patience Sorting, devised by Mallows [24, 25, 26]. Given a sequence of length n, Patience Sorting partitions the elements of the sequence into so-called piles. It can be shown that the number of piles coincides with the length of a longest increasing subsequence (see Section 3 for details). Combinatorial and statistical properties of the piles in Patience Sorting are well studied (see [2, 8, 33]). However, with the dramatic increase of the typical data sizes in applications over the last decade, a main memory consumption in the order of Θ(n log n) bits is excessive in many algorithmic contexts, especially for basic subroutines such as LIS. We therefore investigate the existence of space-efficient algorithms for LIS. Our results In this paper, we present the first space-efficient algorithms for LIS that are exact. We start by observing that when the input is restricted to permutations, an algorithm using O(n) bits can be obtained straightforwardly by modifying a previously known algorithm (see Section 3.3). Next, we observe that a Savitch type algorithm [36] for this problem uses O(log2 n) bits and thus runs in quasipolynomial time. However, we are mainly interested in space-efficient algorithms that also behave well with regard to running time. To this end √ we develop an algorithm that determines the length of a longest increasing subsequence using O( n log n) bits which runs in O(n1.5 log n) time. Since the constants hidden in the O-notation are negligible, the algorithm, when executed in the main memory of a standard computer, may handle a peta-byte input on external storage. More versatile, in fact, our space-efficient algorithm is memory-adjustable in the following sense. √ (See [3] for information on memory-adjustable algorithms.) When a memory bound s with n ≤ s ≤ n ∗ Partially supported by MEXT KAKENHI grant number 24106004. City University. Yokohama, Japan. [email protected] ‡ Nagoya University. Nagoya, Japan. [email protected] § Kumamoto University. Kumamoto, Japan. [email protected] ¶ TU Kaiserslautern. Kaiserslautern, Germany. [email protected] k The University of Electro-Communications. Chofu, Japan. [email protected] † Yokohama 1 is given to the algorithm, it computes with O(s log n) bits of working space in O( 1s · n2 log n) time the length of a longest increasing subsequence. When to the previously √ √ s = n our algorithm is equivalent known algorithms mentioned above. When s = n it uses, as claimed above, O( n log n) bits and runs in O(n1.5 log n) time. The algorithm only determines the length of a longest increasing subsequence. To actually find such a longest increasing subsequence, one can run the length-determining algorithm n times to successively construct the sought-after subsequence. This would give us a running time of O( 1s · n3 log n). However, we show that one can do much better, achieving a running time of O( 1s · n2 log2 n) without any increase in space complexity, by recursively finding a near-mid element of a longest increasing subsequence. To design the algorithms, we study the structure of the piles arising in Patience Sorting in depth and show that maintaining certain information regarding the piles suffices to simulate the algorithm. Roughly speaking, our algorithm divides the execution of Patience Sorting into O(n/s) phases, and in each phase it computes in O(n log n) time information on the next O(s) piles, while forgetting previous information. Finally, we complement our algorithm with a lower bound in a restricted computational model. In the sequential access model, an algorithm can access the input only sequentially. We also consider further restricted algorithms in the multi-pass model, where an algorithm has to read the input sequentially from left to right and can repeat this multiple (not necessarily a constant number of) times. Our algorithm for the length works within the multi-pass model, while the one for finding a subsequence is a sequential access algorithm. Such algorithms are useful when large data is placed in an external storage that supports efficient sequential access. We show that the time complexity of our algorithms is optimal up to polylogarithmic factors in these models. Related work The problem of finding a longest increasing subsequence (LIS) is among the most basic algorithmic problems on integer arrays and has been studied continuously since the early 1960’s. It is known that LIS can be solved in O(n log n) time and space [37, 17, 2], and that any comparisonbased algorithm needs Ω(n log n) comparisons even for computing the length of a longest increasing subsequence [17, 32]. For the special case of LIS where the input is restricted to permutations, there are O(n log log n)-time algorithms [20, 6, 12]. Patience Sorting, an efficient algorithm for LIS, has been a research topic in itself, especially in the context of Young tableaux [24, 25, 26, 2, 8, 33]. Recently, LIS has been studied intensively in the data-streaming model, where the input can be read only once (or a constant number of times) sequentially from left to right. This line of research was initiated by Liben-Nowell, Vee, and Zhu [22], who presented an exact one-pass algorithm and a lower bound for such algorithms. Their results were then improved and extended by many other groups [19, 38, 18, 34, 15, 28, 35]. These results give a deep understanding on streaming algorithms with a constant number of passes even under the settings with randomization and approximation. (For details on these models, see the very recent paper by Saks and Seshadhri [35] and the references therein.) On the other hand, multi-pass algorithms with a non-constant number of passes have not been studied for LIS. While space-limited algorithms on both RAM and multi-pass models for basic problems have been studied since the early stage of algorithm theory, research in this field has recently intensified. Besides LIS, other frequently studied problems include sorting and selection [27, 7, 16, 30], graph searching [4, 14, 31, 9], geometric computation [10, 13, 5, 1], and k-SUM [39, 23]. 2 Preliminaries Let τ = hτ (1), τ (2), . . . , τ (n)i be a sequence of n integers possibly with repetitions. For 1 ≤ i1 < . . . < iℓ ≤ n, the subsequence τ [i1 , . . . , iℓ ] of τ is the sequence hτ (i1 ), . . . , τ (iℓ )i. A subsequence τ [i1 , . . . , iℓ ] is an increasing subsequence of τ if τ (i1 ) < . . . < τ (iℓ ). If τ (i1 ) ≤ . . . ≤ τ (iℓ ), then the sequence τ is non-decreasing. We analogously define decreasing subsequences and non-increasing subsequences. By lis(τ ), we denote the length of a longest increasing subsequence of τ . For example, consider a sequence τ1 = h2, 8, 4, 9, 5, 1, 7, 6, 3i. It has an increasing subsequence τ1 [1, 3, 5, 8] = h2, 4, 5, 6i. Since there is no increasing subsequence of τ1 with length 5 or more, we have lis(τ1 ) = 4. In the computational model in this paper, we use the RAM model with the following restrictions that are standard in the context of sublinear space algorithms. The input is in a read-only memory and the 2 output must be produced on a write-only memory. We can use an additional memory that is readable and writable. Our goal is to minimize the size of the additional memory while keeping the running time fast. We measure space consumption in the number of bits used (instead of words) within the additional memory. 3 Patience Sorting Since our algorithms are based on the classic Patience Sorting, we start by describing it in detail and recalling some important properties regarding its internal configurations. Internally, the algorithm maintains a collection of piles. A pile is a stack of integers. It is equipped with the procedures push and top: the push procedure appends a new element to become the new top of the pile; and the top procedure simply returns the element on top of the pile, which is always the one that was added last. We describe how Patience Sorting computes lis(τ ). See Algorithm 1. The algorithm scans the input τ from left to right (Line 2). It tries to push each newly read element τ (i) to a pile with a top element larger than or equal to τ (i). If on the one hand there is no such a pile, Patience Sorting creates a new pile to which it pushes τ (i) (Line 4). On the other hand, if at least one such pile exists, Patience Sorting pushes τ (i) to the oldest pile that satisfies the property (Line 6). After the scan, the number of piles is the output, which happens to be equal to lis(τ ) (Line 8). Algorithm 1 Patience Sorting 1: set ℓ := 0 and initialize the dummy pile P0 with the single element −∞ 2: for i = 1 to n do 3: if τ (i) > top(Pℓ ) then 4: increment ℓ, let Pℓ be a new empty pile, and set j := ℓ 5: else 6: set j to be the smallest index with τ (i) ≤ top(Pj ) 7: push τ (i) to Pj 8: return ℓ We return to the sequence τ1 = h2, 8, 4, 9, 5, 1, 7, 6, 3i for an example. The following illustration shows the execution of Algorithm 1 on τ1 . In each step the bold number is the newly added element. The colored (and underlined) elements in the final piles form a longest increasing subsequence τ1 [1, 3, 5, 8] = h2, 4, 5, 6i, which can be extracted as described below. 2 8 P1 P2 2 P1 4 2 8 P1 P2 4 2 8 9 P1 P2 P3 4 5 2 8 9 P1 P2 P3 1 4 5 2 8 9 P1 P2 P3 1 4 5 2 8 9 7 P1 P2 P3 P4 1 4 5 6 2 8 9 7 P1 P2 P3 P4 3 1 4 5 6 2 8 9 7 P1 P2 P3 P4 Proposition 3.1 ([37, 17, 2]). Given a sequence τ of length n, Patience Sorting computes lis(τ ) in O(n log n) time using O(n log n) bits of working space. 3.1 Correctness of Patience Sorting It is observed in [8] that when the input is a permutation π, the elements of each pile form a decreasing subsequence of π. This observation easily generalizes as follows. Observation 3.2. Given a sequence τ , the elements of each pile constructed by Patience Sorting form a non-increasing subsequence of τ . Hence, any increasing subsequence of τ can contain at most one element in each pile. This implies that lis(τ ) ≤ ℓ. Now we show that lis(τ ) ≥ ℓ. Using the piles, we can obtain an increasing subsequence of length ℓ, in reversed order, as follows [2]: 1. Pick an arbitrary element of Pℓ ; 3 2. For 1 ≤ i < ℓ, let τ (h) be the element picked from Pi+1 . Pick the element τ (h′ ) that was the top element of Pi when τ (h) was pushed to Pi+1 . Since h′ < h and τ (h′ ) < τ (h) in each iteration, the ℓ elements that are selected form an increasing subsequence of τ . This completes the correctness proof for Patience Sorting. The proof above can be generalized to show the following characterization for the piles. Proposition 3.3 ([8]). τ (i) ∈ Pj if and only if a longest increasing subsequence of τ ending at τ (i) has length j. 3.2 Time and space complexity of Patience Sorting Observe that at any point in time, the top elements of the piles are ordered increasingly from left to right. Namely, top(Pk ) < top(Pk′ ) if k < k ′ . This is observed in [8] for inputs with no repeated elements. We can see that the statement holds also for inputs with repetitions. Observation 3.4. At any point in time during the execution of Patience Sorting and for any k and k ′ with 1 ≤ k < k ′ ≤ ℓ, we have top(Pk ) < top(Pk′ ) if Pk and Pk′ are nonempty. Proof. We prove the statement by contradiction. Let i be the first index for which Patience Sorting pushes τ (i) to some pile Pj , so that the statement of the observation becomes false. First assume that top(Pj ) ≥ top(Pj ′ ) for some j ′ > j. Let τ (i′ ) be the element in Pj pushed to the pile right before τ (i). By the definition of Patience Sorting, it holds that τ (i′ ) ≥ τ (i) = top(Pj ) ≥ top(Pj ′ ). This contradicts the minimality of i because τ (i′ ) was the top element of Pj before τ (i) was pushed to Pj . Next assume that top(Pj ′ ) ≥ top(Pj ) for some j ′ < j. This case contradicts the definition of Patience Sorting since τ (i) = top(Pj ) ≤ top(Pj ′ ) and thus τ (i) actually has to be pushed to a pile with an index smaller or equal to j ′ . The observation above implies that Line 6 of Algorithm 1 can be executed in O(log n) time by using binary search. Hence, Patience Sorting runs in O(n log n) time. The total number of elements in the piles is O(n) and thus Patience Sorting consumes O(n log n) bits. If it maintains all elements in the piles, it can compute an actual longest increasing subsequence in the same time and space complexity as described above. Note that to compute lis(τ ), it suffices to remember the top elements of the piles. However, the algorithm still uses Ω(n log n) bits when lis(τ ) ∈ Ω(n). 3.3 A simple O(n)-bits algorithm Here we observe that, when the input is a permutation π of {1, . . . , n}, lis(π) can be computed in O(n2 ) time with O(n) bits of working space. The algorithm maintains a used/unused flag for each number in {1, . . . , n}. Hence, this noncomparison-based algorithm cannot be generalized for general inputs directly. Let τ be a sequence of integers without repetitions. A subsequence τ [i1 , . . . , iℓ ] is the left-to-right minima subsequence if {i1 , . . . , iℓ } = {i : τ (i) = min{τ (j) : 1 ≤ j ≤ i}}. In other words, the left-to-right minima subsequence is made by scanning τ from left to right and greedily picking elements to construct a maximal decreasing subsequence. Burstein and Lankham [8, Lemma 2.9] showed that the first pile P1 is the left-to-right minima subsequence of π and that the ith pile Pi is the left-to-right minima subsequence of a sequence obtained from π by removing all elements in the previous piles P1 , . . . , Pi−1 . Algorithm 2 below uses this characterization of piles. The correctness follows directly from the characterization. It uses a constant number of pointers of O(log n) bits and a Boolean table of length n for maintaining “used” and “unused” flags. Thus it uses n + O(log n) bits working space in total. The running time is O(n2 ): each for-loop takes O(n) time and the loop is repeated at most n times. 4 Algorithm 2 Computing lis(π) with O(n) bits and in O(n2 ) time 1: set ℓ := 0 and mark all elements in π as “unused” 2: while there is an “unused” element in π do 3: increment ℓ and set t := ∞ 4: for i = 1 to n do ⊲ this for-loop constructs the next pile implicitly 5: if π(i) is unused and π(i) < t then 6: mark π(i) as “used” and set t := π(i) ⊲ t is currently on top of Pℓ 7: return ℓ 4 An algorithm for computing the length In this section, we present our main algorithm that computes lis(τ ) with O(s log n) bits in O( 1s · n2 log n) √ time for n ≤ s ≤ n. Note that the algorithm here outputs the length lis(τ ) only. The next section discusses efficient solutions to actually compute a longest sequence. In the following, by Pi for some i we mean the ith pile obtained by (completely) executing Patience Sorting unless otherwise stated. (We sometimes refer to a pile at some specific point of the execution.) Also, by Pi (j) for 1 ≤ j ≤ |Pi | we denote the jth element added to Pi . That is, Pi (1) is the first element added to Pi and Pi (|Pi |) is the top element of Pi . To avoid mixing up repeated elements, we assume that each element τ (j) of the piles is stored with its index j. In the following, we mean by “τ (j) is in Pi ” that the jth element of τ is pushed to Pi . Also, by “τ (j) is Pi (r)” we mean that the jth element of τ is the rth element of Pi . We start with an overview of our algorithm. It scans over the input O(n/s) times. In each pass, it assumes that a pile Pi with at most s elements is given, which has been computed in the previous pass. Using this pile Pi , it filters out the elements in the previous piles P1 , . . . , Pi−1 . It then basically simulates Patience Sorting but only in order to compute the next 2s piles. As a result of the pass, it computes a new pile Pj with at most s elements such that j ≥ i + s. The following observation, that follows directly from the definition of Patience Sorting and Observation 3.4, will be useful for the purpose of filtering out elements in irrelevant piles. Observation 4.1. Let τ (y) ∈ Pj with j 6= i. If τ (x) was the top element of Pi when τ (y) was pushed to Pj , then j < i if τ (y) < τ (x), and j > i if τ (y) > τ (x). Using Observation 4.1, we can obtain the following algorithmic lemma that plays an important role in the main algorithm. Lemma 4.2. Having stored Pi explicitly in the additional memory and given an index j > i, the size |Pk | for all i + 1 ≤ k ≤ min{j, lis(τ )} can be computed in O(n log n) time with O((|Pi | + j − i) log n) bits. If lis(τ ) < j, then we can compute lis(τ ) in the same time and space complexity. Proof. Recall that Patience Sorting scans the sequence τ from left to right and puts each element to the appropriate pile. We process the input in the same way except that we filter out, and thereby ignore, the elements in the piles Ph for which h < i or h > j. To this end, we use the following two filters whose correctness follows from Observation 4.1. (Filtering Ph with h < i.) To filter out the elements that lie in Ph for some h < i, we maintain an index r that points to the element of Pi read most recently in the scan. Since Pi is given explicitly to the algorithm, we can maintain such a pointer r. When we read a new element τ (x), we have three cases. • If τ (x) is Pi (r + 1), then we increment the index r. • Else if τ (x) < Pi (r), then τ (x) is ignored since it is in Ph for some h < i. • Otherwise we have τ (x) > Pi (r). In this case τ (x) is in Ph for some h > i. (Filtering Ph with h > j.) The elements in Ph for h > j can be filtered without maintaining additional information as follows. Let again τ (x) be the newly read element. • If no part of Pj has been constructed yet, then τ (x) is in Ph for some h ≤ j. 5 • Otherwise, we compare τ (x) and the element τ (y) currently on the top of Pj . – If τ (x) > τ (y), then τ (x) is in Ph for some h > j, and thus ignored. – Otherwise τ (x) is in Ph for some h ≤ j. We simulate Patience Sorting only for the elements that pass both filters above. While doing so, we only maintain the top elements of the piles and additionally store the size of each pile. This requires at most O((j − i) log n) space, as required by the statement of the lemma. For details see Algorithm 3. The running time remains the same since we only need constant number of additional steps for each step in Patience Sorting to filter out irrelevant elements. If Pj is still empty after this process, we can conclude that lis(τ ) is the index of the newest pile constructed. Algorithm 3 Computing |Pk | for all k with i + 1 ≤ k ≤ min{j, lis(τ )} when Pi is given 1: set r := 0 ⊲ r points to the most recently read element in Pi 2: set ℓ := i ⊲ the largest index of the piles constructed so far 3: initialize pi+1 , . . . , pj to ∞ ⊲ pk is the element currently on top of Pk 4: initialize ci+1 , . . . , cj to 0 ⊲ ck is the current size of Pk 5: for x = 1 to n do ⊲ filtering out irrelevant elements 6: if τ (x) is Pi (r + 1) then 7: increment r and continue the for-loop 8: else if τ (x) < Pi (r) or (ℓ ≥ j and τ (x) > pj ) then 9: ignore the element and continue the for-loop ⊲ push τ (x) to the appropriate pile 10: if τ (x) > pℓ then 11: increment ℓ and set h := ℓ 12: else 13: set h to be the smallest index with τ (i) < ph 14: set ph := τ (x) and increment ch The proof of Lemma 4.2 can be easily adapted to also compute the pile Pj explicitly. For this, we simply additionally store all elements of Pj as they are added to the pile. Lemma 4.3. Given Pi and an index j such that i < j ≤ lis(τ ), we can compute Pj in O(n log n) time with O((|Pi | + |Pj | + j − i) log n) bits. Assembling the lemmas of this section, we now present our first main result. The corresponding pseudocode of the algorithm can be found in Algorithm 4. √ Theorem 4.4. There is an algorithm that, given an integer s satisfying n ≤ s ≤ n and a sequence τ of length n, computes lis(τ ) in O( 1s · n2 log n) time with O(s log n) bits of space. Proof. To apply Lemmas 4.2 and 4.3 at the beginning, we start with a dummy pile P0 with a single dummy entry P0 (1) = −∞. In the following, assume that for some i ≥ 0 we computed the pile Pi of size at most s explicitly. We repeat the following process until we find lis(τ ). In each iteration, we first compute the size |Pk | for i + 1 ≤ k ≤ i + 2s. During this process, we may find lis(τ ) < i + 2s. In such a case we output lis(τ ) and √ find√an index j such √ terminate. Otherwise, we that i + s + 1 ≤ j ≤ i + 2s and |Pj | ≤ n/s. Since s ≥ n, it holds that |Pj | ≤ n/ n = n ≤ s. We then compute Pj itself to replace i with j and repeat. By Lemmas 4.2 and 4.3, each pass can be executed in O(n log n) time with O(s log n) bits. There are at most lis(τ )/s iterations, since in each iteration the index i increases by at least s or lis(τ ) is determined. Since lis(τ ) ≤ n, the total running time is O( 1s · n2 log n). In the case of the smallest memory consumption we conclude the following corollary. Corollary 4.5. Given a sequence τ of length n, lis(τ ) can be computed in O(n1.5 log n) time with √ O( n log n) bits of space. 6 Algorithm 4 Computing lis(τ ) with O(s log n) bits in O( 1s · n2 log n) time 1: set i := 0 and initialize the dummy pile P0 with the single element −∞ 2: loop 3: compute the size of Pk for all k with i + 1 ≤ k ≤ i + 2s 4: if we find lis(τ ) < i + 2s then 5: return lis(τ ) 6: let j be the largest index such that |Pj | ≤ s 7: compute Pj and set i := j 5 ⊲ i + s + 1 ≤ j ≤ i + 2s An algorithm for finding a longest increasing subsequence It is easy to modify the algorithm in the previous section in such a way that it outputs an element of the final pile Plis(τ ) , which is the last element of a longest increasing subsequence by Proposition 3.3. Thus we can repeat the modified algorithm n times (considering only the elements smaller than and appearing before the last output) and actually find a longest increasing subsequence.1 The running time of this naı̈ve approach is O( 1s · n3 log n). As we claimed before, we can do much better. In fact, we need only an additional multiplicative factor of O(log n) instead of O(n) in the running time, while keeping the space complexity as it is. In the rest of this section, we prove the following theorem. √ Theorem 5.1. There is an algorithm that, given an integer s satisfying n ≤ s ≤ n and a sequence τ of length n, computes a longest increasing subsequence of τ in O( 1s · n2 log2 n) time using O(s log n) bits of space. Corollary 5.2. Given a sequence τ of length n, a longest increasing subsequence of τ can be found in √ O(n1.5 log2 n) time with O( n log n) bits of space. We should point out that the algorithm in this section is not a multi-pass algorithm. However, we can easily transform it without any increase in the time and space complexity so that it works as a sequential access algorithm. 5.1 High-level idea We first find an element that is in a longest increasing subsequence roughly in the middle. As we will argue, this can be done in O( 1s · n2 log n) time with O(s log n) bits by running the algorithm from the previous section twice, once in the ordinary then once in the reversed way. We then divide the input into the left and right parts at a near-mid element and recurse. The space complexity remains the same and the time complexity increases only by an O(log n) multiplicative factor. The depth of recursion is O(log n) and at each level of recursion the total running time is O( 1s · n2 log n). To remember the path to the current recursion, we need some additional space, but it is bounded by O(log2 n) bits. 5.2 A subroutine for short longest increasing sequences We first solve the base case in which lis(τ ) ∈ O(n/s). In this case, we use the original Patience Sorting and repeat it O(n/s) times. We present the following general form first. Lemma 5.3. Let τ be a sequences of length n and lis(τ ) = k. Then a longest increasing subsequence of τ can be found in O(k · n log k) time with O(k log n) bits. Proof. Without changing the time and space complexity, we can modify the original Patience Sorting so that • it maintains only the top elements of the piles; 1 This algorithm outputs a longest increasing subsequence in the reversed order. One can access the input in the reversed order and find a longest decreasing subsequence to avoid this issue. 7 • it ignores the elements larger than or equal to a given upper bound; and • it outputs an element in the final pile. We run the modified algorithm lis(τ ) times. In the first run, we have no upper bound. In the succeeding runs, we set the upper bound to be the output of the previous run. In each run the input to the algorithm is the initial part of the sequence that ends right before the last output. The entire output forms a longest increasing sequence of τ .2 Since lis(τ ) = k, modified Patience Sorting maintains only k piles. Thus each run takes O(n log k) time and uses O(k log n) bits. The lemma follows since this is repeated k times and each round only stores O(log n) bits of information from the previous round. √ The following special form of the lemma above holds since n/s ≤ s when s ≥ n. √ Corollary 5.4. Let τ be a sequence of length n and lis(τ ) ∈ O(n/s) for some s with n ≤ s ≤ n. A longest increasing subsequence of τ can be found in O( 1s · n2 log n) time with O(s log n) bits. 5.3 A key lemma As mentioned above, we use a reversed version of our algorithm. Reverse Patience Sorting is the reversed version of Patience Sorting: it reads the input from right to left and uses the reversed inequalities. (See Algorithm 5.) Reverse Patience Sorting computes the length of a longest decreasing subsequence in the reversed sequence, which is a longest increasing subsequence in the original sequence. Since the difference between the two algorithms is small, we can easily modify our algorithm in Section 4 for the length so that it simulates Reverse Patience Sorting instead of Patience Sorting. Algorithm 5 Reverse Patience Sorting 1: set ℓ := 0 and initialize the dummy pile Q0 with the single element +∞ 2: for i = n to 1 do 3: if τ (i) < top(Qℓ ) then 4: increment ℓ, let Qℓ to be a new empty pile, and set j := ℓ 5: else 6: set j to be the smallest index with τ (i) > top(Qj ) 7: push τ (i) to Qj 8: return ℓ Let Qi be the ith pile constructed by Reverse Patience Sorting as in Algorithm 5. Using Proposition 3.3, we can show that for each τ (i) in Qj , the longest decreasing subsequence of the reversal of τ ending at τ (i) has length j. This is equivalent to the following observation. Observation 5.5. τ (i) ∈ Qj if and only if a longest increasing subsequence of τ starting at τ (i) has length j. This observation immediately gives the key lemma below. Lemma 5.6. Pk ∩ Qlis(τ )−k+1 6= ∅ for all k with 1 ≤ k ≤ lis(τ ). Proof. Let hτ (i1 ), . . . , τ (iℓ )i be a longest increasing subsequence of τ . Proposition 3.3 implies that τ (ik ) ∈ Pk . The subsequence hτ (ik ), . . . , τ (iℓ )i is a longest increasing subsequence of τ starting at τ (ik ) since otherwise hτ (i1 ), . . . , τ (iℓ )i is not longest. Since the length of hτ (ik ), . . . , τ (iℓ )i is iℓ −k +1 = lis(τ )−k +1, we have τ (k) ∈ Qlis(τ )−k+1 . Note that the elements of Pk and Qlis(τ )−k+1 are not the same in general. For example, by applying Reverse Patience Sorting to τ1 = h2, 8, 4, 9, 5, 1, 7, 6, 3i, we get Q1 = h3, 6, 7, 9i, Q2 = h1, 5, 8i, Q3 = h4i, and Q4 = h2i as below. (Recall that P1 = h2, 1i, P2 = h8, 4, 3i, P3 = h9, 5i, and P4 = h7, 6i.) The following diagram depicts the situation. The elements shared by Pk and Qlis(τ )−k+1 are colored and underlined. 2 Again this output is reversed. We can also compute the output in nonreversed order as discussed before. 8 3 Q1 5.4 6 3 Q1 7 6 3 Q1 7 6 3 1 Q1 Q2 7 6 5 3 1 Q1 Q2 9 7 6 5 3 1 Q1 Q2 9 7 6 5 3 1 4 Q1 Q2 Q3 9 7 6 3 Q1 8 5 1 4 Q2 Q3 9 7 6 3 Q1 8 5 1 4 2 Q2 Q3 Q4 3 1 4 5 6 2 8 9 7 P1 P2 P3 P4 The algorithm We first explain the subroutine for finding a near-mid element in a longest increasing subsequence. √ Lemma 5.7. Let s be an integer satisfying n ≤ s ≤ n. Given a sequence τ of length n, the kth element of a longest increasing subsequence of τ for some k with lis(τ )/2 ≤ k < lis(τ )/2 + n/s can be found in O( 1s · n2 log n) time using O(s log n) bits of space. Proof. We slightly modify Algorithm 4 so that it finds an index k and outputs Pk such that |Pk | ≤ s and lis(τ )/2 ≤ k ≤ lis(τ )/2 + n/s. Such a k exists since the average of |Pi | for lis(τ )/2 ≤ i < lis(τ )/2 + n/s is at most s. The time and space complexity of this phase are as required by the lemma. We now find an element in Pk ∩ Qlis(τ )−k+1 . Since the size |Qlis(τ )−k+1 | is not bounded by O(s) in general, we cannot store Qlis(τ )−k+1 itself. Instead use the reversed version of the algorithm in Section 4 to enumerate it. Each time we find an element in Qlis(τ )−k+1 , we check whether it is included in Pk . This can be done with no loss in the running time since Pk is sorted and the elements of Qlis(τ )−k+1 arrive in increasing order. The next technical but easy lemma allows us to split the input into two parts at an element of a longest increasing subsequence and to solve the smaller parts independently. Lemma 5.8. Let τ (j) be the kth element of a longest increasing subsequence of a sequence τ . Let τL be the subsequence of τ [1, . . . , j − 1] formed by the elements smaller than τ (j). Similarly let τR be the subsequence of τ [j + 1, . . . , |τ |] formed by the elements larger than τ (j). Then, a longest increasing subsequence of τ can be obtained by concatenating a longest increasing subsequence of τL , τ (j), and a longest increasing subsequence of τR , in this order. Proof. Observe that the concatenated sequence is an increasing subsequence of τ . Thus it suffices to show that lis(τL ) + lis(τR ) + 1 ≥ lis(τ ). Let τ [i1 , . . . , ilis(τ ) ] be a longest increasing subsequence of τ such that ik = j. From the definition, τ [i1 , . . . , ik−1 ] is a subsequence of τL , and τ [ik+1 , . . . , ilis(τ ) ] is a subsequence of τR . Hence lis(τL ) ≥ k − 1 and lis(τR ) ≥ lis(τ )− k, and thus lis(τL )+ lis(τR )+ 1 ≥ lis(τ ). As Lemma 5.8 suggests, after finding a near-mid element τ (k), we recurse into τL and τR . If the input τ ′ to a recursive call has small lis(τ ′ ), we directly compute a longest increasing subsequence. See Algorithm 6 for details of the whole algorithm. Correctness follows from Lemma 5.8 and correctness of the subroutines. Algorithm 6 Recursively finding a longest increasing subsequence of ρ 1: RecursiveLIS(ρ, −∞, +∞) 2: procedure RecursiveLIS(τ , lb, ub) 3: τ ′ := the subsequence of τ formed by the elements τ (i) such that lb < τ (i) < ub ⊲ τ ′ is not explicitly computed but provided by ignoring the irrelevant elements ′ 4: compute lis(τ ) 5: if lis(τ ′ ) ≤ 3|τ ′ |/s then 6: output a longest increasing subsequence of τ ′ ⊲ Lemma 5.3 7: else 8: find the kth element τ ′ (j) of a longest increasing subsequence of τ ′ for some k with lis(τ ′ )/2 ≤ k < lis(τ ′ )/2 + |τ ′ |/s 9: RecursiveLIS(τ ′ [1, . . . , j − 1], lb, τ ′ (j)) 10: output τ ′ (j) 11: RecursiveLIS(τ ′ [j + 1, . . . , |τ ′ |], τ ′ (j), ub) 9 5.5 Time and space complexity In Theorem 5.1, the claimed running time is O( 1s · n2 log2 n). To prove this, we first show that the depth of the recursion is O(log n). We then show that the total running time in each recursion level is O( 1s · n2 log n). The claimed running time is guaranteed by these bounds. Lemma 5.9. Given a sequence τ , the depth of the recursions invoked by RecursiveLIS of Algorithm 6 is at most log6/5 lis(τ ′ ), where τ ′ is the subsequence of τ computed in Line 3. Proof. We proceed by induction on lis(τ ′ ). If lis(τ ′ ) ≤ 3|τ ′ |/s, then no recursive call occurs, and hence the lemma holds. In the following, we assume that lis(τ ′ ) = ℓ > 3|τ ′ |/s and that the statement of the lemma is true for any sequence τ ′′ with lis(τ ′′ ) < ℓ. Since ℓ > 3|τ ′ |/s, we recurse into two branches on subsequences of τ ′ . From the definition of k in Line 8 of Algorithm 6, the length of a longest increasing subsequence is less than ℓ/2 + |τ ′ |/s in each branch. Since ℓ/2 + |τ ′ |/s < ℓ/2 + ℓ/3 = 5ℓ/6, each branch invokes recursions of depth at most log6/5 (5ℓ/6) = log6/5 ℓ − 1. Therefore the maximum depth of the recursions invoked by their parent is at most log6/5 ℓ. Lemma 5.10. Given a sequence τ of length n, the total running time at each depth of recursion excluding further recursive calls in Algorithm 6 takes O( 1s n2 log n) time. Proof. In one recursion level, we have many calls of RecursiveLIS on pairwise non-overlapping sub′ |2 log |τ ′ |). Thus the total sequences of τ . For each subsequence time O( 1s |τ ′P P 1 ′ 2τ , the′ algorithm spends 1 2 running time at a depth is O( τ ′ s |τ | log |τ |), which is O( s n log n) since τ ′ |τ ′ |2 ≤ |τ |2 = n2 . Finally we consider the space complexity of Algorithm 6. Lemma 5.11. Algorithm 6 uses O(s log n) bits of working space on sequences of length n. Proof. We have already shown that each subroutine uses O(s log n) bits. Moreover, this space of working memory can be discarded before another subroutine call occurs. Only a constant number of O(log n)bit words are passed to the new subroutine call. We additionally need to remember the stack trace of the recursion. The size of this additional information is bounded by O(log2 n) bits since each recursive call is specified by a constant number of O(log √ n)-bit words and the depth of recursion is O(log n) by Lemma 5.9. Since log2 n ∈ O(s log n) for s ≥ n, the lemma holds. 6 Lower bound for algorithms with sequential access An algorithm is a sequential access algorithm if it can access elements in the input array only sequentially. In our situation this means that for a given sequence, accessing the ith element of the sequence directly after having accessed the jth element of the sequence costs time at least linear in |i−j|. As opposed to the RAM, any Turing machine in which the input is given on single read-only tape has this property. Note that any lower bound for sequential access algorithms in an asymptotic form is applicable to multi-pass algorithms as well since every multi-pass algorithm can be simulated by a sequential access algorithm with the same asymptotic behavior. Although some of our algorithms are not multi-pass algorithms, it is straightforward to transform them to sequential access algorithms with the same time and space complexity. To show a lower bound on the running time of sequential access algorithms with limited working space, we need the concept of communication complexity (see [21] for more details). Let f be a function. Given α ∈ A to the first player Alice and β ∈ B to the second player Bob, the players want to compute f (α, β) together by sending bits to each other (possibly multiple times). The communication complexity of f is the maximum number of bits transmitted between Alice and Bob over all inputs by the best protocol for f . Consider the following variant of the LIS problem: Alice gets the first half of a permutation π of {1, . . . , 2n} and Bob gets the second half. They compute lis(π) together. It is known that this problem has high communication complexity [22, 19, 38]. Proposition 6.1 ([19, 38]). Let π be a permutation of {1, . . . , 2n}. Given the first half of π to Alice and the second half to Bob, they need Ω(n) bits of communication to compute lis(π) in the worst case (even with 2-sided error randomization). 10 Now we present our lower bound. Note that the lower bound even holds for the special case where input is restricted to permutations. Theorem 6.2. Given a permutation π of {1, . . . , 4n}, any sequential access (possibly randomized) algorithm computing lis(π) using b bits takes Ω(n2 /b) time. Proof. Given an arbitrary n > 1, let π ′ be a permutation of {1, . . . , 2n}. We construct a permutation π of {1, . . . , 4n} as follows. Let π1′ = hπ(1), . . . , π(n)i be the first half of π ′ , define π2′ = h4n, 4n−1, . . . , 2n+ 2i and let π3′ = hπ(n + 1), π(n + 2), . . . , π(2n)i be the second half of π ′ . Then we define π to be the concatenation of π1′ , π2′ , π3′ and the one element sequence π4′ = h2n + 1i, in that order. It is not difficult to see that π is a permutation and that lis(π) = lis(π ′ ) + 1. To see the latter, observe that the concatenation of π2′ and π4′ is a decreasing subsequence of π. Hence any increasing subsequence of π can contain at most one element not in π ′ . On the other hand, any increasing subsequence of π ′ of length ℓ can be extended with the element 2n + 1 of π4′ to an increasing subsequence of π of length ℓ + 1. We say a sequential access algorithm traverses the middle if it accesses a position in π1′ and then accesses a position in π3′ or vice versa with possibly accessing elements in π2′ but only such elements in meantime. Since each traversal of the middle takes Ω(n) time, it suffices to show that the number of traversals of the middle is Ω(n/b). Suppose we are given a sequential access algorithm M that computes lis(π) with t traversals of the middle. Using M , we construct a two-player communication protocol for computing lis(π ′ ) with at most tb bits of communication. (A similar technique is described for streaming algorithms in [38].) Recall that the first player Alice gets the first half π1′ of π ′ and the second player Bob gets the second half π3′ of π ′ . They compute lis(π ′ ) together as follows. • Before starting computation, Alice computes πA by concatenating π1′ and π2′ in that order, and Bob computes πB by concatenating π2′ , π3′ , and π4′ in that order. • They first compute lis(π) using M by repeating the following phases: – Alice starts the computation by M and continues while M stays in π[1, . . . , 3n − 1] = πA . When M tries to access π[3n, . . . , 4n], and thus a traversal of the middle occurs, Alice stops and sends all b bits stored by M to Bob. – Bob restores the b bits received from Alice to the working memory of M and continues computation while M stays in π[n + 1, . . . , 4n] = πB . A traversal of the middle is occurred when M tries to access π[1, . . . , n]. Bob then stops and sends the b bits currently stored by M back to Alice. • When M outputs lis(π) and terminates, the currently active player outputs lis(π) − 1 as lis(π ′ ) and terminates the protocol. The two players correctly simulate M and, as a result, compute lis(π ′ ) together. Since the algorithm M invokes t traversals, the total number of bits sent is at most tb. Since tb ∈ Ω(n) holds by Proposition 6.1, we have t ∈ Ω(n/b) as required. Recall that our algorithms for the LIS problem use O(s log n) bits and runs in O( 1s n2 log n) time √ for computing the length and in O( 1s n2 log2 n) time for finding a subsequence, where n ≤ s ≤ n. By Theorem 6.2, their time complexity is optimal for algorithms with sequential access up to polylogarithmic factors of log2 n and log3 n, respectively. 7 Concluding remarks √ Our result raises the following question: “Do o( n)-space polynomial-time algorithms for LIS exist?” An unconditional ‘no’ answer would be surprising as it implies SC 6= P ∩ PolyL, where SC (Steve’s Class) is the class of problems that can be solved by an algorithm that simultaneously runs in polynomialtime and polylogarithmic-space [11, 29]. A possibly easier question asks for the existence of a log-space algorithm. For this question, one might be able to give some evidence for a ‘no’ answer by showing NL-hardness of (a decision version of) LIS. 11 We would like to mention some known results that have a mysterious coincidence in space complexity with p our results. For (1 + ǫ)-approximation of plis(π) by one-pass streaming algorithms, it is known that O( n/ǫ · log n) bits are sufficient [19] and Ω( n/ǫ) bits are necessary [15, 18]. We were not able to find any connection here and do not claim anything concrete about this coincidence. To make the presentation simple, we used n to bound lis(τ ) in the time complexity analyses of the algorithms. If we carefully analyze the complexity in terms of lis(τ ) instead of n when possible, we can obtain the following output-sensitive bounds. √ Theorem 7.1. Let s be an integer satisfying n ≤ s ≤ n, and let τ be a sequence of length n with lis(τ ) = k. Using O(s log n) bits of space, lis(τ ) can be computed in O( 1s · kn log k) time and a longest increasing subsequence of τ can be found in O( 1s · kn log2 k) time. References [1] Hee-Kap Ahn, Nicola Baraldo, Eunjin Oh, and Francesco Silvestri. A time-space tradeoff for triangulations of points in the plane. In COCOON 2017, pages 3–12, 2017. doi:10.1007/978-3-319-62389-4_1. [2] David Aldous and Persi Diaconis. Longest increasing subsequences: from patience sorting to the Baik-Deift-Johansson theorem. Bulletin of the American Mathematical Society, 36(4):413–432, 1999. doi:10.1090/S0273-0979-99-00796-X. [3] Tetsuo Asano, Amr Elmasry, and Jyrki Katajainen. Priority queues and sorting for read-only data. In TAMC 2013, pages 32–41, 2013. doi:10.1007/978-3-642-38236-9_4. [4] Tetsuo Asano, Taisuke Izumi, Masashi Kiyomi, Matsuo Konagaya, Hirotaka Ono, Yota Otachi, Pascal Schweitzer, Jun Tarui, and Ryuhei Uehara. Depth-first search using O(n) bits. In ISAAC 2014, pages 553–564, 2014. doi:10.1007/978-3-319-13075-0_44. [5] Bahareh Banyassady, Matias Korman, Wolfgang Mulzer, André van Renssen, Marcel Roeloffzen, Paul Seiferth, and Yannik Stein. Improved time-space trade-offs for computing Voronoi diagrams. In STACS 2017, volume 66, pages 9:1–9:14, 2017. doi:10.4230/LIPIcs.STACS.2017.9. [6] Sergei Bespamyatnikh and Michael Segal. quences and patience sorting. Information doi:10.1016/S0020-0190(00)00124-1. Enumerating longest increasing subseProcessing Letters, 76(1–2):7–11, 2000. [7] Allan Borodin and Stephen Cook. A time-space tradeoff for sorting on a general sequential model of computation. SIAM Journal on Computing, 11(2):287–297, 1982. doi:10.1137/0211022. [8] Alexander Burstein and Isaiah Lankham. Combinatorics of patience ing piles. Séminaire Lotharingien de Combinatoire, 54A:B54Ab, 2006. http://www.mat.univie.ac.at/~slc/wpapers/s54Aburlank.html. sortURL: [9] Sankardeep Chakraborty and Srinivasa Rao Satti. Space-efficient algorithms for maximum cardinality search, stack BFS, queue BFS and applications. In COCOON 2017, pages 87–98, 2017. doi:10.1007/978-3-319-62389-4_8. [10] Timothy M. Chan and Eric Y. Chen. Multi-pass geometric algorithms. Discrete & Computational Geometry, 37(1):79–102, 2007. doi:10.1007/s00454-006-1275-6. [11] Stephen A. Cook. Deterministic CFL’s are accepted simultaneously in polynomial time and log squared space. In STOC 1979, pages 338–345, 1979. doi:10.1145/800135.804426. [12] Maxime Crochemore and Ely Porat. Fast computation of a longest increasing subsequence and application. Information and Computation, 208(9):1054–1059, 2010. doi:10.1016/j.ic.2010.04.003. [13] Omar Darwish and Amr Elmasry. Optimal time-space tradeoff for the 2D convex-hull problem. In ESA 2014, pages 284–295, 2014. doi:10.1007/978-3-662-44777-2_24. 12 [14] Amr Elmasry, Torben Hagerup, and Frank Kammer. Space-efficient basic graph algorithms. In STACS 2015, volume 30, pages 288–301, 2015. doi:10.4230/LIPIcs.STACS.2015.288. [15] Funda Ergun and Hossein Jowhari. On the monotonicity of a data stream. Combinatorica, 35(6):641– 653, 2015. doi:10.1007/s00493-014-3035-1. [16] Greg N. Frederickson. Upper bounds for time-space trade-offs in sorting and selection. Journal of Computer and System Sciences, 34(1):19–26, 1987. doi:10.1016/0022-0000(87)90002-X. [17] Michael L. Fredman. On computing the length of longest increasing subsequences. Discrete Mathematics, 11(1):29–35, 1975. doi:10.1016/0012-365X(75)90103-X. [18] Anna Gál and Parikshit Gopalan. Lower bounds on streaming algorithms for approximating the length of the longest increasing subsequence. SIAM Journal on Computing, 39(8):3463–3479, 2010. doi:10.1137/090770801. [19] Parikshit Gopalan, T.S. Jayram, Robert Krauthgamer, and Ravi Kumar. Estimating the sortedness of a data stream. In SODA 2007, pages 318–327, 2007. URL: http://dl.acm.org/citation.cfm?id=1283417. [20] James W. Hunt and Thomas G. Szymanski. A fast algorithm for computing longest common subsequences. Communications of the ACM, 20(5):350–353, 1977. doi:10.1145/359581.359603. [21] Eyal Kushilevitz and Noam Nisan. Communication Complexity. Cambridge University Press, 1997. [22] David Liben-Nowell, Erik Vee, and An Zhu. Finding longest increasing and common subsequences in streaming data. Journal of Combinatorial Optimization, 11(2):155–175, 2006. doi:10.1007/s10878-006-7125-x. [23] Andrea Lincoln, Virginia Vassilevska Williams, Joshua R. Wang, and R. Ryan Williams. Deterministic time-space trade-offs for k-SUM. In ICALP 2016, pages 58:1–58:14, 2016. doi:10.4230/LIPIcs.ICALP.2016.58. [24] C. L. Mallows. Problem 62-2, patience sorting. http://www.jstor.org/stable/2028371. SIAM Review, 4(2):143–149, 1962. URL: [25] C. L. Mallows. Problem 62-2. http://www.jstor.org/stable/2028347. Review, URL: SIAM 5(4):375–376, 1963. [26] C. L. Mallows. Patience sorting. Bulletin of the Institute of Mathematics and its Applications, 9:216–224, 1973. [27] J. Ian Munro and Mike S. Paterson. Selection and sorting with limited storage. Theoretical Computer Science, 12(3):315–323, 1980. doi:10.1016/0304-3975(80)90061-4. [28] Timothy Naumovitz and Michael Saks. A polylogarithmic space deterministic streaming algorithm for approximating distance to monotonicity. In SODA 2015, pages 1252–1262, 2015. doi:10.1137/1.9781611973730.83. [29] Noam Nisan. RL ⊆ SC. In STOC 1992, pages 619–623, 1992. doi:10.1145/129712.129772. [30] Jakob Pagter and Theis Rauhe. Optimal time-space trade-offs for sorting. In FOCS 1998, pages 264–268, 1998. doi:10.1109/SFCS.1998.743455. [31] Michal Pilipczuk and Marcin Wrochna. On space efficiency of algorithms working on structural decompositions of graphs. In STACS 2016, volume 47, pages 57:1–57:15, 2016. doi:10.4230/LIPIcs.STACS.2016.57. [32] Prakash Ramanan. Tight Ω(n lg n) lower bound for finding a longest increasing subsequence. International Journal of Computer Mathematics, 65(3–4):161–164, 1997. doi:10.1080/00207169708804607. 13 [33] Dan Romik. The surprising mathematics of longest increasing subsequences. Cambridge University Press, 2015. doi:10.1017/CBO9781139872003. [34] Michael Saks and C. Seshadhri. Space efficient streaming algorithms for the distance to monotonicity and asymmetric edit distance. In SODA 2013, pages 1698–1709, 2013. doi:10.1137/1.9781611973105.122. [35] Michael Saks and C Seshadhri. Estimating the longest increasing sequence in polylogarithmic time. SIAM Journal on Computing, 46(2):774–823, 2017. doi:10.1137/130942152. [36] Walter J. Savitch. Relationships between nondeterministic and deterministic tape complexities. Journal of Computer and System Sciences, 4(2):177–192, 1970. doi:10.1016/S0022-0000(70)80006-X. [37] Craige Schensted. Longest increasing and decreasing subsequences. Canadian Journal of Mathematics, 13(2):179–191, 1961. doi:10.4153/CJM-1961-015-3. [38] Xiaoming Sun and David P. Woodruff. The communication and streaming complexity of computing the longest common and increasing subsequences. In SODA 2007, pages 336–345, 2007. URL: http://dl.acm.org/citation.cfm?id=1283383.1283419. [39] Joshua R. Wang. Space-efficient randomized algorithms for K-SUM. In ESA 2014, pages 810–829, 2014. doi:10.1007/978-3-662-44777-2_67. 14
8cs.DS
REPRESENTATION GROWTH OF SOME TORSION-FREE FINITELY GENERATED 2-NILPOTENT GROUPS. arXiv:1711.03849v1 [math.GR] 10 Nov 2017 MICHELE ZORDAN Abstract. We devise a new method for computing representation zeta functions of torsion-free finitely generated 2-nilpotent groups whose associated Lie lattices have an extra smoothness condition. This method is used first to derive intrinsic formulae for the abscissa of convergence of such representation zeta functions; and secondly, as a practical application, to compute global, local and topological representation zeta functions of groups within an infinite family containing the Heisenberg group over rings of integers in number fields. 1. Introduction Let G be a torsion-free finitely generated nilpotent group (T-group). Let ãi (G) (i ∈ N) be the number of irreducible n-dimensional complex characters of G up to tensoring by one-dimesional characters. The representation zeta function of G is X ζG (s) = ãi (G)i−s . i∈N The abscissa of convergence of this Dirichlet series (when finite) gives the degree of polynomial growth of the partial sums of the ãi (G)’s (cf. e.g. [20, Section 1.1]). 1.1. A family of T-groups. The main results of this paper concern representation zeta functions of torsion-free finitely generated 2-nilpotent groups (T2 -groups). Of particular interest will be those arising from 2-nilpotent Lie lattices over rings of integers in number fields. Let henceforth K be a number field with ring of integers O. Stasinski and Voll [20, Section 2.4] associate a unipotent group scheme GΛ with any 2-nilpotent O-Lattice Λ. Theorem 2.10 gives a general method to compute ζGΛ (s) when Λ has some additional smoothness property. As this is rather technical, we first record some zeta functions obtained with this method. We shall consider Lie lattices obtained from the following Z-Lie lattices. Definition 1.1. Let m, n ∈ N. We define the following Z-Lie lattice: Gm×n = hc1 , . . . , cm+n , zij , 1 ≤ i ≤ m, 1 ≤ j ≤ n | [ci , cm+j ] = zij i. In this definition, non-specified Lie brackets which do not follow formally from the given ones are understood to be zero. Let m, n be as above, we define Λm×n = Gm×n ⊗Z O. We denote by Gm×n the group scheme GΛm×n . 1.1.1. Representation zeta function of Gm×n (O). Fix throughout m, n ∈ N. Without loss of generality we may assume that m ≤ n. Indeed the Z-Lie lattices Gm×n and Gn×m are isomorphic, so also the O-group schemes Gm×n and Gn×m are. Theorem A. Let O be the ring of integers of a number field K, and let ζK be the Dedekind zeta function of K. Then ζGm×n (O) (s) = m−1 Y i=0 ζK (s − n − i) . ζK (s − i) 2 MICHELE ZORDAN This theorem compares to a number of known results. First, in loc. cit. Stasinski and Voll also computed representation zeta functions of groups in three infinite families arising from their construction. The Lie lattice Gm×n coincides with their Gn when m = n; so Theorem A is a generalization of [20, Theorem B] for the groups Gn (O). In particular the properties of the Dedekind zeta function imply that the results on functional equation and abscissa of convergence in [20, Corollary 1.3] hold, mutatis mutandis, for the representation zeta function of Gm×n (O). Also the statement on meromorphic continuation holds but it is now a consequence of the more general [5, Theorem A] by Dung and Voll, which studies the analytic properties (such as meromorphic continuation and rationality of the abscissa of convergence) of the representation zeta function of a T-group arising from a unipotent group scheme. Secondly, Theorem A also compares to [4, Section 1.3]. There Carnevale, Schechter and Voll consider Lie lattices obtained from Gn by adding an extra linear relation for its generators. Finally, the groups Gm×n (O) are a generalization of the Grenham’s groups G1×n used by Snocken to prove that every rational number may be attained as abscissa of convergence of the representation zeta function of a T2 -group (cf. [19, Theorem 4.22]). In particular Theorem A may be used to recover Snocken’s result. Indeed, if ×kZ Gm×n denotes the k-fold central product of Gm×n , it is known that ζ×kZ Gm×n (O) (s) = ζGm×n (O) (ks). This clearly has abscissa of convergence (m+n)/k. Notice that by [10, Theorem 1.5] the abscissa of convergence must be rational (cf. also [5, Theorem A]). 1.1.2. Local representation zeta function. For a non-zero prime ideal p of O we denote by Op the completion of O at p. Let Λ be a 2-nilpotent O-Lie lattice. By [20, Proposition 2.2] one has the following Euler factorization: Y (1.1) ζGΛ (O) (s) = ζGΛ (Op ) (s). p The (global) representation zeta function in Theorem A is obtained by computing the local factors on the right-hand side of (1.1). We shall need the following notation. Notation 1.2. Henceforth X, Y and Z will denote indeterminates in the field Q(X, Y, Z). We define the following objects. i. Let N ∈ N, we write (N )X = (1 − X N ) (0) = 1 (N )X ! = (1)X (2)X · · · (N )X (0)! = 1. ii. Gauss polynomial. For a, b ∈ N b ≤ a, we define   a (a)! . = (a − b)!(b)! b X iii. Let j ∈ N . We write [j]0 for the set {0, . . . , j}. iv. Let ℓ ∈ N. We write {i1 , . . . , il }< for an ordered subset of N, i.e. a subset such that i1 < i2 < · · · < iℓ . v. X-multinomial coefficient. Let j ∈ N and let I = {i1 , . . . , iℓ }< ⊆ [j − 1]0 . We write         j j iℓ i2 = ··· . I i1 X iℓ X iℓ−1 X vi. Pochhammer symbol. Let k ∈ N. We define (X; Y )k = k Y (1 − XY i ). i=0 REPRESENTATION GROWTH OF SOME TORSION-FREE NILPOTENT GROUPS 3 Definition 1.3. Let I = {i1 , . . . , iℓ }< ⊆ [m − 1]0 . We define   n I (X) = fG (X i1 +1 ; X)m−i1 . m×n I +n−m X Theorem B. Let p be a non-zero prime ideal of O and q be the cardinality of the residue field of Op . Then (1.2) X ζGm×n (Op ) (s) = I (q −1 ) fG m×n X i∈I I⊆[m−1]0 q (m−i)(n+i)−(m−i)s , 1 − q (m−i)(n+i)−(m−i)s where I under the summation symbol denotes an ordered subset. 1.1.3. Topological zeta functions. In [17] Rossmann defines topological representation zeta functions for T-groups arising from unipotent group schemes. The formula in Theorem A (or rather its proof as we shall see) entails a corresponding formula for the topological representation zeta functions. Corollary C. The topological representation zeta function of Gm×n (Op ) is m−1 Y i=0 s−i . s−n−i 1.2. Abscissae of convergence. Fix throughout a non-zero prime ideal p of O and let q be the cardinality of the residue field Fq of Op . Theorem B is obtained by applying an analogue of [22, Theorem E] to the Op -Lie lattice Gm×n ⊗Z Op . This gives a general method for computing local factors of representation zeta function of T2 -groups when the attached Lie lattice has some extra smoothness property called geometrical smoothness (see Definition 2.3). This result is Theorem 2.10. We record here two of its consequences that give an intrinsic formula for the abscissa of convergence of the aforementioned local factors. Definition 1.4. Let g be an Op -Lie lattice and let d = rkOp g, d′ = rkOp g′ . Let ḡ be the Fq -Lie algebra obtained from g by reducing it modulo p. For ω ∈ Hom(ḡ, Fq ) r {0} set Rad(ω) = {x ∈ ḡ | ω([x, y]) = 0 ∀y ∈ ḡ} ρω (s) = 2(d′ − dimFq (Rad(ω))′ − (d − dimFq Rad(ω))s. We define α(g) = max [ {s ∈ Q | ρω (s) = 0}. ω∈Hom(ḡ,Fq )r{0} 1.2.1. T2 -groups. Let G be a T-group. As noted by Voll in [12, Chapter III,§ 3.2], the representation zeta function of G has the following Euler factorization: Y ζG (s) = ζG,p (s) p prime P∞ −is where ζG,p (s) = i=0 ãpi p . In order to state the next main result we need to recall some facts about the Lie theory of T-groups. Namely, with each T-group G there is associated a Q-Lie algebra LG (Q) and an injective map log : G → LG (Q) such that log(G) spans LG (Q) (see [18, Chapter 6] and [6, 7]). This construction is such that if H is a finite index subgroup of G then LH (Q) = LG (Q). The set log(G) is not necessarily even an additive subgroup of LG (Q), but by [6, Theorem 4.1], 4 MICHELE ZORDAN there is f ∈ N such that Gf is LR, i.e. log(Gf ) is a Z-Lie sublattice of LG (Q). When p ∤ f , by [10, Lemma 8.5], ζG,p = ζGf ,p . Moreover f may be chosen so that L = log(Gf ) is such that L′ ⊆ c!L where c is the nilpotency class of G. In this case Howe’s Kirillov orbit method [9] applies and the representation zeta function may be computed as the Poincaré series of a matrix of linear forms (see [21, Proposition 3.1]). Definition 1.5. Let L be a Lie algebra over K. The commutator matrix of a basis of L is defined analogously to the commutator matrix for a basis of an Op -Lie lattice (see Definition 2.1). We say that L has smooth rank-loci when the rankloci of a commutator matrix of L are smooth schemes over K. An analogue of [22, Lemma 2.1] ensures that this definition is independent of the basis chosen to define the commutator matrix. We shall show that, if G is a T-group of nilpotency class 2, LG (Q) having smooth rank-loci implies that, for almost all p, ζG,p is the Poincaré series of a Zp -Lie lattice with geometrically smooth rank-loci, to which Theorem 2.10 will apply. The output will be the following theorem. Theorem D. Let G be a finitely generated torsion-free 2-nilpotent group. Assume that LG (Q) has smooth rank-loci. Then, for almost all primes, the abscissa of convergence of ζG,p is α(log(Gf ) ⊗Z Zp ) where f ∈ N such that Gf is LR and log(Gf )′ ⊆ 2 log(Gf ). 1.2.2. Unipotent group schemes. The last main result is the analogue of Theorem D but for the factors in the Euler product (1.1). Theorem E. Let Λ be a 2-nilpotent O-Lie lattice and let GΛ be the unipotent group scheme associated with it by [20, Section 2.4]. Assume that Λ ⊗O K has smooth rank-loci. Then, for almost all non-zero prime ideals p in O, ζGΛ (Op ) has abscissa of convergence α(Λ ⊗O Op ). 1.3. Context. The first three main results mostly compare, as said, to [5, 17, 20]. Zeta functions analogous to the ones considered here have been introduced and studied for p-adic analytic groups and arithmetic subgroups of semisimple algebraic groups over number fields. In that case representations are not counted up to twisting by one-dimesional characters (see for instance the work of Lubotzky and Martin [15], Jaikin-Zapirain [11], Larsen and Lubotzky [14], and Avni, Klopsch, Onn and Voll [2, 3]). Recently Stasinski and Häsä have introduced a representation zeta function counting, up to twisting, characters of the general linear group over a compact discrete valuation ring (cf. [8]). Theorem 2.10 applies to analogous situations whenever a Kirillov orbit method applies. Theorems D and E compare to the upper and lower bounds obtained by Snocken and Ezzat in [19, Theorem 4.24]. In a broader sense they compare to the bounds in the context of p-adic analytic groups obtained in [1, Theorem 1.1] and to the bounds for subgroup zeta functions featuring in [6, 16]. 1.4. Notation. Throughout, Z denotes the integers, N the set of positive integers and N0 = {0} ∪ N the set of natural numbers. The set of rational numbers is denoted by Q. If p is a rational prime, Qp and Zp denote the sets of the p-adic numbers and of the p-adic integers respectively. Let R be a ring, an R-Lie lattice is a free finitely generated R-module endowed with a Lie bracket. If g is an R-Lie lattice, we write g′ for its derived Lie sublattice. REPRESENTATION GROWTH OF SOME TORSION-FREE NILPOTENT GROUPS 5 If not otherwise specified, when R is considered as an R-lie lattice it is always endowed with the trivial Lie bracket. Let i, j ∈ N. The ring of i×j matrices with entries in R is denoted by Mati×j (R). If i = j the identity matrix is denoted by Idj , the diagonal matrix with a1 , . . . , aj ∈ R on the diagonal is denoted by diag(a1 , . . . , aj ). We have consistently denoted tuples by x, y, z, . . . , their components are denoted by x1 , x2 , x3 , . . . , y1 , y2 , y3 , . . . , z1 , z2 , z3 , . . . respectively. Often we shall represent mn-tuples of elements in a ring R as m × n matrices. In this case the components of the mn-tuple x ∈ Matm×n (R) are denoted by xij for i ∈ {1, . . . , m} and j ∈ {1, . . . , n}. 1.5. Acknowledgements. The formulae for the zeta functions computed here were first computed with ad-hoc more elementary methods during my doctoral studies. I wish to thank my PhD supervisor Christopher Voll and I acknowledge financial support by the School of Mathematics of the University of Southampton the Faculty of Mathematics of the University of Bielefeld and CRC 701. I am grateful to Ben Martin for his comments on this work. I am currently supported by the Research Project G.0939.13N of the Research Foundation - Flanders (FWO). 2. Poincaré series The main results of this paper all follow from a variant of [22, Theorem E]. In order to treat Poincaré series arising from T-groups of class 2 and unipotent group schemes, we shall consider Lie lattices that do not necessarily have finite abelianization. Let, for the rest of the section, g be as in Definition 1.4. We shall need the following notational conventions. 2.1. Notation. We briefly recall the definition of commutator matrix and that of its Poincaré series as they are intended in this context. Definition 2.1. Let B = {bk }k∈{1,...,d} be an Op -basis of g with the last d′ elements in g′ . We define the commutator matrix of g with respect to B to be  ′  d X RB (X1 , . . . , Xd′ ) =  λki,j Xk  k=1 where for i, j ∈ {1, . . . , d}, [bi , bj ] = Pd′ k=1 i,j∈{1,...,d} λki,j bd−d′ +k . Let for the rest of this section B be a basis of g as in Definition 2.1 and R = RB . We denote by R the matrix obtained from R reducing its entries mod p. Definition 2.2. Let R be a ring. Let i, j, k ∈ N with k ≤ min{i, j}. We define ! Idk 0 k Bi×j (R) = ∈ Mati×j (R) . 0 0 The definition of geometrical smoothness for the rank-loci of R in [22, Definition 1.11] now naturally extends to Lie lattices with infinite abelianization if R is defined as above. Henceforth we consider Lie lattice structures on (Op )d and Fdq given by the following identification: tuples in (Op )d (resp. Fdq ) are viewed as coordinates of elements in g (resp. ḡ) with respect to B (resp. the reduction modulo p of B). Definition 2.3. We say that g has geometrically smooth rank-loci when for all µ 2µ ≤ d: 6 MICHELE ZORDAN ′ ′ i. every x ∈ Fdq such that rkFq R(x) = 2µ has a lift x ∈ (Op )d such that R(x) has Smith normal form B2µ d×d (Op ). ′ ii. For every x ∈ (Op )d such that R(x) has Smith normal form B2µ d×d (Op ), ′ d′ (ker R(x)) is an isolated Op -submodule of (Op ) . The fact that this definition is independent of the choice of B is a consequence of the analogue of [22, Lemma 2.1] in this context. We define the Poincaré series of g as in [22, Definition 1.6] with the obvious modifications needed to deal with a matrix of linear forms in d′ variables. Let h = ⌊d/2⌋ ′ and let r ∈ N. Let w ∈ (Op /pr )d . We define νR,r (w) = (min{ai , r})i∈{1,...,h} , where pa1 , pa1 , . . . , pah , pah are the first 2h elementary divisors of R(w) for a w ∈ ′ (Op )d lifting w. Indeed, taking the minimum with r ensures that the this definition is independent of the choice of w. Definition 2.4. Let ′ Wr (Op ) = (Op /pr )d r p (Op /pr )d ′ r ∈ N. Let I = {i1 , . . . , iℓ }< ⊆ [h − 1]0 . Let also i0 = 0 and iℓ+1 = h and µj = ij+1 − ij for j ∈ {0, . . . , ℓ}; N= ℓ X rj for rI = (r1 , . . . , rℓ ) ∈ N|I| . j=1 The Poincaré series of R is defined as X Pℓ X O |NI,rpI (R)| q −s j=1 rj (h−ij ) , PR (s) = I⊆[h−1]0 I={i1 ,...,iℓ }< rI ∈N|I| where O NI,rpI (R) = {w ∈ WN (Op ) | νR,N (w) = (0, . . . , 0, rℓ , . . . , rℓ , | {z } | {z } µℓ µℓ−1 rℓ + rℓ−1 , . . . , rℓ + rℓ−1 . . . , N, . . . , N ) ∈ Nh0 }. | {z } | {z } µ0 µℓ−2 If B1 is another basis for g as in Definition 2.1, it is known that PR (s) = PRB1 (s), we shall therefore often call PR (s) the Poincaré series of g. 2.2. Technical result. We recall the following definitions from [22]: ′ Definition 2.5. An R-kernel class c is a subset of Fdq such that for any two x, w ∈ c dimFq ker R(x) = dimFq ker R(w) dimFq (ker R(x))′ = dimFq (ker R(w))′ . For an R-kernel class c we define dc = dimFq r d′c ′ = dimFq r r = ker R(x) for any x ∈ c r = ker R(x) for any x ∈ c. Definition 2.6. A classification by R-kernels is a set of R-kernel classes which ′ are disjoint and cover Fdq . An element of a classification by R-kernels A is called a kernel A-class. REPRESENTATION GROWTH OF SOME TORSION-FREE NILPOTENT GROUPS 7 Definition 2.7. Let A be a classification by R-kernels and ℓ ∈ N0 . A set {c1 , . . . , cℓ } of kernel A-classes such that dc1 > dc2 > · · · > dcℓ is called a sequence of kernel A-classes. Definition 2.8. Let S = {c1 , . . . , cℓ } be a sequence of kernel A-classes i. If S = ∅ we define FS (R) = {∅}. ii. If S 6= ∅. We define FS (R) as the set of ℓ-tuples (x1 , . . . , xℓ ) of elements of Pℓ ′ Fdq such that for j = 1, . . . , ℓ and yj = k=j xk : (a) yj ∈ cj , (b) xj−1 ∈ (ker R (yj ))′ for j > 1. Definition 2.9. Recall that h = ⌊d/2⌋. Let {i1 , . . . , iℓ }< ⊆ [h − 1]0 . A sequence of kernel A-classes {c1 , . . . , cℓ } with the property that dcj = d − 2(h − iℓ+1−j ), for j = 1, . . . , ℓ, is called an I-sequence of kernel A-classes. The set of all I-sequences of kernel A-classes is denoted by KIA (R). The following analogue of [22, Theorem E] holds. Theorem 2.10. Let g be an Op -Lie lattice with d = rkOp g and d′ = rkOp g′ . Let R be a commutator matrix of g and A be a classification by R-kernels. Assume that R has geometrically smooth rank-loci. Then the Poincaré series of R is X X ′ Y c∈S S∈KA (R) I={i1 ,...,iℓ }< S={c1I,...,c } ℓ I⊆[h−1]0 ′ |FS (R)| q −(d −dcℓ ) ′ ′ q d −dc −s ′ ′ d−dc 2 1 − q d −dc −s d−dc 2 . Proof. The proof closely follows the argument for [22, Theorem E], the only difference is that here the size of the commutator matrix is no longer equal to the number of its variables and one needs to keep them distinct in the proof. This is straightforward, because loc. cit. is a direct consequence of [22, Proposition 3.3], whose proof is independent of the size of R: the quantity d there, has to be interpreted as the number of variables in R, which in the present context is d′ . The current result therefore follows immediately from the analogue of [22, Proposition 3.3] stated with d′ in the place of d. Indeed, the rest of the argument applies unchanged to the present situation.  Next result now follows in the same fashion as [22, Theorem A] followed from [22, Theorem E] (see [22, Section 3.3]). Theorem 2.11. Assume that the rank-loci of g are geometrically smooth. Then the Poincaré series of g has abscissa of convergence α(g). 3. T-groups In this section we explain how to apply Theorem 2.11 to representation zeta functions of T-groups of nilpotency class 2. From now onwards we assume g to be nilpotent of nilpotency class 2. This implies that the last d′ rows and columns of the commutator matrix RB of g with respect to B consist of zeroes. The matrix obtained by discarding them is a (d − d′ ) × (d − d′ ) antisymmetric matrix of linear forms in d′ variables. To distinguish it from RB , we call it the trimmed commutator matrix of g with respect to B and denote it by SB . Remark 3.1. It is clear from its definition that the Poincaré series is the same for RB and SB . 8 MICHELE ZORDAN 3.1. Proof of Theorem D. Let f ∈ N be such that H = Gf is LR and L = log(H) is such that L′ ⊆ 2L. Let B be a Z-basis of log(H) such that its last d′ = rkZ log(H)′ elements span log(H)′ . By [21, Proposition 3.1] and Remark 3.1, for all p ∤ f the representation zeta function ζG,p is the Poincaré series of gp = log(H) ⊗Z Zp (i.e. the Poincaré series of RB when B is viewed as a basis of gp ). In order to prove the theorem it is enough to show that Theorem 2.10 applies, i.e. it suffices to show that, if L = LG (Q) has smooth rank-loci, then for almost all primes, gp has geometrically smooth rank-loci. This is immediate as smoothness of the rank-loci of L implies smoothness of the rank-loci of gp ⊗Zp Qp = L ⊗Q Qp for all p. Which for almost all primes implies the smoothness of the rank-loci of gp . This implies geometrical smoothness of the rank-loci as shown in [22, Remark 2.4]. 3.2. Proof of Theorem E. Let d = rkO Λ and d′ = rkO Λ′ . Let also B = {bk }k∈{1,...,d} be an O-basis of Λ such that its last d′ elements are in Λ′ . By [20, Proposition 2.18], the representation zeta function ζGΛ (Op ) is the Poincaré series of the trimmed commutator matrix SB when B is viewed as an Op basis of g = Λ ⊗O Op . With the same argument used to prove Theorem D, one shows that L = Λ ⊗O K having smooth rank-loci implies that Λ ⊗O Op has geometrically smooth rank-loci for almost all prime ideals p. This shows that Theorem 2.10 applies to this context and concludes the proof. 4. An infinite family of groups schemes As explained in the proof of Theorem E the representation zeta function of G = Gm×n (Op ) is given by the Poincaré series of a trimmed commutator matrix of g = Gm×n ⊗Z Op . So d = m + n + mn and d′ = mn. We choose B to be the basis used in the presentation of Gm×n in Definition 1.1. Accordingly we compute ! 0 M(Xij ) , (4.1) SB (X11 , X12 . . . , Xmn ) = −M(Xij ) 0 where M(Xij ) is the generic m × n matrix in the variables Xij , for i ∈ {1, . . . , m} and j ∈ {1, . . . n}. For convenience, in what follows we represent mn-tuples as m × n matrices, therefore the labelling of the variables in SB . We shall now show how to apply Theorem 2.10 to the situation in hand. We begin by showing that its hypotheses are satisfied for g, i.e. we shall show that Lemma 4.1. The Lie lattice g has geometrically smooth rank-loci. In what follows we shall see that this is equivalent to a problem involving lifting Smith normal forms of m × n matrices with entries in Fq . First of all we notice that since m ≤ n, for x ∈ Matm×n ( Op ) the matrices RB (x) and SB (x) can have Frac(Op )-rank at most 2m. Similarly, for x ∈ Matm×n ( Fq ), if RB and SB are the reductions modulo p of RB and SB respectively, the matrices RB (x) and SB (x) can have Fq -rank at most 2m. Secondly, by (4.1), x ∈ Matm×n (Op ) has Smith normal form   diag(a1 , . . . , am ) 0 , if and only if RB (x) and SB (x) have Smith normal form ! diag(a1 , a1 , . . . , am , am ) 0 ∈ Mat(m+n+mn)×(m+n+mn) (Op ) 0 0 ! diag(a1 , a1 , . . . , am , am ) 0 ∈ Mat(m+n)×(m+n) (Op ) 0 0 REPRESENTATION GROWTH OF SOME TORSION-FREE NILPOTENT GROUPS 9 respectively. Similarly, x ∈ Matm×n (Fq ) has rank m − k (k ∈ N, k ≤ m) if and only if both RB (x) and RB (x) have rank 2(m − k). The discussion above implies that g has geometrically smooth rank-loci if and only if the two following properties are satisfied for all k ∈ N, k ≤ m: i. for x ∈ Matm×n (Fq ) of rank m−k it is possible to find a lift b x ∈ Matm×n (Op ) with Smith normal form Bm−k (O ). p m×n ii. for x ∈ Matm×n (Op ) with Smith normal form Bm−k m×n (Op ), ker RB (x) has isolated derived Lie sublattice. Both the properties above are easily verified: namely the first one by taking a matrix whose entries are the Teichmüller lifts of the entries of x, while the second one because of the following result. Lemma 4.2. If x ∈ Matm×n (Op ) has Smith normal form Bm−k m×n (Op ) (k ∈ N, k ≤ m), then ker RB (x) is isolated and isomorphic to (Gk×(n−m+k) ⊗Z Op ) ⊕ Op mn−k(n−m+k) as an Op -Lie lattice. Proof. Let S ∈ GLm (Op ) and T ∈ GLn (Op ) such that SxT = Bm−k m×n (Op ). Let ! St 0 , M= 0 T and let ϕ̃ be the Op -module automorphism of g/g′ whose matrix in the basis {c1 + g′ , . . . , cm+n + g′ } is M −1 . Choose one c1i each from ϕ̃(ci + g′ ) for i = 1, . . . , m + n. Since ϕ̃ is invertible, the set B1 = {c1i | 1 ≤ i ≤ m + n} ∪ {[c1i , c1j ] | 1 ≤ i ≤ m, m < j ≤ m + n} is an Op -basis of g such that M t SB (x)M = SB1 (SxT ). Moreover, because of the shape of M , the Op -module automorphism ϕ defined by ci 7→ c1i for i ∈ {1, . . . , m + n} and zij 7→ [c1i , c1j ] for 1 ≤ i ≤ m, m < j ≤ m + n gives a Lie lattice automorphism of (Op )m+n+mn . Hence ker RB (x) and ker RB1 (SxT ) are isomorphic as Lie lattices and the derived sublattice of the former is isolated if and only if the derived sublattice of the latter is; which is indeed the case as ! 0 Bm−k m×n (Op ) SB1 (SxT ) = −Bm−k 0 n×m (Op ) by definition of B1 . This also shows that ker RB1 (SxT ) is isomorphic to (Gk×(n−m+k) ⊗Z Op ) ⊕ Op mn−k(n−m+k) and we conclude.  4.1. Proof of Theorem B. In order to apply Theorem 2.10 we need to have a classification by RB -kernels. This is easily obtained from the previous argument for geometrical smoothness. Indeed Lemma 4.2 shows that for x ∈ Matm×n (Fq ) with rkFq x = k ≤ m the derived subalgebra of ker RB (x) is always the same. This implies that the set of loci of constant rank in Matm×n (Fq ) is a classification by RB -kernels. For convenience we denote the members of this classification simply by elements of [m − 1]0 . Namely the kernel class corresponding to rank m − i in Matm×n (Fq ) will be denoted by i ∈ [m − 1]0 . Notice that with this notation we exclude the locus of rank 0 (which is just the zero matrix), this is not a limitation 10 MICHELE ZORDAN as we are only required to plug primitive coordinate vectors into RB in order to compute its Poincaré series (cf. Definition 2.4). We shall now rephrase Theorem 2.10 with the current notation and the following convention. As in Section 2, Fm+n+mn is viewed as an Fq -Lie algebra, so its derived q subalgebra is abelian and we identify it with Matm×n (Fq ) endowed with the trivial m+n+mn Lie bracket. For x ∈ Fmn and so q , ker RB (x) is a Lie subalgebra of Fq ′ (ker RB (x)) may be viewed as a subalgebra of Matm×n (Fq ). First we rephrase Definition 2.8 in this notation. Definition 4.3. Let I be an ordered subset of [m − 1]0 . If i. I = ∅, we define FI (RB ) = {∅}, ii. I = {i1 , . . . , iℓ }, we define FI (RB ) to be the set of ℓ-tuples (x1 , . . . , xℓ ) of Pℓ matrices in Matm×n (Fq ) such that for j = 1, . . . , ℓ and yj = k=j xj : (a) rkFq yj = m − ij , (b) xj−1 is in the derived Lie subalgebra of ker RB (yj ) when this is viewed inside Matm×n (Fq ) with the convention above. Secondly, we compute the exponents of q in the formula of Theorem 2.10. Namely let x ∈ Matm×n (Fq ) of rank m − k (for some k ∈ [m − 1]0 ). Then, by Lemma 4.2, ker RB (x) ∼ = (Gk×(n−m+k) ⊗Z Fq ) ⊕ Fqmn−k(n−m+k) (ker RB (x))′ ∼ = Fk(n−m+k) = (Gk×(n−m+k) ⊗Z Fq )′ ∼ q as Fq -Lie algebras. It follows that d − dk = 2m − 2k d′ − d′k = (m − k)(n + k), where k denotes a kernel class, as explained at the beginning of this section, and dk , d′k are as in Definition 2.5. In conclusion if the formula in Theorem 2.10 is rewritten with the notation above, one finds that the representation zeta function of G is equal to X X q (m−i)(n+i)−(m−i)s . |FI (RB )|q −(m−i1 )(n+i1 ) 1 − q (m−i)(n+i)−(m−i)s I⊆[m−1] i∈I 0 I={i1 ,...,iℓ }< Notice that here we are summing over sequences of kernel classes i1 , . . . , iℓ with di1 < · · · < diℓ and not the other way around as in Theorem 2.10. This explains the multiplication by q −(m−i1 )(n+i1 ) and not by q −(m−iℓ )(n+iℓ ) . Theorem B now follows by repeatedly applying the following observation. Lemma 4.4. Let x ∈ Matm×n (Fq ) with rank m−k1 for some k1 ∈ [m−1]0 . Then for all k2 ∈ [k1 −1]0 the number of matrices y in the derived Lie subalgebra of ker RB (x) such that x + y has rank m − k2 is equal to the number of k1 × (n − m + k1 ) matrices of rank k1 − k2 with entries in Fq . Proof. Let S ∈ GLm (Fq ) and T ∈ GLn (Fq ) such that SxT = Bm−k m×n (Fq ). An argument similar to the proof of Lemma 4.2 shows that y ∈ (ker SB (x))′ if and only if SyT is supported only in the entries yij with m− k1 < i ≤ m and m− k1 < j ≤ n. The conclusion now follows immediately.  Theorem B in the stated form is recovered by applying the following result. Lemma 4.5 ([13, Proposition 3.1]). Let i, j ∈ N with i ≤ j and let k ∈ [i]0 . Then   j |Mati−k (F )| = (q −k−1 ; q −1 )i−k · q (i−k)(j+k) , q i×j j − i + k q−1 REPRESENTATION GROWTH OF SOME TORSION-FREE NILPOTENT GROUPS 11 where Mati−k i×j (Fq ) is the set of m × n matrices with entries in Fq and rank i − k. 4.2. Proof of Theorem A and Corollary C. We shall now rewrite the representation zeta function of Gm×n (Op ) thus proving Theorem A and Corollary C. 4.2.1. Proof of Theorem A. The key will be, as in [20], a multiplicative formula for the local factors, i.e. for the representation zeta function of Gm×n (Op ). We shall need the following result. Lemma 4.6 ([20, Proposition 1.5]). For j ∈ N we have that   X Y (X i Z)j−i j (X −j Y Z; X)j = . (Y X −i1 −1 ; X −1 )j−i1 i j−i 1 − (X Z) (Z; X)j I X −1 i∈I I⊆[j−1]0 I={i1 ,...,iℓ }< We need now to write the zeta function (1.2) in a form allowing us to use Lemma 4.6. Let a, j ∈ N and let I = {i1 , . . . , iℓ }< ⊆ [j−1]0 , we write I +a = {i1 +a, . . . , iℓ +a}< . We shall need the following translation property for X-multinomial coefficients. Its proof is a standard computation which we do not report here. Lemma 4.7. Let a, j ∈ N0 and I ⊆ [j − 1]0 , we have that     i1 +1+a j+a j (X ; X)j−i1 = . I +a X I (X i1 +1 ; X)j−i1 Theorem 4.8. The representation zeta function of Gm×n (Op ) may be rewritten as ζGm×n (Op ) (s) = (q −s ; q)m . (q n−s ; q)m Proof. First, by Lemma 4.7,   n (4.2) (X −i1 −1 ; X −1 )m−i1 n − m + I X −1   m = (X −(n−m) X −(i1 +1) ; X −1 )m−i1 . I X −1 Second, rewriting the geometric series in Theorem B, we find that Y q (m−i)(n+i)−(m−i)s Y (q i q n−s )m−i (4.3) . = 1 − (q i q n−s )m−i 1 − q (m−i)(n+i)−(m−i)s i∈I i∈I Using (4.2) and (4.3), (1.2) may be rewritten as Y (q i q n−s )m−i X m . (q −(n−m) q −(i1 +1) ; q −1 )m−i1 ζGm×n (Op ) = 1 − (q i q n−s )m−i I q−1 i∈I I⊆[m−1]0 By Lemma 4.6 we conclude.  Theorem A now follows from the Euler product factorization enjoyed by the Dedekind zeta function. 4.2.2. Proof of Corollary C. The formula for the topological representation zeta function is a direct consequence of Theorem 4.8. Indeed the topological zeta function of Gm×n (Op ) is the constant term of the power series expansion in q − 1 of its representation zeta function. Thus, since the constant term of a convolution of power series is the product of the constant terms of the convolution factors, it suffices to compute the expansion of fi (s) = 1 − q s−i 1 − q s−n−i 12 MICHELE ZORDAN in q + 1 for i ∈ {0, . . . , m − 1}. By formally expanding q z = (1 + (q − 1))z in q − 1 using the binomial series we find that this is s−i s−n−i and we conclude. References [1] N. Avni, B. Klopsch, U. Onn, and C. Voll, Representation zeta functions of some compact padic analytic groups, Zeta functions in algebra and geometry, 2012, pp. 295–330. MR2858928 [2] , Representation zeta functions of compact p-adic analytic groups and arithmetic groups, Duke Math. J. 162 (2013), no. 1, 111–197. MR3011874 [3] , Similarity classes of integral p-adic matrices and representation zeta functions of groups of type A2 , Proc. Lond. Math. Soc. (3) 112 (2016), no. 2, 267–350. MR3471251 [4] A. Carnevale, S. Shechter, and C. Voll, Enumerating traceless matrices over compact discrete valuation rings, arXiv:1709.02717 (September 2017). [5] D. H. Dung and C. Voll, Uniform analytic properties of representation zeta functions of finitely generated nilpotent groups, Trans. Amer. Math. Soc. 369 (2017), no. 9, 6327–6349. MR3660223 [6] F. J. Grunewald, D. Segal, and G. C. Smith, Subgroups of finite index in nilpotent groups, Invent. Math. 93 (1988), no. 1, 185–223. MR943928 [7] F. Grunewald and D. Segal, Reflections on the classification of torsion-free nilpotent groups, Group theory, 1984, pp. 121–158. MR780569 [8] J. Häsä and A. Stasinski, Representation growth of compact linear groups, arXiv:1710.09112 (October 2017). [9] R. E. Howe, On representations of discrete, finitely generated, torsion-free, nilpotent groups, Pacific J. Math. 73 (1977), no. 2, 281–305. MR0499004 (58 #16984) [10] E. Hrushovski, B. Martin, S. Rideau, and R. Cluckers, Definable equivalence relations and zeta functions of groups, arXiv:0701011 to appear on J. Eur. Math. Soc. (JEMS) (August 2017). [11] A. Jaikin-Zapirain, Zeta function of representations of compact p-adic analytic groups, J. Amer. Math. Soc. 19 (2006), no. 1, 91–118 (electronic). MR2169043 (2006f:20029) [12] B. Klopsch, N. Nikolov, and C. Voll, Lectures on profinite topics in group theory, London Mathematical Society Student Texts, vol. 77, Cambridge University Press, Cambridge, 2011. Lectures from the course on Asymptotic Methods in Infinite Group Theory held in Oxford, September 2007, Edited by Dan Segal. MR2797110 [13] D. Laksov and A. Thorup, Counting matrices with coordinates in finite fields and of fixed rank, Math. Scand. 74 (1994), no. 1, 19–33. MR1277786 [14] M. Larsen and A. Lubotzky, Representation growth of linear groups, J. Eur. Math. Soc. (JEMS) 10 (2008), no. 2, 351–390. MR2390327 (2009b:20080) [15] A. Lubotzky and B. Martin, Polynomial representation growth and the congruence subgroup problem, Israel J. Math. 144 (2004), 293–316. MR2121543 (2006b:20065) [16] P. M. Paajanen, On the degree of polynomial subgroup growth in class 2 nilpotent groups, Israel J. Math. 157 (2007), 323–332. MR2342452 [17] T. Rossmann, Topological representation zeta functions of unipotent groups, J. Algebra 448 (2016), 210–237. MR3438311 [18] D. Segal, Polycyclic groups, Cambridge Tracts in Mathematics, vol. 82, Cambridge University Press, Cambridge, 1983. MR713786 [19] R. Snocken, Zeta functions of groups and rings, Ph.D. Thesis, https://eprints.soton.ac.uk/372833/, 2014. [20] A. Stasinski and C. Voll, Representation zeta functions of nilpotent groups and generating functions for Weyl groups of type B, Amer. J. Math. 136 (2014), no. 2, 501–550. MR3188068 [21] C. Voll, Functional equations for zeta functions of groups and rings, Ann. of Math. (2) 172 (2010), no. 2, 1181–1218. MR2680489 (2011f:20057) [22] M. Zordan, Poincaré series of Lie lattices and representation zeta functions of arithmetic groups, arXiv:1704.04165 (April 2017). KU Leuven, Departement Wiskunde, Celestijnenlaan 200B, B-3001 Leuven, Belgium. E-mail address: [email protected]
4math.GR
An Anytime Algorithm for Task and Motion MDPs arXiv:1802.05835v1 [cs.AI] 16 Feb 2018 ‡ Siddharth Srivastava∗‡ , Nishant Desai† , Richard Freedman§ , Shlomo Zilberstein§ Arizona State University, † United Technologies Research Center, § University of Massachusetts Abstract Integrated task and motion planning has emerged as a challenging problem in sequential decision making, where a robot needs to compute highlevel strategy and low-level motion plans for solving complex tasks. While high-level strategies require decision making over longer time-horizons and scales, their feasibility depends on low-level constraints based upon the geometries and continuous dynamics of the environment. The hybrid nature of this problem makes it difficult to scale; most existing approaches focus on deterministic, fully observable scenarios. We present a new approach where the high-level decision problem occurs in a stochastic setting and can be modeled as a Markov decision process. In contrast to prior efforts, we show that complete MDP policies, or contingent behaviors, can be computed effectively in an anytime fashion. Our algorithm continuously improves the quality of the solution and is guaranteed to be probabilistically complete. We evaluate the performance of our approach on a challenging, realistic test problem: autonomous aircraft inspection. Our results show that we can effectively compute consistent task and motion policies for the most likely execution-time outcomes using only a fraction of the computation required to develop the complete task and motion policy. 1 Introduction In order to be truly helpful, robots will need to be able to accept commands from humans at high-levels of abstraction, and autonomously execute them. Consider the problem of inspecting an aircraft (Fig. 1). In order to autonomously plan and execute such a task, the robots (UAVs in this case) will need to be able to make high-level inspection decisions on their own, while satisfying low-level constraints that arise from environment geometries and the limited capabilities of the UAVs. High-level decisions can include selecting where to go next, with whom to communicate, and what to inspect. ∗ Some of the work was done while this author as at United Technologies Research Center Figure 1: The aircraft inspection scenario These decisions need to take into account the uncertainty in the UAV’s actions. For instance, at the start of an aircraft’s inspection, one may know that the left wing has a structural problem, but the location of the fault may not be known precisely. When a UAV inspects the left wing, its sensors may succeed with probability 0.9, and so on. In order to solve this task autonomously, the UAV needs to select which pose to fly to next, which trajectory to use in order to do so, and the order in which to carry out inspections while making sure that it always has sufficient battery to return to the docking station and that it does not collide with any object in the environment. The feasibility of a high-level strategy for inspection therefore depends on the battery power required for each high-level operation such as “move to left wing”; “inspect left wing”, etc., which in turn depends on the low-level motion plan selected, which in turn depends on the hangar’s geometric layout and the physical geometry of the UAV. Throughout this paper, we will use the term “high-level” to represent a discrete MDP and “lowlevel” to refer to a motion planning problem. The framework of Markov decision processes (MDPs) can express discrete sequential decision making (SDM) problems. Numerous advances have been made in solving MDPs [Russell et al., 2015]. However, the scalability of these approaches relies upon a few key properties, including a bounded branching factor (or the set of possible actions) and the ability to express a problem accurately using discrete state variables. Both of these properties fail to hold in problems such as those described above. Recent work on deterministic, integrated task and motion planning [Kaelbling and LozanoPérez, 2011; Erdem et al., 2011; Srivastava et al., 2014; Dantam et al., 2016] shows that hierarchical approaches are useful for such problems. Computing task and motion policies for MDPs presents a new set of challenges not encountered in computing task and motion plans for deterministic scenarios. In particular, selecting an action for a state while ensuring a feasible refinement requires knowing the history of actions used to reach that state, since effects on properties that were abstracted away (such as battery usage) cannot be modeled accurately at the high level. A direct application of classical task and motion planning techniques is further limited by the number of possible high-level action paths that can be taken during an execution. Indeed, the task and motion planning literature makes it clear that computing a single high-level sequence of actions that is feasible with low-level constraints is a challenge; the extension to MDPs expands the problem to computing a feasible high-level sequence of actions for every possible stochastic outcome of a high-level action. In this paper, we investigate the problem of computing task and motion policies and show that principles of abstraction can be used to effectively model the problem, as well as to solve it by dynamically refining the abstraction used. We address the problem of computational complexity by developing an anytime algorithm that rapidly produces feasible policies for a high likelihood of scenarios that may be encountered during execution. Our methods can therefore be used to start the execution before the complete problem is solved; computation could continue during execution. The continual policy computation reports the probability of encountering situations which have not been resolved yet. This can be used to select the point at which execution is started in a manner appropriate to the application. In the worst case, if an unlikely event is encountered before the ongoing policy computation resolves it, execution could be brought to a safe state; in situations where this is not possible, one could wait for the entire policy to be computed with motion plans. In this way our approach offers a trade-off between pre-execution guarantees and pre-computation time requirements. The rest of this paper is organized as follows. Sec. 2 introduces the main concepts that we draw upon from prior work. Sec. 3 presents our formalization of abstractions and representations. This is followed by a description of our algorithms (Sec. 4). Sec. 5 presents an empirical evaluation of our approach in a test scenario that we created using opensource 3D models of aircraft and various hangar components. Sec. 6 discusses the relationship of the presented work and contributions with prior work. 2 Background A Markov decision process (MDP) hS, A, T, R, γi is defined by a set of states S, a set of actions A, a transition function T : S × A → µS that gives the probability distribution over result states upon the application of an action on a state; a reward function R : S → R; and a discounting factor γ ≤ 1. We will use T (s, a) as a function that maps a state to its probability. We will be particularly interested in MDPs with absorbing states and γ = 1, or, stochastic shortest path problems [Bertsekas and Tsitsiklis, 1991]. In this class of MDPs, the reward function yields negative values (action costs) for states except the absorbing states G. Absorbing states give zero rewards; once the agent reaches an absorbing state, it stays in it: ∀a ∈ A, g ∈ G, R(g) = 0; T (g, a)(g) = 1. We will consider SSPs that have a known initial state s0 and a finite time horizon, h, which represents an uppper bound on the number of discrete decision making steps available to the agent. Solutions to MDPs are represented as policies. A policy π : S × {1, . . . , h} → A maps a state and the timestep at which it is encountered, to the action that the agent should execute while following π. Given an MDP, the optimal “policy” of the agent is defined as one that maximizes the expected Ph long-term reward i=1 ri , where ri is the reward obtained at timestep i following the function R. Our notion of policies includes non-stationary policies since the optimal policy in a finite horizon MDP need not be stationary. In principle, dynamic programming can be used to compute the optimal policy in this setting just as in the infinite horizon setting: V 0 (s) i V (s) = R(s) = R(s) + maxa (1) X 0 T (s, a)(s )V i−1 0 (s ) (2) s0 Here V i is the i-step-to-go value function. Since we are given the initial state s0 , non-stationary policies can be expressed as finite state machines (FSMs). We will consider policies that are represented as tree-structured FSMs, also known as contingent plans. Several algorithms have been developed to solve SSPs. The LAO* algorithm [Hansen and Zilberstein, 2001] was developed to incorporate heuristics while computing solution policies for SSPs. Kolobov et al. [2011] developed general methods for solving SSPs in the presence of dead-ends. Specifying real-world sequential decision making problems as MDPs using explicitly enumerated state lists usually results in large, unweildy formulations that are difficult to modify, maintain, or understand. Lifted, or parameterized representations for MDPs such as FOMDPs [Sanner and Boutilier, 2009], RDDL [Sanner, 2010] and PPDDL [Younes and Littman, 2004] have been developed for overcoming these limitations. Such languages separate an MDP domain, constituting parameterized actions, functions and predicate vocabularies, from an MDP problem, which expresses the specific objects of each type and a reward function. We refer to Helmert [2009] for a general introduction to these concepts. W.l.o.g, we consider the vocabulary to consist of predicates alone, since functions can be represented as special predicates. A grounded predicate is a predicate whose parameters have been substituted by the objects in an MDP problem. For instance, Boolean valuations of the grounded predicate faultLocated(LeftWing) express whether the LeftWing’s fault’s precise location was identified. In our framework, states are defined as valuations of grounded predicates in a given problem. Although this framework usually expresses discrete properties, it can be extended naturally to model actions that have continuous action arguments and depend on and affect geometric properties of the environment. Example 1. Fig. 2 shows the specification for an inspect action in the aircraft inspection domain in a language similar to PPDDL (some syntactic elements have Action: inspect(Structure s, Trajectory tr) precond batterySufficient(tr)∧ inspects(tr, s)∧ collisionFree(tr) effect faultLocated(s) 0.8 ¬faultLocated(s) 0.2 decrease(batteryLevel(c(tr))) Figure 2: Specification of a stochastic action model been simplified for readability). This action models the act of inspecting a structure s while following the path tr. We use batterySufficient(tr) as an abbreviation for batteryRemaining−batteryRequired(tr). Intuitively, the specification states that if this action is executed in a state where the battery is sufficient and the selected trajectory satisfies constraints for being an inspection trajectory (the precondition is satisfied), it will result in locating the fault with the probability 0.8. In any case, the battery’s charge will be depleted by an amount depending on the trajectory used for inspection c(tr). The inspects(c, tr) predicate is true if the trajectory tr “covers” the given structure. Different interpretations for such predicates would result in different classes of coverage patterns. 3 Formal Framework Let X be a set of states and S a set of abstract states. We define a state abstraction as a surjective function α : X → S. We focus on predicate abstractions, where the abstraction function effectively projects the state space into a space without a specified set of predicates. Given a set of predicates P that are retained by a predicate abstraction, the states of the abstract state space are equivalence classes defined by the equivalence relation s1 ∼ s2 iff s1 and s2 agree on the valuations of every predicate in P, grounded using the objects in the problem. For any s ∈ S, the concretization function γα (s) = {x ∈ X : α(x) = s} denotes the set of concrete states represented by the abstract state s. For a set C ⊆ X, [C]α denotes the smallest set of abstract states representing C. Generating the complete concretization of an abstract state can be computationally intractable, especially in cases where the concrete state space is continuous and the abstract state space is discrete. In such situations, the concretization operation can be implemented as a generator that incrementally computes or samples elements from an abstract state’s concretization. Action abstraction functions can be defined similarly. The main form of an action abstraction function is to drop action arguments, which leads to predicate abstractions to eliminate all predicates that used the dropped arguments in the action’s description. This process can also model non-recursive temporal abstractions since a macro or a high-level action with multiple implementations [Marthi et al., 2007] can be modeled as an action whose arguments include the arguments of its possible implementations as well as an auxiliary argument for selecting the implementation. The concretization of an action abstraction function is the set of actions corresponding to different instantiations of the dropped action arguments. Concretization functions for action abstraction functions can also be implemented as generators. Formally, the concretization of each high-level action corresponds to a set of motion planning problems. We will use the notation a(x1 7→ o1 ) to denote a grounded action, whose x1 argument has been instantiated with the element o1 defined by the underlying MDP problem (Sec. 2). Let a(x̄, ȳ) be a concrete action where x̄ (ȳ) are ordered, typed discrete (continuous) arguments. The concretization of the instantiated abstract action γ([a](x̄ 7→ ō)) is the set of actions {a(x̄ 7→ ō, ȳ 7→ ō0 ) : ō0 is a tuple of elements with types and arity specified by y}. Predicates in action preconditions specify the constraints that these arguments need to satisfy. Common examples for continuous arguments include robot poses and motion plans; predicates about them may include collisionFree(tr), which is true exactly when the trajectory tr has no collisions as well as inspects (Eg. 1). Both state and action abstractions affect the transition function of the MDP. The actual transition probabilities of an abstract MDP depend on the policy being used and are therefore difficult to estimate accurately [Bai et al., 2016; Li et al., 2006; Singh et al., 1995]. In this paper, we will use an optimistic estimate of the true transition probabilities when expressing the abstract MDP. Such estimates are related to upper bounds for reachability used in prior approaches for reasoning in the presence of hierarchical abstractions (e.g., [Marthi et al., 2007; Ha and Haddawy, 1996]). Example 2. Consider the action presented in Eg. 1 Such actions are difficult to plan with however, since the tr argument is a high-dimensional real-valued vector. We can abstract away this argument to construct the following abstraction: Action: [inspect](Structure s) precond batterySufficient effect faultLocated(s) 0.8 ¬faultLocated(s) 0.2 ? {batteryLevel, batterySufficient} Dropping the tr argument from each predicate that results in abstract predicates of lower arities. The zero-arity batterySufficient becomes a Boolean state variable and batteryLevel becomes a numeric variable. The symbol ? indicates that this action affects the predicates batteryLevel and batterySufficient, but its effects on these predicates cannot be determined due to abstraction. An optimistic representation of this abstract action would state that it does not reduce batteryLevel and consequently, does not make batterySufficient false. This approach for abstraction is computationally better than a high-level representation that discretizes the continuous variables, as it does not require the addition of constants representing discrete pose or trajectory names to the vocabulary. This is desirable because the size of the state space would be exponential in the number of such discretized values that are included. 4 Overall Algorithmic Framework The ATM-MDP algorithm (Alg. 1) presents the main outer loop of our approach for computing a task and motion policy. It assumes the availability of an SSP solver that can generate tree-structured policies (starting at a given initial state) for Algorithm 1: Anytime Task and Motion MDP (ATM-MDP) 1 2 3 4 5 6 7 8 9 10 11 Data: domain D, problem P, motionPlanner M P , SSP Solver SSP Input: threshold t Result: Task and motion policy for hD, Pi policyTree ← SSP .getContingentPlan(P.f~0 , D, P); currentState ← P.f~0 ; proportionRefined ← 0.0; replanBias ← 0.5; partialTraj ← None; leafQueue ← estimatePathCosts(policyTree, partialTraj); while resource limit not reached and leafQueue.size() 6= 0 and proportionRefined < t do pathToRefine ← ancestors(leafQueue.pop()); while resource limit not reached and pathToRefine.length() 6= 0 do (success, partialPathTraj, failureNode, failureReason) ← refinePath(pathToRefine, partialTraj, policyTree, M P ); if not success and failureReason 6= None then policyTree ← SSP .replan(failureNode, failureReason); break; Algorithm 2: Subroutine refinePath 1 2 3 4 5 6 7 8 9 10 11 12 13 14 else 12 13 14 15 16 if not success then for node ∈ partialPathTraj do partialTraj[node] ← partialPathTraj[node] leafQueue ← estimatePathCosts(policyTree, partialTraj); proportionRefined ← computeProportionRefined(policyTree, partialTraj) solving an SSP, a motion planner for refinement of actions within the policy, and a module that determines the reason for infeasibility of a given motion planning problem. The overall algorithm operates on root-to-leaf paths in the SSP solution. The main computational problem is that the number of possible paths to refine grows exponentially with the time horizon. Waiting for a complete refinement would result in a lot of wasted time as most paths may correspond to outcomes that are unlikely to be encountered. Every path is associated with the probability p that an execution would follow that path; and a cost c of refining that pat. Ideally, we would like to compute an ordering of these paths so that at every time instant, we compute as many of the most likely paths as can be computed up to that time instant. Unfortunately, achieving this would be infeasible as it would require solving multiple knapsack problems. Instead, we order the paths by the ratio p/c for refinement (lines 4-15). Theorem 1. Let t be the time since the start of the algorithm at which the refinement of any root-to-leaf path is completed. If path costs are accurate and constant then the total probability of unrefined paths at time t is at most 1 − opt(t)/2, where opt(t) is the best possible refinement (in terms of the probability of outcomes covered) that could have been 15 16 Input: pathToRefine, partialTraj, policyTree, motionPlanner Output: success: indicator of successful refinement; partialPathTraj: refined path up to the first failure; failureNode, failureReason: failure information node ← head(pathToRefine); partialPathTraj ← None; for node ∈ pathToRefine do a ← policyTree[node]; if partialTraj = None then pose1 ← InitialPose; else pose1 ← extractPose(partialTraj[parent(node)]); while resource limit not reached and partialPathTraj[node] = None do pose2 = targetPoseGen(a); if GetMotionPlan(pose1 , pose2 ) succeeds then partialPathTraj[node] ← ComputePath; break; if partialPathTraj[node] = None then if Bernoulli(replanBias).sample() then return (False, partialPathTraj, node, FailureReason); else partialPathTraj.remove(node.parent()); return (False, partialPathTraj, node.parent(), None ) return (True, partialPathTraj, None, None); achieved in time t. The proof follows from the fact that the greedy algorithm achieves a 2-approximation for the knapsack problem. In practice, the true cost of refining a path cannot be determined prior to refinement. We therefore estimate the cost as the product of the parameter ranges covered by the generator of each action in the path. This results in lower bounds on the ratios p/c modulo constant factors, since a path could be refined before all the generator ranges are exhausted. In this way it doesn’t over-estimate the relative value of refining a path. As we show in the empirical section, the resulting algorithm yields the concave performance profiles desired of anytime algorithms. The while loop iterates over these paths while recomputing the priority queue keys after each iteration. Within each iteration, the algorithm tries to compute a full motion planning refinement of the path. First, the entire path (pathToRefine) is extracted from the leaf (line 6). The refinePath subroutine attempts to find a motion planning refinement (concretization) for pathToRefine. If it is unable to find a complete refinement for this path, it either (a) returns with a reason for failure along with a partial trajectory going up to the deepest node in the path for which it was able to compute a feasible motion plan, or (b) backtracks to return a partial trajectory that will result in a future refinePath call for a parent node of a node for which a motion planning refinement couldn’t be found. For partial trajectories under (a) (line 9), Alg. 1 calls an Figure 3: Left: Backtracking from node B invalidates the subtree rooted at A. In doing so, the work done in refining the node A’s left child, in gray, is lost. Right: In some cases, replanning from node B requires less work than re-refining the invalidated subtree. SSP solver after adjusting its initial state and domain definitions to include the FailureReason. The policy computed by the SSP solver is then merged with the existing policy and the while loop continues. For partial trajectories along case (b) (line 12), the path is added back to the queue with a partial, successful trajectory that results in backtracking. If refinePath is successful in computing a full refinement, the while loop continues with an updated priority queue. In each iteration of the while loop, we compute the total probability of refined paths – this probability gives us the likelihood of being able to successfully execute the policy in its current state of refinement. The refinePath subroutine (Alg. 2) attempts to compute a motion plan for each action in a given path. More precisely, it uses a generator to sample the possible concretizations for each action and test their feasibility. A feasible solution to any one of these motion planning problems is considered a feasible refinement of that abstract action. refinePath starts by selecting the first node in the path that needs to be refined in line 1 (Alg. 1 may result in situations where a prefix of a path has already been refined by a prior call to refinePath, due to line 14 in that algorithm). It then iterates over possible target poses for the selected action (lines 8 through 11). If a feasible motion plan is found, then the algorithm refines the next action in the path. If not, it stochastically chooses to either re-invoke the SSP by returning a FailureReason, or to backtrack by invalidating the current node’s path (line 15) by removing it from partialPathTraj and returning to follow lines 12-13 in Alg. 1. Though a backtracking search through all possible motion plans is required to guarantee the completeness of the algorithm, we find in practice that replanning with a new initial state and replacing the subtree rooted at a failed node with a new SSP solution is often more time efficient. This is because backtracking to an ancestor of the failed node invalidates the motion plans associated with all paths passing through that ancestor, often causing a large amount of previously completed work to be thrown out. This situation is illustrated in Figure 3. For this reason, we stochastically choose between backtracking and replanning and settle for probabilistic completeness of the search algorithm. Properties of the Algorithm Our algorithm solves the dual problems of synthesizing a strategy as well as computing motion plans while ensuring that the computed strategy has a feasible motion plan. It factors a hybrid planning problem into a succession of discrete SSPs and motion planning problems. The algorithm can compute solutions even when most discrete strategies have no feasible refinements. A few additional salient features of the algorithm are: • The representational mechanisms for encoding SSPs do not require discretization, thus providing scalability. • The SSP model dynamically improves as the motion planning problems reveal errors in the high-level model in terms of FailureReasons. • Prioritizing paths of relative value gives the algorithm a desirable anytime performance profile. This is further evaluated in the empirical section. 5 Empirical Evaluation We implemented the algorithms presented in Sec. 4 using an implementation of LAO* [Hansen and Zilberstein, 2001] as the SSP solver. We used the OpenRAVE [Diankov, 2010] system for modeling and visualizing test environments and its collision checkers and RRT [LaValle and Kuffner Jr, 2000] implementation for motion planning. Since there has been very little research on the task and motion planning problem in stochastic settings, there are no standardized benchmarks. We evaluated our algorithms by creating a hangar model in OpenRAVE for the aircraft inspection problem (Fig. 1). UAV actions in this domain include actions for moving to various components of the aircraft, such as the left and right wings, nacelles, fuselage, etc. Each such action could result in the UAV reaching the specified component or a region around the component. The inspection action for a component had the stochastic effect of localizing a fault’s location. The environment included docking stations that the UAV could reach and recharge on reserve battery power. Generators for concretizing all actions except the inspect action uniformly sampled poses in the target regions. Some of these poses naturally lead to shorter trajectories and therefore lower battery usage, depending on the UAV’s current pose. However, we used uniform-random samples to evaluate the performance of the algorithm while avoiding domain-specific enhancements. The generator for inspect(s) simulated an inspection pattern by randomly sampling five waypoint poses in an envelope around s and ordering them along the medial axis of the component. We used a linear function of the trajectories to keep track of battery usage at the low level and to report insufficient battery as the failureReason when infeasibility was detected. This function was used to provide failure reasons to the highlevel when the battery level was found to be insufficient. Fig. 4 shows the performance of our approach for producing execution strategies with motion planning refinements as a function of the time for which the algorithm is allowed to run. The red lines show the number of nodes in the high-level policy that have been evaluated, refined, and potentially replaced with updated policies that permit low-level plans. The blue lines show the probability with which the policy available at any time during the algorithm’s computation will be able to handle all possible execution-time outcomes. The different plots show how these relations change as we increase the level of uncertainty in the domain. The horizon is fixed at ten high-level decision epochs (each of which can involve ar- Figure 4: Performance of our anytime algorithm for solving MDPs using dynamic abstractions. The plots from left to right corresponds to formulation of the problem with 5%, 10%, and 20% rates of failure of the abstract actions described in the text. The blue lines (red lines) plot the probability mass of possible outcomes (proportion of nodes in the policy graph) that is covered by the partially computed policy as computation time (x axis, in seconds) evolves. bitrarily long movements) and the number of parts with faults is fixed at two. The policy generated by LAO* is unrolled into a tree prior to the start of refinement. The reported times include the time taken for unrolling. Our main result is that that our anytime algorithm balances complexity of computing task and motion policies with time very well and produces desirable concave anytime peformance profiles. Fig. 4 shows that when noise in the agent’s actuators and sensors is set at 5%, with 10% of computation our algorithm computes an executable policy that misses only the least likely 10% of the possible execution outcomes. This policy is computed in less than 10 seconds. In the worst case, with a 20% error rate in actuators and sensors (sensors used in practice are much more reliable), we miss only about 20% of the execution trajectories with 40% of the computation. 6 Other Related Work There has been a renewed interest in integrated task and motion planning algorithms. Most research in this direction has been focused on deterministic environments [Cambon et al., 2009; Plaku and Hager, 2010; Hertle et al., 2012; Kaelbling and Lozano-Pérez, 2011; Garrett et al., 2015; Dantam et al., 2016]. Kaelbling and Lozano-Pérez [2013] consider a partially observable formulation of the problem. Their approach utilizes regression modules on belief fluents to develop a regression-based solution algorithm. Şucan and Kavraki [2012] use an explicit multigraph to represent the plan or policy for which motion planning refinements are desired. Hadfield-Menell et al. [2015] address problems where the high-level formulation is deterministic and the low-level is determinized using most likely observations. In contrast, our approach employs abstraction to bridge MDP solvers and motion planners to solve problems where the high-level model is stochastic. In addition, the transitions in our MDP formulation depend on properties of the refined motion planning trajectories (e.g., battery usage). Principles of abstraction in MDPs have been well studied [Hostetler et al., 2014; Bai et al., 2016; Li et al., 2006; Singh et al., 1995]. However, these directions of work assume that the full, unabstracted MDP can be efficiently expressed as a discrete MDP. Marecki et al. [2006] consider continuous time MDPs with finite sets of states and actions. In contrast, our focus is on MDPs with high-dimensional, uncountable state and action spaces. Recent work on deep reinforcement learning (e.g., [Hausknecht and Stone, 2016; Mnih et al., 2015]) presents approaches for using deep neural networks in conjunction with reinforcement learning to solve MDPs with continuous state spaces. We believe that these approaches can be used in a complementary fashion with our proposed approach. They could be used to learn maneuvers spanning shorter-time horizons, while our approach could be used to efficiently abstract their representations and to use them as actions or macros in longer-horizon tasks. Efforts towards improved representation languages are orthogonal to our contributions [Fox and Long, 2002]. The fundamental computational complexity results indicating growth in complexity with increasing sizes of state spaces, branching factors, and time horizons remain true regardless of the solution approach taken. It is unlikely that a uniformly precise model, a simulator at the level of precision of individual atoms, or even circuit diagrams of every component used by the agent will help it solve the kind of complex tasks on which humans would appreciate assistance. On the other hand, not using any model at all would result in dangerous agents that would not be able to safely evaluate the possible outcomes of their actions. Our results show that these divides can be bridged using hierarchical modeling and solution approaches that simplify the representational requirements and offer computational advantages that could make autonomous robots feasible in the real world. 7 Conclusions Our experiments showed that starting with an imprecise model, refining it based on the information required to evaluate different courses of action is an efficient approach for the synthesis of high-level policies that are consistent with constraints that may be imposed by aspects of the model that are more abstract or imprecise. While full models of realistic problems can overwhelm SDM solvers due to the uncountable branching factor and long time horizons, our hierarchical approach allows us to use SDM solvers while addressing more realistic problems involving physical agents. Acknowledgements This material is based upon work supported by the Defense Advanced Research Projects Agency (DARPA) and Space and Naval Warfare Systems Center Pacific (SSC Pacific) under Contract No. N66001-16-C-4050. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the DARPA or SSC Pacific. References Aijun Bai, Siddharth Srivastava, and Stuart J Russell. Markovian state and action abstractions for MDPs via hierarchical MCTS. In Proc. IJCAI, 2016. Dimitri P Bertsekas and John N Tsitsiklis. An analysis of stochastic shortest path problems. Mathematics of Operations Research, 16(3):580–595, 1991. Stephane Cambon, Rachid Alami, and Fabien Gravot. A hybrid approach to intricate motion, manipulation and task planning. IJRR, 28:104–126, 2009. Neil T Dantam, Zachary K Kingston, Swarat Chaudhuri, and Lydia E Kavraki. Incremental task and motion planning: A constraint-based approach. In Proc. RSS, 2016. Rosen Diankov. Automated Construction of Robotic Manipulation Programs. PhD thesis, Carnegie Mellon University, 2010. Esra Erdem, Kadir Haspalamutgil, Can Palaz, Volkan Patoglu, and Tansel Uras. Combining high-level causal reasoning with low-level geometric reasoning and motion planning for robotic manipulation. In Proc. ICRA, 2011. Maria Fox and Derek Long. PDDL+: Modeling continuous time dependent effects. In Proceedings of the 3rd International NASA Workshop on Planning and Scheduling for Space, 2002. Caelan Reed Garrett, Tomás Lozano-Pérez, and Leslie Pack Kaelbling. FFrob: An efficient heuristic for task and motion planning. In Proc. WAFR. 2015. Vu Ha and Peter Haddawy. Theoretical foundations for abstraction-based probabilistic planning. In Proc. UAI, 1996. Dylan Hadfield-Menell, Edward Groshev, Rohan Chitnis, and Pieter Abbeel. Modular task and motion planning in belief space. In Proc. IROS, 2015. Eric A Hansen and Shlomo Zilberstein. LAO∗ : A heuristic search algorithm that finds solutions with loops. Artificial Intelligence, 129(1-2):35–62, 2001. Matthew Hausknecht and Peter Stone. Deep reinforcement learning in parameterized action space. In Proc. ICLR, 2016. Malte Helmert. Concise finite-domain representations for pddl planning tasks. Artificial Intelligence, 173(5):503 – 535, 2009. Andreas Hertle, Christian Dornhege, Thomas Keller, and Bernhard Nebel. Planning with semantic attachments: An object-oriented view. In Proc. ECAI, 2012. Jesse Hostetler, Alan Fern, and Tom Dietterich. State aggregation in monte carlo tree search. In Proc. AAAI, 2014. Leslie Pack Kaelbling and Tomás Lozano-Pérez. Hierarchical task and motion planning in the now. In Proc. ICRA, 2011. Leslie Pack Kaelbling and Tomás Lozano-Pérez. Integrated task and motion planning in belief space. The International Journal of Robotics Research, 32(9-10):1194–1227, 2013. A Kolobov, Mausam, DS Weld, and H Geffner. Heuristic search for generalized stochastic shortest path mdps. In Proceedings of the International Conference on Automated Planning and Scheduling (ICAPS), 2011. S.M. LaValle and J.J. Kuffner Jr. Rapidly-exploring random trees: Progress and prospects. 2000. Lihong Li, Thomas J Walsh, and Michael L Littman. Towards a unified theory of state abstraction for mdps. In ISAIM, 2006. Janusz Marecki, Zvi Topol, Milind Tambe, et al. A fast analytical algorithm for mdps with continuous state spaces. In AAMAS-06 Proceedings of 8th Workshop on Game Theoretic and Decision Theoretic Agents, 2006. Bhaskara Marthi, Stuart J Russell, and Jason Wolfe. Angelic semantics for high-level actions. In Proc. ICAPS, 2007. Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A Rusu, Joel Veness, Marc G Bellemare, Alex Graves, Martin Riedmiller, Andreas K Fidjeland, Georg Ostrovski, et al. Human-level control through deep reinforcement learning. Nature, 518(7540):529–533, 2015. E. Plaku and G. D. Hager. Sampling-based motion and symbolic action planning with geometric and differential constraints. In Proc. ICRA, 2010. Stuart Russell, Daniel Dewey, and Max Tegmark. Research priorities for robust and beneficial artificial intelligence. AI Magazine, 36(4):105–114, 2015. Scott Sanner and Craig Boutilier. Practical solution techniques for first-order MDPs. Artificial Intelligence, 173(56):748–788, 2009. Scott Sanner. Relational dynamic influence diagram language (rddl): Language description. http://users.cecs. anu.edu.au/˜ssanner/IPPC_2011/RDDL.pdf, 2010. Satinder P Singh, Tommi Jaakkola, and Michael I Jordan. Reinforcement learning with soft state aggregation. In Proc. NIPS, pages 361–368, 1995. Siddharth Srivastava, Eugene Fang, Lorenzo Riano, Rohan Chitnis, Stuart Russell, and Pieter Abbeel. A modular approach to task and motion planning with an extensible planner-independent interface layer. In Proc. ICRA, 2014. Ioan A Şucan and Lydia E Kavraki. Accounting for uncertainty in simultaneous task and motion planning using task motion multigraphs. In Proc. ICRA, 2012. Håkan LS Younes and Michael L Littman. PPDDL 1.0: An extension to pddl for expressing planning domains with probabilistic effects. Technical Report CMU-CS-04-162, 2004.
2cs.AI
On the Boundary between Decidability and Undecidability of Asynchronous Session Subtyping arXiv:1703.00659v3 [cs.PL] 12 Feb 2018 Mario Bravetti University of Bologna, Department of Computer Science and Engineering / INRIA FOCUS Marco Carbone Department of Computer Science, IT University of Copenhagen Gianluigi Zavattaro University of Bologna, Department of Computer Science and Engineering / INRIA FOCUS Abstract Session types are behavioural types for guaranteeing that concurrent programs are free from basic communication errors. Recent work has shown that asynchronous session subtyping is undecidable. However, since session types have become popular in mainstream programming languages in which asynchronous communication is the norm rather than the exception, it is crucial to detect significant decidable subtyping relations. Previous work considered extremely restrictive fragments in which limitations were imposed to the size of communication buffer (at most 1) or to the possibility to express multiple choices (disallowing them completely in one of the compared types). In this work, for the first time, we show decidability of a fragment that does not impose any limitation on communication buffers and allows both the compared types to include multiple choices for either input or output, thus yielding a fragment which is more significant from an applicability viewpoint. In general, we study the boundary between decidability and undecidability by considering several fragments of subtyping. Notably, we show that subtyping remains undecidable even if restricted to not using output covariance and input contravariance. Keywords: Session Types, Asynchronous Subtyping, Undecidability Preprint submitted to Journal of LATEX Templates February 13, 2018 1. Introduction Session types [1, 2] are types for controlling the communication behaviour of processes over channels. In a very simple but effective way, they express the pattern of sends and receives that a process must perform. Since they can guarantee freedom from some basic programming errors, session types are becoming popular with many main stream language implementations, e.g., Haskell [3], Go [4] or Rust [5]. As an example, consider a client that invokes service operations by following the protocol expressed by the session type ⊕{op1 : &{resp1 : end}, op2 : &{resp2 : end}} indicating that the client decides whether to call operation op1 or op2 and then waits for receiving the corresponding response (resp1 or resp2, respectively). For the sake of simplicity we consider session types where (the type of) communicated data is abstracted away. The symmetric behaviour of the service is represented by the complementary (so-called dual) session type &{op1 : ⊕{resp1 : end}, op2 : ⊕{resp2 : end}} indicating that the server receives the call to operation op1 or op2 and then sends the corresponding response (resp1 or resp2, respectively). We call output selection the construct ⊕{l1 : T1 , . . . , ln : Tn }. It is used to denote a point of choice in the communication protocol: each choice has a label li and a continuation Ti . In communication protocols, when there is a point of choice, there is usually a peer that internally takes the decision and the other involved peers receive communication of the selected branch. Output selection is used to describe the behaviour of the peer that takes the decision: indeed, in our example it is the client that decides which operation to call. Symmetrically, we call input branching the construct &{l1 : T1 , . . . , ln : Tn }. It is used to describe the behaviour of a peer that receives communication of the selection done by some other peers. In the example, indeed, the service receives from the 2 client the decision about the selected operation.1 When composing systems whose interaction protocols have been specified with session types, it is significant to consider variants of their specifications that still preserve safety properties. In the above example, the client can be safely replaced by another one with session type ⊕{op1 : &{resp1 : end}} indicating that it can call only one specific service operation. But also the service can be safely replaced by another one accepting an additional operation: &{op1 : ⊕{resp1 : end}, op2 : ⊕{resp2 : end}, op3 : ⊕{resp3 : end}} Subtyping relations have been formally defined for session types, e.g., by Gay and Hole [7] and Chen et al. [8], in order to precisely capture this safe replacement notion. For instance, a subtyping relation like that of Gay and Hole [7] (denoted by ≤s ), where processes are assumed to simply communicate via synchronous channels2 , would imply, for the client, that: ⊕{op1 : &{resp1 : end}} ≤s ⊕ {op1 : &{resp1 : end}, op2 : &{resp2 : end}} according to the so-called output covariant property, while, for the server &{op1 : ⊕{resp1 : end}, op2 : ⊕{resp2 : end}, op3 : ⊕{resp3 : end}} ≤s &{op1 : ⊕{resp1 : end}, op2 : ⊕{resp2 : end}} according to the so-called input contravariant property. When processes communicate via asynchronous channels, a more generous notion of subtyping ≤ like that of Chen et al. [8] can be considered. E.g., a process using an asynchronous channel to call a service operation, that receives the 1 In session type terminology [1, 6], the output selection/input branching constructs are usually simply called selection/branching; we call them output selection/input branching because we consider a simplified syntax for session types in which there is no specific separate construct for sending one output/receiving one input. Anyway, such output/input types can be seen as an output selection/input branching with only one choice. 2 Here, we focus on the so-called process-oriented subtyping, as opposed to channel-based subtyping [9]. 3 corresponding response and then sends a huge amount of data (requiring heavy computation), could be safely replaced by a more efficient one that computes and sends all the data immediately without waiting for the response: ⊕{op : ⊕{huge data : &{resp : end}}} ≤ ⊕ {op : &{resp : ⊕{huge data : end}}} Intuitively, this form of asynchronous subtyping reflects the possibility to anticipate the output of the huge data w.r.t. to the input of the response because such data are stored in a buffer waiting for their reader to consume them. 1.1. Previous Results Recently, Bravetti et al. [10] and Lange and Yoshida [11] have independently shown that asynchronous subtyping (the subtyping relation with output anticipation) is undecidable. In particular, in Bravetti et al., this is done by showing undecidability of the much simpler single-choice relation << that is defined as a restriction of asynchronous subtyping ≤ where related T << S types are such that: all output selections in T have a single choice (output selections are covariant, thus S is allowed have output selections with multiple choices) and all input branchings in S have a single choice (input branchings are contravariant, thus T is allowed to have input branchings with multiple choices). Moreover, those papers prove decidability for very small fragments of the asynchronous subtyping relation: the most significant one basically requires one of the two compared types to be such that all its input branchings and output selections have a single choice. In particular, in Bravetti et al. this is done by showing decidability of the two relations <<sin (single-choice input <<) and <<sout (single-choice output <<), both defined as further restrictions of << where for related T <<sin S (T <<sout S, resp.) types we additionally require that: all input branchings (output selections, resp.) in T and S have a single choice. Other decidable fragments, considered by Lange and Yoshida, pose limitations on the communication behaviour that causes communication buffers to store at most one message, or they are used in half duplex modality (messages can be sent in one direction, only if the buffer for the opposite direction has been emptied). Al4 branching/selection structure buffer 2≤= < ≤[ DC ≤tin O h 6 ≤tout O ≤tin,tout J T ≤bound O undecidable decidable ≤sinV ≤H sout .. . O ≤O 2 ≤sin,tout b ≤tin,sout < ≤sin,sout ≤O 1 ≤0 = ≤s ≤s synchronous subtyping [7] ≤ asynchronous subtyping [8] / set inclusion Figure 1: Lattice of the asynchronous subtyping relations considered in this paper. though asynchronous subtyping is undecidable, it is important to reason about more significant cases for which such a relation is decidable. This because session types have become popular in mainstream programming languages, and, in such cases, asynchronous communications are the norm rather than the exception. 1.2. Contributed Results The aim of this paper is to detect significant decidable fragments of asynchronous session subtyping and to establish a more precise boundary between decidability and undecidability. In particular, concerning decidability, as discussed above, the few decidable fragments of asynchronous subtyping known so far are extremely restrictive: our relations <<sin , <<sout [10] and the decidable 5 relations considered by Lange and Yoshida [11]. Here, for the first time, we show decidability of a fragment that does not impose any limitation on communication buffers and allows both the subtype and the supertype to include multiple choices (either for input branchings or for output selections), thus opening the possibility for some practical applicability in restricted specific scenarios (e.g. session types for clients/services in web-service systems, see below). More precisely, while <<sin (<<sout , resp.), being it defined as a restriction of <<, admits multiple choices only for output selections in the supertype (input branchings in the subtype, resp.), here we consider and show decidability for a much larger relation, we denote by ≤sin (≤sout , resp.). Such a relation is defined as the restriction of the whole ≤ relation (instead of the << relation), where, in related types, all input branchings (output selections, resp.) must have a single choice. Therefore, differently from <<sin (<<sout , resp.), in ≤sin (≤sout , resp.) both the subtype and the supertype can include multiple choices for output selections (for input branchings, resp.). The combination of non restricted buffers and presence of multiple choices on both related types requires a totally new approach for guaranteeing the termination of the subtyping algorithm (both for the termination condition itself and for the related decidability proof). For instance, if multiple choices are admitted for input branchings, the termination condition has to deal with complex recurrent patterns to be checked on the leafs of trees representing input branchings (with multiple choices), instead of detecting simple repetitions on strings representing sequences of single-choice inputs (as in previous work [10, 11]). Concerning undecidability, all previous results [10, 11] exploit the capability of asynchronous subtyping of matching input branchings/output selections by means of covariance/contravariance. We here show that asynchronous subtyping remains undecidable even if we restrict it by disallowing this feature. As asynchronous subtyping is based on the combination of output covariance/input contravariance and output anticipation deriving from asynchronous communication, our result means that (provided that the syntax of types is not constrained) the source of undecidability is to be precisely localized into the output anticipation 6 capability. The undecidability proof has a structure similar to that of Bravetti et al. [10], where the termination problem for queue machines, a well-known Turingequivalent formalism, is encoded into asynchronous session subtyping. However, differently from Bravetti et al. [10], not having covariance/contravariance makes it impossible to encode queue machines deterministically. As we will see, the need to cope with nondeterminism makes it necessary to restrict the class of encodable queue machines to a new ad-hoc fragment that we introduce in this paper and we prove being Turing-equivalent: single consuming queue machines. Moreover a much more complex encoding, that uses nondeterminism, must be adopted. In general, the contribution of this work is to analyze restrictions of asynchronous subtyping and classifying them into decidable and undecidable fragments. More precisely, as detailed in the following, we focus on two kinds of restrictions of asynchronous subtyping: limitations to the branching/selection structure and to the communication buffer, giving rise to the numerous relations shown in the lefthand part and righthand part of Figure 1, respectively (see Section 2 for formal definitions of all the relations). The relations are depicted as a lattice according to their inclusion as sets of pairs. Notice that decidability/undecidability is not logically related to set inclusion (e.g. the emptyset and the set of all pairs are both decidable and are the bottom and the top of the lattice). Concerning asynchronous subtyping ≤ itself, we consider the orphan message free notion of subtyping introduced in Chen et al. [8]: it is commonly recognized that a convenient notion of asynchronous subtyping should prevent existence of messages that remain “orphan”, i.e. that are never consumed from the communication buffer. Operationally, this implies that inputs in the supertype cannot be indefinitely delayed by output anticipation: eventually such inputs must be performed by the subtype so to correspondingly consume messages from the buffer. As a side result, in this paper we introduce a new, elegant, way of defining orphan message free asynchronous subtyping. The new definition is based on just adding a constraint about closure under duality to the standard (non 7 orphan message free) coinductive definition of asynchronous subtyping [12]. We thus use such a novel approach based on dual closeness to give a concise definition of asynchronous subtyping: we call ≤DC the obtained relation. We then show ≤DC (also included in Figure 1) to be equal to orphan message free subtyping ≤ of Chen et al. [8]. We also show that the most significant decidable and undecidable fragments of ≤, i.e. the ≤sin ∪ ≤sout relation and subtyping without covariance/contravariance, are dual closed subtyping relations according to our new definition. Limitations to the branching/selection structure. We limit the asynchronous subtyping ≤ capability of managing input branchings/output selections, giving rise to the subtyping relations shown in the lefthand part of Figure 1, as follows: • requiring that in both the subtype and the supertype output selections (input branchings, resp.) have a single choice: in this case the sout (sin, resp.) subscript is added to ≤; • requiring that each output selection (input branching, resp.) performed by the subtype is matched by an output selection (input branching, resp.) performed by the supertype with the exactly the same total set of labels, i.e. output covariance (input contravariance, resp.) is not admitted: in this case the tout (tin, resp.) subscript is added to ≤. We now summarize our decidability/undecidability results for these relations. • Decidability of asynchronous subtyping for single-in types (≤sin ) or singleout types (≤sout ). We consider the class of single-in (single-out, resp.) session types, i.e. types where all output selections (input branchings, resp.) have a single choice. We present and prove correct an algorithm for deciding whether two single-out (resp. single-in, by exploiting the closure under duality property) types are in the subtyping relation. From a modeling viewpoint, assuming binary sessions to happen between a single-in 8 and a single-out party, this entails that internal decisions are taken by the single-in party, while the single-out one passively accepts them. This kind of behaviour can occur in, e.g., web-service systems where a client internally chooses a request-response operation [13] and then waits for a corresponding (non branching) input, while the server accepts invocations on several operations but then it reacts by answering on a related response channel (independently of the actual returned data/error); see the examples at the beginning of this Introduction section. Our algorithms for subtyping of single-out/single-in types could thus be used in typing systems for server/client code. With minor variants to the machinery introduced to show decidability of ≤sin and ≤sout , we also show that ≤sin,tout , ≤tin,sout and ≤sin,sout are decidable. • Undecidability of Asynchronous Subtyping without Output Covariance and Input Contravariance (≤tin,tout ). As discussed above, subtyping for session types makes use of output covariance and input contravariance: an output ⊕{li : Ti }i∈I is a subtype of an output with more labels ⊕{lj : Tj }j∈J , for I ⊂ J; and an input &{li : Ti }i∈I is a subtype of an input with less labels &{lj : Tj }j∈J , for J ⊂ I. Existing results on the undecidability of asynchronous subtyping exploit its capability of relating types with a different number of branches. We consider a restricted form of subtyping, the ≤tin,tout relation, which disallows this feature, i.e. which does not use output covariance and input contravariance. We show that, also with such a restriction, subtyping remains undecidable by encoding the termination problem for single consuming queue machines, a Turingequivalent formalism that (as already explained) we introduce on purpose, into ≤tin,tout . The same encoding we use for ≤tin,tout shows also undecidability of ≤tin , ≤tout and ≤ (thus also providing an alternative proof for the undecidability of ≤ with respect to those by Bravetti et al. [10] and Lange and Yoshida [11]). Limitations to the communication buffer. We limit the communication 9 buffer capability, giving rise to the subtyping relations shown in the righthand part of Figure 1, by restricting the capability of ≤ to anticipate outputs: this is equivalent to putting an upper limit to communication buffers between two parties, a common fact in practice. In this context our decidability/undecidability results are the following ones. • Decidability of k-bounded Subtyping (≤k ), with k ≥ 0. In k-bounded asynchronous subtyping we restrict the capability of ≤ to anticipate outputs: they can only be anticipated w.r.t. a number of inputs that is less or equal to k. We give and prove correct an algorithm for deciding whether any two session types are in a k-bounded subtyping relation. Notice that, in the case k = 0 we obtain synchronous subtyping ≤s [7]. Moreover, if we consider k = 1 we have a notion of subtyping along the lines of that, we already mentioned, obtained by Lange and Yoshida [11] imposing restrictions on the communication behaviour. • Undecidability of Bounded Asynchronous Subtyping (≤bound ). We say that a pair of session types is in bounded asynchronous subtyping relation if there exists a k such that such pair is in k-bounded subtyping relation. Bounded asynchronous subtyping relates types that do not unboundedly put messages in a buffer. For instance, the types µt. ⊕ {huge data : ⊕{huge data : &{ack : t}}} µt.&{ack : ⊕{huge data : t}} are related by asynchronous subtyping but not by bounded asynchronous subtyping: the augmented data production frequency of the subtype requires to store an unbounded amount of huge data. Since in practice buffers are bounded, this could have been an acceptable candidate notion for replacing standard asynchronous subtyping, however we prove that it is undecidable as well. We do this by showing undecidability of a property for queue machines: bounded non termination. 10 Outline. In Section 2 we present session types and definition of asynchronous subtyping ≤, the novel dual closed reformulation ≤DC , the fragments of ≤ shown in Figure 1 and a discussion about their properties. Section 3 presents all decidability results, notably for k-bounded subtyping (≤k ) and for subtyping over single-in types (≤sin ) and over single-out types (≤sout ). Section 4 presents all undecidability results, notably for bounded subtyping (≤bound ) and for subtyping without output covariance and input contravariance (≤tin,tout ). Section 5 discusses related work and Section 6 presents concluding remarks. Detailed proofs of theorems, lemmas and propositions can be found in the Appendix. We chose to put proof technicalities, that often include additional definitions and intermediate results, in the Appendix so not to disrupt the paper prose. 2. Session Types and Asynchronous Subtyping We begin by formally introducing the various ingredients needed for our technical development. We start with the formal syntax of binary session types. Similarly to Chen et al. [8] we do not use a dedicated construct for sending an output/receiving an input, we instead represent outputs and inputs directly inside choices. More precisely, we consider output selection ⊕{li : Ti }i∈I , expressing an internal choice among outputs, and input branching &{li : Ti }i∈I , expressing an external choice among inputs. Each possible choice is labeled by a label li , taken from a global set of labels L, followed by a session continuation Ti . Labels in a branching/selection are assumed to be pairwise distinct. Definition 2.1 (Session Types). Given a set of labels L, ranged over by l, the syntax of binary session types is given by the following grammar: T ::= ⊕{li : Ti }i∈I | &{li : Ti }i∈I | µt.T | t | end A session type is single-out if, for all of its subterms ⊕{li : Ti }i∈I , |I| = 1. Similarly, a session type is single-in if, for all of its subterms &{li : Ti }i∈I , |I| = 1. 11 In the sequel, we leave implicit the index set i ∈ I in input branchings and output selections when it is already clear from the denotation of the types. Note also that we abstract from the type of the message that could be sent over the channel, since this is orthogonal to our theory. Types µt.T and t denote standard tail recursion for recursive types. We assume recursion to be guarded: in µt.T , the recursion variable t occurs within the scope of an output or an input type. In the following, we will consider closed terms only, i.e., types with all recursion variables t occurring under the scope of a corresponding definition µt.T . Type end denotes the type of a channel that can no longer be used. In our development, it is crucial to count the number of times we need to unfold a recursion µt.T . This is formalised by the following function: Definition 2.2 (n-unfolding). unfold0 (T ) = T unfold1 (⊕{li : Ti }i∈I ) = ⊕{li : unfold1 (Ti )}i∈I unfold1 (µt.T ) = T {µt.T /t} unfold1 (&{li : Ti }i∈I ) = &{li : unfold1 (Ti )}i∈I unfold1 (end) = end unfoldn (T ) = unfold1 (unfoldn−1 (T )) The definition of asynchronous subtyping uses the notion of input context, a type context consisting of a sequence of inputs preceding holes where types can be placed: Definition 2.3 (Input Context). An input context A is a session type with multiple holes defined by the syntax: A ::= [ ]n | &{li : Ai }i∈I . An input context A is well-formed whenever all its holes [ ] , with n ∈ N+ , are n consistently enumerated, i.e. there exists m ≥ 1 such that A includes one and only one [ ]n for each n ≤ m. Given a well-formed input context A with holes indexed over {1, . . . , m} and types T1 ,. . . , Tm , we use A[Tk ]k∈{1,...,m} to denote the type obtained by filling each hole k in A with the corresponding term Tk . From now on, whenever using input contexts we will assume them to be well-formed, unless otherwise specified. For example, consider the input context A = &{l1 : []1 , l2 : []2 } 12 we have:  A[⊕{l : Ti }]i∈{1,2} = & l1 : ⊕{l : T1 }, l2 : ⊕{l : T2 } We start by considering the standard notion of asynchronous subtyping ≤ given by Chen et al. [8]. We choose it because of its orphan message free property that is commonly recognized to be convenient: only subtypes are allowed that do not cause incoming messages to remain “orphan” (because they are never consumed from the communication buffer). In the definition of asynchronous subtyping given by Chen et al., orphan message freedom causes a specific dedicated constraint to be included (which is, e.g., instead not present in the asynchronous subtyping definition by Mostrous and Yoshida [12]). We now formally present the asynchronous subtyping relation ≤, rephrased w.r.t. that of Chen et al. [8] in a technical format that is convenient for showing our results, which follows a coinductive simulation-like definition. Definition 2.4 (Asynchronous Subtyping, ≤). R is an asynchronous subtyping relation if (T, S) ∈ R implies that: 1. if T = end then ∃n ≥ 0 such that unfoldn (S) = end; 2. if T = ⊕{li : Ti }i∈I then ∃n ≥ 0, A such that • unfoldn (S) = A[⊕{lj : Sk j }j∈Jk ]k∈{1,...,m} , • ∀k ∈ {1, . . . , m}. I ⊆ Jk , • ∀i ∈ I, (Ti , A[Ski ]k∈{1,...,m} ) ∈ R and • if A 6= [ ]1 then ∀i ∈ I. & ∈ Ti (no orphan message constraint); 3. if T = &{li : Ti }i∈I then ∃n ≥ 0 such that unfoldn (S) = &{lj : Sj }j∈J , J ⊆ I and ∀j ∈ J.(Tj , Sj ) ∈ R; 4. if T = µt.T ′ then (T ′ {T /t}, S) ∈ R. where with “& ∈ Ti ” we mean that Ti contains at least an input branching. T is an asynchronous subtype of S, written T ≤S, if there is an asynchronous subtyping relation R such that (T, S) ∈ R. 13 Intuitively, two types T and S are related by ≤, whenever S is able to simulate T , but with a few twists: type S is allowed to anticipate outputs nested in its syntax tree (asynchrony); and, output and input types enjoy covariance and contravariance, respectively. Moreover, the above definition includes the no orphan message constraint [8], namely: we allow the supertype inputs to be delayed only if also the subtype contains some input. A synchronous subtyping relation ≤s like that of Gay and Hole [7] is obtained by requiring that, in item 2. of the above Definition 2.4, it always holds A = [ ]1 . Example 2.5. Consider T = µt. ⊕ {l : &{l1 : t, l2 : t}} and S = µt.&{l1 : &{l2 : ⊕{l : t}}}. We have T ≤ S because the following is an asynchronous subtyping relation: { (T, S) , (⊕{l : &{l1 : T, l2 : T }}, S) , (&{l1 : T, l2 : T }, &{l1 : &{l2 : S}}) , (T, &{l2 : S}) , (⊕{l : &{l1 : T, l2 : T }}, &{l2 : S}) , (&{l1 : T, l2 : T }, &{l2 : &{l1 : &{l2 : S}}}), (T, &{l1 : &{l2 : S}}) , (⊕{l : &{l1 : T, l2 : T }}, &{l1 : &{l2 : S}}) , (&{l1 : T, l2 : T }, &{l1 : &{l2 : &{l1 : &{l2 : S}}}}) , (T, &{l2 : &{l1 : &{l2 : S}}}) , . . . } Note that the relation contains infinitely many pairs that differ in the sequence of inputs, alternatively labeled with l1 and l2 , that are accumulated at the beginning of the r.h.s. type. We now introduce an alternative way of defining orphan message free asynchronous subtyping, which is more elegant/concise: it obtains the orphan message freedom property by requiring closure under duality of the type relation being defined instead of making use of an explicit orphan message free constraint as in Definition 2.4. For session types, we define the usual notion of duality: given a session type T , its dual T is defined as: ⊕{li : Ti }i∈I = &{li : T i }i∈I , &{li : Ti }i∈I = ⊕{li : T i }i∈I , end = end, t = t, and µt.T = µt.T . In the sequel, we say that a relation R on session types is dual closed if (S, T ) ∈ R implies (T , S) ∈ R. 14 Definition 2.6 (Asynchronous Dual Closed Subtyping, ≤DC ). R is an asynchronous dual closed subtyping relation whenever it is dual closed and (T, S) ∈ R implies 1., 3., and 4. of Definition 2.4, plus a modified version of 2. where the last constraint (the no orphan message constraint) is removed. T is an asynchronous dual closed subtype of S, written T ≤DC S, if there is an asynchronous dual closed subtyping relation R such that (T, S) ∈ R. We observe that our definition is formally different from the ones found in literature. In particular, with respect to that by Mostrous and Yoshida [12], it additionally requires the subtyping relation to be dual closed. Below, we state that the dual closeness requirement is equivalent to imposing the orphan message free constraint, i.e. the last item of condition 2 in Definition 2.4 (both guarantee orphan-message freedom): Theorem 2.7. Given two session types T and S, we have T ≤ S if and only if T ≤DC S. 2.1. Subtyping Relation Restrictions As already discussed in the Introduction, we focus on two kinds of restrictions of asynchronous subtyping: limitations to the branching/selection structure and to the communication buffer, giving rise to the numerous relations shown in the lefthand part and righthand part of Figure 1, respectively. We now define fragments of ≤ obtained by posing limitations to the branching/selection structure. Definition 2.8. Restrictions of the asynchronous subtyping relation are denoted by adding subscripts to the ≤ notation, with the following meaning: • whenever we add subscript sout (sin, resp.) we additionally require in Definition 2.4 both T and S to be single-out (single-in, resp.), • whenever we add subscript tout (tin, resp.) we additionally require in Definition 2.4 I = Jk in point 2. (I = J in point 3., resp.). 15 The latter means that each output selection (input branching, resp.) performed by the subtype is matched by an output selection (input branching, resp.) performed by the supertype with the exactly the same total set of labels, i.e. output covariance (input contravariance, resp.) is not admitted. Notice that, while it holds that ≤ = ≤DC , not all fragments of ≤ are asynchronous dual closed subtyping relations. For instance this does not hold for ≤sin , ≤sout , ≤tin and ≤tout , which perform a limitation, but not its “dual” one. It holds, instead, for the following two relations that we will show to be in the boundary between decidability and undecidability. Proposition 2.9. The ≤tin,tout relation and the ≤sin ∪≤sout relation are asynchronous dual closed subtyping relations. Dual closeness of the ≤sin ∪ ≤sout relation is a direct consequence of the fact that T ≤sin S if and only if S ≤sout T , which obviously derives from dual closeness of ≤ and from the dual of a single-in type being a single-out type and vice-versa. This fact, together with the following proposition, will be used to infer decidability of ≤sin and ≤sin,tout relations from that of ≤sout and ≤tin,sout , respectively. Proposition 2.10. The ≤sin,tout and ≤tin,sout relations are such that: T ≤sin,tout S if and only if S ≤tin,sout T . We now consider variants of ≤ obtained by posing limitations to the communication buffer. We can define a variant decidable relation by putting an upper-bound to the messages that can be buffered. Technically speaking, when an output in the r.h.s. is anticipated during the subtyping simulation, we impose a bound to the number of inputs that are in front of such output. We say that an input context A is k-bounded if the maximal number of nested inputs in A is less or equal to k. 16 Definition 2.11 (k-bounded Asynchronous Subtyping, with k ≥ 0). The k-bounded asynchronous subtyping ≤k is defined as in Definition 2.4, with the only difference that the input context A in item 2. is required to be k-bounded. Notice that the case k = 0 yields synchronous subtyping: since A = [ ]1 is the only 0-bounded input context, we obviously have ≤0 = ≤s . Lange and Yoshida [11] show the decidability of asynchronous subtyping for a subclass of session types, called alternating, that in our setting corresponds to impose that every output in a subtype is immediately followed by an input, while every input in a supertype is followed by an output. For instance, this property is satisfied by the following pair of types: T = µt. ⊕ {l2 : &{l1 : t}} S = µt.&{l1 : ⊕{l2 : t}} It is not difficult to see that T ≤1 S. The key point of the proof of decidability of asynchronous subtyping for alternating session types by Lange and Yoshida is the observation that if T and S are alternating, then T ≤S if and only if T ≤1 S. As we explained in the Introduction, we also consider the more generic notion of bounded asynchronous subtyping. This relation is in our opinion of interest because it reflects real cases in which it is possible to assume bounded buffers, without an a priory knowledge of the actual bound. Definition 2.12 (Bounded Asynchronous Subtyping, ≤bound ). We say that T is a bounded asynchronous subtype of S, written T ≤boundS, if there exists k such that T ≤k S. 3. Decidability Results We now present decidability results for k-bounded asynchronous subtyping and asynchronous subtyping for single-out/single-in session types. 3.1. A Subtyping Procedure We start by giving a procedure (an algorithm that does not necessarily terminate) for the general subtyping relation, which is known to be undecidable [10, 11]. Such a procedure is inspired by the one proposed by Mostrous et 17 al. [14] for asynchronous subtyping in multiparty session types. In order to do so, we introduce two functions on the syntax of types. The function outDepth calculates how many unfolding are necessary for bringing an output outside a recursion. If that is not possible, the function is undefined (denoted by ⊥). Definition 3.1 (outDepth). The partial function outDepth(T ) is inductively defined as follows: outDepth(⊕{li : Ti }i∈I ) = 0 outDepth(&{li : Ti }i∈I ) = max{outDepth(Ti ) | i ∈ I} outDepth(µt.T ) = 1+outDepth(T {end/t}) outDepth(end) =⊥ where max{outDepth(Ti ) | i ∈ I} =⊥, if outDepth(Ti ) =⊥ for some i ∈ I; similarly, 1+ ⊥=⊥. As an example of application of outDepth consider, for any T1 and T2 , outDepth(⊕{l1 : T1 , l2 : T2 }) = 0. On the other hand, consider the type o n   Tex = & l1 : µt. ⊕ l2 : T1 , l3 : µt.& l4 : µt′ . ⊕ {l5 : T2 } : clearly,  outDepth Tex = 2. We then define outUnf(), a variant of the unfolding function given in Definition 2.2, which unfolds only where it is necessary, in order to reach an output: Definition 3.2 (outUnf ). The output unfolding outUnf(T ) is a partial function defined whenever outDepth(T ) is defined. Given outDepth(T ) = n, outUnf(T ) is computed using the same inductive rules of unfoldn (T ), excluding the rule for ⊕{li : Ti }i∈I that, instead of recursively unfolding Ti , returns the same term ⊕{li : Ti }i∈I .  The function above differs from unfoldn : for example, unfold2 Tex would unfold  twice both subterms µt. ⊕{l2 : T1 } and µt.& l4 : µt′ . ⊕{l5 : T2 } . On the other hand, applying outUnf to the same term would unfold once the term reached with l1 and twice the one reached with l3 . In the subtyping procedure defined below we make use of outUnf in order to have that recursive definitions under the scope of an output are never unfolded. This guarantees that during the execution of the procedure, even if the set of 18 reached terms could be unbounded, all the subterms starting with an output are taken from a bounded set of terms. This is important to guarantee termination3 of the algorithm that we will define in Section 3.3 as an extension of the procedure described below. Subtyping Procedure. An environment Σ is a set containing pairs (T, S), where T and S are types. Judgements are triples of the form Σ ⊢ T ≤a S which intuitively read as “in order to succeed, the procedure must check whether T is a subtype of S, provided that pairs in Σ have already been visited”. Our subtyping procedure, applied to the types T and S, consists of deriving the state space of our judgments using the rules in Figure 2 bottom-up starting from the initial judgement ∅ ⊢ T ≤a S. More precisely, we use the transition relation Σ ⊢ T ≤a S → Σ′ ⊢ T ′ ≤a S ′ to indicate that if Σ ⊢ T ≤a S matches the conclusions of one of the rules in Figure 2, then Σ′ ⊢ T ′ ≤a S ′ is produced by the corresponding premises. The procedure explores the reachable judgements according to this transition relation. We give highest priority to rule Asmp, thus ensuring that at most one rule is applicable.4 The idea behind Σ is to avoid cycles when dealing with recursive types. Rules RecR1 and RecR2 deal with the case in which we need to unfold recursion in the type on the right-hand side. If the type on the left-hand side is not an output then the procedure simply adds the current pair to Σ and continues. On the other hand, if an output must be found, we apply RecR2 which checks whether such output is available. Rule Out allows nested outputs to be anticipated (when not under recursion) and  condition A 6= [ ]1 ⇒ ∀i ∈ I.& ∈ Ti makes sure there are no orphan messages. The remaining rules are self-explanatory. Σ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ is the reflexive and transitive closure of the transition relation among judgements. We write Σ ⊢ T ≤a S →ok if the judgement Σ ⊢ T ≤a S matches the conclusion of one of the axioms Asmp or End, and Σ ⊢ T ≤a S →err to mean that no rule can 3 Technically 4 The speaking, this property of the unfolding is used in the proof of Theorem 3.11. priority of Asmp is sufficient because all the other rules are alternative, i.e., given a judgement Σ ⊢ T ≤a S there are no two rules different from Asmp that can be both applied. 19 (A 6= [ ]1 ) ⇒ ∀i ∈ I.& ∈ Ti ∀n.I ⊆ Jn ∀i ∈ I . Σ ⊢ Ti ≤a A[Sni ]n Σ ⊢ ⊕{li : Ti }i∈I ≤a A[⊕{lj : Snj }j∈Jn ]n J ⊆ I ∀j ∈ J . Σ ⊢ Tj ≤a Sj In Σ ⊢ &{li : Ti }i∈I ≤a &{lj : Sj }j∈J Σ, (T, S) ⊢ T ≤a S Asmp Out Σ ⊢ end ≤a end End Σ, (µt.T, S) ⊢ T {µt.T /t} ≤a S RecL Σ ⊢ µt.T ≤a S T = end ∨ T = &{li : Ti }i∈I Σ, (T, µt.S) ⊢ T ≤a S{µt.S/t} RecR1 Σ ⊢ T ≤a µt.S outDepth(S) ≥ 1 Σ, (⊕{li : Ti }i∈I , S) ⊢ ⊕{li : Ti }i∈I ≤a outUnf(S) RecR2 Σ ⊢ ⊕{li : Ti }i∈I ≤a S Figure 2: A Procedure for Checking Subtyping be applied to Σ ⊢ T ≤a S. Due to input branching and output selection, the rules In and Out could generate branching also in the state space to be explored by the procedure. Namely, given a judgement Σ ⊢ T ≤a S, there are several subsequent judgements Σ′ ⊢ T ′ ≤a S ′ sucht that Σ ⊢ T ≤a S → Σ′ ⊢ T ′ ≤a S ′ . The procedure could (i) successfully terminate because all the explored branches reach a successful judgement Σ′ ⊢ T ′ ≤a S ′ →ok , (ii) terminate with an error in case at least one judgement Σ′ ⊢ T ′ ≤a S ′ →err is reached, or (iii) diverge because no branch terminates with an error and at least one branch never reaches a succesful judgement. n  Example 3.3. Consider T = µt. ⊕ l1 : &{l2 : t} and S = µt. ⊕ l1 : o  & l2 : &{l2 : t} . Clearly, the two types T and S are related by asynchronous subtyping, i.e. T ≤S. However, the subtyping procedure on ∅ ⊢ T ≤a S does not terminate: 20 ∅ ⊢ T ≤a S →   (T, S) ⊢ ⊕ l1 : &{l2 : T } ≤a S →   (T, S), (⊕ l1 : &{l2 : T } , S) o n   → ⊢ ⊕ l1 : &{l2 : T } ≤a ⊕ l1 : & l2 : &{l2 : S}    (T, S), (⊕ l1 : &{l2 : T } , S) ⊢ &{l2 : T } ≤a & l2 : &{l2 : S} →   (T, S), (⊕ l1 : &{l2 : T } , S) ⊢ T ≤a &{l2 : S} →    (T, S), (⊕ l1 : &{l2 : T } , S), (T, &{l2 : S}) ⊢ ⊕ l1 : &{l2 : T } ≤a &{l2 : S} →    (T, S), (⊕ l1 : &{l2 : T } , S), (T, &{l2 : S}), (⊕ l1 : &{l2 : T } , &{l2 : S}) n o    ⊢ ⊕ l1 : &{l2 : T } ≤a & l2 : ⊕ l1 : & l2 : &{l2 : S} →    (T, S), (⊕ l1 : &{l2 : T } , S), (T, &{l2 : S}), (⊕ l1 : &{l2 : T } , &{l2 : S}) n o  ⊢ &{l2 : T } ≤a & l2 : & l2 : &{l2 : S} → ... Notice that the last step above is obtained by application of the rule Out by considering the input context A = &{l2 : [ ]}. The example above shows that the procedure could diverge; the next result proves that this can happen only if the checked types are in subtyping relation. More precisely, types T and S are not in subtyping relation if and only if the procedure on ∅ ⊢ T ≤a S terminates with an error; formally Proposition 3.4. Given the types T and S, we have that there exist Σ′ , T ′ , S ′ such that T ≤ 6 S if and only if ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err . This means that: if T ≤ 6 S then the procedure on ∅ ⊢ T ≤a S surely terminates with an error; if, instead, T ≤S then the procedure terminates successfully or diverges. 3.2. k-bounded Asynchronous Subtyping In the previous subsection we have shown that the standard subtyping procedure does not terminate in general. In order to guarantee termination, Lange and Yoshida [11] have considered limitations to the communication buffer, like 21 half-duplex (in this case asynchronous and synchronous subtyping coincides) or alternating protocols (in this case the buffer will store at most one message). We now prove a more general decidability result. We show that, for every k, we can define an algorithm for the notion of k-bounded asynchronous subtyping introduced in Section 2.1, building on the subtyping procedure defined previously. We consider an algorithm, that we denote with ≤ka , obtained from the above procedure for ≤a simply by imposing that the input context A, used in rule Out in Figure 2, is always k-bounded. Then, the following result holds: Theorem 3.5. The algorithm for ≤ka always terminates and, given the types T and S, there exist Σ′ , T ′ , S ′ such that ∅ ⊢ T ≤ka S →∗ Σ′ ⊢ T ′ ≤a S ′ →err if and only if T ≤ 6 k S. 3.3. Asynchronous Subtyping for Single-Out or Single-In Types  In Example 3.3 we have seen that, if we consider the terms T = µt. ⊕ l1 : o n  &{l2 : t} and S = µt. ⊕ l1 : & l2 : &{l2 : t} , the subtyping procedure in Figure 2 applied to ∅ ⊢ T ≤a S does not terminate. The problem is that the termination rule Asmp cannot be applied because the term on the r.h.s. (i.e. n  the supertype) generates always new terms in the form & l2 : & l2 : . . . &{l2 : o S} . . . . Notice that, in this particular example, these infinitely many distinct terms are obtained by adding single inputs (i.e. single-choice input branchings) in front of the term in the r.h.s.: we call this linear input accumulation. For simple cases like this one, solutions have been proposed by Lange and Yoshida [11] and Bravetti et al. [10]. The idea is to extend the subtyping procedure in Figure 2 with additional termination rules able to detect when it is no longer necessary to continue because it entered a deterministic loop (where the only possible future behavior of the procedure is to repeat indefinitely the same linear input accumulation). This approach holds only under two assumptions, both satisfied by the subtyping relations considered in Lange and Yoshida [11] and Bravetti et al. [10]: while checking subtyping output selections in the l.h.s. 22 (i.e. the subtype) are always single-choice and the same holds for input branchings in the r.h.s. (i.e. the supertype). This implies that there is a linear input accumulation, which is the repetition of a specific sequence of input labels. The combination of these two assumptions guarantees that the subtyping procedure proceeds deterministically: this makes it possible to detect whether it enters a loop because the unique kind of loops are the deterministic ones. In this section we show that it is possible to relax at least one of these two assumptions: either deal with the case in which the input accumulation is not linear, or deal with the case in which output selections in the l.h.s. are not single-choice. More precisely, the two cases that we consider are the following ones: subtyping between single-out session types (where input branchings in the r.h.s. are not constrained to be single-choice as in previous approaches) and subtyping between single-in session types (where output selections in the l.h.s. are not constrained to be single-choice as in previous approaches), i.e. the two relations ≤sout and ≤sin , respectively, that we introduced in Section 2.1. The idea is to find an algorithm for one of the two cases and apply it also to the other one by exploiting type duality. In the single-in case we surely have linear input accumulation but the subtyping procedure is no longer deterministic due to non-single output selections in the l.h.s. that have multiple possible continuations. This causes the approach proposed in Lange and Yoshida [11] and Bravetti et al. [10] to fail because now the procedure can incur in nondeterministic loops (so it is not guaranteed to repeat indefinitely the accumulation behavior detected by the additional termination rule they consider). On the other hand, in the single-out case we loose the linear input accumulation but we do not have output selections to cause the problematic nondeterminism discussed above. The latter advantage led us to opt for the single-out case, which we were able to manage by adopting a totally new approach where the input accumulation is represented in the form of a tree (thus accounting for all possible alternative accumulated input behaviors at the same time). We start with an example of subtyping between single-out types that cannot 23 be managed with the approach in Lange and Yoshida [11] and Bravetti et al. [10] because there is non-linear input accumulation. n  Example 3.6. Consider T = µt. ⊕ l1 : &{l2 : t, l3 : t} and S = µt. ⊕ l1 : o  & l2 : &{l2 : t}, l3 : t . We now comment the application of the subtyping procedure on ∅ ⊢ T ≤a S. ∅ ⊢ T ≤a S →   (T, S) ⊢ ⊕ l1 : &{l2 : T, l3 : T } ≤a S →   (T, S), (⊕ l1 : &{l2 : T, l3 : T } , S) ⊢ o n   → ⊕ l1 : &{l2 : T, l3 : T } ≤a ⊕ l1 : & l2 : &{l2 : S}, l3 : S   (T, S), (⊕ l1 : &{l2 : T, l3 : T } , S) ⊢  &{l2 : T, l3 : T } ≤a & l2 : &{l2 : S}, l3 : S At this point, the subtyping procedure has two continuations, one for the label l2 and one for the label l3 . In case of label l3 we reach the judgement:   (T, S), (⊕ l1 : &{l2 : T, l3 : T } , S) ⊢ T ≤a S on which the termination rule Asmp can be applied. In case of label l2 we have:   (T, S), (⊕ l1 : &{l2 : T, l3 : T } , S) ⊢ T ≤a &{l2 : S} →   (T, S), (⊕ l1 : &{l2 : T, l3 : T } , S), (T, &{l2 : S})  ⊢ ⊕ l1 : &{l2 : T, l3 : T } ≤a &{l2 : S} →   (T, S), (⊕ l1 : &{l2 : T, l3 : T } , S), (T, &{l2 : S}),  (⊕ l1 : &{l2 : T, l3 : T } , &{l2 : S}) n    ⊢ ⊕ l1 : &{l2 : T, l3 : T } ≤a & l2 : ⊕ l1 : & l2 : &{l2 : S}, l3 : S   (T, S), (⊕ l1 : &{l2 : T, l3 : T } , S), (T, &{l2 : S}),  (⊕ l1 : &{l2 : T, l3 : T } , &{l2 : S}) o n  → ⊢ &{l2 : T, l3 : T } ≤a & l2 : & l2 : &{l2 : S}, l3 : S   (T, S), (⊕ l1 : &{l2 : T, l3 : T } , S), (T, &{l2 : S}),  (⊕ l1 : &{l2 : T, l3 : T } , &{l2 : S})  ⊢ T ≤a & l2 : &{l2 : S}, l3 : S → ... 24 o → Notice that in the last judgement, the r.h.s. has a non-linear input accumulation starting with an input choice on two labels l2 and l3 . 3.3.1. Asynchronous Subtyping for Single-Out Types We now present our novel approach to asynchronous subtyping that can be applied to single-out types, hence also to the types in the above Example 3.6, that will be used as a running example in this section. As anticipated, the main novelty is the ability to deal with non-linear input accumulation by representing it as a tree. We need to be able to extract the leafs from these trees: this is done by the leaf set function defined as follows. Definition 3.7 (Leaf Set). Given a session type S, we write noIn(S) if S is not of the form &{li : Si }i∈I . Given a session type T , we define leafSet(T ) = {T1 , . . . , Tn | noIn(Ti ) and ∃ input context A s.t. T = A[Tk ]k∈{1...n} } The leaf set of a session type T is the set of subterms different from inputs that are reachable from its root through a path of inputs. For example, the leaf set of the term &{l1 : µt. ⊕ {l2 : t}, l3 : &{l4 : ⊕{l2 : µt. ⊕ {l2 : t}}}} is {µt. ⊕ {l2 : t}, ⊕{l2 : µt. ⊕ {l2 : t}}. If we consider the r.h.s. term in the last  judgement in Example 3.6, we have that leafSet(& l2 : &{l2 : S}, l3 : S ) = {S}. During the check of subtyping, according to Figure 2 (rule Out), when a term in the r.h.s. having input accumulation has to mimic an output in front of the l.h.s., such output must be present in front of all the leafs of the tree. In this case, the checking continues by anticipating the output from all the leafs. The following auxiliary function output anticipation indicates the way a term changes after having anticipated a sequence of outputs. Notice that in the definition we make use of the assumption on single-out session types, by considering single-choice output selections. Definition 3.8 (Output Anticipation). Partial function antOut(T, li1 · · · lin ), with T single-out session type and li1 · · · lin sequence of labels, is inductively de- 25 fined as follows: antOut(T, li1 · · · lin ) =  T if n = 0 k A[T ]k if outUnf(antOut(T, l · · · l in−1 )) = A[⊕{lin : Tk }] k i1 We say that T can infinitely anticipate outputs, written antOutInf(T ), if there exists an infinite sequence of labels li1 · · · lij · · · such that antOut(T, li1 · · · lin ) is defined for every n. The function antOut(T, l̃) anticipates all outputs in the sequence ˜l. For example, the function applied to &{l : µt. ⊕ {l1 : ⊕{l2 : t}}, l′ : ⊕{l1 : µt. ⊕ {l2 : ⊕{l1 : t}}}} and the sequence (l1 , l2 ) would return the same term, while it would be undefined with the sequence (l1 , l1 ). If we go back to our running Example 3.6,  we have that antOut(S, l1 ) = & l2 : &{l2 : S}, l3 : S . Moreover, we have that antOutInf(S) holds because the label l1 can be infinitely anticipated. The definition of antOutInf(T ) is not algorithmic in that it quantifies on every possible natural number n. Nevertheless, as we show below, it can be decided by checking whether for every session type obtained from T by means of output anticipations, all the terms populating its leaf set can anticipate the same output label. Although such process may generate infinitely many session types, the terms populating the leaf sets are finite and are over-approximated by the function reach(T ), which always returns a finite set and is defined as: Definition 3.9 (Reachable Types). Given a single-out session type T, reach(T ) is the minimal set of session types such that: 1. T ∈ reach(T ); 2. &{li : Ti }i∈I ∈ reach(T ) implies Ti ∈ reach(T ) for every i ∈ I; 3. µt.T ′ ∈ reach(T ) implies T ′ {µt.T ′ /t} ∈ reach(T ); 4. ⊕{l : T ′ } ∈ reach(T ) implies T ′ ∈ reach(T ). Notice that reach(T ) is populated by those session types obtained by consuming in sequence the initial inputs and outputs, and by unfolding recursion only when it is at the top level. As an example, consider the session type S of 26 the Example 3.6. We have n   reach(S) = S, ⊕ l1 : & l2 : &{l2 : S}, l3 : S o  , & l2 : &{l2 : S}, l3 : S , &{l2 : S} For every type T , we have that the terms in reach(T ) are finite; in fact, during the generation of such terms, eventually the term end or a term already considered is reached. The latter occurs after consumption of all the inputs and outputs in front of a recursion variable already unfolded. Proposition 3.10. Given a single-out session type T , reach(T ) is finite and it is decidable whether antOutInf(T ). Subtyping algorithm for single-out types. We are now ready to present the new termination condition that once added to the subtyping procedure in Figure 2 makes it a valid algorithm for checking subtyping for single-out types. The termination condition is defined as an additional rule, named Asmp2, that complements the already defined Asmp rule by detecting those cases in which the subtyping procedure in Figure 2 does not terminate. The new rule is defined parametrically on the session type Z, which is the type on the right-hand side of the initial pair of types to be checked (i.e. the algorithm is intended to check V ≤Z, for some type Z). We start from the initial judgement ∅ ⊢ V ≤t Z and then apply from bottom to top the rules in Figure 2, where ≤a is replaced by ≤t , plus the following additional rule: S ∈ reach(Z) antOutInf(S) |γ| < |β| leafSet(antOut(S, γ)) = leafSet(antOut(S, β)) Σ, (T, antOut(S, γ)) ⊢ T ≤t antOut(S, β) Asmp2 We first observe that this termination rule can be applied to the last judgement of our running Example 3.6. We have already seen that S ∈ reach(S),   antOutInf(S) holds, antOut(S, l1 ) = & l2 : &{l2 : S}, l3 : S and that leafSet(& l2 : &{l2 : S}, l3 : S ) = {S}. We now observe that antOut(S, ε) = S and leafSet(S) = {S}, hence we can conclude that we can apply the above termination rule Asmp2 to the last judgement in Example 3.6 by instantiating γ = ε and β = l1 . 27 The first property of the new algorithm that we prove is termination. Intuitively, we have that this new termination rule guarantees to catch all those cases where the term on the right grows indefinitely, by anticipating outputs and accumulating inputs. These infinitely many distinct types are anyway obtainable starting from the finite set reach(Z), by means of output anticipations. Hence there exists S ∈ reach(Z) that can generate infinitely many of these types: this guarantees antOutInf(S) to be true. As observed above, the leaves of such infinitely many terms are themselves taken from the finite set reach(Z). This guarantees that the algorithm, among the types that can be obtained from S, visits two terms having the same leaf set. These, even if syntactically different, are equivalent as far as the subtyping game is regarded. Concerning the precise definition of the algorithm, in order to avoid the possibility of applying two distinct rules to the same judgement, we give rule Asmp2 the same priority as rule Asmp (both rules have highest priority). Also in this case, we use Σ ⊢ T ≤t S → Σ′ ⊢ T ′ ≤t S ′ to denote that the latter can be obtained from the former by one rule application, and Σ ⊢ T ≤t S →err , to denote that there is no rule that can be applied to the judgement Σ ⊢ T ≤t S. We can now state the termination and soundness of the algorithm: Theorem 3.11. Given two single-out session types T and S, the algorithm applied to the initial judgement ∅ ⊢ T ≤t S terminates. Theorem 3.12. Given two single-out session types T and S, we have that there exist Σ′ , T ′ , S ′ such that ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err if and only if there exist Σ′′ , T ′′ , S ′′ such that ∅ ⊢ T ≤t S →∗ Σ′′ ⊢ T ′′ ≤t S ′′ →err . Finally, we can conclude the decidability of asynchronous subtyping for single-out session types. Corollary 3.13 (Decidability for Single-out Types). Asynchronous subtyping for single-out session types ≤sout is decidable. We now show that the above decidability results hold also for the ≤tin,sout relation (where we further restrict the asynchronous subtyping relation not to 28 admit contravariance on input branchings). In the algorithm we just modify the rule In of Figure 2 by changing the constraint J ⊆ I in the premise into J = I, thus obtaining modified versions of Σ ⊢ T ≤a S → Σ′ ⊢ T ′ ≤a S ′ (and Σ ⊢ T ≤a S →err ) and Σ ⊢ T ≤t S → Σ′ ⊢ T ′ ≤t S ′ (and Σ ⊢ T ≤t S →err ). We have that Proposition 3.4, where relation ≤tin is considered instead of ≤, termination Theorem 3.11 and soundness Theorem 3.12, where the modified judgments ≤a and ≤t are considered, still hold (they are proved with exactly the same proofs as those reported in Appendix B for the original statements). Corollary 3.14. Asynchronous subtyping for single-out session types without input contravariance ≤tin,sout is decidable. 3.3.2. Asynchronous Subtyping for Single-in Types First of all we notice that an obvious consequence of Corollary 3.13 is that also ≤sin,sout is decidable (we just have to add a preliminary check verifying that both types are single-in). Moreover, exploiting dual closeness, i.e. the fact that T ≤sin S if and only if S ≤sout T (see Section 2.1), we can use the algorithm presented for single-out types also for the case of single-in types. Corollary 3.15 (Decidability for Single-in Types). Asynchronous subtyping for single-in session types ≤sin is decidable. We can therefore identify an asynchronous dual closed subtyping relation that stands in the boundary of decidability. Corollary 3.16 (Decidability for Single-in or Single-out Types). The asynchronous dual closed subtyping relation ≤sin ∪≤sout is decidable. Finally, similarly as we did for T ≤sin S, by exploiting Proposition 2.10 we can use the modified algorithm employed for ≤tin,sout subtyping for deciding the remaining relation ≤sin,tout . Corollary 3.17. Asynchronous subtyping for single-in session types without output covariance ≤sin,tout is decidable. 29 4. Undecidability Results We now move to undecidability results. We first consider bounded asynchronous subtyping ≤bound . The proof in this case is a variant of the proof we already presented in our previous work [10], where we encoded the problem of checking (non) termination in queue machines (a well-known Turing powerful formalism) into checking session subtyping. Technically speaking, we resort to a different property, namely bounded non termination, that we here show to be undecidable for queue machines. The second, and main, undecidability result concerns subtyping without output covariance and input contravariance ≤tin,tout . The proof in this case requires deep modifications to our proof technique, due to the impossibility to exploit covariance/contravariance in the queue machine encoding. We deal with the absence of covariance/contravariance by saturating each point of choice on the entire considered alphabet. This has a strong impact on the encoding because it introduces additional choices, in the session types, whose continuations do not correspond to the behaviour of the considered queue machine. This problem is solved by ensuring that these additional choices and the corresponding continuations are irrelevant as far as subtyping checking is concerned. Such solution, however, works only for a fragment of queue machines (that we call single-consuming queue machines) that we prove to be Turing complete as well. We consider this second result interesting for the following reason: the previous undecidability proofs [10, 11] made use of both output covariance/input contravariance (already present in synchronous session subtyping) and output anticipation (specific for asynchronous subtyping), hence our new proof shows that (provided that the syntax of types is not constrained, e.g, imposing single choices for output selections or input branchings) the source of undecidability is to be precisely localized into the latter, as the former is not necessary to prove undecidability. We first report the definition of queue machines. 30 4.1. Queue Machines Queue machines are a formalism similar to pushdown automata, but with a queue instead of a stack. Queue machines are Turing-equivalent [15]. Definition 4.1 (Queue Machine). A queue machine M is defined by a sixtuple (Q, Σ, Γ, $, s, δ) where: • Q is a finite set of states; • Σ ⊂ Γ is a finite set denoting the input alphabet; • Γ is a finite set denoting the queue alphabet; • $ ∈ Γ − Σ is the initial queue symbol; • s ∈ Q is the start state; • δ : Q × Γ → Q × Γ∗ is the transition function. A configuration of a queue machine is an ordered pair (q, γ) where q ∈ Q is its current state and γ ∈ Γ∗ is the content of the queue (Γ∗ is the Kleene closure of Γ). The starting configuration on an input string x ∈ Σ∗ is (s, x$). The transition relation →M from one configuration to the next one is defined as (p, Aα) →M (q, αγ), when δ(p, A) = (q, γ). A machine M accepts an input x if it blocks by emptying the queue. Formally, x is accepted by M if (s, x$) →∗M (q, ǫ) where ǫ is the empty string and →∗M is the reflexive and transitive closure of →M . Intuitively, a queue machines is a Turing machine with a special tape that works as a FIFO queue. The Turing completeness of queue machines is discussed by Kozen [15] (page 354, solution to exercise 99). A configuration of a Turing machine (tape, current head position and internal state) can be encoded in a queue, and a queue machine can simulate each move of the Turing machine by repeatedly consuming and reproducing the queue contents, only changing the part affected by the move itself. The undecidability of termination for queue machines follows directly from such encoding. 31 a) Finite Control   µq.&{A : ⊕{B1A : · · · ⊕ {BnAA : [[q ′ ]]S∪q }}}A∈Γ       if q 6∈ S and δ(q, A) = (q ′ , B1A · · · BnAA ) S [[q]] =        q if q ∈ S b) Queue [[C1 · · · Cm ]] = &{C1 : . . . &{Cm : µt. ⊕ {A : &{A : t}}A∈Γ }} Figure 3: Encoding of the Finite Control and the Queue of a Queue Machine 4.2. Bounded Asynchronous Subtyping We now consider the notion of bounded asynchronous subtyping ≤bound we introduced in Section 2.1, The proof of undecidability of ≤bound follows the approach we already used to prove the undecidability of single-choice asynchronous subtyping << [10] (that we have commented in the Introduction). The idea is to define, given a queue machine M and its input x, two session types S and T , such that S is a subtype of T if and only if M does not accept x. More precisely, the type S models the finite control of the queue machine M while the type T models the queue that initially contains the sequence x$. More precisely, the encoding of queue machines is as follows [10]. Definition 4.2 (Queue Machine Encoding). Let M = (Q, Σ, Γ, $, s, δ) be a queue machine, and let C1 , · · · , Cm ∈ Γ, with m ≥ 0, q ∈ Q and S ⊆ Q. The finite control encoding function [[q]]S and the queue encoding function [[C1 · · · Cm ]] are defined as in Figure 3(a) and Figure 3(b) respectively. The initial encoding of M with input x is given by the pair of types [[s]]∅ and [[x$]]. The basic idea behind the encoding of the finite control is to use a recursively defined type with a recursion variable q for each state q of the encoded queue machine M . The type corresponding to the recursion variable q starts with an input with multiple choices, one for each possible symbol that can be 32 consumed from the queue. The continuation is composed of a sequence of singlechoice inputs labeled with the symbols B1A . . . BnAA , where B1A . . . BnAA are the symbols enqueued by the queue machine when, in state q, consumes A from the queue. Assuming that q ′ is the new state of M after execution of this step (i.e. δ(q, A) = (q ′ , B1A . . . BnAA )), the type becomes the one corresponding to the recursion variable q′ . On the other hand, the type modeling the queue with contents C1 . . . Cm is denoted with [[C1 . . . Cm ]]: this type starts with a sequence of single-choice inputs labeled with the symbols C1 . . . Cm , followed by a recursive type. Such type starts with an output with multiple-choices, one for each symbols that can be enqueued, followed by a single-choice input having the same label. This particular type has the following property: if one label A of the multiple-choice output is selected for anticipation during the subtyping simulation game, the corresponding single-choice input labeled with A is enqueued at the end of the sequence of inputs preceding the recursive definition. This perfectly corresponds to the behaviour of the queue in the modeled queue machine. As mentioned above, this encoding has been already used to prove the undecidability of << [10]. More precisely, we proved that given a queue machine M = (Q, Σ, Γ, $, s, δ) and an initial input x, we have that [[s]]∅ <<[[x$]] if and only if x is not accepted by M (i.e. M does not terminate on input x). The same result does not hold for the bounded asynchronous subtyping because there are cases in which M does not accept x but [[s]]∅ 6 ≤bound[[x$]], in particular, those cases in which the subtyping simulation game generates unbounded accumulation of inputs. For this reason we have to consider a more complex undecidable property for queue machines: bounded non termination, i.e., the ability of a queue machine to have an infinite computation while keeping the length of the queue bounded. We now define the notion of boundedness for queue machines and then prove that bounded non termination is undecidable. Definition 4.3 (Queue Machine Boundedness). Let M be a queue machine and x a possible input. We say that M is bound on input x if there exists k such 33 that, for every q and γ such that (s, x$) →∗M (q, γ), we have that |γ| ≤ k. Lemma 4.4. Given a queue machine M and an input x, it is undecidable whether M does not terminate and is bound on x. Following the proof technique we already used to prove undecidability of <<, i.e. by reducing the termination problem for queue machines into subtyping checking [10], we can prove also the undecidability of ≤bound by reduction from the bounded non termination problem. Theorem 4.5. Given a queue machine M = (Q, Σ, Γ, $, s, δ) and an input string x, we have that [[s]]∅ ≤bound [[x$]] if and only if M does not terminate and is bound on x. Corollary 4.6. Bounded asynchronous subtyping ≤bound is undecidable. 4.3. Undecidability of Asynchronous Subtyping without Output Covariance and Input Contravariance We now move to the proof of undecidability of ≤tin,tout , the asynchronous subyping relation, we introduced in Section 2.1, that does not admit output covariance and input contravariance by imposing matching choices to have the same set of labels. The proof technique is still based on an encoding of queue machines, but we have to significantly improve the encoding discussed in the previous subsection. In fact, the encoding of Figure 3 exploits both input contravariance (in the matching between the multiple-choice input at the beginning of the encoding of the finite control and the initial single-choice inputs of the queue encoding) and output covariance (in the matching between the multiple-choice output at the beginning of the recursive part of the queue encoding and the single-choice outputs in the encoding of the finite control). The new encoding that we propose saturates all choices, both inputs and outputs, with labels corresponding to the entire queue alphabet. The addition of these labels and of the corresponding continuations, introduces new possible 34 paths in the subtyping simulation game. We are able to make these additional behaviour irrelevant, but at the price of restricting the class of encoded queue machines. These queue machines are named single consuming queue machines; their characteristic is to guarantee that in two subsequence actions, at least one of the two will enqueue symbols. Definition 4.7 (Single Consuming Queue machine). We say that a queue machine M = (Q, Σ, Γ, $, s, δ) is single consuming if δ(q, a) = (q ′ , ǫ), for some q, a and q ′ , implies that there exist no b and q ′′ such that δ(q ′ , b) = (q ′′ , ǫ). We have that single consuming queue machines are still Turing-complete (see Appendix C.2 for the detailed proof based on an encoding of queue machines into single consuming queue machines): Theorem 4.8. Given a single consuming queue machine M and an input x, the termination of M on x is undecidable. We prove the undecidability of ≤tin,tout by encoding single consuming queue machines into the subtyping simulation game. Following the approach already discussed in the previous subsection, given a queue machine, our encoding generates a pair of types, say T and S, such that T encodes the finite control and S encodes the queue. Then, the subtyping T ≤tin,tout S simulates the execution of the machine. We are now ready to present the definition of the new encoding where we make use of the following new notation: {li : Ti }i∈I ⊎ {lj : Tj }j∈J = {lk : Tk }k∈I∪J . Definition 4.9 (Encoding Single Consuming Queue machines). Let M = (Q, Σ, Γ, $, s, δ) be a queue machine such that q ∈ Q, S ⊆ Q and C1 , · · · , Cm ∈ Γ, S with m ≥ 0. The finite control encoding function [[[q]]] and the queue encoding function [[[C1 · · · Cm ]]] are defined as in Figure 4(a) and Figure 4(b) respectively. As discussed in the previous subsection, the idea is that the type encoding the finite control is able to perform an input on each of the symbols in Γ, and 35 a) Finite Control      µq.&{A : {{B1A · · · BnA }}S∪{q} }A∈Γ A q′ S [[[q]]] =     q if q 6∈ S and δ(q, A) = (q ′ , B1A · · · BnAA ) if q ∈ S b) Queue       µt ⊕ A : & A : t ⊎ A′ : T ′′ ′ A ∈Γ\{A} A∈Γ [[[C1 . . . Cm ]]] =   & C : [[[C . . . C ]]] ⊎ A′ : T ′′ 1 2 m A′ ∈Γ\{C1 } if m = 0 otherwise where: T {{B1 · · · Bm }}r  [[[r]]]T = ⊕ B1 : {{B2 . . . Bm }}T r  T ′ = µt.& A1 : ⊕{A2 : t}A2 ∈Γ if m = 0  ⊎ A′ : T ′ A′ ∈Γ\{B1 }  otherwise A1 ∈Γ   T ′′ = µt.& A1 : & A2 : ⊕{A3 : t}A3 ∈Γ A2 ∈Γ A1 ∈Γ Figure 4: Encoding of the Finite Control and the Queue of a Single Consuming Queue Machine continue according to the definition of the transition function δ. The type representing the queue then matches such input with the correct symbol depending on the state of the queue. For instance, in the encoding described in the previous subsection, if we denote with T and S the types representing the finite control and the queue respectively, and if Γ = {A, B} and symbol A is on the head of the queue, we have T = &{A : . . . , B : . . .} and S = &{A : . . .}: type T is able to react to any symbol that may be present on the queue (like the transition function δ), while type S reacts with the actual value on the queue, symbol A. Unfortunately, such idea exploits contravariance for inputs. Therefore, it must be the case, in the new encoding, that the input in S is of the form &{A : . . . , B : . . .}. We make sure that if label A is selected then the simulation of the queue machine continues. Otherwise, an infinite subtyping simulation 36 game is started (starting from B in the example). Also the insertion of symbols in the queue was simulated in the encoding of the previous subsection by exploiting output covariance. The type representing the finite control performs a single-choice output that is matched by a multiplechoice output having the effect of adding a corresponding symbol at the end of the input accumulated in the type modeling the queue. Also in this case, we have to add choices to the type modeling the finite control: also in this case we ensure that these extra paths start an infinite subtyping simulation game. These additional paths make the subtyping simulation game highly nondeterministic and such that several paths that the game can take differ from what the encoded machine does. We discuss in detail the various cases which our encoding in Figure 4 can be in: 1. The encoding of the finite control reads the correct symbol. We represent the machine reading a symbol A from the queue while being in state q, S∪{q} with an input type of the form &{A : {{B1A · · · BnAA }}q′ }A∈Γ , where each branch corresponds to a possible symbol that can be read. On the other hand, a queue C1 · · · Cm is encoded as an input type of the form    & C1 : [[[C2 . . . Cm ]]] ⊎ A′ : T ′′ A′ ∈Γ\{C } where the branch with label 1 C1 represents the actual content of the queue. Hence, in the simulation game, if the finite control reads symbol A and this is matched by the S∪{q} correct symbol in the queue, then the type {{B1A · · · BnAA }}q′ deals with inserting symbols B1A · · · BnAA into the queue. 2. The encoding of the finite control reads the wrong symbol. In this case, the encoding of the finite control picks a symbol that is not that in the queue head. In order to match it, the encoding of the queue will take  ′ A : T ′′ A′ ∈Γ\{C1 } . Type T ′′ is designed in a way that it can match every move of the finite control, by repeatedly alternating two inputs with a subsequent output on every queue symbol. Note that, since inputs cannot be anticipated, matching every move is feasible only if the encoded machine is single consuming. 37 3. The encoding of the finite control writes the correct symbol. Once the finite control has read a symbol, it performs {{B1 · · · Bm }}Tr , which simulates the writing of B1 · · · Bm into the queue. If m = 0 then it moves to the encoding of the next state according to function δ. Otherwise, it translates    T to the type ⊕ B1 : {{B2 . . . Bm }}r ⊎ A′ : T ′ A′ ∈Γ\{B1 } . The queue, in order to match B1 (and B2 , . . . , Bm ) can always anticipate outputs     with the term µt ⊕ A : & A : t ⊎ A′ : T ′′ A′ ∈Γ\{A} A∈Γ which, after consuming a label A will add an input with label A, simulating the adding of A to the queue. 4. The encoding of the finite control writes the wrong symbol. In this case, the  finite control writes a symbol to the queue with ⊕ B1 : {{B2 . . . Bm }}Tr ⊎  ′  A : T ′ A′ ∈Γ\{B1 } . However, the simulation executes the wrong output (with any A′ 6= B1 ) and continues as T ′ . In this case, T ′ continues removing and adding any value from the queue, indefinitely. Note that it may remove the wrong value from the queue overlapping with case 2. In this case, the requirement that the queue machine is single consuming is not necessary. Example 4.10. In order to further clarify our encoding, consider a queue machine with states {s, q} (where s is the starting state), queue alphabet Γ = {X, Y } and transition relation δ such that δ(s, A) = (q, A) and δ(q, A) = (s, ǫ), for every A ∈ Σ. Clearly, the machine terminates on any input. The encoding of the finite control is the following session type:    X : ⊕{X : [[[q]]]s , Y : T ′ }  ∅ [[[s]]] = µs.&  Y : ⊕{Y : [[[q]]]s , X : T ′ }  [[[q]]] {s}    X : ⊕{X : s, Y : T ′ }  = µq.&  Y : ⊕{Y : s, X : T ′ }  Assume, e.g., that the queue initially contains the string XY . The machine will empty the queue by visiting state q twice and terminate in state s with the empty queue. If we now run the subtyping simulation game between the encoding of 38 finite control above and the encoding of the queue we will end up with two types that are not in subtyping: the encoding of the state s starting with an input and the encoding of the empty queue that does not match it. The encoding of the finite-control and of the queue are such that the following properties hold: given a queue machine M with initial state s and initial queue symbol $, if M does not accept x then it is possible to define an asynchronous subtyping relation that includes the pair ([[[s]]]∅ , [[[x$]]]); moreover, if ∅ [[[s]]] ≤tin,tout [[[x$]]] then it is possible to conclude that M does not terminate (i.e. does not accept) on input x. We thus have the following: Theorem 4.11. Given a single consuming queue machine M = (Q, Σ, Γ, $, s, δ) ∅ and an input string x ∈ Σ∗ , we have [[[s]]] ≤tin,tout [[[x$]]] if and only if M does not terminate on x. We can therefore conclude that subtyping without output covariance and input contravariance is undecidable. Corollary 4.12 (Undecidability of Subtying without Co/contravariance). The asynchronous dual closed subtyping relation ≤tin,tout is undecidable. In the same way we can also show that ≤tin and ≤tout are undecidable and provide an alternative proof of undecidability of ≤. This because, since for the types obtained with the encoding (for which the ability to match via covariance/contravariance is irrelevant) obviously such relations coincide, i.e. ∅ ∅ ∅ [[[s]]] ≤tin,tout [[[x$]]] if and only if [[[s]]] ≤tin [[[x$]]] if and only if [[[s]]] ≤tout [[[x$]]] if and ∅ only if [[[s]]] ≤[[[x$]]], Theorem 4.11 holds also if we replace the ≤tin,tout relation with one of such relations. Corollary 4.13. Asynchronous subtyping relations ≤tin , ≤tout and ≤ are undecidable. 39 5. Related Work Subtyping for Session Types. Subtyping for session types was first introduced by Gay and Hole [7]5 for a session-based π-calculus where communication is synchronous, i.e., an output directly synchronises with an input. In such case, the relation allows no output anticipation. However, as in our case, outputs are covariant and inputs are contravariant. To the best of our knowledge, Mostrous et al. [14] were the first to adapt the notion of session subtyping to an asynchronous setting. Their computation model is a session π-calculus with asynchronous communication that makes use of session queues for maintaining the order in which messages are sent. They introduce the idea of output anticipation, which is also a main feature of our theory. Mostrous and Yoshida [12] extended the notion of asynchronous subtyping to session types for the higher-order π-calculus. In the same article, Mostrous and Yoshida observe that their definition of asynchronous subtyping allows orphan messages. Orphan message are prohibited with the definition of subtyping given by Chen et al. [8]. In their article, they show that such a definition is both sound and complete w.r.t. type safety and orphan message freedom. Undecidability Results. Mostrous et al. [14] proposed a procedure to check asynchronous subtyping for multiparty session types. Differently from what stated therein, the procedure does not terminate due to unbounded message accumulation in the queues, e.g. for the terms in Example 3.3. Such a procedure inspired the one we presented in Section 3.1. The problem of unbounded accumulation was observed by Mostrous and Yoshida [12]. The impossibility to define a correct algorithm has been independently proved by Lange and Yoshida [11] and Bravetti et. al [10]. Lange and Yoshida [11] reduce Turing machine termination into a notion of compatibility for communicating automata and, then, transfer 5 The Gay and Hole subtyping is contravariant on outputs and covariant on inputs. This is because a channel-based subtyping [9] is considered instead of our process-oriented subtyping. 40 such a result to session types. This proof technique applies only to dual closed subtyping relations, like the one by Chen et al. [8]. The proof by Bravetti et. al [10], on the other hand, exploits a direct encoding of queue machines into session subtyping. This made it possible to prove undecidability of all the other notions of asynchronous subtyping in the literature. Unlike the encoding in this paper (Figure 4), both encodings take advantage of the use of output covariance and input contravariance. For example, by exploiting this feature, the queue machine encoding by Bravetti et al. [10] (Figure 3) is much simpler than the encoding we need to use here. We notice that our results on undecidability focus on binary session types. However, it is immediate to generalise this kind of undecidability results from binary to multiparty sessions (binary session types are just multiparty session types with only two roles [10]). Decidability Results. Synchronous subtyping for binary session types is decidable [7]. Both Bravetti et al. [10] and Lange and Yoshida [11] investigate fragments of session types for which asynchronous subtyping becomes decidable. However, such fragments are much more limited, and far from having practical applications, with respect to those considered here. Both address cases where one of the compared types is a single-choice session type, i.e. all its branchings and selections are single-choice. Thus they are both, basically, special cases of our subtyping for single-in or single-out types (≤sin ∪≤sout ). In particular, Lange and Yoshida give an algorithm for deciding subtyping between a general session type and a single-choice session type. Although it may seem that such case is not properly included in our decidable subtyping relation for single-out/singlein types, covariance and contravariance ensure that all types containing at least one multiple input branch and one multiple output selection (both reachable in the subtyping simulation game) cannot be related with a single-choice type. Bravetti et al. [10] prove decidability for relations <<sin and <<sout that pose an analogous restriction to the branching/selection structure, but that allow for orphan messages. <<sin and <<sout are fragments where related types (T, S) are such that, either T is single-choice and S is single-in (<<sin ), or T is single-out and S is single-choice (<<sout ). For types that do not produce orphan messages, 41 the sutyping of Bravetti et al. [10] is just a special case of our single-in (≤sin ) and single-out (≤sout ) session subtyping. Additionally, Lange and Yoshida state the decidability of subtyping for halfduplex communication [16] and alternating machines: the former coincides with synchronous subtyping while the latter can be reduced to 1-bounded asynchronous subtyping as discussed in Section 3.2. Comparison with our Previous Work [10]. Concerning decidability results, the approaches taken in this and our previous paper are both based on initially considering a (non always terminating) subtyping procedure ≤a , inspired from Mostrous et al. [14], and then presenting a subtyping algorithm ≤t obtained by adding a new termination Asmp2 rule to the definition of the ≤a procedure (the further additional Asmp3 rule in our previous work is not needed when dealing with orphan message-free subtyping, as we do here). Such an Asmp2 rule is crucial to guarantee the termination of the ≤t algorithm: the structure of the Asmp2 rule and the related proof of algorithm correctness and termination constitute the main contribution of this paper (as far as decidability results are concerned). In particular, since here multiple choices are admitted for input branchings, the termination condition Asmp2 needs to deal with input accumulation in the form of a tree, instead of simple linear accumulation as in our previous work (see the discussion at the beginning Section 3.3 for details about this comparison). As a consequence Asmp2 is completely modified: it has to deal with complex recurrent patterns to be checked on the leaves of trees representing input branchings (with multiple choices), instead of detecting simple repetitions on strings representing sequences of single-choice inputs. A detailed comparison follows. Concerning the subtyping procedure ≤a , the one considered in this paper (Figure 2) is novel in just two details: an additional orphan message-free condition is considered in the Out rule (because here, we consider orphan message-free subtyping) and the usage of the outUnf unfolding instead of unfoldn (so to perform the minimal needed per-branch unfolding). The latter is needed in this paper because, when the procedure is turned into a subtyping algorithm ≤t , we have to deal, in the new Asmp2 termination condition, with 42 input trees instead of strings. Correctness of ≤a w.r.t. asynchronous subtyping is stated by Proposition 3.4 in this paper, which corresponds to Lemma 5.1 of our previous work [10]. Differently from the proof of that Lemma, here we need to cope with the different way of performing unfolding of right-hand terms in the asynchronous subtyping definition (via unfoldn ) and in ≤a (via outUnf). Termination of the ≤t algorithm is stated by Theorem 3.11 in this paper, which corresponds to Lemma 5.2 of our previous work [10]. Here due to the new structure of the Asmp2 rule, the proof is based on a much more complex characterization of right-hand types produced, starting from the initial Z one, by the subtyping algorithm. Such types are characterized as antOut(S, γ) with γ being a sequence of output labels and S being a type such that S ∈ reach(Z) and antOutInf(S). For the proof in this paper it is thus crucial to show, that reach(Z) is finite and antOutInf(S) is decidable, as stated by Proposition 3.10, which has no counterpart in our previous work. Correctness of the ≤t algorithm w.r.t. ≤a procedure is stated by Theorem 3.12 in this paper, which corresponds to Lemma 5.3 of our previous work. In both papers correctness follows from the following property: whenever the termination rule Asmp2 is applied by the ≤t algorithm, the subtyping procedure ≤a is guaranteed to proceed forever. However, being Asmp2 completely different, here we need to perform a totally new proof. In particular, in our previous work we simply had to prove the existence of a cycle causing the initial input string in the right-hand type to get longer in a repetitive way, here, instead, we have to manage the more complex case of input trees: this entails considering all possible branchings in order to prove that the subtyping procedure proceeds forever. Concerning undecidability results, both the approaches taken in the two papers are based on resorting to undecidability of queue machines via a suitable encoding of them into subtyping. In particular, for showing undecidability of bounded asynchronous subtyping (≤bound ) we resort to the same encoding as in our previous work, but we consider a more complex property of queue machines that we show to be undecidable: bounded non termination. On the other hand, for showing undecidability of asynchronous subtyping without output covariance 43 and input contravariance (≤tin,tout ), we need to introduce the novel class of single consuming queue machines and to perform a much more complex encoding which, differently from the previous one, uses nondeterminism (in order to avoid usage of covariance and contravariance, spurious nondeterministic paths that proceed forever have to be added by the encoding). The undecidability proof thus becomes significantly more complex in that the above encoding makes it much more intricated to relate the queue machine behaviour with the subtyping game and the novel class of queue machines. Moreover, introducing a new restricted class of queue machines requires showing them to be Turing-equivalent (by providing an encoding of standard queue machines into them). 6. Conclusion In this article, we have shed light on the boundaries between decidability and undecidability of asynchronous session subtyping by analyzing two kinds of restrictions: to the branching/selection structure of inputs/outputs and to the capabilities of the communication buffer. In particular, considering all the relations in Figure 1, we have shown: decidability for those in the lower part, notably of k-bounded subtyping and of subtyping over single-out or single-in session types; and the undecidability for those in the upper part, notably of bounded subtyping and of subtyping without output covariance and input contravariance. As future work, we plan to develop typing systems for server/client code in the context of web services, exploiting our subtyping algorithms for singleout/single-in session types. Note that, in practice, server code typically connects, as a client, to other services (e.g. a database server) using another binary session, according to the commonly used multitier architecture. Thus, in general, when typing code, we would use for a specific session one of the two algorithms above depending if the code is playing the role of the client or of the server in that session. Moreover, we plan to investigate whether other kinds of restriction w.r.t. 44 the two above allow us to obtain a decidable relation (thus retaining general branching/selection structure for both inputs and outputs and not limiting communication buffers). References References [1] K. Honda, V. T. Vasconcelos, M. Kubo, Language primitives and type discipline for structured communication-based programming, in: 7th European Symposium on Programming (ESOP’98), Vol. 1381 of LNCS, Springer, 1998, pp. 122–138. doi:10.1007/BFb0053567. [2] K. Honda, N. Yoshida, M. Carbone, Multiparty asynchronous session types, in: Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL 2008), 2008, pp. 273–284. doi:10.1145/1328438.1328472. [3] S. Lindley, J. G. Morris, Embedding session types in Haskell, in: Proceedings of the 9th International Symposium on Haskell (Haskell 2016), 2016, pp. 133–145. doi:10.1145/2976002.2976018. [4] N. Ng, N. Yoshida, Static deadlock detection for concurrent Go by global session graph synthesis, in: Proceedings of the 25th International Conference on Compiler Construction (CC 2016), 2016, pp. 174–184. doi:10.1145/2892208.2892232. [5] T. B. L. Jespersen, P. Munksgaard, K. F. Larsen, Session types for Rust, in: Proceedings of the 11th ACM SIGPLAN Work- shop on Generic Programming, WGP@ICFP 2015, 2015, pp. 13–22. doi:10.1145/2808098.2808100. [6] K. Honda, N. Yoshida, M. Carbone, Multiparty asynchronous session types, J. ACM 63 (1) (2016) 9. doi:10.1145/2827695. 45 [7] S. J. Gay, M. Hole, Subtyping for session types in the pi calculus, Acta Inf. 42 (2-3) (2005) 191–225. doi:10.1007/s00236-005-0177-z. [8] T. Chen, M. Dezani-Ciancaglini, N. Yoshida, On the preciseness of subtyping in session types, in: 16th International Symposium on Principles and Practice of Declarative Programming (PPDP’14), ACM, 2014, pp. 135–146. doi:10.1145/2643135.2643138. [9] S. J. Gay, Subtyping supports safe session substitution, in: A List of Successes That Can Change the World - Essays Dedicated to Philip Wadler on the Occasion of His 60th Birthday, 2016, pp. 95–108. doi:10.1007/978-3-319-30936-1_5. [10] M. Bravetti, M. Carbone, Undecidability of asynchronous session subtyping, G. Inf. Zavattaro, Comput. To appear. URL http://arxiv.org/abs/1611.05026 [11] J. Lange, N. Yoshida, On the undecidability of asynchronous session subtyping, in: Foundations of Software Science and Computation Structures - 20th International Conference, FOSSACS 2017, 2017, pp. 441–457. doi:10.1007/978-3-662-54458-7_26. [12] D. Mostrous, N. Yoshida, Session typing and asynchronous subtyping for the higher-order π-calculus, Inf. Comput. 241 (2015) 227–263. doi:10.1016/j.ic.2015.02.002. [13] E. Christensen, F. Curbera, G. Meredith, S. Weerawarana, Web Services Description Language (WSDL), Tech. rep., W3C (2001). URL https://www.w3.org/TR/wsdl [14] D. Mostrous, N. Yoshida, K. Honda, Global principal typing in partially commutative asynchronous sessions, in: 18th European Symposium on Programming (ESOP’09), Vol. 5502 of LNCS, Springer, 2009, pp. 316–332. doi:10.1007/978-3-642-00590-9_23. 46 [15] D. Kozen, Automata and computability, Springer, New York, 1997. [16] G. Cécé, duplex A. Finkel, communication, Verification Inf. Comput. doi:10.1016/j.ic.2005.05.006. 47 of 202 programs (2) with (2005) half- 166–190. Appendix A. Proofs of Section 2 Appendix A.1. Proof of Theorem 2.7 and Propositions 2.9 and 2.10 We start by proving Theorem 2.7. This is done by separately showing, as preliminary lemmas, both implications (one in each direction) to hold. The proof of such lemmas will be then also exploited to prove Propositions 2.9 and 2.10. Lemma Appendix A.1. Given two session types T and S, we have that T ≤DC S implies T ≤S. Proof. Given an asynchronous dual closed subtyping relation R we show that R is also a (orphan-message-free) subtyping relation. To this aim we need to prove that if (T, S) ∈ R and T = ⊕{li : Ti }i∈I then the additional item in 2. of Definition 2.4 holds, i.e. • if A 6= [ ]1 then ∀i ∈ I.& ∈ Ti From A 6= [ ]1 it follows that S, after some possible unfoldings, starts with an input (it must be in the form A[Sk ]k∈{1,...,m} ). As R is an asynchronous dual closed subtyping relation we have (S, T ) ∈ R. We observe that S, after some possible unfoldings, starts with an output and T = &{li : T i }i∈I . For item 2. of Definition 2.6, we have that T = A′ [⊕{lj : Vk j }j∈Jk ]k∈{1,...,m} , for some input context A′ . This means that all T i contain at least an output selection, which implies that all Ti contain at least one input branching.  The following lemma states that T ≤S implies T ≤DC S. This is proved by showing that given T ≤S we have also T ≤DC S because there exists an asynchronous dual closed subtyping relation R s.t. (T, S) ∈ R. Such relation is defined as follows: R = {(T, S), (S, T ) | T ≤S}. The proof that each pair (T, S) ∈ R satisfies the items in Definition 2.6 has only one complex case, namely, the one in which we assume S≤T , T = ⊕{li : Ti }i∈I and S = µt1 . . . . µtn .&{lj : Sj }j∈J (case numbered 2b in the proof). In this case we have to reason on all initial output paths of S and use the no orphan message constraint of Definition 2.4 48 to be sure that such paths cannot be infinite, i.e. they eventually end in a state performing an input choice, and moreover each of these reachable input choices must match with the initial input choice of T . Lemma Appendix A.2. Given two session types T and S, we have that T ≤S implies T ≤DC S. Proof. We show that, given T ≤S, it is possible to define an asynchronous dual closed subtyping relation R s.t. (T, S) ∈ R. Consider R = {(T, S), (S, T ) | T ≤S} The relation R is dual closed by definition. It remains to show that it satisfies the four items in Definition 2.6. Let (T, S) ∈ R. There are two cases: T ≤S or S≤T . In the first case all the item holds by definition of orphan-message-free subtyping relation. We consider now the second case, i.e. S≤T , and proceeds with a case analysis. 1. T = end. We have T = end. Having S≤end, by definition of ≤, in particular by n applications of item 4. (with n ≥ 0) and one application of item 1., it follows that S = µt1 . . . . µtn .end. Hence S = µt1 . . . . µtn .end, then we can conclude what requested, i.e., ∃n ≥ 0 such that unfoldn (S) = end. 2. T = ⊕{li : Ti }i∈I . We have T = &{li : T i }i∈I . Having S≤&{li : T i }i∈I , by definition of ≤, we have two possible cases. (a) By n applications of item 4. (with n ≥ 0) and one application of item 3., it follows that S = µt1 . . . . µtn .&{lj : S j }j∈J , with I ⊆ J and unfoldn (S) = &{lj : S ′ j }j∈J with S ′ i ≤T i for every i ∈ I. Hence S = µt1 . . . . µtn . ⊕ {lj : Sj }j∈J , then we can conclude what requested, i.e., unfoldn (S) = [⊕{lj : S ′ j }j∈J ]1 , I ⊆ J and ∀i ∈ I.(Ti , Si′ ) ∈ R. Notice that we have used the fact that unfoldn (S) = unfoldn (S) and we have considered an input context A = []1 . 49 (b) By n applications of item 4. (with n ≥ 0) and one application of item 2., it follows that T = &{li : T i }i∈I = A[⊕{lp : Tk p }p∈Jk ]k∈{1,...,m} (hence with A 6= []1 ), and S = µt1 . . . . µtn . ⊕ {lj : S j }j∈J , with ∀k ∈ {1, . . . , m}.J ⊆ Jk and unfoldn (S) = ⊕{lj : S ′ j }j∈J with ∀j ∈ J.S ′ j ≤A[Tkj ]k∈{1,...,m} . Hence S = µt1 . . . . µtn .&{lj : Sj }j∈J . We now observe that there exists an input context A′ and n′ , m′ ′ ′ such that unfoldn (S) = A′ [⊕{lh : Skh }h∈Lk ]k∈{1,...,m } with ∀k ∈ {1, . . . , m′ }.I ⊆ Lk . This follows from the fact that S≤&{li : T i }i∈I : by repeated application of the rule 2. of Definition 2.4 (that includes the no orphan message constraint), we have the guarantee that along all branches of S (and its unfoldings) it is guaranteed to reach an input branching, and by application of rule 3. (in particular the contra-variance on input branchings), the labels of such choices include the set of labels of the initial input branching of &{li : T i }i∈I . We conclude by showing that what is requested, ′ i.e., ∀i ∈ I.(Ti , A′ [Ski ]k∈{1,...,m } ) ∈ R, actually holds. This follows from the fact that A′ [Ski ]k∈{1,...,m′ } ≤Ti , which is a consequence ′ of S≤T . In fact, this implies that also unfoldn (S)≤T because an orphan-message-free subtyping relation is still such even if we add pairs (unfoldr (V ), Z) assuming (V, Z) already in the relation. Hav′ ing unfoldn (S) = unfoldn (S) = A′ [&{lh : Skh }h∈Lk ]k∈{1,...,m } and ′ ′ T = &{li : T i }i∈I , it is easy to see that, given an orphan-message-free ′ subtyping relation R′ such that (A′ [&{lh : Skh }h∈Lk ]k∈{1,...,m } , &{li : T i }i∈I ) ∈ R′ , the relation obtained by enriching R′ with the pairs ′ (A′′ [Ski ]k∈K⊆{1,...,m }, T ′ i ), where A′′ and types Ti′ , with i ∈ I, are ′ such that (A′′ [&{lh : Sk h }h∈Lk ]k∈K⊆{1,...,m }, &{li : T ′ i }i∈I ) ∈ R′ , is still an orphan-message-free subtyping relation. Above we adopt an abuse of notation for input contexts: B[Wk ]k∈K⊆{1,...,t} does not have holes numbered consistently from 1 to t, but some numbers in {1, . . . , t} could be missing. 3. T = &{li : Ti }i∈I . 50 We have T = ⊕{li : T i }i∈I . Having S≤ ⊕ {li : T i }i∈I , by definition of ≤, in particular by n applications of item 4. (with n ≥ 0) and one application of item 2., it follows that S = µt1 . . . . µtn . ⊕ {lj : S j }j∈J , with J ⊆ I, and unfoldn (S) = ⊕{lj : S ′ j }j∈J with S ′ j ≤T j for every j ∈ J. Hence S = µt1 . . . . µtn .&{lj : Sj }j∈J , then we can conclude what requested, i.e., unfoldn (S) = &{lj : S ′ j }j∈J , J ⊆ I and ∀j ∈ J.(Tj , Sj′ ) ∈ R. Notice that we have used the fact that unfoldn (S) = unfoldn (S). 4. T = µt.T ′ . We first observe that V ≤µt.Z implies V ≤Z{µt.Z/t}. This directly follows from the fact that if (V, µt.Z) belongs to an orphan-message-free subtyping relation, then the same relation enriched with the pair (V, Z{µt.Z/t}) is still an orphan-message-free subtyping relation. We now proceed by considering T = µt.T ′ . As S≤T , we have S≤µt.T ′ . By the above observation we have S≤T ′ {µt.T ′ /t} that implies what requested, i.e., (T ′ {µt.T ′ /t}, S) ∈ R.  Theorem 2.7. Given two session types T and S, we have T ≤S if and only if T ≤DC S. Proof. Direct consequence of Lemmas Appendix A.1 and Appendix A.2. Proposition 2.9.  The ≤tin,tout relation and the ≤sin ∪≤sout relation are asyn- chronous dual closed subtyping relations. Proof. We first show that ≤tin,tout is an asynchronous dual closed subtyping relation. We consider R = {(S, T ) | T ≤tin,tout S} and show that it is an asynchronous subtyping relation when in Definition 2.4 we require I = Jk in item 2. and I = J in item 3. to hold. This implies {(S, T ) | T ≤tin,tout S} ⊆ ≤tin,tout , thus showing that ≤tin,tout is dual closed. Given (T, S) ∈ R, we show that S≤tin,tout T implies items 1.-4. of Definition 2.4 (where we require I = Jk in item 2. and I = J in item 3.), apart from the no orphan message constraint of item 2., by case analysis on the structure of type T exactly as in the proof of Lemma Appendix A.2 (where ≤tin,tout is considered instead of ≤ and all subset inclusions related to covariance/contravariance are replaced by subset equalities). Concerning the 51 no orphan message constraint of item 2., in the case 2.a of the proof of Lemma Appendix A.2 just an [ ]1 input context arises (so it obviously holds); in the case 2.b, instead, a generic input context A′ arises: if A′ 6= [ ]1 then this means that S, after some possible unfoldings, starts with an output and the constraint is an immediate consequence of the fact that S≤tin,tout T (as in the proof of Lemma Appendix A.1). We now show that ≤sin ∪ ≤sout is an asynchronous dual closed subtyping relation. We use T in and T out to denote the set of single-in and single-out session types, respectively. We have ≤sin ∪ ≤sout = (≤ ∩ T in × T in ) ∪ (≤ ∩ T out × T out ) = (≤DC ∩ T in × T in ) ∪ (≤DC ∩ T out × T out ), due to Theorem 2.7. We now show that, for any (T, S) ∈ ≤sin ∪ ≤sout , all constraints considered by Definition 2.6 hold. We take (T, S) ∈ ≤DC ∩ T in × T in , the other case (T, S) ∈ ≤DC ∩ T out × T out is dealt with symmetrically. Since (T, S) ∈ ≤DC we have that (T, S) satisfies all constraints in items 1.-4. of Definition 2.6: we just have to additionally observe that, since all reached pairs belong to ≤DC , they also obviously belong to ≤DC ∩ T in × T in . Concerning the duality constraint, from (T, S) ∈ ≤DC , we have (S, T ) ∈ ≤DC , hence (S, T ) ∈ (≤DC ∩ T out × T out ). Proposition 2.10.  The ≤sin,tout and ≤tin,sout relations are such that: T ≤sin,tout S if and only if S ≤tin,sout T . Proof. Concerning the only if part, we show {(S, T ) | T ≤sin,tout S} ⊆ ≤tin,sout as follows. We consider R = {(S, T ) | T ≤sin,tout S} and show that it is an asynchronous subtyping relation when in Definition 2.4 we require I = J in item 3. to hold and related types to be both single-out. Given (S, T ) ∈ R, we obviously have that S and T are both single-out and we show that T ≤sin,tout S implies items 1.-4. of Definition 2.4 (where in item 3. we require I = J) as in the proof of Proposition 2.9. The only difference is that, when resorting to the case analysis in the proof of Lemma Appendix A.2 we consider ≤sin,tout instead of ≤ and we replace all subset inclusions related to covariance/contravariance in item 3. and the subset inclusion J ⊆ Jk in item 2. by equalities. Concerning the if part, we show {(S, T ) | T ≤tin,sout S} ⊆ ≤sin,tout in a completely symmetric way by observing that R = {(S, T ) | T ≤tin,sout S} is an asyn52 chronous subtyping relation when in Definition 2.4 we require I = Jk in item 2. to hold and related types to be both single-in. In this case, when resorting to the case analysis in the proof of Lemma Appendix A.2 we consider ≤tin,sout instead of ≤ and we replace all subset inclusions related to covariance/contravariance in item 2., apart from J ⊆ Jk , by equalities.  Appendix B. Proofs of Section 3 Appendix B.1. Proof of Proposition 3.4 Proposition 3.4 states that the procedure defined in Figure 2 is a semialgorithm for checking whether T ≤ 6 S. The proof of the proposition is divided in two parts. The first one shows that if it is not possible to reach a judgement in which no rule can be applied, i.e. there exist no Σ′ , T ′ , S ′ such that ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err , then it is possible to define an asynchronous subtyping relation R such that (T, S) ∈ R. The second part shows that if T ≤S then the procedure either continues indefinitely or terminates successfully by application of the Asmp or End rules. Proposition 3.4. Given the types T and S, we have that there exist Σ′ , T ′ , S ′ such that T ≤ 6 S if and only if ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err . Proof. We prove the two implications separately. We start with the only if part and proceed by contraposition, i.e, we assume that it is not true that ∃Σ′ , T ′ , S ′ . ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err and show that T ≤S. In order to do this we need to perform a preliminary observation: under the assumption that it is not true that ∃Σ′ , T ′ , S ′ . ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err , even if we remove rule Asmp from the procedure it is still impossible to reach a judgement Σ′ ⊢ T ′ ≤a S ′ →err , i.e. a judgement on which no rule can be applied. This can be showed as follows. Let →noAsmp be our decision procedure under the assumption that Asmp is not used. Observe that the set of pairs Σ in the judgements is irrelevant for the decision procedure →noAsmp because Asmp is the unique rule influenced by it. Now, by contraposition, assume 53 ∅ ⊢ T ≤a S →∗noAsmp Σ′ ⊢ T ′ ≤a S ′ →err . Since the standard procedure →∗ cannot reach →err , we must have that there exists an intermediary judgement Σ′′ ⊢ T ′′ ≤a S ′′ where Asmp is applied. That is, there exists Σ′′ ⊢ T ′′ ≤a S ′′ such that ∅ ⊢ T ≤a S →∗ Σ′′ ⊢ T ′′ ≤a S ′′ (notice the use of the standard procedure), (T ′′ , S ′′ ) ∈ Σ′′ and Σ′′ ⊢ T ′′ ≤a S ′′ →∗noAsmp Σ′ ⊢ T ′ ≤a S ′ . Within the sequence of rule applications Σ′′ ⊢ T ′′ ≤a S ′′ →∗noAsmp Σ′ ⊢ T ′ ≤a S ′ we consider the last judgement Σ′′′ ⊢ T ′′′ ≤a S ′′′ such that (T ′′′ , S ′′′ ) ∈ Σ′′ (such judgement exists as the first one Σ′′ ⊢ T ′′ ≤a S ′′ already has this property). It is not restrictive to assume that in the sequence Σ′′′ ⊢ T ′′′ ≤a S ′′′ →∗noAsmp Σ′ ⊢ T ′ ≤a S ′ there are no two judgements Σ1 ⊢ T1 ≤a S1 and Σ2 ⊢ T2 ≤a S2 with T1 = T2 and S1 = S2 (otherwise we can shorten the sequence Σ′′′ ⊢ T ′′′ ≤a S ′′′ →∗noAsmp Σ′ ⊢ T ′ ≤a S ′ by removing the steps between the judgements Σ1 ⊢ T1 ≤a S1 and Σ2 ⊢ T1 ≤a S1 ,6 obtaining a new one having the same properties but without the second judgement Σ2 ⊢ T1 ≤a S1 ). Consider now, in the standard application of the procedure ∅ ⊢ T ≤a S →∗ Σ′′ ⊢ T ′′ ≤a S ′′ , the intermediary judgement Σi ⊢ T ′′′ ≤a S ′′′ that added (T ′′′ , S ′′′ ) to the environment. We have that (T ′′′ , S ′′′ ) 6∈ Σi (otherwise rule Asmp was applied that does not introduce any new pair in Σi ) and moreover Σi ⊂ Σ′′ as the sets of type pairs grow monotonically during the execution of the decision procedure →∗ . These last observations guarantee that there exists a standard application of the procedure ∅ ⊢ T ≤a S →∗ Σi ⊢ T ′′′ ≤a S ′′′ →∗ Σ′i ⊢ T ′′′′ ≤a S ′′′′ →err simply by considering from Σi ⊢ T ′′′ ≤a S ′′′ the same rules used in the sequence Σ′′′ ⊢ T ′′′ ≤a S ′′′ →∗noAsmp Σ′ ⊢ T ′ ≤a S ′ . This holds because the pairs of types in the judgements traversed by this sequence are not in Σ′′ (due to the assumption on the judgement Σ′′′ ⊢ T ′′′ ≤a S ′′′ ) hence also not in Σi , and moreover such pairs are all distinct (guaranteed by the assumption on the absence of two judgements Σ1 ⊢ T1 ≤a S1 and Σ2 ⊢ T2 ≤a S2 with T1 = T2 and S1 = S2 ). Consider now the relation R = {(T ′ , S ′ ) | ∃Σ′ . Σ′ ⊢ T ′ ≤a S ′ ∈ S} where S 6 The sequence of rules applied to Σ2 ⊢ T1 ≤a S1 can be applied also to Σ1 ⊢ T1 ≤a S1 because, as already observed, →noAsmp is not sensitive to the differences between Σ1 and Σ2 . 54 is the minimal set of judgements satisfying the following: • ∅ ⊢ T ≤a S ∈ S; • if Σ′ ⊢ T ′ ≤a S ′ ∈ S and Σ′ ⊢ T ′ ≤a S ′ → Σ′′ ⊢ T ′′ ≤a S ′′ , without applying rule Asmp or RecR2 , then Σ′′ ⊢ T ′′ ≤a S ′′ ∈ S; • if Σ′ ⊢ T ′ ≤a S ′ ∈ S and Σ′ ⊢ T ′ ≤a S ′ → Σ′′ ⊢ T ′′ ≤a S ′′ by applying ′ RecR2 , then Σ′′ ⊢ T ′′ ≤a unfoldoutDepth(S ) (S ′ ) ∈ S. We observe that to each judgement Σ′ ⊢ T ′ ≤a S ′ ∈ S it is always possible to apply at least one rule. In fact, if this is not possible, we would have also ∅ ⊢ T ≤a S →∗noAsmp Σ′′ ⊢ T ′′ ≤a S ′′ →err for a judgement Σ′′ ⊢ T ′′ ≤a S ′′ with T ′′ = T ′ and S ′′ less unfolded than S ′ . In fact, the unique difference between the judgements in S and those reachable without adopting Asmp is that those in S are more unfolded (see the difference between outUnf(S) used in rule RecR2 ′ and unfoldoutDepth(S ) (S ′ ) used in the definition of S). We finally show that R is an (orphan-message-free) subtyping relation according to Definition 2.4. Let (T ′ , S ′ ) ∈ R. Then Σ′ ⊢ T ′ ≤a S ′ ∈ S and it is possible to apply at least one rule to Σ′ ⊢ T ′ ≤a S ′ . We proceed by cases on T ′ . • If T ′ = end then item 1. of Definition 2.4 for pair (T ′ , S ′ ) is shown by induction on k = nrec(S ′ ), i.e. the number of unguarded (not prefixed by some input or output) occurrences of recursions µt.S ′′ in S ′ for any S ′′ , t. – Base case k = 0. The only rule applicable to Σ′ ⊢ T ′ ≤a S ′ is End, that immediately yields the desired pair of R. – Induction case k > 0. The only rules applicable to Σ′ ⊢ T ′ ≤a S ′ are Asmp and RecR1 . In the case of Asmp we have that (T ′ , S ′ ) ∈ Σ′ , hence there exists Σ′′ with (T ′ , S ′ ) ∈ / Σ′′ such that Σ′′ ⊢ T ′ ≤a S ′ ∈ S. RecR1 can be applied to Σ′′ ⊢ T ′ ≤a S ′ . So for some Σ′′′ (= Σ′ or = Σ′′ ) we have that the procedure applies rule RecR1 to Σ′′′ ⊢ T ′ ≤a S ′ . Hence Σ′′′ ⊢ T ′ ≤a S ′ → Σ′′′′ ⊢ T ′ ≤a unfold1 (S ′ ). Since 55 nrec(unfold1 (S ′ )) = k − 1, by induction hypothesis item 1. of Definition 2.4 holds for pair (T ′ , unfold1 (S ′ )), hence it holds for pair (T ′ , S ′ ). • If T ′ = ⊕{li : Ti }i∈I then item 2. of Definition 2.4 for pair (T ′ , S ′ ) is shown as follows. – If outDepth(S ′ ) = 0 then the only rule applicable to Σ′ ⊢ T ′ ≤a S ′ is Out, that immediately yields the desired pairs of R. – If outDepth(S ′ ) ≥ 1 then the only rules applicable to Σ′ ⊢ T ′ ≤a S ′ are Asmp and RecR2 . In the case of Asmp we have that (T ′ , S ′ ) ∈ Σ′ , hence there exists Σ′′ with (T ′ , S ′ ) ∈ / Σ′′ such that Σ′′ ⊢ T ′ ≤a S ′ ∈ S. RecR2 can be applied to Σ′′ ⊢ T ′ ≤a S ′ . So for some Σ′′′ (= Σ′ or = Σ′′ ) we have that the procedure applies rule RecR2 ′ to Σ′′′ ⊢ T ′ ≤a S ′ . Hence (T ′ , unfoldoutDepth(S ) (S ′ )) ∈ R. Since ′ outDepth(unfoldoutDepth(S ) (S ′ )) = 0, we end up in the previous case. ′ Therefore item 2. of Definition 2.4 holds for pair (T ′, unfoldoutDepth(S )(S ′ )), hence it holds for pair (T ′ , S ′ ). • If T ′ = &{li : Ti }i∈I then item 3. of Definition 2.4 for pair (T ′ , S ′ ) is shown by induction on k = nrec(S ′ ). – Base case k = 0. The only rule applicable to Σ′ ⊢ T ′ ≤a S ′ is In, that immediately yields the desired pairs of R. – Induction case k > 0. The only rules applicable to Σ′ ⊢ T ′ ≤a S ′ are Asmp and RecR1 . In the case of Asmp we have that (T ′ , S ′ ) ∈ Σ′ , hence there exists Σ′′ with (T ′ , S ′ ) ∈ / Σ′′ such that Σ′′ ⊢ T ′ ≤a S ′ ∈ S. RecR1 can be applied to Σ′′ ⊢ T ′ ≤a S ′ . So for some Σ′′′ (= Σ′ or = Σ′′ ) we have that the procedure applies rule RecR1 to Σ′′′ ⊢ T ′ ≤a S ′ . Hence Σ′′′ ⊢ T ′ ≤a S ′ → Σ′′′′ ⊢ T ′ ≤a unfold1 (S ′ ). Since nrec(unfold1 (S ′ )) = k − 1, by induction hypothesis item 3. of Definition 2.4 holds for pair (T ′ , unfold1 (S ′ )), hence it holds for pair (T ′ , S ′ ). 56 • If T ′ = µt.T ′ then item 4. of Definition 2.4 for pair (T ′ , S ′ ) holds because the only rule applicable to Σ′ ⊢ T ′ ≤a S ′ is RecL that immediately yields the desired pair of R. We now prove the if part and proceed by contraposition. We assume that T ≤S and show that there exist no Σ′ , T ′ , S ′ , such that ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err . So we can assume the existence of a relation R that is an (orphan-message-free) subtyping relation, according to Definition 2.4, such that (T, S) ∈ R. We say that Σ ⊢ T ≤a S →w Σ′ ⊢ T ′ ≤a S ′ if Σ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ and: the last rule applied is one of Out, In or RecL rules; while all previous ones are RecR1 or RecR2 rules. As another notation we use input-output-end contexts B defined as the input contexts in Definition 2.3 with the difference that also the output construct and end are part of the grammar in the definition. We start by showing that ∃Σ. ∅ ⊢ T ≤a S →∗w Σ ⊢ T ′ ≤a S ′ implies S ′ = B[Sk ]k∈{1...m} , Sk = µtk .Sk′ , for some tk and Sk′ , and ∃n1 , . . . , nm . (T ′ , B[unfoldnk (Sk )]k∈{1...m} ) ∈ R. The proof is by induction on the length of such computation →∗w . The base case is for a 0 length computation: it yields (T, S) ∈ R which holds. For the inductive case we assume it to hold for all computations of a length k and we show it to holds for all computations of length k + 1, by considering all judgements Σ′ ⊢ T ′′ ≤a S ′′ such that Σ ⊢ T ′ ≤a S ′ →w Σ′ ⊢ T ′′ ≤a S ′′ . This is shown by first considering the case in which rule Asmp applies to Σ ⊢ T ′ ≤a S ′ : in this case there is no such a judgement and there is nothing to prove. Then we consider the case in which T ′ = end and Σ ⊢ end ≤a S ′ →∗ Σ′′′ ⊢ end ≤a end (by applying RecR1 rules) and rule End applies to Σ′′′ ⊢ end ≤a end. Also in this case there is no such a judgement Σ′ ⊢ T ′′ ≤a S ′′ and there is nothing to prove. Finally, we proceed by an immediate verification that judgements Σ′ ⊢ T ′′ ≤a S ′′ produced in remaining cases are required to be in R by items 2., 3. and 4. of Definition 2.4: T ′ = ⊕{li : Ti }i∈I (→w is a possibly empty sequence of RecR2 applications followed by Out application), T ′ = &{li : Ti }i∈I (→w is a possibly empty sequence 57 of RecR1 applications followed by In application) or T ′ = µt.T ′ (→w is simply RecL application). We finally observe that, given a judgement Σ ⊢ T ′ ≤a S ′ such that S ′ = B[Sk ]k∈{1...m} , Sk = µtk .Sk′ , for some tk and Sk′ , and ∃ n1 , . . . , nm . (T ′ , B[unfoldnk (Sk )]k∈{1...m} ) ∈ R we have: • either rule Asmp applies to Σ ⊢ T ′ ≤a S ′ , or • T ′ = end and, by item 1. of Definition 2.4, there exists Σ′ such that Σ ⊢ end ≤a S ′ →∗ Σ′ ⊢ end ≤a end (by applying RecR1 rules) and rule End is the unique rule applicable to Σ′ ⊢ end ≤a end, with RecR1 being the unique rule applicable to intermediate judgements, or • by items 2., 3. and 4. of Definition 2.4, there exist Σ′ , T ′′ , S ′′ such that Σ ⊢ T ′ ≤a S ′ →∗w Σ′ ⊢ T ′′ ≤a S ′′ , with each intermediate judgement having a unique applicable rule. In particular this holds for T ′ = ⊕{li : Ti }i∈I (→w is a possibly empty sequence of RecR2 applications followed by Out application), T ′ = &{li : Ti }i∈I (→w is a possibly empty sequence of RecR1 applications followed by In application) or T ′ = µt.T ′ (→w is simply RecL application).  Appendix B.2. Proof of Theorem 3.5 Theorem 3.5 states that ≤ka indeed provides an algorithm for checking whether T ≤ 6 k S, this is proved in the following by also resorting to the proof of Proposition 3.4. Theorem 3.5. The algorithm for ≤ka always terminates and, given the types T and S, there exist Σ′ , T ′ , S ′ such that ∅ ⊢ T ≤ka S →∗ Σ′ ⊢ T ′ ≤a S ′ →err if and only if T ≤ 6 k S. Proof. We first observe that the decision algorithm for k-bounded asynchronous subtyping terminates. By contraposition, if the algorithm does not terminate, there exists an infinite sequence Σ ⊢ T ≤a S → Σ1 ⊢ T1 ≤a S1 →∗ Σi ⊢ Ti ≤a Si →∗ . Along this infinite sequence infinitely many distinct pairs (T, S) will be added to Σ. As only finitely many distinct terms can be reached as 58 first element of the pairs, there will be infinitely many distinct terms as second element. Such terms will have unbounded depth, but this is not possible due to the constraint added to rule Out that impose the use of k-bounded input contexts. We now prove that, given the types T and S, there exist Σ′ , T ′ , S ′ such that ∅ ⊢ T ≤ka S →∗ Σ′ ⊢ T ′ ≤a S ′ →err if and only if T ≤ 6 k S. We start with the if part and proceed by contraposition. We assume that it is not true that ∃Σ′ , T ′ , S ′ . ∅ ⊢ T ≤ka S →∗ Σ′ ⊢ T ′ ≤ka S ′ →err and we build a relation R that we show to be a k-bounded Asynchronous Subtyping relation. The relation R is built from the judgments Σ′′ ⊢ T ′′ ≤ka S ′′ exactly as we did for the ≤a subtyping procedure in the first part (the if part) of the proof of Proposition 3.4. In such a proof we show R to be an orphanmessage-free subtyping relation, hence we just have to show it to be k-bounded. It is immediate to observe that, since when applying rule Out to a judgment Σ′′ ⊢ T ′′ ≤ka S ′′ we require the input context A to be k-bounded, we may include in R only pairs (T ′′ , S ′′ ) that satisfy the same constraint in item 2 of kbounded Asynchronous Subtyping relation definition (Definition 2.11), because otherwise we would have Σ′′ ⊢ T ′′ ≤ka S ′′ →∗ Σ′′′ ⊢ T ′′′ ≤ka S ′′′ →err by possibly applying RecR1 /RecR2 rules. Hence, as justified in Proposition 3.4 this would lead to violating the assumption that the algorithm does not reach an error. The justification provided there still holds because judgments Σ′′ ⊢ T ′′ ≤ka S1′′ and Σ′′ ⊢ T ′′ ≤ka S2′′ , with S1′′ and S2′′ that just differ for the level of internal unfoldings, behave equivalently with respect to errors due to k-boundedness violations. This because the k-boundedness of context A is established by the Out rule after unfolding in S1′′ /S2′′ all recursions occurring before the first output of every possible branch by means of the RecR1 /RecR2 rules. We now prove the only if part and proceed by contraposition. We assume that T ≤k S and show that there exist no Σ′ , T ′ , S ′ , such that ∅ ⊢ T ≤ka S →∗ Σ′ ⊢ T ′ ≤ka S ′ →err . If T ≤k S then also T ≤S. So we can assume the existence of a relation R that is an orphan-message-free subtyping relation such that (T, S) ∈ R. We then use exactly the same proof as that of the second part 59 (the only if part) of the proof of Proposition 3.4 to establish a correspondance between judgements Σ′′ ⊢ T ′′ ≤ka S ′′ , such that ∅ ⊢ T ≤ka S →∗w Σ′′ ⊢ T ′′ ≤ka S ′′ , and pairs in R (see the construction of the corresponding pair in the proof of Proposition 3.4). Since R includes only pairs that satisfy the constraint in item 2 of k-bounded Asynchronous Subtyping relation definition (Definition 2.11) requiring context A to be k-bounded; and since any judgment Σ′′ ⊢ T ′′ ≤ka S ′′ such that ∅ ⊢ T ≤ka S →∗w Σ′′ ⊢ T ′′ ≤ka S ′′ implies there is in R a corresponding pair (T ′′ , S1′′ ), with S1′′ differing from S ′′ just for the level of internal unfoldings, we have that reachable judgments Σ′′ ⊢ T ′′ ≤ka S ′′ cannot be such that: Σ′′ ⊢ T ′′ ≤ka S ′′ →∗ Σ′′′ ⊢ T ′′′ ≤ka S ′′′ , by possibly applying RecR1 /RecR2 rules, and Σ′′′ ⊢ T ′′′ ≤ka S ′′′ →err due to not satisfying the requirement about the input context A to be k-bounded in the rule Out. This because the difference in unfolding levels between S ′′ and S1′′ (inside judgment Σ′′ ⊢ T ′′ ≤ka S ′′ and the corresponding pair (T ′′ , S1′′ ) in R) is not significant: the k-boundedness of context A is established both in the rule Out and in item 2 of ≤k definition after unfolding all recursions occurring before the first output of every possible branch. This observation makes it possible to carry out the proof as in Proposition 3.4, hence to show that there exist no Σ′ , T ′ , S ′ , such that ∅ ⊢ T ≤ka S →∗ Σ′ ⊢ T ′ ≤ka S ′ →err .  Appendix B.3. Proof of Proposition 3.10 We start by providing the proof of the first part of Proposition 3.10, i.e. finiteness of reach(T ) for single-out session types T , as a separate preliminary lemma, then we move to proving the second part, i.e. decidability of antOutInf(T ). Lemma Appendix B.1. Given a single-out session type T , reach(T ) is finite. Proof. We now define a finite set of session types fin(T ), and then we prove that it satisfies all the constraints 1., . . . , 4. in Definition 3.9. Hence reach(T ) ⊆ fin(T ) by definition, from which finiteness of reach(T ) follows. 60 It is not restrictive to assume that all the recursion variables of T are distinct: let x1 , . . . , xn be such variables. We consider the rewriting variables X1 , . . . , Xn . Let Ti be such that µxi .Ti occurs in T ; let T ′ be T with Xi that replaces µxi .Ti ; and similarly let Ti′ be Ti with Xj that replaces each occurrence of µxj .Tj and xj . We now consider the rewriting rules Xi →1i Ti′ and Xi →2i xi . Given one of the above term S containing rewriting variables, we denote with close(S) the session type obtained by repeated application of the rewriting rules in the following way: if Xi occurs inside a subterm µxi .S ′ apply →2i , otherwise apply →1i . We now define another closure function on sets of terms S: subterms(S) = {S ′ |S ′ is a subterm of S ∈ S}. Consider finally fin(T ) = {close(S)|S ∈ subterms({T ′ , T1′ , . . . , Tn′ })}. We have that fin(T ) is finite and it satisfies all the constraints 1., . . . , 4. in Definition 3.9.  We now report some definitions and preliminary results used in the proof of Proposition 3.10 concerning the second part about decidability of antOutInf(T ) for single-out session types T . We introduce the relation antEqT : intuitively, (T ′ , T ′′ ) ∈ antEqT if T ′ and T ′′ are terms in reach(T ) capable of anticipating the same infinite sequence of outputs. For instance, assuming that the following T ′ = µt. ⊕ {l : &{l1 : ⊕{l′ : t}, l2 : ⊕{l′ : t}}} and T ′′ = µt.&{l1 : ⊕{l : ⊕{l′ : t}}} belong to reach(T ), for some session type T , we have that (T ′ , T ′′ ) ∈ antEqT because they can anticipate the sequence of outputs l and l′ , indefinitely. Definition Appendix B.2. Let T be a single-out session type. A relation R over reach(T ) is an antEqT relation if (T ′ , T ′′ ) ∈ R implies: there exist l, A′ , A′′ such that outUnf(T ′ ) = A′ [⊕{l : Ti′ }]i∈{1,...,n} and outUnf(T ′′ ) = A′′ [⊕{l : Tj′′ }]j∈{1,...,m} , with (Ti′ , Tj′′ ) ∈ R for all i ∈ {1, . . . , n} and j ∈ {1, . . . , m}. We say that T ′ antEqT T ′′ if there is an antEqT relation R such that (T ′ , T ′′ ) ∈ R. Notice that antEqT itself is an antEqT relation because, obviously, the union of two antEqT relations is an antEqT relation and reach(T ) is finite. Moreover notice that, given a term T ′ ∈ reach(T ), all terms Ti′ (with i ∈ {1, . . . , n}) for which outUnf(T ′ ) = A′ [⊕{l : Ti′ }]i∈{1,...,n} are always such that Ti′ ∈ reach(T ) 61 as well (because outUnf(T ′ ) never unfolds recursions occurring inside terms Ti′ ). Finally, notice that antEqT is decidable in that it is a relation over reach(T ), which is a finite set. Definition Appendix B.3. antSetT is the field of antEqT , that is the set of session types T ′ ∈ reach(T ) such that there exists T ′′ with (T ′ , T ′′ ) ∈ antEqT or (T ′′ , T ′ ) ∈ antEqT . Lemma Appendix B.4. antEqT is an equivalence relation on antSetT . Proof. The reflexive, symmetric and transitive closure of an antEqT relation is an antEqT relation, hence this holds true for antEqT as well.  Lemma Appendix B.5. Let T ′ ∈ reach(T ). We have that antOutInf(T ′ ) if and only if T ′ ∈ antSetT . Proof. We prove the two implications separately, starting from the if part, e.g. by assuming T ′ ∈ antSetT . By Lemma Appendix B.4 we have T ′ antEqT T ′ . We now prove by induction on m that for every m there exists li1 · · · lim such that antOut(T ′ , li1 · · · lim ) is defined. If m = 1 it is sufficient to consider li1 = l where outUnf(T ′ ) = A′ [⊕{l : Ti′ }]i∈{1,...,n} (with A′ and Ti′ that exist by Definition Appendix B.2). Consider now that T ′′ = antOut(T ′ , li1 · · · lim−1 ) is defined. By Definition 3.8, we have T ′′ = A[Tk ]k with outUnf(antOut(T, li1 · · · lim−2 )) = A[⊕{lim−1 : Tk }]k . As T ′ antEqT T ′ , we can apply m−1 times Definition Appendix B.2 to conclude that Ti antEqT Tj , for every i, j ∈ 1 . . . k. This guarantees the existence of the input contexts Ak , session types Trk , and label l such that such that outUnf(Tk ) = Ak [⊕{l : Trk }]r . This implies that it is possible to define antOut(T ′′ , l) hence also antOut(T ′ , li1 · · · lim ) by taking lim = l. We now move to the only if part assuming that there exists an infinite label sequence li1 · · · lin · · · such that, for every n, antOut(T ′ , li1 · · · lin ) is defined. Let R be the minimal relation such that (T ′ , T ′ ) ∈ R and: outUnf(antOut(T ′ , li1 · · · lin−1 )) = A[⊕{lin : Tk }]k∈{1...mn } , for any n ≥ 1, implies ∀i, j ∈ {1 . . . mn }. (Ti , Tj ) ∈ R. We now show that R above is an antEqT relation. Considered any (T ′′ , T ′′′ ) in 62 R, we have that there exists h, with h ≥ 1, such that, for some A′ , A′′ , we have: ′ ′′ outUnf(T ′′ ) = A′ [⊕{lih : Ti′ }]i∈{1,...,m } and outUnf(T ′′′ ) = A′′ [⊕{lih : Tj′′ }]j∈{1,...,m } , with (Ti′ , Tj′′ ) ∈ R for all i ∈ {1, . . . , m′ } and j ∈ {1, . . . , m′′ }. This holds, according to the definition of R: for (T ′′ , T ′′′ ) = (T ′ , T ′ ) by taking h = 1 and by observing that pairs (Ti′ , Tj′′ ) ∈ R because they are added to R in the case n = 1; for any (T ′′ , T ′′′ ) added to R in the case n, by taking h = n + 1 and by observing that pairs (Ti′ , Tj′′ ) ∈ R because they are among the pairs that are added to R in the case n + 1. Proposition 3.10.  Given a single-out session type T , reach(T ) is finite and it is decidable whether antOutInf(T ). Proof. Direct consequence of Lemmas Appendix B.1, Lemma Appendix B.5 and the finiteness of antSetT .  Appendix B.4. Proof of Theorem 3.11 Theorem 3.11 states that, for single-out session types T and S, the algorithm provided by T ≤t S indeed terminates. The proof is based on characterizing terms S ′′ such that (T ′′ , S ′′ ) ∈ Σ′ for any judgment Σ′ ⊢ T ′ ≤t S ′ reached by the algorithm. In particular, we show that any such term S ′′ can be obtained by anticipating a sequence of output labels γ in a term R belonging to the finite set reach(S). This preliminary result is proved by means of the following lemma and corollary. Lemma Appendix B.6 states that given a type S ′ at the right hand side of a judgement reachable during the execution of our algorithm, i.e. ∅ ⊢ T ≤t S →∗ Σ′ ⊢ T ′ ≤t S ′ for some initial types T and S, the type S ′ (and the types in reach(S ′ )) can be obtained from the initial type S (or one of the types in reach(S)) by means of anticipation of a sequence of output labels, i.e. for all Q ∈ reach(S ′ ) there exist R ∈ reach(S) and a sequence of labels γ such that Q = antOut(R, γ). There is only one case in which this property is not guaranteed to hold, namely, when the last applied rule in ∅ ⊢ T ≤t S →∗ Σ′ ⊢ T ′ ≤t S ′ is 63 RecR2 . As a counter-example, consider for instance ∅ ⊢ µt. ⊕ {l : ⊕{l : &{l′ : t}}} ≤t µt.&{l′ : ⊕{l : t}} →∗ Σ′ ⊢ ⊕{l : &{l′ : µt. ⊕ {l : ⊕{l : &{l′ : t}}}}} ≤t &{l′ : &{l′ : ⊕{l : µt.&{l′ : ⊕{l : t}}}}} where →∗ denotes application of the sequence of rules RecL, RecR2 , Out and RecR2 . We have that the last type &{l′ : &{l′ : ⊕{l : µt.&{l′ : ⊕{l : t}}}}} is different from antOut(R, γ), for every R ∈ reach(µt.&{l′ : ⊕{l : t}}) and every sequence of labels γ. Lemma Appendix B.6. Consider two single-out session types T and S. Given a judgement Σ′ ⊢ T ′ ≤t S ′ such that ∅ ⊢ T ≤t S →∗ Σ′ ⊢ T ′ ≤t S ′ , in such a way that the final rule applied is not RecR2 , we have that for all Q ∈ reach(S ′ ) there exist R ∈ reach(S) and a sequence of labels γ such that Q = antOut(R, γ). Proof. By induction on the length of the sequence of rule applications ∅ ⊢ T ≤t S →∗ Σ′ ⊢ T ′ ≤t S ′ . In the base case we have S ′ = S. Consider now Q ∈ reach(S ′ ). Obviously Q = antOut(Q, ǫ) with Q ∈ reach(S) because reach(S) = reach(S ′ ). In the inductive case we proceed by case analysis on the last rule application Σ′′ ⊢ T ′′ ≤t S ′′ → Σ′ ⊢ T ′ ≤t S ′ . We have two possible cases: • We can apply the induction hypotheses on the judgement Σ′′ ⊢ T ′′ ≤t S ′′ . Hence for all Q′′ ∈ reach(S ′′ ) there exist R ∈ reach(S) and a sequence of labels γ such that Q′′ = antOut(R, γ). Consider now Q ∈ reach(S ′ ). We proceed by cases on the applied rule. For the rules In, RecR1 and Out with A = [ ]1 we have that S ′ ∈ reach(S ′′ ) hence also Q ∈ reach(S ′′ ) because if S ′ ∈ reach(S ′′ ) then reach(S ′ ) ⊆ reach(S ′′ ) by definition of reach( ). If the rule is Out with A 6= [ ]1 we have that S ′ = antOut(R, γ · l) with R ∈ reach(S) and γ such that S ′′ = antOut(R, γ) and l is the label of the anticipated output. We limit our analysis to the case in which Q 6∈ 64 reach(S ′′ ) (in the other cases we can proceed as above). This happens if Q is obtained by applying rule 2. of Definition 3.9 to remove some but not all the inputs in front of one of the output anticipated in S ′′ . Consider now the term V being like Q but without the l output anticipation. Formally, V is defined as follows. Denoted S ′′ with A[⊕{lj : Skj }j∈Jk ]k we know that for all k there exists a jk such that ljk = l. This means that S ′ is A[Skjk ]k . Hence, being Q reachable from S ′ by consuming some inputs of the input context A only, we have that there exists A′ such that Q is ′ h A′ [Shj ′ ] , where, considered the hole k corresponding to the hole h, we h ′ have that jh′ = jk and Shj ′ = Skjk . Therefore, the previously mentioned h ′ }j∈Jh ]h , where, considered k corresponding to h, term V is A′ [⊕{lj : Shj we have that Jh = Jk . We conclude by observing that V ∈ reach(S ′′ ), hence there exist R′ ∈ reach(S) and γ ′ such that V = antOut(R′ , γ ′ ). But Q = antOut(R′ , γ ′ · l), hence proving the thesis. • We cannot apply the induction hypotheses on the judgement Σ′′ ⊢ T ′′ ≤t S ′′ because the rule used to obtain Σ′′ ⊢ T ′′ ≤t S ′′ is RecR2 . As RecR2 cannot be applied in sequence, it is surely possible to apply the induction hypothesis on the previous judgement Σ′′′ ⊢ T ′′′ ≤t S ′′′ such that Σ′′′ ⊢ T ′′′ ≤t S ′′′ → Σ′′ ⊢ T ′′ ≤t S ′′ . Then we have that for all Q′′′ ∈ reach(S ′′′ ) we have Q′′′ = antOut(R, γ) with R ∈ reach(S) and a sequence of labels γ. We also have that the rule applied in Σ′′ ⊢ T ′′ ≤t S ′′ → Σ′ ⊢ T ′ ≤t S ′ is Out, which is the only rule that can applied after RecR2 . Let l be the label of the output involved in the application of the Out rule. Consider now Q ∈ reach(S ′ ). We consider two possible cases: – Q is obtained from S ′ by consuming inputs present in the input context A used in the last application of the rule Out. Consider now Q′′′ obtained from S ′′′ by consuming the same inputs and performing the needed unfoldings. Obviously Q′′′ ∈ reach(S ′′′ ): hence, by induction hypothesis, Q′′′ = antOut(R, γ) with R ∈ reach(S). We have Q = antOut(R, γ · l) hence proving the thesis. 65 – Q is obtained from S ′ by consuming strictly more than a sequence of inputs present in the input context A used in the last application of the rule Out. This means that Q ∈ reach(W ) where W is a term starting with an output that populates one of the holes of A in S ′′ . But the terms starting with an output that can occur in S ′′ , assuming ∅ ⊢ T ≤t S →∗ Σ′′ ⊢ T ′′ ≤t S ′′ , are already in reach(S). In fact the rules do not perform transformations under outputs, excluding those strictly performed by top level unfoldings. Hence W ∈ reach(S), which implies Q ∈ reach(S) from which the thesis trivially follows (because Q = antOut(Q, ǫ)).  Corollary Appendix B.7. Consider two single-out session types T and S. Given a judgement Σ′ ⊢ T ′ ≤t S ′ such that ∅ ⊢ T ≤t S →∗ Σ′ ⊢ T ′ ≤t S ′ and a pair (T ′′ , S ′′ ) ∈ Σ′ , we have that S ′′ = antOut(R, γ) for some R ∈ reach(S) and a sequence of labels γ. Proof. Let (T ′′ , S ′′ ) ∈ Σ′ and consider the sequence of rule applications ∅ ⊢ T ≤t S →∗ Σ′′ ⊢ T ′′ ≤t S ′′ that preceeds the application of the rule that introduces (T ′′ , S ′′ ) in Σ′ . Such rule must be one of RecL, RecR1 or RecR2 : hence on the judgement Σ′′ ⊢ T ′′ ≤t S ′′ it is possible to apply one of these three rules. Since after the application of a rule RecR2 the uniqe applicable rule is Out, we have the guarantee that the last rule in ∅ ⊢ T ≤t S →∗ Σ′′ ⊢ T ′′ ≤t S ′′ is not RecR2 . Hence it is possible to apply Lemma Appendix B.6, from which the thesis directly follows. Theorem 3.11.  Given two single-out session types T and S, the algorithm applied to the initial judgement ∅ ⊢ T ≤t S terminates. Proof. Assume by contraposition that there exists single-out session types T and S such that the algorithm applied to the initial judgement ∅ ⊢ T ≤t S does not terminate. This means that there exists an infinite sequence of rule applications ∅ ⊢ T ≤t S → Σ1 ⊢ T1 ≤t S1 →∗ Σi ⊢ Ti ≤t Si →∗ . Within this infinite sequence, there are infinitely many applications of the unfolding rules RecL, RecR1 or RecR2 , that implies the existence of infinitely many distinct pairs 66 (Tj , Sj ) that are introduced in the environment (assuming that j ranges over the instances of application of such rules). All these pairs are distinct, otherwise the precedence of the Asmp rule would have blocked the algorithm. It is obvious that the distinct r.h.s. Tj are finitely many, because every Tj ∈ reach(T ), which is a finite set. On the contrary, the distinct Sj are infinitely many, but Corollary Appendix B.7 guarantees that for each of them, there exists Sj′ ∈ reach(S) and a sequence of labels γj such that Sj = antOut(Sj′ , γj ). Due to the finiteness of the possible Tj and Sj′ , there exists T ′′ and S ′′ such that there exists an infinite subsequence of (Tj1 , Sj1 ), (Tj2 , Sj2 ), . . . , (Tjk , Sjk ), . . . such that Tji = T ′′ and Sji = antOut(S ′′ , γji ). It is not restrictive to consider jh < jh+1 for every h. The presence of infinitely many distinct γji for which antOut(S ′′ , γji ) is defined, guarantees antOutInf(S ′′ ). Moreover, this guarantees also the possibility to define an infinite subsequence (Tjl1 , Sjl1 ), (Tjl2 , Sjl2 ), . . . , (Tjlk , Sjlk ), . . . such that |γjli| < |γjli+1|. We now consider the leaf sets leafSet(Sjli). These sets are defined on a finite domain because the subterms of such types starting with a recursive definition or an output, and preceded by inputs only, are taken from reach(S). This because the algorithm does not apply transformations under recursive definitions or outputs, excluding the effect of the standard top level unfolding of previous recursive definitions, which is considered in the definition of reach(S). Hence there are only finitely many distinct leafSet(Sjli ), that guarantees the existence of v < w such that leafSet(Sjlv ) = leafSet(Sjlw ). Consider now the judgement Σjlw ⊢ Tjlw ≤t Sjlw . We know that (Tjlv , Sjlv ) ∈ Σjw , Tjlv = Tjlw , Sjlv = antOut(S ′′ , γjlv ), Sjlw = antOut(S ′′ , γjlw ), S ′′ ∈ reach(S), and |γjlv | < |γjlv |. Hence it is possible to apply to such judgement the rule Asmp2 . As Asmp2 has priority, it should be applied on this judgement thus blocking the sequence of rule applications. But this contradicts the initial assumption of non termination of the algorithm.  Appendix B.5. Proof of Theorem 3.12 The soundness Theorem 3.12 states that the ≤t algorithm reaches →err if and only if the ≤a procedure does so. This is proved in the following by 67 resorting to some preliminary definitions and results. In Definition Appendix B.2 we have defined the relation antEqT among types that have the same infinite sequence of outputs that can be anticipated. But, in order to have a decidable relation, we had to limit to types belonging to the set reach(T ). Now, we define a more general relation extAntEqT applicable to types having (once unfolded) the following shape: any possible input context with holes filled with single outputs having a continuation belonging to reach(T ). This extension of the antEqT is necessary because the execution of the subtyping algorithm can generate new terms (as a consequence of output anticipations) having this specific shape. Definition Appendix B.8. Let T ′ , T ′′ be single-out session types. We say that T ′ extAntEqT T ′′ if there exist l, A′, A′′ such that outUnf(T ′ ) = A′ [⊕{l : Ti′ }]i∈{1,...,n} and outUnf(T ′′ ) = A′′ [⊕{l : Tj′′ }]j∈{1,...,m} , with Ti′ antEqT Tj′′ for all i ∈ {1, . . . , n} and j ∈ {1, . . . , m}. Moreover, extAntSetT is the field of extAntEqT . Notice that, all terms Ti′ , with i ∈ {1, . . . , n} and Tj′′ , with j ∈ {1, . . . , m}, are in antSetT ⊆ reach(T ). Moreover, notice that extAntEqT is obviously an equivalence relation on extAntSetT . Lemma Appendix B.9. Let T ′ ∈ antSetT and T ′′ = antOut(T ′ , γ) for some γ. We have that T ′′ ∈ extAntSetT . Proof. We have to show that there exist l, A for which we have outUnf(antOut(T ′, γ)) = A[⊕{l : Ti }]i∈{1,...,m} , with Ti antEqT Tj for all i, j ∈ {1, . . . , m}. We denote γl = li1 · · · lih , with h ≥ 1. For any n, with 1 ≤ n ≤ h, considered A′ and terms Tk with k ∈ {1 . . . mn } such that outUnf(antOut(T ′ , li1 · · · lin−1 )) = A′ [⊕{lin : Tk }]k∈{1...mn } , we have that ∀i, j ∈ {1 . . . mn }. Ti antEqT Tj . This is easily shown by induction on n, applying the definition of antEqT (the base case is directly derived from T ′ antEqT T ′ ). The case n = h yields the desired result.  68 Lemma Appendix B.10. Let T ′, T ′′ ∈ extAntSetT and leafSet(T ′ ) = leafSet(T ′′ ). We have that T ′ extAntEqT T ′′ . Proof. It is easy to see that leafSet(T ′ ) = leafSet(T ′′ ) implies leafSet(outUnf(T ′ )) = leafSet(outUnf(T ′′ )). This because outUnf() causes a leaf T ′′′ belonging to both leafSet(T ′ ) and leafSet(T ′′ ) to yield the same new set of leaves leafSet(T ′′′ ) in both T ′ and T ′′ . By definition of extAntSetT we have that exist l′ , A′ such that outUnf(T ′ ) = A′ [⊕{l′ : Ti′ }]i∈{1,...,n} , with Ti′ antEqT Tj′ for all i, j ∈ {1, . . . , n}. Similarly, there exist l′′ , A′′ such that outUnf(T ′′ ) = A′′ [⊕{l′′ : Tj′′ }]j∈{1,...,m} , with Ti′′ antEqT Tj′′ for all i, j ∈ {1, . . . , m}. From the fact that leafSet(outUnf(T ′ )) = leafSet(outUnf(T ′′ )) we have that l′ = l′′ and that: for all Ti′ , with i ∈ {1, . . . , n}, there exists Tj′′ , with j ∈ {1, . . . , m}, such that Ti′ = Tj′′ ; and, vice versa, for all Tj′′ , with j ∈ {1, . . . , m}, there exists Ti′ , with i ∈ {1, . . . , n}, such that Tj′′ = Ti′ . Therefore we conclude that T ′ extAntEqT T ′′ .  In order to prove Theorem 3.12 we also need to consider a simplified subtyping procedure, whose judgments are denoted by ≤sa , and the notions of IO steps, blocking judgments and blocking paths. Simplified Subtyping Procedure. We here denote by ≤sa the judgements of the subtyping procedure that is defined exactly as our procedure (defined in Section 3.1 and based on applications of the rules therein over judgments of the form Σ ⊢ T ≤a S) with the only difference that the Asmp rule is removed (i.e. the subtyping procedure whose transitions were denoted by →noAsmp in the proof of Proposition 3.4). Since, in the absence of the Asmp rule the content of environment Σ is never accessed for reading, it has no actual effect on the procedure (on rule applications) and can be removed as well, together with updates on such environment made by the rules. As a consequence we will denote ≤sa judgments just by ⊢ T ≤sa S for some T and S. Here, differently from the →noAsmp notation used in the proof of Proposition 3.4, since we adopt a new notation for judgements, we will simply use: ⊢ T ≤sa S → ⊢ T ′ ≤sa S ′ to denote that the latter can be obtained from the former by one rule application. Finally, as usual, ⊢ T ≤sa S →err denotes that there is no rule that can be 69 applied to the judgement ⊢ T ≤sa S. Definition Appendix B.11. A blocking judgment ⊢ T ≤sa S, denoted by ⊢ T ≤sa S →blk , is a judgment such that, for some T ′ , S ′ we have: ⊢ T ≤sa S →∗ ⊢ T ′ ≤sa S ′ →err by applying rules RecL, RecR1 and RecR2 only. a Definition Appendix B.12. An IO step a, denoted by −→io , with a ∈ {&l , ⊕l | l ∈ L} is a sequence of ≤sa rule applications →∗ such that the last applied rule is an In (in the case a = &l , where l is the input label singling out which of the rule premises we consider), or an Out rule (in the case a = ⊕l , where l is the output label singling out which of the rule premises we consider) and all other rule applications concern RecL, RecR1 and RecR2 rules only. Definition Appendix B.13. a1 . . . an , with n ≥ 0, is a blocking path for a a n 1 judgment ⊢ T ≤sa S if there exist T ′ , S ′ such that ⊢ T ≤sa S −→ io . . . −→io ⊢ T ′ ≤sa S ′ →blk (where T ′ = T and S ′ = S in the case n = 0). Lemma Appendix B.14. Let S ∈ reach(Z) and ⊢ T ≤sa antOut(S, γ), ⊢ T ≤sa antOut(S, β) be such that: |γ| < |β| and antOut(S, β) extAntEqZ antOut(S, γ). If a1 . . . an , with n ≥ 0, is a blocking path for ⊢ T ≤sa antOut(S, β) then there exists an m long prefix of a1 . . . an , with 0 ≤ m ≤ n, that is a blocking path for ⊢ T ≤sa antOut(S, γ). Proof. The proof is by induction on n ≥ 0. We start by proving the base case n = 0. That is ⊢ T ≤sa antOut(S, γ) →blk , i.e. for some T ′ , S ′ we have: ⊢ T ≤sa antOut(S, γ) →∗ ⊢ T ′ ≤sa S ′ →err by applying rules RecL, RecR1 and RecR2 only. a We first observe that ⊢ T ≤sa antOut(S, γ) −→io is not possible for any & l a ∈ {&l , ⊕l | l ∈ L}. This because: if we had ⊢ T ≤sa antOut(S, γ) −→ io for some l ∈ L, then antOut(S, β) = &{li : Ti }i∈I with l = li for some i ∈ & l I, hence we would have that also ⊢ T ≤sa antOut(S, β) −→ io ; and if we had ⊕ l ⊢ T ≤sa antOut(S, γ) −→ io for some l ∈ L, then, since antOut(S, β) extAntEqZ ⊕ l antOut(S, γ), we would have that also ⊢ T ≤sa antOut(S, β) −→ io . 70 Therefore, given that it is not possible that ⊢ T ≤sa antOut(S, γ) →∗ ⊢ end ≤sa end by applying rules RecL, RecR1 and RecR2 only (because otherwise antOut(S, β) would not be defined), we conclude ⊢ T ≤sa antOut(S, γ) →blk (notice that the number of times a RecL, RecR1 or RecR2 is applicable to a judgment is finite because we do not have unguarded recursion and RecR2 cannot be consecutively applied for more than one time). We now consider the induction case for blocking path a1 . . . an of length n ≥ 1. We first consider the case a1 = &l for some l ∈ L. Given that antOut(S, β) & l is defined and that ⊢ T ≤sa antOut(S, β) −→ io , we deduce that antOut(S, γ) is: either ⊕{l′ : T ′ } (possibly preceded by some recursion operators), for some l′ , T ′ ; or &{li : Ti }i∈I (possibly preceded by some recursion operators), for some terms Ti and labels li such that l = li for some i ∈ I. In the first case we have ⊢ T ≤sa antOut(S, γ) →blk , hence the the lemma trivially holds; in the second case & l we have ⊢ T ≤sa antOut(S, γ) −→ io and we proceed with the proof. We have that & l ′ ′ ′ there exist T ′ , S ′ , σ such that ⊢ T ≤sa antOut(S, γ) −→ io T ≤sa antOut(S , γ ) & l ′ ′ ′ ′ ′ and ⊢ T ≤sa antOut(S, β) −→ io T ≤sa antOut(S , β ), with γ = σγ and β = σβ . In particular S ′ is obtained from S by removing all its initial (single-)outputs (and intertwined recursions, that are unfolded) until the first input &{li : Ti }i∈I is reached, which is also removed, thus yielding S ′ = Ti for the i ∈ I such that l = li . This corresponds, in the definition of reach(Z) (Definition 3.9), to repeatedly applying, starting from S ∈ reach(Z), rules 3 and 4 and finally rule 2, thus yielding S ′ ∈ reach(Z). Notice that σ is the sequence of labels of the initial outputs that were removed during this procedure and that, obviously, |γ| < |β|. Now, in order to be able to apply the induction hypothesis we have also to show that antOut(S, β ′ ) extAntEqZ antOut(S, γ ′ ). We observe that antOut(S, γ ′ ) extAntEqZ antOut(S, γ). This holds because antOut(S, γ) is a &{li : Ti }i∈I term, with l = li for some i ∈ I, possibly preceded by some recursion operators, and from the following observations: obviously, for any t, T ′′ , it holds µt.T ′′ extAntEqZ T ′′ {µt.T ′′ /t}; and leafSet(Ti ) ⊆ leafSet(&{li : Ti }i∈I ). In the same way, we have antOut(S, β ′ ) extAntEqZ antOut(S, β). 71 It is therefore possible to apply the induction hypothesis to T ′ ≤sa antOut(S ′, γ ′ ) and T ′ ≤sa antOut(S ′ , β ′ ) that possesses the shorter blocking path a2 . . . an . Finally, we consider the case a1 = ⊕l for some l ∈ L. Since ⊢ T ≤sa antOut(S, β) ⊕l −→io and antOut(S, β) extAntEqZ antOut(S, γ), we have that also ⊢ T ≤sa ⊕ l ′ antOut(S, γ) −→ io . In particular, we have that there exists T such that ⊢ ⊕ ⊕ l l ′ ′ T ≤sa antOut(S, γ) −→ io T ≤sa antOut(S, γl) and ⊢ T ≤sa antOut(S, β) −→io T ≤sa antOut(S, βl), where, obviously, |γl| < |βl|. Moreover, since antOut(S, β) extAntEqZ antOut(S, γ) it is immediate to show (by applying the definitions of antOut, extAntEq and antEq ) that also antOut(S, βl) extAntEqZ antOut(S, γl). It is therefore possible to apply the induction hypothesis to T ′ ≤sa antOut(S, γl) and T ′ ≤sa antOut(S, βl) that possesses the shorter blocking path a2 . . . an .  Theorem 3.12. Given two single-out session types T and S, we have that there exist Σ′ , T ′ , S ′ such that ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err if and only if there exist Σ′′ , T ′′ , S ′′ such that ∅ ⊢ T ≤t S →∗ Σ′′ ⊢ T ′′ ≤t S ′′ →err . Proof. We consider the two implications separately starting from the if part. Assume that ∅ ⊢ T ≤t S →∗ Σ′′ ⊢ T ′′ ≤t S ′′ →err . In this sequence of rule applications, the new rule Asmp2 is never used otherwise the sequence would terminate successfully by applying such a rule. Hence, by applying the same sequence of rules, we have ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ with T ′′ = T ′ , S ′′ = S ′ and Σ′′ = Σ′ . We have that Σ′ ⊢ T ′ ≤a S ′ →err , otherwise if a rule could be applied to this judgement, the same rule could be applied also to Σ′′ ⊢ T ′′ ≤t S ′′ thus contradicting the assumption Σ′′ ⊢ T ′′ ≤t S ′′ →err . We now move to the only if part. Assume that ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err and that, by contradiction, ∅ ⊢ T ≤t S →∗ Σ′′ ⊢ T ′′ ≤t S ′′ →err does not hold. From ∅ ⊢ T ≤a S →∗ Σ′ ⊢ T ′ ≤a S ′ →err (since in this sequence of rule applications the Asmp rule is never used, otherwise the sequence would terminate successfully by applying such a rule), by applying the same sequence of rules, we have ⊢ T ≤sa S →∗ ⊢ T ′ ≤sa S ′ . We now observe that, since we assumed (by contradiction) that we do not 72 get the error when using the ≤t procedure, there must exist at least a triple Σ′′′ , T ′′′ , S ′′′ such that: ∅ ⊢ T ≤t S →∗ Σ′′′ ⊢ T ′′′ ≤t S ′′′ (and correspondingly ⊢ T ≤sa S →∗ ⊢ T ′′′ ≤sa S ′′′ because the Asmp and Asmp2 rules, that would have led to successful termination, cannot have been applied), Σ′′′ ⊢ T ′′′ ≤t S ′′′ successfully terminates by applying the Asmp or Asmp2 rule, and ⊢ T ′′′ ≤sa S ′′′ has a blocking path. Let us now consider one of such triples Σ′′′ , T ′′′ , S ′′′ (possessing the above stated properties) that has a blocking path of minimal length, i.e. there is no other Σ′′′ , T ′′′ , S ′′′ triple of the kind above such that ⊢ T ′′′ ≤sa S ′′′ has a shorter blocking path. Let a1 . . . an be such a path. Since the Asmp or Asmp2 rule is applied to Σ′′′ ⊢ T ′′′ ≤t S ′′′ , we have S ′′′ = antOut(S, β) (in the case of Asmp this is obtained by Corollary Appendix B.7). We now consider γ such that (T ′′′ , antOut(S, γ)) ∈ Σ′′′ was used in the premise of Asmp or Asmp2 rule: γ = β in the case of the Asmp rule, |γ| < |β| in the case of the Asmp2 rule. Moreover, let us also consider Σγ to be the environment such that ∅ ⊢ T ≤t S →∗ Σγ ⊢ T ′′′ ≤t antOut(S, γ), where Σγ ⊢ T ′′′ ≤t antOut(S, γ) is the judgment to which the rule that caused (T ′′′ , antOut(S, γ)) to be inserted in the environment was applied. We now observe that there exists a m long prefix of a1 . . . an , with 0 ≤ m ≤ n, that is a blocking path for ⊢ T ′′′ ≤sa antOut(S, γ). This is obvious in the case γ = β; it is due to Lemma Appendix B.14 in the case |γ| < |β|: we obtain antOut(S, β) extAntEqZ antOut(S, γ) as needed by such a Lemma from the statements in the premise of rule Asmp2 and by applying Lemmas Appendix B.5, Appendix B.9 and Appendix B.10. Since we assumed (by contradiction) that ∅ ⊢ T ≤t S →∗ Σ′′ ⊢ T ′′ ≤t S ′′ →err does not hold, this would be possible only if there existed a triple Σ′′′′ , T ′′′′ , S ′′′′ such that: there is a sequence of rule applications Σγ ⊢ T ′′′ ≤t antOut(S, γ) →∗ Σ′′′′ ⊢ T ′′′′ ≤t S ′′′′ that is a prefix of the sequence of rule applications of the blocking path for ⊢ T ′′′ ≤sa antOut(S, γ); and Σ′′′′ ⊢ T ′′′′ ≤t S ′′′′ successfully terminates by applying the Asmp or Asmp2 rule. Notice that such a sequence Σγ ⊢ T ′′′ ≤t antOut(S, γ) →∗ Σ′′′′ ⊢ T ′′′′ ≤t S ′′′′ should necessarily include the 73 application of, at least, an In rule (causing the algorithm to branch), because otherwise (given that Σγ ⊢ T ′′′ ≤t antOut(S, γ) →∗ Σ′′′ ⊢ T ′′′ ≤t antOut(S, β)) we could not have that Σ′′′′ ⊢ T ′′′′ ≤t S ′′′′ successfully terminates by applying the Asmp or Asmp2 rule. However the existence of such a triple Σ′′′′ , T ′′′′ , S ′′′′ is not possible, because ⊢ T ′′′′ ≤sa S ′′′′ would have a k long blocking path with k < n (being such a path strictly shorter than that of ⊢ T ′′′ ≤sa antOut(S, γ)), thus violating the minimality assumption about the blocking path length of the Σ′′′ , T ′′′ , S ′′′ triple.  Appendix C. Proofs of Section 4 Appendix C.1. Proof of Lemma 4.4 and Theorem 4.5 We here prove Lemma 4.4 and Theorem 4.5 that show undecidability of ≤bound by reduction from the bounded non termination problem. Lemma 4.4. Given a queue machine M and an input x, it is undecidable whether M does not terminate and is bound on x. Proof. We first prove that boundedness is undecidable. If, by contraposition, boundedness was decidable, termination could be decided by first checking boundedness, and then perform a finite state analysis of the queue machine behaviour. More precisely, termination on bounded queue machines can be decided by forward exploration of the reachable configurations until a terminating configuration is found, or a cycle is detected by reaching an already visited configuration. We now conclude by observing that given a queue machine M and the input x, it is not possible to decide whether M does not terminate and is bound on x. Assume by contraposition one could decide the above property of queue machines. Then boundedness could be decided as follows: transform M in a new machine M ′ that behaves like M plus an additional special symbol # which is enqueued every time it is dequeued; boundedness of M on input x can 74 be decided by checking the above property on M ′ and input #x (in fact M ′ never terminates and is bound on #x if and only if M is bound on x). Theorem 4.5.  Given a queue machine M = (Q, Σ, Γ, $, s, δ) and an input string x, we have that [[s]]∅ ≤bound [[x$]] if and only if M does not terminate and is bound on x. Proof. We need a preliminary result: given (q, γ) →M (q ′ , γ ′ ), if [[q]]∅ ≤[[γ]] then we also have that [[q ′ ]]∅ ≤[[γ ′ ]]. In fact, assuming γ = C1 · · · Cm and δ(q, C1 ) = (q ′ , B1C1 · · · BnCC11 ), we have γ ′ = C2 · · · Cm B1C1 · · · BnCC11 . Having [[q]]∅ ≤[[γ]], by one application of item 4. of Definition 2.4, one application of item 3., and nC1 applications of item 2., we can conclude that [[q ′ ]]∅ ≤[[γ ′ ]]. We now observe that if M is not bound on x we have that it is not possible to have [[s]]∅ ≤bound [[x$]]. Assume by contraposition that [[s]]∅ ≤bound [[x$]]. From the previous preliminary result, we have that also [[q ′ ]]∅ ≤bound [[γ ′ ]] for each reachable configuration (q ′ , γ ′ ). But due to unboundedness of M on x we have that, for every k, there is an enqueue operation that is executed when the queue is longer than k. Assume this happens when the configuration (q ′ , γ ′ ) performs its computation action. In order to relate [[q ′ ]]∅ and [[γ ′ ]], we need a relation that contains pairs with the l.h.s. starting with an output and the r.h.s. with an input context of depth greater than k. But this cannot hold if we fix a maximal depth smaller than k to the input context. Now we observe that [[s]]∅ ≤bound [[x$]] if and only if M does not terminate and is bound on x. Following the (Only if part) of the proof of Theorem 3.1 [10] stating the undecidability of <<, we prove that if [[s]]∅ ≤bound [[x$]] then M does not terminate. Moreover, we also have that M is bound on x in the light of the previous observation. Consider now that M does not terminate. As in the (If part) of the same proof mentioned above, we define C = {(qi , γi ) | (s, x$) = (q0 , γ0 ) →M (q1 , γ1 ) →M 75 · · · →M (qi , γi ), i ≥ 0} and the following relation R on types: R { =  [[q]]∅ , [[C1 · · · Cm ]] ,  &{A : ⊕{B1A : · · · ⊕ {BnAA : [[q ′ ]]∅ }}}A∈Γ , [[C1 · · · Cm ]] ,  ⊕ {B1C1 : ⊕{B2C1 : · · · ⊕ {BnCC11 : [[q ′ ]]∅ }}} , &{C2 : · · · &{Cm : Z}} ,  ⊕ {B2C1 : · · · ⊕ {BnCC11 : [[q ′ ]]∅ }} , &{C2 : · · · &{Cm : &{B1C1 : Z}}} , ··· [[q ′ ]]∅ , &{C2 : · · · &{Cm : &{B1C1 : · · · &{BnCC11 : Z}}}} | (q, C1 · · · Cm ) ∈ C, δ(q, C1 ) = (q ′ , B1C1 · · · BnCC11 ),  Z = µt. ⊕ {A : &{A : t}}A∈Γ } Following the proof of Theorem 3.1 [10] we show that this relation is an asynchronous subtyping relation. Moreover boundedness of M on x guarantees boundedness on the length of the reachable queue contents C1 · · · Cm , that implies boundedness of the depth of the input contexts of the r.h.s. of all the pairs in R. This proves that [[s]]∅ ≤bound [[x$]].  Appendix C.2. Proof of Theorem 4.8 Theorem 4.8 states that, given a single consuming queue machine M and an input x, termination of M on x is undecidable. The theorem is proved by resorting to Turing completeness of queue machines. In order to do this we preliminarily provide an encoding [[M ]] from a queue machine M into a single-consuming queue machine and two lemmas that guarantee that, given a queue machine M and an input x, M terminates on x if and only if the single-consuming queue machine [[M ]] terminates on x. Definition Appendix C.1. Let M = ({q1 , .., qn }, Σ, Γ, $, s, δ) be a queue machine and let # be a special character not in Γ. We denote with [[M ]] the following single-consuming queue machine ({q1 , .., qn , q1′ , .., qn′ }, Σ, Γ ∪ {#}, $, s, δ ′) with δ ′ defined as follows: • δ ′ (qi , a) = (qj′ , ǫ) if δ(qi , a) = (qj , ǫ) 76 • δ ′ (qi , a) = (qj , γ) if δ(qi , a) = (qj , γ) with γ 6= ǫ • δ ′ (qi , #) = (qi′ , ǫ) • δ ′ (qi′ , a) = (qj , #) if δ(qi , a) = (qj , ǫ) • δ ′ (qi′ , a) = (qj , γ) if δ(qi , a) = (qj , γ) with γ 6= ǫ • δ ′ (qi′ , #) = (qi , #) Given a configuration (q, γ) of [[M ]], we denote with {{(q, γ)}} the configuration (z, β) where z = q, if q ∈ {q1 , .., qn }, or z = qi , if q = qi′ , while β is obtained from γ by removing each instance of the special symbol #. Example Appendix C.2. We now comment the construction [[M ]] that, given a queue machine M , returns a single-consuming queue machine. As an example, consider M = ({q1 , q2 }, {a}, {a, $}, $, q1, δ) with δ such that δ(q1 , a) = (q2 , ǫ), δ(q1 , $) = (q1 , $), δ(q2 , a) = (q2 , a), and δ(q2 , $) = (q2 , ǫ). This machine accepts the input string ”a” by consuming in sequence a and then $. Consider now [[M ]] = ({q1 , q2 , q1′ , q2′ }, {a}, {a, $, #}, $, q1, δ ′ ) with δ ′ such that δ ′ (q1 , a) = (q2′ , ǫ), δ ′ (q1 , $) = (q1 , $), δ ′ (q1 , #) = (q1′ , ǫ), δ ′ (q2 , a) = (q2 , a), δ ′ (q2 , $) = (q2′ , ǫ), δ ′ (q2 , #) = (q2′ , ǫ), δ ′ (q1′ , a) = (q2 , #), δ ′ (q1′ , $) = (q1 , $), δ ′ (q1′ , #) = (q1 , #), δ ′ (q2′ , a) = (q2 , a), δ ′ (q2′ , $) = (q2′ , #), and δ ′ (q2′ , #) = (q2 , #). This new queue machine also accepts the input string ”a” but it does simply consume a and $ in sequence, but when $ is dequeued the special symbol # is enqueued (which is subsequently consumed thus emptying the queue). Notice that the queue machine [[M ]] cannot consume two symbol in sequence because after the first one is consumed, it enters in one of the primed state qi′ that always enqueue some symbol. Lemma Appendix C.3. Let M = (Q, Σ, Γ, $, s, δ) be a queue machine and let x ∈ Σ∗ . If (s, x$) →∗M (q, γ) then there exists a configuration (q ′ , γ ′ ) such that (s, x$) →∗[[M]] (q ′ , γ ′ ) with {{(q ′ , γ ′ )}} = (q, γ). Proof. By induction on the number of steps in the sequence (s, x$) →∗M (q, γ). The base case is trivial. In the inductive case we perform a case analysis. The 77 unique non trivial case is when the configuration reached by [[M ]] according to the inductive hypothesis has the queue starting with the special symbol #. In this case, [[M ]] must perform more transitions, first to consume all the instances of # in front of the queue and then to mimick the new transition of M .  Lemma Appendix C.4. Let M = (Q, Σ, Γ, $, s, δ) be a queue machine and let x ∈ Σ∗ . If (s, x$) →∗[[M]] (q, γ) then (s, x$) →∗M {{(q, γ)}}. Proof. By induction on the number of steps in the sequence (s, x$) →∗[[M]] (q, γ). The base case is trivial. In the inductive case we perform a case analysis. The unique non trivial case is when γ starts with the special symbol #. In this case, M does not perform any new transition as if (q ′ , γ ′ ) is the new configuration we have that {{(q, γ)}} = {{(q ′ , γ ′ )}}. Theorem 4.8.  Given a single consuming queue machine M and an input x, the termination of M on x is undecidable. Proof. The thesis directly follows from the Turing completeness of queue machines, and the two above Lemmas that guarantee that given a queue machine M and an input x, M terminates on x if and only if the single-consuming queue machine [[M ]] terminates on x. This is guaranteed by the fact that if [[M ]] reaches a configuration with the queue containing only instances of #, it is guaranteed to eventually terminate by emptying the queue.  Appendix C.3. Proof of Theorem 4.11 Theorem 4.11 states that a single-consuming queue machine does not terminate if and only if the types obtained by the encoding of Figure 4 are in the ≤tin,tout relation. The proof is done by separately showing, as preliminary lemmas, both implications (one in each direction) to hold. Concerning such lemmas and their proof, we need to introduce some preliminary notation. Given a sequence of queue symbols γ, we denote with [[[γ]]]u the set of session types that can be obtained from [[[γ]]] by independently replacing each occurrence, inside it, of the term T ′′ defined in Figure 4 with 78 antOut(T ′′ , li1 . . . lin ), for some sequence of labels li1 . . . lin with n ≥ 0 (distinguished label sequences can be considered for replacing different occurrences of T ′′ inside [[[γ]]]). Observe that [[[γ]]]u is well defined because T ′′ can anticipate every possible sequence of outputs. Moreover, for simplicity, we will consider the asynchronous subtyping relation ≤ instead of ≤tin,tout . Nevertheless, we will apply such relation on types that have all their choices labeled on the same set of labels, hence the two relations obviously coincide on such types. Lemma Appendix C.5. Given a single-consuming queue machine M = (Q, Σ, Γ, $, s, δ) and an input string x ∈ Σ∗ , if [[[s]]]∅ ≤[[[x$]]] then M does not terminate on x. Proof. We need a preliminary result: given (q, γ) →M (q ′ , γ ′ ) and a term ∅ S ∈ [[[γ]]]u , if [[[q]]]∅ ≤S then there exists S ′ ∈ [[[γ ′ ]]]u such that [[[q ′ ]]] ≤S ′ . In fact, assuming γ = C1 · · · Cm and δ(q, C1 ) = (q ′ , B1C1 · · · BnCC11 ), we have γ ′ = ∅ C2 · · · Cm B1C1 · · · BnCC11 . Consider now S ∈ [[[γ]]]u . Having [[[q]]] ≤S, by one application of item 4. of Definition 2.4, one application of item 3., and nA applications ∅ of item 2., we can conclude that there exists S ′ ∈ [[[γ ′ ]]]u such that [[[q ′ ]]] ≤S ′ . We now prove the thesis by showing that assuming that M accepts x we ∅ have [[[s]]] 6≤ [[[x$]]]. By definition of queue machines, we have that: M accepts x implies (s, x$) →∗M (q, ǫ). Assume now, by contraposition, that [[[s]]]∅ ≤[[[x$]]]. As (s, x$) →∗M (q, ǫ), by repeated application of the above preliminary result we have that exists S ′ ∈ [[[ǫ]]]u such that [[[q]]]∅ ≤S ′ . But this cannot hold because ∅ [[[q]]] is a recursive definition that upon unfolding begins with an input that implies (according to items 4. and 3. of Definition 2.4) that also S ′ (once unfolded) starts with an input. But this is false, in that, by definition of the n  o  queue encoding [[[ǫ]]] = µt ⊕ A : & A : t ⊎ A′ : T ′′ A′ ∈Γ\{A} .  A∈Γ Lemma Appendix C.6. Given a single-consuming queue machine M = (Q, Σ, Γ, $, s, δ) and an input string x ∈ Σ∗ , if M does not terminate on x then ∅ [[[s]]] ≤[[[x$]]]. ∅ Proof. Assuming that M does not accept x we show that [[[s]]] ≤[[[x$]]]. When 79 a queue machine does not accept an input, the corresponding computation never ends. In our case, this means that there is an infinite sequence (s, x$) = (q0 , γ0 ) →M (q1 , γ1 ) →M · · · →M (qi , γi ) →M · · · . Let C be the set of reachable configurations, i.e. C = {(qi , γi ) | i ≥ 0}. We now define a relation R on types, where T ′ and T ′′ are as in Figure 4, T0 = ⊕{A : T ′′ }A∈Γ and Tn = &{A : Tn−1 }A∈Γ : R = {   ∅ ∅ [[[q]]] , SC1 ···Cm , &{A : {{B1A · · · BnAA }}q′ }A∈Γ , SC1 ···Cm ,   ∅ ∅ {{B1C1 · · · BnCC11 }} ′ , SC2 ···Cm , {{B2C1 · · · BnCC11 }} ′ , SC2 ···Cm B C1 , q q 1 ··· ∅ {{BnCC11 }} q′ | S { , SC2 ···Cm B C1 ···B C1 1 nC −1 1  (q, C1 · · · Cm ) ∈ C, δ(q, C1 ) = (q ′ , B1C1 · · · BnCC11 ), Sγ ∈ [[[γ]]]u }   ∅ [[[q]]]∅ , Tn , &{A : {{B1A · · · BnAA }}q′ }A∈Γ , Tn ,   ∅ ∅ {{B1C1 · · · BnCC11 }} ′ , Tm , {{B2C1 · · · BnCC11 }} ′ , Tm , q q ··· ∅ {{BnCC11 }} ′ , Tm q |  (q, C1 · · · Cm ) ∈ C, δ(q, C1 ) = (q ′ , B1C1 · · · BnCC11 ), if ∃q ′′ , C s.t. δ(q, C) = (q ′′ , ǫ) then n ≥ 2 else n ≥ 1, m ≥ 0 } S { | S { |   T ′ , Tn , & A1 : ⊕{A2 : T ′ }A2 ∈Γ A1 ∈Γ   , Tn , ⊕ {A2 : T ′ }A2 ∈Γ , Tm A1 ∈Γ   , Sγ , ⊕ {A2 : T ′ }A2 ∈Γ , Sγ n ≥ 1, m ≥ 0 }   T ′ , Sγ , & A1 : ⊕{A2 : T ′ }A2 ∈Γ γ ∈ Γ∗ , Sγ ∈ [[[γ]]]u } We have that the above R is an asynchronous subtyping relation because each of the pairs satisfies the conditions in Definition 2.4 thanks to the presence of other ∅ pairs in R. We can conclude observing that (s, x$) ∈ C implies that ([[[q]]] , [[[x$]]]) ∅ belongs to the above asynchronous subtyping relation R, hence [[[q]]] ≤[[[x$]]].  80 Theorem 4.11. Given a single consuming queue machine M = (Q, Σ, Γ, $, s, δ) and an input string x ∈ Σ∗ , we have [[[s]]]∅ ≤tin,tout [[[x$]]] if and only if M does not terminate on x. Proof. Direct consequence of Lemmas Appendix C.5 and Appendix C.6. 81 
6cs.PL
Deleting vertices to graphs of bounded genus Tomasz Kociumaka∗ Marcin Pilipczuk† arXiv:1706.04065v1 [cs.DS] 13 Jun 2017 Abstract We show that a problem of deleting a minimum number of vertices from a graph to obtain a graph 2 embeddable on a surface of a given Euler genus is solvable in time 2Cg ·k log k nO(1) , where k is the size of the deletion set, Cg is a constant depending on the Euler genus g of the target surface, and n is the size of the input graph. On the way to this result, we develop an algorithm solving the problem in question in time 2O((t+g) log(t+g)) n, given a tree decomposition of the input graph of width t. The results generalize previous algorithms for the surface being a sphere by Marx and Schlotter [10], Kawarabayashi [6], and Jansen, Lokshtanov, and Saurabh [5]. 1 Introduction In recent years, a significant effort has been put into the study of parameterized complexity of recognizing near-planar graphs [10, 6, 5], that is, graphs that become planar after deleting a small number of vertices. Since, by the classic result of Lewis and Yannakakis [9], the decision version of the problem is NP-hard, it is natural to look for fixed-parameter algorithms with various parameters. The parameter of the size of the deletion set naturally comes from the supposed applications: a number of efficient algorithms for planar graphs generalize well to near-planar graphs, if one supply them with the deletion set. Formally, we define the problem Planar Vertex Deletion as follows: given a graph G and an integer k, decide, if one can delete at most k vertices from G to obtain a planar graph. Clearly, for a fixed integer k, the yes-instances to Planar Vertex Deletion form a minor-closed graph class. Consequently, from the Graph Minors theory we obtain a nonuniform fixed-parameter algorithm for Planar Vertex Deletion (cf. [1, Section 6]). Marx and Schlotter [10] showed an explicit, uniform fixed-parameter algorithm by a typical irrelevant vertex approach. First, they observe that the formulation of the problem as hitting all models of the forbidden minors for planar graphs (i.e., K5 and K3,3 ) leads to a fixed-parameter algorithm on bounded treewidth graphs by relatively standard techniques. Second, it is quite easy to believe (but quite technical to formally prove) that a middle part of a large, flat (planar), and grid-like subgraph of the input graph will never be part of an optimal deletion set, and can be removed without changing the answer to the problem. The combination of the excluded grid theorem and the technique of iterative compression gives here a winwin approach: if the treewidth of the graph is not sufficiently bounded, an irrelevant part can be uncovered and removed. There are two sources of potential inefficiencies in the approach of Marx and Schlotter. First, the routine for graphs of bounded treewidth that finds a minimum set hitting all forbidden minor models work in time double-exponential in the treewidth bound. Since the treewidth bound needs to be significantly larger than the size of the deletion set for the irrelevant vertex argument to work, we obtain at least a doubleexponential dependency on the parameter. Second, the technique of iterative compression, at least applied in a straightforward manner, gives at least quadratic dependency on the input size. ∗ University of Warsaw, Poland, [email protected]. of Warsaw, Poland, [email protected]. Research supported by Polish National Science Centre grant DEC2012/05/D/ST6/03214. † University 1 Later, Kawarabayashi [6] showed a fixed-parameter algorithm with linear dependency on the input size. Finally, Jansen, Lokshtanov, and Saurabh [5] showed an algorithm with running time 2O(k log k) n, that is, with nearly single-exponential dependency on the parameter and linear dependency on the input size. On high level, the work of [5] follows the approach of Marx and Schlotter, but improves upon both components. First, they show that a routine that explicitly constructs partial embeddings of graphs of bounded treewidth solves the problem in question in time 2O(t log t) n, given a tree decomposition of width t. Second, they show arguments in the spirit of the aforementioned irrelevant vertex rule that reduce the graph to treewidth linearly bounded in the size of the solution (deletion set). Third, they apply a more involved iterative compression approach that in one step compresses the graph by a multiplicative factor, yielding a linear dependency on the input size. A simple reduction from the Vertex Cover problem (replace every edge uv with a K5 with vertices u, v, and 3 new vertices) shows that, unless the Exponential Time Hypothesis (ETH) [4] fails, the dependency on the parameter k needs to be 2Ω(k) for any parameterized algorithm for Planar Vertex Deletion. Although it is open whether Planar Vertex Deletion can be solved in 2o(k log k) nO(1) time, we note that a lower bound by the second author [12] asserts that, unless the ETH fails, the bounded treewidth subroutine requires dependency 2Ω(t log t) on the treewidth of the graph. This implies that a hypothetical algorithm that solves Planar Vertex Deletion in 2o(k log k) nO(1) time needs to follow significantly different approach than the one we know currently. In the light of the aforementioned developments, in this paper, we initiate the study of the Genus Vertex Deletion: given a graph G and integers g and k, decide, if one can delete at most k vertices from G to obtain a graph embeddable on a surface of Euler genus at most g. Our main result is the following: Theorem 1.1. Genus Vertex Deletion can be solved in time 2Cg k depending on g only. 2 log k O(1) n , where Cg is a constant In the proof of Theorem 1.1, we follow the general approach of Marx and Schlotter [10]. Our main technical contribution is the generalization of the bounded treewidth subroutine of [5] to the bounded genus case. Theorem 1.2. Given a Genus Vertex Deletion instance (G, g, k) with |V (G)| = n, and a tree decomposition of G of width t, one can solve the Genus Vertex Deletion problem on (G, g, k) in time 2O((t+g) log(t+g)) n. The proof of Theorem 1.2 follows the same principle as the corresponding routine of [5] — building partial embeddings for graphs with small boundaries — but requires significant technical hurdle to be presented formally and in full detail. The task of the algorithm of Theorem 1.2 can be also seen as a generalization of an algorithm that computes the Euler genus in graphs of bounded treewidth: by substituting k = 0 we obtain an algorithm with running time 2O((t+g) log(t+g)) n that checks if the input graph is embeddable on a surface of Euler genus at most g. Such a result is not new: a bounded treewidth routine is also part of the current algorithms that compute embeddings in linear time [11, 7]. In particular, the work of Kawarabayashi, Mohar, and Reed [7] claims an algorithm with running time f (t) · n for some function f (i.e., without the exponential dependency on g). However, the work [7] is an extended abstract from FOCS 2008 that, to the best of our knowledge, never substantiated in a full version, and we were unable to reproduce the details of this algorithm from the description in [7]. For the second part, namely the irrelevant vertex argument, we generalize the arguments of Marx and Schlotter [10]: Theorem 1.3. For every integer g there exists a constant Cg such that the following holds. Given a graph G, an integer k, and a set M ⊆ V (G) such that G − M is embeddable into a surface of genus at most g, one can in time Cg nO(1) find one of the following: 1. a tree decomposition of G of width at most Cg |M |1/2 k 3/2 ; 2 2. a vertex w ∈ V (G) such that every solution to the Genus Vertex Deletion instance (G, g, k) contains w; or 3. a vertex v ∈ V (G) such that (G, g, k) is a yes-instance to Genus Vertex Deletion if and only if (G − {v}, g, k) is. Theorem 1.1 follows now from Theorems 1.2 and 1.3 in a standard manner. By a standard application of the irrelevant vertex technique (cf. [1, Section 4], we can assume that, apart from the input Genus Vertex Deletion instance (G, g, k), we are additionally given a set M ⊆ V (G) of size k + 1 such that G − M is embeddable on a surface of Euler genus at most g (i.e., M is a solution of slightly too large size), at the cost of an additional O(n) factor in the running time bound. We iteratively apply the algorithm of Theorem 1.3 to (G, g, k) and M : if a vertex w or v is returned, we delete it and restart (decreasing the parameter k by one in case of a vertex w); if a tree decomposition is returned, we solve the Genus Vertex Deletion problem with the algorithm of Theorem 1.2. Since |M | = k + 1, the algorithm of Theorem 1.2 is applied to a tree decomposition of width of the order of Cg k 2 , yielding the bound promised in Theorem 1.1. While the lower bound of [12] shows that the bounded-treewidth routine of Theorem 1.2 has optimal running time (assuming ETH), we conjecture that the running time bound of Theorem 1.1 is not optimal, and can be improved similarly as it was in the planar case [5]. For this reason, we do not optimize the parameter dependency in Theorem 1.3, favouring the clarity of the arguments. In other words, we view our contribution as Theorem 1.2 being the main technical merit, while Theorem 1.3 and the resulting Theorem 1.1 being an example application. The paper is organized as follows: after introducing notation for permutations and tree decompositions in Section 2, we discuss combinatorial embeddings in Section 3. Theorem 1.2 is proved in Section 4, and Theorem 1.3 is proved in Section 5. 2 2.1 Preliminaries Permutations, involutions, cycles For a nonnegative integer t, we denote [t] = {1, 2, . . . , t}. The group of all permutations of a set U is denoted by Sym(U ). Given a set of permutations S of a set U , by hSi we denote the subgroup of Sym(U ) generated by S. Given a subgroup Γ of the group of Sym(U ), by orb(Γ) we denote the family of orbits of Γ. For a permutation σ, orb(σ) is a shorthand for orb(hσi); this also allows us to speak about orbits of a single permutation. An orbit is trivial if it consists of a single element. A permutation σ is an involution if σ(σ(i)) = i for every i ∈ domain(σ) and is fixed-point free if σ(i) 6= i for every i ∈ domain(σ). Note that a permutation is a fixed-point free involution if and only if every its orbit is of size exactly two. A permutation σ is a cycle permutation if it has exactly one nontrivial orbit; note that σ needs to act cyclically on this orbit. A cycle is an unordered pair consisting of a cycle permutation and its inverse. We will need the operation of restricting a cycle permutation σ to a subset A of the elements of the nontrival orbit v of σ: the result is a permutation σA , where σA (e) = e for every e ∈ / A while for every e ∈ A we have σA (e) = σ k (e) where k is the minimum positive integer with σ k (e) ∈ A. In other words, we shorten the nontrivial orbit v by crossing out the elements not belonging to A. Note that if |A| ≥ 2, then σA is also a cycle permutation, while for |A| ≤ 1 we have σA being an identity. The definition of restricting naturally extends to cycles by restricting both components. For a sequence P of elements of some set, by P̄ we denote its reverse. A subsequence of a cycle is a sequence consisting of consecutive elements of the nontrivial orbit of the cycle. In our work we will often analyze the subgroup of the permutation group spanned by two fixed-point free involutions. Let α and β be two fixed-point free involutions of a set U and let Γ = hα, βi. Observe that for any orbit v of Γ and any element e ∈ v, the orbit v consists of elements e, α(e), β(α(e)), α(β(α(e))), β(α(β(α(e)))), α(β(α(β(α(e))))), . . . . 3 The above order is cyclic: |v| is always even, and if |v| = 2k, then (β ◦ α)k (e) = e. To fix notation, let us hα,βi define a cycle permutation oe of U as follows:  i  α(f ) if f ∈ v and f = (β ◦ α) (e) for some i, oehα,βi (f ) = β(f ) if f ∈ v and f = α ◦ (β ◦ α)i (e) for some i,   f iff ∈ / v. hα,βi Note that oe is a cycle permutation whose nontrivial orbit is v. Furthermore, while its definition formally depends on the choice of e and the order of α and β, different choices of e ∈ v and a potential swap of the hα,βi roles of α and β lead either to oe or its inverse. The definition of a cycle is suited to accommodate that: hα,βi hα,βi For the cycle permutation oe , its cycle is denoted as ôe . By the previous argumentation, the cycle does not depend on the order of α and β, nor of the choice of the element e within the same orbit. Let σ̂1 and σ̂2 be two cycles of disjoint sets U1 and U2 , with nontrivial orbits v1 and v2 . A merge of σ̂1 and σ̂2 is a cycle σ̂ of U := U1 ∪ U2 , whose nontrivial orbit v consists of exactly elements of v1 ∪ v2 . Furthermore, for some choice of cycle permutations σ1 ∈ σ̂1 , σ2 ∈ σ̂2 , σ ∈ σ̂, for every i = 1, 2 and e ∈ vi , if k is the minimum positive integer for which σ k (e) ∈ vi , then σ k (e) = σi (e). In other words, if we restrict the cycle of the nontrivial orbit of σ̂ to the elements of Ui only, we obtain the cyclic order of the nontrivial orbit of σ̂i . 2.2 Tree decompositions Given a graph G, a tree decomposition of G is a pair (T, β) where T is a rooted tree and is a function β : V (T ) → 2V (G) that assigns to every t ∈ V (T ) a bag β(t) ⊆ V (G) such that the following holds: • for every edge e ∈ E(G), there is a node t ∈ V (T ) with e ⊆ β(t); • for every vertex v ∈ V (G), the set {t ∈ V (T ) : v ∈ β(t)} is nonempty and induces a connected subgraph of T . The width of a decomposition is the maximum size of a bag, minus one. For a tree decomposition (T, β) of a graph G, we define two auxiliary functions α and G↓ . For a node t ∈ V (T ), • by α(t) ⊆ V (G) we denote the union of all bags of descendants of t (including t itself); • by G↓ (t) we denote the graph G[α(t)] − E(G[β(t)]), that is, the graph induced by G↓ (t) with the edges inside the bag β(t) removed. For dynamic programming algorithms, it is often convenient to work with so-called nice tree decompositions, where the bag of the root is empty, and every node t ∈ V (T ) is of one of the following four types: leaf node has no children and its bag is empty; introduce node has one child t0 such that β(t) = β(t0 ) ∪ {v} for some vertex v ∈ / β(t0 ); forget node has one child t0 such that β(t) = β(t0 ) \ {v} for some vertex v ∈ β(t0 ); join node has two children t1 and t2 with β(t) = β(t1 ) = β(t2 ). It is well-known (see, e.g., [1, 8]) that, in polynomial time, one can turn any tree decomposition into an equivalent nice one without increasing its width. 4 3 3.1 Embeddings and operations on them Graph and hypergraph embeddings We start with a clean but abstract notion of a hypergraph embedding, and then we restrict ourselves only to graph embeddings. Definition 3.1 (hypergraph embedding). A hypergraph embedding is a tuple (F, θ, σ, φ), where F is a finite set, whose elements are called flags, and θ, σ, and φ are three fixed-point free involutions of the set F. Given a hypergraph embedding E = (F, θ, σ, φ), we use the notation F(E) := F etc. Note that in any hypergraph embedding, since θ, σ, and φ are fixed-point free involutions, the number of flags needs to be even. Definition 3.2 (connected components, vertices, edges, faces). Let E = (F, θ, σ, φ) be a hypergraph embedding. Then a connected component is an orbit of ccE := hθ, σ, φi; a vertex is an orbit of VertsE := hσ, φi; an edge is an orbit of EdgesE := hθ, σi; a face is an orbit of FacesE := hθ, φi. Note that, as all three permutations of E are fixed-point free involutions, every vertex, edge, or a face of E can be identified with a cycle, whose nontrivial orbit is the vertex/edge/face in question. Given a hypergraph embedding E = (F, θ, σ, φ), a size-k edge, vertex, or face is an orbit of EdgesE , VertsE , or FacesE that consists of k flags. Note that k is always a positive even integer in this context. Also, observe that a size-2 edge corresponds to two equal orbits or θ and σ, a size-2 vertex corresponds to two equal orbits of σ and φ, while a size-2 face corresponds to two equal orbits of θ and φ. We now define the genus of an embedding. Definition 3.3 (genus of a hypergraph embedding). Given a hypergraph embedding E = (F, θ, σ, φ), its genus is defined as ĝE := 21 |F| − |orb(VertsE )| − |orb(EdgesE )| − |orb(FacesE )| + 2|orb(ccE )|. (1) Since in any hypergraph embedding the number of flags is even, the genus of a hypergraph embedding is always an integer. In a graph embedding, every edge consists of four flags. Definition 3.4 (graph embedding). A hypergraph embedding E is a graph embedding, or simply an embedding, if every edge consists of exactly four flags. In other words, a hypergraph embedding E = (F, θ, σ, φ) is a graph embedding if no two orbits of θ and σ coincide, but the involutions θ and σ commute. Observe that the formula for genus simplifies in case of a graph embedding. Observation 3.5. If E = (F, θ, σ, φ) is an embedding, then its genus equals ĝE := |orb(EdgesE )| − |orb(VertsE )| − |orb(FacesE )| + 2|orb(ccE )|. (2) From this point, we use only graph embeddings in this work, and call them simply embeddings. If two objects (face, edge, vertex) share a flag, we say that these objects are incident. Note that an object with k flags can be incident to at most k/2 objects of each of the other types (e.g., a size-k vertex can be incident to at most k/2 edges and k/2 faces). In particular, in an embedding, edge can be incident to one or two faces and one or two vertices. An edge incident with only one vertex is a loop. 5 φ θ σ θ Figure 1: Flags (gray triangles) and involutions in an embedding. Let us now relate the aforementioned definition of a (combinatorial) embedding with the natural intuition. Let G be a graph, embedded on a surface. We visualize every edge as a (thin, and possibly bend) rectangle, with a flag attached at every corner of the rectangle (see Figure 1). The involution θ pairs up flags on an edge that lie on the same side. The involution σ pairs up flags on an edge that lie at the same endpoint. Finally, the involution φ pairs up neighboring flags of consecutive edges around a vertex. In this manner, an orbit of VertsE = hσ, φi yields a cyclic order of flags around a vertex, an orbit of EdgesE = hθ, σi yields a cyclic order of the four flags of an edge, while an orbit of FacesE = hθ, φi yields a cyclic order of flags around a face. The formula (2) corresponds to the standard notion of an Euler genus of an embedding. 3.2 Basic operations on embeddings We will need an operation of deleting an edge, and a reverse operation of drawing a new edge. 3.2.1 Deleting an edge We start with the former. Let E = (F, θ, σ, φ) be an embedding and let e be an edge of E with flags x, x0 = σ(x), y = θ(x), y 0 = σ(y) = θ(x0 ). We define an embedding E − e, the result of deletion of the edge e from E, in the following manner. First, we disconnect the edge e from the rest of the embedding. For this, we modify φ so that {x, x0 } and {y, y 0 } become its orbits: If {x, x0 } is not already an orbit of φ, we set a = φ(x) and a0 = φ(x0 ), and we replace {x, a} and {x0 , a0 } with {x, x0 } and {a, a0 }. Next, if {y, y 0 } is not already an orbit of φ, we set b = φ(y), b0 = φ(y 0 ), and we replace {y, b} and {y 0 , b0 } with {y, y 0 } and {b.b0 }. As the third and final step, we delete the flags of e and the corresponding orbits of all three involutions. Note that the first two steps cannot be conveyed in parallel because φ(y) and φ(y 0 ) might be altered during the first step. However, a direct check shows that {x, x0 } and {y, y 0 } both become orbits of φ and that φ keeps being an involution. What is more, the order of the first two steps (i.e., the arbitrary decision of processing {x, x0 } prior to {y, y 0 }) is irrelevant and edge deletion results in deleting the flags of e from the cycles corresponding to the vertices incident with e. This interpretation supports the following observation. Observation 3.6. Let E0 = E − e for an embedding E and an edge e. For every vertex v0 of E0 , there exists a distinct vertex v of E, such that the cycle of v0 is the cycle of v with the flags of e removed. In the other direction, for every vertex v of E, either all flags of v are contained in e, or there exists a vertex v0 of E0 with the cycle equal to the cycle of v with the flags of e removed. Next, we describe how genus changes subject to edge deletion. Lemma 3.7. Let e be an edge in the embedding E, and let E0 = E − e. Then the genus of E0 is not larger than the genus of E. Furthermore, if e is incident to two faces or to a size-2 vertex, then the genera of E0 and E are equal. 6 Proof. Let E = (F, θ, σ, φ) and E0 = (F0 , θ0 , σ0 , φ0 ). Clearly, |orb(EdgesE0 )| = |orb(EdgesE )| − 1. We now investigate how the number of vertices, faces, and connected components can change while deleting an edge e. Let x1 , x2 = σ(x1 ), y1 = θ(x1 ), y2 = θ(x2 ) = σ(y1 ) be the four flags of e. For vertices, recall that the operation of deleting an edge almost preserves the set of vertices: every vertex v0 of E0 originates from a vertex v of E by deleting the flags of e from the cycle of v. Thus, |orb(VertsE )| − |orb(VertsE0 )| equals the number of vertices of E that have all flags contained in e. There may be 0, 1, or 2 of them. Furthermore, if e is incident to two distinct faces, there are no such vertices, unless e is a loop at a vertex v incident only to e; in this case, e is incident to two faces of size 2, and its set of flags is a whole connected component of E. For faces, consider first the case when e is incident to two faces, f1 and f2 , and assume that xi , yi lie on fi for i = 1, 2. Then, if the cycle of fi is xi , yi , Pi for some sequence of flags Pi , then the deletion of e replaces the faces f1 and f2 with one face with cycle P1 P̄2 , where P̄2 is the sequence P2 reversed. Consequently, |orb(FacesE )| − |orb(FacesE0 )| = 1 in this case. Consider now a case when e is incident to one face f . If the cycle of f is x1 , y1 , P1 , x2 , y2 , P2 for some sequences of flags P1 and P2 , then the deletion of e replaces f with a face with a cycle P1 P̄2 . If the cycle of f is x1 , y1 , P1 , y2 , x2 , P2 for some P1 , P2 , then the deletion of e replaces f with two faces with cycles P1 and P2 , respectively. Consequently, in this case we have |orb(FacesE )| − |orb(FacesE0 )| ∈ {0, −1}. For connected components, note that |orb(ccE )| − |orb(ccE0 )| ∈ {−1, 0, 1}: either e connects two distinct vertices that land in different connected components of E0 , or the set of connected components essentially does not change (one connected component loses the flags of e) or e is a whole connected component and it disappears in E0 . Let us now wrap up the argument. If the set of flags of e is a whole connected component, then |orb(ccE )| − |orb(ccE0 )| = 1. This may happen if e is a loop at a vertex incident only to e, or if e connects two vertices incident only to e. In the first case, let k ∈ {1, 2} be the number of faces e is incident with. We have |orb(FacesE ) − |orb(FacesE0 )| = k, |orb(VertsE )| − |orb(VertsE0 )| = 1, |orb(ccE )| − |orb(ccE0 )| = 1. Consequently, ĝE − ĝE0 = 2 − k ∈ {0, 1}. In particular, the genera of E and E0 are equal if e is incident to two faces. In the second case, when e connects two size-2 vertices, e is incident with one face with the same set of flags. Thus |orb(FacesE )| − |orb(FacesE0 )| = 1, |orb(VertsE )| − |orb(VertsE0 )| = 2, |orb(ccE )| − |orb(ccE0 )| = 1. Consequently, ĝE − ĝE0 = 0. Now consider a case when e is incident to two faces, but is not a whole connected component. Then, at least one of this faces is of size larger than 2, say f1 with cycle x1 , y1 , P1 . Then, P1 remains in E0 as a sequence of flags, where every two consecutive flags form an orbit either of φ or of θ. Consequently, the flags of the vertices incident with e remain in the same vertices and in the same connected component, as P1 connects the first and the last flags of P1 . We infer that in this case we have: |orb(FacesE )| − |orb(FacesE0 )| = 1, |orb(VertsE )| − |orb(VertsE0 )| = 0, |orb(ccE )| − |orb(ccE0 )| = 0. Consequently, ĝE = ĝE0 . Note that at this point we have concluded the proof that ĝE = ĝE0 if e is incident to two faces. Consider now a case when e is incident to one face, and there exists its incident vertex v with the set of flags contained in e. As we have already excluded the case when the flags of e is a whole connected component, e is incident with two vertices v and v 0 , and the flags of v 0 are not contained in e. Furthermore, v is of size 2, say v consists of flags y1 and y2 . Then, the cycle of the face incident with e is x1 , y1 , y2 , x2 , P for some sequence of flags P . Consequently, |orb(FacesE )| − |orb(FacesE0 )| = 0, |orb(VertsE )| − |orb(VertsE0 )| = 1, |orb(ccE )| − |orb(ccE0 )| = 0. 7 We infer that ĝE = ĝE0 . Note that at this point we have concluded the proof that ĝE = ĝE0 if e is incident to a size-2 vertex. Assume now that e is incident to one face, and every vertex incident with v has its set of flags not contained in e. Let f be the face incident with e. If the cycle of f is x1 , y1 , P1 , x2 , y2 , P2 , then the resulting face with cycle P1 P̄2 provides connectivity in E0 between the (remainings of) vertices incident with e. Consequently, In this case |orb(FacesE )| − |orb(FacesE0 )| = 0, |orb(VertsE )| − |orb(VertsE0 )| = 0, |orb(ccE )| − |orb(ccE0 )| = 0, and have then ĝE − ĝE0 = 1. In the last case, if the cycle of f is x1 , y1 , P1 , y2 , x2 , P2 , we have |orb(FacesE )| − |orb(FacesE0 )| = −1, |orb(VertsE )| − |orb(VertsE0 )| = 0, |orb(ccE )| − |orb(ccE0 )| ∈ {0, −1}, and then ĝE − ĝE0 ∈ {0, 2}. A direct corollary of Lemma 3.7 is the following. Corollary 3.8. The genus of an embedding is always nonnegative. Proof. Observe that any embedding can be turned into an empty embedding (i.e., one with no flags) by successive edge deletions. Since edge deletion cannot increase the genus (Lemma 3.7), and the empty embedding has genus zero, the lemma follows. 3.2.2 Drawing a new edge Let us now define a reverse operation to edge deletion. Before, let us introduce a notion of position pE (x) of a flag x. Let x, y = θ(x), y 0 = σ(y), x0 = σ(x) be the flags contained in the edge e containing x. We set pE (x) = (φ(x), φ(y)) if φ(y) ∈ / {x, x0 } and pE (x) = (φ(x), φ(σ(φ(y)))) otherwise. It is easy to observe that defining the process of deletion of e, we set a and b so that (a, b) = pE (x). This lets us use pE (x) to undo the deletion. We often do not want to specify the flags of the new edge. In this case, we write a = ⊥ instead of a = x0 , a = > instead of a = y, a = >0 instead of a = y 0 , and b = ⊥ instead of b = y 0 . Let E = (F, θ, σ, φ) be an embedding, and let a ∈ F ∪ {⊥, >, >0 } and b ∈ F ∪ {⊥}. By drawing a new edge (x, y, y 0 , x0 ) at (a, b) we mean the following operation, resulting in an embedding E0 . First, we add new flags {x, y, y 0 , x0 } to F and we set {x, x0 } and {y, y 0 } to be new orbits of σ and φ, and setting {x, y} and {x0 , y 0 } to be two new orbits of θ. Next, we replace a = ⊥, a = >, a = >0 , and b = ⊥ with a = x0 , a = y, a = y 0 , and b = y 0 , respectively. Finally, we adjust φ in the following two steps: If b 6= y 0 , we define b0 = φ(b) and replace the orbits {y, y 0 } and {b, b0 } with {y, b} and {y 0 , b0 }. Then, if a 6= x0 , we define a0 = φ(a) and the orbits {x, x0 } and {a, a0 } with {x, a} and {x0 , a0 }. We defined this operation so that it is clear that if e = (x, y, y 0 , x0 ) is an edge of E, then one can retrieve E from E − e by drawing a new edge (x, y, y 0 , x0 ) at pE (x). It is also easy to verify that drawing a new edge is a well defined and that if E0 is obtained from E by drawing a new edge e, then E = E0 − e. Note that a = ⊥ and b = ⊥ both result in creating a new vertex (two new vertices if a = ⊥ and b = ⊥ hold simultaneously). Moreover, if a = ⊥, then x belongs to a new size-2 vertex (x, x0 ), while a = >, then x belongs to a new size-2 face (x, y). We identify one more special case of drawing a new edge. If a and b are distinct flags that lie on the same face f , and furthermore, the order of flags on the cycle of f is φ(a), a, P, b, φ(b), P 0 for some (possibly empty) sequences of flags P and P 0 , then we say that the new edge is drawn along the boundary of f . Observe that if this is the case, then the new edge e is incident to two faces: in the new embedding E0 , the face f has been split into a face with cycle P, a, x, y, b and a face with cycle P 0 , φ(b), y 0 , x0 , φ(a). We explicitly allow here also the case b = φ(a); then the cycle of f is a, P, b for some sequence P , and the new embedding has new faces with cycles x0 , y 0 and P, a, x, y, b. Consequently, from Lemma 3.7 we immediately obtain the following. 8 Lemma 3.9. If E0 is created from E by drawing a new edge, then the genus of E0 is not smaller than the genus of E. Furthermore, the genera of E and E0 are equal if the edge has been drawn along a face boundary or at (a, b) with a ∈ {⊥, >}. 3.3 t-boundaried embeddings Definition 3.10 (t-boundaried embedding). A t-boundaried embedding is a tuple (E, t, L) where E = (F, θ, σ, φ) is an embedding, t is a nonnegative integer, and L is an injective function from a subset of orb(VertsE ) to [t]. The elements of the domain of L are called labelled vertices, and the elements of [t] are labels. A genus of a t-boundaried embedding (E, t, L) is the genus of the underlying embedding E. The main motivation to introduce t-boundaried embeddings is to then merge them. Definition 3.11 (merge of two t-boundaried embeddings). Let Eb1 and Eb2 be two t-boundaried embeddings, where Ebi = (Ei , t, Li ) and Ei = (Fi , θi , σi , φi ) for i = 1, 2, and the sets of flags F1 and F2 are disjoint. A t-boundaried embedding Eb = (E, t, L) with E = (F, θ, σ, φ) is a merge of Eb1 and Eb2 if it is created by the following process. First, we take Eb to be a disjoint union of Eb1 and Eb2 , that is, we take: F = F1 ∪ F2 θ = θ1 ∪ θ2 σ = σ1 ∪ σ2 φ = φ1 ∪ φ2 L = L1 ∪ L2 Then, for every label ` ∈ [t] that is contained in both the range of L1 and L2 , that is, there exists a cycle Ci corresponding to the orbit L−1 i (`) for i = 1, 2, we modify φ on the elements of C1 and C2 so that these elements form a single orbit of hσ, φi whose cycle C is a merge of C1 and C2 . We assign this cycle the label ` in the assignment L. A genus-minimum merge of Eb1 and Eb2 is a merge that minimizes its genus. Note that, as we only modify φ in the merge operation, the set of edges of a merge is a union of the edges of the components. In particular, it follows that every edge of a merge consists of four flags, and thus it is indeed an embedding. Definition 3.12 (equivalence of t-boundaried embeddings). Two t-boundaried embeddings Eb1 and Eb2 are b the genera of genus-minimum merges of Eb and Ebi for equivalent if for every t-boundaried embedding E, i = 1, 2 are equal. By Observation 3.6, there is a natural correspondence between the vertices of E and E − e for every edge e of E. This correspondence allows us to extend the definition of edge deletion to t-boundaried embeddings: if Eb = (E, t, L) and e is an edge in E, then a t-boundaried embedding Eb − e is defined as (E − e, t, L0 ), where L0 is defined so that for every vertex v0 of E − e, we take the corresponding vertex v of E, and copy its label to v0 if v is labelled. Note that the range of L0 may be a proper subset of the range of L if some labelled vertex in Eb has all its flags contained in the deleted edge e. Furthermore, the characterization of vertex cycles in Observation 3.6 lets us relate edge deletion to merging. Observation 3.13. Consider a merge Eb of t-boundaried embedding Eb1 and Eb2 . For every edge e of Eb1 , we have that Eb − e is a merge of Eb1 − e and Eb2 . Similarly, we can define the operation of drawing a new edge in a t-boundaried embedding; if a new vertex is created by this operation (due to a or b being equal to ⊥), we need to specify its label (or the fact b we add a special value ⊥` available for a and b, that it is unlabelled). Thus, for each label ` unused in E, denoting the fact that the new vertex remains is labelled `; ordinary ⊥ denotes the fact that it is unlabelled. A counterpart of Observation 3.13 requires dealing with a special situation. 9 Observation 3.14. Consider a merge Eb of t-boundaried embedding Eb1 and Eb2 , and let Eb10 be an embedding obtained from Eb1 by drawing an edge at (a, b). Then a merge of Eb10 and Eb2 can be obtained from Eb by drawing an edge at (a0 , b0 ) , where a0 = a and b0 = b except for the following situation: if a = ⊥` (or b = ⊥` ) for a label ` used in Eb but not in Eb1 , then a0 (resp. b0 ) is an arbitrary flag of Eb contained in a vertex with label `. 3.4 Nice embeddings We say that a vertex or a face is isolated if its set of flags is a whole connected component. Definition 3.15 (nice (t-boundaried) embedding). A t-boundaried embedding Eb = (E, t, L) with E = (F, θ, σ, φ) is nice if the following two conditions hold: 1. If an unlabelled vertex consists of less than 6 flags, then it is isolated. 2. If an edge e is incident to two faces, then for every face f incident with e, if we denote by x and y = θ(x) the two flags contained both in f and e, then there is a flag z ∈ f \ {x, y, φ(x), φ(y)} that is contained in a labelled vertex. Our goal in this section is to show that any embedding can be turned into an equivalent nice one. The main motivation for such a cleaning step is that a nice embedding enjoys a good size bound due to the Euler formula-style estimations, presented in the next section. 3.4.1 Nice embeddings are small Lemma 3.16. A t-boundaried nice embedding Eb = (E, t, L) of genus ĝ satisfies |F(E)| ≤ 48t + 24ĝEb. Proof. Let E = (F, θ, σ, φ). We perform a discharging argument. The setup is as follows: • every labelled vertex receives a charge of 2; • every isolated vertex receives a charge of 1; • every isolated face receives a charge of 1; • every edge receives a charge of 65 . The total initial charge is at most 2t + 2|orb(orb(ccE ))| + 56 |orb(EdgesE )|. Then we move the charge according to the following rules: 1. Every labelled vertex that is incident to only one face, sends a charge of 1 to the face it is incident with. 2. Every edge that is incident only to labelled vertices, divides a charge of 23 equally among the faces it is incident with. In other words, every flag in such an edge sends a charge of 16 to the face it is contained in. 3. Every edge that is incident with two vertices, one labelled and one unlabelled, gives a charge of 31 to the unlabelled incident vertex, and divides the remaining charge of 12 equally between the faces it is incident with. In other words, in the first part every flag in such an edge contained in unlabelled vertex sends a charge of 16 to the vertex it is contained in. In the second part, every flag in such an edge sends a charge of 18 to the face it is contained in. 10 4. Every edge that is incident only to unlabelled vertices, divides the charge of 23 equally among the vertices it is incident with. In other words, every flag in such an edge sends a charge of 16 to the vertex it is contained in. Clearly, every edge is left with non-negative charge (0 or 61 ). We now show that at the end of the process, every vertex and every face has charge of at least one. First, let us consider a vertex v. If v is labelled or isolated, 1 out of its initial charge remained, and the claim is straightforward. Next, we assume that v is unlabelled and not isolated. By the first property of a nice embedding, v is of size at least 6. It received exactly 16 from each of its flags, i.e., at least 1 in total. Consider now a face f . We make case distinction depending on how many flags of f belong to labelled vertices and how these flags are located on the cycle corresponding to f . No flags of f belong to a labelled vertex. Observe that every edge e incident with f is incident only with one face, as otherwise it would contradict the second property of a nice embedding. Consequently, f is isolated an it received an initial charge of 1. Exactly 2 flags of f belong to a labelled vertex. Suppose f is incident with only one labelled vertex v and shares two flags x and y = φ(x) with v. Let e be the edge containing x. By the second property of a nice embedding, f is the only face incident with e. Consequently, σ(x) belongs to f . Since σ(x) belongs to v, which is a labelled vertex, we infer that y = σ(x), the vertex v is of size 2, and f is the only face v is incident with. Thus, f received a charge of 1 from v. Exactly 4 flags of f belong to labelled vertices and they are consecutive along f . Let x, y = θ(x), x0 = φ(x), and y 0 = φ(y) be these four flags, and let e be the edge containing x and y. If e is incident to two faces, then it violates the last property of a nice embedding. Otherwise, the orbit {σ(x), σ(y)} of θ appears on f . Since only 4 flags of f belong to labelled vertices, we need to have {σ(x), σ(y)} = {x0 , y 0 }, and f is an isolated face of size 4. Hence, it received an initial charge of 1. The face f consists of 6 flags and they all belong to labelled vertices. In this case all flags in f are contained in edges incident only to labelled vertices. Thus, f receives a charge of 61 from each of these flags, which is 1 in total. Along f there exist two nonconsecutive orbits of φ that are included in labelled vertices. Let {x, x0 } and {y, y 0 } be these orbits. Since they are nonconsecutive, x, x0 , θ(x), θ(x0 ), y, y 0 , θ(y), θ(y 0 ) are eight pairwise distinct flags in f , each sending a charge of at least 81 to the face f . Note that the last three cases case cover the case of f having at least 4 flags contained in labelled vertices. We have shown that there was enough charge so that every vertex and every face received a charge of at least one. Consequently, |orb(FacesE )| + |orb(VertsE )| ≤ 2t + 2|orb(ccE )| + 65 |orb(EdgesE )|. Together with (2), it implies that ĝEb = |orb(EdgesE )| − |orb(FacesE )| − |orb(VertsE )| + 2|orb(ccE )| ≥ 16 |orb(EdgesE )| − 2t, i.e., |F| = 4|orb(EdgesE )| ≤ 48t + 24ĝEb. Corollary 3.17. There are 2O((t+ĝ) log(t+ĝ)) nice t-boundaried embeddings of genus at most ĝ, and they can be enumerated in time 2O((t+ĝ) log(t+ĝ)) . 3.4.2 Making an embedding nice Let Eb = (E, t, L) be a t-boundaried embedding with E = (F, θ, σ, φ). Our goal now is to obtain an equivalent nice embedding. To this end, we show that the following three operations lead to equivalent embeddings: 1. deleting an edge incident with an unlabelled size-2 vertex; 11 2. deleting an edge violating the last property of the definition of a nice embedding; 3. suppressing a size-4 unlabelled vertex that is not isolated. We will henceforth call them simplifying operations. Lemma 3.18 (deleting an edge incident to a size-2 unlabelled vertex). If e is an edge of Eb incident to an unlabelled vertex of size 2, then Eb − e and Eb are equivalent. Proof. We consider merges Eb and Eb − e with an arbitrary t-boundaried embedding Eb1 . b Observation 3.13 yields that EbM − e is a merge of Eb − e and First, let EbM be a merge of Eb1 and E. Eb1 and Lemma 3.7 implies that its genus does not exceed the genus of EbM . Consequently, the genus of a b genus-minimum merge of Eb1 and Eb − e is not larger than the genus of a genus-minimum merge of Eb1 and E. 0 In the other direction, let EbM be a merge of Eb − e and Eb1 . Let e = (x, y, y 0 , x0 ) where {x, x0 } is contained in an unlabelled size-2 vertex so that pEb(x) is of the form (x0 , b). Consequently, Eb can be obtained from Eb − e by drawing a new edge e at (⊥, b) for some b. By Observation 3.14, a merge EbM of Eb1 and Eb can be obtained 0 0 from EbM by drawing a new edge at (a0 , b0 ). Since a = ⊥, we have a0 = ⊥, so the genera of EbM and EbM are b b equal due to Lemma 3.9. Consequently, the genus of a genus-minimum merge of E1 and E is not larger than the genus of a genus-minimum merge of Eb1 and Eb − e. This completes the proof of the lemma. Lemma 3.19 (deleting an edge violating the last property of the definition of nice embedding). Let e be an edge in a t-boundaried embedding Eb that is incident to two faces. Furthermore, assume that one face f incident with e has the following property: if x and y = θ(x) are the two flags shared between e and f , then each flag z ∈ / {x, φ(x), y, φ(y)} on f belongs to an unlabelled vertex. Then Eb is equivalent with Eb − e. Proof. Again, we consider merges of Eb and Eb − e with an arbitrary t-boundaried embedding Eb1 . In one direction, the proof is the same as in the proof of the previous lemma: Observation 3.13 and Lemma 3.7 imply that the genus of a genus-minimum merge of Eb1 and Eb − e is not larger than the genus of b a genus-minimum merge of Eb1 and E. 0 b In the other direction, let EM be a merge of Eb1 and Eb − e. We consider two cases depending on whether f is of size 2. If so, then pE(x) is of the form (y, b), so Eb can be obtained from Eb − e by drawing an new edge 0 by drawing a at (>, b) for some b. By Observation 3.14, a merge EbM of Eb1 and Eb can be obtained from EbM 0 0 0 0 b b new edge at (a , b ). Since a = >, we have a = >, so the genera of EM and EM are equal due to Lemma 3.9. Next, suppose that f contains a flag z ∈ / {x, y}. Since e is incident to 2 faces, we conclude that σ(x) and σ(y) do not belong to e, and Eb can be obtained from Eb − e by drawing a new edge at (a, b) for a = σ(x) and 0 by drawing a new edge at b = σ(y). By Observation 3.14, a merge EbM of Eb and Eb1 can be obtained from EbM (a, b). Let the cycle of f be x, a, P, b, y for some (possibly empty) sequence of flags P . By the assumptions 0 of the lemma, every flag of P belongs to an unlabelled vertex. Consequently, in EbM there exists a face f 0 whose cycle contains consecutive flags a, P, b on its cycle, as no orbit of φ or θ on a, P, b has been altered This means that a new edge drawn at (a, b) is actually drawn at a face boundary. Hence, the genera of EbM 0 and EbM are equal due to Lemma 3.9. Consequently, the genus of a genus-minimum merge of Eb1 and Eb is not larger than the genus of a genusminimum merge of Eb1 and Eb − e, which concludes the proof of the lemma. For the last basic operation, we need to formally define it. Let Eb = (E, t, L) be a t-boundaried embedding with an unlabelled size-4 vertex v that is not isolated. Since v is not isolated, v is incident with two edges e1 and e2 , and each ei is incident with v and a vertex vi 6= v. Note that it is possible that v1 = v2 . Let x1 and x2 = φ(x1 ) be two flags in v such that xi belongs to ei . Furthermore, let yi = θ(xi ); note that yi lies in ei . We delete all four flags of v, and replace the orbits of θ on e1 and e2 with {y1 , y2 } and {σ(y1 ), σ(y2 )}. Clearly, we have replaced e1 and e2 with a new edge with flags y1 , y2 , σ(y1 ), σ(y2 ). We now formally verify that the output embedding is an equivalent one. 12 Lemma 3.20 (suppressing a size-4 unlabelled vertex that is not isolated). The operation of suppressing a size-4 unlabelled vertex leads to an equivalent embedding. Proof. We interpret the suppressing operation as a sequence of one edge drawing and two edge deletions. Observe that y1 , x1 , x2 , y2 are four distinct flags that lie on the same face f and, furthermore, they are consecutive in this order along the cycle of f . Let us draw a new edge ef along the boundary of f , at y1 and y2 , obtaining an embedding Ebf . Note that in Ebf there is a new face f 0 with cycle y1 , x1 , x2 , y2 , z2 , z1 , where {z1 , z2 } is a new orbit of θ contained in the edge ef . Furthermore, the edge ef with face f 0 fulfills the b Consequently, Ebf and Eb are equivalent. assumptions of Lemma 3.19, and its deletion from Ebf gives E. b Then, we delete edges e1 and e2 from Ef , obtaining an embedding Eb0 . Our goal is to show that such an operation leads to an equivalent embedding; note that if we rename the flags of ef to y1 , y2 , σ(y1 ), σ(y2 ) we obtain the output embedding of the suppressing operation. The proof is similar to that of Lemma 3.19, but without most of the special cases due to the existence of the edge ef . Let Eb1 be an arbitrary t-boundaried embedding. By Observation 3.13 and Lemma 3.7 yields that the genus of a genus-minimum merge of Eb1 and Eb0 is not larger than the genus of a genus-minimum merge of Eb1 and Ebf . 0 0 For the other direction, let EbM = (EM , t, L0M ) be a merge of Eb1 and Eb0 . Note that pEbf (x1 ) = (x2 , z1 ) and pb (x2 ) = (x0 , z2 ). Hence, Ebf can be retrieved from Eb0 by drawing edge e2 at (⊥, z2 ) and then edge e1 at Ef −e1 2 0 (x2 , z1 ). By Observation 3.14, a merge EbM of Ebf and Eb1 can be retrieved from EbM by drawing an edge e2 at (⊥, z2 ) and then e1 at (x2 , z1 ). Lemma 3.9 yields that the first of these operations asserts that the genus remains unchanged. As for the second operation, we observe after drawing e2 , we have that x2 , y2 , z2 , z1 is a fragment of face boundary and that e1 is drawn along it. Hence, Lemma 3.9 also implies that the genera 0 and EbM are equal. We infer that the genus of a genus-minimum merge of Eb1 and Ebf is not larger than of EbM the genus of a genus-minimum merge of Eb1 and Eb0 . This concludes the proof of the lemma. Armed with the three basic operations, we are now ready to prove the following statement. Lemma 3.21. There exists a polynomial-time algorithm that, given an arbitrary t-boundaried embedding, computes an equivalent nice one by successive applications of the simplifying operations. b Otherwise, observe that Proof. Let Eb be a t-boundaried embedding. If Eb is nice, we can just return E. any object that violates the niceness of Eb gives rise to an application of one of the simplifying operations. b the resulting embedding is An edge violating the last property of a nice embedding can be deleted from E; equivalent due to Lemma 3.19. Similarly, if there exists an unlabelled size-2 vertex, then Lemma 3.18 allows us to safely delete the incident edge, and a size-4 unlabelled vertex that is not isolated can be also suppressed by Lemma 3.20. Finally, note that each execution of a simplifying operation strictly decreases the number of flags in the embedding. Consequently, in polynomial time we obtain an equivalent nice embedding. 4 Bounded treewidth graphs In this section we prove Theorem 1.2. Without loss of generality, we can assume that the input tree decomposition (T, β) of the input graph G is a nice tree decomposition of width less than k, that is, every bag of (T, β) is of size at most k. We first refine (T, β) as follows. First, with every node t we associate a graph G(t), initialized as G(t) := G↓ (t). In the refinement process, we will maintain the invariant that at every node t, the graph G(t) is a subgraph of G[α(t)] and a supergraph of G↓ (t); in particular, V (G(t)) = V (G↓ (t)). Note that one needs only O(t2 ) bits to store G(t) at every node t, as one needs only to store which edges of G[β(t)] belong to G(t). For every forget node t we perform the following refinement process. Let t0 be the child of t, and let v be the forgotten vertex, i.e., {v} = β(t0 ) \ β(t). Let e1 , e2 , . . . , e` be the edges incident with v that have their 13 second endpoint in β(t); note that {e1 , e2 , . . . , e` } are exactly the edges that are present in G↓ (t) but are not present in G↓ (t0 ). Our goal is to refine the edge tt0 of T by inserting a number of vertices on this edge so that the transition from G↓ (t0 ) to G↓ (t) is more smooth. More precisely, we subdivide the edge tt0 ` times, inserting vertices t1 , t2 , . . . , t` in this order, such that t1 is adjacent with t, and t` is adjacent with t0 . Furthermore, to every node ti add a second child si that is a leaf of the tree T . The new node si is of a new type, namely edge leaf : we set β(si ) = β(t0 ), V (G(si )) = β(t0 ), and E(G(si )) = {ei }. The node ti is a join node with G(ti ) = G↓ (t0 ) − {e1 , e2 , . . . , ei−1 }. This completes the description of the tree decomposition refinement. By this step, we have obtained the following properties: at every introduce or forget node t with child t0 we have G(t) = G(t0 ), while at every join node t with children t1 and t2 we have E(G(t)) = E(G(t1 )) ] E(G(t2 )). Furthermore, note that we have introduced two nodes for every edge of G, giving O(nk) new nodes in total. We compute a labelling function Λ : V (G) → [k] such that Λ is injective on every bag of (T, β); such a labelling Λ is straightforward to compute in a top-to-bottom fashion, using the fact that every bag of (T, β) is of size at most k. With the refined tree decomposition, we perform a bottom-up dynamic programming algorithm. Fix a node t ∈ V (T ). For a subset A ⊆ α(t) and an embedding E of G(t)[A], we can naturally equip E with a structure of a k-boundaried embedding by assigning labels Λ|β(t) (which is an injective function). We will denote such a k-boundaried embedding at node t as bnd(t, E) At t, we maintain the following DP table. For every set X ⊆ β(t) and for every nice k-boundaried b ∈ embedding Eb of genus at most g that uses only labels of Λ(β(t) \ X), we remember a value T[t, X, E] b to indicate the minimum size of a deletion {0, 1, . . .} ∪ {+∞}. Intuitively, we would like the value T[t, X, E] b However, for sake of set Y ⊆ α(t) \ β(t) such that G(t) − (X ∪ Y ) can be embedded equivalently with E. the formal argument, we strip the above intuition into only its essential parts, and define the following two properties that we maintain: b 6= +∞, then for every k boundaried embedding (a finite value yields small deletion set) If T[t, X, E] b E0 that uses only labels of Λ(β(t) \ X) and for every merge Eb0M of Eb and Eb0 , there exists a set b an embedding E of G(t) − (X ∪ Y ), and a merge EbM of Y ⊆ α(t) \ β(t) of size at most T[t, X, E], b bnd(t, E) and E0 of genus not larger than the genus of Eb0M . (a good deletion set is represented in the table) for every set Y ⊆ α(t) \ β(t), every embedding E of G(t) − (X ∪ Y ), every k-boundaried embedding Eb0 that uses only labels of Λ(β(t) \ X), and every merge Eb0M of bnd(t, E) and Eb0 , there exists a nice k-boundaried embedding Eb and a merge EbM of Eb and Eb0 b ≤ |Y | and the genus of EbM is not larger than the genus of Eb0M . such that T[t, X, E] The above invariants include only one inequality from the definition of equivalence: the one that is needed for the proof of the correctness of the algorithm. In particular, since the root node r has an empty bag, the minimum value of T[r, ∅, ·] at the root node is the size of the minimum solution to Genus Vertex Deletion on (G, g). Indeed, by the second invariant, an optimum solution Y ∗ and the corresponding embedding E ∗ has its corresponding entry Eb∗ when merged with an empty embedding Eb0 (so that Eb0M = bnd(r, E) = (E, k, ∅)), and we have |Y ∗ | ≥ T[r, ∅, Eb∗ ]. In the b and again an empty embedding other direction, the first invariant ensures that for every entry T[r, ∅, E] b there exists a deletion set Y of size at most T[r, ∅, E] b and an Eb0 and the only possible merge Eb0M = E, b b embedding E of G − Y such that bnd(r, E) has genus at most the genus of E0M = E, which is at most g. b in a bottom-to-up fashion. We now show how to compute the values T[t, X, E] The computation is trivial at leaf nodes (empty bag, empty graph G(t)) and at edge leaf nodes (a single edge with distinct endpoints). Furthermore, observe that at introduce nodes, we just copy the corresponding entries in T, as the new vertex is isolated in G(t) and the notion of an embedding ignores isolated vertices. Thus, we are left with tackling forget and join nodes. b with a value a: we set T[t, X, E] b := To this end, we define an operation of updating a cell T[t, X, E] b max(a, T[t, X, E]). We say that the update was successful if the stored value changed. 14 4.1 Forget nodes Let t be a forget node with child t0 and let v be the forgotten vertex. Note that, due to the refinement step, we have G(t0 ) = G(t). The only difference between the nodes t and t0 is that if we consider some embedding E of a subgraph of G(t), then bnd(t0 , E) assigns a label Λ(v) to the vertex v, while in bnd(t, E) the vertex v remains unlabelled. b to +∞. This is straightforward to implement in our DP tables. We start by setting all values T[t, X, E] 0 0 b b b For every cell T[t , X, E] with v ∈ X, we update the cell T[t, X \ {v}, E] with value T[t , X, E] + 1: when v is deleted, the embedding does not change, but we need to account for the vertex v in the value of the cell. For every cell T[t0 , X, Eb0 ] with v ∈ / X, we create an embedding Eb from Eb0 by first forgetting the label of the vertex v (so it becomes an unlabelled one), and then by applying Lemma 3.21 to obtain an equivalent b with value T[t0 , X, Eb0 ]. embedding. We update the cell T[t, X, E] We now formally verify that the entries for node t satisfy the required properties. b that is less than +∞, a k-boundaried embedding Eb0 and a merge First property. Take a cell T[t, X, E] 0 0 b0 b b b b E0M of E and E0 . Let T[t , X , E ] be the last cell that caused an update in the value of T[t, X, E]. 0 0 0 b By the first property, applied inductively to the First, assume v ∈ X ; then X = X ∪ {v} and Eb = E. b the embedding Eb0 and the merge Eb0M , we obtain a set Y 0 of size at most T[t0 , X 0 , E], b an cell T[t0 , X 0 , E], 0 0 0 0 0 0 0 b b embedding E of G(t ) − (X ∪ Y ) and a merge EM of bnd(t , E ) and E0 of genus at most the genus of Eb0M . b Consequently, E 0 is an embedding Set Y = Y 0 ∪ {v}; then X ∪ Y = X 0 ∪ Y 0 while |Y | = |Y 0 | + 1 ≤ T[t, X, E]. 0 of G(t) − (X ∪ Y ), and together with Y and EbM satisfies the requirements of the first property. 0 In the second case, we have v ∈ / X , and X = X 0 . Let Eb◦ be the embedding Eb0 with the label of v b dropped; recall that E is a result of application of Lemma 3.21 to the embedding Eb◦ . Since Eb◦ is equivalent b the genus-minimum merge Eb◦ of Eb◦ and Eb0 has genus not larger than the genus of Eb0M . Since neither to E, M ◦ ◦ 0 with additionally label Λ(v) assigned to the vertex to be EbM Eb nor Eb0 uses the label Λ(v), we can define EbM v; note that this operation does not change the genus of the embedding. As Eb0 does not use the label Λ(v), 0 0 , yields is a merge of Eb0 and Eb0 . The first property, applied to the cell T[t0 , X 0 , Eb0 ], Eb0 , and the merge EbM EbM 0 0 0 0 0 0 existence of a set Y ⊆ α(t ) \ β(t ), an embedding E of G(t ) − (X ∪ Y ), and a merge EbM of bnd(t0 , E) and 0 Eb0 of genus at most the genus of EbM . Since G(t0 ) = G(t), X 0 = X, and Eb0 does not use the label Λ(v), EbM 0 b is a merge of bnd(t, E) and E0 . Furthermore, since the genus of EbM is at most the genus of Eb0M , the tuple 0 (Y , E, EbM ) fulfills the first property. Second property. Take a set Y , E, Eb0 , and Eb0M as in the statement of the second property. If v ∈ Y , take Y 0 = Y \ {v} and X 0 = X ∪ {v}, and otherwise take Y 0 = Y and X 0 = X. In both cases, we have X ∪ Y = X 0 ∪ Y 0 , X 0 ⊆ β(t0 ), and Y 0 ⊆ α(t0 ) \ β(t0 ). Since Eb0 does not use the label Λ(v), Eb0M is also a merge of bnd(t0 , E) and Eb0 . By the second property 0 for t0 , X 0 , Y 0 , Eb0 , and Eb0M , we obtain a k-boundaried embedding Eb0 and a merge EbM of Eb0 and Eb0 of genus 0 0 b0 0 0 b at most the genus of E0M such that T[t , X , E ] ≤ |Y |. While processing the cell T[t , X 0 , Eb0 ] the algorithm b for Eb being a result of an application of Lemma 3.21 to the embedding attempts an update on a cell T[t, X, E] ◦ 0 b b E being the embedding E with the label of v dropped. A direct check shows that in regardless of whether b ≤ |Y |. v belongs to Y or not, it follows that T[t, X, E] ◦ 0 ◦ b b Let EM be the embedding EM with the label Λ(v) dropped if present; note that the genera of EbM and 0 ◦ ◦ EbM are equal. Since the embedding Eb0 does not use the label Λ(v), the merge EbM is a merge of Eb and Eb0 . b the genus-minimum merge EbM of Eb and Eb0 is of genus at most the genus of By the equivalence of Eb◦ and E, ◦ b EM , which in turn is at most the genus of Eb0M . Thus, Eb and EbM fulfill the second property for Y , E, Eb0 , and Eb0M . This finishes the description and the proof of correctness of the computations at forget nodes. 15 4.2 Join nodes Let t be a join node with children t1 and t2 . Note that we have V (G(t1 )) ∩ V (G(t2 )) = β(t), V (G(t1 )) ∪ V (G(t2 )) = V (G(t)) and E(G(t)) = E(G(t1 )) ] E(G(t2 )). We iterate over every set X ⊆ β(t) and every pair of cells T[t1 , X, Eb1 ] and T[t2 , X, Eb2 ]. Note that both Eb1 and Eb2 are k-boundaried embeddings with labels on vertices of β(t) \ X. For every k-boundaried embedding Eb0 that is a merge of Eb1 and Eb2 , we use Lemma 3.21 to compute a nice embedding equivalent to Eb0 , and b with T[t1 , X, Eb1 ] + T[t2 , X, Eb2 ]. update T[t, X, E] We now formally verify that the entries for node t satisfy the required properties. b that is less than +∞, a k-boundaried embedding Eb0 and a merge First property. Take a cell T[t, X, E] b b b b comes from considering cells E0M of E and E0 . Let g0 be the genus of Eb0M . Assume the value of T[t, X, E] 0 T[ti , X, Ebi ] and a merge Eb of Eb1 and Eb2 . b the genus-minimum merge EbA of Eb0 and Eb0 is of genus at most g0 . Since By the equivalence of Eb0 and E, M 0 A b b b E is a merge of E1 and E2 , if we delete the edges of Eb2 from the embedding EbM , we obtain an embedding Eb1A A of not larger genus that is a merge of Eb1 and Eb0 . Furthermore, observe that EbM is a merge of Eb1A and Eb2 . A We apply the first property to the cell T[t2 , X, Eb2 ] with Eb1A and EbM , obtaining a set Y2 , an embedding A B b b E2 , and a merge EM of bnd(t2 , E2 ) and E1 with genus at most g0 . Recall that Eb1A is a merge of Eb1 and Eb0 . B we obtain an embedding Eb2B that is a merge of bnd(t2 , E2 ) Consequently, if we delete the edges of Eb1 from EbM B b b and E0 . Furthermore, observe that EM is a merge of Eb2B and Eb1 . B , obtaining a set Y1 , an embedding We now apply the first property to the cell T[t1 , X, Eb1 ] with Eb2B and EbM B B b b b E1 , and a merge EM of bnd(t1 , E1 ) and E2 of genus at most g0 . Since E2 is a merge of bnd(t2 , E2 ) and Eb0 , if we delete the edges of Eb0 from EbM , we obtain an embedding Eb12 that is a merge of bnd(t1 , E1 ) and bnd(t2 , E2 ). Let E be the embedding underlying Eb12 and let Y = Y1 ∪ Y2 . Then, E is an embedding of G(t) − (X ∪ Y ) such that EbM is a merge of bnd(t, E) with Eb0 . Since the genus of EbM is at most g0 , the proof of the first property is finished. Second property. Take a set Y , E, Eb0 , and Eb0M as in the statement of the second property, and let g0 be the genus of Eb0M . For i = 1, 2, take Yi = Y ∩ α(ti ) and Ei to be the embedding E restricted to the edges of G(ti ) (i.e., with the edges of G(t3−i ) deleted). Note that bnd(t, E) is a merge of bnd(t1 , E1 ) and bnd(t2 , E2 ). First, let Eb1A be the embedding Eb0M with the edges of E2 deleted. Observe that Eb1A is a merge of bnd(t1 , E1 ) and Eb0 , while Eb0M is a merge of Eb1A and bnd(t2 , E2 ). By the second property, applied to t2 , X, Y2 , E2 , Eb1A , B and Eb0M , we obtain a nice k-boundaried embedding Eb2 and a merge EbM of Eb2 and Eb1A of genus at most g0 b such that T[t2 , X, E2 ] ≤ |Y2 |. B Now, if we delete the edges of E1 from EbM , we obtain an embedding Eb2B . Observe that Eb2B is a merge of B is a merge of bnd(t1 , E1 ) and Eb2B . We apply the second property to t1 , X, Y1 , E1 , Eb2B , Eb0 and Eb2 , while EbM B b and EM , obtaining a nice k-boundaried embedding Eb1 and a merge EbM of Eb1 and Eb2B of genus at most g0 such that T[t1 , X, Eb1 ] ≤ |Y1 |. Let Eb be the embedding EbM with the edges of Eb0 deleted. Since EbM is a merge of Eb1 and Eb2B , which in turn is a merge of Eb2 and Eb0 , we have that Eb is a merge of Eb1 and Eb2 and EbM is a merge of Eb and Eb0 . b with the value Consequently, the algorithm attempts an update on the cell T[t, X, E] T[t1 , X, Eb1 ] + T[t2 , X, Eb2 ] ≤ |Y1 | + |Y2 | ≤ |Y |. Since the genus of EbM is at most g0 , the pair Eb and EbM fulfills the second property for Y , E, Eb0 , and Eb0M . 4.3 Summary We have concluded description and correctness proofs of the operations at the nodes of the tree decomposition. At every node t, a straightforward implementation takes time polynomial in the number of entries 16 b which, by Corollary 3.17, is 2O((k+g) log(k+g)) . This finishes the proof of Theorem 1.2. T[t, X, E], 5 Irrelevant vertex In this section, we prove Theorem 1.3: Theorem 1.3. For every integer g there exists a constant Cg such that the following holds. Given a graph G, an integer k, and a set M ⊆ V (G) such that G − M is embeddable into a surface of genus at most g, one can in time Cg nO(1) find one of the following: 1. a tree decomposition of G of width at most Cg |M |1/2 k 3/2 ; 2. a vertex w ∈ V (G) such that every solution to the Genus Vertex Deletion instance (G, g, k) contains w; or 3. a vertex v ∈ V (G) such that (G, g, k) is a yes-instance to Genus Vertex Deletion if and only if (G − {v}, g, k) is. The argumentation is heavily inspired by the corresponding planar case by Marx and Schlotter [10]. As in most irrelevant vertex arguments, we follow typical outline: 1. Run an approximation algorithm for treewidth and, in case it returns that the treewidth of the graph is larger than the required threshold, find a large grid minor. Here, the linear dependency on the grid size and treewidth in bounded genus graphs is known, and one can find the corresponding grid minor efficiently. 2. Show that a vertex w ∈ M that is connected to many places in the grid that are far apart needs to be included in every solution, exactly as it is in the planar case. In the absence of such a vertex, a large part of the grid minor is flat, that is, embeds planarly and does not have any internal connections to the modulator M . 3. Prove that a middle vertex of such a flat part is irrelevant. Here, the challenge is to argue that in every solution there exists an embedding of the remaining part that draws the flat part indeed in a flat manner. We repeatedly use the following auxiliary result throughout this section: Lemma 5.1 S ([3, Lemma B.6]). Let Γ be a surface of Euler genus g and let C be a set of g + 1 disjoint circles in Γ. If Γ \ C has a component D0 whose closure in Γ meets every circle in C, then at least one of the circles in C bounds a disc in Γ that is disjoint from D0 . Let G, k, g, and M be such as in the statement of Theorem 1.3. We start by computing an embedding E0 of G − M into a surface of Euler genus at most g, using either the algorithm of Kawarabayashi, Mohar, and Reed [7] or the older algorithm of Mohar [11].1 This takes time Cg1 n for some constant Cg1 depending only on g. 5.1 Finding a large grid We apply a constant-factor approximation algorithm for treewidth and largest excluded grid minor in graphs with a fixed excluded minor [2, Theorem 3.11]. The algorithm does not need to compute a near-embedding of G, as E0 serves this purpose. Thus, the algorithm as described in [2, Theorem 3.11] runs in time Cg2 nO(1) for some constant Cg2 depending only on g, and is a Cg3 -approximation. If the resulting tree decomposition is of width at most Cg4 |M |1/2 k 3/2 for some sufficiently large constant 4 Cg , then we directly return it. Otherwise, by choosing the constant Cg4 appropriately, we get a grid minor 1 The work [7] appeared so far only as an extended abstract in conference proceedings. 17 Figure 2: A wall of sidelength 4 and a subdivision of this wall. of sidelength Θ(|M |1/2 (k + g)3/2 g 1/2 ). By standard arguments, we henceforth focus on the case when we get a wall W0 of sidelength `0 as a subdivision in G − M , where `0 = Θ(|M |1/2 (k + g)3/2 g 1/2 ) can be chosen arbitrarily large; see Figure 2 for the definition of a wall. √ In the wall W0 , we identify g + 1 pairwise disjoint subwalls of sidelength `1 for every `1 = Θ(`0 / g) = Θ(|M |1/2 (k + g)3/2 ), leaving enough space between the subwalls so that the part of W0 not contained in any of the subwalls is connected. By Lemma 5.1, for at least one of the identified subwalls, its surrounding cycle bounds a disc in the considered embedding of G − M . Consequently, at least one of the identified subwalls is planarly embedded in E0 . We denote this subwall as W1 and the part of G − M embedded in the disc separated by the surrounding cycle of W1 by G1 . In what follows, we mostly focus on G1 and W1 . 5.2 Filtering out the modulator neighbors We now show that if a vertex w ∈ M is adjacent to many scattered vertices of G1 , then it needs to be included in every solution. We start with constructing a canonical graph of Euler genus larger than g. Lemma 5.2. For an integer ` > 1, let B` be a graph defined as follows. We take ` disjoint copies of K5− (i.e., the five-vertex clique K5 with an edge deleted), and denote by vi and wi the endpoints of the removed edge in the i-th copy. We introduce two further vertices v and w and make v adjacent to all vertices vi and w adjacent to all vertices wi . Then, the Euler genus of B` is at least `/2. Proof. Consider an embedding of B` into a surface Γ of Euler genus g. For i = 1, 2, . . . , `, let γi be the triangle in the i-copy of K5− that does not pass through vi or wi , treated as a closed curve on Γ. Since Γ has Euler genus g, by Lemma 5.1, at least ` − g of the curves γi must be contractible. Consider an index i for which γi is contractible, and let V (γi ) be the three vertices of G that lie on γi . Since G − V (γi ) is connected, γi is a boundary of a face of the embedding of G. Augment the graph G by adding a new vertex xi inside this face, and connect it to the three vertices of V (γi ). In this manner, the i-th copy of K5− , together with the new vertex xi , forms a nonplanar graph (a supergraph of K3,3 ). Consequently, we cannot perform this operation in parallel for more than g indices i. We infer that ` ≤ 2g, and the lemma is proven. Recall that the boundary cycle of W1 encloses a disc containing W1 in the considered embedding E0 of G − M , and G1 is the part of the graph G − M that is enclosed by this boundary cycle. For a vertex v ∈ V (G1 ) and an integer `, the radius-` ball B(v, `) around v is defined as follows: we take all faces f of W1 (excluding the infinite face) that contain v either inside or on the boundary, mark all faces that lie in face-vertex distance (excluding traversal through the infinite face) at most ` from one of these faces f and put into B(v, `) all vertices of G1 that are contained inside or on the boundary of marked faces. For every w ∈ M , we create a set I(w) ⊆ V (G1 ) as follows. We start with I(w) = ∅ and every vertex of V (G1 ) unmarked. As long as there exists an unmarked neighbor v of w in G1 , we insert v into I(w) and mark all vertices of B(v, `2 ) for `2 = 100(k + g + 1). We claim that if I(w) is too large, the vertex w needs to be deleted in any solution to Genus Vertex Deletion. 18 Lemma 5.3. Let w ∈ M be a vertex for which |I(w)| > k + 2g + 1. Then w belongs to every solution to Genus Vertex Deletion instance (G, g, k). Proof. Suppose the contrary, and let S be a solution that does not contain w. That is, |S| ≤ k, and G − S admits an embedding E into a surface of Euler genus at most g. Consider subgraphs B(v, `2 /4) for v ∈ I(w). By the construction of I(w), these subgraphs are vertexdisjoint. Furthermore, as `2 /4 is much larger than k, for every v1 , v2 ∈ I(w), v1 6= v2 , there exists a set P(v1 , v2 ) of k + 1 vertex-disjoint paths in G1 connecting the outer boundary of B(v1 , `2 /4) with the outer boundary of B(v2 , `2 /4), without any internal vertex in any of the subgraphs B(v, `2 /4) for v ∈ I(w). Let I 0 be the set of these vertices v ∈ I(w) such that S is disjoint with V (B(v, `2 /4)); since |S| ≤ k, we have I 0 > 2g + 1. Construct a minor H of G − S as follows. Pick some arbitrary v0 ∈ I 0 and contract B(v0 , `2 /4) onto v0 . For every v ∈ I 0 \ {v0 }, contract onto v0 a path of P(v0 , v) that is disjoint with S. For every v ∈ I 0 \ {v0 }, contract B(v, `2 /4) into a K5− (recall that B(v, `2 /4) contains a large wall, being part of W1 ) such that one of the two nonadjacent vertices is adjacent to w and the other to v0 . We have obtained that B2g+1 (as defined in Lemma 5.2) is a minor of G − S, a contradiction with Lemma 5.2. Consequently, if there exists w ∈ M with |I(w)| > k + 2g + 1, then we can return w as the second result of the algorithm of Theorem 1.3. Henceforth we will assume that |I(w)| ≤ k + 2g + 1 for every w ∈ M . Recall that W1 is a wall of sidelength `1 , where `1 = Θ(|M |1/2 (k + g)3/2 ) can be chosen arbitrarily large. This lets us identify n3 disjoint subwalls S of sidelength `3 = 100(k + g), where n3 = Θ(|M |(k + g)) can be chosen arbitrarily large. Note that | w∈M I(w)| = O(|M |(k + g)) and that all neighbors of M are located S in w∈M,v∈I(w) B(v, `2 ). Each ball B(v, `2 ) may intersect only a constant number of the identified subwalls of sidelength `3 . Hence, if n3 = Θ(|M |(k + g)) is sufficiently large, there is a subwall W3 of sidelength `3 = 100(k + g) such that no vertex of G3 , defined as the part of G1 that is enclosed by the outer boundary of W3 , is a neighbor of a vertex in M . Note that only the vertices on the outer boundary of G3 may have neighbors in G − V (G3 ). With G3 and W3 , we proceed to the next section. 5.3 Middle vertex of a flat part is irrelevant Let v be a vertex on the middle face of W3 . We show that v is irrelevant, that is, it can be returned as the outcome of Theorem 1.3. Clearly, if (G, g, k) is a yes-instance, then so is (G − {v}, g, k). In the other direction, suppose that there exists S ⊆ V (G) \ {v} such that G − {v} − S admits an embedding E into a surface of Euler genus at most g. We would like to enhance this embedding so that it also accommodates v. The sidelength `3 of W3 is large enough to find in W3 a subdivision of a circular wall W4 of height h4 = 5(k + g) + 9 and circumference `4 = min(3, k + 1) so that v is located inside the inner cycle of the wall; see Fig. 3 for the definition of a circular wall. Next, in W4 we identify k + g + 2 rings (which are concentric circular walls of height 5 and circumference `4 ), separated by layers of height 1; see Fig. 3. Let R0 be the family of identified rings. For a ring R ∈ R0 , we say that the central circle of R is the circle between the two middle layers of the ring, and the boundary circles are the circles separating R from the remainder of W4 . A face of R in the embedding E0 is small if it is not the outerface nor the face inside the innermost cycle, and central if it is incident to the central circle. The territory of R, denoted by T (R), is the subgraph of G that consists of R and everything that is drawn in the embedding E0 in the small faces of R. Note that T (R) is a planar graph, and the subgraphs {T (R) : R ∈ R0 } are vertex-disjoint. Let R ⊆ R0 be the family of these rings for which T (R) is disjoint with S. As |R0 | = k + g + 2 and the subgraphs T (R) are vertex-disjoint, we have |R| ≥ g + 2. We say that a ring R is embedded plainly in the embedding E if for every central face f of R, the cycle C f that surrounds f in E0 , is a two-sided cycle in E that bounds a disc on one side, and the graph R − V (C f ) is drawn on the other side. The following lemma is an easy corollary of Lemma 5.1: Lemma 5.4. There exists R ∈ R that is embedded plainly in E. 19 Figure 3: A circular wall of height 9 and circumference 12 containing two rings. Their central circles are marked with red squares. 20 e2 P f e e1 Figure 4: Illustration for the proof of Corollary 5.5. Proof. Suppose the contrary. For every ring R ∈ R, let C(R) be the cycle around a small face of R that S violates the definition of a plainly embedded ring. Consider a graph G0 = G − M − S − R∈R V (C(R)). We shall prove that it has a large connected component D which contains R0 := R \ V (C(R)) for each R ∈ R. First, note that R0 is itself connected and the boundary circles of R of are preserved in R0 . Thus, it suffices to prove that for every two consecutive rings R1 , R2 ∈ R, the inner boundary circle of R2 is connected to the outer boundary circle of R1 . Observe that the part of W4 between these circles is a circular wall of circumference `4 and some positive height. Thus, there are S `4 ≥ k + 1 vertex-disjoint paths between the two boundary circles. These paths are disjoint with M and R∈R V (C(R)), and at least one of them must be disjoint with S. Hence, one of these paths is preserved in G0 . We conclude that the claimed component D indeed exists. It is adjacent to every cycle C(R), so Lemma 5.1, due to our assumption on how cycles C(R) are embedded in E, yields that the Euler genus of the embedding E is at least |R|, which is more than g. Let R ∈ R be a plainly embedded ring, and let CR be the central circle of R. A direct corollary of the definition of a plainly embedded ring is the following. Corollary 5.5. In the embedding E, CR is a two-sided cycle, and its incident edges of R are partitioned between the sides of CR exactly as in the embedding E0 . Proof. Let e1 and e2 be two edges of R \ E(CR ) that are incident to CR that are two consecutive edges on the same side of CR in E0 . Furthermore, let P be the path between e1 and e2 in CR that is not incident to any other edge of R \ E(CR ) on the same side as e1 , and let f be the face of the embedding of R in E0 that is incident with e1 , e2 , and P ; see also Figure 4. Let e be the other edge of R \ E(CR ) incident to P (the one that is drawn on the opposite side of CR than e1 in E0 ). Since R is plainly embedded in E, the embedding E restricted to R has a face surrounded by C f , and thus, as we traverse P in E, the edges e1 and e2 are on one side, and e is on the other side. Since the choice of e1 , e2 , and f is arbitrary, the claim follows. Corollary 5.5 allows us to speak about the inner and outer side of CR in E: the sides of CR that contain incident edges inside CR and outside CR in E0 . A bridge is a connected component C of G − V (R), together with the edges joining C with V (R). Furthermore, an edge e ∈ / E(R) with both endpoints in V (R) is also a bridge on its own. For a bridge B, the vertices of V (B) ∩ V (R) are attachment points. A bridge B is central if it has at least one attachment point, but all its attachment point lie in V (CR ). Note that, since R is contained in W3 , a central bridge is disjoint with M and in the embedding E0 it is drawn inside one of the small faces of R incident with CR . In particular, a central bridge is a subgraph of the territory of R. Let H be the subgraph of G − M that consists of: the part of G − M that is enclosed on the same side of CR in the embedding E0 as the vertex v (i.e., on the disc, flat side of CR ), together with all central bridges. In other words, H is a subgraph of G − M induced by the vertices of CR and all connected components of G − M − V (CR ) that are contained in the same connected component of G − M as CR , except for the 21 connected component of G − M − V (CR ) that contains the outermost concentric cycle of R. The boundary of H, denoted ∂H, is the set of vertices of H that have incident edges of G that do not belong to H. Armed with these observations, we now modify the embedding E of G − S − {v} as follows. First, we cut the surface along the cycle CR , and cap with discs the two resulting holes. This operation can only lead to a surface of a lower Euler genus. Second, we remove all edges of H from E, and all vertices of H that become isolated by this operation. Observe that due to Corollary 5.5, now in E there is a face f , containing one of the discs glued to CR (the one glued on the inner side of CR ). Note that if we restrict the embedding E0 to H, we obtain a plane embedding EH of H with an additional property that every vertex of ∂H lies on the outerface. Consider a bridge B that has an attachment point in V (CR ), but is not central (i.e., is not a subgraph of H). Note that due to the fact that R is plainly embedded, in E the bridge B needs to be drawn in the same face of R as in the embedding E0 . Thus, the order of the vertices of ∂H on the outerface of EH is exactly the same as the order of these vertices in the modified embedding E 0 . Consequently, the embedding EH of H can be glued into f , identifying correspondingly the vertices of V (H) that remain in E. In this manner, we obtain an embedding E 0 of G − (S \ V (H)), concluding the proof that v is irrelevant. This finishes the proof of Theorem 1.3. 6 Conclusions In this work we have developed fixed-parameter algorithms for the Genus Vertex Deletion problem with solution size and treewidth parameterizations, putting particular effort into optimizing the dependency on the treewidth parameter in the running time bound. We remark that, although our formal statement of Genus Vertex Deletion involves only bounding the Euler genus of the output graph, only minor changes to our algorithms are required if one demands the final graph to be embeddable in an orientable surface of some genus. In terms of combinatorial embeddings, studied in Section 3, an embedding is orientable if the set of flags can be partitioned into two parts (called left and right) such that every orbit of σ, θ, and φ contains two flags from different sets. The crucial observation is that deleting an edge, drawing an edge along a face boundary, and suppressing a size-4 vertex that is not isolated, applied to an orientable embedding results in an embedding that is also orientable. Consequently, if we allow only orientable embeddings in the dynamic programming algorithm of Section 4, we obtain the desired variant of Theorem 1.2 for orientable surfaces. Finally, the arguments of Section 5 operate in the language of modifying an embedding in a fixed surface, and therefore yield also without any changes a variant of Theorem 1.3 for orientable surfaces. We would like to conclude with two open questions, stemming from our research. First: Can we obtain a 2O(Cg k log k) n-time algorithm, following the ideas of [5] for the planar case? Our bounded treewidth routine suits such an algorithm, but the irrelevant vertex argument does not. Second, and more challenging: what can we say about possible dependency on the parameter k for the problem of deleting k vertices to an arbitrary minor-closed graph family? A similar question can be asked for the parameter treewidth. Here, the main challenge is that it is harder to certify being H-minor-free for an arbitrary graph H, while one can certify being of bounded genus by giving a corresponding embedding. References [1] Marek Cygan, Fedor V. Fomin, Lukasz Kowalik, Daniel Lokshtanov, Dániel Marx, Marcin Pilipczuk, Michal Pilipczuk, and Saket Saurabh. Parameterized Algorithms. Springer, 2015. doi:10.1007/978-3-319-21275-3. [2] Erik D. Demaine, Mohammad Taghi Hajiaghayi, and Ken-ichi Kawarabayashi. Algorithmic graph minor theory: Decomposition, approximation, and coloring. In 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005, pages 637–646. IEEE Computer Society, 2005. doi:10.1109/SFCS.2005.14. [3] Reinhard Diestel. Graph Theory, volume 173 of Graduate Texts in Mathematics. Springer-Verlag, Heidelberg, 5th edition, August 2016. URL: http://diestel-graph-theory.com/. 22 [4] Russell Impagliazzo, Ramamohan Paturi, and Francis Zane. Which problems have strongly exponential complexity? Journal of Computer and System Sciences, 63(4):512–530, 2001. doi:10.1006/jcss.2001.1774. [5] Bart M. P. Jansen, Daniel Lokshtanov, and Saket Saurabh. A near-optimal planarization algorithm. In Chandra Chekuri, editor, 25th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2014, pages 1802–1811. SIAM, 2014. doi:10.1137/1.9781611973402.130. [6] Ken-ichi Kawarabayashi. Planarity allowing few error vertices in linear time. In 50th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2009, pages 639–648. IEEE Computer Society, 2009. doi:10.1109/ FOCS.2009.45. [7] Ken-ichi Kawarabayashi, Bojan Mohar, and Bruce A. Reed. A simpler linear time algorithm for embedding graphs into an arbitrary surface and the genus of graphs of bounded tree-width. In 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, pages 771–780. IEEE Computer Society, 2008. doi:10.1109/ FOCS.2008.53. [8] Ton Kloks. Treewidth, Computations and Approximations, volume 842 of LNCS. Springer, 1994. doi:10.1007/ BFb0045375. [9] John M. Lewis and Mihalis Yannakakis. The node-deletion problem for hereditary properties is np-complete. Journal of Computer and System Sciences, 20(2):219–230, 1980. doi:10.1016/0022-0000(80)90060-4. [10] Dániel Marx and Ildikó Schlotter. Obtaining a planar graph by vertex deletion. Algorithmica, 62(3-4):807–822, 2012. doi:10.1007/s00453-010-9484-z. [11] Bojan Mohar. A linear time algorithm for embedding graphs in an arbitrary surface. SIAM J. Discrete Math., 12(1):6–26, 1999. doi:10.1137/S089548019529248X. [12] Marcin Pilipczuk. A tight lower bound for vertex planarization on graphs of bounded treewidth. Discrete Applied Mathematics, 2016. in press. doi:10.1016/j.dam.2016.05.019. 23
8cs.DS
1 Direct estimation of density functionals using a polynomial basis arXiv:1702.06516v2 [cs.IT] 20 Nov 2017 Alan Wisler, Visar Berisha, Andreas Spanias, Alfred O. Hero Abstract—A number of fundamental quantities in statistical signal processing and information theory can be expressed as integral functions of two probability density functions. Such quantities are called density functionals as they map density functions onto the real line. For example, information divergence functions measure the dissimilarity between two probability density functions and are useful in a number of applications. Typically, estimating these quantities requires complete knowledge of the underlying distribution followed by multi-dimensional integration. Existing methods make parametric assumptions about the data distribution or use non-parametric density estimation followed by high-dimensional integration. In this paper, we propose a new alternative. We introduce the concept of “data-driven basis functions” - functions of distributions whose value we can estimate given only samples from the underlying distributions without requiring distribution fitting or direct integration. We derive a new data-driven complete basis that is similar to the deterministic Bernstein polynomial basis and develop two methods for performing basis expansions of functionals of two distributions. We also show that the new basis set allows us to approximate functions of distributions as closely as desired. Finally, we evaluate the methodology by developing data driven estimators for the Kullback-Leibler divergences and the Hellinger distance and by constructing empirical estimates of tight bounds on the Bayes error rate. Index Terms—Divergence estimation, direct estimation, nearest neighbor graphs, Bernstein polynomial I. I NTRODUCTION Information divergence measures play a central role in the fields of machine learning and information theory. Information divergence functions, functionals that map density functions to IR, have been used in many signal processing applications involving classification [1], segmentation [2], source separation [3], clustering [4], and other domains. In machine learning, a sub-class of these divergences known as f -divergences [5], are widely used as surrogate loss functions since they form convex upper bounds on the non-convex 0-1 loss [6]. Although these measures prove useful in a variety of applications, the task of estimating them from multivariate probability distributions using finite sample data can pose a significant challenge. It is especially challenging for continuous distributions, which is the focus of this paper. For algorithms and theory for estimating information measures for discrete distributions the reader is referred to [7]– [12]. For the continuous case treated here, there are three general classes of methods for estimating divergence [13]: 1) parametric methods, 2) non-parametric methods based on density estimation, and 3) non-parametric methods based on direct (or graph-based) estimation. Parametric methods are the most common choice for estimation, and typically offer good convergence rates (1/N ) when an accurate parametric model is selected. The fundamental limitation of parametric methods, is that an accurate parametric model is rarely available in real world problems and using an inaccurate parametric model can heavily bias the final estimate. As an alternative, when no parametric form is known, non-parametric density estimates such as kernel density estimation [14], histogram estimation [15], or k-nearest neighbor (k-NN) density estimation [16] are used to characterize the distribution. While these methods are quite powerful in certain This research was supported in part by Office of Naval Research grants N000141410722 (Berisha) and N000141712826 (Berisha) and Army Research Office grant W911NF-15-1- 0479 (Hero). scenarios, they are generally high variance, sensitive to outliers, and scale poorly with dimension [13]. An alternative to these two classes of methods is direct (or graph-based) estimation, which exploits the asymptotic properties of minimal graphs in order to directly estimate distribution functionals without ever estimating the underlying distributions themselves. These methods have been used to estimate density functionals such as entropy [17]–[19], the information divergence [13], and the Dp divergence [20]. This class of methods can have faster asymptotic convergence rates [13] and are often simpler to implement than plugin methods which may have many tuning parameters such as kernel width or histogram bin size. Direct estimators are often inspired by an asymptotic property of a graph-theoretic quantity that can be scaled or modified in order to generate an estimator for a given information-theoretic measure. This approach is customized to a specific form of the density functional and is sometimes difficult to generalize. The estimator for the Dp divergence is an example of this approach [20]. This is in contrast with plug-in estimators, where the same general approach can be used to estimate any distribution functional. Estimators based on influence functions attempt to bridge the gap between the two types of approaches [21]. In that work the authors present a recipe for estimating any smooth functional by using a Von Mises expansion - the analog of the Taylor expansion for distributions; however that approach still requires that part of the data be used for density estimation. In this paper, we provide a general approach for estimating a wide range of distribution functionals. We propose decomposing the functional onto a complete set of “data-driven” basis functions; where the term “data-driven” means that the basis is determined directly from the data and does not involve distribution fitting or direct integration. We show that a broad class of distribution functionals can be approximated as closely as desired through linear combinations of our proposed basis, where the weights of the basis expansion are determined through convex optimization. Our approach offers a powerful alternative for estimating information-theoretic distribution functionals. We demonstrate the flexibility of the approach by constructing empirical estimators of bounds on the Bayes error rate using the same basis set. The remainder of the paper is organized as follows. In the next section, we review the literature in this area. In Section II we provide a detailed description of the problem this paper attempts to solve and establish some of the basic mathematical notation used throughout this paper. In Section III we introduce a set of graphtheoretic basis functions and prove that a wide range of information theoretic quantities can be represented by a linear combination of functions in this set. In sections IV and V, we explore the limitations of the proposed methodology in the finite sample regime and propose two alternate fitting routines to identify weights to map these basis functions to quantities of interest. In section VI we empirically investigate how the proposed method can be used to estimate popular divergence measures (the KL-divergence, the Hellinger distance, the Dp -divergence), and we compare its performance to various parametric and non-parametric alternatives. In Section VII, we show how the method can be extended to form tighter bounds on the Bayes 2 error rate for binary classification problems. Section VIII offers some concluding remarks. A. Related Work A natural method for non-parametric estimation of continuous distribution functionals involves histogram binning followed by plugin estimation [22], [23]. When the bin-size is adjusted as a function of the number of available samples per bin, this histogram plugin method is known as Grenander’s method of sieves and it enjoys attractive non-parametric convergence rates [24], [25]. While these methods may work well for small data dimension (d = 1, 2), their complexity becomes prohibitive for larger dimensions. Recent work has focused on non-parametric plug-in estimators that are more practical in higher dimensions. These approaches generally only estimate the PDF for the values of samples in the reference data, then calculate the expected value across the sample data in place of numerical integration [26]–[28]. To circumvent the slow convergence associated with these approaches, ensemble methods [27] and methods based on influence functions [21] have been proposed which are capable of achieving the parametric rate O(N −1 ) MSE convergence if the underlying densities meet certain smoothness conditions [27]. Alternatively, estimates of divergence functions that rely on estimates of the likelihood ratio instead of density estimation have been proposed for estimating the α-divergence and the L2 divergence [6], [29]–[32]. These methods estimate the likelihood ratio of the two density functions and plug that value into the divergence functions. Other approaches that bypass density estimation are the convex optimization approach of [29] to estimate f -divergences and the k-NN graph and minimal spanning tree approaches to estimating Henze-Penrose divergence [20], [33], [34]. Similarly, the approach we propose in this paper bypasses density estimation through a polynomial basis expansion where the basis coefficients are determined through a convex optimization criterion. This provides added flexibility and allows us to easily estimate a large class of distribution functionals and to establish empirical estimates of bounds on the Bayes error rate. Conceptually, this approach is similar to prior work in estimating the entropy of discrete distributions using polynomial approximations [7]–[9], [11]. Bounds on optimal performance are a key component in the statistical signal processing literature. For classification problems, it is often desirable to bound the Bayes error rate (BER) - the minimum achievable error in classification problems. The well-known Chernoff upper bound on the probability of error has been used in a number of statistical signal processing applications [35]. It motivated the Chernoff α-divergence [13]. The Bhattacharyya distance, a special case of the Chernoff α-divergence for α = 21 , upper and lower bounds the BER [36], [37]. Beyond the bounds on the BER based on divergence measures, a number of other bounds exist based on other functionals of the distributions [38], [39]. For estimation problems, the Fisher information matrix (FIM) bounds the variance of the optimal unbiased estimator (through it’s relationship with the CRLB). The authors have also previously introduced the Dp divergence, a non-parametric f -divergence, and showed that it provides provably tighter bounds on the BER than the BC bound [20]. They extended this work to estimation of the Fisher information in [40]. Our data-driven basis, consisting of Bernstein polynomials, can be used to estimate functionals of distributions and to estimate bounds on Bayes optimal classification performance. Bernstein polynomials of a different form have been used for density estimation [41]–[46]. In contrast to this work, our methods do not rely on density estimation. II. P ROBLEM S ETUP In this section, we will set up the problem and establish the notation that will be used throughout the rest of the paper. We are given a set of data [X, y] containing N instances, where each instance is represented by a d-dimensional feature vector xi and a binary label yi . Suppose that this data is sampled from underlying distribution, fx (x), where fx (x) = p0 f0 (x) + p1 f1 (x) (1) is made up of the two conditional class distributions f0 (x) and f1 (x) for classes 0 and 1, with prior probabilities p0 and p1 respectively. If the priors aren’t explicitly known, they can be easily estimated from the sample data by measuring the ratio of samples drawn from each class. As a simple application of Bayes theorem, we can define the posterior likelihood of class 1, η(x), evaluated at a point x = x∗ , as P [y = 1]fx (x∗ |y = 1) fx (x∗ ) ∗ ∗ p1 f1 (x ) p1 f1 (x ) = = fx (x∗ ) p0 f0 (x∗ ) + p1 f1 (x∗ ) η(x∗ ) = P [y = 1|x = x∗ ] = (2) We can similarly define the posterior probability for class 0 as P [y = 0|x = x∗ ] = p0 f0 (x∗ ) , p0 f0 (x∗ ) + p1 f1 (x∗ ) (3) and since y is binary, P [y = 0|x = x∗ ] = 1 − η(x∗ ). (4) ∗ To simplify the notation, we remove the dependence of η on x from portions of the analysis that follow. Suppose that we wish to estimate some functional G(f0 , f1 ) of distributions f0 (x) and f1 (x), which can be expressed in the following form Z G(f0 , f1 ) = g(η(x))fx (x)dx. (5) Throughout the rest of this paper, we will refer to the g(η) in (5) as the posterior mapping function. Many functionals in machine learning and information theory, such as f -divergences and loss functions, can be expressed this way. Consider the family of f -divergences as an example. They are defined as  Z  f0 (x) f1 (x)dx, (6) Dφ (f0 , f1 ) = φ f1 (x) where φ(t) is a convex or concave function unique to the given f divergence. By substituting f0 (x) p1 (1 − η(x)) = f1 (x) p0 η(x) and f1 (x) = η(x) fx (x) p1 (7) (8) we can redefine (6) as  Z Dφ (f0 , f1 ) = φ p1 (1 − η(x)) p0 η(x)  η(x) fx (x)dx. p1 (9) Thus any f -divergence can be presented in the form outlined in (5) simply by defining the posterior mapping function g(η) as   p1 (1 − η) η g(η) = φ . (10) p1 p0 η We propose a procedure for estimating these types of divergence functionals which bypasses density estimation. We do this by representing the functional in terms of the asymptotic limit of a linear combination of graph-theoretic basis functions. 3 In essence Φk (x∗ ) tells us something about the probability that y = 1 for instances on or near x∗ . Since we are more concerned with the dataset as a whole than the local characteristics in x, we define the statistic ρr,k,N (X) to be the fraction of instances x ∈ X, for which Φk (x) = r, r ≤ k. If we define the indicator function Ir,k (x) as ( 1 Φk (x) = r Ir,k (x) = (15) 0 otherwise, then this test statistic ρr,k,N (X) can be represented by 1 X ρr,k,N (X) = Ir,k (x). N x∈X (a) N4 (x∗ ) (b) N8 (x∗ ) Fig. 1: Illustration of two neighborhoods of x∗ for k = 4 and k = 8, instances with y = 0 are blue while instances with y = 1 are red. In the first scenario Φ4 (x∗ ) = 1, since only one instance in N4 (x∗ ) is red. In the second scenario Φ8 (x∗ ) = 3, since three of the eight instance in N8 (x∗ ) are red. Suppose that there exists a set of basis functions H0 (η), ..., Hk (η) that can be similarly expressed as Z Hi (f0 , f1 ) = hi (η(x))fx (x)dx. (11) If we assume that there exists a set of coefficients such that g(η) ≈ k X The function ρr,k,N (X) is simply the proportion of k-NN neighborhoods that contain exactly r points from class y = 1. This statistic has a number of desirable qualities. We show that this statistic asymptotically converges to a function of the underlying distributions that can be described in the form outlined in (5). The following is proven in Appendix A. Theorem 1. As the number of samples (N ) approaches infinity, ! Z k r L2 lim ρr,k,N (X) → η (x)(1 − η(x))k−r fx (x)dx N →∞ r whenever k/N → 0. We propose to use the asymptotic form of ρr,k,N (X) defined in Theorem 1 as a basis function for estimating functionals of the form (5), Z Hr,k (f0 , f1 ) = lim ρr,k,N (X) = hr,k (η(x))fx (x)dx (17) N →∞ wi hi (η), (12) where i=0 hr,k (η) = then consequently G(f0 , f1 ) ≈ Ĝ(f0 , f1 ) = k X wi Hi (η), (13) i=0 where the sense of approximation is that the `2 norm of the difference between the right and left hand sides is small. In the following section, we will introduce a set of basis functions that have the desired properties. III. G RAPH - THEORETIC BASIS F UNCTIONS Consider the dataset [X, y] previously defined. Suppose we select an arbitrary instance x∗ from X and examine it along with the set of its k −1 nearest neighbors x1N N , x2N N , ..., xk−1 N N in X. We can define the neighborhood set Nk (x∗ ) = [x∗ , x1N N , ..., xk−1 N N ], as the union of x∗ and its k − 1 nearest neighbors. Using this we define Φk (x∗ ) as the number of instances in the neighborhood set which are drawn from class 1, or alternatively, the sum of y across all points in the neighborhood X Φk (x∗ ) = yi . (14) 1) The base instance x is considered in the neighborhood indistinguishably from other instances in Nk (x∗ ). 2) Where traditional k-NN classifiers are concerned only with identifying the majority, we are interested in the exact number of instances drawn from each class. (18) k r X g hr,k (η). k r=0 (19) Combining this result with Theorem 1, we can show that a linear combination of this basis can be used to estimate any function of the form (5) . Theorem 2. For any G(f0 , f1 ) that can be expressed in the form Z G(f0 , f1 ) = g(η(x))fx (x)dx, where g(η) is continuous on [0, 1], the approximation Ĝk,N (X) = i:xi ∈Nk (x∗ ) Figure 1 provides a simple illustration to help explain how Φk (x∗ ) is calculated. Calculating Φk is similar to how nearest neighbor classifiers make decisions, but with two important differences: ! k r η (1 − η)k−r . r The function (18) is the rth Bernstein basis polynomial of degree k [47]. Bernstein’s proof of the Weierstrass Approximation Theorem [48] asserts that any continuous function g(η) can be uniformly approximated on η ∈ [0, 1] to any desired accuracy by a linear combination of functions in (18) of the form g(η) ≈ ∗ (16) k r X g ρr,k,N (X) k r=0 (20) satisfies lim lim E k→∞ N →∞ k/N →0  Ĝk,N (X) − G(f0 , f1 ) 2  = 0. (21) Theorem 2 provides an asymptotically consistent method of estimating a variety of information-theoretic functions that makes no assumptions on the underlying distributions and can be calculated 4 without having to perform density estimation. Throughout the rest of the paper we will refer to the weights g(r/k) in the approximation specified by (20) in Theorem 2 as the Bernstein weights. We next turn to the finite sample properties of the estimator ρr,k,N (X). IV. F INITE S AMPLE C ONSIDERATIONS The previous Section investigated the asymptotic properties of linear combinations of the proposed set of empirically estimable basis functions. The asymptotic consistency of the proposed method is valuable, however in real world scenarios, data is inherently a finite resource, and as a result the efficacy of this method is heavily dependent on its convergence characteristics in the finite sample regime. In this section, we will take a detailed look into how restricting both N and k affects our ability to estimate functions of two distributions. To do this, it is necessary to first break down the different sources of error in the proposed methodology. A. Estimation vs. Approximation Error The goal of this paper is to empirically estimate the functional G(f0 , f1 ) of the two underlying distributions f0 (x) and f1 (x) using a linear combination of directly estimable basis functions Ĝk,N (X) = k X wr Ĥr,k,N (X). (22) r=0 We divide the error of this estimate into two types, the approximation error (eA ) and the estimation error (eest ): eT = G(f0 , f1 ) − Ĝk,N (X) = G(f0 , f1 ) − Ĝk (f0 , f1 ) + Ĝk (f0 , f1 ) − Ĝk,N (X) . | {z } | {z } =:eA (23) =:eest This allows us to separate the error in estimating the basis functions from error in fitting to the posterior mapping function. Understanding the trade-off between these two error types will be particularly useful in Section V, where we explore different methods of fitting weights to the desired density functionals. B. Considerations for finite k A finite sample also implies a finite k and impacts the approximation error. Let us consider the Bernstein weighting scheme introduced in (20) for the scenario where the size of the basis set (k) is restricted. Consider the following example problem. Example: Suppose that we wish to estimate the function ! 3 g(η) = η(1 − η)2 1 (24) using the basis set β0,3 (η), β1,3 (η), β2,3 (η), β3,3 (η). Because g(η) = β1,3 (η), there exists a set of weights such that 3 X wr βr,3 (η) = g(η), (25) r=0 however, using the Bernstein weighting scheme in (20) yields 3 r X g βr,3 (η) 3 r=0 0 1 2 =g β0,3 (η) + g β1,3 (η) + g β2,3 (η) 3  3 3 3 +g β3,3 (η) 3 4 2 = η(1 − η)2 + η 2 (1 − η) 3 3 6=g(η). ĝ(η) = It is clear from this example that the Bernstein weighting procedure do not always provide ideal weights when k is restricted. Based on these results, we are motivated to explore alternative weighting procedures in order to improve the performance of this method for the finite sample case. In the following Section, we will introduce a method of finding better weights using convex optimization. Regardless of how weights are assigned to the approximation, selection of k remains an important factor affecting performance. In order to satisfy Theorem 2, k should be functionally dependent k on N , such that N approaches infinity, both k → ∞ and N → 0, however this still provides a great degree of freedom in the selection of k. In general, there are two major competing factors that must be considered when selecting k. The first is that the Weierstrass approximation theorem can exactly represent any posterior mapping function g(η) as a linear combination of the proposed basis set only as k → ∞. This provides motivation for choosing a large k-value to ensure the best possible fit of g(η). The second factor is that the asymptotic characteristics of ρr,k,N (X) are dependent on all points in Nk (x∗ ). Moreover the regime for which Theorem 2 holds, requires k that N → 0, so we are motivated to select k such that N  k. This means that the selection of k must achieve a compromise in the trade-off between the approximation and estimation errors, since larger values of k will increase the amount of finite sample error made in estimating the individual basis functions, while lower values of k may inhibit our ability to accurately model the desired function in the asymptotic regime. To illustrate how our ability to estimate the desired set of basis functions varies with k, we calculate the estimated and asymptotic values of ρr,k,N (X) for k = 10 and k = 100 on data drawn from distributions f0 (x) ∼ N (03 , I3 ) and f1 (x) ∼ N ( √13 13 , I3 ), where 03 = [0 0 0] and 13 = [1 1 1], and plot the results in Figure 2. Estimates are calculated at 3 different sample sizes (N0 = N1 = 100, 1000, 10000) and each estimate shown in Figure 2 has been averaged across 500 Monte Carlo trials. While we can estimate the basis set for either k-value with a high degree of accuracy given enough samples, the estimates for k = 10 are noticeably more accurate. In fact, we are able to do about as well with 1000 samples for k = 10 as we are with 10000 samples for k = 100. V. O PTIMIZATION C RITERIA FOR F ITTING D ENSITY F UNCTIONALS In this section, we propose a convex optimization criterion to identify appropriate weights for fitting information-theoretic functions when k and N are restricted. Inherently, our goal is to minimize the total error, defined in (23), however minimizing this quantity directly isn’t feasible since the value of G(f0 , f1 ) is unknown. To circumvent this challenge we focus on developing a criterion to minimize the approximation error. We initially develop an optimization criterion that assumes the posterior is uniformly distributed, then propose an alternate method which incorporates an estimate of the posterior density function in order to more accurately model the approximation error. A. Uniform Optimization Criteria (26) Recall that the approximation error eA can be represented as Z eA = (η(x))fx (x)dx, (27) where (η) = g(η) − k X r=0 wr hr,k (η). (28) 5 0.2 0.04 0.15 0.03 0.1 0.02 0.05 0.01 0 0 0 5 10 0 50 100 Fig. 2: Plot of true and estimated basis values vs. r for data drawn from underlying distributions f0 (x) ∼ N (03 , I3 ) and f1 (x) ∼ N ( √13 13 , I3 ). Since solving (27) requires high-dimensional integration and knowledge of the underlying distributions. However, because η is a function of x, (η) is implicitly a function of x as well, and by the law of the unconscious statistician [49], Z eA = E[(η)] = (η)fη (η)dη, (29) where fη (η) is the probability density function of the random variable η. Rewriting the error in this form simplifies the region of integration to a well defined space (since η ∈ [0, 1]) and circumvents the high dimensionality of x. While this eliminates some of the challenges in calculating the error it also creates new ones stemming from the fact that fη (η) is unknown and difficult to estimate due to its implicit dependency on f0 (x) and f1 (x). The task of estimating fη (η) will be explored in detail in Section V-B, however for the time being we will bypass this challenge and simply attempt to minimize Z ∗ eA = |(η)|2 dη. (30) It is worth noting that if fη (η) is uniformly distributed   e∗A = E |(η)|2 ≥ e2A . (31) While there exists an analytical solution for identifying the weights which minimize (30) [50], we use a convex optimization procedure that allows us to also account for the estimation error. If we define a discretized set of posterior values η̃ = [η̃1 , η̃2 , ..., η̃Ñ ], where 0 ≤ η̃1 < η̃2 < ... < ηÑ ≤ 1, a procedure to identify weights that minimize (30) can be defined as Ñ k X 2 1 X g(η̃i ) − wr hr,k (η̃i ) . w0 ,...,wk Ñ r=0 i=1 w0 , ..., wk = argmin (32) . To illustrate the effectiveness of this method, we consider the example problem of trying to estimate the Hellinger distance (a problem we will further explore in Section VI). If we assume both classes have equal prior probability (p0 = p1 = 0.5), then the posterior mapping function for the squared Hellinger distance is p √ g(η) = ( η − 1 − η)2 . (33) This function is estimated using this convex weighting procedure as well as the previously described Bernstein weighting procedure, and we compare how well each method models the desired function for values of k varying from 0 to 100. The performances of each method is evaluated by the following formula MSE(ĝ, g) = Ñ X 2 g(η̃i ) − ĝ(η̃i ) , (34) i=1 and the results are presented in Figure 3 for a range of k values varying from 1 to 100. This experiment shows that the proposed convex fitting procedure is able to approximate the Hellinger posterior mapping function far more accurately than the Bernstein approximation. This improvement isn’t surprising since the proposed method directly minimizes the MSE whereas the Bernstein approximation guarantees consistency only as k → ∞, but it still helps to illustrate the potential for improvement in the Bernstein weights that exists for smaller k. The expression (34) does not take into account finite sample errors that lead to noisy estimates of the basis functions and thus does not directly reflect our ability to estimate G(f0 , f1 ) with a finite sample. The consequences of this could be quite significant. When using a similar approach for entropy estimation, Paninski observed that the good approximation properties were a result of “large oscillating coefficients” which magnify the variance of the corresponding estimator [11]. Additionally, it does not account for the possibility that η is distributed non-uniformly. To empirically examine the finite sample properties of the two approaches, we repeat the previous experiment, this time estimating the basis functions empirically on samples of data drawn from distributions f0 (x) ∼ 13 , I3 ). We generate N = 1000 samples N (03 , I3 ) and f1 (x) ∼ N ( √ 3 (500 samples per class) in each of the 500 iterations of a Monte Carlo simulation, and evaluate the MSE as MSE(G, Ĝ) = 1 NM C NM C X  2 G(f0 , f1 ) − Ĝ(f0 , f1 ) , (35) i=1 where NM C represents the number of Monte Carlo iterations. Since we know that the estimation error is scaled by the magnitude of the weights, we also evaluate a modified fitting routine which augments 6 Bernstein Convex 10 10 2 -2 Mean Squared Error Mean Squared Error 10 0 10 -4 10 -6 10 -8 0 20 40 60 80 Bernstein Convex Convex (w/regularization) 10 0 10 -2 0 100 20 40 Fig. 3: Approximation error of each fitting procedure as a function of the number of basis elements k. This is the idealized case where the basis estimation error is zero and the total error is solely due to imperfect approximation of the posterior mapping function g(η). (32) with a regularization term to penalize solutions with large weights, w0 , ..., wk = Ñ k X 1 X g(η̃i ) − wr hr,k (η̃i ) w0 ,...,wk Ñ r=0 i=1 80 100 k k argmin 60 2 + k λX 2 wr , k r=0 (36) where λ represents a tuning parameter which controls the importance assigned to minimization of the approximation error relative to the estimation error. Intuitively, higher λ values will make sense for smaller data sets to control the variance of the estimator. We set λ = 0.01 for all experiments conducted in this paper. The results of this experiment are shown in Figure 4. We immediately see the necessity of the regularization term, as without it the error becomes extremely large for a range of k values. More generally, the inclusion of the regularization term improves the performance at every k value in this experiment. In comparing the Bernstein weights with the convex (regularized) weights, we find that 1) the performance of the convex method is less dependent on the selection of k and 2) the convex weights generally perform better at lower values of k, while the Bernstein weights outperform at higher k. While the peak performance of the Bernstein method is higher than the convex method, there exists no good method of selecting k a priori in order to reliably achieve this performance. In contrast, the convex method with regularization is less sensitive to the value of k selected. B. Density-weighted Optimization Criteria In the optimization criteria introduced in the previous section we implicitly make the assumption that the distribution of the random variable η(x) ∼ fη (η) is uniformly distributed. In this section we will investigate a data-driven estimator for fη (η). However, before we proceed it is important to clarify what this distribution actually is. We initially introduced η as the posterior likelihood function for class 1, which we showed in (2) can be represented as a function of the underlying distributions. When this function’s input is a known point x∗ , η(x∗ ) represents the probability that y = 1 given that x = x∗ . However, if the input is a random variable x, then η is also a random variable, which is distributed according to fη (η). Fig. 4: The total error of each fitting procedure as a function of k, when there is both approximation and estimation error. Figure 5 illustrates fη (η) for two univariate normal distributions f0 (x) ∼ N (0, 1) and f1 (x) ∼ N (1, 1). Figure 5a displays the two class distributions across x, Figure 5b displays η(x) as a function of x, and Figure 5c displays fη (η) as a function of η. We see from this illustration that while, η(x) is close to 0 or 1 across most of the region of x that is displayed, η(x) remains close to 0.5 in the regions where fx (x) is greatest. As a results fη (η) is roughly bell-shaped, and the likelihood of η existing at the extremities (close to 0 or 1) is relatively low. Because the probability density in these regions is low, the accuracy of our fit in these regions is less important, and can be given less weight in the fitting routine. Figure 6 repeats this illustration for two well seperated normal distributions. In this case the distribution of η is such that fη (η) is most dense towards the extremities, and therefore they should be given more weight in the fitting routine. Side by side, these two figures present an interesting contrast. Despite the fact that the set of density functions f0 and f1 look quite similar in the two scenarios, the minor difference in separation significantly alters the distribution of η. In practice the underlying distributions f0 and f1 are unknown, and as a result, fη (η) is unknown as well. However, if we were able to sample fη (η) at η = η̃i , a more direct method of minimizing eT would be to solve w0 , ..., wk = argmin w0 ,...,wk Ñ X i=1 g(η̃i ) − k X k 2 λX 2 wr hr,k (η̃i ) fˆη (η̃i )∆η̃ + wr , k r=0 r=0 (37) where ∆η̃ = η̃i+1 − η̃i . Below we show that ρr,k,N (X), the statistic previously defined in Theorem 1 can be used to sample the PDF of η. This result is stated in Theorem 3. Theorem 3. As N → ∞ and k → ∞ in a linked manner such that k → 0 and kr → η ∗ N kρr,k,N (X) → fη (η ∗ ). Theorem 3 is useful as it provides a method of sampling fη (η) that doesn’t depend on estimates of the underlying density functions f0 and f1 . Using this result, we can estimate the density of the posterior at point η̃i as fˆη (η̃i ) = k̃i ρr̃i ,k̃i ,N (X) (38) 7 0.4 1.5 1 f0 f1 0.8 0.3 fη (η) 0.2 η fx (x) 1 0.6 0.4 0.5 0.1 0 -6 0.2 0 -4 -2 0 2 4 6 0 -4 -2 0 x 2 4 6 0 0.2 0.4 x (a) Class distribution 0.6 0.8 1 η (b) Class 1 Posterior (c) Distribution of class 1 posterior likelihoods Fig. 5: Illustration of the posterior distribution for two close univariate normal distributions. 0.4 6 1 f0 f1 5 0.8 0.3 fη (η) 0.2 η fx (x) 4 0.6 0.4 3 2 0.1 0 -6 0.2 1 0 -4 -2 0 2 4 6 0 -4 -2 0 x (a) Class distribution 2 4 6 0 0.2 0.4 x 0.6 0.8 1 η (b) Class 1 Posterior (c) Distribution of class 1 posterior likelihoods Fig. 6: Illustration of the posterior distribution for two separated univariate normal distributions. where r̃i and k̃i are integers selected such that η̃i = r̃i k̃i for i = 1, 2, ..., Ñ . Sampling at exactly η̃i may not always be possible since the maximum value of k is limited by the sample size, and k determines the resolution of the sampling scheme. Even if it is possible, it may not be desirable to recalculate ρr̃i ,k̃i ,N (X) for different values of ki because of the computational burden. To overcome these problems we can design our approach such that we utilize the same set of test statistics ρr,k,N (X) in the estimation of the posterior distribution as are used in the estimation of the basis set. One way to do this is to assign the set of discretized posteriors 1 2 , , ..., 1] (39) k k so that it is straightforward to calculate fˆη (η) from the known values of ρr,k,N (X). An alternate approach is to leave η̃ unchanged and interpolate fˆη (η) to determine its value at the desired points. The advantage of this approach is that it doesn’t constrain how η is sampled. Throughout the rest of this paper, we will employ the latter method and solve for fˆη (η) by linearly interpolating between its values on the discretized set (39). η̃ = [0, Because this density-weighted fitting routine more directly minimizes the approximation error of the final estimate, we expect it to generally outperform the uniform method, particularly in cases where the density of the posterior is highly non-uniform and where the desired posterior mapping function g(η) is difficult to model using the proposed basis set. This hypothesis will be verified in Sections VI and VII, when we empirically evaluate our methods with real data. This improvement comes at a computational cost since the weights are now data-dependent, they must be calculated online, whereas for the uniform method they can be calculated offline and stored. Solving for the k weights can be be implemented with O(k3 ) time complexity [51]. Current state-of-the-art algorithms for k-NN graphs can be implemented with O(N log N ) time complexity [52]. As a result the complexity for the Convex (uniform) method is O(N log N ) assuming that the weights are available. The complexity for the Convex (density weighted) method is O(k(N )3 + N log N ) since the weights must be determined for each new dataset. VI. D IVERGENCE E STIMATION In this section, we show how the proposed method can be applied to estimating three f -divergences, the Hellinger distance, the KLdivergence, and the Dp -divergence, directly from data. A. Hellinger Distance The Hellinger distance squared is an f -divergence used to quantify the dissimilarity between two probability distributions and is calculated by Z p 2 p 1 2 H (f0 , f1 ) = f0 (x) − f1 (x) dx. (40) 2 Using the approach proposed in Section V, we can estimate H 2 (f0 , f1 ) by fitting weights to the posterior mapping function !2 r r 1 η 1−η gH (η) = − . (41) 2 p1 p0 8 To evaluate the efficacy of this method, we conduct four different experiments in which we attempt to estimate the Hellinger distance between two distributions from finite sample data. In the first three experiments, both distributions are normally distributed according to f (x) ∼ N (µ1d , Σd ), where   σ1,1 σ1,2 . . . σ1,d σ2,1 σ2,2 . . . σ2,d    (42) Σd =  . .. ..  , ..  .. . . .  σd,1 σd,2 . . . σd,d for σi,j = β |i−j| . The first experiment evaluates the most basic case where both Gaussians have spherical covariance. The second experiment considers the case where there exists a strong fixed dependency between adjacent dimensions by using an elliptical covariance structure. The third experiment evaluates the case where this dependency between adjacent dimensions is now dependent on which class the data is drawn from. In the fourth experiment, we return to linearly independent dimensions and consider the case where one of the distributions isn’t normally distributed, but instead uniformly distributed within a d-dimensional hypercube ( 1 x ∈ [µ − β, µ + β]d (2β)d f (x) = (43) 0 otherwise. A detailed description of the distribution types and parameter setting used in each of the four experiments is presented in Table I. In addition to using the proposed method, we also estimate the Hellinger distance using two different plug-in estimators, one based on a parametric density estimator that assumes the data is normally distributed and one based on a k-NN density estimate of the underlying distributions. The proposed method is implemented using λ = 0.01 and k = 10, while setting η̃ = [0, 0.01, . . . , 1]. To calculate the k-NN estimate, we use the universal divergence estimation approach described in [53] and implemented in the ITE toolbox [54]. This method allows us to fix k = 10 and still achieve an asymptotically consistent estimate of the divergence. In each of the first three experiments, the parametric model shows the highest rate of convergence as expected, although in experiment two it is slightly outperformed at smaller sample sizes by the proposed method. In the fourth experiment, when the assumption of Gaussianity in f1 no longer holds, the parametric solution is significantly biased and as a result, is outperformed by both nonparametric methods at higher sample sizes (N > 2000). Relative to the k-NN plug-in estimator, the proposed method performs slightly worse in experiment 1, slightly better in experiment 2 and significantly better in experiments 3 and 4, with the results being relatively consistent across the various sample sizes. The improvement in performance shown in experiments 3 and 4 suggests that the proposed method offers the greatest benefit when there exists differences in the shapes of the two underlying distributions. Though the density-weighted procedure consistently outperformed the uniform method, the observed improvement was relatively minor in these experiments. B. Kullback Leibler Divergence The Kullback Leibler (KL) divergence [55], also sometimes referred to as the KL risk or relative entropy, is an asymmetric measure of divergence between two probability density functions. Using our regular notation the KL-divergence can be calculated by   Z ∞ f0 (x) dKL (f0 ||f1 ) = f0 (x) log dx. (44) f1 (x) −∞ TABLE I: Experiment overview table. f0 (x) Family Experiment 1 Experiment 2 Experiment 3 Experiment 4 Normal Normal Normal Normal µ 0 0 0 0 β 0 0.8 0.8 0 f1 (x) Family Normal Normal Normal Uniform µ q β 1 3 0 q 1 3 0.8 q 1 3 0.9 3 0 While the KL-divergence has the same general purpose as the Hellinger distance, that is to measure the dissimilarity between two probability density functions, it also has several key difference. Firstly since the KL-divergence is asymmetric it doesn’t technically qualify as a distance function and dKL (f0 ||f1 ) isn’t necessarily equal to dKL (f1 ||f0 ). This also means that dKL (f0 ||f1 ) and dKL (f1 ||f0 ) will have different posterior mapping functions. We can define the posterior mapping function for dKL (f0 ||f1 ) as   p1 (1 − η) 1−η 0 gKL (η) = log (45) p0 p0 η and the posterior mapping function for dKL (f1 ||f0 ) as   p0 η η 1 gKL (η) = log p1 p1 (1 − η) (46) such that Z ∞ i gKL (η(x))(p0 f0 (x) + p1 f1 (x))dx. (47) dKL (fi ||f|i−1| ) = −∞ It is worth noting that when p0 = p1 = 0.5 1 0 gKL (η) = gKL (1 − η) (48) 0 (η). gKL 1 (η) gKL One challenge presented in is a reflection of thus modeling the KL-divergence is that the posterior mapping functions are difficult to model due to discontinuities at the end points, since 0 0 (1) is undefined though (0) = ∞ and gKL gKL 0 lim gKL (η) = 0. η→1− (49) 1 has the same problem at the opposite Due to their symmetry gKL endpoints. To handle this we simply select our discretized set of posteriors η̃1 , η̃2 , ..., η̃Ñ such that 0 < η̃1 < η̃2 < ... < ηÑ < 1. For the experiments in this Section, we set η̃1 , η̃2 , η̃3 , ..., η̃100 , η̃101 = , 0.01, 0.02, ..., 0.99, 1 −  −4 (50) where  = 10 . Using this modified set of discretized posteriors, we repeat the set of four experiments described in Section VI-A to evaluate the proposed methods ability to estimate the KL-divergence. The results of this experiment are displayed in Figure 8. Like the estimates of the Hellinger distance, the parametric method generally yielded the best performance in the first three experiments, but suffered from a large asymptotic bias in experiment 4. The proposed method once again significantly outperformed the k-NN plug-in estimator in experiments 3 and 4, however the results in experiments 1 and 2 are slightly more nuanced due to the significant difference in performance between the two optimization criteria in these trials. In both of these trials the density-weighted criteria significantly outperforms the uniform method at all sample sizes. In experiment 1 the k-NN plug-in estimator outperforms the regular plug-in estimator at all sample sizes, but is outperformed by the densityweighted method for N > 300. In experiment 2 the k-NN plug-in estimator consistently outperforms both proposed methods, however the improvement over the density-weighted method is marginal. 9 Experiment 1 10 -2 Experiment 2 10 -2 10 -2 Experiment 3 10 -1 Experiment 4 10 -3 10 -3 10 -4 MSE MSE MSE 10 -2 MSE 10 -3 10 -4 10 -4 10 -3 10 10 -5 10 2 10 3 -5 10 10 -6 10 2 10 4 Samples per distribution 10 3 10 4 Samples per distribution Parametric k-NN Plug-in -5 10 -6 10 2 10 3 10 -4 10 2 10 4 10 3 10 4 Samples per distribution Samples per distribution Convex (uniform) Convex (density-weighted) Fig. 7: Plots of MSE vs. Sample size in estimating the Hellinger distance for the four different experiments outlined in Table I. 10 0 Experiment 1 10 -1 10 -1 Experiment 2 10 0 10 -2 Experiment 3 10 1 Experiment 4 10 -1 10 -3 MSE 10 -2 MSE MSE MSE 10 0 10 -2 10 -1 10 -3 10 -4 10 -4 10 2 10 3 10 4 Sample Size 10 -3 10 -5 10 2 10 3 10 4 Sample Size Parametric 10 -4 10 2 10 3 Sample Size k-NN Plug-in Convex (uniform) 10 4 10 -2 10 2 10 3 10 4 Sample Size Convex (density-weighted) Fig. 8: Plots of MSE vs. Sample size in estimating the KL-divergence for the four different experiments outlined in Table I. C. Dp -Divergence sample sizes, though the proposed method seems to be converging slightly faster than the MST method in experiment 4 and could The Dp -divergence is an f -divergence defined by possibly exceed its performance given enough samples. Unlike in Z  (p0 f0 (x) − p1 f1 (x))2 1 the previous experiments, we found no difference in performance 2 Dp0 (f0 , f1 ) = dx − (p0 − p1 ) . between the uniform optimization criteria and the density-weighted 4p0 p1 p0 f0 (x) + p1 f1 (x) (51) criteria in this experiment. This is due to the fact that gDp (η) is a The Dp -divergence has the unique property of being directly polynomial and can be perfectly represented by the proposed basis estimable from data using minimum spanning trees [20]. Because of set, even when k is truncated. Since we are able to achieve a solution this property, it has been used to form non-parametric estimates of the where (η) = 0 ∀η, the density weighting has no impact on the final Fisher information [40] as well as upper bounds on the Bayes error results. rate in a range of classification problems [20], [56]. The posterior mapping function for the Dp -divergence can be defined as VII. F ITTING B OUNDS ON P ERFORMANCE gDp (η) = (2η − 1)2 − (2p0 − 1)2 4p0 (1 − p0 ) (52) which simplifies to (2η − 1)2 when p0 = p1 = 0.5. We once again repeat the experiments described in Section VI-A to evaluate the proposed methods ability to estimate the Dp -divergence. This experiment provides the unique opportunity to compare the proposed method to a more traditional direct estimation procedure. The results of this experiment are displayed in Figure 9. As in the previous experiments, the parametric estimate generally performed the best in the first three experiments, but suffered from a large asymptotic bias in experiment 4. The proposed methods perform better than the MST-based estimation in experiments 1 and 2 but worse in experiments 3 and 4. The relative performance of each method in this experiment was largely consistent across the various The optimization criteria in the proposed fitting routines gives us the ability to not only approximate information-theoretic functions, but to bound them as well. This is especially useful for forming bounds on the Bayes Error Rate (BER). The Bayes error rate represents the optimal classification performance that is achievable for a given pair of class distributions f0 (x) and f1 (x) with prior probabilities p0 and p1 respectively and can be calculated by Z Z Bayes = p0 f0 (x)dx + p1 f1 (x)dx. (53) p0 f0 (x)≤p1 f1 (x) p1 f1 (x)≤p0 f0 (x) In essence the BER measures the intrinsic difficulty of a particular classification problem based on the data. A thorough understanding of the BER of a particular problem can help design optimal classifiers. Because of the challenges associated with estimating the BER, much 10 Experiment 2 10 -2 10 -4 10 -5 10 2 10 3 10 4 Samples per distribution Parametric 10 -2 MSE 10 -4 10 -4 10 -5 10 2 10 3 10 4 Samples per distribution MST Experiment 4 10 -1 10 -3 MSE 10 -3 MSE 10 -3 Experiment 3 10 -2 MSE Experiment 1 10 -2 10 -3 10 -5 10 2 10 3 10 4 Samples per distribution Convex (uniform) 10 -4 10 2 10 3 10 4 Samples per distribution Convex (density-weighted) Fig. 9: Plots of MSE vs. Sample size in estimating the Dp -divergence for the four different experiments outlined in Table I. of the literature has focused on generating bounds on the BER [20], [37], which are generally formulated in terms of some measure of divergence between the two class distributions. One such bound, the well-known Bhattacharya bound, is given by [37] 1 1p 1 − 1 − BC 2 (f0 , f1 ) ≤ Bayes ≤ BC(f0 , f1 ), (54) 2 2 2 where BC(f0 , f1 ) = 1 − H 2 (f0 , f1 ). (55) While the Hellinger distance here can be estimated via any of the methods discussed in Section VI-A, parametric estimates are most common. Alternatively [20] introduced the bounds 1 1 1q 1 (56) − D 1 (f0 , f1 ) ≤ Bayes ≤ − D 1 (f0 , f1 ) 2 2 2 2 2 2 where Z f0 (x)f1 (x) D 1 (f0 , f1 ) = 1 − 2 dx. (57) 2 f0 (x) + f1 (x) These bounds have the advantage of being provably tighter than the Bhattacharyya bounds [20]. Furthermore since D 1 represents 2 a particular case of the Dp -divergence, which is estimable directly from data, these bounds bypass the need for density estimation much like the approaches proposed in this paper. While these bounds are significantly tighter than the Bhattacharyya bounds, they still leave room for improvement. Avi-Itzhak proposed arbitrarily tight bounds on the BER in [39], however these bounds require density estimation to be employed in practical problems. In this section, we will use a modified version of the previously described fitting routine in order to investigate how tightly we are able to bound the BER using a linear combination of directly estimable basis functions. Fig. 10: The Bayes error rate along with the three considered upper bounds displayed as a function of η. regularized fitting routine described in (36) yields w0 , ..., wk = Ñ k X 1 X g(η̃i ) − wr hr,k (η̃i ) w0 ,...,wk Ñ r=0 i=1 argmin subject to k X wr hr,k (η̃i ) ≥ g(η̃i ) 2 + k λX 2 wr k r=0 (60) ∀η̃i . r=0 Using the fitting routine described in (36) to bound the BER, requires that we define g(η) appropriately for estimation of the BER, and constrain our fit such that k X wr hr,k (η̃i ) ≥ g(η̃i ) ∀η̃i . (58) r=0 We can express (53) as Z   Bayes = min p0 f0 (x), p1 f1 (x) dx Z   = min 1 − η(x), η(x) fx (x)dx (59)   so g(η) = min 1 − η, η . Incorporating these changes within the Figure 10 compares the theoretical values of each of these bounds as a function of η. These results indicate that the proposed method offers much tighter theoretical bounds than the other two methods, however this bound is based on the asymptotic properties of the proposed basis set and doesn’t consider the limitations of a finite sample estimate. We evaluate the finite-sample performance of this method by calculating each of the described bounds across the four experiments described in Table I. Figure 11 displays the ground truth value of the BER, along with the theoretical and estimated values for each of the three bounds (Bhattacharyya, Dp , and convex) across sample sizes ranging from 100 to 10000. The Bhattacharyya bound is calculated based on a parametric plug-in estimator which assumes both class distributions to be normally distributed. The Dp bound is calculated from the Friedman-Rafsky test statistic using the approach 11 Experiment 1 45 Experiment 3 Experiment 2 50 40 45 Experiment 4 40 40 Error (%) 35 45 Error (%) Error (%) Error (%) 35 40 35 30 25 20 30 10 2 10 3 10 4 35 10 2 Samples per distribution BER (True) Bhattacharyya (True) 10 3 10 4 Samples per distribution Bhattacharyya (Estimated) 30 10 2 10 3 10 4 Samples per distribution Dp (True) Dp (Estimated) 15 10 2 10 3 10 4 Samples per distribution Convex (True) Convex (Estimated) Fig. 11: Plots of theoretical and estimate upper bounds on the BER as a function of sample size for the four different experiments outlined in Table I. TABLE II: Parameters for 2 8-dimensional Gaussian data sets for which the Bayes error rate is known (from [57]). D0 D2 µ0 σ0 µ1 σ1 µ0 σ0 µ1 σ1 0 1 2.56 1 0 1 3.86 8.41 0 1 0 1 0 1 3.10 12.06 0 1 0 1 0 1 0.84 0.12 0 1 0 1 0 1 0.84 0.22 0 1 0 1 0 1 1.64 1.49 0 1 0 1 0 1 1.08 1.77 0 1 0 1 0 1 0.26 0.35 0 1 0 1 0 1 0.01 2.73 TABLE III: Comparing upper bounds on the Bayes error rate for the multivariate Gaussians defined in Table II. Actual Bayes Error Mahalanobis Bound Bhattacharyya Bound Dp Bound Convex Bound Data 1 10% 18.90% ± 0.55% 21.74% ± 0.87 % 16.51 % ± 1.07% 14.17 % ± 0.86% Data 2 1.90% 14.07 % ± 0.45 % 4.68 % ± 0.27 % 3.99 % ± 0.52 % 3.87% ± 0.43% described in [20]. Finally the convex bound is calculated as a linear combination of the proposed directly estimable basis functions using weights optimized according to (60). The results of this experiment are largely consistent across the four experiments, the convex method yields the tightest bound, followed by the Dp bound, and finally the Bhattacharyya bound. Except for the Bhattacharyya bound in experiment 4, which is estimated parametrically, all of the bounds appear to converge to their asymptotic solution. While the convex bound generally offers a slightly slower convergence rate than the other two solutions, it remains tighter than the other two bounds across all sample sizes. In order to further validate this bound we repeat one of the experiments conducted in [20] by evaluating the proposed bound along with the Mahalanobis bound, the Bhattacharyya bound, and the Dp bound on two 8-dimensional Gaussian data sets described in [57]. The mean and standard deviations of f0 and f1 for the two data sets are described in Table II, and all dimensions are independent. These data sets allow us to analyze the tightness and validity of the bounds in a higher dimensional setting. For this experiment the sample size was fixed at N = 1000 and only the empirical value of each of the bounds was evaluated. Table III displays the mean and standard deviation of each bound calculated across 500 Monte Carlo iterations for each of the two data sets. In both data sets the convex method provides the tightest bounds on the BER. VIII. C ONCLUSION This paper introduces a novel method for estimating density functionals which utilizes a set of directly estimable basis functions. The most appealing feature of the proposed method is its flexibility. Where previous methods of direct estimation are generally only applicable to a specific quantity, we show that the basis set can be used to generate an asymptotically consistent estimate of a broad class of density functionals, including all f -divergences and the Bayes error rate. We validate these findings by experimentally evaluating the proposed method’s ability to estimate three different divergences (the KL-divergence, the Hellinger distance, and the Dp -divergence) for four pairs of multivariate probability density functions. The results reveal that the proposed method performs competitively with other non-parametric divergence estimation methods, and seems to outperform them in cases where the data from the two distributions have different covariance structures or belong to different families. Additionally we demonstrate how the method can be modified to generate empirically-estimable bounds on the Bayes error rate that are much tighter than existing bounds. Future work could focus on studying the finite-sample properties of the basis set proposed in this paper, since this represents a major source of error for the proposed methodology. An improved understanding of these properties could enable us to refine the regularization term in our optimization criteria to more accurately model each weights contribution to the estimation error or to develop ensemble methods, like those in [26], for estimating the individual basis functions. Another worthwhile future direction would be on determining an orthogonal version of the Bernstein basis expansion since this would simplify solving for the weights of the expansion. A PPENDIX A P ROOF OF T HEOREM 1 Aspects of this proof mirror the methods used to prove the asymptotic convergence of the k-NN error rate in pages 62-70 of [58], please consult this text for additional details. Construction of this proof requires the introduction of an auxilary variable u. We define the augmented data set [X, y, u], where X is as defined previously, u is a set of i.i.d. random variables which are uniformly distributed in [0, 1], and y is defined such that  1 ui ≤ η(xi ) yi = (61) 0 otherwise. Now, let us consider an arbitrary point x∗ in the support of fx (x). For each instance xi , we can define an alternate label  1 ui ≤ η(x∗ ) yi0 = (62) 0 otherwise. 12 Unlike the real labels yi , these alternate labels yi0 have no dependency on xi ; they depend only on the fixed point x∗ . From these alternate labels we construct the alternate statistic X Φ0k (x∗ ) = yi0 . (63) i:xi ∈Nk (x∗ ) Φ0k (x∗ ) Since is simply the sum of k i.i.d. Bernoulli random variables, we can express the probability that Φ0k (x∗ ) = r as ! k r ∗ 0 ∗ P [Φk (x) = r|x = x ] = η (x )(1 − η(x∗ ))k−r . (64) r We can upper bound the likelihood that Φ0k (x∗ ) 6= Φk (x∗ ) by X   P Φ0k (x∗ ) 6= Φk (x∗ ) ≤ P [yi 6= yi0 ]. (65) i:xi ∈Nk (x∗ ) Using the definitions of yi and yi0 above, (65) can be expressed in terms of the difference between the posterior likelihood at x∗ vs. xi as X     P Φ0k (x∗ ) 6= Φk (x∗ ) ≤ E |η(x∗ ) − η(xi )| . (66) N → ∞, P [B] → 1 and as a result       lim E Ir,k (xi )Ir,k (xj ) = lim E Ir,k (xi ) E Ir,k (xj ) N →∞ N →∞ (73) = (ρ∗ )2 . Plugging this into (72) yields 1 ∗ N −1 ∗ 2 ρ + (ρ ) . (74) N N Similarly the second term simplifies to   1 X ∗ ∗ lim E[ρr,k,N (X)ρ ] = lim ρ E Ir,k (xi ) = (ρ∗ )2 N →∞ N →∞ N x ∈X i (75) ∗ 2 and the third term clearly equals (ρ ) . Substituting these results into (71) yields   1 ∗ N −1 ∗ 2 lim E (ρr,k,N (X) − ρ∗ )2 = lim ρ + (ρ ) N →∞ N →∞ N N ∗ 2 ∗ 2 − 2(ρ ) + (ρ ) (76) ∗ ∗ 2 ρ − (ρ ) = lim = 0. N →∞ N lim E[(ρr,k,N (X))2 ] = lim N →∞ N →∞ xi ∈Nk (x∗ ) Using Lemma 5.4 in [58], we can show that X   E |η(x∗ ) − η(xi )| → 0 xi ∈Nk (x∗ ) Starting with the expression k N → 0. Combining (66) and (67)  0 ∗  P Φk (x ) 6= Φk (x∗ ) → 0 as N → ∞ whenever (68) k as N → ∞ whenever N → 0. Furthermore, since convergence in probability implies convergence in distribution [59], lim P [Φk (x∗ ) = r] = P [Φ0k (x∗ ) = r]. N →∞ (69) Using (69), we can simplify the expectation of Ir,k (x) to lim E[Ir,k (x)] = lim E[E[Ir,k (x)|x = x0 ]] N →∞ N →∞ = E[P [Φ0k (x) = r|x = x0 ]] ! k η(x0 )r (1 − η(x0 ))k−r fx (x0 )dx0 = ρ∗ r Z = (70) where x0 represents a random variable independent of all instances xi and distributed according to fx (x0 ). Now, let us evaluate the expression   E (ρr,k,N (X) − ρ∗ )2 = E[(ρr,k,N (X))2 ] (71) −2E[ρ∗ ρr,k,N (X)] + E[(ρ∗ )2 ]. Beginning with the first term in (71)   1 X X 2 E[(ρr,k,N (X)) ] = E Ir,k (xi )Ir,k (xj ) N 2 x ∈X x ∈X i j  X  XX 1 1 = 2E Ir,k (xi ) + 2 Ir,k (xi )Ir,k (xj ) N N x ∈X i A PPENDIX B P ROOF OF T HEOREM 2 (67) xi ,xj ∈X;i6=j  N2 − N   1  E Ir,k (xi )Ir,k (xj ) = E Ir,k (xi ) + N N2 (72) Note that the random variables Ir,k (xi ) and Ir,k (xj ) are conditionally independent if B is true, where B = {xi ∈ X \ Nk (xj ) ∩ xj ∈ X \ Nk (xi )}. Since every instance in X \ xi is equally likely to be in Nk (xi ), we can bound the probability of the complement of B by P [B̄] ≤ 2k/N . From this we know that as lim lim Ĝk,N (X) = lim k→∞ N →∞ k/N →0 lim k→∞ N →∞ k/N →0 k r X g ρr,k,N (X) (77) k r=0 we first evaluate the limit with respect to N . Since these conditions mirror those of Theorem 1 and g(r/k) is independent of N , we can rewrite (77) as ! k rZ k X lim η r (1 − η)k−r fx (x)dx g k→∞ r k r=0 (78) #   ! Z " k X k r r = lim η (1 − η)k−r fx (x)dx, g k→∞ k r r=0 which according to Weierstrass’ Approximation Theorem simplifies to Z = g(η)fx (x)dx (79) = G(f0 , f1 ). Therefore lim lim E k→∞ N →∞ k/N →0  Ĝk,N (X) − G(f0 , f1 ) 2  = 0. (80) A PPENDIX C P ROOF OF T HEOREM 3 Starting with the augmented data set defined in Appendix A, remember that Φ0k (x∗ ) is the sum of k i.i.d. Bernoulli random variables. Therefore k1 Φ0k (x∗ ) represents the arithmetic mean of these output values, and X 1 1 lim Φ0k (x∗ ) = lim yi0 = η(x∗ ). (81) k→∞ k k→∞ k ∗ i:xi ∈Nk (x ) Φ0k (x) Now, since must be an integer, its probability of equaling r can be expressed as " # P [Φ0k (x) = r] = P r − 1 < Φ0k (x) ≤ r . (82) 13 Taking the limit of this expression w.r.t. k, allows us to use (81) to form " #   r−1 r 0 lim P r − 1 < Φk (x) ≤ r = lim P <η≤ k→∞ k→∞ k k r r − 1 = lim Fη − Fη . k→∞ k k (83) Now if we multiply each side by k, the right hand side takes the form of Newton’s difference quotient and can be simplified to the probability density function lim kP [Φ0k (x) = r] = lim k→∞ Fη ( kr ) − Fη ( kr − k1 ) 1 k k→∞ = lim k→∞ d Fη dη k r = lim fη k→∞ r k (84) . Since ρr,k,N → P [Φ0k (x) = r] as N and k approach infinity in a linked manner such that k/N → 0 and kr → η ∗ kρr,k,N (X) → fη (η ∗ ). (85) R EFERENCES [1] P. J. Moreno, P. P. Ho, and N. Vasconcelos, “A KullbackLeibler divergence based kernel for SVM classification in multimedia applications,” in Advances in neural information processing systems, 2003, pp. 1385–1392. [2] A. B. Hamza and H. Krim, “Image registration and segmentation by maximizing the Jensen-Rényi divergence,” in Energy Minimization Methods in Computer Vision and Pattern Recognition. Springer, 2003, pp. 147–163. [3] K. E. Hild, D. Erdogmus, and J. C. Principe, “Blind source separation using Rényi’s mutual information,” Signal Processing Letters, IEEE, vol. 8, no. 6, pp. 174–176, 2001. [4] A. Banerjee, S. Merugu, I. S. Dhillon, and J. Ghosh, “Clustering with Bregman divergences,” The Journal of Machine Learning Research, vol. 6, pp. 1705–1749, 2005. [5] S. Ali and S. D. Silvey, “A general class of coefficients of divergence of one distribution from another,” Journal of the Royal Statistical Society. Series B (Methodological), pp. 131–142, 1966. [6] X. Nguyen, M. J. Wainwright, and M. I. Jordan, “On surrogate loss functions and f-divergences,” The Annals of Statistics, pp. 876–904, 2009. [7] Y. Wu and P. Yang, “Minimax rates of entropy estimation on large alphabets via best polynomial approximation,” IEEE Transactions on Information Theory, vol. 62, no. 6, pp. 3702–3720, 2016. [8] J. Jiao, K. Venkat, Y. Han, and T. Weissman, “Minimax estimation of functionals of discrete distributions,” IEEE Transactions on Information Theory, vol. 61, no. 5, pp. 2835–2885, 2015. [9] Y. Wu and P. Yang, “Optimal entropy estimation on large alphabets via best polynomial approximation,” in IEEE International Symposium on Information Theory. IEEE, 2015, pp. 824–828. [10] G. Valiant and P. Valiant, “Estimating the unseen: an n/log (n)-sample estimator for entropy and support size, shown optimal via new CLTs,” in Proceedings of the forty-third annual ACM symposium on Theory of computing. ACM, 2011, pp. 685–694. [11] L. Paninski, “Estimation of entropy and mutual information,” Neural computation, vol. 15, no. 6, pp. 1191–1253, 2003. [12] ——, “Estimating entropy on m bins given fewer than m samples,” IEEE Transactions on Information Theory, vol. 50, no. 9, pp. 2200– 2203, 2004. [13] A. O. Hero, B. Ma, O. Michel, and J. Gorman, “Alpha-divergence for classification, indexing and retrieval,” Communication and Signal Processing Laboratory, Technical Report CSPL-328, U. Mich, 2001. [14] I. Ahmad and P.-E. Lin, “A nonparametric estimation of the entropy for absolutely continuous distributions (corresp.),” IEEE Transactions on Information Theory, vol. 22, no. 3, pp. 372–375, 1976. [15] L. Györfi and E. C. Van der Meulen, “Density-free convergence properties of various estimators of entropy,” Computational Statistics & Data Analysis, vol. 5, no. 4, pp. 425–436, 1987. [16] A. J. Izenman, “Review papers: recent developments in nonparametric density estimation,” Journal of the American Statistical Association, vol. 86, no. 413, pp. 205–224, 1991. [17] L. Kozachenko and N. N. Leonenko, “Sample estimate of the entropy of a random vector,” Problemy Peredachi Informatsii, vol. 23, no. 2, pp. 9–16, 1987. [18] A. O. Hero III and O. Michel, “Robust entropy estimation strategies based on edge weighted random graphs,” in SPIE’s International Symposium on Optical Science, Engineering, and Instrumentation. International Society for Optics and Photonics, 1998, pp. 250–261. [19] D. Pál, B. Póczos, and C. Szepesvári, “Estimation of rényi entropy and mutual information based on generalized nearest-neighbor graphs,” in Advances in Neural Information Processing Systems, 2010, pp. 1849– 1857. [20] V. Berisha, A. Wisler, A. O. Hero III, and A. Spanias, “Empirically estimable classification bounds based on a nonparametric divergence measure,” IEEE Transactions on Signal Processing, vol. 64, no. 3, pp. 580–591, 2016. [21] K. Kandasamy, A. Krishnamurthy, B. Poczos, L. Wasserman, and J. Robins, “Nonparametric von Mises estimators for entropies, divergences and mutual informations,” in Advances in Neural Information Processing Systems, 2015, pp. 397–405. [22] J. Silva and S. S. Narayanan, “Information divergence estimation based on data-dependent partitions,” Journal of Statistical Planning and Inference, vol. 140, no. 11, pp. 3180–3198, 2010. [23] G. A. Darbellay, I. Vajda et al., “Estimation of the information by an adaptive partitioning of the observation space,” IEEE Transactions on Information Theory, vol. 45, no. 4, pp. 1315–1321, 1999. [24] S. Geman and C.-R. Hwang, “Nonparametric maximum likelihood estimation by the method of sieves,” Annals of Statistics, pp. 401–414, 1982. [25] U. Grenander and G. Ulf, “Abstract inference,” Tech. Rep., 1981. [26] K. Moon and A. Hero, “Multivariate f-divergence estimation with confidence,” in Advances in Neural Information Processing Systems, 2014, pp. 2420–2428. [27] K. R. Moon, K. Sricharan, K. Greenewald, and A. O. Hero, “Improving convergence of divergence functional ensemble estimators,” in IEEE International Symposium on Information Theory. IEEE, 2016, pp. 1133–1137. [28] B. Póczos, L. Xiong, and J. Schneider, “Nonparametric divergence estimation with applications to machine learning on distributions,” arXiv preprint arXiv:1202.3758, 2012. [29] X. Nguyen, M. J. Wainwright, and M. I. Jordan, “Estimating divergence functionals and the likelihood ratio by convex risk minimization,” IEEE Transactions on Information Theory, vol. 56, no. 11, pp. 5847–5861, 2010. [30] Q. Wang, S. R. Kulkarni, and S. Verdú, “Divergence estimation for multidimensional densities via k-nearest-neighbor distances,” IEEE Transactions on Information Theory, vol. 55, no. 5, pp. 2392–2405, 2009. [31] ——, “Universal estimation of information measures for analog sources,” Foundations and Trends in Communications and Information Theory, vol. 5, no. 3, pp. 265–353, 2009. [32] B. Póczos and J. G. Schneider, “On the estimation of alpha-divergences,” in International Conference on Artificial Intelligence and Statistics, 2011, pp. 609–617. [33] J. H. Friedman and L. C. Rafsky, “Multivariate generalizations of the Wald-Wolfowitz and Smirnov two-sample tests,” The Annals of Statistics, pp. 697–717, 1979. [34] N. Henze, M. D. Penrose et al., “On the multivariate runs test,” The Annals of Statistics, vol. 27, no. 1, pp. 290–298, 1999. [35] H. Chernoff, “A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations,” The Annals of Mathematical Statistics, pp. 493–507, 1952. [36] A. Bhattacharyya, “On a measure of divergence between two multinomial populations,” Sankhyā: The Indian Journal of Statistics, pp. 401–406, 1946. [37] T. Kailath, “The divergence and Bhattacharyya distance measures in signal selection,” Communication Technology, IEEE Transactions on, vol. 15, no. 1, pp. 52–60, 1967. [38] W. A. Hashlamoun, P. K. Varshney, and V. Samarasooriya, “A tight upper bound on the Bayesian probability of error,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 16, no. 2, pp. 220– 224, 1994. [39] H. Avi-Itzhak and T. Diep, “Arbitrarily tight upper and lower bounds on the Bayesian probability of error,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, no. 1, pp. 89–91, 1996. [40] V. Berisha and A. O. Hero, “Empirical non-parametric estimation of the Fisher information,” IEEE Signal Processing Letters, vol. 22, no. 7, pp. 988–992, 2015. 14 [41] A. Leblanc, “On estimating distribution functions using Bernstein polynomials,” Annals of the Institute of Statistical Mathematics, vol. 64, no. 5, pp. 919–943, 2012. [42] B. C. Turnbull and S. K. Ghosh, “Unimodal density estimation using Bernstein polynomials,” Computational Statistics & Data Analysis, vol. 72, pp. 13–29, 2014. [43] S. Ghosal, “Convergence rates for density estimation with Bernstein polynomials,” Annals of Statistics, pp. 1264–1280, 2001. [44] G. Igarashi and Y. Kakizawa, “On improving convergence rate of Bernstein polynomial density estimator,” Journal of Nonparametric Statistics, vol. 26, no. 1, pp. 61–84, 2014. [45] A. Tenbusch, “Two-dimensional Bernstein polynomial density estimators,” Metrika, vol. 41, no. 1, pp. 233–253, 1994. [46] G. J. Babu and Y. P. Chaubey, “Smooth estimation of a distribution and density function on a hypercube using Bernstein polynomials for dependent random vectors,” Statistics & probability letters, vol. 76, no. 9, pp. 959–969, 2006. [47] G. G. Lorentz, Bernstein polynomials. American Mathematical Soc., 2012. [48] S. Bernstein, “Démonstration du théorème de Weierstrass fondée sur le calcul des probabilités,” Comm. Soc. Math. Kharkow, Ser, vol. 2, no. 13, pp. 49–194, 1912. [49] J. A. Gubner, Probability and random processes for electrical and computer engineers. Cambridge University Press, 2006. [50] R. T. Farouki, “Legendre–Bernstein basis transformations,” Journal of Computational and Applied Mathematics, vol. 119, no. 1, pp. 145–160, 2000. [51] B. Efron, T. Hastie, I. Johnstone, R. Tibshirani et al., “Least angle regression,” The Annals of statistics, vol. 32, no. 2, pp. 407–499, 2004. [52] S. Arya, D. M. Mount, N. S. Netanyahu, R. Silverman, and A. Y. Wu, “An optimal algorithm for approximate nearest neighbor searching fixed dimensions,” Journal of the ACM (JACM), vol. 45, no. 6, pp. 891–923, 1998. [53] D. J. Sutherland, L. Xiong, B. Póczos, and J. Schneider, “Kernels on sample sets via nonparametric divergence estimates,” arXiv preprint arXiv:1202.0302, 2012. [54] Z. Szabó, “Information theoretical estimators toolbox,” Journal of Machine Learning Research, vol. 15, pp. 283–287, 2014. [55] S. Kullback, Information theory and statistics. Courier Corporation, 1997. [56] A. Wisler, V. Berisha, K. Ramamurthy, D. Wei, and A. Spanias, “Emperically-estimable multi-class performance bounds,” in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2016. [57] K. Fukunaga, Introduction to statistical pattern recognition. Academic press, 1990. [58] L. Devroye, L. Györfi, and G. Lugosi, A probabilistic theory of pattern recognition. Springer Science & Business Media, 2013, vol. 31. [59] A. W. Van der Vaart, Asymptotic statistics. Cambridge university press, 2000, vol. 3.
7cs.IT
Kısa Dönem Uzam-Zamansal Trafik Tahmini Short-Term Spatio-Temporal Traffic Forecasting Akın Taşcıkaraoğlu1 , Fatma Yıldız Taşcıkaraoğlu2 , İbrahim Beklan Küçükdemiral2 1 Elektrik Mühendisliği Bölümü Yıldız Teknik Üniversitesi, İstanbul arXiv:1608.08053v1 [cs.SY] 5 Aug 2016 [email protected] 2 Kontrol ve Otomasyon Mühendisliği Bölümü Yıldız Teknik Üniversitesi, İstanbul {fayildiz,beklan}@yildiz.edu.tr Özetçe Şehir içi yollarda yaşanan tıkanıklık, gecikme ve çevre problemlerini en aza indirmek amacıyla gerçekleştirilen çalışmaların önemi özellikle son yıllarda oldukça artmıştır. Bu çalışmalar içerisinde, kısa dönem trafik akımı ve ortalama araç hızı tahmini yöntemleri; uygulanabilirliklerinin kolay olması, farklı amaçlar için etkin bir şekilde kulllanılabilmeleri ve maliyetlerinin oldukça düşük olması nedeniyle ön plana çıkmaktadırlar. Trafik ağındaki istenen noktalara ait bağ akımlarının ve araç hızlarının gelecekteki olası değerlerinin tahmin edildiği bu yöntemlerin, trafik yönetiminde yaşanabilecek sorunları öngörerek trafik sıkışıklığını azaltmaya yardımcı olduğu çok sayıda çalışmada belirtilmektedir. Bu yayında, bir bağdaki ortalama araç hızı tahminleri için çok sayıda noktadan alınan geçmiş verileri göz önüne alan bir uzam-zamansal yaklaşım sunulmaktadır. Belirtilen yaklaşım, her bir aşamada en faydalı verileri belirleyerek yalnızca bu verilerin giriş veri kümesine dahil edilmesini sağlayan bir algoritma içermektedir. Algoritma içerisinde seyrek matrislerin elde edilmesi ile tahmin doğruluğunun arttırılabilmesi sağlanırken tahminlerin gerçekleştirilme sürelerinin de literatürde yer alan yöntemlere oranla kayda değer derecede iyileştirilmesi hedeflenmektedir. Abstract The studies carried out with the objective of minimizing the effects of congestion, delay and environment problems on the transportation network have gained increasing importance in the last years. Among these studies, short-term traffic flow and average vehicle speed forecasting methods have come into prominence due to their easy implementations, efficient usage on different areas and cost-effectiveness. A large number of studies have reported that these methods, in which the expected future values of link flows and average speeds are forecasted in desired points, can reduce the traffic congestion by anticipating the problems in traffic management. In this paper, a spatio- temporal approach accounted for historical traffic characteristics data collected from a large number of points is presented for average speed forecasts in a given link. The proposed approach includes an algorithm that enables to take into account the most informative data in an input set by determining them for each stage. It is aimed to increase the forecasting accuracy by using sparse matrices in the algorithm while decreasing the calculation times significantly compared to the similar methods presented in the literature. 1. Giriş Gelişmiş ülkelerdeki büyük kentlerde yaşanan nüfus ve araç sahipliğindeki hızlı artışın ve şehirleşmenin ulaştırma ağı üzerindeki etkilerine bağlı olarak yaşanan tıkanıklık, gecikme, güvenlik ve çevre problemlerini en aza indirmek amacıyla gerçekleştirilen ve bilişim teknolojileriyle desteklenen faaliyetler, Akıllı Ulaşım Sistemleri olarak adlandırılmaktadır. Şehirlerde yaşanan trafik tıkanıklığının insanların yaşam kalitesi üzerindeki doğrudan etkileri nedeniyle akıllı ulaşım sistemlerinin, gelecekteki akıllı şehir planlamalarında çok önemli bir bileşen olarak yer alması beklenmektedir. Bu nedenle, trafiğin durumundaki beklenen gelişmeler, trafiğin güvenli ve ekonomik bir şekilde yönetilmesi açısından oldukça büyük bir öneme sahiptir. Belirli trafik karakteristiklerinin önceden bilinmesi, trafik yönetim sistemlerine veri desteği sağlamalarının yanı sıra kullanıcılara da trafik şartları hakkında önemli bilgiler verebilir. Ancak sürekli değişen yapısı nedeniyle, trafik tıkanıklığı ve tıkanıklığı etkileyen faktörler arasındaki etkileşimleri modellemek için gelişmiş yöntemlere ihtiyaç duyulmaktadır. Bu amaçla geliştirilen tahmin yöntemlerinin yapısı öncelikle yolun türüne (otoyol, şehir içi arter, vb.) bağlıdır. Yol türlerinin her birinin kendine özgü bir karakteristiği vardır. Örneğin, ışıklı kavşaklar ve yaya geçişleri gibi çeşitli kısıtlar, otoyollara oranla şehir içi arterlerdeki tahmin işlemini daha karmaşık bir hale getirmektedir [1]. Şehir merkezlerine yakın olan ve çok sayıda katılıma sahip olan otoyollardaki trafik karakteristiklerinin tahminleri de benzer şekilde şehirlerarası otoyollara kıyasla daha zor bir işlem olarak nitelendirilebilir. Model seçimin- deki bir diğer önemli faktör ise gerekli tahmin aralığıdır ve bu süre çoğunlukla tahminlerin kullanılacağı uygulama alanı göz önüne alınarak belirlenmektedir. Bir genelleme yapacak olursak, yüksek doğrulukta modellemeye olanak sağlamalarından dolayı, daha küçük tahmin adımlarının gerçek uygulamalar için daha değerli olduğu söylenebilir. Akım, yolculuk zamanı, kuyruk uzunluğu, hız ve yoğunluk gibi farklı trafik karakteristikleri arasında trafik akımı ve hız tahminleri, trafik tıkanıklığının azaltılması ve akıllı ulaşım sistemlerinde ulaşım hareketliliğinin arttırılması açısından anahtar bir role sahiptir. Özellikle, birkaç dakikadan birkaç saate kadar olan kısa dönem trafik akımı ve ortalama hız tahminleri, dinamik trafik kontrolünü destekleyerek, gecikmeleri ve trafik tıkanıklığını azaltmada oldukça etkili olmaktadırlar. Belirtilen parametrelerin tahmininde kullanılan klasik yöntemler kararlı trafik şartları için belli bir doğrulukta tahminler sağlamaktadırlar. Ancak, trafiğin en yoğun olduğu saatlerdeki yüksek taşıt sayısı, yetersiz yollar, kazalar, koordinasyonu sağlanamamış trafik ışıkları ve kötü hava şartları gibi çok sayıda etkenin neden olduğu yoğun trafik durumları için bu yöntemler çoğunlukla hatalı tahminler vermektedirler. Birbirine fiziksel olarak bağlı yollardan alınan veriler, trafik şartlarındaki bu kısa ve uzun süreli değişimleri dikkate alarak tahmin yöntemlerinin doğruluğunu iyileştirebilirler. Özellikle, trafiğin akış yönüne göre daha başlarda bulunan bağlardan alınan verilerin, sonraki bağların tahmini üzerinde genellikle güçlü bir etkisi olacaktır. Bu amaçla, bir ön araştırma gerçekleştirilerek belirli bir ağdaki trafik akımına ve ortalama hıza en fazla etki eden faktörler belirlenebilir ve yalnızca bu faktörler tahmin algoritmalarında kullanılabilir. Alternatif olarak, tıkanık ve tıkanık olmayan trafik şartları için çoklu rejim (multi-regime) yöntemleri de tercih edilebilir. Ancak, trafik akımı ile trafik şartlarındaki beklenen ve beklenmeyen olaylar arasındaki karmaşık ilişkinin tam olarak belirlenebilmesi genellikle mümkün olmamaktadır. Üstelik bu ilişki zamanla sürekli olarak değişmektedir ve böylece bir model elde etmek daha da zor hale gelmektedir. Bu sorunların üstesinden gelmek amacıyla, ağ üzerindeki çeşitli noktalardaki belli bir sayıda aday değişken içerisinden her bir adımda en uygun girişleri belirleyen ve bir sonraki tahminde yalnızca bu verileri dikkate alan tahmin yaklaşımları literatürde son yıllarda oldukça ön plana çıkmıştır. Uzam-zamansal modeller olarak adlandırılan bu gelişmiş modeller, geniş bir ağ üzerindeki çeşitli bilgileri dikkate almaları nedeniyle, trafikteki değişen şartlara kolaylıkla uyum sağlayabilirler. Bu nedenle, tekrarlanmayan geçici şartlar dahil farklı trafik şartları için sürdürülebilir bir tahmin kalitesi sağlayabilirler. Literatürde özellikle son yıllarda, trafik ağlarındaki verilerin toplanması için kullanılmaya başlanan gelişmiş teknolojiler ile birlikte geniş bir aralıkta uzamsal ve zamansal trafik verilerinin elde edilebilmesi, trafik akımı ve ortalama araç hızı tahmini alanında bu verileri kullanan çok sayıda yöntemin geliştirilmesine olanak sağlamıştır. Stathopoulos vd. [2] bir şehir içi ışıklı kavşak için çok değişkenli zaman serileri modellerini kullanarak kısa dönemli akım tahminleri gerçekleştirmişlerdir. Benzer yapıdaki bir diğer çok değişkenli uzam-zamansal model ise Dong vd. [3] tarafından geliştirilerek, tıkanık ve tıkanık olmayan trafik durumlarında hız ve akım tahminleri için modelin etkinliği ayrı ayrı test edilmiştir. Sun vd. [4] ve Tselentis vd. [5] uzamsal ve zamansal trafik akımı tahminlerinde Baye- sian ağları yöntemini kullanmışlardır. Bulanık mantık tabanlı bir şehir içi trafik tahmini yöntemi ise Dimitriou vd. [6] tarafından önerilmiştir. Bu yayında önerilen tahmin yöntemine benzer olarak, Sun ve Zhang [7] bir ağdaki bağ akımları arasındaki korelasyonları dikkate alarak belirli bir ağ için yalnızca yüksek korelasyona sahip ağlardan gelen verileri giriş verisi kümesine dahil etmişlerdir. Sonuç olarak özellikle birbirine yakın olan ağlardan alınan verilerin tahmin doğruluğu üzerinde olumlu etkisi olduğunu belirtmişlerdir. Ancak yalnızca belirli ağlardan alınan verilerin tahmin algoritmalarında kullanılması, trafikteki aniden meydana gelen beklenmeyen durumlarda çoğunlukla başarısız tahminler üretmektedirler. Bu amaçla bu yayında önerilen yöntem içerisinde, bağlar arasındaki korelasyonlar sürekli olarak hesaplanarak yalnızca mevcut durum için en yüksek korelasyona sahip bağlardan gelen veriler dikkate alınmaktadır. Trafik karakteristiklerine ait verilerin model içerisine dahil edilmesi işlemi her bir tahmin ufkunda tekrar değerlendirilmektedir ve bu sayede yalnızca bazı bağların tahminler üzerindeki etkilerini sürekli olarak kullanan literatürdeki modellerden [8] daha yüksek tahmin doğruluklarının elde edilmesi hedeflenmektedir. Uzamsal verinin trafik tahminindeki kullanımı ve önemi Vlahogianni vd. [9] tarafından geniş bir çerçevede incelenmiştir. Bu çalışmada, uzamsal ve zamansal trafik akım hızı tahmini yöntemlerinin, özellikle ortalama yolculuk zamanlarında ve tüketilen yakıt miktarlarında sağladığı iyileşmeler göz önüne alınarak, yüksek tahmin doğruluğuna sahip bir uzam-zamansal ortalama hız tahmini yöntemi geliştirilmiştir. Tahmin modeli içerisine farklı bağlara ait verilerin dahil edilebilmesi için, matematiksel olarak basit bir çözüm sunmaları nedeniyle çok değişkenli zaman serileri modelleri kullanılmıştır. Önerilen yöntemin iki ana katkısının olacağı düşünülmektedir. Trafik akım hızlarının gelecekteki değerlerinin tahmin edilmesi ve bu sayede trafik tıkanıklığı açısından sorun yaşaması muhtemel olan bölgelerde, trafik ışıklarının yeşil sürelerine müdahale edilmesi ve/veya taşıt sahiplerinin trafik tabelaları ve akıllı telefon uygulamaları (Google maps, Yandex navigator, vb.) ile bilgilendirerek alternatif yollara yönlendirilmesi, hedeflenen katkılardan ilkini oluşturmaktadır. Diğer katkı ise özellikle trafikte yaşanacak geçici sorunların çözümünde yöntemin sağlayacağı faydadır. Örneğin, literaturde geleneksel olarak kullanılan modelleme ve parametre kestirimi yöntemleri ile zamanlama planı belirlenen bir yolda meydana gelebilecek bir trafik kazası, yapılan planlamaların etkinliğini önemli ölçüde azaltacaktır. Bu ve trafik akımındaki benzeri geçici sorunların etkileri, yapılacak olan tahminler ile belirli bir süre önce öngörülerek en aza indirilebilir. Modelleme yaklaşımlarının aksine tahmin yöntemleri dinamik olarak güncellenen veri kümelerini kullandıkları için bahsedilen geçici sorunların etkilerinin belirlenmesinde literatürde sıklıkla kullanılmaktadırlar. Mevcut yayın kapsamında geliştirilen tahmin yönteminin, hem modelleme ve parametre kestirimi yaklaşımları ile bir arada kullanılabileceği hem de geçici durumlarda bu iki yönteme alternatif olabileceği söylenebilir. Her iki durumda da tek amaç, trafik kontrol yöntemlerinin etkinliğini en üst seviyeye çıkarmaktır. Bu sayede, mevcut trafik ağları kullanılarak, insanların trafikte geçirdiği süreleri en aza indirebilmek, trafiğin insanlar üzerindeki sosyal ve ekonomik etkilerini azaltabilmek, taşıtların neden olduğu karbon emisyonlarının miktarını düşürebilmek ve trafiğin neden olduğu diğer tüm olumsuz etkileri azaltabilmek daha mümkün hale gelecektir. ∗ 2. Uzam-Zamansal Tahmin Modeli Bu yayında bir kısa dönem ortalama hız tahmini yöntemi geliştirilmiştir. Geliştirilen yöntem, önceki bölümde belirtildiği gibi farklı noktalardan alınan veriler arasındaki korelasyonların dikkate alınması prensibine dayanmaktadır. Şekil 1’de bu yayında kullanılan veri seti içerisindeki üç farklı bağa ait beş dakika ortalamalı hız verileri gösterilmektedir. Bir güne ait verilerin yer aldığı bu şekilde birbirine yakın farklı yollardaki ortalama hız değerlerinin benzer karakteristiğe sahip olduğu açıkça görülmektedir. Üç bağa ait değerler bazen aynı anda azalırken veya artarken bazı zamanlarda ise bu değişimler belli bir zaman gecikmesi ile diğer bağlarda gözlemlenmektedir. Özellikle zaman gecikmelerine sahip bilgilerin önerilen tahmin yönteminin etkinliği üzerinde oldukça önemli bir etkisi bulunmaktadır. Bag 1 Bag 2 Bag 3 Ortalama hiz (km/saat) 60 55 50 45 40 35 30 25 50 100 150 200 Zaman (5 dakikalik ortalama) 250 Şekil 1: Farklı bağlara ait ortalama hız ölçümleri. Geliştirilen yöntemin temeli, yüksek doğrulukta tahminler sağlaması ve basit yapısı nedeniyle literatürde kısa süreli tahminler için sıklıkla kullanılan Otoregresif Modele (Autoregressive - AR) dayanmaktadır [10]. Bu modeller ayrıca, geliştirilecek olan modelin ana hedefi olan, çok sayıda bağdan alınan ve farklı trafik karakteristiklerine ait olan tüm verilerin model içerisine dahil edilmesi fikrine olanak sağlamaktadır. AR modeller, bir sistemin çıkış değişkeninin, sisteme ait geçmiş verilerin ağırlıklandırılmış doğrusal bir kombinasyonu olarak elde edilebileceği varsayımına dayanırlar. Bu yaklaşımı, yayındaki geniş bir veri setinin kullanılması hedefine uygun olarak çok değişkenli sistemlere uygulayabiliriz. Burada P (p = 1, 2, . . . , P ) adet çıkış değişkenine (örneğin, P adet bağın ortalama hız değerlerine) ait ölçümlere sahip olduğumuzu varsayalım. Bu çıkış değişkenleri, P = V × S olmak üzere S (s = 1, 2, . . . , S) adet düğümden alınan V (v = 1, 2, . . . , V ) adet değişkene ait ölçümler olabilir. t (t = 1, 2, . . . , M + n) örnek zamanında ∗ ∗ s’inci bağda ölçülen v’ninci değişkenin ölçümünü y v ,s olarak tanımlayalım ve bu durumda hedef (tahmin edilmek istenen) çıkış değişkeni ytv,s olsun. Sonuç olarak bir Çok Değişkenli AR model (Multivariate Autoregressive - M-AR), diğer adıyla Vektör Otoregresif model (1)’deki gibi elde edilebilir: ytv ∗ ,s∗ = V,S n X X v,s v,s yt−i xi + evt ∗ ,s∗ , (1) v=1 i=1 s=1 Burada xv,s (∀i, v, s) ilgili regresyon katsayılarını, n moi ∗ del derecesini ve evt ,s Gauss gürültüsünü (Gaussien noise) temsil etmektedir. Eşitlik (1), N := nP olacak şekilde Eşitlik (2)’de gösterildiği gibi genişletilebilir. Model eğitimi aşamasında amaç, e gürültü bileşenini de dikkate alarak b ∈ RM ve A ∈ RM ×N gözlemlerini en iyi şekilde açıklayan bir x ∈ RN katsayı vektörünü belirlemektir. Eşitlik (2)’den açıkça görülebileceği üzere x katsayıları bir blok yapı içerisinde toplanmışlardır. Diğer bir ifadeyle, her bir değişkene ait katsayılar n uzunluğundaki bir blok vektöre karşılık gelmektedir. Farklı trafik karakteristiklerine ait olan ve farklı noktalardan ölçülen değerler birbirinden farklı büyüklüklere sahip olduklarından, b vektörü ve A matrisindeki tüm değerler bir normalizasyon işlemi ile 0-1 aralığındaki değerlere dönüştürülmektedir. Bu sayede, bu değerlerden herhangi birinin x vektörü katsayılarının belirlenmesindeki etkisinin diğer değişkenlere oranla çok daha fazla veya az olması önlenmektedir. Eşitlik (2)’de tüm n derece değerlerinin eşit olduğu varsayılmıştır. Başka bir ifadeyle, hedef bağ akımı ve diğer bağlardaki değişkenlerin aynı n derecesindeki AR modelleri ile ilişkilendirildiği kabul edilmiştir. Ancak her bağın ve bağlara ait her değişkenin (akım, yolculuk süresi, kuyruklanma uzunluğu, araç hızları, yoğunluk, vb.) tahmin değerlerine olan etkisinin farklı olacağı açıktır. Bu nedenle Eşitlik (2)’de verilen M-AR modelinin farklı n derecelerine sahip değişkenler için düzenlenmiş hali, ni (i = 1, 2, . . . , P ) i’ninci bağa ait derece, P nmax ≥ maxi ni ve N := P i=1 ni olmak üzere Eşitlik (3)’de verilmiştir. Bu modelde her biri farklı blok uzunluklarına sahip olan düzgün dağılmamış blok katsayısı matrisi x elde edilir. Bu sayede hedef akım çıkışı ile her bir bağa ait değişkenler arasındaki korelasyonlara göre tüm değişkenler arasında bir ayrım yapılması sağlanmıştır. Verilen modellerde x vektör katsayıları farklı yollarla elde edilebilir. Örneğin en küçük kareler yöntemi kullanılarak her bir tahmindeki hataların karelerinin toplamı en küçük olacak şekilde gerekli katsayılar elde edilebilir. Ancak hız tahminleri için geliştirilecek olan model çok sayıda farklı bağın her birinden alınacak olan trafik karakteristiklerine ait verileri içerecektir. Dolayısıyla tahminlerin gerçekleştirilebilmesi için harcanacak süre kısa dönemli bir tahmin algoritması için oldukça fazla olacaktır. Kısa süreli tahminlerde, tahmin süresinin kayda değer derecede artması, elde edilen yüksek tahmin doğruluklarının önemini azaltmaktadır. Bu nedenle, bu yayında geliştirilen modelde kullanılacak yöntemlerle seyrek (sparse) x vektörleri elde edilmeye çalışılmaktadır. Burada bir varsayım yapılarak çok sayıda bağdan alınan hız verileri arasında yalnızca bazılarının, tahmin edilmeye çalışılan bağa ait ortalama hız ile arasında güçlü bir korelasyon olduğu göz önüne alınmaktadır. Fiziksel olarak da anlamlı olacak olan bu belirli değerlerin tahmin üzerindeki olumlu etkileri düşünülerek tahmin aşamasında yalnızca bu değerlerin dikkate alınması sağlanmaktadır. Başka bir ifade ile tahmin doğruluğundan ödün vermeksizin x vektör elemanlarının mümkün olduğunca büyük bir kısmının sıfır olması sağlanmaktadır. Literatürde bu vektörler blok-seyrek (blocksparse) olarak adlandırılmaktadır. Burada en önemli soru sınırlı sayıdaki sıfır olmayan x vektörü elemanlarının nasıl belirleneceğidir. Literatürde rüzgar hızının tahmin edildiği çalışmalarda ( [11,12]), sıkıştırmalı algılama (Compressive Sensing) yöntemi kullanarak hesaplanan x vektörleri sayesinde tahmin doğruluğu açısından elde edilen kayda değer sonuçlar göz önüne alınarak  ?  ? v ,s yn+1   y v? ,s?  n+2  ..  .  ? ? v ,s yn+M | {z b∈RM         =     } yn1,1 1,1 yn+1 .. . 1,1 yn+M −1 ... .. . .. . ... y11,1 .. . .. . 1,1 yM | ... ynV,S ... ... .. . V,S yn+1 .. . ... ... {z V,S yn+M −1 ... ... y1V,S .. . .. . V,S yM A∈RM ×N x1,1 1 .. . x1,1 n        Blok 1        v? ,s?  en+1    ? ?   ev ,s   +  n+2  ..    .    ? ? v ,s  e n+M   {z |     M e∈R  Blok P             .  .  .  .  .  .    }  xV,S  1  .  .. xV,S n | {z }        (2) } x∈RN   ? ? ,s ynv max +1   y v? ,s?  nmax +2  ..  .  ? ? ,s ynv max +M | {z b∈RM        =     } yn1,1 max  yn1,1 max +1 .. . yn1,1 max +M −1 ... .. . .. . ... ... .. . .. . ... ... .. . .. . ... | yn1,1 max −n1 +1 .. . .. . yn1,1 max −n1 +M {z ... ynV,S max ynV,S max +1 .. . ... A∈RM ×N ynV,S max +M −1 ... .. . .. . ... ynV,S max −nP +1 .. . .. . ynV,S max −nP +M x1,1 1 .. . .. . .. . 1,1 xn1                  Blok 1    v? ,s?    enmax +1           ev? ,s?   nmax +2 +  ..    .   ? ? v ,s  e nmax +M   {z |     e∈RM    Blok P                     .  .  .  }  V,S  x1  .  .  . xV,S nP | {z } x∈RN (3) bu yayında blok-seyrek x vektörleri (4)’te verilen optimizasyon problemi çözülerek hesaplanmıştır. min kb − Axk2 x (x blok-seyrek olmak üzere). (4) 3. Benzetim Çalışmaları Önerilen yöntemin etkinliğini ölçmek amacıyla literatürde çok sayıda yayında yer verilen Kaliforniya Otoyol Performans Ölçüm Sistemine (PEMS v14.1) ait bir veri seti kullanılmıştır. Bu sistem Kaliforniya’da bulunan otoyollar üzerindeki çok sayıdaki noktadan gerçek zamanlı verileri kaydetmektedir. İnternet üzerinden erişilebilen sayfasında [13] bu veriler beşer dakikalık çözünürlükte sağlanmaktadır. Literatürdeki ilgili yayınların çok büyük bir kısmında bu veriler yarım saat veya bir saatlik ortalamalara dönüştürülerek kullanılmaktadırlar. Bu çalışmaların temel hedefi genellikle daha yüksek zamansal çözünürlüğe sahip veriler kullanarak daha uzun süreli tahminler gerçekleştirmektedir. Ayrıca düzeltme etkisi (smoothing effect) nedeniyle uzun sürelerde daha kararlı değerler elde edilmektedir ve böylece daha yüksek tahmin doğrulukları sağlanmaktadır. Bu çalışmada ise beş dakikalık veriler doğrudan kullanılarak 30 dakikaya kadar ortalama hız değerleri tahmin edilmiştir. Tahminler için 9 saatlik (5:00-14:00 arası 108 adet beş dakikalık değer) bir eğitim seti kullanılarak aynı gün içerisindeki bu zamanı takip eden 9 saatin (14:00-23:00 arası degerler) tahmini gerçekleştirilmiştir. Özellikle kısa süreli trafik bilgisine ihtiyaç duyulan uygulamalarda (navigasyon yazılımları, trafiğin durumunu gösteren dinamik trafik tabelaları, vb.) bu yöntemin çok daha etkin olacağı düşünülmektedir. Önerilen yöntemin etkinliğini test edebilmek amacıyla öncelikle tahminler farklı yöntemlerle gerçekleştirilmiştir. Bu amaçla, önerilen modelin temelini oluşturan AR modeli ve yapay sinir ağlarına (YSA) dayanan başka bir modele ait tahminler sırasıyla Şekil 2(a) ve 2(b)’de verilmiştir. Veriler arasında doğrusal bir ilişkinin tam olarak kurulamadığı trafik akımı ve ortalama hız gibi değişkenler için literatürde genellikle YSA tabanlı yöntemler daha iyi sonuçlar vermektedirler. Ancak bu çalışmada tüm modeller için sınırlı sayıda (108 adet 5 dakikalık veri) bir eğitim seti kullanıldığından, başarısı büyük oranda eğitim setinin boyutuna bağlı olan YSA modeli için AR modeline kıyasla gerçek değerlerden daha uzak sonuçlar elde edilmiştir. Önerilen tahmin yöntemi ile elde edilen sonuçlar ise Şekil 3’de verilmiştir. Şekilden görülebileceği gibi yakın çevredeki noktalardan alınan ölçümlerin tahmin modeli içerisine dahil edilmesi özellikle ani değişimlerin tahmininde büyük bir fayda sağlamaktadır. Önerilen yaklaşımın bir diğer özelliği ise zamanla değişen veri ile birlikte en yüksek modelleme doğruluğu için x vektör katsayılarının sürekli olarak tekrar hesaplanmasıdır. Başka bir ifadeyle, tahminlerin gerçekleştirildiği zamana ait olan ölçümlerin giriş verisi olarak kullanılmasıyla, her        } Olcum degeri Tahmin degeri 50 45 40 35 Olcum degeri Tahmin degeri 55 Ortalama hiz (km/saat) Ortalama hiz (km/saat) 55 30 50 45 40 35 30 20 40 60 80 Zaman (5 dakikalik ortalama) 100 20 40 60 80 Zaman (5 dakikalik ortalama) 100 (a) AR Model Şekil 3: Önerilen yöntem ile elde edilen tahminler. Olcum degeri Tahmin degeri Ortalama hiz (km/saat) 55 50 45 dikkate aldığı ve NRMSE’nin tahmin edilen değişkenin genliğinden bağımsız olarak yüzde bir değer sağladığı söylenebilir. Tablo incelendiğinde önerilen yöntemin her üç kriter için de diğer yöntemlerden daha başarılı olduğu ifade edilebilir. 40 Tablo 1: Farklı yöntemlere ait hata ölçütlerinin karşılaştırılması 35 Tahmin yöntemi MAE [km/saat] RMSE [km/saat] NRMSE [%] YSA AR Önerilen yöntem 2,62 2,31 1,74 3,25 2,99 2,12 13,91 12,79 9,05 30 20 40 60 80 Zaman (5 dakikalik ortalama) 100 (b) YSA Modeli Şekil 2: Farklı tahmin modelleri ile elde edilen tahminler. 0.5 0.4 0.3 0.2 Genlik bir tahmin ufku için yeni bir x vektörü elde edilmektedir ve bir sonraki tahmin ufku için gerçekleştirilecek tahminlerde bu vektör kullanılmaktadır. Yol üzerindeki algılayıcılardan son olarak alınan veriler ile tahminlerin sürekli olarak güncellenmesi ve bu sayede ağın akım yönüne göre başındaki ve sonundaki bağlar arasındaki trafik şartlarının değişiminin incelenmesi; sabah ve akşam zirve saatler, gece yarısı saatleri ve büyük etkinlikler (spor müsabakalar, gösteri, vb.) gibi geçici zamanlar ile kazalar ve olumsuz hava şartları gibi normal olmayan durumlar için literatürdeki benzer yöntemlere göre daha iyi sonuçlar vermektedir. Ayrıca önerilen modelde yinelemeli (recursive) bir yaklaşım benimsenmiştir. Burada model eğitimi aşamasından sonraki ilk değer olan n + M + 1 değeri tahmin edildikten sonra bu değer n + M + 2 değerinin tahmininde kullanılmaktadır. Bu işlem tahmin ufku boyunca devam ettikten sonra tüm A matrisi yeni ölçüm değerleri ile güncellenmektedir. Önerilen tahmin yönteminin ve kullanılan diğer iki adet yöntemin etkinliklerinin daha iyi anlaşılabilmesi açısından yöntemler Tablo 1’de çeşitli hata ölçütleri kullanılarak karşılaştırılmıştır. Bu karşılaştırmalarda literatürde en yaygın olarak kullanılan ortalama mutlak hata (MAE), ortalama karesel hata (RMSE) ve normalleştirilmiş ortalama karesel hata (NRMSE) ölçütleri kullanılmıştır. Özetle, MAE’nin tahminlerin istenen süre boyunca doğruluğu hakkında bilgi verdiği, RMSE’nin yüksek hataların karesini alması nedeniyle özellikle bu hataları Şekil 4’de bir tahmin periyodunda (6 adet 5 dakikalik değer) önerilen modelin hesapladığı ve tahminlerde kullandığı x vektörü gösterilmektedir. Kesik çizgilerle ayrılan bölümlerden görülebileceği gibi her bir bağa ait model derecesi farklıdır. Burada tahmin algoritmasının, daha önceden belirtildiği gibi, o andaki tahminler için yalnızca bazı noktalardaki değerleri (sıfır olmayan değerler) dikkate aldığı görülebilir. Bu noktalar her bir yarım saatlik sürede tahmin yöntemi tarafından tekrar belirlenmektedir. Tahmin süresi boyunca değişen x vektörü incelendiğinde bazı noktaların her zaman tahmine bir katkı sağladığı, bazı noktaların ise tam aksine hiçbir zaman bir değer almadığı görülmüştür. Verilerin alındığı internet sayfasında tüm noktaları 0.1 0 −0.1 −0.2 −0.3 −0.4 0 20 40 60 80 Endeks Şekil 4: Seyrek katsayı vektörü. gösteren bir harita bulunmamaktadır. Ancak yalnızca x vektörünün zamanla değişimine bakarak her bir noktanın, tahminlerin gerçekleştirildiği noktaya olan uzaklığı ve iki nokta arasındaki ilişki hakkında bir yorum yapabilmek mümkündür. Verilerin alındığı noktaların harita üzerindeki konumlarını bilmeksizin, yalnızca veriler arasındaki korelasyonlara bakarak hangi verilerin giriş setine dahil edilebileceğine karar verebilme özelliği, önerilen yöntemin en önemli özelliklerinden biri olarak gösterilebilir. Bu özelliği sayesinde önerilen yöntemin, özellikle eksik ve hatalı verilerin bulunduğu veri setlerinde, literatürdeki benzer yöntemlere kıyasla çok daha başarılı olacağı öngörülmektedir. 4. Sonuçlar Literatürde özellikle yenilenebilir enerji kaynaklarından elde edilebilecek güç miktarlarının tahmini için son birkaç yılda oldukça fazla kullanılmaya başlayan uzam-zamansal yöntemlerin etkinlikleri göz önüne alınarak bu yayında trafiğin durumunu ifade etmek için en yaygın olarak kullanılan ortalama araç hızlarının gelecek tahminleri için bir uzam-zamansal yöntem sunulmaktadır. Ağ üzerindeki farklı noktalardan alınan ve çok sayıda parametreye ait olan ölçümleri tahmin aşamasında model içerisine dahil ederek mevcut verilerden en üst seviyede yararlanmayı saglayan bu yöntemin, farklı noktalara ait çeşitli trafik karakteristikleri arasındaki korelasyonları kullanarak tahmin doğruluğunu önemli derecede arttırdığı gösterilmiştir. Trafik tıkanıklığının etkilerinin ardışık yollar üzerinde belirli bir zaman gecikmesiyle görülmesi, trafik tahminlerinde bu yöntemlerin etkin olmasını sağlamıştır. Literatürde en iyi girişlerin bir ön analiz ile belirlendiği tahmin yaklaşımlarının aksine bu yayında önerilen yöntem her bir tahmin ufku için yalnızca bir önceki tahminde en iyi sonuçları veren değişkenleri ve değerleri model içerisine dahil etmektedir. Bu nedenle, bir bölgedeki trafik akımındaki değişen trafik şartlarının ve hava koşullarının etkilerinin tahmin aşamasında dikkate alınması sağlanmıştır. Çeşitli tahmin yöntemleri ile yapılan karşılaştırmalar önerilen yöntemin etkinliğini göstermektedir. Önerilen modelin etkinliğini arttırmak amacıyla giriş veri setinin yolculuk süreleri, meşguliyet ve kuyruklanma uzunluğu gibi trafik karakteristikleri ile sıcaklık ve yağış miktarı gibi hava değişkenleri kullanarak genişletilmesi yakın gelecekteki bir çalışma olarak planlanmaktadır. deling and prediction,” Transportation Research Part C: Emerging Technologies, vol. 11, no. 2, pp. 121–135, 2003. [3] Chunjiao Dong, Chunfu Shao, Stephen H Richards, and Lee D Han, “Flow rate and time mean speed predictions for the urban freeway network using state space models,” Transportation Research Part C: Emerging Technologies, vol. 43, pp. 20–32, 2014. [4] Shiliang Sun, Changshui Zhang, and Guoqiang Yu, “A bayesian network approach to traffic flow forecasting,” Intelligent Transportation Systems, IEEE Transactions on, vol. 7, no. 1, pp. 124–132, 2006. [5] Dimitrios I Tselentis, Eleni I Vlahogianni, and Matthew G Karlaftis, “Improving short-term traffic forecasts: to combine models or not to combine?,” Intelligent Transport Systems, IET, vol. 9, no. 2, pp. 193–201, 2014. [6] Loukas Dimitriou, Theodore Tsekeris, and Antony Stathopoulos, “Adaptive hybrid fuzzy rule-based system approach for modeling and predicting urban traffic flow,” Transportation Research Part C: Emerging Technologies, vol. 16, no. 5, pp. 554–573, 2008. [7] Shiliang Sun and Changshui Zhang, “The selective random subspace predictor for traffic flow forecasting,” Intelligent Transportation Systems, IEEE Transactions on, vol. 8, no. 2, pp. 367–373, 2007. [8] Stephen Dunne and Bablu Ghosh, “Weather adaptive traffic prediction using neurowavelet models,” Intelligent Transportation Systems, IEEE Transactions on, vol. 14, no. 1, pp. 370–379, 2013. [9] Eleni I Vlahogianni, Matthew G Karlaftis, and John C Golias, “Short-term traffic forecasting: Where we are and where we?re going,” Transportation Research Part C: Emerging Technologies, vol. 43, pp. 3–19, 2014. [10] A Tascikaraoglu and M Uzunoglu, “A review of combined approaches for prediction of short-term wind speed and power,” Renewable and Sustainable Energy Reviews, vol. 34, pp. 243–254, 2014. 5. Teşekkür [11] Borhan M. Sanandaji, Akin Tascikaraoglu, Kameshwar Poolla, and Pravin Varaiya, “Low-dimensional models in spatio-temporal wind speed forecasting,” in Proceedings of the 2015 American Control Conference – ACC, 2015, pp. 4485–4490. Bu çalışma Türkiye Bilimsel ve Teknik Araştırmalar Kurumu (TÜBİTAK) tarafından 115E984 no’lu "Kent içi yol ağlarının modellenmesi, kalibrasyonu ve yeni bir mikrosimülatörün yaygın olarak kullanılan simülatörlerle karşılaştırılması" projesi kapsamında desteklenmektedir. [12] Akin Tascikaraoglu, Borhan M Sanandaji, Kameshwar Poolla, and Pravin Varaiya, “Exploiting sparsity of interconnections in spatio-temporal wind speed forecasting using wavelet transform,” Applied Energy, vol. 165, pp. 735–747, 2016. 6. Kaynakça [13] “Freeway Performance Measurement System (PeMS),” http://pems.dot.ca.gov/?dnode= Clearinghouse, Accessed: 2016-04-26. [1] Fatma Yildiz Tascikaraoglu, Jennie Lioris, Ajith Muralidharan, Martin Gouy, and Pravin Varaiya, “Pointq model of an arterial network: calibration and experiments,” arXiv preprint arXiv:1507.08082, 2015. [2] Anthony Stathopoulos and Matthew G Karlaftis, “A multivariate state space approach for urban traffic flow mo-
3cs.SY
Polynomial braid combing Juan González-Meneses and Marithania Silvero∗ arXiv:1712.01552v1 [math.GT] 5 Dec 2017 December, 2017 Abstract Braid combing is a procedure defined by Emil Artin to solve the word problem in braid groups for the first time. It is well-known to have exponential complexity. In this paper, we use the theory of straight line programs to give a polynomial algorithm which performs braid combing. This procedure can be applied to braids on surfaces, providing the first algorithm (to our knowledge) which solves the word problem for braid groups on surfaces with boundary in polynomial time and space. In the case of surfaces without boundary, braid combing needs to use a section from the fundamental group of the surface to the braid group. Such a section was shown to exist by Gonçalves and Guaschi, who also gave a geometric description. We propose an algebraically simpler section, which we describe explicitly in terms of generators of the braid group, and we show why the above procedure to comb braids in polynomial time does not work in this case. 1 Introduction Braid groups can be seen as the fundamental group of the configuration space of n distinct points in a closed disc D. If the points are unordered, the fundamental group is called the full braid group (or just the braid group) with n strands, and denoted Bn . If the points are ordered, the obtained group is a finite index subgroup of Bn , called the pure braid group with n strands, Pn . If one replaces the closed disc D with any connected surface S, one obtains the full braid group Bn (S) and the pure braid group Pn (S) with n strands on S. Emil Artin [1] solved the word problem in braid groups (on the disc) for the first time. Actually, he solved the word problem in Pn , and then used that Bn is a finite extension of Pn by the symmetric group Σn . The way in which he solved the word problem in Pn is known as braid combing. Artin showed that Pn can be seen as an iterated semi-direct product of free groups: Pn = ((· · · ((F2 n F3 ) n F4 ) n · · · Fn−2 ) n Fn−1 . The braid combing consists on computing the normal form of a pure braid with respect to the above semidirect decomposition. As the word problem in a free group of finite rank is well-known, this solves the word problem in Pn . But there is a big issue with braid combing: It is an exponential procedure. If we start with a word of length m in the standard generators of Pn , the length of the combed braid may be exponential in m, when written in terms of the generators of the free groups. An explicit example is given in Subsection 3.1. Artin was of course aware of this; In the very last paragraph of [1], in which he talks about braid combing, he says: ∗ Both authors partially supported by the Spanish research projects MTM2013-44233-P, MTM2016-76453-C2-1-P and FEDER. 1 “Although it has been proved that every braid can be deformed into a similar normal form the writer is convinced that any attempt to carry this out on a living person would only lead to violent protests and discrimination against mathematics. He would therefore discourage such an experiment”. It this paper we use the theory of straight line programs (a compressed way to store a word as a set of instructions to create it), to perform braid combing in polynomial time and space. This means that we give an algorithm which, given a word w of length m in the standard generators of Pn , computes n − 1 compressed words, each one representing a factor of the combed braid associated to w, in polynomial time and space with respect to m. Furthermore, given two pure braids, one can compare the compressed words associated to each of them in polynomial time. Hence, this procedure gives a polynomial solution of the word problem in pure braid groups, using braid combing. This result, in the case of classical braids, does not improve the existing algorithms, as there are quadratic solutions to the word problem in braid groups of the disc. But it happens that the above procedure is valid not only for braids on the disc, but also for braids on any compact, connected surface S with boundary. Hence, this provides the first polynomial algorithm to solve the word problem in Pn (S). The previously known algorithms [20, 12], based on usual braid combing, are clearly exponential. In the case of closed surfaces, the braid combing is quite different. There is not such a decomposition of Pn (S) as a semi-direct product of free groups, and one needs to use instead a decomposition Pn (S) = π1 (S) n Pn−1 (S\{p1 }), where p1 is a point in S. The existence of such a decomposition was shown by Gonçalves and Guaschi [9], by giving a suitable section s : π1 (S) → Pn (S) of the natural projection π : Pn (S) → π1 (S) which they explained geometrically, but not algebraically. In this paper we provide an explicit algebraic section, for closed orientable surfaces of genus g > 0, which does not coincide with the one defined in [9] (although we also give an explicit algebraic description of the section in [9]). Finally, we explain why the procedure used to solve the word problem in surfaces with boundary does not generalize to closed surfaces in the natural way. The plan of the paper is the following. In Section 2 we introduce the basic notions of braids on surfaces. Then in Section 3 we explain braid combing in the case of surfaces with boundary, and give an example showing that combing is exponential. Straight line programs are treated in Section 4, and in Section 5 we introduce the notion of compressed braid combing and give the polynomial algorithm to solve the word problem in braid groups on surfaces with boundary. Section 6 deals with combing on a closed surface: We define the group section from π1 (S) to Pn (S) when S is a closed surface, and we explain why the compressed braid combing cannot be generalized to this case in a natural way. Acnkowledgements: The first author thanks Saul Schleimer, for teaching him about straight line programs at the Centre de Recerca Matemàtica (Barcelona) in 2012, and for useful conversations. 2 Braids on surfaces Let S be a compact, connected surface of genus g and p boundary components, and let P = {p1 , . . . , pn } be a set of n distinct points of S. A geometric braid on S based at P is an n-tuple β = (γ1 , . . . , γn ) of paths γi : [0, 1] → S, such that • γi (0) = pi , ∀i ∈ {1, . . . , n}, • γi (1) ∈ P, ∀i ∈ {1, . . . , n}, • {γ1 (t), . . . , γn (t)} are n distinct points of S ∀t ∈ [0, 1]. 2 A braid on S based at P is a homotopy class of such geometric braids (notice that homotopies must fix the endpoints). The usual product of paths endows the set of braids with a group structure, and the resulting group (which is independent of the choice of P) is called the braid group with n strands on S, and denoted Bn (S). The path starting at pi will be called the ith strand of the braid. The above definition can also be explained by saying that the braid group Bn (S) is the fundamental group of Mn (S)/Σn , where Mn (S) = {(x1 , . . . , xn ) ∈ S n ; xi 6= xj ∀i 6= j} is the configuration space of n distinct points in S, and Mn (S)/Σn is the quotient of Mn under the natural action of the symmetric group Σn which permutes coordinates [4]. In other words, a braid can be seen as a motion of n distinct points in S, whose initial configuration is P, they move along the surface without colliding, and their final configuration is again P (though the particular position of each point in P may have changed). We will sometimes use this dynamic interpretation of a braid throughout this paper. There are well known presentations for braid groups of surfaces. In the particular cases of the sphere, the torus and the projective plane, the classical references are [6, 3, 10]. For higher genus, one can find presentations in [20, 12, 2, 11]. In all these presentations, some generators are related to the generators σ1 , . . . , σn−1 of the classical braid group (and correspond to strand crossings), while some other generators are related to the generators of the fundamental group of S (and correspond to motions of the distinguished points along the surface). A braid β is said to be pure if γi (1) = pi , for all i ∈ {1, . . . , n}, that is, if after the motion each distinguished point goes back to its original position. Pure braids form a finite index subgroup of Bn (S), the pure braid group with n strands on S, denoted Pn (S). Notice that Pn (S) is just the fundamental group of the configuration space Mn (S). In particular, B1 (S) = P1 (S) = π1 (S). The main object of study in this paper is braid combing, which is a procedure to produce a particular normal form for pure braids. For this purpose, we need to make precise a particular presentation of Pn (S). From now on we consider that S is a compact, connected orientable surface. We will see that the combing in the non-orientable case is analogous, since one just need to consider the corresponding presentation of Pn (S) appearing in [11, Theorem 3]. Theorem 2.1. [2] Let S be an orientable surface of genus g ≥ 0 with p > 0 boundary components. The group Pn (S) admits the following presentation: • Generators: {Ai,j | 2g + p ≤ j ≤ 2g + p + n − 1, 1 ≤ i < j}. • Relations: (PR1) A−1 i,j Ar,s Ai,j = Ar,s if (i < j < r < s) or (r + 1 < i < j < s) or (i = r + 1 < j < s where r ≥ 2g or r even). −1 (PR2) Ai,j Aj,s Ai,j = Ai,s Aj,s A−1 i,s (PR3) −1 Ai,j Ai,s Ai,j (PR4) −1 Ai,j Ar,s Ai,j if i < j < s. = −1 Ai,s Aj,s Ai,s A−1 j,s Ai,s = −1 −1 −1 Ai,s Aj,s A−1 i,s Aj,s Ar,s Aj,s Ai,s Aj,s Ai,s if i < j < s. if (i + 1 < r < j < s) or (i + 1 = r < j < s where r > 2g or r odd). −1 −1 (ER1) Ar+1,j Ar,s Ar+1,j = Ar,s Ar+1,s A−1 j,s Ar+1,s (ER2) −1 Ar−1,j Ar,s Ar−1,j = if r odd, r < 2g and j < s. −1 −1 Ar−1,s Aj,s A−1 r−1,s Ar,s Aj,s Ar−1,s Aj,s Ar−1,s if r even, r ≤ 2g and j < s. Remark 2.2. We have corrected some missprints of the presentation appearing in [2]. The generator Ai,j can be represented as a motion of a single point of P. Notice that 2g+p ≤ j ≤ 2g+p+n−1, so we can write j = (2g + p − 1) + k for some k = 1, . . . , n. Then Ai,j represents a motion of the point 3 pk as shown in Figure 1. If 1 ≤ i ≤ 2g the motion of pk corresponds to one of the classical generators of the fundamental group of a closed surface. If i = 2g + r with r = 1, . . . , p − 1, the point pk moves around the rth boundary component (notice that there is no generator in which pk moves around the pth boundary component). If i = (2g + p − 1) + t for some t = 1, . . . , k − 1, the point pk moves around the point pt , as in the classical generators for the pure braid group of the disc [4]. Figure 1: A geometric representation of each of the four different families of motions of pk represented by generators Ai,(2g+p−1)+k . Remark 2.3. The presentation given in [2] is stated for g > 0, but it also holds when g = 0. For instance, if g = 0 and p = 1, Pn (S) is the classical pure braid group Pn , the only relations that survive are (P R1)−(P R4), and the presentation of Theorem 2.1 is precisely the presentation of Pn given in [4]. ±1 Remark 2.4. By using the relations in Theorem 2.1 we can rewrite each conjugation A−1 i,j Ar,s Ai,j with j < s as a word in generators whose second subindices equal s. Moreover, we can use these words to derive −1 analogous relations allowing us to rewrite a word of the form Ai,j A±1 r,s Ai,j with j < s as a word in generators whose second subindices equal s: (PR10 ) Ai,j Ar,s A−1 i,j = Ar,s if (i < j < r < s) or (r + 1 < i < j < s) or (i = r + 1 < j < s where r ≥ 2g or r even). if i < j < s. −1 −1 (PR20 ) Ai,j Aj,s A−1 i,j = Aj,s Ai,s Aj,s Ai,s Aj,s −1 (PR30 ) Ai,j Ai,s A−1 i,j = Aj,s Ai,s Aj,s 0 (PR4 ) Ai,j Ar,s A−1 i,j = if i < j < s. −1 −1 −1 A−1 j,s Ai,s Aj,s Ai,s Ar,s Ai,s Aj,s Ai,s Aj,s if (i + 1 < r < j < s) or (i + 1 = r < j < s where r > 2g or r odd). if r odd, r < 2g and j < s. (ER10 ) Ar+1,j Ar,s A−1 r+1,j = Ar,s Aj,s −1 −1 −1 (ER20 ) Ar−1,j Ar,s A−1 r−1,j = Aj,s Ar,s Ar−1,s Aj,s Ar−1,s Aj,s if r even, r ≤ 2g and j < s. These relations together with those appearing in Theorem 2.1 are used frequently throughtout this paper. We use the expression (PR/ER)-relations to denote the set consisting of these 12 types of relations. When S is a closed surface, one needs to add an extra relation in the presentation of Pn (S). We write [a, b] = aba−1 b−1 . Theorem 2.5. [2] Let S be an orientable closed surface of genus g ≥ 0. The group Pn (S) admits a presentation with generators {Ai,j | 1 ≤ i ≤ 2g + n − 1, 2g + 1 ≤ j ≤ 2g + n, i < j} and the same relations as those in Theorem 2.1 together with 2g+k−1 −1 (TR) [A−1 2g,2g+k , A2g−1,2g+k ] · · · [A2,2g+k , A1,2g+k ] = Y 2g+n Al,2g+k l=2g+1 for k = 1, . . . , n. 4 Y j=2g+k+1 A2g+k,j , Notice that this time the generator Ai,j corresponds to a motion of the point pk if j = 2g + k. The picture corresponds exactly to the case in which p = 1 in Figure 1, provided one removes the boundary component on the right hand side of the picture. Note that the (PR/ER)-relations also hold in this case. As above, Theorem 2.5 was stated in [2] for genus g > 0, but the presentation also holds in the case g = 0, as one gets the known presentation for the pure braid group of the sphere given in [8]. Remark 2.6. Choose some points Q = {q1 , . . . , qm } in a compact, connected surface S, and consider the non-compact surface S\Q. Then the braid groups Pn (S\Q) and Bn (S\Q) are naturally isomorphic to Pn (S 0 ) and Bn (S 0 ), respectively, where S 0 is the surface obtained from S by removing a small open neighborhood of Q, that is, by replacing each qi with a boundary component. In other words, removing a point from S is equivalent to adding a boundary component, as far as braid groups on the surface are concerned. 3 Braid combing on a surface with boundary From now on we assume that S is an orientable surface with p > 0 boundary components, unless otherwise stated. The case when S is a non-orientable surface with boundary can be treated analogously, since one just needs to consider the relations apperaring in the presentation of Pn (S) [11, Theorem 3], instead of the (P R/ER)-relations. We will discuss the case when S is an orientable closed surface in Section 6. Braid combing is a process by which a particular normal form of a pure braid is obtained. It was introduced by Artin [1] for the pure braid groups of the disc, but it can be generalized to pure braid groups of other surfaces, as we will explain in this section. Recall that P = {p1 , . . . , pn } are n distinguished points in the surface S. For m = 1, . . . , n, we denote Pm = {p1 , . . . , pm } and Qn−m = {pm+1 , . . . , pn }. It is well known (see for instance [13]) that the map from Pn (S) to Pm (S) which ‘forgets’ the last n − m strands determines a short exact sequence in,m pn,m 1 → Pn−m (S\Pm ) −→ Pn (S) −→ Pm (S) → 1 (1) where the base points of the three involved groups are, respectively, Qn−m , Pn and Pm . In the case of a closed surface, the above sequence is also exact if we assume that m ≥ 3 if S is the sphere S2 , and that m ≥ 2 if S is the projective plane RP 2 . The bad cases are those which involve finite groups, as P1 (S2 ) = P2 (S2 ) = 1, P3 (S2 ) = Z/2Z [6], and also P1 (RP 2 ) = Z/2Z and P2 (RP 2 ) = Q8 , the quaternion group of order 8 [13]. In the sequence (1), an element of Pn−m (S\Pm ) can be seen as a braid in Pn (S) in which the first m strands are trivial or, in other words, in which the points of Pm do not move. This is equivalent to consider that S has m extra punctures (or, removing a small neighborhood around each fixed puncture, that S has m extra boundary components), and n − m points are moving. To define braid combing, we single out a particular case of the exact sequence (1). When m = n − 1 ≥ 1 one has in,n−1 pn,n−1 1 → π1 (S \ Pn−1 ) −→ Pn (S) −→ Pn−1 (S) → 1, (2) where we applied that P1 (S \ Pn−1 ) = π1 (S \ Pn−1 ). We can easily describe the injection in,n−1 algebraically: Let jn = (2g + p − 1) + n. Considering each element of Pn−1 as a boundary component and using the generators of Theorem 2.1, we see that in,n−1 (Ai,jn ) = Ai,jn for all i = 1, . . . , jn − 1. The projection pn,n−1 is also very easy to describe: For every i < j, the element pn,n−1 (Ai,j ) is either 1 (if j = jn ), or Ai,j (if j < jn ). It is known that, since S has nontrivial boundary, the sequence (2) splits [9]. An explicit section s : Pn−1 (S) → Pn (S) is given by s(Ai,j ) = Ai,j for all i, j. Now notice that, as n − 1 ≥ 1, the fundamental group of S \ Pn−1 is a free group of rank 2g + p + n − 2 [15], 5 so we have an exact sequence: in,n−1 pn,n−1 1 → F2g+p+n−2 −→ Pn (S) −→ Pn−1 (S) → 1. (3) Therefore, Pn (S) = Pn−1 (S) n F2g+p+n−2 , where Pn−1 (S) can be seen as the subgroup of Pn (S) generated by {Ai,j }i<j<jn , and F2g+p+n−2 as the subgroup of Pn (S) generated by {Ai,jn }i<jn . By induction on n, Pn (S) can be written as an iterated semi-direct product of free groups: Pn (S) = ((· · · ((F2g+p−1 n F2g+p ) n F2g+p+1 ) n · · · F2g+p+n−3 ) n F2g+p+n−2 . The process of computing the normal form of a braid (on a connected, compact surface with boundary) with respect to this iterated semi-direct product, is known as braid combing. Definition 3.1. Let S be an orientable surface of genus g with p > 0 boundary components. The combed normal form of a braid α ∈ Pn (S) is a decomposition α = α1 α2 · · · αn where, for k = 1, . . . , n, αk belongs to the subgroup generated by {Ai,jk }i<jk , with jk = (2g + p − 1) + k. By the uniqueness of normal forms with respect to semi-direct products, the combed normal form of a braid is unique. Also, since each of the subgroups described in Definition 3.1 is a free group on the given generators, one can choose a unique reduced word wi to represent each αi , and this gives a unique word representing α. We now describe explicitly how to compute the combed normal form of a pure braid α represented by a given word w in the generators of Pn (S). For that purpose, we just need to find a way to move the letters A±1 i,j with smaller second index to the left of those with bigger second index. This can be achieved by using ±1 the (PR/ER)-relations to replace two consecutive letters AB where A = A±1 r,s , B = Ai,j and j < s, with the word BW , where W is a word formed by letters whose second subindex equals s. Iteratively applying these substitutions (together with free reduction), the word w can be transformed into a reduced word of the form w1 w2 · · · wn , which also represents α, such that the second subindex of every letter of wk is jk , for k = 1, . . . , n. The decomposition α = α1 · · · αn , where αk is the braid represented by wk for k = 1, . . . , n, is thus the combed normal form of α. We will see in Subsection 3.1 that the length of the word w1 · · · wn is possibly exponential with respect to the length of w. But we will show that it is possible to represent w1 · · · wn in a compressed way. The key point consists of moving the letters as explained in the above paragraph but, instead of applying the conjugations described in (PR/ER)-relations, we will keep track of those conjugations without applying them. We will now show how to do this. To avoid cumbersome notation we use the expression uv to denote the word v −1 uv, with u and v two given words. Suppose that w = u1 u2 · · · um , where ut = A±1 it ,st for t = 1, . . . , m. Thus w is a sequence of m letters. For every t, let vt be the subsequence of w formed by those letters ur such that r > t and sr < st . In other words, vt is formed by the letters of w which come after ut and have smaller second index. Notice that vt is formed precisely by the letters of w that must be swapped with ut when combing the braid. By construction, we have the following: Lemma 3.2. Let w = u1 u2 · · · um be as above, representing a braid α. Given k ∈ {1, . . . , n} let ui1 ui2 · · · uit be the subsequence of w formed by those letters whose second subindex is jk . Define: v v v wk = ui1i1 ui2i2 · · · uitit . Then wk represents the same braid as wk , so w = w1 · · · wn represents the combed normal form of α. Example 3.3. If w = A1,2 A1,4 A1,2 A−1 2,3 A2,4 A1,3 A1,2 ∈ P4 , we have A1,2 A A1,2 A−1 2,3 A1,3 A1,2 w = A1,2 A1,2 A1,2 A−1 A 1,2 A | {z } | 2,3 {z 1,3 } | 1,4 w2 w3 6 {z w4 A A2,41,3 A1,2 } . Note that in P4 we have g = 0 and p = 1, so jk = k. There are no letters of the form Ai,1 , that is why w1 is the trivial word. The word w = w1 · · · wn is not too long with respect to w: its length is at most m2 . Indeed, the worst case occurs if we need to swap every pair of letters of w, so each vi has length m − i, and thus the length of w is = m2 . m + 2 m(m−1) 2 Let us see how we can obtain enough information to describe each wk , by a procedure which is linear in m. Lemma 3.4. Given w = u1 · · · um as above, and given k ∈ {1, . . . , n}, one can compute in time O(m) a subsequence v of w and a list of pairs of integers (c1 , d1 ), . . . , (ct , dt ), where 1 ≤ |cr | ≤ m and 0 ≤ dr ≤ m for each r = 1, . . . , t (t < m), which encodes all the information to describe wk . Proof. Going through the word w = u1 · · · um once, we can determine the position i1 of the first letter v v v with second index jk , and the word v = vi1 . We know that wk will have the form ui1i1 ui2i2 · · · uitit and, by construction, that each vir is a suffix of vi1 . Hence, in order to determine vir we just need to provide the word vi1 and the length dr of vir . Also, in order to determine the letter uir we just need to provide its first index and the sign of its exponent (±1). Hence we just need to provide an integer cr such that |cr | is the first index of uir , and whose sign is equal to the exponent of uir . To obtain these integers, we go through w again, starting at the position i1 and setting d equal to the length of vi1 . Every time we read a letter u whose second index is smaller than jk , we decrease d by one. Every time we read a letter u whose second index is jk , we store the pair (c, d) where |c| is the first index of u and the sign of c is given by the exponent of u (positive if u = A|c|,jk , negative if u = A−1 |c|,jk ), and d is the above number. Notice that the first step stores (c1 , d1 ) where |c1 | = i1 and d1 is the length of vi1 . At the end of the whole procedure, we have gone through w twice (so the complexity is O(m)), and we have obtained a word vi1 and a list of pairs of integers (c1 , d1 ), . . . , (ct , dt ) which encode wk as desired. Example 3.5. Let w be the word with 7 letters appearing in Example 3.3. To describe w3 we store the word A1,2 and the pairs (−2, 1), (1, 1). To describe w4 we store the word A1,2 A−1 2,3 A1,3 A1,2 and the pairs (1, 4), (2, 2). We have then obtained, for every k = 1, . . . , n, a short word wk representing the factor αk of the braid combing. But a word representing αk will be useful only if we represent it as a reduced word wk in the generators {Ai,jk }i<jk of the corresponding free group. We can obtain wk from wk by iteratively applying the (PR/ER)-relations: Given a word uvi i (suppose that the second subindex of ui is jk ), we can write vi = a1 · · · at ; then we conjugate ui by a1 using the (PR/ER)-relations, obtaining an element which can be written as a word whose letters have second index equal jk . Next we conjugate this word by a2 , using the relations again (taking into account that conjugating a product by a2 is the same as conjugating each factor by a2 ). And so on. At the end, uvi i is transformed into a word in which the second index of every letter is jk . After repeating this process with every word in wk and applying free reduction, one obtains wk . This last step of braid combing is the exponential one! It can produce a word wk which is exponentially long with respect to m (we will show such an example in Lemma 3.6). For this reason, in Section 5 we introduce a method based on straight line programs to avoid this last step of braid combing, and to solve the word problem for braids on surfaces with boundary in polynomial time. 3.1 Braid combing is exponential In this section we provide an example to show that braid combing is, in general, an exponential procedure. That is, we present a family of pure braids βm , m ≥ 1, where each βm can be expressed as a word whose length is linear in m, but whose combed expression is a word of exponential length with respect to m. This 7 implies that there is no hope to produce an efficient algorithm to comb braids, if one wishes to express combed braids as words in usual braid generators. The example will be given in P4 , the pure braid group with 4 strands on the disc D2 , with generators −1 −1 · · · σj−1 , for 1 ≤ i < j ≤ 4. As P4 embeds in Pn (S) for n ≥ 5 (where S is an Ai,j = σj−1 σj−2 · · · σi+1 σi2 σi+1 orientable surface, or n ≥ 4 if S has genus g > 0) by an embedding which sends generators to generators (of the presentations defined in Section 2), it follows that, in general, braid combing is exponential in surface braid groups. Given m ≥ 1, define: βm = A−1 1,2 A2,3 −m A3,4 A−1 1,2 A2,3 m ∈ P4 . The length of the given word representing βm is 4m + 1, so it is linear in m. We can then show the following: Lemma 3.6. With the above notation, the combed normal form of βm is a reduced word in A1,4 , A2,4 , A3,4 and their inverses, whose length is exponential in m. Proof. We consider the inner automorphism φ of P4 which consists of conjugating by A−1 1,2 A2,3 . Then βm = φm (A3,4 ). Using the short exact sequences explained in the previous section, we see that φ induces an automorphism on the free group generated by A1,4 , A2,4 , A3,4 , so βm can be written as a word on these letters and their inverses. The fact that βm is exponentially long when written as a reduced word in A1,4 , A2,4 , A3,4 and their inverses, can be deduced from the fact that A−1 1,2 A2,3 is a pseudo-Anosov braid in P3 . However, since we want to make this example as explicit as possible, we will provide an algebraic proof. To simplify the notation, let us denote ai = Ai,4 for i = 1, 2, 3. From the presentation of P4 , one can check the following: −1 −1 −1 −1 φ(a1 ) = a2 a3 a−1 2 a3 a2 a1 a2 a3 a2 a3 a2 −1 −1 −1 −1 −1 −1 −1 φ(a2 ) = a2 a3 a2 a3 a2 a1 a2 a3 a2 a−1 3 a2 a1 a2 a3 a2 a3 a2 −1 φ(a3 ) = a2 a3 a2 Let us consider the following three words: x = a1 , y = a2 a3 a−1 2 and w = a1 a2 a3 . Then we can write: φ(a1 ) = yw−1 xwy −1 φ(a2 ) = yw−1 x−1 wy −1 wy −1 φ(a3 ) = y Suppose that we can decompose a braid in the following way: α = z1 we1 z2 we2 · · · zt−1 wet−1 zt , where zi ∈ {x, y, x−1 , y −1 } and ei ∈ {1, −1} for i = 1, . . . , t − 1. This expression of α is not necessarily reduced when written in terms of {a±1 i }, but the cancellations are only restricted to subwords of the form x−1 w or w−1 x, and in these cases only two letters cancel, and no further cancellation is produced. Therefore, the length of the reduced word α in {a±1 i } associated to α, is at least 2t − 1. If we moreover assume that z1 = y, then the length of α is greater than 2t. In this case, we say that α admits a xyz-decomposition of length t. We point out that φ(w) = w. This follows from the fact that w = a1 a2 a3 = σ3 σ2 σ1 σ1 σ2 σ3 commutes with A1,2 = σ12 and A2,3 = σ22 . Finally, we conclude the proof by showing that βm admits a xyz-decomposition of length t ≥ 3m−1 . We proceed by induction on m. First, we check that β1 = φ(a3 ) = y, so the claim holds in the case m = 1. Now suppose the claim is true for some m ≥ 1, so βm = z1 we1 z2 we2 · · · zt−1 wet−1 zt for some t ≥ 3m−1 . Then we have βm+1 = φ(βm ) = φ(z1 )we1 φ(z2 )we2 · · · φ(zt−1 )wet−1 φ(zt ). 8 Finally, since φ(x) = yw−1 xwy −1 , and φ(y) = yw−1 x−1 wy −1 wyw−1 yw−1 xwy −1 , it follows that βm+1 admits a xyz-decomposition, whose length is at least 3t, thus greater than 3m . 4 Straight line programs We have seen that combing a braid α consists of decomposing it as a product α1 α2 · · · αn in a suitable way. We have also seen that, in general, if α is given as a word of length m, the length of a factor αi may be exponential in m. So, how could we make this procedure to have polynomial complexity? The answer is: We will not describe each αi as a word in the generators of the corresponding free group. Instead, we will describe each αi as a compressed word (also called straight line program). The concept of straight line program is well known in Complexity Theory [5], and has been used in Combinatorial Group Theory to reduce the complexity of decision problems [19]. In this section we review the main aspects related to straight line programs, which we will call compressed words, following [19]. Roughly speaking, a compressed word A consists on two disjoint finite sets of symbols F and A (the latter is ordered), called terminal and non-terminal alphabets respectively, together with a set of production rules indicating how to rewrite each non-terminal character in A as a word in F and smaller characters of A. In this way, the biggest non-terminal character can be rewritten, using the production rules, as a word in F that we denote ev(A) (the evaluation of A, or the decompressed word). So A can be seen as a small set of instructions on how to produce a long word ev(A) in F. Here is the rigorous definition: Definition 4.1. A compressed word (or straight line program) A consists on a finite alphabet F of terminal characters together with an ordered finite set of (non-terminal) symbols A = {A1 , . . . , An }, and a set of production rules P = {Ai → Wi }1≤i≤n allowing to replace each non-terminal Ai ∈ A with its production: a (possibly empty) word Wi ∈ (F ∪ A)∗ , where every non-terminal Aj appearing in Wi has index j < i. The greatest non-terminal character in A, An ∈ A, is called the root. The evaluation of the compressed word A, ev(A), is the (decompressed) word in F obtained by replacing successively every non-terminal symbol with the right-hand side of its production rule, starting from the root. P We define the size of a compressed word A as |A| = i |Wi |. We can assume that |A| ≥ #(F) (if a terminal character appears in no production rule, we can remove it from F as it will not appear in ev(A)). We can also assume that |A| ≥ #(A) (if a production rule transforms a non-terminal symbol into the empty word, we can remove every appearance of the non-terminal symbol from the whole compressed word). Therefore, the space needed to store A is at most 2|A|, and this is the reason why |A| is called “the size of A”. Example 4.2. Given n ≥ 1, consider the following compressed word: * F = {a} + A = {A1 , . . . , An } An := . P = {Ai → Ai−1 Ai−2 }ni=3 ∪ {A2 → a} ∪ {A1 → b} The sequence of compressed words {An }n≥1 encodes the sequence of Fibonacci words. The first seven decompressed words ev(A1 ), . . . , ev(A7 ) are, respectively: b, a, ab, aba, abaab, abaababa, abaababaabaab. We see that every word is the concatenation of the two previous ones. Notice that |An | = 2n − 2, while |ev(An )| = Fn , the n-th Fibonacci number. So, in this example, the sizes of compressed words grow linearly in n, while the sizes of decompressed words grow exponentially. 9 Two compressed words A and B are said to be equivalent if ev(A) = ev(B). A crucial property is that a pair of compressed words can be compared without being decompressed: Theorem 4.3. [18] Given two compressed words A and B, there is a polynomial time algorithm in |A| and |B| which decides whether or not ev(A) = ev(B). Now recall that we want to use compressed words to describe the factors α1 · · · αn of a combed braid. The leftmost factor α1 does not need to be compressed, as it can be expressed as a subsequence of the original word. Each of the other factors, α2 , . . . , αn , belongs to a free group. So we would like to compress words representing elements of a free group. In order for this procedure to be useful (for instance, to solve the word problem in braid groups), we need to be able to compare two compressed combed braids. This means that we need to determine whether two compressed words (A and B) evaluate to words (ev(A) and ev(B)) which represent the same element in a free group. That is, we want to compare the uncompressed words not just as words, but as elements in a free group. Fortunately, this problem has already been satisfactory solved: Theorem 4.4. [16] Given a compressed word A, there exists a polynomial time algorithm producing a compressed word Ared such that ev(Ared ) is the free reduction of ev(A). As a consequence, if we have two compressed words A and B, we can compute Ared and Bred in polynomial time, and then we can check in polynomial time whether ev(Ared ) and ev(Bred ) are the same word (Theorem 4.3). Hence, the compressed word problem in a free group is solvable in polynomial time. We will therefore be able to use compressed words to perform braid combing, and to compare combed braids, in polynomial time. We now proceed to describe how to compress the words appearing in the process of braid combing. 5 Compressed braid combing Throughout this section, S will be a compact, connected orientable surface with p > 0 boundary components. The arguments in this section can also be applied in a straightforward way if S is non-orientable, just by using the appropriate presentations. Recall that the combing algorithm for a braid α ∈ Pn (S) starts with a word w = u1 · · · um representing α, where uk = A±1 i,j for k = 1, . . . , m, and produces n words, w1 , . . . , wn , representing the factors α1 , . . . , αn of the combed normal form of α. Each wk is a reduced word formed by letters whose second subindex is jk . Moreover, we gave a procedure to compute short words w1 , . . . , wn representing the factors α1 , . . . , αn of the combed normal form of α in polynomial time, only that the second index of a letter in wk is not necessarily jk . In some sense wk is a compressed expression of wk . Notice that the word w1 is actually equal to w1 , and its length is at most m, so we do not need to use compression for this first factor. Let us study the other cases. In this section we will see how, starting from wk , one can define a compressed word Ak (a straight line program) such that wk is the free reduction of ev(Ak ). Moreover, the size of Ak will be of order O((g+p+n)m). This will allow us to determine and compare the factors of the combed normal forms of braids in Pn (S), without needing to evaluate them, so it solves the word problem in Pn (S) in polynomial time. v v Let k ∈ {2, . . . , n}, and recall that wk = ui1i1 · · · uitit , where each uir belongs to {A±1 i,jk }i<jk , and each vir is ±1 a word formed by letters from {Ai,js }i<js <jk . Recall also that, by construction, each vir is a suffix of vi1 . Also, t ≤ m and the length of vi1 is smaller than m (where m is the length of w). 10 By Lemma 3.4, we can obtain in time O(m) a subsequence vi1 of w and a sequence of pairs of integers (c1 , d1 ), . . . , (ct , dt ) which encode wk . We want to define a compressed word Ak representing αk , so the terminal alphabet will consist of the generators of Pn (S) corresponding to the motion of the point pk , that is, {A±1 i,jk }i<jk . To be consistent with the forthcoming notation, we will denote Xi,0 = Ai,jk and X−i,0 = A−1 , for i = 1, . . . , jk −1. So the terminal i,jk alphabet of Ak becomes Fk = {Xi,0 }0<|i|<jk . On the other hand, the non-terminal symbols of Ak will consist of a single symbol Xk (the root), plus a symbol corresponding to uv for each u ∈ Fk and each nontrivial suffix v of vi1 . We know that the word uv can be determined by a pair of integers (c, d), where u = Xc,0 and v is the suffix of vi1 of length d. Hence, the set of nonterminal symbols is Ak = {Xc,d } 0<|c|<jk ∪ {Xk }. 0<d≤|vi | 1 We order the elements of Ak (distinct form Xk ) according to their second subindex and, in case of equality, according to their first subindex. Xk is the biggest element, being the root. The first production rule of Ak will be Xk → Xc1 ,d1 · · · Xct ,dt . Now let Xc,d be a non-terminal symbol corresponding to a word uv , let a1 be the first letter of v, and write 0 v = a1 v 0 , so uv = (ua1 )v . We know, from the relations in Theorem 2.1 and Remark 2.4, that the braid a1 represented by u can be written as b1 · · · bs , where each bi ∈ Fk and s ≤ 9. Therefore, the braid represented 0 0 by uv can be written as bv1 · · · bvs , which we can encode as Xe1 ,d−1 · · · Xes ,d−1 for some integers e1 , . . . , es . We thus add the following production rule to Ak : Xc,d → Xe1 ,d−1 · · · Xes ,d−1 . Adding these production rules for all non-terminal symbol Xc,d (d > 0) determines the compressed word Ak . Proposition 5.1. The size of Ak is smaller than 19(2g + p + n)m, and the evaluation ev(Ak ) represents αk . Proof. The first production rule of Ak has length t ≤ m. The length of the other production rules is at most 9, and there are as many as elements in Ak \{Xk }, that is, 2(jk − 1)|vi−1 | = 2(2g + p + k − 2)|vi−1 | < 2(2g + p + n)(m − 1). Hence |Ak | ≤ m + 18(2g + p + n)(m − 1) < 19(2g + p + n)m. By induction on d (starting with d = 0), we see that each Xc,d evaluates to a word which represents the same braid as uv (where uv is the word corresponding to the symbol Xc,d ). Hence, the evaluation of Xk is a word v v in Fk which represents the same braid as ui1i1 · · · uitit , that is, αk . Theorem 5.2. Let S be a connected surface of genus g ≥ 0 with p > 0 boundary components. Let α ∈ Pn (S) be a braid given as a word w of length m in the generators {A±1 i,j }i<j . Then, for every k = 1, . . . , n, there is an algorithm of complexity O((g +p+n)m) which produces a compressed word Ak of size at most 19(2g +p+n)m and terminal characters {A±1 i,jk }i<jk , whose evaluation represents αk , the k-th factor of the combed normal form of α. Proof. This results follows from Lemma 3.4 and Proposition 5.1, taking into account that computing the production rule corresponding to each uv just requires transcribing the relation in Theorem 2.1 and Remark 2.4 corresponding to u and to the first letter of v, so the complexity of the whole algorithm is proportional to the size of Ak . Example 5.3. Consider the word w = A1,4 A1,3 A−1 2,4 A1,2 ∈ P4 . If we set k = 4, we have i1 = 1 and A vi1 = A1,3 A1,2 which has length 2. The word w4 , which is equal to A141,3 X1,2 X−2,1 . The production rules for A4 are: X4 → X1,2 X−2,1 11 A1,2 A1,2 (A−1 , can be codified as 2,4 ) X1,2 → X1,1 X3,1 X1,1 X−3,1 X−1,1 X−2,1 → X1,0 X−2,0 X−1,0 X1,1 → X1,0 X2,0 X1,0 X−2,0 X−1,0 X3,1 → X3,0 X−1,1 → X1,0 X2,0 X−1,0 X−2,0 X−1,0 X−3,1 → X−3,0 The word ev(A4 ) is X1,0 X2,0 X1,0 X−2,0 X−1,0 X3,0 X1,0 X2,0 X1,0 X−2,0 X−1,0 X−3,0 X1,0 X2,0 X−1,0 X−2,0 X−1,0 , corresponding to −1 −1 −1 −1 −1 −1 −1 A1,4 A2,4 A1,4 A−1 2,4 A1,4 A3,4 A1,4 A2,4 A1,4 A2,4 A1,4 A3,4 A1,4 A2,4 A1,4 A2,4 A1,4 . Recall that the compressed braid combing explained throughout this section can be applied to the case when S is a non-orientable surface with p > 0 boundary components (one just needs to modify the production rules so they encode the appropiate relations given in [11, Theorem 3] instead of the (P R/ER)-relations). Since the length of each of those relations is at most 9, the bounds given in Proposition 5.1 and Theorem 5.2 also hold for the non-orientable case. Corollary 5.4 (Word problem). Let S be a compact, connected surface of genus g with p > 0 boundary components. There exists an algorithm which, given two pure braids α1 , α2 ∈ Pn (S) represented by words w1 , w2 of respective lengths m1 , m2 in the generators of Theorem 2.1, determines whether α1 = α2 in polynomial time and space with respect to g, p, m1 and m2 . Proof. The algorithm just applies compressed braid combing to w1 and w2 , then transforms each compressed factor into a reduced compressed factor (Theorem 4.4), and then compares the reduced compressed factors to see whether they evaluate to the same reduced word (Theorem 4.3). All these steps can be done in polynomial time, as we have explained. 6 Braid combing on a closed surface Throughout this section, assume that S is a closed surface (compact, connected without boundary). In this case we cannot apply braid combing as in the previous section, since the exact sequence (1) splits if and only if either S is the sphere, the torus or the Klein bottle, or if S is the projective plane with n = 3 and m = 2, or if S is a surface of bigger genus and m = 1 [13]. Moreover, π1 (S) is no longer a free group, if S is not the sphere. One can nevertheless decompose Pn (S) by using another instance of Sequence (1), the one in which m = 1: in,1 pn,1 1 → Pn−1 (S\{p1 }) −→ Pn (S) −→ π1 (S) → 1. (4) This sequence is exact if S is not the sphere or the projective plane, so we will exclude those two cases. In all other cases, the sequence splits [9, 13]. Since we are assuming that S has no boundary, we will use the generators of Pn (S) defined in Theorem 2.5. One can then decompose Pn (S) = π1 (S) n Pn−1 (S \ {p1 }). Then S \ {p1 } can be treated as a surface with boundary, so Pn−1 (S \ {p1 }) can be decomposed as a semi-direct product of free groups. In the case in which S is orientable with genus g > 0 we obtain a decomposition: Pn (S) = π1 (S) n ((· · · ((F2g n F2g+1 ) n F2g+2 ) n · · · F2g+n−3 ) n F2g+n−2 ). 12 Combing a braid in Pn (S), when S is a closed orientable surface distinct from S2 , means to find its normal form with respect to this group decomposition. It is clear that, in order give an algorithm for braid combing, one needs to describe an explicit group section for the projection pn,1 . Notice that the generators of π1 (S), say a1 , . . . , a2g , are naturally associated to A1,j1 , A2,j1 . . . , A2g,j1 , where j1 = 2g + 1. But (contrary to the case with boundary) the map which sends ai to Ai,j1 is not a group homomorphism: a section for pn,1 must be defined otherwise. In [9], such a section is defined topologically, by using a retraction of the surface S, and allowing the distinguished points p2 , . . . , pn , to move along the retraction as the point p1 performs the movement corresponding to some ai . In [9], this map from π1 (S) to Pn (S) is only described algebraically in the case of an orientable surface of genus 2. We will now define a different group section, simpler than the one defined in [9] (although related to it), which will be explicitly given in terms of the generators of Pn (S). The generators of Pn (S) are described in Figure 2. These are analogous to the generators described in Figure 1, the only differences being that S has no boundary (hence the second indices of the generators are shifted), and that we have placed the base points p1 , . . . , pn in a different place to simplify the forthcoming figures. Figure 2: A geometric representation of the generators of Pn (S) when S is closed. Let us define, for k = 1, . . . , n, the braid Bk = A2g,jk Aj1 ,jk Aj2 ,jk · · · Ajk−1 ,jk , where jt = 2g+t for t = 1, . . . , n. See Figure 3 for a picture of Bk as a product of generators (a), and also in a simpler geometric way (b). Figure 3: The braid Bk = A2g,jk Aj1 ,jk Aj2 ,jk · · · Ajk−1 ,jk . Using the geometric representation of the braid Bk given in Figure 3, it is clear that Bi and Bj commute, for every 1 ≤ i, j ≤ n. We will be particularly interested in the braid B1 B2 · · · Bn which can be seen in Figure 4. In Figure 5 we can see the braid (B1 B2 · · · Bn )−1 A2g,j1 (B1 B2 · · · Bn )A−1 2g,j1 in picture (a), which is smoothly transformed into the braid in picture (d). It is a classical exercise to see how to express the path in picture (d) as a product of generators of the fundamental group of S. In our case, this allows to express that braid as a product of the generators of Pn (S), as follows: −1 −1 (B1 B2 · · · Bn )−1 A2g,j1 (B1 B2 · · · Bn )A−1 2g,j1 = [A1,j1 , A2,j1 ] · · · [A2g−3,j1 , A2g−2 ]. It follows that, in Pn (S), one has −1 [(B1 B2 · · · Bn )−1 , A2g,j1 ][A−1 2g−2 , A2g−3,j1 ] · · · [A2,j1 , A1,j1 ] = 1. 13 Figure 4: The braid B1 B2 · · · Bn . Figure 5: The braid (B1 B2 · · · Bn )−1 A2g,j1 (B1 B2 · · · Bn )A−1 2g,j1 . Now recall that the fundamental group of S has the following presentation: −1 −1 π1 (S) = a1 , . . . , a2g ; [a−1 2g , a2g−1 ][a2g−1 , a2g−2 ] · · · [a2 , a1 ] = 1 , where ai = pn,1 (Ai,j1 ) for i = 1, . . . , 2g. If we notice that pn,1 (B1 B2 · · · Bn ) = a2g , the following result is immediately obtained: Theorem 6.1. Let S be an orientable closed surface of genus g ≥ 1. The map s : π1 (S) → Pn (S) which sends ai to Ai,j1 for i = 1, . . . , 2g − 1, and a2g to B1 · · · Bn , is a group section of the projection pn,1 of the short exact sequence (4). Remark 6.2. To our knowledge, the above result gives the first known explicit algebraic section of pn,1 , when g > 2. Moreover, we can also give an explicit algebraic definition of the group section described geometrically in [9]: It is the map ρ : π1 (S) → Pn (S) such that ρ(ai ) = Ai,j1 when i is odd, and ρ(ai ) = Ai,j1 B2 · · · Bn when n is even. The proof that ρ is a group section is similar to the one we did for s. We used s instead of ρ as it is an algebraically simpler section. Now we can comb a braid in a closed orientable surface S with genus g > 0, using the above section (which allows to compute the normal form with respect to the decomposition Pn (S) = π1 (S) n Pn−1 (S\{p1 })), and then applying the combing procedure of Section 3 to the second factor, obtaining the normal form with respect to the decomposition: Pn (S) = π1 (S) n ((· · · ((F2g n F2g+1 ) n F2g+2 ) n · · · F2g+n−3 ) n F2g+n−2 ). There is one detail to be taken into account. When we decompose Pn (S) = π1 (S) n Pn−1 (S\{p1 }), the group Pn−1 (S\{p1 }) is considered as a subgroup of Pn (S) (formed by the braids in which the first strand is trivial). 14 In other words, the generators of this group are the braids of the form Ai,jk , where i ≤ jk = 2g + k and k > 1. But then we consider the group Pn−1 (S\{p1 }) as a braid group of a surface with boundary, S 0 , which is obtained by removing a small neighborhood of p1 . The generators of Pn−1 (S 0 ) are shown in Figure 1, where the only boundary component is placed on the right hand side of the picture. We can express any word in the generators of Pn−1 (S\{p1 }) as a word in the generators of Pn−1 (S 0 ) thanks to the isomorphism f : Pn−1 (S\{p1 }) → Pn−1 (S 0 ) defined as follows:  Ai,jk−1         h i h i −1 f (Ai,jk ) = A−1 , A · · · A , A 2g−1,jk−1 1,jk−1 2g,jk−1 2,jk−1         Ai−1,jk−1 if i ≤ 2g, k−2 Y t=1 Ajt ,jk−1 n−1 Y !−1 Ajk−1 ,jt if i = 2g + 1, t=k if 2g + 1 < i < jk . These formulae are obtained by interpreting the generators of Pn−1 (S\{p1 }) as points moving in the surface S 0 , in which the point p1 has been transformed into a boundary component (and moved to the right hand side, like in Figure 1). All interpretations are straightforward, except the generator A2g+1,jk = Aj1 ,jk . In Pn−1 (S\{p1 }), this generator corresponds to a movement of the puncture pk around the puncture p1 . In Pn−1 (S 0 ), however, there is no generator corresponding to a puncture moving around the last (and only) boundary of S 0 . We must then apply the relation (TR) of Theorem 2.5, to express Aj1 ,jk as a product of other generators, which are then mapped to Pn−1 (S 0 ) as expressed in the above equation. Once we have applied the map f , we can comb the resulting braid in Pn−1 (S 0 ) as it was explained in Section 3. Now we will explain why we cannot apply the techniques in Section 5 to comb a braid in a closed surface. The idea of combing, as it was done in Section 3, is to move to the left the generators with smaller second index, which act by conjugation on the generators with bigger second index. If the surface S has boundary, the action of a generator A±1 i,j on a generator Ar,s , produces a word in which all letters have second index s. Hence, the k-th final factor of the combed braid only depends on the letters of the original word having second index jk , and on the letters of bigger second subindex which act on them. This is why we can easily determine the compressed word associated to the k-th factor. If the surface S is closed, however, the action of a generator A±1 i,j on a generator Ar,s , does not necessarily produce a word in which all letters have second index s, due to the necessity of applying the map f . As an example, consider the relation (ER1) with j = j1 : −1 −1 A−1 r+1,j1 Ar,s Ar+1,j1 = Ar,s Ar+1,s Aj1 ,s Ar+1,s . All letters in the resulting word seem to have the same second subindex, but when we apply the map f to see the braid in Pn−1 (S 0 ), the letter A−1 j1 ,s must be replaced by a word whose letters have second subindex going from s − 1 to n − 1. This fact does not permit to obtain the factors of a combed braid as compressed words, as was done in Section 3. A different approach should therefore be used, in order to find a polynomial solution to the word problem of braid groups on closed surfaces. Nevertheless, the algebraic description of the section s in Theorem 6.1 allows to perform (non-compressed) braid combing in the classical way, as explained in this section. This was not possible before, due to the lack of an algebraically explicit section. This procedure of combing a braid in a closed surface is, however, exponential. References [1] E. Artin. Theory of braids. Ann. of Math. 48 (1947), no. 2, 101-126. [2] P. Bellingeri. On presentations of surface braid groups. J. Algebra 274 (2004), no. 2, 543-563. 15 [3] J. S. Birman. On braid groups. Comm. on Pure and applied Math. 22 (1969) 41-72. [4] J. S. Birman. Braids, links, and mapping class groups. Annals of Mathematics Studies, No. 82. Princeton University Press, 1974. [5] P. Bürgisser, M. Clausen, M.A. Shokrollahi. Algebraic Complexity Theory, Grundlehren der mathematischen Wissenschaften, vol. 315, Springer-Verlag (1997). [6] E. Fadell and J. Van Buskirk. The braid groups of E 2 and S 2 ’. Duke Math. J. 29 (1962) 243-258. [7] L. Gasieniec, M. Karpinski, W. Plandowski, and W. Rytter. Efficient algorithms for Lempel-Ziv encoding. Proc. 4th Scandinavian Workshop on Algorithm Theory (SWAT 1794), Lecture Notes in Comput. Sci. 1097, Springer-Verlag, Berlin 1996, 392-403. [8] R. Gillette and J. Van Buskirk. The word problem and consequences for the braid groups and mapping class groups of the 2-sphere. Trans. Amer. Math. Soc. 131 (1968), 277-296. [9] D. L. Gonçalves and J. Guaschi, On the structure of surface pure braid groups. J. Pure and Appl. Alg. 186 (2004), 187-218. [10] D. L. Gonçalves and J. Guaschi, The braid groups of the projective plane and the Fadell-Neuwirth short exact sequence. Geometriae Dedicata 130 (2007) 93-107. [11] D. L. Gonçalves and J. Guaschi, Braid groups of non-orientable surfaces and the Fadell-Neuwirth short exact sequence. J. Pure and Appl. Alg. 214 (2010), 667-677. [12] J. González-Meneses. New Presentations of Surface Braid Groups. J. Knot Theory Ramifications 10 (2001), no. 3, 431-451. [13] J. Guaschi and D. Juan-Pineda, A survey of surface braid groups and the lower algebraic K-theory of their group rings. Handbook of Group Actions - II, (Advanced Lectures in Mathematics, 32), 23-76, 2015. [14] P. de la Harpe. An invitation to Coxeter groups. Group Theory from a geometrical viewpoint. World Scientific Publishers, Singapore (1991). [15] A. Hatcher. Algebraic topology. Cambridge University Press, Cambridge, 2002. [16] M. Lohrey. Word problems on compressed words. In Automata, languages and programming, Lecture Notes in Comput. Sci. 3142. Springer-Verlag, Berlin 2004, 906-918. [17] R. C. Lyndon and P. E. Schupp. Combinatorial Group Theory. Springer-Verlag, 1977. [18] W. Plandowski, Testing equivalence of morphisms on context-free languages. In Algorithms ESA’94 (Utrecht), Lecture Notes in Comput. Sci. 855, Springer-Verlag, Berlin 1994, 460-470. [19] S. Schleimer. Polynomial-time word problems. Comment. Math. Helv. 83 (2008), 741-765. [20] G. P. Scott. Braid groups and the group of homeomorphisms of a surface. Proc. Camb. Phil. Soc. 68 (1970) 605-617. Juan González-Meneses Dpto. Álgebra Facultad de Matemáticas Instituto de Matemáticas (IMUS) Universidad de Sevilla Avda. Reina Mercedes s/n 41012 Sevilla (SPAIN) [email protected] Marithania Silvero Institute of Mathematics Polish Academy of Sciences ul. Śniadeckich, 8 00-656 Warsaw (POLAND) [email protected] 16
4math.GR
Asphericity of groups defined by graphs Vadim Bereznyuk A graph Γ labelled by a set S defines a group G(Γ) whose generators are the set of labels S and whose relations are all words which can be read on closed paths of this graph. We introduce the notion of aspherical graph and prove that such a graph defines an aspherical group presentation. This result generalizes arXiv:1711.05293v1 [math.GR] 14 Nov 2017 a theorem of Dominik Gruber on graphs satisfying graphical C(6)-condition. 1 Introduction Every group can be defined by a set of generators and a set of relations among these generators. The latter set can be excessive: there can be some non-trivial identities among its elements. For example, in a group ha, b, c | ab−1 , bc−1 , ac−1 i a relation ac−1 can be written as ab−1 bc−1 . Roughly speaking, a presentation is called aspherical if all identities among its relations are trivial. It can be formalized in various ways, so there are quite a few different definitions of asphericity (see, for example, [2]). It is well known that asphericity follows from the classical small cancellation conditions. In 2003 Mikhail Gromov briefly introduced a graphical analogue of small cancellation theory in his paper [5]. After that Yann Ollivier gave a combinatorial proof of a theorem of Gromov, which in particular states asphericity of groups defined by graphs satisfying graphical C ′ (1/6)condition [6]. In 2015 Dominik Gruber proved asphericity of groups defined by graphs satisfying graphical C(6)-condition [4]. We introduce a notion of aspherical graph and prove that such a graph defines an aspherical group. It is easy to show that a graph satisfying graphical C(6)-condition is aspherical. Thus our result generalizes Gruber’s theorem. Classical small cancellation theory operates with presentations where every two distinct relations have quite short common parts. In graphical small cancellation theory, a group is defined by a labelled graph. The set of generators is the set of labels and the set of relations is the set of all words which can be read on closed paths of the graph. Thus every relation corresponds to a closed path where this relation can be read. Unlike classical case, two distinct relations can have a long common part, but only if this common part originates from the graph. It means that paths of the graph corresponding to these relations have the same common part as relations themselves. Recall that a reduction pair in a diagram is a pair of distinct faces of the diagram such that their boundary cycles share a common edge and such that their boundary cycles, read starting from that edge, clockwise for one of the faces and counter-clockwise for the other, are equal as words. A spherical diagram is reduced if there are no reduction pairs. If there exists no reduced spherical diagram over a presentation, then the presentation is called diagrammaticaly aspherical. It is well known that presentations satisfying classical small cancellation conditions are diagrammaticaly aspherical. In graphical case, we call a pair of faces a graphical reduction pair if these faces share an edge originating from the graph. A spherical diagram is graphically reduced if there exists no graphical reduction pair in this diagram. If there exists no graphically reduced diagram over a presentation whose set of relations is the set of labels of all simple closed paths of the graph, then we call this graph aspherical. It is easy to show that asphericity of a graph follows from the graphical small cancellation C(6)-condition. It turns out that asphericity of a graph implies topological asphericity of the corresponding group. This is the main result of this paper. 1 Note that, when we define a group by a graph, we can restrict the set of relations to the set of labels of all simple closed paths. It does not change the group. This set of relations can be reduced further. We can choose an arbitrary basis of the fundamental group of the graph. Then the set of relations will be the set of cyclically reduced paths of that basis. Again it does not change the group. The obtained presentation is topologically aspherical if the graph is aspherical. The paper begins with a brief introduction to theory of groups defined by graphs. In Section 1.2 the main result is formulated and in Section 1.3 the proof is outlined. In Section 2 we give exact definitions of main notions. Section 3 is devoted to the link between identities among relations of a presentation and spherical diagrams over this presentation. The full proof of the main theorem can be found in Section 4. In Section 5 we show that our result generalizes Gruber’s theorem. The author thanks Anton Klyachko for many useful conversations and remarks. 1.1 Groups defined by graphs and graphical small cancellation conditions Let Γ be an oriented graph every edge of which is labelled by an element of a finite set S. Let p be a path in the graph Γ. If we go along this path then we can read a word ℓ(p) in the alphabet S ⊔ S −1 . Each edge of the path gives a letter which equals to its label if we traverse the edge in its direction and equals to its label with exponent −1 if we traverse the edge in the opposite direction. The word ℓ(p) is called the label of the path p. Let Rc be a set of labels of all closed paths in Γ, Rs be a set of labels of all simple closed paths in Γ and Rf be a set of cyclically reduced labels of paths which generate a basis of a fundamental group of each connected component of the graph Γ (note that Rc and Rs are determined by the graph Γ itself while Rf depends on the chosen basis of the fundamental group of Γ). Then a group G(Γ) are defined by one of the three following presentations: hS | Rc i, hS | Rs i or hS | Rf i. Clearly, all these presentations define the same group. a b b c b c Fig. 1: G(Γ) ∼ = ha, b, c | bbc, c−1 bc−1 , b−1 a−1 b−1 i Definition 1. A lift of a word w in the graph Γ is such a path p̄ in the graph that ℓ(p̄) ≡ w (i.e., the label of the path p̄ coincides with the word w character by character). Definition 2. A word w is a piece (with respect to Γ) if it has two (or more) distinct lifts in the graph Γ. Definition 3. Let p be a path in a graph labelled by a set S. A lift of the path p in the graph Γ is such a path p̄ in the graph that ℓ(p̄) ≡ ℓ(p) (i.e., the label of the path p coincides with the label of the path p̄ character by character). Definition 4. Let p be a path in a graph labelled by a set S. The path p is a piece (with respect to Γ) if it has two (or more) distinct lifts in the graph Γ. 2 b D Γ b a b b a b a c b c b c b c b a Fig. 2: A graph Γ and a diagram D over ha, b, c | Rs i. Dotted edges originate from the graph. If no edge occurs more than once in p, then the lift p̄ of p induces a unique lift for every subpath q of p. We call such a lift the lift of q to Γ via p → p̄. Everywhere further it will be clear about which graph Γ we talk, so we will call words and paths just “pieces”, not “pieces with respect to Γ”. Similarly it will be clear about which lift of p we talk, so we will just say “lift via p”, not “lift via p → p̄”. Consider an example. Let Γ be a graph as in Figure 1. Then the words b, b−1 , c and c−1 are all pieces of lengths 1. The words a and a−1 are not pieces. The words bb and (bb)−1 are all pieces among reduced words of length 2. A labelling of a graph Γ is reduced if any two distinct edges starting at the same vertex have distinct labels and any two distinct edges ending at the same vertex have distinct labels. Definition 5. Let Γ be a labelled graph and let k ∈ N. We say Γ satisfies graphical C(k)condition (or Γ is a C(k)-graph) if: • the labelling of Γ is reduced and • no simple closed path is a concatenation of stricly fewer than k pieces. A graph as in Figure 1 satisfies graphical C(2)-condition, but does not satisfy graphical C(3)-condition because the simple closed path with the label bbc is a concatenation of the pieces bb and c. Henceforth we assume that a graph Γ satisfies graphical C(2)-condition. It implies that the graph Γ has a reduced labelling and that any word from Rs has only one lift in this graph. Let D be a diagram over the presentation hS | Rs i (see the next section for definitions). Let p be a path consisted of internal edges of D and lying between faces Π1 and Π2 . A word from Rs is written on the boundary of any face of D. Thus the boundary of any face has a lift in the graph Γ. This lift is unique due to the above remark. Lift the boundary of the face Π1 in the graph. After that the path p, as subpath of the boundary, maps to some path p1 in the graph. Similarly lift the boundary of the face Π2 and determine a path p2 . We say that the path p originates from the graph Γ if p1 = p2 . Roughly speaking, a path p originates from the graph Γ if faces Π1 and Π2 share the same path in the diagram and in the graph Γ itself. Note that if a path p, lying between faces Π1 and Π2 , does not originate from the graph Γ then it is a piece. Indeed, if p does not originate from the graph then its lifts via Π1 and via Π2 are distinct. Therefore this path have two distinct lifts in the graph Γ, i.e., this path is a piece. 1.2 Main result Recall that a presentation complex K(S; R) of a presentation hS | Ri is a 2-complex which has a 1-skeleton which consists of a single vertex and a loop labelled by s for every element s 3 from S, and which have a face with the boundary label r attached to the 1-skeleton for every element r from R. Definition 6. A presentation hS | Ri is called aspherical if its presentation complex K(S; R) is aspherical, i.e., πq (K(S; R)) = 0 for all q ≥ 2. Definition 7. We say that a diagram D over the presentation hS | Rs i is graphically reduced if it does not have edges originating from the graph Γ. Definition 8. We say that a graph Γ is aspherical if it satisfies graphical C(2)-condition and there exists no graphically reduced spherical diagram over the presentation hS | Rs i. The following theorem is the main result of this paper. Theorem. If a graph Γ is aspherical, then the presentation hS | Rf i is aspherical. 1.3 Idea of proof Propositions 1.3 and 1.5 of the paper [2] implies that a presentation hS | Ri, where all relations from R are not empty and freely reduced, is aspherical if and only if the presentation is concise, no relation is a proper power and any identity among relations of this presentation is trivial. Recall that a presentation hS | Ri is concise if for any two distinct relations r and r′ from R nor r, neither r−1 is conjugate to r′ . Also recall a notion of identity among relations of a presentation hS | Ri. Assume we are given a sequence π = (p1 , . . . , pn ) such that pi = ui riǫi u−1 i , where ri ∈ R, ui ∈ F (S) and ǫi ∈ {+1, −1}. It is called an identity if a product of its elements is equal to the identity element of the free group, i.e., p1 · · · pn = 1 in F (s). There are identities which we should consider as trivial. For this reason Peiffer transformations are introduced: 1. Replace any pair of consecutive elements (pi , pi+1 ), either by the pair (pi pi+1 p−1 i , pi ) or by the pair (pi+1 , p−1 p p ). i i+1 i+1 2. Delete the pair of consecutive elements (pi , pi+1 ) if pi pi+1 = 1 in F (S). 3. Insert at any place a pair of inverse elements (p, p−1 ). An identity is called trivial if it can be transformed to an empty identity by the finite number of Peiffer transformation. Lemma 2.22 of the paper [4] guarantees the first two conditions: conciseness of a presentation and absence of proper powers. Thus we only should show that any identity among relations is trivial. To prove this fact we use a link between identities among relations of a presentation and spherical diagrams over this presentation which was obtained in [3]. A plan of the proof is the following. Assume the contrary, that there exists non-trivial identities over the presentation hS | Rf i or, equivalently, that there exists non-trivial spherical diagrams over the presentation hS | Rf i. Consider a part of an 1-skeleton of a spherical diagram which consists of all edges not originating from a graph Γ. We call such a part a not originating skeleton. Consider a non-trivial spherical diagram with the smallest not originating skeleton. Delete all edges originating from the graph from this diagramm. It turns out that the obtained diagram is a diagram over the presentation hS | Rs i. Moreover, it is graphically reduced because we deleted all originating edges. A contradiction with asphericity of the graph Γ. 2 Main notions Definitions of graphs and diagrams are given in this section. 4 2.1 Graphs We use a definition of graph according to [1], i.e., a graph is a union of two sets V and E with three maps α : E → V , ω : E → V , ·−1 : E → E. The elements of V is called vertices and the elements of E is calles edges. If e ∈ E then α(e) is called the initial point and ω(e) the terminal point. The map ·−1 assigns to every edge its inverse. For convenience we write ·−1 (e) as e−1 . The map ·−1 should be an involution without fixed elements such as α(e−1 ) = ω(e) and ω(e−1 ) = α(e). In fact, it is a definition of undirected graph, because for every edge e graph also contains e−1 . −1 A labelling of a graph Γ by a set S is such a map ℓ : E → S ⊔ S −1 that ℓ(e−1 ) = ℓ(e) . A labelled graph is a graph with its labelling. One can think of a labbeled graph as an oriented graph every edge of which labelled by an element of S. A labelling of a graph Γ is reduced if any two distinct edges starting at the same vertex have distinct labels and any two distinct edges ending at the same vertex have distinct labels. Continue the map ℓ to a set of all paths in the graph Γ. Let p = (e1 , . . . , en ) be a path in the graph, then put ℓ(p) = ℓ(e1 ) · · · ℓ(en ), where w1 ·w2 is concatenation. Thus ℓ(p) is a word over an alphabet S ⊔ S −1 (not necessarily reduced). We call ℓ(p) as the label of the path p. Let p = (e1 , . . . , en ) be a path in a graph. The path p is reduced if it contains no subpaths (e, e−1 ). The path is trivial if it becomes empty after consecutive deletion of all subpaths (e, e−1 ). The path is closed if its initial point coincides with its terminal point or if it is empty. The path is simple if it is not empty and it does not contain non-empty closed subpaths. The path p is simple closed if it is not trivial, is closed and no proper subpaths of p is closed. An edge e is a spure if degree of at least one of its vetices is equal to 1. 2.2 Diagrams over graphs Let R be a set of relations, then we define Rsym as the set obtained from the sets R and R−1 by considering all its elements up to cyclic shifts. A singular disk diagram in the alphabet S is a finite and simply connected 2-dimensional CW-complex embedded into R2 such that its 1-skeleton is a graph labelled by the set S. The closures of its 1-cells and 2-cells are called edges and faces, respectively. The label of a face is a cyclic word obtained by reading its boundary path in a counterclockwise direction. A singular disk diagram over a presentation hS | Ri is a singular disk diagram in the alphabet S every face of which has a label from Rsym . A simple disk diagram is a singular disk diagram homeomorphic to a disk. We introduce spherical diagrams following [3]. First we inductively define a sphercial complex. A 2-sphere is a spherical complex. If D is a spherical complex, then D′ obtained by attaching a simple curve or a 2-sphere to a point of D is also a spherical complex. A spherical complex is a complex which can be obtained from a 2-sphere by the finite number of such attachments. In other words, a spherical complex is a tree embedded into R3 some vertices of which (at least one) are replaced by spheres or by some number of spheres attached to each other. A spherical diagram over a presentation hS | Ri is a 2-dimensional CW-complex homeomorphic to some spherical complex, such that its 1-skeleton is a graph labelled by the set S and such that the labels of all its faces lie in Rsym . A simple spherical diagram is a spherical diagram homeomorphic to a sphere We will denote the set of positively oriented (i.e., obtained by reading the boundary in a counterclockwise direction) boundary paths of a face Π as ∂Π+ , and the set of negatively oriented as ∂Π− . It is clear that ∂Π− = {γ −1 : γ ∈ ∂Π+ }. If P and Q are two sets of paths then P ∩ Q = {r : ∃p ∈ P, ∃q ∈ Q such as p = rp′ , q = rq ′ }. We can consider a lift of ∂Π+ or ∂Π− in the graph Γ as a lift of an arbitrary path from this set. Then a lift of any else path from this set can be obtained as a cyclic shift of the known lift. Definition 9. Let D be a diagram over the presentation hS | Rc i. Let Π1 and Π2 be two 5 − faces of D (not necessary distinct) and let p ∈ ∂Π+ 1 ∩ ∂Π2 . We say that the path p originates + + from the graph Γ if there exists such lifts of ∂Π1 and ∂Π− 2 in Γ, that a lift of p in Γ via ∂Π1 − and via ∂Π2 are equal. Note again that if the graph Γ satisfies graphical C(2)-condition then lifts of ∂Π+ 1 and ∂Π− 2 are unique. 3 Identities and spherical diagrams For any identity π = (p1 , . . . , pn ) over a presentation hS | Ri we can construct a spherical diagram over the same presentation by the so-called van Kampen construction. First, fix draw a face with a spur such a point v on the plane. After that for each pi = ui riεi u−1 i that the spur starts at v, the label of the spur is ui and the label of the face is riεi . Then the boundary label of the obtained diagram is equal to the word p1 · · · pn . So this boundary label is trivial because π is an identity. It means that there exists 2 consecutive edges with opposite labels on the boundary. Glue these edges together. We obtain again a diagram with a trivial boundary label but with the smaller boundary size. Consecutively gluing pairs of edges with opposite labels we finally obtain a spherical diagram D which is called a diagram for π (see [3, Section 1.5] for details). This procedure can be reversed. By “ungluing” faces of a spherical diagram D over a presentation hS | Ri along edges we can obtain a bouquet of faces with spurs that gives us a sequence of elements π over the same presentation. Moreover, π is an identity because the diagram was spherical. Note that D is a diagram for π because we can reverse the described procedure. These procedures are not unique. We may obtain different diagrams and identities changing the order of gluings and ungluings. But at the same time Proposition 8 from [3] implies that if D is a diagram for π1 and a diagram for π2 then π1 is trivial if and only if π2 is. It allows us to define trivial spherical diagrams with correct correspondence to trivial identies. We will call D a trivial spherical diagram if a trivial identity can be obtained from D. Due to the fact noted above, every identity obtained from a trivial spherical diagram D will be trivial. Thus only trivial identities can be obtained from a trivial diagram, and only trivial diagrams can be obtained from a trivial identity. Note also that actually a diagram D which is a diagram for some identity π has an marked point (the initial vertex v from the construction). Replacing of the marked point conjugates all elements of the identity π by the same element — label of the path connecting old and new marked points. Clearly, it does not change triviality of the diagram. Therefore we are free to choose any point of the diagram as the marked point. Thus we wo not explicitly specify the marked point. And finally note that a spherical diagram can have spurs. But Proposition 8 from [3] implies that inserting and deleting of spurs does not change triviality of the diagram. 4 Proof of the theorem In this section Γ is a labelled by the set S graph and Rc , Rs and Rf are the sets defined at the beginning of the section 1.1 Definition 10. Let D be a diagram over the presentation hS | Rs i. A not originating skeleton of D is a graph that consists of all edges of D which do not originate from the graph Γ. Lemma 1. Suppose Γ satisfies graphical C(2)-condition and let D be a simple spherical diagram over the presentation hS | Rs i. Then a not originating skeleton of D has no spurs. Proof. Assume the contrary. Let D be a simple spherical diagram whose not originating skeleton contains a spur e with endpoint v. It means that all other edges incidental to v 6 Π3 Π2 e2 v e1 e Π1 e3 Π4 Fig. 3: Illustration for Lemma 1. Dotted edges originate from the graph. originate from the graph Γ because otherwise the edge e would not be a spur in the originating skeleton. We may assume that a part of the diagram in a neighborhood of the point v is embedded into the plane. Draw a circle with a center at v with quite a small radius such that the circle intersects all incidental to v edges and only them. Once if an edge is not a loop and twice if an edge is a loop. Let us traverse this circle in a counterclockwise direction starting at C ∩ e. We cross some number of faces Π1 , . . . , Πn . We cross also the edges e1 , . . . , en−1 , en = e, where ei lie in the intersection of faces Πi and Πi+1 . The boundary of each face has a unique lift to the graph because Γ satisfies graphical C(2)condition. Let vi be a vertex of the graph obtained by lifting v via the boundary of the face Πi . The edge ei originates from the graph for i = 1, . . . , n − 1, therefore vi = vi+1 for + i = 1, . . . , n − 1. Thus v1 = vn . It means that lifts of the edge e via ∂Π+ 1 and via ∂Π1 have a common vertex in the graph and, moreover, have the same label. It implies that these lifts coincide because a labelling of the graph is reduced. Thus e originates fron the graph. A contradiction. Definition 11. We will call D a minimal non-trivial spherical diagram over the presentation hS | Rf i if it is a non-trivial spherical diagram such that 1. A not originating skeleton of D has the smallest number of edges among all non-trivial diagrams and among all such diagrams a not originating skeleton of D has the smallest number of vertices. 2. D has the smallest number of edges among all diagrams satisfying the first condition. Note that a minimal non-trivial spherical diagram D is always a simple spherical diagram. Indeed, assume the contrary, let D not be a simple spherical diagram. We noted earlier that insertion and deletion of spurs does not affect its triviality. Therefore D does not have spurs. It means that there exists such a point v in D that the diagram splits into two spherical diagrams D1 and D2 after cutting D at v. Let π1 be an identity obtained from the diagram D1 and π2 be an identity obtained from the diagram D2 . These identities are trivial because D is a minimal non-trivial spherical diagram. Then an identity π = (π1 , π2 ) is trivial as well. But π can be obtained from the diagram D. Thus D is a trivial spherical diagram that contradicts its definition. Lemma 2. Let Γ be a C(2)-graph. Let D be a minimal non-trivial spherical diagram over the presentation hS | Rf i and let ∆ be a proper subdiagram of D such that it have at least one face and such that ∂∆ lies in the not originating skeleton of D. Then the boundary label of ∆ is not trivial as an element of the free group F (S). Proof. The proof is very similar to the proof of the fact that D is a simple spherical diagram. Assume the contrary. Denote by ∆′ a diagram obtained from D by cutting off ∆. Since ∆ 7 and ∆′ have a trivial boundary label we can obtain some identity π from ∆ and some identity π ′ from D′ . Denote by ∆s a spherical diagram obtained from ∆ by gluing its boundary. It is clear that ∆s is a diagram for π. And it is also clear that a not originating skeleton of ∆s is smaller than a not originating skeleton of D because ∆s was obtained by gluing the boundary of ∆, and this boundary consists only of not originating edges. Thus ∆s is a trivial spherical diagram and π is a trivial identity. The same is true for π ′ . Then an identity Σ = (π, π ′ ) is trivial as well. But D is a diagram for Σ and it means that D is a trivial spherical diagram. A contradiction. Let D be a simple spherical diagram. Denote by D̄ a simple spherical diagram obtained from D by erasing all edges originating from the graph Γ (if isolated vertices are left we delete them). Clearly, a 1-skeleton of D̄ coincides with a not originating skeleton of D. Note that actually D̄ may have some not simply connected “faces”, but we still consider them as faces and call them not simply connected faces. Note that the boundary of a not simply connected face consists of some connected components. Lemma 3. Let Γ be a C(2)-graph. Let D be a minimal non-trivial spherical diagram over the presentation hS | Rf i. Then the boundary label of any face of the diagram D̄ is reduced (the boundary label of any connected component for not simply connected faces). Proof. Assume the contrary. Let Π̄ be a face with a not reduced boundary label. Let e and f be the edges where reduction is occured. We will use diamond moves introduced in [3]. For definiteness we assume that ω(e) = ω(f ) and ℓ(e) = ℓ(f ) = a. Consider in detail only the case when all 3 points ω(e), α(e), α(f ) are distinct. Transform the diagram D as shown in Fig. 4. Note that we reduce the not originating skeleton at least by one edge because one of the two new edges appears to be inside the face Π̄. But the not originating skeleton does not have spurs so this edge originates from the graph. Π̄ Π̄ a Π̄ a a a a a a a Fig. 4: The first case of the Lemma 3. Diamond moves for other cases can be found in [3, Section 1.4]. We do not consider these cases in detail because they do not differ much from the first case: after applying a diamond move two old edges are replaced by two new ones and one of the two new edges appears to be inside the face Π̄ and therefore originates from the graph. Thus the not originating skeleton is reduced anyway. Lemma 4. Let p be a simple closed path in the graph Γ. Then there exists a diagram D over the presentation hS | Rf i such that ∂D lifts to the path p and all internal edges of D originates from the graph Γ. Proof. Forget for a while that Γ is labelled by the set S. Label every edge e of the graph Γ by the new unique label te . Assume the path p lies in the connected component Γ′ of the graph Γ and let B ′ be the basis of Π(Γ′ , v) from which some relations of Rf are obtained. Let q be a path which runs from the vertex α(p) to the vertex v and let B = {qb′ q −1 | b′ ∈ B ′ }. Then the path p are generated by the paths from B, i.e, p = bǫ11 · · · bǫnn , bi ∈ B. Each bi = ui ri u−1 i 8 where ri is a cyclic reduction of the path bi . Due to the definition of the set Rf , the label of each path ri lie in Rf . Fix a point s on the plane. For each bǫi i draw a face with a spur such that the spur starts at s and has a label ℓ(ui ) and such that the boundary label of the face is ℓ(riǫi ). Thus we obtain a diagram E such that its boundary label is freely equal to the label of the path p. If there exists a pair of consecutive edges with the same labels and opposite directions on the boundary of E then glue them. Doing this several times we obtain a reduced boundary label. The labelling of Γ is reduced and p is a simple closed path so its label is reduced. Thus the boundary label of E and the label of p is equal as words. Note that all internal edges of E originate from the graph because they have unique labels and therefore have unique lifts to the graph. Now recall the original labelling by the set S. After replacing unique labels by original ones all internal edges still originate from the graph (because boundaries of the faces still have unique lifts to the graph and these lifts coincide with lifts to the graph with unique labels) and the boundary label of the diagram still is equal to the label of p as words. Thus we obtain the desired diagram for the path p over the presentation hS | Rf i. Lemma 5. Let Γ be a C(2)-graph. Let D be a minimal non-trivial spherical diagram over the presentation hS | Rf i and let Π be a face of D̄. Then if Π is simply connected and its boundary is a simple closed path then this boundary lifts to a simple closed path in the graph Γ. Proof. Assume the contrary, that there exists a face Π in D̄ such that it have a simple boundary which lifts to a not simple closed path in the graph. By Lemma 3, the boundary label of Π is reduced so there exists a subpath p of the path ∂Π which lifts to a simple closed path p̃ in the graph. Let s and t be respectively the start and the end of the path p. Transform the diagram as shown in Fig. 5: cut the diagram along the path p and glue together s and t. Both ∂Π1 and ∂Π2 lift to the simple closed path p̃ in the graph Γ. By the previous lemma, there exists a diagram E over the presentation hS | Rf i such that its boundary coincides with p̃ and all internal edges originate from the graph. Glue E at the place of Π1 and a diagram symmetric to E at the place of Π2 . Thus we again obtain a spherical diagram over the presentation hS | Rf i. Denote it by D′ . Note that Π ∩ Π1 = ∂Π1 originates from the graph because it lifts to the simple closed path in the graph and due to the graphical C(2)-condition such a lift is unique. Therefore D′ has a smaller not originating skeleton than D because we glued together the vertices s and t which lay in a not originating skeleton of D and so we reduced the number of vertices in the not originating skeleton while the number of not originating edges are still the same, because all internal edges of E originate from the graph. Moreover, D′ is not trivial because we glued into D the set of opposite faces and we can −1 think of it as adding to the not trivial identity π some sequence (p1 , . . . , pn , p−1 n , . . . , p1 ) that corresponds to the n-fold application of the insert Peiffer transformation. Thus we obtained a not trivial spherical diagram with a smaller not originating skeleton than D has. A contradiction. Lemma 6. Let Γ be an aspherical graph and let D be a minimal non-trivial spherical diagram over the presentation hS | Rf i. Then every face of D̄ is simply connected and the boundary of every face of D̄ lifts to a simple closed path in the graph Γ. Proof. Assume the contrary. Then there are two types of bad faces: not simply connected faces and simply connected faces with a not simple boundary path which does not lift to a simple closed path in the graph. Note that since a not originating skeleton does not have spurs every face with a not simple boundary encloses some subdiagram which has at least one face. Similarly every not simply connected face does. Consider a face Π which is the innermost bad face. It means that a subdiagram ∆ enclosed by this face contains only simply connected faces which boundaries lift to simple closed paths. 9 s Π s Π Π t Π1 Π2 t Fig. 5: Illustration for Lemma 5. First examine the case when Π is a simple connected face. As before let p be a subpath of ∂Π which lifts to a simple closed path and let s and t be respectively the start and the end of the path p. If s 6= t then acting as in the proof of Lemma 4 we obtain a contradiction with minimality of D. Thus s = t. Let q be such a subpath of ∂Π that pq ∈ ∂Π+ . Note that either p or q encloses some subdiagram ∆′ of the diagram ∆. If q does then we can again assume that there is a subpath p′ in q with the end points s′ and t′ which lifts to a simple closed path. Arguing as before we obtain s′ = t′ . And now p′ encloses some subdiagram ∆′ of the diagram ∆. Note that ∆′ as a subdiagram of ∆ does not contains bad faces. So in the both cases there is a subpath which encloses some subdiagram without bad faces and which lifts to a simple closed path. We denote this path by p and this subdiagram by ∆. Since ∆ does not contain bad faces boundaries of all faces of ∆ lift to a simple closed paths. But the boundary of ∆ itself, which equals to a path p, lifts to a simple closed path. Thus we can think of ∆ as a spherical diagram over the presentation hS | Rs i no edge of which originates from the graph. But it contradicts asphericity of the graph Γ. In the case of a not simple connected face we act similarly. Let ∆ be a subdiagram enclosed by Π. Due to the choice of Π all faces of ∆ lift to simple closed paths. If ∂∆ lifts to a simple closed path in the graph then we again contradict asphericity of the graph. Otherwise we take a subpath p of ∂∆ with the end points s and t which lifts to a simple closed path in the graph. If s 6= t then we contradict minimality of D. If s = t then a subdiagram enclosed by p gives a spherical diagram over the presentation hS | Rs i where no edge originates from the graph that contradicts asphericity of the graph. s t ∆ Π Fig. 6: Illustration for Lemma 6. 10 The following lemma can be found in [4]. Lemma 7 (Gruber). Let Γ be a connected C(2)-labelled graph. Let R be the set of cyclic reductions of words read a set of free generators of π1 (Γ, v) for some v ∈ Γ. Let (D, v) be a simple disk diagram over R with freely trivial boundary word such that every interior edge originates from Γ. Then any sequence obtained from (D, v) is a trivial identity sequence. Now we can prove the theorem. Proof of the theorem. Assume the contrary, that there exists non-trivial identities. Let D be a minimal non-trivial spherical diagram over the presentation hS | Rf i. Consider a not originating skeleton of D. If the skeleton is empty then all edges of the diagram originate from the graph. In this case we can unglue D along some edge connecting distict vertices and we obtain a simple disk diagram with a trivial boundary label all edges of which originate from the graph Γ. Clearly, all these edges lift to the same connected component of the graph. Then, by the previous lemma, D is a diagram for a trivial identity that contradicts its definition. Thus the not originating skeleton is not empty. By the all previous lemmas every face of D̄ is simply connected and lifts to a simple closed path of the graph. Therefore D̄ is a spherical diagram over the presentation hS | Rs i where no edge originates from the graph that contradicts asphericity of the graph. 5 Corollary of the main result Now we show that graphical C(6)-condition implies asphericity of a graph. To do this we will need a notion of [p, q]-diagrams introduced in [1]. Let p and q be positive integers such that p1 + q1 = 12 . Degree of a face is a number of edges in its boundary path. A face of a diagram is called interior if it has no common edges with the boundary of the diagram. If D is a non-empty diagram such that each interior vertex of D has degree at least p and all faces of D have degree at least q, then D is called [p, q]-diagram. If D is a non-empty diagram such that each interior vertex of D has degree at least p and each interior face of D have degree at least q, then D is called (p, q)-diagram. The following theorem can be found in [1]. Theorem (Curvature formula). Let D be a simply connected [p, q]-diagram which contains at least two vertices. Then  X p + 2 − d(v) ≥ p q v∈∂D This theorem implies that there do not exist any simple spherical (3, 6)-diagrams. Indeed, note at first that a simple spherical (3, 6)-diagram contains more than one vertex because otherwise there would exist a face with degree 1 that contradicts the fact that the diagram is a (3, 6)-diagram. Second, we can unglue the diagram along an edge connecting two distinct vertices. Then we obtain a [3, 6]-diagram with exactly 2 vertices in the boundary and these vertices have degree at least 3. It contradicts the curvature formula. We also need an operation of “forgetting” vertices of degree 2. Let D be a diagram without spurs. Call an arc such a path in D that its every internal vertex has degree 2 and the end points have degrees more than 2. Then if we replace every arc in D by an edge, we obtain a diagram where each vertex has degree at least 3. Now we are ready to prove that graphical C(6)-condition implies asphericity of the graph. Proof. Assume the contrary, that there exists a simple spherical diagram D over the presentation hS | Rs i no edge of which originates from the graph. By Lemma 1, the diagram D has no spurs. Note that for any two adjacent faces Π1 and Π2 their common boundary is a piece because it does not originate from the graph. Due to graphical C(6)-condition it means that every face consists of at least 6 arcs. Therefore after “forgetting” vertices 11 of degree 2 the diagram D becomes a simple spherical (3, 6)-diagram which does not exist. A contradiction. Corollary. If Γ is a C(6)-graph, then the presentation hS | Rf i is aspherical. For the first time this result was obtained by Dominic Gruber in [4]. References [1] R. C. Lyndon, P. E. Schupp, Combinatorial Group Theory, Springer-Verlag, 1977 [2] I. M. Chiswell, D. J. Collins, J. Huebschmann, Aspherical group presentations, Math. Z. 178 (1981), 1–36. [3] D. J. Collins and J. Huebschmann, Spherical diagrams and identities among relations, Math. Ann. 261 (1982), 155–183. [4] D. Gruber, Groups with graphical C(6) and C(7) small cancellation presentations, Trans. Amer. Math. Soc. 367 (2015), no. 3, 2051-2078, preprint versions: arXiv:1210.0178 [5] M. Gromov, Random Walk in Random Groups, GAFA, Geom. Funct. Anal. 13 (2003), no. 1, 73–146. [6] Y. Ollivier, On a small cancellation theorem of Gromov, Bull. Belg. Math. Soc. Simon Stevin 13 (2006), no. 1, 75–89. 12
4math.GR
Approximation Complexity of Max-Cut on Power Law Graphs arXiv:1602.08369v1 [cs.DS] 26 Feb 2016 Mikael Gast∗ Mathias Hauptmann† Marek Karpinski‡ Abstract In this paper we study the MAX-CUT problem on power law graphs (PLGs) with power law exponent β. We prove some new approximability results on that problem. In particular we show that there exist polynomial time approximation schemes (PTAS) for MAX-CUT on PLGs for the power law exponent β in the interval (0, 2). For β > 2 we show that for some ε > 0, MAX-CUT is NP-hard to approximate within approximation ratio 1 + ε, ruling out the existence of a PTAS in this case. Moreover we give an approximation algorithm with improved constant approximation ratio for the case of β > 2. 1 Introduction In the study of large-scale complex networks, a large body of theoretical and practical work is devoted to clustering and partitioning problems [NG04; WGH04; New06; DT13].The aim is to identify and to characterize natural partition structures of existing real world networks, like protein interaction networks, online social networks and parts or layers of the World Wide Web. Given an undirected graph G = (V, E) the MAX-CUT problem asks for a partition of the vertex set into two parts such as to maximize the number of edges between them. MAX-CUT is one of the classic 21 NP-complete problems listed in [Kar72] and has applications ranging from VLSI design and cluster analysis to statistical physics [Bar+88]. In this paper we consider the MAX-CUT problem in the context of large-scale complex networks, more precisely in the context of so called power law graphs (PLG). The distinguishing feature of power law graphs is that their node degree distribution follows a power law, that is, the number of nodes of degree i is proportional to i−β , for some fixed power law exponent β > 0. A power law degree distribution has been observed for a large number and variety of social, information, technological and biological networks [CSN09]. ∗ Dept. of Computer Science and the Hausdorff Center for Mathematics, University of Bonn. e-mail: [email protected] † Dept. of Computer Science, University of Bonn. e-mail: [email protected] ‡ Dept. of Computer Science and the Hausdorff Center for Mathematics, University of Bonn. Research supported by DFG grants and the Hausdorff grant EXC59-1/2. e-mail: [email protected] 1 Previous Results In the general setting partition problems like the MAX-CUT (and MAX-BISECTION) problem were shown to be APX-hard. The greedy algorithm or random assignment algorithm for MAX-CUT was shown to yield a 1/2-approximation for the problem [SG76]. Beside some (1/2 +o(1))-approximation algorithms, the currently best approximation ratio for the problem is due to Goemans and Williamson in their seminal paper [GW95]. Using semidefinite programming they achieved an αGW -approximation algorithm for MAX-CUT, where αGW ≈ 0.879 is the trigonometric quantity αGW = 2/π sin Θ for Θ ≈ 2.33. The APX-hardness of the problem on general instances was shown by Papadimitriou and Yannakakis [PY91]. Under the assumption P 6= NP, the first explicit inapproximability bound of 84/83 was proven by Bellare, Goldreich, and Sudan [BGS98] and later refined to the current best bound of 17/16 due to Håstad [Hås01] and Trevisan et al. [Tre+00]. Assuming that the Unique Games Conjecture (UGC) holds true, Khot et al. [Kho+07] showed that MAX-CUT is UGC-hard to approximate to within αGW + ε. Thus, assuming the UGC, αGW is the best possible approximation ratio achievable in the general case. Furthermore, a lot of interest has been devoted to the case of more restricted graph instances of MAX-CUT. One of the first results was a polynomial time algorithm for the case of planar graphs [Had75]. In the metric variant of MAX-CUT (and MIN-BISECTION), instances are complete graphs where edge weights are given by the metric distance of the corresponding endpoints. For general metrics a randomized PTAS for MAX-CUT is due to Fernandez de la Vega and Kenyon [FK01] and for the case of tree metrics, a polynomial time algorithm was constructed by Karpinski, Lingas, and Sledneu [KLS13]. A PTAS for metric MIN-BISECTION was shown by Fernandez de la Vega, Karpinski, and Kenyon [FKK04], whereas for the general case the existence of a PTAS remains an open question (cf. [Kar02]). Another important special case is when the corresponding problem instances are dense, i.e. for some δ > 0, the number of edges is lower bounded by δ · n2 . Arora, Karger, and Karpinski [AKK95] gave a PTAS for dense MAX-CUT and, more generally, for dense MAX-k-CSPs. The result was extended also to sub-dense instances in [Fer+05; Bjö05] and to dense weighted instances in [FK00]. Regarding lower approximation bounds, a lot of interest has been devoted to the case of MAX-CUT in degree d bounded graphs and d-regular graphs. In a series of papers [BK99; BK01] Berman and Karpinski showed, among other results, that the MAX-CUT problem restricted to 3-regular graphs is NP-hard to approximate to within 152/151. 2 Main Results In this paper we study the MAX-CUT problem on power law graphs. Our main results are new and improved upper approximation bounds for the problem. In particular we show that there exists a polynomial time approximation scheme (PTAS) for MAX-CUT on (α, β)-power law graphs for 0 < β < 2. For the range β < 1, we observe that (α, β)-power law graphs are dense (in the average sense, i.e. the number of edges is Ω(n2 )) and the result of Arora, Karger, and Karpinski [AKK95] can be applied to obtain a PTAS. For β = 1 the graphs are not dense anymore. For this case we prove that (α, β)-power law graphs are core-dense and use the result of 2 Fernandez de la Vega et al. [Fer+05] yielding a PTAS for the problem. In the range 1 < β < 2, none of the above results directly apply because instances are neither dense nor core-dense. In order to construct a PTAS in this case, we partition the vertex set of power law MAX-CUT instances into two sets of high degree vertices and low degree vertices. We show that for a suitable choice of the partition parameters the induced subgraph of high degree vertices is asymptotically dense, and at the same time the total number of edges induced by the low degree vertices is small. Thus, in order to 1 obtain a 1+ε -approximate cut, we run the algorithm of [AKK95] on the subgraph of high degree vertices and afterwards placing the remaining vertices arbitrary. For β > 2 we show that the Goemans-Williamson algorithm [GW95] can be combined with a preprocessing to yield an improved constant approximation ratio. Moreover we show that for β > 2, MAX-CUT cannot be approximated with a constant approximation ratio arbitrary close to 1. For this purpose we use the lower bound result of [BK99; BK01], construct an embedding of low degree graphs into power law graphs and obtain in this way also explicit approximation lower bounds depending on the power law exponent β > 2. Moreover, a variant of this construction also proves the NP-hardness of MAX-CUT in power law graphs for the whole range β > 0. Besides NP-hardness in the exact setting, the status of MAX-CUT in PLGs for β = 2 remains unsettled. However, we consider the case when β is a function of the size of the PLG that converges to 2 from below. We call this the functional case. In particular we 1 show that for βf = 2 − f (α) , MAX-CUT in (α, βf )-PLGs admits a PTAS provided the convergence of βf to 2 is sufficiently slow, namely for all sublinear functions f (α) = o(α). Organization of the Paper Section 3 provides the definition of the (α, β)-PLG model due to [ACL01] and related notations. In Section 4 we present our PTAS constructions 1 for MAX-CUT on (α, β)-PLG for 0 < β < 2. The functional case βf = 2 − f (α) is considered in Section 4.3. Furthermore we show an improved constant approximation ratio for the case β > 2 in Section 5. Finally, in Section 6, we prove APX-hardness of the problem for the case β > 2 and NP-hardness for the whole range β > 0. 3 Preliminaries In this section we first give the formal definition of (α, β)-power law graphs. Then we provide notations for sizes and volumes of some subsets of the vertex set of a power law graph which we call intervals. Later on we will give estimates of these quantities in the analysis of our upper and lower bound constructions for MAX-CUT. Definition 3.1. [ACL01] An undirected multigraph G = (V, E) with self loops is called an (α, β) power law graph if the following conditions hold: • The maximum degree is ∆ = ⌊eα/β ⌋. • For i = 1, . . . , ∆, the number yi of nodes of degree i in G satisfies eα yi = β i   3 The following estimates for the number n of vertices of an (α, β)-power law graph are well known [ACL01]: n≈        eα/β 1−β α α·e ζ(β) · eα for 0 < β < 1, for β = 1, for β > 1. m≈        1 e2α/β 2 2−β 1 αeα 4 1 ζ(β − 2 1)eα for 0 < β < 2, for β = 2, for β > 2. −β Here ζ(β) = ∞ is the Riemann Zeta Function. i=1 i A random model for (α, β)-power law graphs was given in [ACL01] and is constructed in the following way: P 1. Generate a set L of degG (v) distinct copies of each vertex v. 2. Generate a random matching on the elements of L. 3. For each pair of vertices u and v, the number of edges joining u and v in G is equal to the number of edges in the matching of L, which join copies of u to copies of v. degG (v) = 1 degG (v) = 2 degG (v) = 3 V ... ... ... ... L edge self-loop multi-edge Given an (α, β) power law graph G = (V, E) with n vertices and maximum degree ∆ and two integers 1 6 a 6 b 6 ∆, an interval [a, b] is defined as the subset of V [a, b] = {v ∈ V |a 6 degG (v) 6 b}. If U ⊆ V is a subset of vertices, the volume vol(U) of U is defined as the sum of node degrees of nodes in U. We will make use of estimates of sizes and volumes of node intervals in (α, β)-PLGs. 4 Approximation Schemes for 0 < β < 2 We will now show that for every constant power law exponent β ∈ (0, 2), there is a PTAS for the MAX-CUT problem in (α, β)-PLGs. It turns out that for β ∈ (0, 1) this follows directly from the results in [AKK95], since in that case the power law graphs are dense, (Section 4.1). Recall that a graph G = (V, E) with n vertices is called δ-dense if the number of edges satisfies |E| > δ · n2 . For β = 1, (α, 1)-PLGs are not dense anymore. Nevertheless we can establish existence of a PTAS by showing that (α, 1)-PLGs are coredense, a notion which was introduced in [Fer+05]. 4 The Case 0 < β 6 1 4.1 First we consider the case when the power law exponent β is strictly less than 1. In this α/β case, the number n of nodes is asymptotically equal to e1−β and the number m of edges satisfies m = 1 e2α/β . 2 2−β Thus, in this case the graphs are asymptotically dense. Theorem 1 ([AKK95]). For every δ > 0, there is a PTAS for MAX-CUT in δ-dense graphs. Corollary. There exists a PTAS for MAX-CUT in power law graphs with power law exponent β < 1. Now we consider the case when β = 1. Definition 4.1. [Fer+05] The core-strength of a weighted r-uniform hypergraph H = (V, E) with |V | = n nodes given by an r-dimensional tensor A : V × . . . × V → R is n X Di i=1 !r−2 X i1 ,...,ir ∈V where Di = X A2i1 ,...,ir , Qr j=1 (Dij + D̄) Ai,i2 ,...,ir , D̄ = i2 ,...,ir ∈V n 1X Di n i=1 A class of weighted r-uniform hypergraphs is core-dense if the core-strength is O(1). In particular, the class C of unweighted graphs is core-dense if sup X G=(V,E)∈C {i,j}∈E 1 = O(1) (Di + D̄)(Dj + D̄) where Di is the degree of node i in G and D̄ = 1 n P i Di is the average-degree of G. Theorem 2. For β = 1, the class of (α, β)-Power Law Graphs is core-dense. Corollary. For β = 1, there is a PTAS for MAX-CUT in (α, β)-Power Law Graphs. Proof of the Theorem. Let G be an (α, 1)-PLG. The average-degree of G is asymptotically equal to α eα eα α X  eα  X 1 1 X eα (eα − 1) e 1 ∆=e i = α eα·2 − ·i > α ·i− D̄ = α αe i=1 i αe i=1 i αe 2 i=1 ! ! = (1+o(1)) eα 2α Now the core-strength of G is α e X α3 1 1 eα 6 · = o(1), 6 eα 2 α ) i (i + e (deg(i) + D̄)(deg(j) + D̄) i=1 2α e={i,j}∈E X which concludes the proof of the theorem.  5 4.2 The Case 1 < β < 2 We consider now the case when the power law exponent β satisfies 1 < β < 2. Our approach is as follows. We choose a subset [x∆, ∆] of high-degree vertices and construct a cut for the subgraph G[x∆,∆] induced by these vertices. Here x ∈ (0, 1) is a parameter of the construction. We will show that we can choose x in such a way that G[x∆,∆] is dense and the volume of the residual set of vertices [1, x∆) is small, namely vol([1, x∆)) = o(|E|). Then we will construct a (1 + ε)-approximate solution for MAX-CUT on G[x∆,∆] and afterwards place the remaining vertices arbitrarily. This approach is based on precise estimates for sizes and volumes of node degree intervals of the form [1, x∆] and [x∆, ∆], where x ∈ (0, 1) is the parameter of the construction and ∆ = ⌊eα/β ⌋ is the maximum degree. These estimates rely on the following lemma, which is also illustrated in Figure 1. Lemma 3. Let f : R+ → R+ be a monotone decreasing integrable convex function. Then we have the following bounds. (a) (b) b P a b P a ⌊f (i)⌋ ∈ " i·⌊f (i)⌋ ∈ b+1 R a " f (t)dt − (b − a + 1), b+1 R a tf (t)dt −  b(b+1) 2 − b+1 R a # f (t)dt + f (a) − f (b + 1) (a−1)a 2  , b+1 R a tf (t)dt + |(b + 1)f (b + 1) − af (a)| f (a) f (a+1) f (a+2) a a+1 a+2 b b+1 Figure 1: Estimating the volumes of node degree intervals. 6 # Using this lemma, we obtain the following bounds for the size of [x∆, ∆]: |[x∆, ∆]| = ∆ X x∆ ∈ $ eα jβ %  ∆+1 ∆+1 Z Z eα eα  dt − (∆(1 − x) + 1), dt + tβ x∆  " " α = eα tβ x∆ t1−β 1−β #∆+1 − ∆(1 − x) − 1, eα x∆ "  eα eα  − (x∆)β (∆ + 1)β t1−β 1−β #∆+1 x∆  eα eα  + − (x∆)β (∆ + 1)β 1 1 e · β−1 · β−1 − 1 − ∆(1 − x) − 1, β−1 ∆ x  #   eα eα 1 1 1 1 1 · · β−1 − β−1 + β · β − β β − 1 ∆β−1 x 2 ∆ x 2 ! # "   1−β ∆ 1 1 1 1 1 x −1 , −1+x− − + β − β = ∆ β−1 ∆ β − 1 xβ−1 2β−1 x 2 ⊆   We also obtain the following estimate for the volume of the interval [1, x∆]. vol([1, x∆]) = x∆ X 1 ∈  x∆+1 Z  1 eα j· β j $ % eα x∆(x∆ + 1) dt − , β−1 t 2 x∆+1 Z 1 eα tβ−1 dt + eα ! 1 −1  (x∆ − 1)β−1  x∆(x∆ + 1) eα  (x∆ + 1)2−β − 1 − ⊆ , 2−β 2 !#  eα  1 2−β α (x∆ + 1) −1 +e −1 2−β (x∆ − 1)β−1 " " 2α/β ⊆ (1 − o(1))e x2−β 2α/β x2−β eα/β x2 , (1 + o(1)) + (1 + o(1)) β−1 − e 2−β 2 2−β x ! # In particular, if x is constant within the interval (0, 1), i.e. does not converge to 0 or 1, then we obtain the following estimates: α/β • The size of the interval [x∆, ∆] is |[x∆, ∆]| = (1 + o(1)) eβ−1  1 xβ−1 − 1 2β−1  . • Thus for x being constant, the kernel function for the total error is O(e2α/β ) 2−β • For x being constant, the volume of [1, x∆] is vol([1, x∆]) = (1 + o(1)) x2−β · e2α/β . Thus we proceed as follows. Given an (α, β)-PLG G and ε > 0, we first choose x ∈ (0, 1) such that 1 e2α/β |E(G[x∆,∆])| > − vol([1, x∆]) > 22−β  e2α/β 1 1 · |E|, − x2−β > 1− 2 2−β τ (ε)  ! where τ (ε) is a function of ε yet to be defined. Then we choose a second parameter ε′ > 0 and construct a cut in G[x∆,∆], using the AKK-algorithm with precision parameter 7 ε. This yields a cut in G[x∆,∆] of size at least MAX-CUT(G[x∆,∆]) − ε′ · |[x∆, ∆]|2 . By the choice of x we have MAX-CUT(G[x∆,∆] ) > MAX-CUT(G) − vol([1, x∆]) > MAX-CUT(G) − 1 · |E| τ (ε) Moreover, |[x∆, ∆]|2 6 e2α/β (β − 1)2  1 xβ−1 −1 2 = |E| · 1 2 · (2 − β) −1 (β − 1)2 xβ−1  2 Thus the size of the cut constructed in this way is at least 2 2(2 − β) 1 |E| − ε′ · |E| · − 1 τ (ε) (β − 1)2 xβ−1  2 ! 2 4(2 − β) 1 > MAX-CUT(G) 1 − − ε′ · −1 τ (ε) (β − 1)2 xβ−1  MAX-CUT(G) −  We want to achieve that this yields a (1 + ε)-approximation, i.e. 2 2 4(2 − β) ε 1 1 − ε′ · − 1 = 1 − , > τ (ε) (β − 1)2 xβ−1 1+ε 1+ε which is equivalent to  2 2 4(2 − β) 1 ε + ε′ · − 1 6 2 β−1 τ (ε) (β − 1) x 1+ε  1−  We achieve this in a two-step approach: First we define the function τ in such a way that ε 2 6 21 · 1+ε , namely τ (ε) = 4(1+ε) . Then we choose ε′ appropriately, namely such that τ (ε) ε ε′ · 4(2 − β) 1 −1 2 β−1 (β − 1) x  2 6 ε 1 · , or equivalently 2 1+ε 1 2 ε′ 6 4(2−β) (β−1)2  · ε 1+ε 2τ (ε) 2−β β−1 −1 2 Altogether we obtain the following result. Theorem 4. For every fixed 1 < β < 2, there is a PTAS for MAX-CUT in (α, β)-Power Law Graphs. Now we consider the case when the power law exponent is β = 2. In this case, the number of nodes is still linear in eα , but now the number of edges drops down to n·log(n). More precisely, the number of edges of an (α, 2)-PLG is asymptotically equal to 41 αeα , while the number of nodes is ζ(β)eα. 4.3 The Functional Case βf = 2 − 1 f (α) We have shown in the previous sections that MAX-CUT on PLGs admits a PTAS for every fixed β < 2. We consider now the functional case when βf = 2 − 1/f (α), where f (α) is a monotone increasing function with f (α) −→ ∞ as α → ∞. In this section we will show the following result. 8 Theorem 5. For βf = 2 − 1/f (α) with f (α) −→ ∞ as α → ∞ and f (α) = o(α), there is a PTAS for MAX-CUT in (α, βf )-PLGs. The proof of the Theorem is based on the following observation. It is sufficient to show that we can split a given (α, βf )-PLG G into two parts [1, x∆f ) and [x∆f , ∆f ] such that the following two conditions are satisfied: (1) |[x∆f , ∆f ]|2 = O(|E|), (2) vol[1, x∆f , ] = o(|E|). Before we give the proof of the Theorem, we have to provide precise estimates for the sizes and volumes of these node degree intervals. The maximum degree is ∆f = ⌊eα/βf ⌋. The number of vertices is ∆f X j=1 $ eα j βf %   ∆f X ∆f X eα eα  ∈ − ∆ , f βf βf j=1 j j=1 j This sum can be approximated by the associated integral:  ∆f X eα  ∈ β f j=1 j e α/βf Z +1 1  ⊆ eα ·  " e eα dz, z βf α/βf Z +1 1 −1+1/f (α) z −1 + 1/f (α)  eα eα eα  dz + −  β β α/β β f f f f z 1 (⌊e ⌋ + 1) #eα/βf +1 1 1 eα 1− ⊆ f (α)−1 1 1 − /f (α) eα· 2f (α)−1 Similarly we obtain: " [x∆f , ∆f ] = ∆f X x∆f $ eα j βf with α e X∆ f j=x∆ βf j   ∈  e α/βf xe Z +1 α/βf  %  ∈  ∆f X e dz, z βf e α/βf xe Z ! −1+1/f (α) z −1 + 1/f (α) #eα/βf +1 1 +1 α/βf α α ! ,  + (1 − o(1))eα  1 eα 1− , f (α)−1 1 1 − /f (α) eα· 2f (α)−1 1 eα − ∆ f 1−x+ β j f ∆f j=x∆f α , eα · " ! ∆f X j=x∆f  α + (1 − o(1))e #  eα  , j βf  α e e e  dz + −  β β α/β α/β z f (xe f ) f (⌊e f ⌋ + 1)βf  eα  1 1 , ⊆ − ( 1 1 1 1 − f (α) (xeα/βf )1− f (α) (eα/βf + 1)1− f (α)    eα 1 eα 1 eα    + − − 1 1 1 1 − f (α) (xeα/βf )βf (eα/βf + 1)βf (xeα/βf )1− f (α) (eα/βf + 1)1− f (α) " ! f (α) f (α) 1 α· 2f (α)−1 ⊆ · ·e , f (α)−1 − 1 f (α) − 1 f (α) x ! f (α) 1 f (α) 1 1 1 · eα· 2f (α)−1 · + 2f (α)−1 − 2f (α)−1 f (α)−1 − 2f (α)−1 f (α) − 1 x f (α) 2 f (α) x f (α) 2 f (α) Thus we obtain the following estimates for sizes of node degree intervals. 9 # Lemma 6. Let G = (V, E) be an (α, βf )-PLG with βf = 2 − 0 < x < 1, the size of the node degree interval [x∆f , ∆f ] satisfies 1 . f (α) Then for every ! " ! f (α) 1 f (α) 1 − ∆f 1 − x + |[x∆f , ∆f ]| ∈ , · eα· 2f (α)−1 · f (α)−1 − 1 f (α) − 1 ∆f x f (α) ! # f (α) 1 1 1 f (α) 1 α· 2f (α)−1 + 2f (α)−1 − 2f (α)−1 · ·e f (α)−1 − 2f (α)−1 f (α) − 1 x f (α) 2 f (α) x f (α) 2 f (α) Moreover, eα 1 |V | ∈ 1− f (α)−1 1 α· 1 − /f (α) e 2f (α)−1 " ! eα 1 − ∆f , 1− f (α)−1 1 α· 1 − /f (α) e 2f (α)−1 ! α + (1 − o(1))e Corollary. The number of nodes of an (α, βf )-PLG G = (V, E) with βf = 2 − satisfies " f (α) 2f (α) − 1 α |V | ∈ (1 − o(1) · · eα , (1 − o(1) · ·e f (α) − 1 f (α) − 1 # 1 f (α) # Now we will estimate volumes of node degree intervals. Given some x ∈ (0, 1), possibly depending on α, we have vol[x∆f , ∆f ] ∈    ∆Zf +1 x∆f eα z ∆Zf +1 x∆f ⊆    α e z 1−   1− eα  z f (α)−1 f (α) f (α)−1 f (α) 1− 1− f (α)−1 f (α) 2f (α) α· 2f (α)−1 ⊆ f (α)e α e f (α)−1 f (α) z  α e dz + (x∆f ) f (α)−1 f (α) e − (∆f + 1) f (α)−1 f (α)    2α·f (α) − (1 − x)e 2f (α)−1 , x∆f ∆f +1    f (α)−1 + e x x∆f !1/f (α) 1  1+ ∆f − f (α)−1 f (α) f (α)−1 α· 2f (α)−1 α· 2f (α)−1 1  1+ ∆f 2f (α) α· 2f (α)−1 f (α)e α ∆f +1 f (α)−1 f (α) dz − (1 − x)∆2f , f (α)−1 f (α) e 2 f (α)−1 f (α)     2α·f (α) − x /f (α)  − (1 − x)e 2f (α)−1 , !1/f (α) 1  f (α)−1 α· 2f (α)−1 − x /f (α)  + e 10 1 · x 1 f (α)−1 f (α) 1 − 2 f (α)−1 f (α) !  Similarly we obtain  f (α)−1  x∆f +1 z 1− f (α)   vol[1, x∆f ] ∈ eα  f (α)−1 2α·f (α) 2f (α)−1 , − (x − ∆−1 f )e 1  eα   1− f (α)−1 x∆f +1 z f (α)  f (α)−1  1 f (α)−1 α· 2f (α)−1 +1− e x 1  α f (α)−1 f (α) 2α·f (α) ⊆ f (α)eα x f (α) e 2f (α) − 1 − xe 2f (α)−1 ,  f (α)eα 2 /f (α) x 1 1 f (α) e    f (α)−1 α 2f (α) −1 +1− x Thus the number of edges of an (α, βf )-PLG is "  |E| ∈ f (α)eα (∆f + 1) α f (α)e 1 f (α)  (∆f + 1)  −1 1 f (α) 1 − 1− ∆f  −1  ! f (α)−1 α· 2f (α)−1 +e 2f (α) 2f (α) 2f (α)  · ∆f 2f (α)−2 2f (α) 2f (α) , f (α)−1 f (α) ⊆ (f (α) − 1)eα· 2f (α)−1 , f (α)eα· 2f (α)−1 + eα· 2f (α)−1 ⊆ (f (α) − 1)eα· 2f (α)−1 , (f (α) + 1)eα· 2f (α)−1 f (α)−1 f (α) α· 2f (α)−1 e  eα· 2f (α)−1    1 − 2 f (α)−1 f (α) !#  Concerning (2): Based on these estimates, we will now show how to choose the parameter x such as to satisfy both conditions (1) and (2). It turns out that this depends on the order of growth of the function f (α), We observe that condition (2) is equivalent to  2f (α) 2f (α) x /f (α) eα· 2f (α)−1 − eα = o eα· 2f (α)−1 − eα 1 2f (α) α· 2f (α)−1 We have e  1 α· 2f (α)−1 − eα = eα · e −1   = : Tf,α . Now we may consider three cases: (a) If f (α) = o(α), then Tf,α = ω(1), (b) If f (α) = Θ(α), then Tf,α = Θ (eα ), (b) If f (α) = ω(α), then Tf,α = o (eα ). We consider the case (a). Then, in order to satisfy the condition (2), we have to choose x such that x1/f (α) = o(1) and moreover, 1 6 x f (α) eα· 2f (α)−1 Now we consider the requirement (1). We observe that, up to constant factors, the condition in (1) is equivalent to f (α) f (α) − 1 !2 2f (α) α· 2f (α)−1 e 1 · x f (α)−1 f (α) −1 !2 11  2f (α) α· 2f (α)−1 6 f (α) · e α −e  , which is, by rearranging terms, equivalent to f (α) f (α) − 1 Since f (α) f (α)−1 α ·e ·e α 2f (α)−1 1 · x f (α)−1 f (α) −1 !2  α 6 f (α)eα e 2f (α)−1 − 1  = Θ(1), this is, again up to constant factors, equivalent to 1 x !2 f (α)−1 f (α) −1 !2 6 (f (α) − 1)2 , f (α) which yields the requirement f (α) x > f (α) 2(f (α)−1) ((1 + o(1))f (α)) f (α) f (α) f (α)−1 = (1 − o(1)) · f (α) 2(f (α)−1) f (α) − f (α)−1 = f (α) f (α) − f (α)−1 Thus we obtain that for x = 1/f (α), requirements (1) and (2) are satisfied, which concludes the proof of the theorem.  5 The Case β > 2 The situation drastically changes when the power law exponent is a constant β > 2. In this case, the number of nodes is |V | = ζ(β)eα, and the number of edges is 21 ζ(β − 1)eα . We apply the Goemans-Williamson algorithm to the graph G[2,∆] induced by the vertices of degree at least 2 in G, and afterwards place all the edges incident to degree-1 nodes in the cut. This yields a cut which has an expected inverse approximation ratio at least αGW · ( 21 ζ(β − 1) − 1) + 12 αGW · ( 12 ζ(β − 1) − 1)eα + 12 eα = , 1 1 ζ(β − 1)eα ζ(β − 1) 2 2 where αGW ≈ 0.879 denotes the inverse approximation ratio of the Goemans-Williamson algorithm. This analysis can be refined as follows. There are eα nodes of degree 1. Suppose there are µ · eα nodes of degree 1 which are incident to another degree-1 node. The remaining (1 − µ)eα degree-1 nodes are incident to nodes of higher degree. The resulting lower bound on the expected inverse approximation ratio is then αGW · ( 12 ζ(β − 1) − (1 − µ2 )) + (1 − µ2 ) αGW · ( 21 ζ(β − 1) − 21 ) + 21 > , 1 1 ζ(β − 1) ζ(β − 1) 2 2 where the lower bound is attained at µ = 1. 6 Approximation Lower Bounds for β > 2 In this section we provide explicit approximation lower bounds for MAX-CUT in (α, β)PLG for β > 2. Explicit lower bounds for the approximability of MAX-CUT in degree B bounded graphs and B-regular graphs have been obtained in a series of papers [BK99; 12 BK01]. The authors showed, among other results, that the MAX-CUT problem restricted to 3-regular graphs is NP-hard to approximate to within (152/151) + ε. Here we will make use of this result and the associated constructions in order to prove APX-hardness for MAX-CUT in (α, β)-PLG for β > 2. Moreover we will show that even for β ∈ (0, 2], the problem remains NP-hard in the exact setting. It turns out that for β > 1 this will be a direct consequence from our reduction for the case β > 2, while in the case β 6 1 a different construction is needed. This is due to the fact that for β > 1, the number of constant degree nodes in an (α, β)-PLG is linear in the total number of vertices, while for β 6 1 this is not true anymore. The section is organized as follows. In the next paragraph we will describe a generic construction which reduces the MAX-CUT problem in 3-regular graphs to MAX-CUT in (α, β)-PLGs, based on an embedding of the former graphs into the later ones. Afterwards we will use this construction such as to obtain the APX-hardness of MAX-CUT in PLGs for β > 2, with an explicit approximation lower bound that only depends on the power law exponent β. This also yields the NP-hardness for β ∈ (1, 2]. Finally we will describe in subsection 6.1 a different embedding construction which yields the NP-hardness in the exact setting for β 6 1. The Construction We will now describe an embedding of 3-regular graphs into power law graphs. Starting from an instance G of E3-MAX-CUT, we construct an (α, β)-PLG instance G′ = G ∪ W ∪ M which is the disjoint union of G, a matching M on a subset of the degree-1 nodes and a subgraph W = W2 ∪ W4 ∪ . . . ∪ W∆ , where ∆ = ⌊eα/β ⌋ is the maximum degree of G. For each i 6∈ {1, 3}, Wi is a multipath of degree i nodes, namely a path whose edges have multiplicities alternating between ⌊ 2i ⌋ and ⌈ 2i ⌉, with degree 1 nodes attached to the two endpoints of this path. Wi contains all the degree i nodes of G and additionally up to i degree-1 nodes. Given the graph G with N vertices, we choose α smallest possible such that N is not larger than the number of degree 3 vertices in an (α, β)-PLG, namely such that eα N= β 3   ∈  eα eα − 1, 3β 3β  α j α k Without loss of generality, we assume that N = 3eβ = 3eβ . In the construction of the subgraphs Wi , we have to distinguish the following four cases. α α Case 1: i is even and ⌊ eiβ ⌋ is even. Then Wi contains vertices vi,j , j = 1, . . . ni = ⌊ eiβ ⌋ of degree i and additionally i vertices of degree 1. For 1 < j < ni , vertex vi,j is adjacent to vi,j−1 and vi,j+1 by multi-edges of multiplicity i/2. vi,1 and vi,ni are adjacent to vi,2 and vi,ni −1 respectively, each by multi-edges with multiplicity i/2. Additionally, each of these two nodes is adjacent to i/2 nodes of degree 1. i 2 i 2 i 2 α Case 2: i is even and ⌊ eiβ ⌋ is odd. The construction is the same as in case 1. 13 α α Case 3: i is odd and ⌊ eiβ ⌋ is even. Again Wi has vertices vi,j , j = 1, . . . ni = ⌊ eiβ ⌋ of degree i and now additionally i − 1 vertices of degree 1. For j = 3, . . . , ni , vertex vi,j is adjacent to vi,j−1 with multiplicity ⌈ 2i ⌉, and for j = 1, 3, . . . ni − 2 to vi,j+1 with multiplicity ⌊ 2i ⌋. Additionally vi,1 has ⌊ 2i ⌋ neighbors of degree 1 and vi,ni has ⌊ 2i ⌋ degree 1 neighbors. Thus Wi contains i − 1 nodes of degree 1. ⌊ 2i ⌋ ⌊ 2i ⌋ ⌊ 2i ⌋ ⌈ 2i ⌉ α Case 4: i is odd and ⌊ eiβ ⌋ is odd. In this case, vi,1 is adjacent to ⌈ 2i ⌉ degree 1 nodes and to vi,2 with multiplicity ⌊ 2i ⌋. The vertex vi,ni has ⌊ 2i ⌋ degree 1 neighbors and is adjacent to vi,ni −1 with multiplicity ⌈ 2i ⌉. Thus Wi contains ⌊ 2i ⌋ + ⌈ 2i ⌉ = i nodes of degree 1. ⌈ 2i ⌉ ⌊ 2i ⌋ ⌊ 2i ⌋ ⌈ 2i ⌉ α 2 α Finally M is a perfect matching on ⌊eα ⌋ − ∆ i=4 i + O(∆) = e − Θ(∆ ) = (1 − o(1))e vertices of degree 1. Our approximation lower bounds for MAX-CUT in (α, β)-PLG will be based on the fact that a maximum cut in the subgraph W contains all the edges of W and can be constructed efficiently. P Lemma 7. Given a 3-regular graph G with N vertices, let W ∪M be the auxiliary subgraph described above. Then W ∪ M has the following properties.   (a) The number of vertices is |V (W ∪ M)| = (1 − o(1)) ζ(β) − 3−β eα . (b) The number of edges is |E(W ∪ M)| = (1 − o(1))  1 ζ(β 2 − 1) − 1 2·3β−1  eα . (c) The cut size is MAX-CUT(W ∪M) = |E(W ∪M)|, and such a cut can be constructed in polynomial time. Proof. Parts (a) and (b) follow directly from the construction. Concerning (c), we place for each Wi vertices vi,j on the left hand side of the cut if j is odd and on the right hand side if j is even. Then we place all the degree 1 nodes optimally. This concludes the proof of the lemma. Explicit Lower Bounds for β > 2 We start from the following approximation hardness result for MAX-CUT in 3-regular graphs. Theorem 8 ([BK01]). For every ε ∈ (0, 1/302), it is NP-hard to decide whether an instance of E3-MAX-CUT with 156n edges and 104n vertices has a maximum cut of size above (152 − ε)n or below (151 + ε)n. Thus the MAX-CUT problem in 3-regular graphs is NP-hard to approximate within any ratio (152/151) − ε. 14 We consider now such a 3-regular graph G with N = 104n vertices and construct the associated (α, β)-PLG G′ = G ∪ W ∪ M. Due to Lemma 7, the graph G′ contains   (1 − o(1)) ζ(β) − 3−β · 3β · N + N vertices, and the auxiliary subgraph W ∪ M contains (1 − o(1))  1 ζ(β 2 − 1) − 1 2·3β−1  · 3β · N edges. It is now NP-hard to decide if MAX-CUT(G′ ) > (1 − o(1))  1 1 ζ(β − 1) − · 3β · 104n + (152 − ε)n 2 2 · 3β−1  or 1 1 MAX-CUT(G ) 6 (1 − o(1)) ζ(β − 1) − · 3β · 104n + (151 + ε)n 2 2 · 3β−1  ′  Simplifying terms, we obtain the following result. Theorem 9. For every β > 2 and ε > 0, MAX-CUT in (α, β)-Power Law Graphs is β ζ(β−1)−3)·52+152 − ε. NP-hard to approximate within a ratio (3 (3β ζ(β−1)−3)·52+151 As a byproduct of the proof of the previous theorem we also obtain the following result. Corollary. For 1 < β 6 2, MAX-CUT in (α, β)-Power Law Graphs is NP-hard. Proof. Theorem 8 yields that the following decision problem is NP-complete: Given a 3-regular graph G with 104n vertices, is MAX-CUT(G) > (152 − ε)n? For β > 1, our reduction G 7→ G′ = G ∪ W ∪ M is well defined and reduces this to the decision problem P eα α β if MAX-CUT(G′ ) > (152 − ε)n + 21 ∆ j=1 j · ⌊ j β ⌋ − 156n, where e = 3 · 104n. Remark. The reduction is not well-defined anymore for β 6 1, since in that case the number of degree 1 nodes does not suffice to construct the subgraphs Wi , i = 2, 4, 5, . . . , ∆ in the way as described before. In the next subsection we will provide an alternative reduction which also yields the NP-hardness for β 6 1. 6.1 NP-Hardness for β 6 1 In order to prove NP-hardness of the MAX-CUT problem in (α, β)-power law graphs for β 6 1, we construct again a polynomial time reduction from the 3-regular MAX-CUT. We consider first the case β < 1. Then the number of degree 1 nodes is still equal to ⌊eα ⌋, α/β while the total number of nodes is (1 − o(1)) e1−β = ω(eα ). Thus it is even not possible to spend one degree 1 node per subgraph Wi , since we also have eα = o(∆). We propose the following alternative construction. Starting from a 3-regular graph G α α with N = 104n vertices, we choose again α such that N = ⌊ 3eβ ⌋ = 3eβ . Now we call an α integer i ∈ {4, . . . ∆} critical if both i and ⌊ eiβ ⌋ are odd. For those node degrees i ∈ {2, 4, 5, . . . , ∆} which are non-critical, we let Wi be a wheel, i.e. a cycle consisting of multi-edges containing all the degree i nodes from G′ and having edge multiplicities alternating between ⌊ 2i ⌋ and ⌈ 2i ⌉. In that case we have MAX-CUT(Wi ) =    1 · i · ni 2 j k ni ·i i − 2 2 if i is even, if i is odd and ni even. 15 Now we deal with the critical node degrees. Suppose that i1 < i2 < . . . < ic are the critical degrees in {2, 4, 5, . . . , ∆}. We take a maximum matching Mc on this set of indices such that without loss of generality, index ic is unmatched iff c is odd. For each pair i, j in this matching, we construct a subgraph Wi,j containing ni nodes of degree i and nj nodes of degree j. This subgraph is constructed as follows. We arrange all the degree i nodes on a cycle consisting of multi-edges with multiplicities alternating between ⌊ 2i ⌋ and ⌈ 2i ⌉. Let vi be the node which has now degree i − 1 = 2 · ⌊ 2i ⌋. All the other nodes on this cycle have already degree i. Now we do the same for the nj nodes which are supposed to have degree j, and we define the vertex vj accordingly. Finally we add a single edge of multiplicity 1 connecting vi and vj . In Figure 2 we show the construction of Wi,j . ⌈ 2j ⌉ ⌊ 2j ⌋ ⌊ 2j ⌋ critical node ⌊ 2j ⌋ Wj edge of multiplicity 1 Wi ⌊ 2i ⌋ critical node ⌊ 2i ⌋ ⌈ 2i ⌉ ⌊ 2i ⌋ Figure 2: The construction of Wi,j . Directly from this construction we obtain that the subgraph Wi,j contains ni nodes of degree i and nj nodes of degree j. Note that from the very definition of critical degrees it follows that both ni and nj are odd. Every cut in Wi,j misses at least one multi-edge inside the degree i nodes and one such edge inside the degree j nodes. On the other hand, we can easily construct such a cut which misses only one edge of multiplicity ⌊ 2i ⌋ and one edge of multiplicity ⌊ 2j ⌋, by placing the degree i nodes alternatingly on the left and right hand side of the cut and doing the same for the degree j vertices. Thus we have i · ni i MAX-CUT(Wi,j ) = − 2 2   j · nj j + − 2 2   +1 Finally if c is odd, then Wic contains all the degree-ic nodes and one node of degree 1, and the maximum cut size is MAX-CUT(Wic ) = ic ·n2 ic − ⌊ 2i ⌋ + 1. In order to keep notation simple, we let Wic = ∅ in case when the number of critical node degrees is even. Moreover we let J ⊂ {2, 4, . . . , ∆} be the set of critical degrees. S S Thus the map G 7→ G′ = G ∪ i6∈J Wi ∪ {i,j}∈Mc Wi,j ∪ Wic ∪ M reduces the question if a given 3-regular graph G with 104n vertices has a cut of size at least (152 − ε)n to the question if the (α, β)-power law graph G′ has a cut of size at least 16 (152 − ε)n + P i∈([2,∆]\J)∪{ic } MAX-CUT(Wi ) + P {i,j}∈Mc MAX-CUT(Wi,j ) + MAX-CUT(M) The same construction also works in the case when β = 1. We obtain the following result. Theorem 10. For every β ∈ (0, 1], the MAX-CUT problem in (α, β)-Power Law Graphs is NP-hard. 7 Further Research We prove some new results on approximability of MAX-CUT in Power Law Graphs. It remains an open problem to settle the status of MAX-CUT in PLGs for the power law exponent β = 2, where the phase transition happens from existence of a PTAS (for constant β < 2 and for functional β slowly converging to 2 from below) to APXhardness (for any constant β > 2). Another problem concerns the design of better constant factor approximation algorithms for MAX-CUT in the case β > 2, based on SDP simulations with appropriate classes of inequalities for the low-degree vertices in the power law graph. Similar methods can be applied to other partition problems on power law graphs like MAX-BISECTION, Multiway-CUT and k-partition problems. Establishing good approximability bounds for those problems is another interesting question. References [ACL01] W. Aiello, F. Chung, and L. Lu. “A Random Graph Model for Power Law Graphs”. Experimental Mathematics 10.1 (2001), pp. 53–66. [AKK95] S. Arora, D. Karger, and M. Karpinski. “Polynomial Time Approximation Schemes for Dense Instances of NP-hard Problems”. Proceedings of the 27th annual ACM Symposium on Theory of Computing (STOC ’95); also in Journal of Computer and System Sciences 58.1 (02/1999). 05/1995, pp. 284–293. [Bar+88] F. Barahona, M. Grötschel, M. Jünger, and G. Reinelt. “An Application of Combinatorial Optimization to Statistical Physics and Circuit Layout Design”. Operations Research 36.3 (06/1988), pp. 493–513. [BGS98] M. Bellare, O. Goldreich, and M. Sudan. “Free bits, PCPs and nonapproximability – towards tight results”. SIAM Journal on Computing 27.3 (06/1998), pp. 804–915. [BK99] P. Berman and M. Karpinski. “On some tighter inapproximability results”. Proceedings of the 26th International Conference on Automata, Languages and Programming (ICALP ’99). Vol. 1644. LNCS. 1999, pp. 200–209. [BK01] P. Berman and M. Karpinski. “Efficient amplifiers and bounded degree optimization”. ECCC TR01-053 (2001). [Bjö05] A. Björklund. “Approximating integer quadratic programs and MAXCUT in subdense graphs”. Proceedings of the 13th annual European Conference on Algorithms (ESA ’05). Vol. 3669. LNCS. 10/2005, pp. 839–849. 17 [CSN09] A. Clauset, C. R. Shalizi, and M. E. J. Newman. “Power-Law Distributions in Empirical Data”. SIAM Review 51.4 (11/2009), p. 661. arXiv:0706.1062v2. [DT13] T. N. Dinh and M. T. Thai. “Community detection in scale-free networks: Approximation algorithms for maximizing modularity”. IEEE Journal on Selected Areas in Communications 31.6 (06/2013), pp. 997–1006. [FKK04] W. Fernandez de la Vega, M. Karpinski, and C. Kenyon. “Approximation schemes for Metric Bisection and partitioning”. Proceedings of the 15th annual ACM-SIAM Symposium on Discrete Algorithms (SODA ’04). 01/2004, pp. 506–515. [Fer+05] W. Fernandez de la Vega, M. Karpinski, R. Kannan, and S. Vempala. “Tensor decomposition and approximation schemes for constraint satisfaction problems”. Proceedings of the 37th annual ACM Symposium on Theory of Computing (STOC ’05). 05/2005, p. 747. [FK00] W. Fernandez de la Vega and M. Karpinski. “Polynomial time approximation of dense weighted instances of MAX-CUT”. Random Structures and Algorithms 16.4 (07/2000), pp. 314–332. [FK01] W. Fernandez de la Vega and C. Kenyon. “A Randomized Approximation Scheme for Metric MAX-CUT”. Journal of Computer and System Sciences 63.4 (12/2001), pp. 531–541. [GW95] M. X. Goemans and D. P. Williamson. “Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming”. Journal of the ACM 42.6 (11/1995), pp. 1115–1145. [Had75] F. Hadlock. “Finding a Maximum Cut of a Planar Graph in a polyminal time”. SIAM Journal on Computing 4.3 (09/1975), pp. 221–225. [Hås01] J. Håstad. “Some optimal inapproximability results”. Journal of the ACM 48.4 (07/2001), pp. 798–859. [Kar02] M. Karpinski. “Approximability of the Minimum Bisection Problem: An Algorithmic Challenge”. Proceedings of the 27th International Symposium on Mathematical Foundations of Computer Science (MFCS ’02). Vol. 2420. LNCS. 08/2002, pp. 59–67. [KLS13] M. Karpinski, A. Lingas, and D. Sledneu. “Optimal cuts and partitions in tree metrics in polynomial time”. Information Processing Letters 113.12 (06/2013), pp. 447–451. arXiv:arXiv:1212.3471v1. [Kar72] R. M. Karp. “Reducibility among Combinatorial Problems”. Complexity of Computer Computations. 1972, pp. 85–103. [Kho+07] S. Khot, G. Kindler, E. Mossel, and R. O’Donnell. “Optimal inapproximability results for MAX-CUT and other 2-variable CSPs?” SIAM Journal on Computing 37.1 (01/2007), pp. 319–357. [New06] M. E. J. Newman. “Modularity and community structure in networks”. Proceedings of the National Academy of Sciences 103.23 (02/2006), pp. 8577–82. arXiv:0602124 [physics]. 18 [NG04] M. E. J. Newman and M. Girvan. “Finding and evaluating community structure in networks”. Physical Review E 69.2 (02/2004), p. 026113. [PY91] C. H. Papadimitriou and M. Yannakakis. “Optimization, approximation, and complexity classes”. Journal of Computer and System Sciences 43.3 (12/1991), pp. 425–440. [SG76] S. Sahni and T. Gonzalez. “P-Complete Approximation Problems”. Journal of the ACM 23.3 (07/1976), pp. 555–565. [Tre+00] L. Trevisan, G. B. Sorkin, M. Sudan, and D. P. Williamson. “Gadgets, Approximation, and Linear Programming”. SIAM Journal on Computing 29.6 (01/2000), pp. 2074–2097. [WGH04] A. Y. Wu, M. Garland, and J. Han. “Mining scale-free networks using geodesic clustering”. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD ’04). 08/2004, p. 719. 19
8cs.DS
Application Embedding: A Language Approach to Declarative Web Programming * David H. Lorenza,b and Boaz Rosenanc a Open University of Israel b Faculty of Computer Science, Technion—Israel Institute of Technology c University of Haifa Abstract Since the early days of the Web, web application developers have aspired to develop much of their applications declaratively. However, one aspect of the application, namely its business-logic is constantly left imperative. In this work we present Application Embedding, a novel approach to application development which allows all aspects of an application, including its business-logic, to be programmed declaratively. We develop this approach in a two-step process. First, we draw a mapping between web applications and Domain-Specific Languages (DSLs). Second, we note that out of the two methods for implementing DSLs, namely as either internal or external, most traditional web applications correspond to external DSLs, while the the technique that corresponds to DSL embedding (implementing internal DSLs) is left mostly unexplored. By projecting the well-known technique of DSL embedding onto web applications, we derive a novel technique—Application Embedding. Application embedding offers a separation of code assets that encourages reuse of imperative code, while keeping all application-specific assets, including those specifying its businesslogic, declarative. As validation, we implemented a simple, though nontrivial web application using the proposed separation of assets. This implementation includes an application-agnostic imperative host application named FishTank, intended to be applicable for a wide variety of web applications, and a declarative definition of the different aspects of the specific application, intended to be loaded on that host. Our method of separation of code assets facilitates a better separation of work, in comparison to traditional methods. By this separation, host application developers can focus mostly on the extra-functional aspects of a web application, namely on improving performance, scalability, and availability, while developers of an embedded application can focus on the functional aspects of their application, without worrying about extrafunctional concerns. The reusability of the host application makes the effort put into a better implementation cost-effective, since it can benefit all applications built on top of it. ACM CCS 2012 Software and its engineering → Software development techniques; Development frameworks and environments; Keywords Domain-specific languages (DSLs), Logic programming (LP), Web application The Art, Science, and Engineering of Programming Submitted September 1, 2016 Published January 27, 2017 doi 10.22152/programming-journal.org/2017/1/2 © David H. Lorenz and Boaz Rosenan This work is licensed under a “CC BY 4.0” license. In The Art, Science, and Engineering of Programming, vol. 1, no. 1, 2017, article 2; 38 pages. Application Embedding: A Language Approach to Declarative Web Programming 1 Introduction Web application development has gone a long way to make much of the application code declarative. This includes the introduction of server-side frameworks (e.g., Ruby on Rails 1 and Django 2 ), client-side frameworks (e.g., AngularJS 3 and React 4 ), and languages backed by web standards (e.g., HTML and CSS). While these frameworks and languages make declarative programming applicable to many of these applications’ concerns (most notably, the presentation), one important aspect of web applications is constantly left imperative: their business logic. 5 In this paper we apply a well-known principle in Computer Science—the notion that program (code) and state (data) are interchangeable [38, 4]—to another well known technique—domain-specific language embedding [23, 21]—to form a new approach to application development, named Application Embedding, allowing application business logic to be defined declaratively rather than implemented imperatively. Applying declarative programming, which is stateless by nature, to business logic implementation, which is imperative by nature, may seem at first sight implausible or even impossible. Indeed, imperative, general-purpose programming languages are often used to implement business logic. However, if we take a closer look, imperative business logic can be attributed to a common but inessential design choice: the ThreeTier Architecture (3TA) [13]. 1.1 Traditional Approach In the 3TA a web application is partitioned into a presentation-tier running the presentation logic on the client-side, a logic-tier running the business logic typically on a web server on the sever-side, and a data-tier consisting of a database program also running on the server-side. The 3TA provides a separation of concerns that promotes scalability. Stateless components are scaled easily by adding more computer nodes running them. Stateful components, however, are harder to scale. For this reason, the 3TA segregates the latter parts in their own tier (namely, the data-tier), requiring them to be application agnostic (e.g., a general-purpose database), so once implemented, they can be reused massively across applications, thus amortizing the cost of their development. * 1 Work done in part while visiting the Faculty of Computer Science, Technion—Israel Institute of Technology. http://rubyonrails.org/ https://www.djangoproject.com/ 3 https://angularjs.org/ 4 https://facebook.github.io/react/ 2 5 The term business logic in web applications refers to the part of the application that manipulates the data (state) that the application stores, and it is used in a broader sense than its original meaning in enterprise applications where it refers strictly to business rules or business processes. For example, a decision in a social network regarding the placement of a user status in another user’s timeline is a part of the social network’s business logic, although this decision has nothing to do with business per se. 2-2 D. H. Lorenz and B. Rosenan Consequently, however, the 3TA separates computation and state into two separate entities (the logic-tier and the data-tier, respectively). This means that the logic-tier needs to perform I/O operations to interact with the application’s state, forcing its imperative nature. Some web frameworks and multi-tier programming languages strives to hide away the imperative nature of the logic-tier, thus allowing developers to define most of the application’s concerns declaratively. However, they do so typically by relying on the declarative nature of relational databases, thus assuming the application’s data model maps nicely to a normalized relational database. Data models that are hard to fit into relational data (e.g., due to impedance mismatch [35]), or large systems that require denormalization to meet performance goals, break these assumptions and require imperative code to fill the gap. 1.2 A Domain-Specific Language Approach We present a different separation of concerns. Our method of partitioning keeps all application-specific parts declarative, while keeping all imperative parts application agnostic, and thus reusable across different applications. For achieving this we turn to another domain, namely, Domain-Specific Languages (DSLs). DSLs can be implemented as either external DSLs, implemented as compilers or interpreters, or internal [10, 34] or embedded [23, 21] DSLs, implemented as software libraries in a host language, in a process sometimes referred to as DSL embedding. For declarative host languages, embedded DSLs are defined declaratively [23]. This results in a desired separation of code assets, where all DSL-specific code (namely the DSL definition) is declarative, and the (often imperative) implementation of the host language remains DSL-agnostic, and therefore reusable across DSLs. We can apply DSL embedding to web applications by thinking of the state of applications as programs in a languages. The equivalence between code and data is a fundamental concept in Computer Science (applied, e.g., in Von Neumann’s storedprogram architecture [38] and in Church’s lambda calculus [4]). This equivalence is often used to describe code as data (e.g., an encoding of a program), but in some cases the opposite direction is useful as well. In our case, we note that the logic-tier of an application following the 3TA acts as an interpreter, acting upon the “program” stored in the data-tier as the state of the application. The database schema defines the language this program is written in, while the business logic gives it meaning, acting as its semantics. Since the concepts stored in the database refer to the application’s problem domain, its corresponding language can be treated as a DSL. By drawing this mapping between applications and DSLs we open the door to comparing their implementation techniques. Indeed, state-of-the-art techniques for web application development typically compare to external DSLs, while methods that map to DSL embedding are seldom used for anything other than static websites. 1.3 Contribution We present Application Embedding—a web application development approach based on DSL embedding, in which a web application is embedded in a host application, 2-3 Application Embedding: A Language Approach to Declarative Web Programming Figure 1 A comparison between (a) the logic-tier of an application and (b) an interpreter just like a DSL is embedded in a host language. Just as in the field of DSLs the host language is a general-purpose programming language, our host application is a generalpurpose application, fully programmable to host any embedded web application. As in DSLs, this approach results in a desirable separation of code assets. The imperative implementation of the host application is reusable, since it is general-purpose, while all the application-specific code is declarative, consisting of definitions in the language implemented by the host application. As validation of this approach, we present the following: A discussion of the mapping between web applications and DSLs, demonstrated by providing specifications for a web application using formal semantics of the corresponding DSL (section 2). A discussion of the consequences of applying this mapping to embedded DSLs, deriving requirements for host applications, needed to implement our application embedding approach (section 3). A computational model, named the Fish-Tank Model (FTM), that is based on Logic Programming (LP) and meets these requirements, along with an implementation of this model, name FishTank (section 4). A purely declarative definition of a microblogging web application, embedded in FishTank (section 5). 2 An Application as a Programming Language Since the early days of Computer Science it is known that programs and their state are interchangeable. Von Neumann’s stored-program architecture [38] requires programs to be encoded as data. By this architecture, a program, like its state, is a part of the state of the machine running it. Curry’s lambda calculus [4] goes beyond that, making it possible to treat the state of any program as a program by itself. While it may be confusing to think of state as a program in the general case, it is much easier to see the correspondence in applications that follow the 3TA. Figure 1 compares a logic-tier of an application (figure 1a), to an interpreter (figure 1b) of a programming language. Both logic-tiers and interpreters process input from a user to 2-4 D. H. Lorenz and B. Rosenan (a) (b) (c) Application: App (Database) Schema Business Logic Specialpurpose Presentation State (Data) Web App Traditional Logic-tier Embedded App Embedding Host App Language: L 〈App〉 Abstract Syntax Semantics DSL Concrete Syntax Program External DSL External Interpreter Embedded DSL Internal Host Language Table 1 Comparing Applications with Languages produce output. Both do so according to their own programming: the logic tier follows the application’s business logic and the interpreter follows the programming language’s semantics. The programming is complemented by additional input: the application’s state (stored in the data-tier) or the program being interpreted, respectively. In the case of the application, however, state is also updated by the logic-tier, while interpreters typically do not modify the program they run. This comparison is summarized in table 1. For an application App we denote the corresponding language by L 〈App〉 (dubbed “App language”). The database schema used by App provides the abstract syntax for L 〈App〉. App’s presentation (user interface) gives human-readable and writable form to its state, acting as its concrete syntax. Most applications are special-purpose, built around one specific problem domain (e.g., social media, e-commerce). In such applications the state consists of concepts from that problem domain (e.g., tweets, statuses, products). This makes their corresponding languages domain-specific, i.e., DSLs (table 1a). The rest of this section relates the different aspects of an application to the corresponding aspects of a DSL. To demonstrate this correspondence we describe the behavior of an example web application named Tweetlog via a specification of its corresponding L 〈Tweetlog〉 DSL. Tweetlog is a microblogging application, where users can publish short textual tweets and follow other users. The application then presents users with time-lines, containing tweets made by users they follow. 6 2.1 Schema as Abstract Syntax For an application App, the schema of the data stored in App’s database corresponds to the abstract syntax for L 〈App〉, where each program P ∈ L 〈App〉 corresponds to a single state. It is common practice to treat the state of a database at a certain point in time as a mathematical set, where each element in that set represents a single piece of information (record, document, etc). We therefore treat P as a set of statements. Therefore, the abstract syntax of these statements defines the structure of the state. 6 We provide only anecdotal definitions here. The complete specification can be found in appendix A. 2-5 Application Embedding: A Language Approach to Declarative Web Programming To define the schema of Tweetlog’s state we define the abstract syntax of its corresponding L 〈Tweetlog〉 DSL: 7 S = | | | User = Tweet = | ... tweeted (User, Time, Tweet) follows (User, User, Time) timeline (User, Time, TimelineElem) ... user (String) text (Text) image (Binary, Text) (1) Statements in L 〈Tweetlog〉, denoted by the S symbol, are tweets (tweeted statements) and following relations (follows statements), which are both considered raw statements, since users add these statements explicitly. The abstract syntax also accounts for derived statements, such as time-line entires (timeline statements), which are calculated by the business logic. These statements may or may not be actually stored by the application, but they can all be inferred based on the state of the application, and thus we consider them part of the state. 2.2 Business Logic as Semantics The business logic of an application App can be thought of as both the static and dynamic semantics of L 〈App〉. The business logic serves two major roles in an application (which are not mutually exclusive): it mutates the state of the application and acts upon it. In its former role, the business logic actually refines the set of allowed states, beyond what the schema allows. This corresponds to the role of the static semantics in a programming language, which refines the set of allowed programs beyond what the abstract syntax allows. In its latter role, the business logic provides the meaning of the application state. This corresponds to the role of dynamic semantics, which provides meaning to programs. Out of the two roles, we describe here only the dynamic semantics of L 〈Tweetlog〉. For simplicity we assume that any set of syntactically-correct statements is a legal program in L 〈Tweetlog〉, and thus a legal state in Tweetlog. Real-life applications will guard against certain kinds of syntactically-valid state transitions to maintain data integrity. A method for providing integrity, as well as confidentiality in similar settings is provided elsewhere [28]. To define the dynamic semantics for L 〈Tweetlog〉, we use a system of natural deduction rules as a way to reason about logical judgments relating programs to their input and output. In Natural Semantics [25] judgments usually correspond to typical behavior of general-purpose programming languages, such as state transition of imperative languages or the evaluation of an expression to a value in functional Notation 7 The complete abstract syntax specification for L 〈Tweetlog〉 can be found in figure 10. 2-6 D. H. Lorenz and B. Rosenan languages. L 〈Tweetlog〉, however, is neither imperative nor functional. Our way of reasoning upon it is by stating what statements S are true given program P , denoted P |= S. First and foremost, a statement S is true given program P if it is included in P : S∈P P |= S The following rules extend this set of statement with derived statements. In addition to |=, we use ad-hoc judgments, which we denote as a first-order logic atom, using a name and arguments. Semantic Rules We begin by tokenizing each tweet to produce a processed tweet (procTweet): P |= tweeted (U,τ, T )  parse tokens X 0 , X , "   replaceText T, plain (X ) , tokenized X 0 , T 0  P |= procTweet U, τ, T 0 proc-tweet (2) Here a processed tweet is based on a “raw” tweet, after extracting its text and parsing (tokenizing) it. The parse judgment asserts that X can be tokenized into a list of tokens X ’, and replaceText replaces the plaintext X with the list of tokens X ’ in the body of the tweet. 8 This tokenization is then used to create a search index (searchIndex), indexing tweets by their tokens (simple words, user IDs, and hashtags): P |= procTweet (U, τ, T ) replaceText (T, tokenized (X ) , tokenized (X ) , T ) P |= searchIndex (ξ, τ, T ) ξ∈X search1 (3) Additionally, tweets are also indexed by the user making them: P |= procTweet (U, τ, T ) search2 P |= searchIndex (userID (U) , τ, T ) (4) The search index can be used for regular searches, but in particular it is used to define the time-line:  P |= follows U1 , user (U2 ) , τ0 P |= searchIndex (userID (U2 ) , τ, T ) time-line1 (5) P |= timeline (U1 , τ, tweet (U2 , T )) By this, a user’s time-line for user U1 consists of all tweets related to any user U2 followed by U1 . This includes both tweets made by U2 as well as all replies to these tweets, i.e., tweets in which user U2 is mentioned. 8 The definition of replaceText is given in equation (7) and equation (8). The definition of parse is given in figure 12. 2-7 Application Embedding: A Language Approach to Declarative Web Programming 2.3 Presentation as Concrete Syntax For an application App, the concrete syntax of L 〈App〉 defines how programs (state of application App) is presented to the user. In programming, we are used to thinking of concrete syntax in the other direction, defining how textual source code translates to an abstract syntax tree. In contrast, here we consider concrete syntax as a bidirectional mapping between the abstract and concrete representations of a program. Projectional Editing (PE) [18, 39, 14], for example, is a technique by which concrete syntax defines how an Abstract Syntax Tree (AST) is projected to a view displayed to the user. Apart for displaying the AST, the view also facilitates editing of the AST. These edits are made visible to the user by applying the projection again, to update the view. In DSLs that represent web applications the meaning of concrete syntax is similar to its meaning in projectional editing. The view in this case consists of HTML on a web browser, and the projection translates the abstract representation (data in the database) into its HTML representation. The view is also responsible for mutating the abstract representation by allowing the creation of new data, and editing or deleting data. Recall that the state of the application consists of a set of statements. This means that mutation of the state includes adding new statements, deleting statements, and modifying statements. HTML provides forms to perform addition of new data (statements) and editing existing data. Delete buttons can be associated with data to be displayed to facilitate deletion. 2.4 State as Program The mapping of the state of an application to a DSL program is somewhat counterintuitive at first. While programs are typically immutable and relatively small, the state of an application is constantly mutated by the logic-tier and is typically very large. In this section we elaborate on these differences and provide intuition as to which languages map well to applications. One thing to notice about L 〈App〉 is that it is purely declarative for almost any App. Recall that program P ∈ L 〈App〉 is an unordered set of statements. Such a set cannot represent a sequence of commands to be executed (imperative code), unless individual statements do. Statements can represent such sequences of commands in applications that allow users to build such sequences, such as programming environments, where the application stores and executes user programs. In any other case, we can refer to L 〈App〉 as a declarative language. State as a set implies a declarative program Recall program P ∈ L 〈App〉 represents the state of application App at a given moment. This makes P transient—applicable to a single, passing moment. The facts the application’s logic-tier mutates the state corresponds to the interpreter of L 〈App〉 mutating the program. This mutation is depicted as a dashed line in figure 1b. Mutable state implies a mutable program 2-8 D. H. Lorenz and B. Rosenan Program mutation is considered hard in imperative languages, because mutating a program as it runs requires a corresponding restructuring of its state. However, declarative programming languages do not have a notion of state, making them easier to mutate. In fact, some declarative paradigms have a long tradition of program mutation as alternative to storing state. The Prolog [8, 12] predicates assert/1 and retract/1, for example, add and remove clauses to and from the program. Many imperative Prolog programs that interact with users modify a declarative subset of the program using these predicates in order to store user data. Then, to answer user questions, they query that declarative subset [5, p163]. 9 Most implementations of traditional programming languages make assumptions regarding the size of the program. Regardless of whether the language is compiled or interpreted, a common assumption is that a program is small enough in size so it can be loaded completely into memory. In contrast, application developers typically do not make similar assumption regarding the size of the data (state) stored by the application, and such data is often stored to disk on the database, and in some cases is even distributed across many database nodes. Consequently, traditional language implementation techniques are often inadequate for implementing applications. However, some existing languages can handle such large programs. One example is Datalog [6]—a data representation and query LP language for deductive databases [33]. It is not Turing complete, and thus is not a general programming language, but its “programs” (the contents of a deductive database) are both declarative, large, and mutable. Big state implies a large program 3 Application Embedding Having established the similarity between applications and DSLs, next we examine the two well-known techniques for implementing DSLs, and correlate them to different approaches for application development. 3.1 Embedded Applications as Embedded DSLs In the field of programming languages, there are two well-known techniques for implementing DSLs: external DSLs are implemented as compilers or interpreters, while internal DSLs [10, 17, 30, 34] are implemented as software libraries in a host language in a process sometimes referred to as DSL embedding [23, 21], such that a program in the DSL is also a program in the host language. The two approaches have significant trade-offs [19, 27]. On the one hand, external DSLs give their developers absolute freedom in defining the syntax and semantics of 9 An example Prolog program that uses mutating as an alternative to manipulating state is presented in appendix D. 2-9 Application Embedding: A Language Approach to Declarative Web Programming Figure 2 A comparison between (a) a host application and (b) a host language the DSL, while internal DSLs are bound to restrictions (both syntactic and semantic) posed by the host language. On the other hand, external DSLs leave the burden of providing an efficient implementation, as well as editors, debuggers, and other tools on the DSL developer, while internal DSLs reuse much of the facilities created for the host language. For example, an optimizing compiler that exists for the host language will optimize (with varying levels of success) code written in DSLs it hosts. Recall that we compare the logic-tier of a web application to an interpreter of a DSL (section 2). Consequently, applications implemented using the 3TA correspond to external DSLs, implemented as interpreters. Indeed, applications implemented in languages such as PHP [26], Java [2], Ruby [37], or JavaScript [16] are strictly external to their respective implementation language. In contrast, websites built using a Content-Management System (CMS) such as WordPress 10 or Drupal 11 can be seen as embedded in these applications. We coin the term Application Embedding to describe the implementation of an embedded application as payload over a host application. Figure 2 augments figure 1 to describe how internal DSLs map to embedded applications such as WordPress websites. WordPress itself is a standard 3TA web application for which the logic-tier acts as an interpreter over its state. The state, however, consists of mainly two parts: definitions of guest applications (e.g., user website content), and application userdata (e.g., comments left on user websites). The two live side-by-side as the state of WordPress—the host application. This is similar to a Ruby program consisting of a DSL definition provided as a library [10] and a DSL program, both living side-by-side as Ruby code, interpreted by the Ruby interpreter which is implemented externally of Ruby (table 1c). As expected, traditional and embedded web applications feature similar trade-offs to the ones existing for external and internal DSLs. Building a website using a CMS Web applications as external and internal DSLs 10 11 https://wordpress.org/ https://www.drupal.org/ 2-10 D. H. Lorenz and B. Rosenan is usually much easier than building it using, e.g., a web framework. However, a web framework gives much more freedom in both the application’s visual design (its “syntax”) and its functionality (“semantics”). In both cases, CMS users are bound to what the particular CMS provides. Specifically, websites built using CMSs are typically almost entirely static, where the user building the website can only choose functionality from a predefined collection (a contact form, comments, “likes”, etc). 3.2 Host Application as a Host Language Following CMS as a conceptual example, a host application needs to be, first and foremost, a web application. It needs to store state, which consists of both the embedded application (e.g., the content of a website in a CMS), along with the state of that application (e.g., comments and likes on pages of such a website). However, unlike CMSs, we want our host application to support arbitrary functionality. Therefore, the host application needs to be general-purpose. We define a general-purpose application as an application App for which L 〈App〉 is a general-purpose programming language. We can therefore start by discussing requirements for a host language, and then move on to discussing a corresponding host application. Datalog is an example of a language that can represent large, mutable, declarative programs (section 2.4). Unfortunately, two problems hinder the use of Datalog as a general-purpose host language. First, it is not Turing-complete. As a A host language result it is not suitable for expressing arbitrary functionality. Second, the well-known method for embedding DSLs in LP languages [29] is inapplicable to Datalog, since it does not support compound terms. An appropriate host language should, like Datalog, be declarative and support large and mutable programs; but, unlike Datalog, it should be Turing-complete, and support DSL embedding. In previous work [28] we introduced the Cloudlog language. Like Datalog, Cloudlog is a LP data representation and query language. However, unlike Datalog, Cloudlog is Turing-complete and provides a choice between Prolog-like (top-down) clauses, evaluated at query time, and Datalog-like (bottom-up) rules, evaluated at update time. Running logic at update time, a practice known as denormalization, is common in applications that handle large datasets and particularly in conjunction with NoSQL databases [15, 31]. In this paper we show that Cloudlog is also capable of hosting internal DSLs. A host application hostApp is an implementation of a corresponding host language L 〈hostApp〉. If our host language is a data representation language, then the corresponding host application is a database. Specifically, if the host language is a LP data representation language such as Cloudlog, the corresponding host application is a deductive database. In section 4 we present a concrete host application, FishTank, such that L 〈FishTank〉 = Cloudlog. In addition to being a database, a host application must also be able to store and serve static content (HTML, CSS, images, and JavaScript files) which it receives from developers, and provide access to the database through HTTP calls. A host application 2-11 Application Embedding: A Language Approach to Declarative Web Programming 4 FishTank: A Concrete Host Application To validate our approach we introduce FishTank, a host application we have implemented as proof-of-concept, and explain its underlying LP computational model—the Fish-Tank Model (FTM). The novelty of FTM is not in the result of the computation, which is a derivation of theorems from axioms through Modus Ponens (MP), but rather its unique imperative behavior, namely an explicit choice by the users of this model between update-time and query-time evaluation for each rule. For the sake of clarity, we describe this model in three steps, starting with a simplified model that only supports update-time evaluation (section 4.1), continuing to the complete theoretical model also supporting query-time evaluation as well as application of arbitrary logic at update time (section 4.2), and finally, posing constraints on the theoretical model to make it adequate for an efficient implementation (section 4.3). After that we discuss the design and implementation of FishTank, our proof-of-concept implementation of this model (section 4.4). 4.1 A Simplified FTM FTM is a computational model based on LP. 12 It is based on the notion of a container (the “tank”) that, at any given point in time, contains a set of logic axioms (the “fish”). These axioms can be facts (male fish)—first-order-logic atoms, rules (female fish) of the form F → A where F is an atom (corresponding to a fact) and A is an axiom of any kind, and clauses (infertile fish), which are discussed in section 4.2. 13 When a fact is added to the fish-tank, all matching rules are located and applied to that fact through MP. The resulting axiom from each match is recursively added to the fish-tank. Similarly, when a rule is added, it is applied to all matching facts in the fish-tank, and all resulting axioms are added. When a fact or a rule are removed from the tank all descendant axioms are removed as well. Properties This simple model has a few important properties. First, it is declarative. The symmetry between facts and rules, in conjunction with the symmetry between insertion and removal, guarantees that when this system comes into a steady state, the contents of the container is a closure (over MP) of the original set of axioms that were inserted but not removed, regardless of the order in which these operations were applied. Second, under some simplifying assumptions discussed in section 4.3, this model can be implemented to provide efficient storage and retrieval for large datasets. Retrieval starts with a query term (an atom), looking for either facts that are potentially unifiable with it, or rules that can be applied to such facts. Retrieval is the key for both querying the state of the container and for finding possible matches 12 We call this model the Fish-Tank Model due to the spontaneous nature in which facts and rules interact to create new axioms, like male and female fish spontaneously finding each other to produce offsprings in a fish-tank. 13 Here we give an intuitive high level description of the computation model. The precise and complete definition of the FTM is provided in appendix B. 2-12 D. H. Lorenz and B. Rosenan for inserted rules or facts. Third, this model is scale-friendly. Since it does not provide global atomicity, there is no single point of failure or no inherent global bottleneck limiting scalability. The question remains, is this model powerful enough to represent the business logic of any application? The simplified FTM presented so far is somewhat limited. Consider for example a simple search engine built on top of the FTM. The input to this search engine is a set of facts representing documents that contain text, and the output is a result for a query that is given one or more keywords. The simplified FTM is missing two key capabilities to allow an efficient implementation of such an engine. The first is the ability to perform arbitrary logic (in this case, extraction of keywords from the text) when applying rules to facts. While such logic can be performed in our model, it will require the creation of at least one new axiom per each step of the parsing process, i.e., for each character in the text. Even if keywords are successfully extracted, multi-keyword searches (i.e., queries for documents containing all keywords within a given set) are inefficient under the simplified FTM. As we do not have access to the query itself when we prepare the results, it is not enough to index documents by each keyword they contain. We need to index each document by each possible combination of keywords.  Even if we limit the number of keywords in a search to k, we still need to have nk index entries per document (where n is the number of different words in the document). If we could apply logic at query-time, we could have held an index mapping single keywords to documents (k entries per document), and when searching for a combination of k keywords we would search for only one keyword, and then filter out results not containing the remaining k − 1 keywords. Limitations 4.2 The Complete FTM The complete FTM addresses the need for query-time logic by introducing dynamic clauses, predicates, and goals, and addresses the need for arbitrary logic at propagationtime by introducing guards. Facts and rules exist in the FTM to create dynamic clauses, which are consulted by queries. Dynamic clauses are axioms of the form H ` B , where H is an atomic dynamic goal, and B is a dynamic goal of any kind. Clauses, like rules, convey logical deduction. However, while rules are applied at update time, clauses are applied at query time. Dynamic clauses define dynamic predicates—predicates representing relations that change over time. This is in contrast to static predicates, which once defined, do not change. A dynamic predicate is expected to consist of a large number of clauses, each providing a separate set of results. In many cases, many of these clauses will be trivial, i.e., of the form H ← >, where > is the trivial goal. These are the cases where the propagation of rules and facts applied all the necessary logic. However, in cases where logic needs to be applied at query time (e.g., in multiple-keyword searches), a non-trivial body (B ) defines the steps necessary to find the results. Dynamic clauses, predicates, and goals 2-13 Application Embedding: A Language Approach to Declarative Web Programming In cases where non-trivial logic needs to be applied during the propagation of axioms, a guard, can be provided as a part of the rule. A rule is defined as F {G} → A, where G is a goal representing the guard (a rule of the form F → A is read as F {>} → A, where the guard is the trivial goal >). During the application of a rule to a fact, the fact’s guard is evaluated, and a resulting axiom is produced for every result of the guard. If the guard fails, no axioms will be produced even though the fact matched the left-hand side of the rule. If the guard succeeded multiple times, multiple axioms will be produced. In section 5 we use guards to index tweets in Tweetlog. The guard examines tweets and provides a result for each token in each tweet. As result, the rule produces a search result for each such token. Guards are required to be static goals, i.e., goals for which the set of results does not change over time, to ensure consistent behavior between additions and removals. When a fact is removed, all corresponding rules are applied to it to find out which other axioms also need to be removed. For each such application, the guard is consulted. If the guard behaved differently than the way it originally behaved when the fact (or the rule) were introduced, the removal would not have been complete. Guards 4.3 FTM Made Practical The complete FTM is a theoretical model. To make it practical and efficient, some simplifying assumptions on usage need to be made. We distinguish between two kinds of axioms: concrete and generic. Concrete facts are facts of the form f (t 1 , . . . , t n ), where t 1 is a ground term (a term that does not contain logic variables). A concrete rule is a rule of the form F {G} → A where F is a concrete fact. A concrete clause is a clause of the form p (t 1 . . . t n ) ` B , where t 1 is a ground term. Generic axioms are axioms that are not concrete. To promote efficient implementation we assume that there is a small number of generic axioms at any given time in the fish-tank, and that they are seldom added or removed. Intuitively, such axioms should be considered a part of the embedded application’s definition, and not a part of its state. The state should consist exclusively of concrete axioms. We also assume that the number of facts, rules, or clauses in the fish-tank, with a certain t 1 value, is bounded at any given time. Concrete axioms are indexed by the value of t 1 —their subject. When a concrete  fact f t 10 , . . . , t n0 is added to the fish-tank, matching rules are found by using t 10 as key. When a rule is added, matching facts are found the same way. Similarly, concrete queries will only consider concrete clauses they will find using the goal’s first argument. Generic axioms are harder to manage. Having variables in their first argument (or having a variable as first argument) there is no easy way to retrieve a bounded collection of matching axioms. As result, any update (addition or removal) of generic facts or rules requires processing all rules or facts (respectively) that share the same fact-name ( f ). While this process may take some time, it does not happen often. It occurs on software updates and resembles data migration that traditionally occurs in such events. Concreteness and indexing 2-14 D. H. Lorenz and B. Rosenan Figure 3 FishTank Architecture. R, N/E, and M respectively denote RabbitMQ, NodeJS/Ex- press, and MongoDB. 4.4 Design and Implementation Our proof-of-concept implementation of the FTM is called FishTank.14 FishTank’s architecture is based on MEAN [11]: MongoDB [3], Express,15 AngularJS, and NodeJS.16 This is a relatively new architecture for web applications that is designed for scale (the use of the NoSQL database MongoDB), and a single implementation language: JavaScript. We use an architecture designed for web applications because FishTank is a web application. Figure 3 shows the structure of a typical FishTank cluster. It consists of a MongoDB cluster (M-nodes), a RabbitMQ cluster (R-nodes) and an array of NodeJS/Express nodes (N/E nodes) connected to a load-balancer. The MongoDB cluster stores the axioms along with their multiplicity. 17 All facts with a certain first argument value, and all rules matching such facts are stored in the same MongoDB document. MongoDB guarantees atomic updates within a single document. This is important to avoid the chance that a fact and a rule, added to the database nearly at the same time, miss each other during propagation. Axioms resulting from applying rules to facts are not added directly, but instead are placed in a common work queue, maintained by the RabbitMQ cluster. 18 We do this to ensure low update latency. By placing these axioms in a highly-available queue we guarantee that these axioms will eventually be added to the database without having the user wait until this happens. Scalability and availability FishTank’s design follows the 3TA, with a separation, on the server-side, between the stateless N/E nodes, and the stateful (but application- 14 https://github.com/brosenan/fishtank http://expressjs.com/ 16 https://nodejs.org/ 17 Corresponds to T in appendix B.4. 18 Corresponds to Q in appendix B.4. 15 2-15 Application Embedding: A Language Approach to Declarative Web Programming agnostic) M-nodes and R-nodes. This separation allows us to use a large number of N/E nodes to address high load. Being stateless, they become redundant, so that if one of them crashes the load balancer can send subsequent requests to the other nodes and the service as a whole will remain available. MongoDB and RabbitMQ are both designed for scalability and availability, so the entire system will not fail due to a failure of a single M-node or R-node, or even multiple nodes (in most cases). Being based on the MEAN architecture, JavaScript plays an important role in the implementation of FishTank. FishTank is implemented as a server (over NodeJS and Express), and a client library, extending AngularJS. The server-side code is divided to JavaScript code, providing capabilities such as responding to HTTP requests and using MongoDB and RabbitMQ, and Cedalion [27] code, implementing the logic itself. We chose Cedalion due to its expressiveness and due to the facts it is a LP language, making it a natural choice for implementing a deductive database. To give a sense of size, the server-side implementation consists of ~1000 Cedalion statements (a typical Cedalion statement represents a few lines of code, but Cedalion uses projectional editing, so the classic measure of lines-of-code does not apply), and ~3000 lines of JavaScript code. Both include unit tests, which on the JavaScript side accounts for about half the code. The client-side library consists of ~650 lines of code, about half of which are unit tests. However, this library is currently very partial, implementing just enough functionality to support the implementation of Tweetlog. Implementation 5 Tweetlog: An Embedded Application We evaluate our approach by demonstrating that: (1) the FTM is powerful enough to allow non-trivial applications to be developed over it, and (2) the proposed separation of code assets successfully segregates all imperative code in the application-agnostic implementation of FishTank, so that all application-specific assets (on the server, and with small unavoidable exceptions, on the client) are declarative. We demonstrate both by presenting an implementation of Tweetlog 19 over FishTank. We show that this implementation closely relates to our definition of the corresponding L 〈Tweetlog〉. Figure 4 shows a screenshot of Tweetlog running on a web browser. The navigation bar at the top of the page allows users to log in (enter their user name) and to search for content. The page displayed in figure 4 is the timeline of user Foo, which is the page a user enters after logging in. This page shows the tweets the user registered to, and provides boxes for tweeting and for following users. On the left, the sidebar menu contains links to the timeline (this page), a page showing the tweets of the logged-in user, his or her followers and followees (followers and followees are not yet implemented), as well as an about page describing the application. 19 https://github.com/brosenan/tweetlog 2-16 D. H. Lorenz and B. Rosenan Figure 4 Screenshot of the Tweetlog application Figure 5 User Abstract Syntax Tweets are tokenized into words, hashtags, and user IDs. User IDs and hashtags become links to pages showing tweets related to a user or containing a hashtag, respectively. 5.1 Abstract Syntax We use Cedalion concept declarations [27] to define concepts in the abstract syntax of L 〈Tweetlog〉. For example, figure 5 shows a piece of L 〈Tweetlog〉’s abstract syntax. Statement 1 in figure 5 declares the type User, and statement 2 in figure 5 is equivalent to User = user (String) from equation (1). This declaration has two parts: a mandatory type signature (“where Name::string”) and an optional projection definition (“display as...”). That second part gives the user concept its concrete syntax within the context of L 〈Tweetlog〉’s definition, and allows it to display as @Name rather than user (Name). This projection definition helps making L 〈Tweetlog〉’s definition more concise and intuitive. However, in our current implementation we chose not to impose this concrete syntax on L 〈Tweetlog〉 users, and thus this concrete syntax is separated from the concrete syntax of L 〈Tweetlog〉, which is described next. 20 5.2 Concrete Syntax The concrete syntax of L 〈Tweetlog〉 is defined using templates embedded in the application’s main HTML file (index.html). Figure 6 shows the template defining the concrete syntax of user (String). It comes as a <script> element, of type ng−template, which is picked up by AngularJS. We add the clg−concept attribute to associate this template with the user concept from the abstract syntax. The user name is bound to User, that is used inside the template. 20 The complete abstract syntax can be found in figure 10. 2-17 Application Embedding: A Language Approach to Declarative Web Programming 1 <script type=”ng−template” clg−concept=”t:user(User)” id=”user”> 2 <span><a href=”{{url(’userTweets’,␣[User])}}”>@{{User}}</a></span> 3 </script> Figure 6 Concrete syntax for user (String) 1 <script type=”ng−template” clg−concept=”t:tweet(User,␣Tweet)” id=”tweet”> 2 <span clg−render−term=”User”></span>: <span clg−render−term=”Tweet”></span> 3 </script> Figure 7 Concrete syntax for tweet (User, Tweet) 1 <form> 2 <clg−fact pattern=”t:tweeted(t:user(User),␣Time,␣t:text(t:rawText(Tweet)))” 3 name=”tweet” 4 assign=”User:␣$session.user,␣Tweet:␣text,␣Time:␣now()”> 5 </clg−fact> 6 <input type=”text” ng−model=”text”> 7 <input type=”submit” ng−click=”add_tweet();␣text␣=␣’’” value=”Share!”> 8 </form> Figure 8 Form providing the tweeted (User, Time, Tweet) fact concrete syntax The template’s body is a <span> element, containing a link (<a>) linking to a page containing the tweets of the given user. The link is generated within the href attribute, using the {{...}} syntax. This syntax is replaced by AngularJS with the value to which the expression inside the braces evaluates to. In this case this is the url() function, which builds a URL using the given location and parameters. The text displayed in the link is a “@” followed by the name of the user. Figure 7 shows the concrete syntax of a timeline entry corresponding to a tweet, is another example for such template. This time, the arguments (a user ID and a tweet) are compound terms, that by themselves need to be expanded using other templates. The clg−render−term directive in the empty <span> element tells the FishTank client library to render the term held by this attribute (either the user ID or the tweet) in the enclosing <span> element by applying further templates to either the user ID or the tweet. The concrete syntax of an L 〈App〉 must also provide users ways to mutate the state of an application (section 2.3). Currently, our client-side library only supports addition of new facts. These are performed using the <clg−fact> directive. Figure 8 shows a form in which Tweetlog users can add textual tweets. The <clg−fact> directive takes a pattern (a Cloudlog term containing the pattern of facts to be created, where logic variables represent the data that changes), a name, that is later used to submit the new fact, and a variable assignment, mapping values from the AngularJS scope to the logic variables in the pattern. In this case, the pattern represents a textual tweet. The first <input> element is a text box in which the tweet text is placed. It uses an AngularJS ng−model directive to associate the value of the field to the scope variable 2-18 D. H. Lorenz and B. Rosenan Figure 9 Timeline semantics “text.” The second <input> element is a submit button, which upon clicking calls the add_tweet() method, a method added to the scope by the <clg−fact> directive. It also clears the text. Event handlers such as this ones are the only pieces of imperative code that exist in Tweetlog’s definition. Our design leaves client-side event handlers imperative since imperative programming provides the most expressive way to convey such actions. However, these pieces of code are very limited in their ability to affect the state of the application. The function add_tweet(), for example, takes no arguments, so the only thing it can convey is the desire to create a new tweet based on variables stored on the client. Other than that, event handlers are free to change the state of the client, as in clearing the text. 5.3 Semantics Figure 9 shows the definition at the heart of the Tweetlog application. Statement 1 in figure 9 represents the proc-tweet rule (equation (2)) from section 2.2. The axiom keyword tells us the rest of this statement is a Cloudlog axiom (a rule, in this case). A rule has three parts: (1) a fact to match (in this case, a tweet); (2) a guard, which is a Cedalion goal to be satisfied for each such fact (in this case, a conjunction of a goal unpacking and repacking the text from the tweet, and a goal tokenizing the text); and (3) an axiom to be created for each result emitted by the guard (in this case, a procTweet fact). Statement 2 in figure 9 indexes processed tweets by their content (the search1 rule, equation (3)), and statement 3 in figure 9 indexes processed tweets by the user who made them (the search2 rule, equation (4)). Note that both the tokenization and indexing of all tweets are done using rules, that operate upon insertion of tweets. Statement 4 in figure 9 defines the timeline predicate. This is a rule that emits a rule that emits a clause (with :- replacing ` in the syntax). The clause is trivial, with > as its body. Being dependent on two kinds of facts, this rule is similar to an SQL join. As in its specification (the time-line1 rule, equation (5)), it provides an entry in the timeline for each tweet associated with each followed user. By choosing between a rule and a (non-trivial) clause we get a choice of temporal order. The order we choose here is to start from a following relationship (to get the followee), go through all associated tweets, and then place them in the timeline. Like indexing, this too happens as tweets and following relationships are introduced, and the only thing 2-19 Application Embedding: A Language Approach to Declarative Web Programming happening when a user searches for his or her timeline is fetching all timeline clauses associated with the user. Note that the first argument in the timeline predicate is the user, so FishTank guarantees fast (O (1) I/O operations) access to it. 21 6 Discussion We have made certain simplifying assumptions concerning the manner in which FishTank is to be used, assumptions such as the number of generic axioms and the rate in which they are being updated (section 4.3). These assumptions have direct consequences in terms of applicability, correctness, and performance. 6.1 Applicability Many programming platforms, such as databases and programming languages, make simplifying assumptions on usage. Prolog, for example, indexes the clauses of predicates based on their first argument [20]. In doing so the language implementation assumes predicates with a large number of clauses are defined in a way such that the the first argument differs between different clauses, so that after applying the index, only a small number of clauses (typically one or zero) is left to be considered. This assumption is translated to a guideline for developers, to choose the first argument wisely. MongoDB assumes documents do not exceed a certain size. This restriction derives our restriction regarding the number of concrete facts and rules with a certain t 1 value. In MongoDB itself, this assumption becomes a guideline (one of many) for data modeling. 22 Similar to Prolog and MongoDB, we treat the assumptions made by FishTank to be guidelines for users to structure their facts and rules in a certain way. The first argument of facts should convey their subject—an entity they describe. All facts and rules that are considered user data should relate to a subject. The cap on the number of facts and rules with a certain t 1 value maps to a cap on the number of facts describing that subject. For example, in Tweetlog we use the user ID as the subject for timeline entries. If the number of expected timeline entries per user exceeds what is allowed in FishTank, a different subject needs to be chosen. One possibility is the pair (user, day), where day is the event’s timestamp integer-divided by the number of seconds in a day. This creates subjects that are both small enough to comply with the restriction, but at the same time relevant in the sense that we will usually query all entries with a certain subject together. The only kinds of facts and rules that cannot be associated with a specific entity are those that speak of data in general—the generic axioms that make up the definition 21 22 To complete the semantics, the tokenization rules (figure 11) are implemented using a pre-existing DSL (figure 14). https://docs.mongodb.com/v3.2/core/data-modeling-introduction/ 2-20 D. H. Lorenz and B. Rosenan of the application. The definition of an application is typically significantly smaller than its data, and changes only on software updates, which are usually significantly less rapid than user data updates. 6.2 Correctness The correctness requirement for FishTank seems obvious: queries should be evaluated by taking into account all facts and rules added to the database (and not removed from it) until the time of the query, and should be evaluated following Cloudlog’s semantics. However, since we are talking about a large, distributed system, the notion of time is not exact. In a distributed system, every computer node has its own time and as a result a fact that is added to the database on one node is not known the same exact moment to all nodes. Synchronizing all nodes by means of, e.g., ACID (Atomic, Consistent, Isolated, and Durable) transactions can help, but will inhibit the scalablility of the system. We therefore require eventual delivery, that is, if we stop updating the database at one point, the database will come to rest in a situation where all facts and rules are taken into account by all queries. Although this seems simple enough, there is one special case to watch for. If a fact and a matching rule are added to the database at around the same time, the new rule, which is supposed to be applied to all existing facts, might not yet be aware of the new fact being added. Likewise, the new fact may not be aware of the new rule. In such case, the fact and rule will miss each other and queries will not see their mutual product. To overcome this problem our design uses a strongly consistent database (MongoDB). Strongly consistent databases do not guarantee global sequentiality, but do provide local sequentiality. In MongoDB’s case, all operations performed on a single document are guaranteed to be sequential. We leverage this property to achieve correctness by storing all concrete facts and rules of the same subject (which are thus candidates for being matches of each other) in the same document. By doing this we make sure that when adding a fact we are aware of all matching rules and vice versa. 23 6.3 Performance table 2 summarizes the performance we require of our implementation. All user operations (adding or removing facts and queries for pre-calculated data) are completed after performing a constant-bound number of I/O operations, taking time linear by either the number of the results (in a query) or the number of rules matching the fact being added or removed (in an update). We allow an update operation to continue propagating asynchronously after notifying the user of its success, as long as we can guarantee delivery. That is, as long as we verified that the update does not conflict 23 Strong consistency also solves the correctness problem for generic facts and rules, but the mechanism to support that is more complicated and beyond the scope of this paper. 2-21 Application Embedding: A Language Approach to Declarative Web Programming Operation Synchronous I/O Ops Time Asynchronous I/O Ops Time Add/Remove concrete fact/rule Query de-normalized goal Add/Remove generic fact/rule O (1) O (n) O (n) O (n) O (1) O (n) N/A N/A O (N ) O (N ) O (N n) O (N n) Table 2 Performance requirements. n is the number of axioms involved in a query or update. N is the number of axioms in the database. with any previous updates, and that the necessary actions were logged to a commit log. We achieve that by using a reliable work queue (RabbitMQ). Adding or removing a concrete fact or rule is done by accessing a single MongoDB document (using O (1) I/O operations), querying all matching rules or facts (n). We then apply them to one another (O (n) time) to receive a set of facts and rules to be added or removed. Instead of adding or removing these directly we defer these operations to the work queue (O (1) I/O operations, O (n) time) and once acknowledged by the queue we acknowledge making the change. Adding or removing generic axioms requires walking through all existing concrete facts and rules, looking for matches. We allow them to take O (N ) time, with N representing the overall number of axioms in the database. It is acceptable for these operations to take a long time as they are only done when the L 〈App〉’s definition changes, i.e., on application software upgrades. This is similar to data migration operations that are performed when upgrading the software of a traditional web applications. MongoDB uses locks to synchronize operations done in the scope of a single document. We rely on this synchronization for correctness. However, under some conditions, these locks can result in congestion, which will increase query and update time beyond the desired asymptotic requirements listed in table 2. For example, if m clients are trying to access (query or update) the same subject (a certain value of t 1 mapped to a single MongoDB document) at the same time, the locking itself will take O (mn) time on average (waiting for O (m) operations taking O (n) time each to complete), exceeding the O (n) requirement. However, we make the assumption that only a constant-bound number of operations is done at one time on a single subject. As further discussed in section 6.1, this assumption becomes a guideline for developers. For example, using a user ID as a part of the subject key (as in our example from section 6.1 of using (user, day)) can help ensure constant-bound parallel accesses, given that a single user does not make a large number of updates and queries in parallel. 7 Related Work Most relevant related work include other approaches that can be considered application embedding, and multi-tier or tierless approaches for deploying code on multiple tiers from a single, coherent code artifact. 2-22 D. H. Lorenz and B. Rosenan 7.1 Application Embedding Content Management Systems (CMSs, discussed in section 3.1) are host applications that allow users to build websites, which are stored as user data and served from within the CMS. Websites are typically very easy to build on top of CMSs, as the user does not need to worry about most technical aspects. However, such websites are bound to restriction posed by the CMS, which apply to both the website’s graphical design and its functionality. Functionality is typically very limited in these systems, as they do not provide any programmability to users. Apache CouchDB [1] is a NoSQL database that acts as a host application for embedded CouchApps. 24 It is a document store, storing JSON objects (documents). Its distinctive feature, however, in relation to other NoSQL document stores such as MongoDB, is a special kind of documents, known as design documents, that can be stored as a part of the state of a database. These documents contain JavaScript code that augments the database behavior. Most prominently, a design document can define views. Each view is defined using a JavaScript map function and optionally a reduce function. Unlike map/reduce capabilities that exist as a query feature in other NoSQL databases (such as MongoDB), in CouchDB a view is a part of the state of the database. This has interesting consequences. It allows map and reduce operations to be performed incrementally on a materialized view. This means that the view data is stored as a B+ tree, one tree per view. When a new document is added to the database the map function in each view is invoked on it to emit zero or more key/value pairs into the tree. When a document is deleted from the database the map functions are invoked once more to find view elements to be removed. The reduce function calculates aggregated values for each affected node in the tree. The result is automated denormalization of the database. To our knowledge, with the exception of FishTank, CouchDB is the only other database that has such support. CouchDB’s map functions are similar to rules in Cloudlog and the FTM. They take a subset of the facts in the database (JSON documents) and map them into other facts (key/value pairs in the view tree). However, this cannot be used for denormalized joins such as the one in statement 4 in figure 9. There are two inhibitors: (1) derived facts (key/value pairs emitted by a map function) go into a dedicated view tree, and not the general database, and therefore do not trigger further map function invocations, and (2) rules cannot emit other rules. As a consequence, each key/value pair in a view tree is based on exactly one raw document. In this, the FTM and FishTank represent a more powerful approach. 7.2 Multi-Tier Programming HOP [36] is a programming language that extends JavaScript with multi-tier features. A HOP program consists of services, which run on the server. Service code can contain client-side calls, with special syntax distinguishing between the two. Such code can 24 http://docs.couchdb.org/en/1.6.1/couchapp/ 2-23 Application Embedding: A Language Approach to Declarative Web Programming appear in handlers for HTML events (HTML code can be embedded in HOP service code). Similarly, server-side code can be embedded in client-side code using different syntax. In both cases, HOP hides the necessary communication from the developer. Stips.js [32] is a tier-splitting process that splits a single JavaScript program into two separate programs, one running on the server and the other running on the client. The separation between client and server is made explicit by using special comments (@client and @server), but client code can call functions defined in the server code. The goal behind HOP and Stips.js is to alleviate the dichotomy between the presentation-tier and the logic-tier. WebDSL [22], Ur/Web [7], and Links [9] go beyond that, and add the logic-tier to the mix, by adding support for schema definition and queries as a part of the language. An Ur/Web program, for example, will run on the logic tier, but will send JavaScript code to the presentation-tier, and SQL code to the data-tier. Its type system provides strong guarantees for the consistency between these artifact, making sure that, e.g., type validation in the presentation-tier is consistent with the type the same variable is given in the database schema. While tierless programming aims to alleviate the dichotomy between the different tiers (e.g., between the logic-tier and the data-tier), application embedding aims to alleviate the dichotomy between the tenants of these tiers, namely the business logic and the data, by treating the business logic as data. Multi-tier programming hides the immediate imperative aspects that are a direct consequence of the 3TA, namely the communication between the tiers. HOP and Stips.js allow client-side code to call server-side code (and in HOP’s case, vice versa) in a way that resembles a regular function call. WebDSL, Ur/Web, and Links also provide a seamless integration to a database, in which the programmer is not concerned about creating a database connection or making SQL calls, but instead writes the application in a way that (in the case of Ur/Web and Links) weaves SQL queries in other code (e.g., in HTML fragments), or (in the case of WebDSL) associates data entities to output formatting. However, multi-tier programming platforms do not inherently result in declarative programming. The manipulation of state remains imperative with these approaches. WebDSL includes a Java-like imperative programming language defined purely for the purpose of manipulating state. It treats entities as objects (hiding the fact they are stored on the logic-tier), but not hiding its imperative nature. Ur/Web and Links both depend on the declarative nature of SQL and HTML to allow applications to be defined in a mostly declarative manner, as long as their data model maps cleanly to a relational data model. For example, a micro-blogging application similar to Tweetlog could be defined in Ur/Web and Links in a declarative way, similar to our own implementation, as long as (1) it supported only one kind of tweets (e.g., textual tweets only), and (2) it did not need any kind of denormalization. In such settings, the timeline would have been defined using HTML wrapped in a declarative SQL select query, which conveys the business logic in this case. However, if we add a requirement to support, e.g., image tweets (as we do in Tweetlog), the database schema and SQL query become significantly more complex. This is due to a problem known as the impedance mismatch [35]—a mismatch between 2-24 D. H. Lorenz and B. Rosenan what the domain object model requires, and what the relational model provides. The domain object model in this case includes polymorphism, in which textual and image tweets share some functionality and differ in some particular aspects. However, the relational model does not support polymorphism out of the box. By supporting compound terms, Cloudlog does support polymorphism. The introduction of denormalization, which is often necessary to keep query time independent of the overall size of the data, is another case where mult-tier programming does not provide an advantage. Without support for denormalization, applications written in Ur/Web, Links, and WebDSL will all need to maintain the redundant information explicitly, at update time, using imperative code. FishTank, on the other hand, performs this kind of work automatically, based on declarative rules. 8 Conclusion In this paper we describe application embedding, a novel approach to the development of web applications. With our approach the complete application is divided into two separate applications: a host application and an embedded application. The former is implemented using general-purpose, often imperative programming languages, while the latter is written in a declarative programming language. The host application is general-purpose, making it suitable for, and thus reusable across multiple applications. Our approach is rooted in the field of language engineering. It is based on a twostep thought process, in which the first draws a mapping between web applications and programming languages, and the second uses this mapping to find the novel equivalent of DSL embedding: application embedding. As validation we provide an implementation of an application, in two parts. A reusable host application named FishTank, and an example embedded application named Tweetlog. Tweetlog’s code is almost entirely declarative, consisting of a definition of the business logic in the form of logic rules, and the presentation given as HTML with directives defining data bindings. The only imperative parts are expressions associated with user events, as discussed in section 5.2. FishTank’s code is much more complicated, but it is general-purpose by design, so that it can be used to implement potentially many different applications. Establishing this by embedding several other applications over it, however, is a topic left for future work. One important aspect not addressed by our proof-of-concept implementation of FishTank is access control. We expect a real-life host application to address access control by authenticating users using their identity to derive their rights. In previous work [28] we describe how Cloudlog can be extended to address access control, an important part of the business logic of applications. Modern web applications are complicated. Developing a feature-rich, stable, usable application requires versatile skills. Today, web application developers are required to do everything. With lack of separation of concerns, the implementation of the business logic of a specific application is often tangled with, e.g., scalability, availability, and consistency considerations, which are often not easy to master. The separation of code assets presented in this paper decouples these concerns from any particular 2-25 Application Embedding: A Language Approach to Declarative Web Programming application specific concerns, thus allowing collaboration between teams and even companies (e.g., through open-source development) to build better host applications for everyone to benefit. This research was supported in part by the Israel Science Foundation (ISF) under grant No. 1440/14. Acknowledgements References [1] J. Chris Anderson, Jan Lehnardt, and Noah Slater. CouchDB: The Definitive Guide. O’Reilly, 1 edition, 2010. [2] Ken Arnold and James Gosling. The Java Programming Language. The Java Series. Addison-Wesley, 1996. [3] Kyle Banker. MongoDB in Action. Manning Publications Co., Greenwich, CT, USA, 2011. [4] Henk Barendregt. Self-interpretation in lambda calculus. Journal of Functional Programming, 1(2):229–234, April 1991. [5] Ivan Bratko. Prolog Programming for Artificial Intelligence. Addison-Wesley, 2001. [6] Stefano Ceri, Georg Gottlob, and Letizia Tanca. Logic programming and databases. Surveys in Computer Science. Springer-Verlag, 1990. doi:10.1007/978-3-642-839528. [7] Adam Chlipala. Ur/Web: A simple model for programming the web. In Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Simposium on Principles of Programming Languages (POPL’15), pages 153–165, Mumbai, India, January 2015. ACM Press. doi:10.1145/2676726.2677004. [8] William F. Clocksin and Christopher C. Mellish. Programming in Prolog. Springer Verlag, Berlin Heidelberg, 1st edition, 1981. doi:10.1007/978-3-642-96661-3. [9] Ezra Cooper, Sam Lindley, Philip Wadler, and Jeremy Yallop. Links: Web programming without tiers. In Proceedings of the 5th International Symposium on Formal Methods for Components and Objects (FMCO 2006), number 4709 in Lecture Notes in Computer Science, pages 266–296, Amsterdam, The Netherlands, November 2007. Springer Verlag. doi:10.1007/978-3-540-74792-5_12. [10] H. Conrad Cunningham. A little language for surveys: constructing an internal DSL in Ruby. In Proceedings of the 46th ACM Annual Southeast Conference (ACMSE’08), pages 282–287, Auburn, Alabama, March 2008. ACM Press. [11] Scott Davis. Architecture of the MEAN Stack: Exploring the New Web Dev Tools: MongoDB, ExpressJS, AngularJS, PNodeJS. O’Reilly Media, 2015. [12] Pierre Deransart, Laurent Cervoni, and AbdelAli Ed-Dbali. Prolog: The Standard: reference manual. Springer-Verlag, London, UK, 1996. [13] Wayne W. Eckerson. Three tier client/server architectures: Achieving scalability, performance, and efficiency in client/server applications. Open Information Systems, 3(20):46–50, 1995. 2-26 D. H. Lorenz and B. Rosenan [14] Sebastian Erdweg, Tijs Storm, Markus Völter, Meinte Boersma, Remi Bosman, William R. Cook, Albert Gerritsen, Angelo Hulshout, Steven Kelly, Alex Loh, Gabriël D. P. Konat, Pedro J. Molina, Martin Palatnik, Risto Pohjonen, Eugen Schindler, Klemens Schindler, Riccardo Solmi, Vlad A. Vergu, Eelco Visser, Kevin Vlist, Guido H. Wachsmuth, and Jimi Woning. The state of the art in language workbenches - conclusions from the language workbench challenge. In Martin Erwig, Richard F. Paige, and Eric Wyk, editors, Proceedings of the 6th International Conference on Software Language Engineering (SLE 2013), number 8225 in Lecture Notes in Computer Science, pages 197–217, Indianapolis, IN, USA, October 2013. SLE 2013, Springer. doi:10.1007/978-3-319-02654-1_11. [15] Eric Evans. Cassandra by example, May 2010. http://www.rackspace.com/blog/ cassandra-by-example/. [16] David Flanagan. JavaScript: the definitive guide. O’Reilly Media, Inc., 6 edition, 2011. [17] Matthew Flatt. Creating languages in Racket. Commun. ACM, 55(1):48–56, January 2012. doi:10.1145/2063176.2063195. [18] Martin Fowler. Projectional editing. Martin Fowler’s Bliki. http://martinfowler.com/bliki/ProjectionalEditing.htmlx. [19] Martin Fowler. Language workbenches: The killer-app for domain specific languages, 2005. [20] John Gabriel, Tim Lindholm, EL Lusk, and Ross A Overbeek. A tutorial on the Warren abstract machine for computational logic. Argonne National Laboratory, 1985. [21] Jeremy Gibbons and Nicolas Wu. Folding domain-specific languages: Deep and shallow embeddings (functional pearl). In Proceedings of the 19 th ACM SIGPLAN International Conference on Functional Programming (ICFP ’14), pages 339–347, Gothenburg, Sweden, September 2014. ACM. doi:10.1145/2628136.2628138. [22] Zef Hemel, Danny M. Groenewegen, Lennart C.L. Kats, and Eelco Visser. Static consistency checking of web applications with WebDSL. Journal of Symbolic Computation, 46(2):150–182, 2011. doi:http://dx.doi.org/10.1016/j.jsc.2010.08.006. [23] Paul Hudak. Building domain-specific embedded languages. ACM Computing Surveys (CSUR), 28(4es), December 1996. doi:10.1145/242224.242477. [24] Neil D. Jones and Alan Mycroft. Stepwise development of operational and denotational semantics for Prolog. In 1984 International Symposium on Logic Programming, Atlantic City, February 1984. [25] Gilles Kahn. Natural semantics. In Proceedings of the Annual Symposium on Theoretical Aspects of Computer Science, number 247 in Lecture Notes in Computer Science, pages 22–39. Springer-Verlag, 1987. [26] Rasmus Jay Lerdorf, Kevin Tatroe, Bob Kaehms, and Ric McGredy. Programming PHP. O’Reilly & Associates, Inc., Sebastopol, CA, USA, March 2002. [27] David H. Lorenz and Boaz Rosenan. Cedalion: A language for language oriented programming. In Proceedings of the 26th Annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA’11), 2-27 Application Embedding: A Language Approach to Declarative Web Programming [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [38] [39] pages 733–752, Portland, Oregon, USA, October 2011. ACM. doi:http://doi.acm. org/10.1145/2048066.2048123. David H. Lorenz and Boaz Rosenan. Separation of powers in the cloud: Where applications and users become peers. In Proceedings of the 2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software (Onward! 2015), pages 146–159, Pittsburgh, PA, USA, October 2015. ACM. doi:10.1145/2814228.2814237. Tim Menzies. DSLs: A logical approach, 2001. Lecture Notes, EECE 571F, http: //courses.ece.ubc.ca/571f/lectures.html. Tim Menzies, John Black, , Joel Fleming, , and Murray Dean. An expert system for raising pigs. In The First Conference on Practical Applications of Prolog (PAP’92), 1992. Jay Patel. Cassandra data modeling best practices, part 1, July 2012. http://www. ebaytechblog.com/2012/07/16/cassandra-data-modeling-best-practices-part-1/. Laure Philips, Wolfgang De Meuter, and Coen De Roover. Poster: Tierless programming in JavaScript. In Proceedings of the 37th International Conference on Software Engineering (ICSE’15), pages 831–832, Florence, Italy, 2015. IEEE. Raghu Ramakrishnan and Jeffrey D. Ullman. A survey of deductive database systems. The Journal of Logic Programming, 23(2):125–149, 1995. doi:10.1016/07431066(94)00039-9. Lukas Renggli and Tudor Gîrba. Why Smalltalk wins the host languages shootout. In Proceedings of the International Workshop on Smalltalk Technologies (IWST’09), pages 107–113, New York, NY, USA, 2009. ACM. doi:10.1145/1735935.1735954. Pramod J Sadalage and Martin Fowler. NoSQL distilled: a brief guide to the emerging world of polyglot persistence. Addison-Wesley, 2012. Manuel Serrano, Erick Gallesio, and Florian Loitsch. Hop, a language for programming the Web 2.0. In Proceedings of the 1st Dynamic Languages Symposium (DLS’06), Portland, Oregon, USA, October 2006. David Thomas and Andrew Hunt. Programming Ruby: the pragmatic programmer’s guide. Addison-Wesley, 2000. John Von Neumann. First draft of a report on the EDVAC. IEEE Annals of the History of Computing, 15(4), October 1993. Reprint of original typescript draft, June 30, 1945. doi:10.1109/85.238389. Eric Walkingshaw and Klaus Ostermann. Projectional editing of variational software. SIGPLAN Not., 50(3):29–38, September 2014. doi:10.1145/2775053. 2658766. 2-28 D. H. Lorenz and B. Rosenan S = | | | | User = Tweet = | Text = | Time = TimelineElem = | Token = | | Figure 10 A tweeted (User, Time, Tweet) follows (User, User, Time) timeline (User, Time, TimelineElem) procTweet (User, Time, Tweet) searchIndex (Token, Time, Tweet) user (String) text (Text) image (Binary, Text) plain (String) tokenized (List (Token)) Number tweet (User, Tweet) follolwingYou (User) word (String) userID (String) hashtag (String) Abstract syntax grammar for L 〈Tweetlog〉 A Language Specification for L 〈Tweetlog〉 A.1 Abstract Syntax Tweetlog’s state is represented as a set P of statements S. We use algebraic data types to define S, providing its abstract grammar (figure 10). A statement S ∈ P can be either a tweet (tweeted (User, Time, Tweet)), indicating a user tweeted some tweet at a certain time, a following relationship (follows (User, User, Time)), indicating that one user started following another at a certain time, a timeline entry of the form timeline (User, Time, TimelineElem), indicating that a certain timeline element is in one user’s timeline corresponding to a certain point in time, or either a processed tweet of the form procTweet (User, Time, Tweet), or a search index item of the form searchIndex (Token, Time, Tweet), which are discussed later. A tweet can either be textual (text (Text)) or image (image (Binary, Text)) containing the image’s binary content and some caption text. Text is either a plain string or a tokenized text consisting of a list of tokens: simple words, hashtags, and user IDs. A timeline entry is either a tweet or an indication that a user is following the timeline’s owner. A.2 Semantics We define the semantics for L 〈Tweetlog〉 using Natural Semantics [25] (big-step structural operational semantics). This representation is considered effective for specifying purely-declarative languages, where the evaluation order is not a part of 2-29 Application Embedding: A Language Approach to Declarative Web Programming tokens ([]) tokens (t : ts) whitespace whitespace token (word ([])) token (word (c : cs)) wordchar (c) token (hashtag (t)) token (userID (u)) ::= ::= ::= ::= ::= ::= ::= ::= ::= " token (t) whitespace tokens (ts) " 00 whitespace " wordchar (c) token (word (cs)) c where c ∈ / 0 0 ,0 @0 ,0 #0 0 0 # token (word (t)) 0 0 @ token (word (u)) Figure 11 BNF definition of a grammar for tokens the semantics. We use the predicate P |= S to denote that statement S is true under program P . Trivially, a statement is true under a program if it is stated by the program: S∈P P |= S We begin our semantic definition by defining processed tweets: P |= tweeted (U, τ, T )   replaceText T, plain (X ) , tokenized X0 , T0   parse tokens X 0 , X , "  proc-tweet P |= procTweet U, τ, T 0 (6) A processed tweet exists for each (raw) tweet, such that its underlying text is tokenized. replaceText T, X , X 0 , T 0 is a judgment that replaces the text in a tweet according to tweet type, and is defined as follows: replaceText (text (T ) , T, T 0 , text (T 0 )) repl-texttext (7) repl-textimg (8) replaceText (image (B, T ) , T, T 0 , image (B, T 0 ))   parse tokens X 0 , X , " is a judgement that relates string X with a list of its tokens: words, hashtags and user IDs. Tokenization is done using the BNF-like context-free rules in figure 11. The semantics of these rules is given in figure 12. What we did here was define a DSL (BNF) to assist us in defining the semantics for L 〈Tweetlog〉. We call such DSLs helper DSLs. One more thing to note here is that although we parse a string, this part of L 〈Tweetlog〉 is not its concrete syntax, but rather a part of its semantics. This is so because parsing is a part of what Tweetlog needs to do, i.e., a part of its business logic. This tokenization will later be given concrete syntax, e.g., by treating user IDs and hashtags as links. 2-30 D. H. Lorenz and B. Rosenan parse (", S, S) parseempty parse (A, S, R1 ) (9) parse (B, R1 , R) parse (A B, S, R) parse (c, c : R, R) (10) parsetoken P parse (c where P, c : R, R) T ::= T 0 parseseq parsewhere parse T 0 , S, R parse (T, S, R) (11) (12)  parsedef (13) Figure 12 The semantics of the BNF-like DSL Now that we have a tokenized tweet, we can define a search index for tweets. Generally, a tweet can be searched by any of its tokens: P |= procTweet (U, τ, T ) replaceText (T, tokenized (X ) , tokenized (X ) , T ) P |= searchIndex (ξ, τ, T ) ξ∈X (14) search1 As a special case, tweets can also be found by searching the user who tweeted them: P |= procTweet (U, τ, T ) search2 P |= searchIndex (userID (U) , τ, T ) (15) Now we are ready to define the timeline. A timeline of user U1 contains all tweets related to user U2 if user U1 follows user U2 . P |= follows U1 , user (U2 ) , τ0  P |= searchIndex (userID (U2 ) , τ, T ) P |= timeline (U1 , τ, tweet (U2 , T )) time-line1 (16) Additionally, U1 ’s timeline also contains entries for each user U2 following U1 : P |= follows (U2 , U1 , τ) P |= timeline (U1 , τ, followingYou (U2 )) time-line2 2-31 (17) Application Embedding: A Language Approach to Declarative Web Programming B Semantics for the Fish-Tank Model B.1 Abstract Syntax A logic term is a compound term, consisting of a name and zero or more child terms, or a number, or a string, or a logic variable: term = | | | name (term, . . . , term) number string variable A static goal is an atom, consisting of a predicate name (pred) and zero or more argument terms, or a conjunction of goals (∧), or a negation of a goal (¬), or the trivial goal >. goal = | | | pred (term, . . . , term) goal ∧ goal ¬goal > A (static) clause consists of an atom (head) and a (static) goal (body): clause = pred (term, . . . , term) ` goal A dynamic goal (dgoal) is an atom, consisting of a dynamic predicate name and zero or more argument terms, or a conjunction of dynamic goals, or a negation of a dynamic goal, or a reference to a static goal: dgoal = | | | dpred (term, . . . , term) dgoal ∧ dgoal ¬dgoal s (goal) A dynamic clause (dclause) consists of a (dynamic) atom as head, and a dynamic goal as body: dclause = dpred (term, . . . , term) ` dgoal Finally, an axiom is a dynamic clause, or a fact, consisting of a name (factname) and zero or more argument terms, or a rule, which consisting of a fact-name with arguments as trigger, a goal as guard, and an axiom as consequence. axiom = dclause | factname (term, . . . , term) | factname (term, . . . , term) {goal} → axiom 2-32 D. H. Lorenz and B. Rosenan B.2 Static Goal Semantics The semantics of static goal G is given by the judgment S |= G , where S is a set of static clauses. Their semantics is given by the following rules. > is a goal that succeeds unconditionally: S |= > static> A conjunction of two goals succeeds if both goals succeed under S : S |= G1 S |= G2 static∧ S |= G1 ∧ G2 A negation of a goal succeed if and only if the goal fails under S : ¬ (S |= G) static¬ S |= ¬G An atom succeeds if there exists a clause having that atom as head, for which the body succeeds under S :  G ` G 0 ∈ S S |= G 0 staticG S |= G These rules provide big-step operational semantics, ignoring the order of execution, and we bring them here for simplicity. For execution order see Prolog’s operational semantics [24]. B.3 Axiom Semantics The foundation of the fish-tank model is the derivation of axioms from pairs of axioms through derivation rules based on Modus Ponens. We define the relation 〈α, β, S〉 → γ, denoted γ is derived from α and β under S , as follows: fact (α) β = α {G} → γ S |= G 〈α, β, S〉 → γ fact (β) α = β {G} → γ 〈α, β, S〉 → γ S |= G deriveαF deriveαR These two rules represent the cases where α is a fact and where α is a rule, respectively. The judgment fact (α) is successful if and only if α is a fact. The judgment S |= G can have zero or more solutions (with different assignments to the variables in G , which may be shared with γ), yielding potentially different results. 2-33 Application Embedding: A Language Approach to Declarative Web Programming B.4 State of the Fish-Tank The state of the fish-tank is represented by a tuple (S, T, Q), where S ⊆ {clause} is a set of (static) clauses ({clause} here denotes the set of all clauses), T ⊆ {axiom} × Z is a set of tuples (α, n) where α is an axiom and n is an integer indicating how many times α exists in the fish-tank, and Q ∈({axiom} × Z)∗ is a sequence of such (α, n) pairs. Adding and removing occurrences of axioms to and from sets is done using the add function, defined as follows: (α, n) ∈ T add1 add (T, α, m) = T \ (α, n) ∪ {(α, n + m)} ∀n ∈ Z, (α, n) ∈ /T add2 add (T, α, m) = T ∪ {(α, m)} An insertion of axiom α to the tank is done by appending a request to add the axiom with multiplicity 1 to Q: ins ins(α) (S, T, Q) ⇒ (S, T, 〈Q, (α, 1)〉) Similarly, removal of axiom α from the tank is appending a request to subtract 1 from α’s value: rem rem(α) (S, T, Q) ⇒ (S, T, 〈Q, (α, −1)〉) The fish-tank is updated spontaneously, removing the first element from Q and applying it to T . During that process, derived axioms are identified and placed back to Q. Q = (α, n) , Q0 Q00 = 〈(γ, n × m) | (β, m) ∈ seq (T ) ∧ 〈α, β, S〉 → γ〉 (S, T, Q) ⇒ (S, add (T, α, n) , 〈Q0 , Q00 〉) tick The interesting part of the tick rule above is the calculation of the suffix Q00 we add to Q. We calculate it using sequence comprehension. To calculate Q00 we first look for all elements of the form (β, m) in T , where β can interact with α to produce γ. The seq function here turns a set into a sequence, choosing an arbitrary order. Each derived axiom γ is added with multiplicity n × m, representing the amount of occurrences it would have if n occurrences of α interacted with m occurrences of β . The tick rule is applied continuously, as long as Q is not empty, updating T gradually. B.5 Dynamic Goal Semantics The state of the fish-tank is visible from the outside by applying queries on dynamic goals. We use the judgment (S, T, Q) |= G d to denote that dynamic goal G d succeeds under state (S, T, Q). A dynamic goal referencing a static goal succeeds if and only if the static goal succeeds under S : S |= G querys (S, T, Q) |= s (G) 2-34 D. H. Lorenz and B. Rosenan A conjunction of dynamic goals succeeds if both goals succeed under the tank’s state: (S, T, Q) |= G1d (S, T, Q) |= G2d (S, T, Q) |= G1d ∧ G2d query∧ Here too we give big-step operational semantics, leaving the order of execution undefined for simplicity of presentation. Here too the operational semantics of Prolog provides a good reference for this. Atomic goals depend on the existence of matching dynamic clauses in T . For such clauses we check that their multiplicity is positive (i.e., they actually exist in the tank) and that their body holds under the tank’s state.  G1d ← G2d , n ∈ T n > 0 (S, T, Q) |= G2d query← (S, T, Q) |= G1d 2-35 Application Embedding: A Language Approach to Declarative Web Programming Figure 13 The abstract syntax of L 〈Tweetlog〉 as a collection of Cedalion type declarations C Code Snippets from the Implementation of Tweetlog The abstract syntax of L 〈Tweetlog〉 as a collection of Cedalion type declarations is shown in figure 13, matching the order of definitions in appendix A.1. Part of the semantics of L 〈Tweetlog〉 defining the tokenization of tweets is shown in figure 14. 2-36 D. H. Lorenz and B. Rosenan Figure 14 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Part of the semantics of L 〈Tweetlog〉 defining the tokenization of tweets. Based on an existing Cedalion DSL for parsing and tokenization, with semantics similar to the one depicted in figure 12. 1 2 3 4 5 6 7 8 9 10 11 12 :− dynamic edge/2. go :− read(Cmd), dispatch(Cmd, Out), write(Out), nl, go. dispatch(add_edge(X, Y), ok) :− assert(edge(X, Y)). dispatch(from(X), R) :− findall(Y, reachable(X, Y), R). dispatch(to(Y), R) :− findall(X, reachable(X, Y), R). |: add_edge(a, b). ok |: add_edge(b, c). ok |: add_edge(a, e). ok |: to(e). [e,a] |: from(e). [e] |: from(a). [a,b,c,e] Figure 16 Usage example of the program in figure 15 reachable(X, X). reachable(X, Z) :− edge(X, Y), reachable(Y, Z). Figure 15 Prolog program that modifies itself as means of maintaining state D Program Mutation in Prolog Prolog support program mutation as a common pattern for storing state. The Prolog program in figure 15 defines the imperative predicate go/0, which implements a ReadEvaluate-Print-Repeat (REPL) cycle, allowing users to build and query directed graphs. The command add_edge(X, Y) adds an edge to a graph from X to Y, implicitly adding vertexes X and Y if they do not exist. The commands from(X) and to(X) print vertexes with paths from or to X, respectively. In doing so their respective implementations consult the predicate reachable/2, which succeeds for all reachable node pairs in the graph. See figure 16 for example of how this program is used. When handling add_edge(X, Y), the program uses assert/1 to add a fact of the form edge(X, Y) to the program, effectively modifying the program. reachable/2 is a declarative predicate that consults the mutable (dynamic) edge/2 predicate as part of its logic. 2-37 Application Embedding: A Language Approach to Declarative Web Programming About the authors David H. Lorenz is an Associate Professor in the Department of Mathematics and Computer Science at the Open University of Israel. He is currently a Visiting Professor at the Faculty of Computer Science, Technion—Israel Institute of Technology. His research interests include aspect-oriented software engineering, modularity, and programming, particularly involving domain specific languages. Prof. Lorenz received his PhD in computer science from the Technion—Israel Institute of Technology. He is a member of the ACM and a member of the IEEE. Contact him at the Dept. of Mathematics and Computer Science, Open University of Israel, Raanana 4310701, Israel; [email protected]. Boaz Rosenan is a PhD Candidate at the University of Haifa, under the supervision of Prof. David H. Lorenz. His research interests include language workbenches and domain specific languages. He received his BA in computer science from the Technion—Israel Institute of Technologies and his MSc in computer science from the Open University of Israel. He is a member of the ACM. Contact him at the Dept. Computer Science, University of Haifa, Haifa 3498838, Israel; [email protected]. 2-38
6cs.PL
A Nearly Instance Optimal Algorithm for Top-k Ranking under the Multinomial Logit Model arXiv:1707.08238v2 [cs.DS] 30 Jul 2017 Xi Chen ∗ Yuanzhi Li † Jieming Mao ‡ August 1, 2017 Abstract We study the active learning problem of top-k ranking from multi-wise comparisons under the popular multinomial logit model. Our goal is to identify the top-k items with high probability by adaptively querying sets for comparisons and observing the noisy output of the most preferred item from each comparison. To achieve this goal, we design a new active ranking algorithm without using any information about the underlying items’ preference scores. We also establish a matching lower bound on the sample complexity even when the set of preference scores is given to the algorithm. These two results together show that the proposed algorithm is nearly instance optimal (similar to instance optimal [FLN03], but up to polylog factors). Our work extends the existing literature on rank aggregation in three directions. First, instead of studying a static problem with fixed data, we investigate the top-k ranking problem in an active learning setting. Second, we show our algorithm is nearly instance optimal, which is a much stronger theoretical guarantee. Finally, we extend the pairwise comparison to the multi-wise comparison, which has not been fully explored in ranking literature. 1 Introduction The problem of inferring a ranking over a set of n items (e.g., products, movies, URLs) is an important problem in machine learning and finds numerous applications in recommender systems, web search, social choice, and many other areas. To learn the global ranking, an effective way is to present at most l (l ≥ 2) items at each time and ask about the most favorable item among the given items. Then, the answers from these multi-wise comparisons will be aggregated to infer the global ranking. When the number of items n becomes large, instead of inferring the global ranking over all the n items, it is of more interest to identify ∗ Stern School of Business, New York University, email: [email protected] Department of Computer Science, Princeton University, email: [email protected] ‡ Department of Computer Science, Princeton University, email: [email protected] † 1 the top-k items with a pre-specified k. In this paper, we study the problem of active topk ranking from multi-wise comparisons, where the goal is to adaptively choose at most l items for each comparison and accurately infer the top-k items with the minimum number of comparisons (i.e., the minimum sample complexity). As an illustration, let us consider a practical scenario: an online retailer is facing the problem of choosing k best designs of handbags among n candidate designs. One popular way is to display several designs to each arriving customer and observe which handbag is chosen. Since a shopping website has a capacity on the maximum number of display spots, each comparison will involve at most l possible designs. Given the wide application of top-k ranking, this problem has received a lot of attention in recent years, e.g., [SW15, STZ17] (please see Section 1.4 for more details). Our work greatly extends the existing literature on top-k ranking in the following three directions: 1. Most existing work studies a non-active ranking aggregation problem, where the answers of comparisons are provided statically or the items for each comparison are chosen completely at random. Instead of considering a passive ranking setup, we propose an active ranking algorithm, which adaptively chooses the items for comparisons based on previously collected information. 2. Most existing work chooses some specific function (call this function f ) of problem parameters (e.g., n, k, l and preference scores) and shows that the algorithm’s sample complexity is at most f . For the optimality, they also show that for any value of f , there exists an instance whose sample complexity equals to that value and any algorithm needs at least Ω(f ) comparisons on this instance. However, this type of algorithms could perform poorly on some instances other than those instances for establishing lower bounds (see examples from [CGMS17]); and the form of function f can vary the designed algorithm a lot. To address this issue, we establish a much more refined upper bound on the sample complexity. The derived sample complexity matches the lower bound when all the parameters (including the set of underlying preference scores for items) are given to the algorithm. They together show that our lower bound is tight and also our algorithm is nearly instance optimal (see Definition 1.1 for the definition of nearly instance optimal). 3. Existing work mainly focuses on pairwise comparisons. We extend the pairwise comparison to the multi-wise comparison (at most l items) and further quantify the role of l in the sample complexity. From our sample complexity result (see Section 1.2), we show that the pairwise comparison could be as helpful as multi-wise comparison unless the underlying instance is very easy. 1.1 Model In this paper, we adopt the widely used multinomial logit (MNL) model [Luc59, McF73, Tra03] for modeling multi-wise comparisons. In particular, we assume that each item i 2 has an underlying preference score (a.k.a. utility in economics) µi for i = 1, . . . , n. These scores, which are unknown to the algorithm, determine the underlying ranking of the items. Specifically, µi > µj means that item i is preferred to item j and item i should have a a higher rank. Without loss of generality, we assume that µ1 ≥ µ2 ≥ · · · µk > µk+1 ≥ · · · ≥ µn , and thus the true top-k items are {1, . . . , k}. At each time t from 1 to T , the algorithm chooses a subset of items with at least two items, denoted by St ⊆ {1, ..., n}, for query/comparison. The size of the set St is upper bounded by a pre-fixed parameter l, i.e., 2 ≤ |St | ≤ l. Given the set St , the agent will report her most preferred item a ∈ St following the multinomial logit (MNL) model: exp(µa ) . j∈St exp(µj ) Pr[a|St ] = P (1) When the size of St is 2 (i.e., l = 2), the MNL model reduces to Bradley-Terry model [BT52], which has been widely studied in rank aggregation literature in machine learning (see, e.g., [NOS17, JKSO13, RA14, CS15]). In fact, the MNL model has a simple probabilistic interpretation as follows [Tra03]. Given the set St , the agent draws her valuation νj = µj + ǫj for each item j ∈ St , where µj is the mean utility for item j and each ǫj is independently, identically distributed random variable following the Gumbel distribution. Then, the probability that a ∈ St is chosen as the most favorable item is Pr (νa ≥ νj , ∀j ∈ St \{a}). With some simple algebraic derivation using the density of Gumbel distribution (see Chapter 3.1 in [Tra03]), the choice probability Pr (νa ≥ νj , ∀j ∈ St \{a}) has an explicit expression in (1). For notational convenience, we define θj = exp(µj ) for i = 1, ..., n, and the choice probability in (1) can be equivalently written as Pr[a|St ] = P θa θj . By adaptively querying the set St for 1 ≤ t ≤ T and observing j∈St the reported most favorable item in St , the goal is to identify the set of top-k items with high probability using the minimum number of queries. For notation convenience, we assume the i-th item (with the preference score θi ) is labeled as πi ∈ {1, . . . , n} by the algorithm at the beginning. Since the algorithm has no prior knowledge on the ranking of items before it makes any comparison, the ranking of the items should have no correlation with the labels of the items. Therefore, π = (π1 , ..., πn ) is distributed as a uniform permutation of {1, ..., n}. The notion of instance optimal was originally defined and emphasized as an important concept in [FLN03]. With the MNL model in place, we provide a formal definition of nearly instance optimal in our problem. To get a definition of instance optimal in our problem, we can just replace Õ with O in Definition 1.1. The “nearly” here just means we allow polylog factors. Definition 1.1 (Nearly Instance Optimal). Given instance (n, k, l, θ1 , ..., θn ), define c(n, k, l, θ1 , ..., θn ) to be the sample complexity of an optimal adaptive algorithm on the instance. We say that an algorithm A is nearly instance optimal, if for any instance (n, k, l, θ1 , ..., θn ), the algorithm A outputs the top-k items with high probability and only uses at most Õ(c(n, k, l, θ1 , ..., θn )) number of comparisons. (Note that Õ(·) hides polylog factors of n and 1 .) θk −θk+1 3 1.2 Main results Under the MNL model described in Section 1.1, the main results of this paper include the following upper and lower bounds on the sample complexity. Theorem 1.2. We design an active ranking algorithm which uses P X X n θk2 i≥k+1 θi +k+ + + Õ l θk (θk − θi )2 i:i≤k,θ ≤2θ θ i≥k+1,θi ≥ k 2 i k+1 2 θk+1 (θk+1 − θi )2 ! comparisons with the set size at most l (can be 2-wise, 3-wise,...,l-wise comparisons) to identify the top-k items with high probability. We note that in Theorem 1.2, the notation Õ(·) hides polylog factors of n and θk −θ1 k+1 . Next, we present a matching lower bound result, which shows that our sample complexity in Theorem 1.2 is nearly instance optimal. Theorem 1.3. For any (possibly active) ranking algorithm A, suppose that A uses comparisons of set size at most l. Even when the algorithm A is given the values of {θ1 , ..., θn } (note that A does not know which item takes the preference score θi for each i), A still needs ! P 2 2 X X θ θ θ n i≥k+1 i k+1 k +k+ + + Ω 2 l θk (θk − θi ) (θk+1 − θi )2 θ i:i≤k,θ ≤2θ i≥k+1,θi ≥ k 2 i k+1 comparisons to identify the top-k items with probability at least 7/8. Here we give some intuitive explanations of the terms in the above bounds before introducing the proof overview: 1. Term nl : Since each comparison has size at most l, we need at least query each item at least once. n l comparisons to 2. Term k: As the proof will suggest, in order to find the top-k items, we need to observe most items in the top-k set as chosen items from comparisons. However, we do not have to observe most items in the bottom-(n − k) set. Therefore, there is no term n − k in the bound. P 2 P P θi θk+1 θk2 3. Term i≥k+1 + + θk 2 i:i≤k,θi ≤2θk+1 (θk+1 −θi )2 : Roughly speaking, θk i≥k+1,θi ≥ 2 (θk −θi )   2 i) is the amount of information that the compariwhen i > k and θi ≥ θk /2, Θ (θk −θ θk2  2  θk son between item i and item k reveals. So intuitively, we need Ω (θk −θ to tell that 2 i) item i ranks after item k. Other quantity can also be understood from an information theoretic perspective. 4 It is also worthwhile to note that when l is a constant, it’s easy to check that P 2 X X θk+1 n θk2 i≥k+1 θi +k+ + + l θk (θk − θi )2 i:i≤k,θ ≤2θ (θk+1 − θi )2 θ i≥k+1,θi ≥ = O n X i=k+1 k 2 i k+1 ! k X θi2 θk2 + . (θk − θi )2 i=1 (θk+1 − θi )2 This is a simpler expression of the instance optimal sample complexity when l is a constant. Based on the sample complexity results in Theorem 1.2 and 1.3, we summarize the main theoretical contribution of this paper: 1. We design an active ranking algorithm for identifying top-k items under the popular MNL model. We further prove a matching lower bound, which establishes that the proposed algorithm is nearly instance optimal. 2. Our result shows that the improvement of the multi-wise comparison over the pairwise comparison depends on the difficulty of the underlying instance. Note that the only term in the sample complexity involving l is nl . Therefore, the multi-wise comparison makes a significant difference from the pairwise comparison only when nl is the leading term in the sample complexity. Therefore, unless the underlying instance is really easy (e.g., the instance-adaptive term P 2 P P θk+1 θk2 i≥k+1 θi k+ + + θk 2 2 is o(n). One implication i:i≤k,θ ≤2θ θk i≥k+1,θi ≥ 2 (θk −θi ) i k+1 (θk+1 −θi ) is that most of the θi ’s among θk+1 , ..., θn are much smaller than θk ), the pairwise comparison is as helpful as the multi-wise comparison. 1.3 Proof overview In this section, we give some very high level overviews of how we prove Theorem 1.2 and Theorem 1.3. 1.3.1 Algorithms To prove Theorem 1.2, we consider two separate cases: l = O(log n) or l = Ω(log n). 1. In the first case, by losing a log-factor, we can just focus on only using pairwise comparisons. Our algorithm first randomly select Õ(n) pairs and proceed by querying all of them once per iteration. After getting the query results, by a standard binomial concentration bound, we are able to construct a confident interval of θθji for each pair (i, j) selected by the algorithm in the beginning. In a high level, our algorithm goes by declaring θi ≥ θj for pair i, j, if the lower bound of the corresponding confident interval is bigger or equal to 1, or if there already exists d items (i = i1 ), i2 , . . . , (id = j) such that we have already declared θir ≥ θir+1 for all r ∈ [d − 1]. We are able to show that, if 5 θ1 ≥ θ2 ≥ · · · ≥ θn , thenfor all i, j ∈ [n] with j ≥ i + n4 , the  algorithm will successfully 2 2 Pn P θk θi k declare θi ≥ θj after O many total queries. Thus, i=k+1 (θk −θi )2 + i=1 (θk+1 −θi )2 n we can remove at least 4 items and recurse on a smaller set. 2. The more interesting case is when l = Ω(log n). As P we have argued before, it is only P θi θk2 + + beneficial to use multi-wise comparisons when k + i≥k+1 θk θk i≥k+1,θi ≥ 2 (θk −θi )2 P 2 P θk+1 i≥k+1 θi = o(n − k) and therefore i:i≤k,θi ≤2θk+1 (θk+1 −θi )2 = o(n). This implies that θk among θk+1 , ..., θn , there are more than half of θi ’s whose value is smaller than some constant fraction of θk . Thus, intuitively, if we select a random subset of items that contains θk and keep querying this set, then, instead of seeing all items in this set with roughly equal probability, we will be seeing item k much more often than the median of frequencies of items in the set. Thus, our algorithm can select an item if it “appears very often when querying a set containing it”. We will show that, if the number of total queries is ! P 2 X X θk+1 θk2 n i≥k+1 θi Ω , +k+ + + l θk (θk − θi )2 i:i≤k,θ ≤2θ (θk+1 − θi )2 θ i≥k+1,θi ≥ k 2 i k+1 then we will be able to select all the top k-items while not selecting any of the bottom n/2 items. Thus, we can remove at least n2 items and recurse on a smaller set. 1.3.2 Lower bounds To prove Theorem 1.3, we establish several lower bounds and combine them using a simple averaging argument. Most of these lower bounds follow the following general proof strategy: 1. For a given instance (n, k, l, θ1 , ..., θn ), consider other instances on which no algorithm can output {π1 , ..., πk } with high probability 1 . For example if we just change θk+1 to θk , then no algorithm can output {π1 , ..., πk } with probability more than 1/2. This is because item k and item k + 1 look the same now and thus all the algorithms will output {π1 , ..., πk } and {π1 , ..., πk−1 , πk+1 } with the same probability in the modified instance. 2. We then consider a well-designed distribution over these modified instances. We show that for any algorithm A with not enough comparisons, the transcript of running A on the original instance distributes very closely to the transcript of running A on the well-design distribution over modified instances. 3. Finally, since the transcript also includes the output, step 2 will tell us that if A does not use enough comparisons, then A must fail to output {π1 , ..., πk } with some constant probability. 1 Recall that πi denotes the initial label of i-th item given as the input to the algorithm, and thus the true top-k items are labeled by {π1 , ..., πk }. 6 1.4 Related Works Rank aggregation from pairwise comparisons is an important problem in computer science, which has been widely studied under different comparison models. Most existing works focus on the non-active setting: the pairs of items for comparisons are fixed (or chosen completely at random) and the algorithm cannot adaptively choose the next pair for querying. In this non-active ranking setup, when the goal is to obtain a global ranking over all the items, Negahban et al. [NOS17] proposed the RankCentrality algorithm under the popular Bradley-Terry model, which is a special case of the MNL model for pairwise comparisons. Lu and Boutilier [LB11] proposed a ranking algorithm under the Mallows model. Rajkumar and Agarwal [RA14] investigated different statistical assumptions (e.g., generalized low-noise condition) for guaranteeing to recover the true ranking. Shah et al. [SBGW17] studied the ranking aggregation under a non-parametric comparison model—strong stochastic transitivity (SST) model, and converted the ranking problem into a matrix estimation problem under shape-constraints. Most machine learning literature assumes that there is a true global ranking of items and the output of each pairwise comparison follows a probabilistic model. Another way of formulating the ranking problem is via the minimum feedback arc set problem on tournaments, which does not assume a true global ranking and aims to find a ranking that minimizes the number of inconsistent pairs. There is a vast literature on the minimum feedback arc set problem and here we omit the survey of this direction (please see [KMS07] and references therein). Due to the increasing number of items, it is practically more useful to identify the top-k items in many internet applications. Chen and Suh [CS15], Jang et al. [JKSO13], and Suh et al. [STZ17] proposed various spectral methods for top-k item identification under the BTL model or mixture of BTL models. Shah and Wainwright [SW15] proposed a counting-based algorithm under the SST model and Chen et al. The notion of instance optimal was originally defined and emphasized as an important concept in [FLN03] for identifying the top-k objects from sorted lists. [CGMS17] suggested that notion “instance optimal” is necessary for rank aggregation from noisy pairwise comparisons in complicated noise models √ and further improved [SW15] by proposing an algorithm that has √ competitive ratio Θ̃( n) compared to the best algorithm of each instance and proving Θ̃( n) is tight. In addition to static rank aggregation, active noisy sorting and ranking problems have received a lot of attentions in recent years. For example, several works [BM08, Ail11, JN11, WMJ13] studied the active sorting problem from noisy pairwise comparisons and explored the sample complexity to approximately recover the true ranking in terms of some distance function (e.g., Kendall’s tau). Chen et al. [CBCTH13] proposed a Bayesian online ranking algorithm under the mixture of BTL models. Dwork et al. [DKNS01] and Ailon et al. [ACN08] considered a related Kemeny optimization problem, where the goal is to determine the total ordering that minimizes the sum of the distances to different permutations. For top-k identification, Braverman et al. [BMW16] initiated the study of how round complexity of active algorithms can affect the sample complexity. Szörényi et al. [SBPH15] studied the case of k = 1 under the BTL model. Heckel et. al. [HSRW16] investigated the active ranking under a general class of nonparametric models and also established a lower bound on the number of comparisons for parametric models. A very recent work by Mohajer and 7 Suh [MS16] proposed an active algorithm for top-k identification under a general class of pairwise comparison models, where the instance difficulty is characterized by the key quantity mini∈{1,...,k} minj:j>i (pij − 0.5)2 . Here, pij is the probability of item i is preferred over item j. However, according to our result in Theorem 1.3, the obtained sample complexities in previous works are not instance optimal. We note that the lower bound result in Theorem 1.3 holds for algorithms even when all the values of θi ’s are known (but without the knowledge of which item corresponds to which value) and thus characterizes the difficulty of each instance. Moreover, we study the the multi-wise comparisons, which has not been explored in ranking aggregation literature but has a wide range applications. Finally, we note that the top-k ranking problem is related to the best k arm identification in multi-armed bandit literature [BWV13, JMNB14, ZCL14, CCZZ17]. However, in the latter problem, the samples are i.i.d. random variables rather than comparisons and the goal is to identify the top-k distributions with largest means. 2 Algorithm For notational simplicity, throughout the paper we use the words w.h.p. to denote with probability 1 − 1/nc for sufficiently large constant c. 2.1 Top-k item identification (For logarithmic l) For l = O(log n), we can always use pairwise comparisons by losing a polylog factor. Therefore, we only focus on the case when l = 2 in this section. Before presenting the algorithm, let us first consider a graph G = (V = [n], E) where each edge is labeled with either ≈l , ≥l , ≤l , >l or <l (see Line 9 in Algorithm 1). Based on the labeling of edges, we give the following definition of label monotone, which will be used in Algorithm 1. Definition 2.1 (Monotone). We call a path i1 → i2 → · · · → id strictly label monotone if: 1. For every j ∈ [d − 1], the edge (ij , ij+1 ) is labeled with either ≈l , ≥l or >l . 2. There exists at least one edge (ij , ij+1) with label >l . Moreover, we call a path “label monotone” if only property 1 holds. Theorem 2.2. For every m items with θ1 ≥ θ2 ≥ · · · ≥ θn , Algorithm 1, on given a random permutation of labels Ω = [n] and k, returns top-k items w.h.p. using !! n k 2 2 X X θ θ k+1 k O κ7 · k + + 2 (θ (θk+1 − θi )2 k − θi ) i=1 i=k+1 total number of pairwise comparisons. 8 For the page limit, we defer the proof of Theorem 2.2 to Appendix A. We only provide the pseudocode in Algorithm 1. In Algorithm 1, we note that a different letter m (instead of n) is used for denoting the set size because we will run the algorithm recursively with smaller sets. And also notice that the parameter κ = Ω(log2 n) regardless of the value of m. We also defer our result for superlogarithmic l to Appendix A. Algorithm 1 AlgPairwise 1: 2: 3: 4: 5: 6: 7: 8: 9: Parameter: κ = Ω(log2 n). Input: A set of randomly permuted labels Ω with |Ω| = m, k: number of top items. Uniformly at random sample s = mκ subsets S1 , · · · Ss of Ω, each of size 2. Associate these subsets with a graph G = (Ω, E), where each edge eu ∈ E consists of all the vertices in Su for u ∈ [s]. q = 0, Ωg = ∅, Ωb = ∅, S = ∅. while true do q ← q + 1. Query each set 1 time, obtain in total s query results {Ru,q }u∈[s] . (Ru,q indicates the reported most favorable item) P For all u ∈ [s], for {i, j} = Su , let θ̃i,j = 1q p∈[q] 1Ru,p =i . For each edge (i, j) ∈ E, we label it as: h q i θ̃ 1. i ≈l j if θ̃i,j ∈ 1+41√ κ , 1 + 4 κq j,i q  q q  θ̃i,j κ 2. i ≥l j if θ̃ ∈ 1 + 4 q , 1 + 32κ κq j,i h  q θ̃ 3. i >l j if θ̃i,j ∈ 1 + 32κ κq , ∞ j,i   θ̃ 1√ 1√ , 4. i ≤l j if i,j ∈ κ κ θ̃j,i 5. i <l j if θ̃i,j θ̃j,i 1+32κ q 1+4 q h i 1√ ∈ 0, 1+32κ κ q For every i, j ∈ [m], we call j>>l i if there exists a strictly label monotone path of length at most κ from j to i. 11: For each i ∈ [m], if there exists at least k many j ∈ [m] such that j>>l i, then add i to Ωb . (Ωb is the subset of items that we are sure not in top-k.) 12: For each i ∈ [m], if there exists at least m − k many j ∈ [m] such that i>>l j, then add i to Ωg . (Ωg is the subset of items that we are sure in top-k.) 13: Break if |Ωg ∪ Ωb | ≥ m4 . 10: 14: 15: Ω′ = Ω − Ωg − Ωb , k ′ = k − |Ωg |, S = S ∪ Ωg ∪ AlgPairwise(Ω′ , k ′ ). Return S. 9 3 Lower bounds We will prove lower bounds on the number of comparison used by any algorithm which identifies top-k items even when the values of preference scores {θ1 , ..., θn } are given to the algorithm. (The algorithm just do not know which item has which θi ). For the page limit, all the proofs are deferred to Appendix B. 3.1 Lower bounds for close weights Theorem 3.1. Assume θk > θk+1 and c < 10−4 . For any algorithm A (can be adaptive), P θk2 if A uses c i:k+1≤i,θi≥θk /2 (θk −θ 2 comparisons of any size (can be l-wise comparison for i) 2 ≤ l ≤ n), then A will identify the top-k items with probability at most 7/8. Theorem 3.2. Assume θk > θk+1 and c < 4 · 10−4 . For any algorithm A (can be adaptive), P θ2 if A uses c i:i≤k,θi≤2θk+1 (θk+1k+1 comparisons of any size (can be l-wise comparison for −θi )2 2 ≤ l ≤ n), then A will identify the top-k items with probability at most 7/8. 3.2 Lower bounds for arbitrary weights Theorem 3.3. Assume c < 1/18. For any algorithm A (can be adaptive), if A uses P θi c i:i>k θk comparisons of any size (can be l-wise comparison for 2 ≤ l ≤ n), then A will identify the top-k items with probability at most 7/8. Theorem 3.4. For any algorithm A (can be adaptive), if A uses k/4 comparisons of any size (can be l-wise comparison for 2 ≤ l ≤ n), then A will identify the top-k items with probability at most 2/3. Theorem 3.5. Assume c < 1/2. For any algorithm A (can be adaptive), if A uses cnl comparisons of size at most l (can be 2-wise, 3-wise,...,l-wise comparisons), then A will identify the top-k items with probability at most 7/8. 3.3 Combining lower bounds Corollary 3.6 (Restatement of Theorem 1.3). For any algorithm A (can be adaptive), suppose A uses comparisons of size at most l (can be 2-wise, 3-wise,...,l-wise comparisons). A needs ! P 2 2 X X θ θ n θk i≥k+1 i k+1 Ω +k+ + + 2 l θk (θk − θi ) (θk+1 − θi )2 θ i:i≤k,θ ≤2θ i≥k+1,θi ≥ k 2 i k+1 to identify the top-k items with probability at least 7/8. Proof. To prove this corollary, we just need to combine all the results in Theorem 3.1, Theorem 3.2, Theorem 3.3, Theorem 3.4 and Theorem 3.5. And then use the fact that if b < a1 + · · · + a5 then there exists i ∈ {1, 2, 3, 4, 5} such that b < 5ai . 10 A Additional Results and Proofs of Section 2 Throughout the proofs we are going to use the following claim which is a simple fact about the binomial concentration. ∗ Claim A.1 (Binomial concentration). For every m √ ∈ N , every p ∈ [0, 1], suppose X ∼ √ B(m, p), then X ∈ [mp − O( mp log n), mp + O( mp log n)] w.h.p (with high probability respect to n). A.1 Top-k item identification (For logarithmic l) In this section, we prove Theorem 2.2 of Section 2. q q h i θi,j κ θi,j κ Following Claim A.1, we know that for every (i, j) ∈ E, every q, θ̃i,j ∈ θi,j − , θi,j + q q w.h.p. W.l.o.g, let us just focus on the case that this bound is satisfied for all (i, j) ∈ E and every q. We have the following Lemma about the labelling: Lemma A.1 (Label). For q = Ω(κ3 ), we have: 1. if θi ≥ θj , then i ≈l j, i ≥l j or i >l j.  q  2. if θi ≥ θj 1 + 128κ κq , then i >l j. 3. if i ≥l j or i ≈l j, then  r  κ θi ≥ θj 1 − 8 q 4. if i >l j, then Proof of Lemma A.1.  r  κ θi ≥ θj 1 + 16κ q 1. We know that for q = Ω(κ3 ) and θi ≥ θj :  q  q θi θi κ − θi +θj · q θi 1 − 2κ θi +θj q θ̃i,j q q ≥ ≥ θj θj 2θi θj κ θ̃j,i + θi +θ · κq θj + θi +θj q j q q 1 − 2κ 1 − 2κ q q q q ≥ ≥ θj θ 1 + 2κ + θj · 2κ q θ q i ≥ i 1 1+4 q κ q 11  q  2. Again by θi ≥ θj 1 + 128κ κq and q = Ω(κ3 ), we know that therefore, we have: θ̃i,j θ̃j,i θj θi q ≤ 1 − 64κ κq , q q q 2κ 2κ r 1 − 1 − 2κ 1 − q q q κ q ≥ q ≥ 1 + 32κ q . ≥ ≥ q θj θj θj 2κ 2κ κ 2κ q + 1 − 64κ q + + θi · q θi q q θi 3. Let us suppose θi ≤ θj , otherwise we already complete the proof. Now, we have: q θi θi + · κq θi +θj θi +θj θ̃i,j 1 q q ≥ ≥ θj θj κ κ θ̃j,i 1 + 4 − · q θi +θj θi +θj q Which implies that q 2θi θj κ θi + 1 q  q q ≥ κ 2κ 1 + 4 θj 1 − q q Therefore, by θi ≤ θj , we have: θi θj + 1− q q 2κ q 2κ q ≥ 1 1+4 q κ q Which implies that q r r 1 − 2κ q θi 2κ κ q − ≥ ≥1−8 κ θj q q 1+4 q 4. Let us suppose θi ≤ 2θj , otherwise we already complete the proof. Again, we have: q θi r + 3κ θj q κ q ≥ 1 + 32κ q 1 − 3κ q Which implies that θi ≥ θj r   r  r r 3κ κ 2κ κ 1− 1 + 32κ − ≥ 1 + 16κ q q q q 12 Above, the Lemma A.1 implies that w.h.p. the labelling of each edge (i, j) is consistent with the order of θi , θj . Now, the algorithm will declare i>>l j if there exists strictly label monotone path from i to j. Using the Lemma above we can show that if such path exists, then θi > θj . To show the other direction that such paths exists when θj > θi , we first consider the following graph Lemma that gives the exists of monotone path in random graph G(m, p). Lemma A.2 (Graph Path). For every m ≤ n, every random graph G(m, p) on vertices κ V = [m], if p ≥ m , then w.h.p. For every i, j ∈ [m] with j ≥ i + m4 , there exists a path i = i1 → i2 → · · · id = j such that 1. d ≤ κ. 2. ir ≤ ir+1 for every r ∈ [d − 1]. We call such a path a monotone path from i to j. √ Proof of Lemma A.2. It is sufficient to consider the case when m = Ω( κ), otherwise w.h.p. the graph is a complete graph and theorem is automatically true. We consider a sequential way of generating G(m, p): At each time t = 1, 2, · · · , m, a vertex t arrives and there exists an edge between t and each t′ ∈ [t − 1] with probability p. √ Let us consider a fixed i ≤ 34 m and j ≥ i + m4 . Let τ = 32κ = Ω(log n). We will divide the set {i, i + 1, · · · , j − 1} into τ subsets H1 , · · · , Hτ such that   j−i j−i j−i , i + (r − 1) + 1, · · · , i + r −1 Hr = i + (r − 1) τ τ τ √ Since m = Ω( κ) we know that |Hr | ≥ 1. Let us define the random variable Yr , Xr , Zv as: Yr = the set of all v ∈ Hr such that there exists a monotone path from i to v of length at most r and Xr = |Yr |. For each v ∈ Hr+1 , we define Zv = 1there is an edge between v and at least one vertex in Yr Clearly, X1 ≥ 1 and each Zv is i.i.d. random variable in {0, 1} with Pr[Zv = 0 | Xr ] = (1 − p)Xr . On the other hand, by definition, X Zv Xr+1 ≥ v∈Hr+1 We consider two cases: 1. Xr ≥ p1 , then Pr[Zv = 1] ≥ 14 . 13 2. Xt < 1p , then by (1 − p)x ≤ 1 − xp 2 for x < 1/p, we have Pr[Zv = 1] ≥ pXr . 2 Consider a fixed Xr and for each v ∈ Hr+1 , let Zv be the random variable. By standard Chernoff bound, we have: 1. If Xr ≥ 1p , then w.h.p. Xr+1 ≥ j−i 4τ 2. 1 ≤ Xr < 1p , then w.h.p. Xr+1 ≥ Recall that p ≥ κ m and j − i ≥ r τ ≥ m . 16τ (j−i)pXr 2τ m , 4 − q r . τ (j−i)pX 2τ therefore, (j − i)pXr (j − i)pXr ≤ , 2τ 4τ (j − i)pXr ≥ 2Xr 4τ Which implies that w.h.p. Xr+1 ≥ 2Xr . m . Therefore, Putting everything together, we know that for τ = Ω(log n), w.h.p. Xτ ≥ 16τ condition on this event, by   m m Pr there is an edge between j and Yτ Xτ ≥ = 1 − (1 − p) 16τ 16τ m  m   2 16τ 1 κ 16τ 1024τ ≥ 1 − Ω(1) ≥1− 1− ≥1− 1− m m n We complete the proof. Having this Lemma, we can present the main Lemma above the algorithm: Lemma A.3 (Main 3). Suppose q = Ω(κ3 ), then w.h.p. the following holds: 1. Ωg ⊆ [k], Ωb ∩ [k] = ∅.  5 P 2. If k ≤ m2 and q = Ω κm · m i=k+1 3. If k > m 2 and q = Ω  κ5 m θk2 (θk −θi )2  P · k + ki=1  , then |Ωb | ≥ 2 θk+1 (θk+1 −θi )2 m . 4  , then |Ωg | ≥ m . 4 Since the algorithm terminates within O(κ) recursions, moreover, in each recursion, the algorithm makes at most κmq queries. Therefore, Lemma A.3 implies that the algorithm runs in total queries: !! m k 2 2 X X θ θ k+1 k O κ7 · k + + 2 (θ (θk+1 − θi )2 k − θi ) i=1 i=k+1 14 Proof of Lemma A.3. 1. It suffices to show that if i>>l j, then θi ≥ θj . To see this, consider a strictly label monotone path i = i1 → i2 → · · · → id = j with length d ≤ κ. By q  Lemma A.1, we know that for every r ∈ [d − 1], we have: θir ≥ θir+1 1 − 8 κq .  q  Moreover, there exists an r ′ ∈ [d − 1] such that θir′ ≥ θir′ +1 1 + 16κ κq . Multiply every thing together, we know that  r κ−1  r  κ κ θi ≥ θj 1 − 8 1 + 16κ ≥ θj q q 2. Let us denote the set H = { 34 m + 1, 34 m + 2, · · · m}, we will prove that H ⊆ Ωb . Consider one j ∈ H, by Lemma A.2, w.h.p. for every i ∈ [k], there exists a path i = i1 → i2 → · · · id = j of length at most κ such that θir ≥ θir+1 for every r ∈ [d − 1]. Now, by Lemma A.1, we know that this path is label monotone. We just need to show that this path is strictly label monotone. To see this, we know that there exists one r ′ ∈ [d − 1] such that  1/κ θi θir′ ≥ θir′ +1 θj Let ν = 1 m−k θk2 i=k+1 (θk −θi )2 . Pm Now, since k ≤ conclude that for this j ∈ H and i ∈ [k], θi2 m , 2 (θi −θj )2 we can apply Markov inequality and ≤ 1 θi q ≥1+ ≥ θj 1 1 − 2ν θk2 (θk −θj )2 r ≤ 2ν. Which implies that 1 2ν For q = Ω(κ5 ν), we know that  θi θj Therefore, θir′ ≥ θir′ +1 ir′ +1 and thus i>>l j. 1/κ ≥   1/κ θi θj r 1/κ  r  κ κ 1 + 64κ ≥ 1 + 32κ q q 2  q  ≥ 1 + 32κ κq . By definition, we shall label ir′ >  3. It can be shown with exactly the same calculation as 2 with H = 1, 2, · · · 14 m and apply Markov inequality on ! k k 2 X θk+1 θi2 1 1X = O k+ ν= k i=1 (θk+1 − θi )2 k (θk+1 − θi )2 i=1 15 A.2 Top-k item identification (For super logarithmic l) Before presenting the algorithm, we first argue about which case using bigger l is unnecessary. We have the following Claim: Claim A.2 (Bigger l). For every l ≤ m ≤ n, we have: k 2 X θk+1 θk2 + k+ (θk − θi )2 i=1 (θk+1 − θi )2 i=k+1   P k 2 X X θk+1 θk2 m  i≥k+1 θi ≤ +k+ + + 4m + 2 2 l θk (θ − θ ) (θ − θ ) k i k+1 i θ i=1 m X i≥k+1,θi ≥ k 2 Therefore, as long as we can show one of the following: 1. k = Ω(m). 2. P i≥k+1 θi θk = Ω(m). We can just use the algorithm for l = 2. Otherwise, we shall consider larger l, we will directly considering the case when l = Ω(log n). Before giving the algorithm, it is convenient to first consider the following query procedure: For a fixed Q, do: Algorithm 2 BasicQuery Parameter: κ = Ω(log2 n) Input: Ω: set of items with |Ω| = m, k: number of top items to find. l: size of the subset to query. 3: Uniformly at random sample s = mκ subsets S1 , · · · Ss of Ω, each of size l. Associate l these subsets with a hypergraph G = (Ω, E), where each edge eu ∈ E is consists of all the vertices in Su for u ∈ [s]. 4: Query each set Q time, obtain in total sQ query results {Ru,q }u∈[s],q∈[Q]. 1: 2: 16 For a fixed q ≤ Q, let us consider a random variable θ̃i,Su ∈ [0, 1] defined as θ̃i,Su = 1X 1Ru,r =i q r∈[q] For each i, u such that i ∈ Su , let us define 0-1 valued function 1i,u,α,β,γ such that 1i,u,α,β,γ = 1 if and only if all the following conditions hold: 1. θ̃i,Su ≥ αq . 2. There exists at least γl many of the j ∈ Su such that θ̃j,Su ≤ β θ̃i,Su . We also consider the random variable Xi,u,α,β,γ associated with this function, where the randomness is taken over the uniformly at random choice of Su conditional on i ∈ Su , and the randomness of the outcome of the queries. We prove the following main Lemma:  1 1 , 2 , β ∈ (0, 32], α = Ω(κ). For every i ∈ [m], the Lemma A.4 (Indicator). Let γ ∈ 32 following holds: P   2αl j∈[m] θj 1. If q = Ω α + and θi ≥ 2βθ(1−2γ)m , then mθi Pr[Xi,u,α,β,γ = 1] ≥ 15 16 2. For every q, if θi ≤ β2 θ(1−γ)m , then Pr[Xi,u,α,β,γ = 1] ≤ Proof of Lemma A.4. 9 16 1. We first bound the probability that θ̃i,Su ≥ αq . By s " s θi,Su ≥ 2α α =⇒ θ̃i,Su ≥ q q θ̃i,Su ∈ θi,Su − we know that θi,Su κ , θi,Su + q θi,Su κ q # To lower bound this probability, we just need to consider the probability that θi,Su < We apply Markov inequality and have that: i h    E 2α  qθi,Su 2α 2α = Pr >1 < Pr θi,Su < q qθi,Su 1 17 2α . q Notice that Therefore, P 2α j∈Su θj 2α = qθi,Su θi q P P  2αE[ j∈Su ]θj 2α 2α 2αl j∈[m] θj 1 E ≤ + ≤ = qθi,Su θi q q mθi q 64  Putting together we obtain     2α 1 α ≤ Pr θi,Su < < Pr θ̃i,Su < q q 64 Now we can move to the second condition. For now, suppose θ̃i,Su ≥ know that   31 33 θ̃i,Su ∈ θi,S , θi,S 32 u 32 u α q holds, we then Therefore, θi ≥ 2βθ(1−2γ)m implies that for every j ∈ H = {(1 − 2γ)m, (1 − 2γ)m + 1, · · · m} with j ∈ Su , we have: s s θj,Su κ θi,Su κ θ̃j,Su ≤ θj,Su + ≤ θj,Su + q q ≤ θj,Su + 3θi,Su 4β θ̃i,Su ≤ β ≤ 1 θi,Su 1 θi,Su ≤ + θi,S 128 2β 128 u for β ≤ 32 1 . Therefore, Since |H| = 2γm, we know that for l = Ω(log n), Pr[|H ∩ Su | < γl] ≤ 64   α 15 Pr[Xi,u,α,β,γ = 1] ≥ 1 − Pr θ̃i,Su < − Pr[|H ∩ Su | < γl] ≥ q 16 2. The proof follows from the same calculation. Notice that this time we already have Xi,u,α,β,γ = 1 =⇒ θ̃i,Su ≥ αq .    1 1 , 2 and every τ ∈ 43 , 78 , we consider set For fixed α = Ω(κ), every β ∈ (0, 32], γ ∈ 32     X Xi,u,α,β,γ ≥ τ deg(i) Ωβ,γ,τ = i ∈ [m]   u:u∈[s],i∈Su We also have the following Corollary of Lemma A.4: 18   33 7 , 8 , w.h.p. j ∈ Corollary A.5. 1. For every i, j ∈ [m] with θi ≥ θj , every τ ∈ 34 × 32 Ωβ,γ,τ =⇒ i ∈ Ωβ,γ, 32 τ . 33 P   2αl j∈[m] θj 2. For every i ∈ [m], if θi ≥ 2βθ(1−2γ)m and q = Ω α + , then w.h.p. i ∈ mθi Ωβ,γ,τ . 3. For every q, if i ∈ Ωβ,γ,τ , then w.h.p. θi ≥ β2 θ(1−γ)m . Having this Corollary, we can do the following algorithm that selects all the θi ≥ 32 max{θk , θ 3 m } and removes most of the θj ≤ 14 θk : 4 Algorithm 3 AlgMulti-wise 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: Parameter: κ = O(log2 n). Input: Ω: set of items, k: number of top items to find. Output: S: set of top items. Ω′ : set of remaining items. Initialization: S = ∅, Ω′ = Ω, m = |Ω|. Call BasicQuery to obtain {θ̃i,Su }i∈[n],u∈[s]. if k ≤ 21 m then if 1 ≤ |Ω32, 1 , 13 | and |Ω4, 1 , 13 | < k then 4 16 16 16 S1 = Ω4, 1 , 7 , Ω′′ = Ω − S1 , (S ′ , Ω′ ) = AlgMulti-wise(Ω′′ , k − |S1 |, R), S = S ∪ S1 ∪ 16 8 S ′′ .  13 33 2 3 · ≥ · 4. Notice that we pick those numbers so 78 ≥ 33 32 16 32 else if |Ω4, 1 , 13 | ≥ k then 16 16 Ω′′ = Ω4, 1 , 3 , (S ′ , Ω′ ) = AlgMulti-wise(Ω′′ , k, R), S = S ∪ S ′ . 16 4 ′ Return S, Ω . We have the following lemma. Lemma A.6. For every m, every θ1 ≥ θ2 ≥ · · · ≥ θm , every k ≤ m, every l ≤ m, Algorithm 3, on given a random permutation of Ω = [m], k satisfies: 1. Output set (S, Ω′ ) of the algorithm satisfies S ⊆ [k].   P l(k+ j≥k θj ) 2. If Q = Ω̃ 1 + , then the algorithm returns in O(log m) many recursion mθk calls, and after the algorithm, let us for simplicity still denote [|Ω′ |] = Ω′ with θ1 ≥ θ2 ≥ · · · θ|Ω′ | and k ′ = k − |S|, then either (a) For every i ∈ Ω′ , θi ≤ 512θ 7 |Ω′ | . 8 ′ (b) Or k ≥ 1 |Ω′ |. 2 Proof of the main theorem. After running this algorithm, we can simply apply the algorithm for l = 2 (By Claim A.2), since one of the following is true: 19 1. P i≥k′ +1 θi θk ′ ≥ 3 8 × 1 |Ω′ |. 512 2. k ′ > 21 |Ω′ |. Therefore, putting everything together, we can get the top k items in total number of queries:   P k 2 X X θk+1 θk2 m  i≥k+1 θi Õ  + k + + + 2 2 l θk (θ − θ ) (θ − θ ) k i k+1 i θ i=1 i≥k+1,θi ≥ k 2 Now, it just remains to prove this Lemma: Proof. We first prove the correctness: S ⊆ [k]. We have the following observations: 1. If |Ω4, 1 , 13 | ≥ k, then there must be i ∈ Ω4, 1 , 13 with θi ≤ θk . By Corollary A.5, since 16 16 16 16 13 33 3 1 3. ≥ · , we know that [k] ⊆ Ω 4, , 16 32 4 16 4 2. If there exists j ∈ Ω4, 1 , 7 such that j ∈ / [k], then by θj ≤ θk , apply Corollary A.5 with 16 8 7 33 13 ≥ 32 · 16 , we know that [k] ⊆ Ω4, 1 , 13 , which implies |Ω4, 1 , 13 | ≥ k. Therefore, we 8 16 16 16 16 will not include any item that is not top k to S when recursing from Line 7. These two observations immediately imply S ⊆ [k]. Now, we will show that for sufficiently large Q, either of the two conditions hold: 1. For every i ∈ Ω′ , θi ≤ 512θ 7 |Ω′ | . 8 2. Or k ′ ≥ 12 |Ω′ |. Let us for notation simplicity drop the ′ here. Clearly, we just need to consider the case when k < 12 m, otherwise, the algorithm will just terminate and the second condition is true. We will first prove that θi ≤ 64θk and then we prove that θk ≤ 8θ 7 m . 8 1. To prove θi ≤ 64θk, we suppose on the contrary that θ1 > 64θk . Apply Corollary A.5 P 2αl( j≥1 θj ) , we have that 1 ∈ Ω32, 1 , 3 , which implies that with q = Q = Ω α + mθ1 16 4 |Ω32, 1 , 13 | > 0, so the algorithm won’t terminate, contradict. 4 16 2. Now, we need to show that θk ≤ 8θ 7 n . We also on the contrary suppose that θk > 8 8θ 7 m . Since the algorithm termniates, by the previous claim, we know that in the last 8 recursion, it must be the case that θ1 ≤ 64θk . Which implies that P      P 2αl θ 2αl kθk + j≥k θj j≥1 j  = Ω α +  Q = Ω α + mθk mθk Therefore, if θk > 8θ 7 m , then by Corollary A.5 we know that [k] ⊆ Ω4, 1 , 3 , so the 8 16 4 algorithm won’t terminate. 20 Finally, we consider about the total number of recursions. Clearly, if the algorithm 15 |Ω|. If the algorithm recurses through the recurses through the second case, then |Ω′ | ≤ 16 first case, then by Corollary A.5, it must be the case that θ1 ≥ 16θ 7 m 8 Which implies that for all i with θi ≥ θ21 ≥ 8θ 7 m , i ∈ Ω4, 1 , 7 . 8 16 8 Therefore, the total number of recursions of the algorithm is bounded by O(log m). So the total number of queries of the algorithm is:    P P   2αl kθk + j≥k θj θj κm m j≥k × × O(log m) = Õ +k+ O α + mθk l l θk Remark: How to obtain the value Q: In the proof above we assumed that we have an aprior estimation of the value of Q. We can replace this assumption by initially setting Q to be Q = Q0 = 1, and run algorithm 3 with Q0 queries and then run the algorithm with pairwise comparision. Once the later algorithm requires more than Q0 × nl queries, then we stop it, set Q1 = 2Q0 and repeat this procedure with Q = Q1 . We keep on repeating this for Q2 = 2Q1 , Q3 = 2Q2 , · · · until the later algorithm requires less than Qi × nl queries. By the Lemma we just proved, the output of the algorithm is correct for every Q. Moreover, if   P k 2 2 X X θk+1 θk n  n i≥k+1 θi Q × = Ω̃  + k + + +  2 2 l l θk (θk − θi ) (θk+1 − θi ) θ i=1 i≥k+1,θi ≥ k 2 Then this process will terminate, and the total query complexity is then bounded by Õ Q × nl . B B.1 Proofs of Section 3 Lower bounds for close weights Theorem B.1 (Restatement of Theorem 3.1). Assume θk > θk+1 and c < 10−4 . For any P θk2 algorithm A (can be adaptive), if A uses c i:k+1≤i,θi≥θk /2 (θk −θ 2 comparisons of any size (can i) be l-wise comparison for 2 ≤ l ≤ n), then A will identify the top-k items with probability at most 7/8. θ2 k Proof. For notation convenience, we set wi = (θk −θ for i such that i ≥ k + 1 and θi ≥ θk /2. Pn i )2 For other i, we set wi = 0. We also set W = i=1 wi . Then we have T = cW . 21 First of all, we can assume A is deterministic. This is because if A is randomized, we can fix the randomness string which makes A achieves the highest successful probability. Let S = (S1 , ..., ST ) be the history of algorithm. Each St is the comparison result of round t. Notice that since A is deterministic, with S1 , ..., St , we can determine the labels of items A want to compare in round t + 1 even when A is adaptive. So there is no point to put the labels of compared items in the history. So we only put the comparison result in the history, i.e St is a number in [n] and S is a length-T string of numbers in [n]. Again since A is deterministic, the label A outputs is just a deterministic function of S, we use A(S) to denote it. A outputs correctly if A outputs the label of the top-k items, i.e. A(S) = {π1 , ..., πk }. We use p(S, π) to denote the probability that the items are labeled as π and A has history S. Now consider the case when we set θi equals to θk for i ≥ k+1. In this case the probability of A(S) = {π1 , ..., πk } should be at most 1/2 as item k and item i have the same weight. We use pi (S, π) to denote the probability that the items are labeled as π and A has history S when θi is changed to θk . Now we prove the following lemma that gives the connection between p(S, π) and pi (S, π). Lemma B.2. Consider p as a distribution over (π, S). For all c1 > 0, we have " n ! #   X wi pi (S, π) (c1 − 4c)2 Pr ≤ −c1 ≤ exp − . ln (π,S)∼p W p(S, π) 72c i=1 Proof. Define random variable Zt to be the following for t = 1, ..., T when (π, S) is sampled from distribution p: n X wi pi (S1 ...St , π) ln . Zt = W p(S1 ...St , π) i=1 We have ZT = n X wi pi (S, π) ln . W p(S, π) i=1 4t , ..., ZT + 4T forms a supermartingale. Now we want to show that sequence 0, Z1 + W4 , ..., Zt + W W Suppose in round t, given S , ..., S and π, Algorithm A compares items in set Ut . Let 1 t−1 P θ−i = j∈Ut ,j6=i θi . Then we have, with probability θi /(θi + θ−i ), Zt − Zt−1    X wj  (θk − θi )θ−i θk − θj wi + ln 1 + ln 1 − = W (θk + θ−i )θi W θk + θ−j j∈U ,j6=i t Here are two simple facts about ln. For 0 ≤ x ≤ 1, ln(1 + x) ≥ x − x2 . For 0 ≤ x ≤ 1/2, k −θi )θ−i ln(1 − x) ≥ −x − x2 . It’s easy to check that for i such that wi > 0, we have (θ ≤1 (θk +θ−i )θi 22 and θk −θi θk +θ−i ≤ 1/2 . Therefore, by these two facts, for i such that wi > 0, we have     θi (θk − θi )θ−i θ−i θk − θi wi ln 1 + + wi ln 1 − θi + θ−i (θk + θ−i )θi θi + θ−i θk + θ−i   2 2 (θk − θi )θ−i (θk − θi ) θ−i (θk − θi )θ−i (θk − θi )2 θ−i wi − − − ≥ θi + θ−i θk + θ−i (θk + θ−i )2 θi θk + θ−i (θk + θ−i )2 θ−i θk2 (θk − θi )2 θ−i = − = −wi (θk + θ−i )2 θi (θk + θ−i )2 θi 2θ−i θk 4θi 4θi ≥ − ≥− ≥− . 2 (θk + θ−i ) θk + θ−i θi + θ−i Therefore we have for all t and S1 , ..., St−1 , E[Zt − Zt−1 |S1 , ..., St−1 ] ≥ − X i∈Ut 4θi 4 ≥− . W (θi + θ−i ) W As Z1 , ..., Zt−1 can be determined by S1 , ..., St−1 , we have for all t and Z1 , ..., Zt−1 ,      4(t − 1) 4 4(t − 1) 4t − Zt−1 + |Z1 − , ..., Zt−1 − ≥ 0. E Zt + W W W W 4t Therefore sequence 0, Z1 + W4 , ..., Zt + W , ..., ZT + 4T forms a supermartingale. W Now we want to bound |Zt − Zt−1 |. We know that for 0 ≤ x ≤ 1, | ln(1 + x)| ≤ x and for 0 ≤ x ≤ 1/2, | ln(1 − x)| ≤ 2|x|. Therefore for i such that wi > 0,   wi (θk − θi )θ−i (θk − θi )θ−i θk2 θ−i 2θk wi |≤ · ≤ ≤ | ln 1 + W (θk + θ−i )θi W (θk + θ−i )θi W θi (θk − θi )(θk + θ−i ) W (θk − θk+1 ) and   wi wi 2(θk − θi ) θk − θi 2θk2 4θk θi | ln 1 − |≤ · = ≤ · . W θk + θ−i W θk + θ−i W (θk − θi )(θk + θ−i ) W (θk − θk+1 ) θi + θ−i Therefore, we get |Zt − Zt−1 | ≤ Also notice that X 2θk 4θk θi 6θk + · ≤ . W (θk − θk+1 ) i∈U W (θk − θk+1 ) θi + θ−i W (θk − θk+1 ) t  θk (θk − θk+1 ) 2 23 ≤ wk+1 ≤ W. Now by Azuma’s inequality, we have Pr [ZT ≤ −c1 ] ≤ (π,S)∼p = ! 4T 2 ) W exp − 6θk 2T ( W (θk −θk+1 ) )2  (c1 − 4c)2 (θk − θk+1 )2 W exp − 72 · c · θk2   (c1 − 4c)2 (c1 − ≤ exp − 72c  . Finally we are going to use Lemma B.2 with c1 = 1/3. We define V as indicator function P i (S,π) i of the event ni=1 w ln pp(S,π) ≥ −c1 , i.e. W P i (S,π) i ln pp(S,π) ≥ −c1 . 1. V = 1 if ni=1 w W 2. V = 0, otherwise. The probability that A identify the top item can be written as Pr [A(S) = {π1 , ..., πk }] (π,S)∼p = ≤ ≤ ≤ ≤ ≤ ≤ ≤ ≤ ≤ Pr [(A(S) = {π1 , ..., πk }) ∧ (V = 0)] + Pr [(A(S) = π1 ) ∧ (V = 1)] (π,S)∼p X Pr [V = 0] + p(S, π) (π,S)∼p (π,S)∼p (π,S):A(S)={π1 ,...,πk },V =1 !  n X Y wi (c1 − 4c)2 + ec1 pi (S, π) W exp − 72c i=1 (π,S):A(S)={π1 ,...,πk },V =1 !   n X X wi (c1 − 4c)2 c1 + e · pi (S, π) exp − 72c W i=1 (π,S):A(S)={π1 ,...,πk },V =1   n X wi (c1 − 4c)2 c1 +e Pr [(A(S) = {π1 , ..., πk }) ∧ (V = 1)] exp − 72c W (π,S)∼pi i=1   n X (c1 − 4c)2 wi c1 exp − +e Pr [A(S) = {π1 , ..., πk }] 72c W (π,S)∼pi i=1   n X (c1 − 4c)2 wi 1 exp − + ec1 · 72c W 2 i=1   (c1 − 4c)2 ec1 exp − + 72c 2   2 3 (1/3 − 4c) + exp − 72c 4 7 1 3 + = . 8 4 8  24 The last step comes from the fact that c < 10−4 . The following theorem is very similar to Theorem 3.1. For some technical reason, it’s not very easy to merge the two proofs. But many parts of proofs of these two theorems are very similar. Theorem B.3 (Restatement of Theorem 3.2). Assume θk > θk+1 and c < 4 · 10−4. For any P θ2 comparisons of any size algorithm A (can be adaptive), if A uses c i:i≤k,θi≤2θk+1 (θk+1k+1 −θi )2 (can be l-wise comparison for 2 ≤ l ≤ n), then A will identify the top-k items with probability at most 7/8. θ2 Proof. For notation convenience, we set wi = (θk+1k+1 for i such that i ≤ k and θi ≤ 2θk+1 . Pn −θi )2 For other i, we set wi = 0. We also set W = i=1 wi . Then we have T = cW . First of all, we can assume A is deterministic. This is because if A is randomized, we can fix the randomness string which makes A achieves the highest successful probability. Let S = (S1 , ..., ST ) be the history of algorithm. Each St is the comparison result of round t. Notice that since A is deterministic, with S1 , ..., St , we can determine the labels of items A want to compare in round t + 1 even when A is adaptive. So there is no point to put the labels of compared items in the history. So we only put the comparison result in the history, i.e St is a number in [n] and S is a length-T string of numbers in [n]. Again since A is deterministic, the label A outputs is just a deterministic function of S, we use A(S) to denote it. A outputs correctly if A outputs the label of the top-k items, i.e. A(S) = {π1 , ..., πk }. We use p(S, π) to denote the probability that the items are labeled as π and A has history S. Now consider the case when we set θi equals to θk+1 for i ≤ k. In this case the probability of A(S) = {π1 , ..., πk } should be at most 1/2 as item k + 1 and item i have the same weight. We use pi (S, π) to denote the probability that the items are labeled as π and A has history S when θi is changed to θk+1 . Now we prove the following lemma that gives the connection between p(S, π) and pi (S, π). Lemma B.4. Consider p as a distribution over (π, S). For all c1 > 0, we have " n ! #   X wi pi (S, π) (c1 − c)2 Pr ≤ −c1 ≤ exp − . ln (π,S)∼p W p(S, π) 18c i=1 Proof. Define random variable Zt to be the following for t = 1, ..., T when (π, S) is sampled from distribution p: n X wi pi (S1 ...St , π) ln . Zt = W p(S1 ...St , π) i=1 We have n X wi pi (S, π) ln . ZT = W p(S, π) i=1 25 T forms a supermartigale. Now we want to show that sequence 0, Z1 + W1 , ..., Zt + Wt , ..., ZT + W Suppose in round t, given S1 , ..., St−1 and π, Algorithm A compares items in set Ut . Let P θ−i = j∈Ut ,j6=i θi . Then we have, with probability θi /(θi + θ−i ),    X wj  wi (θi − θk+1 )θ−i θj − θk+1 Zt − Zt−1 = + ln 1 − ln 1 + W (θk+1 + θ−i )θi W θk+1 + θ−j j∈U ,j6=i t Here are two simple facts about ln. For 0 ≤ x ≤ 1, ln(1 + x) ≥ x − x2 . For 0 ≤ x ≤ 1/2, (θ −θ )θ−i ≤ 1/2 ln(1 − x) ≥ −x − x2 . It’s easy to check that for i such that wi > 0, we have (θik+1k+1 +θ−i )θi and θi −θk+1 θk+1 +θ−i ≤ 1 . Therefore, by these two facts, for i such that wi > 0, we have     (θi − θk+1 )θ−i θ−i θi − θk+1 θi wi ln 1 − + wi ln 1 + θi + θ−i (θk+1 + θ−i )θi θi + θ−i θk+1 + θ−i   2 2 wi (θi − θk+1 )θ−i (θi − θk+1 ) θ−i (θi − θk+1 )θ−i (θi − θk+1 )2 θ−i ≥ − − + − θi + θ−i θk+1 + θ−i (θk+1 + θ−i )2 θi θk+1 + θ−i (θk+1 + θ−i )2 2 θ−i θk+1 (θk+1 − θi )2 θ−i = − = −wi (θk+1 + θ−i )2 θi (θk+1 + θ−i )2 θi 2 θk+1 θi ≥ − ≥− . (θk+1 + θ−i )θi θi + θ−i The last step comes from the fact that 2 θk+1 (θi + θ−i ) ≤ θi2 (θk+1 + θ−i ). Therefore we have for all t and S1 , ..., St−1 , E[Zt − Zt−1 |S1 , ..., St−1 ] ≥ − X i∈Ut 1 θi ≥− . W (θi + θ−i ) W As Z1 , ..., Zt−1 can be determined by S1 , ..., St−1 , we have for all t and Z1 , ..., Zt−1 ,      t−1 1 t−1 t − Zt−1 + |Z1 − , ..., Zt−1 − ≥ 0. E Zt + W W W W T Therefore sequence 0, Z1 + W1 , ..., Zt + Wt , ..., ZT + W forms a supermartingale. Now we want to bound |Zt − Zt−1 |. We know that for 0 ≤ x ≤ 1, | ln(1 + x)| ≤ x and for 0 ≤ x ≤ 1/2, | ln(1 − x)| ≤ 2|x|. Therefore for i such that wi > 0,   2 2θk+1 θ−i wi wi 2(θi − θk+1 )θ−i (θi − θk+1 )θ−i 2θk+1 | ln 1 − |≤ ≤ · ≤ W (θk+1 + θ−i )θi W (θk+1 + θ−i )θi W θi (θi − θk+1 )(θk+1 + θ−i ) W (θk − θk+1 ) and   2 θk+1 wi θi − θk+1 θi − θk+1 θk+1 θi wi |≤ · = ≤ · . | ln 1 + W θk+1 + θ−i W θk+1 + θ−i W (θi − θk+1 )(θk+1 + θ−i ) W (θk − θk+1 ) θi + θ−i 26 Therefore, we get |Zt − Zt−1 | ≤ X 2θk+1 θi 3θk+1 θk+1 + · ≤ . W (θk − θk+1 ) i∈U W (θk − θk+1 ) θi + θ−i W (θk − θk+1 ) Also notice that t  θk+1 (θk − θk+1 ) Now by Azuma’s inequality, we have 2 ≤ wk ≤ W. Pr [ZT ≤ −c1 ] ≤ exp − (π,S)∼p (c1 − T 2 ) W k+1 2T ( W (θ3θk −θ )2 k+1 ) !   (c1 − c)2 (θk − θk+1 )2 W = exp − 2 18 · c · θk+1   (c1 − c)2 ≤ exp − . 18c After we prove Lemma B.4, the rest of the proof is very similar to Theorem 3.1. We omit the argument. B.2 Lower bounds for arbitrary weights Again, the following theorem is very similar to Theorem 3.1. Theorem B.5 (Restatement P of Theorem 3.3). Assume c < 1/18. For any algorithm A (can be adaptive), if A uses c i:i>k θθki comparisons of any size (can be l-wise comparison for 2 ≤ l ≤ n), then A will identify the top-k items with probability at most 7/8. Proof. For notation convenience, we set wi = θθki for i > k. For i ≤ k, we set wi = 0. We P also set W = ni=1 wi . Then we have T = cW . First of all, we can assume A is deterministic. This is because if A is randomized, we can fix the randomness string which makes A achieves the highest successful probability. Let S = (S1 , ..., ST ) be the history of algorithm. Each St is the comparison result of round t. Notice that since A is deterministic, with S1 , ..., St , we can determine the labels of items A want to compare in round t + 1 even when A is adaptive. So there is no point to put the labels of compared items in the history. So we only put the comparison result in the history, i.e St is a number in [n] and S is a length-T string of numbers in [n]. Again since A is deterministic, the label A outputs is just a deterministic function of S, we use A(S) to denote it. A outputs correctly if A outputs the label of the top-k items, i.e. A(S) = {π1 , ..., πk }. We use p(S, π) to denote the probability that the items are labeled as π and A has history S. Now consider the case when we set θi equals to θk for i > k. In this case the probability 27 of A(S) = {π1 , ..., πk } should be at most 1/2 as item k and item i have the same weight. We use pi (S, π) to denote the probability that the items are labeled as π and A has history S when θi is changed to θk . Now we prove the following lemma that gives the connection between p(S, π) and pi (S, π). Lemma B.6. Consider p as a distribution over (π, S). For all c1 > 0, we have ! # " n   X wi pi (S, π) (c1 /c − 1)2 T ≤ −c1 ≤ exp − . ln Pr (π,S)∼p W p(S, π) 8 i=1 Proof. Define random variable Zt to be the following for t = 1, ..., T when (π, S) is sampled from distribution p: n X wi pi (S1 ...St , π) Zt = ln . W p(S1 ...St , π) i=1 We have ZT = n X wi pi (S, π) ln . W p(S, π) i=1 T forms a supermartingale. Now we want to show that sequence 0, Z1 + W1 , ..., Zt + Wt , ..., ZT + W Suppose in round t, given S , ..., S and π, Algorithm A compares items in set Ut . Let 1 t−1 P θ−i = j∈Ut ,j6=i θi . Then we have, with probability θi /(θi + θ−i ),    X wj  wi (θk − θi )θ−i θk − θj Zt − Zt−1 = + ln 1 + ln 1 − W (θk + θ−i )θi W θk + θ−j j∈Ut ,j6=i    X wj  (θk − θi )θ−i θk − θj wi − ln 1 + = − ln 1 − W (θi + θ−i )θk W θj + θ−j j∈U ,j6=i t We are going to use a simple fact about ln: for all x > −1, ln(1 + x) ≤ x.     θi (θk − θi )θ−i θ−i θk − θi − wi ln 1 − − wi ln 1 + θi + θ−i (θi + θ−i )θk θi + θ−i θi + θ−i   wi (θk − θi )θ−i θi (θk − θi )θ−i ≥ − − + θi + θ−i (θi + θ−i )θk θi + θ−i 2 (θk − θi ) θ−i θi = − (θi + θ−i )2 θk2 θi ≥ − . θi + θ−i Therefore we have for all t and S1 , ..., St−1 , E[Zt − Zt−1 |S1 , ..., St−1 ] ≥ − 28 X i∈Ut 1 θi ≥− . W (θi + θ−i ) W As Z1 , ..., Zt−1 can be determined by S1 , ..., St−1 , we have for all t and Z1 , ..., Zt−1 ,      t−1 1 t−1 t − Zt−1 + |Z1 − , ..., Zt−1 − ≥ 0. E Zt + W W W W T Therefore sequence 0, Z1 + W1 , ..., Zt + Wt , ..., ZT + W forms a supermartingale. Now we want to bound |Zt − Zt−1 |. We know that for 0 ≤ x, | ln(1 + x)| ≤ x. Therefore for i such that wi > 0,   wi wi (θk − θi )θ−i (θk − θi )θ−i (θk − θi )θ−i 1 | ln 1 + |≤ · ≤ ≤ W (θk + θ−i )θi W (θk + θ−i )θi W (θk + θ−i )θk W and   wi (θk − θi ) θk − θi θi (θk − θi ) 1 θi wi |≤ . = ≤ · | ln 1 + W θi + θ−i W (θi + θ−i ) W θk (θi + θ−i ) W θi + θ−i Therefore, we get |Zt − Zt−1 | ≤ X 1 1 θi 2 + · ≤ . W i∈U W θi + θ−i W t Now by Azuma’s inequality, we have T 2 ) (c1 − W Pr [ZT ≤ −c1 ] ≤ exp − 2 2 (π,S)∼p 2T ( W ) !   (c1 /c − 1)2 T = exp − . 8 After we prove Lemma B.6, the rest of the proof is very similar to Theorem 3.1 by picking c1 = 1/3. We omit the argument. Theorem B.7 (Restatement of Theorem 3.4). For any algorithm A (can be adaptive), if A uses k/4 comparisons of any size (can be l-wise comparison for 2 ≤ l ≤ n), then A will identify the top-k items with probability at most 2/3. Proof. First of all, we can assume A is deterministic. This is because if A is randomized, we can fix the randomness string which makes A achieves the highest successful probability. Let S = (S1 , ..., ST ) be the history of algorithm. Each St is the comparison result of round t. Notice that since A is deterministic, with S1 , ..., St , we can determine the labels of items A want to compare in round t + 1 even when A is adaptive. So there is no point to put the labels of compared items in the history. So we only put the comparison result in the history, i.e St is a number in [n] and S is a length-T string of numbers in [n]. Again since A is deterministic, the label A outputs is just a deterministic function of S, we use A(S) to denote it. A outputs correctly if A outputs the label of the top-k items, i.e. A(S) = {π1 , ..., πk }. We use p(S, π) to denote the probability that the items are labeled as π and A has history S. Now consider the case when we set θi equals to θk+1 for i ≤ k. In this case the probability 29 of A(S) = {π1 , ..., πk } should be at most 1/2 as item k + 1 and item i have the same weight. We use pi (S, π) to denote the probability that the items are labeled as π and A has history S when θi is changed to θk+1 . We define N(π, S) as the set of items among top-k items such that they are not chosen as the favorite items by algorithm A in history S with labels π. As there are only k/4 comparisons, N(π, S) ≤ 3/4 for all π, S. Now we prove the following simple lemma that gives the connection between p(S, π) and pi (S, π) for all i ∈ N(π, S). Lemma B.8. ∀π, S, i ∈ N(π, S), pi (S, π) ≥ p(S, π). Proof. We write p(S, π) as p(S, π) = T Y p(St , π|S1 ...St−1 ). t=1 And similarly pi (S, π) as pi (S, π) = T Y pi (St , π|S1 ...St−1 ). t=1 Consider the comparison in round t given S1 , S2 , ..., St , π. There are two cases 1. i-th item is not compared in round t: The change of θi does not change p(St , π|S1 ...St−1 ). So p(St , π|S1 ...St−1 ) = pi (St , π|S1...St−1 ). 2. i-th item is compared in round t: We know the i-th item is not the favorite item of round t in this history. Therefore decreasing θi to θk+1 will increase p(St , π|S1 ...St−1 ). So p(St , π|S1 ...St−1 ) ≤ pi (St , π|S1 ...St−1 ). Thus we always have p(St , π|S1...St−1 ) ≤ pi (St , π|S1 ...St−1 ). By multiplying things together we get the statement of this lemma. 30 Finally we have Pr [A(S) = {π1 , ..., πk }] X p(π, S) (π,S)∼p = π,S,A(S)={π1 ,...,πk } ≤ ≤ X π,S,A(S)={π1 ,...,πk } X π,S,A(S)={π1 ,...,πk } 1 |N(π, S)| 1 |N(π, S)| X pi (π, S) X pi (π, S) i∈N (π,S) i∈{1,...,k} 4 X pi (π, S) 3k π,S,A(S)={π1 ,...,πk } i∈{1,...,k} X 4 X pi (π, S) = 3k X ≤ ≤ 4 3k 2 . = 3 i∈{1,...,k} π,S,A(S)={π1 ,...,πk } X i∈{1,...,k} 1 2 Theorem B.9 (Restatement of Theorem 3.5). Assume c < 1/2. For any algorithm A (can be adaptive), if A uses cnl comparisons of size at most l (can be 2-wise, 3-wise,...,l-wise comparisons), then A will identify the top-k items with probability at most 7/8. Proof. We are going to prove by contradiction. Suppose there’s some A uses cnl comparisons of size at most l and identify the top-k items with probability more than 7/8. Now consider another task where the goal is just to make sure k-th item appeared in some comparison or (k + 1)-th item appeared in some comparison. Notice that when some algorithm fails this new task, then the algorithm cannot output top-k items with probability better than 1/2 because when both k-th item and (k + 1)-th item are not compared, the algorithm should output them with same probability for identifying top-k items. So algorithm A should solve the new task with probability more than 3/4. For the new task, it’s easy to see that the best strategy is to always use l-wise comparison and compare cnl · l different items. The probability of having either k-th item or (k + 1)-th item compared is cn  1 2 ≤ 1 − 2c ≤ 3/4. 1− 1− n 4 Here we need to use the fact that n ≥ 4 (when n < 4, the statement of the theorem is trivial). Now we get a contradiction. 31 Acknowledgement We would like to thank Rene Caldentey and Yifan Feng for earlier discussions of this problem. References [ACN08] N Ailon, M. Charikar, and A. Newman. Aggregating inconsistent information: ranking and clustering. Journal of the ACM, 55(5):23:1–23:27, 2008. [Ail11] N. Ailon. Active learning ranking from pairwise preferences with almost optimal query complexity. In Advances in Neural Information Processing Systems, 2011. [BM08] M. Braverman and E. Mossel. Noisy sorting without resampling. In Proceedings of ACM-SIAM symposium on discrete algorithms, 2008. [BMW16] M. Braverman, J. Mao, and M. S. Weinberg. Parallel algorithms for select and partition with noisy comparisons. In Proceedings of the Symposium on the Theory of Computing (STOC), 2016. [BT52] R. Bradley and M. Terry. Rank analysis of incomplete block designs: I. the method of paired comparisons. Biometrika, 39(3/4):324–345, 1952. [BWV13] S. Bubeck, T. Wang, and N. Viswanathan. Multiple identifications in multiarmed bandits. In Proceedings of the International Conference on Machine Learning (ICML), 2013. [CBCTH13] X. Chen, P. N. Bennett, K. Collins-Thompson, and E. Horvitz. Pairwise ranking aggregation in a crowdsourced setting. In Proceedings of the sixth ACM international conference on Web search and data mining, 2013. [CCZZ17] J. Chen, X. Chen, Q. Zhang, and Y. Zhou. Adaptive multiple-arm identification. In Proceedings of International Conference on Machine Learning (ICML), 2017. [CGMS17] X. Chen, S. Gopi, J. Mao, and J. Schneider. Competitive analysis of the top-k ranking problem. In Proceedings of ACM-SIAM Symposium on Discrete Algorithms (SODA), 2017. [CS15] Y. Chen and C. Suh. Spectral MLE: Top-k rank aggregation from pairwise comparisons. In Proceedings of the International Conference on Machine Learning (ICML), 2015. [DKNS01] C. Dwork, R. Kumar, M. Naor, and D. Sivakumar. Rank aggregation methods for the web. In Proceedings of the International World Wide Web Conference, 2001. 32 [FLN03] Ronald Fagin, Amnon Lotem, and Moni Naor. Optimal aggregation algorithms for middleware. J. Comput. Syst. Sci., 66(4):614–656, 2003. [HSRW16] Reinhard Heckel, Nihar B. Shah, Kannan Ramchandran, and Martin J. Wainwright. Active ranking from pairwise comparisons and when parametric assumptions dont help. arXiv preprint arXiv:1606.08842v2, 2016. [JKSO13] M. Jang, S. Kim, C. Suh, and S. Oh. Top-k ranking from pairwise comparisons: When spectral ranking is optimal. arXiv preprint arXiv:1603.04153, 2013. [JMNB14] K. Jamieson, M. Malloy, R. Nowak, and S. Bubeck. lil’ ucb: An optimal exploration algorithm for multi-armed bandits. In Proceedings of Conference on Learning Theory, 2014. [JN11] K. Jamieson and R. Nowak. Active ranking using pairwise comparisons. In Advances in Neural Information Processing Systems, 2011. [KMS07] C. Kenyon-Mathieu and W. Schudy. How to rank with few errors. In Proceedings of the Symposium on Theory of computing (STOC), 2007. [LB11] T. Lu and C. Boutilier. Learning mallows models with pairwise preferences. In Proceedings of the International Conference on Machine Learning (ICML), 2011. [Luc59] R. D. Luce. Individual choice behavior: A theoretical analysis. New York: Wiley, 1959. [McF73] D. McFadden. Conditional logit analysis of qualitative choice behaviour. In P. Zarembka, editor, Frontiers in Econometrics, pages 105–142. Academic Press New York, New York, NY, USA, 1973. [MS16] S. Mohajer and C. Suh. Active top-k ranking from noisy comparisons. In Proceedings of the 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2016. [NOS17] S. Negahban, S. Oh, and D. Sha. Rank centrality: Ranking from pair-wise comparisons. Operations Research, 65(1):266–287, 2017. [RA14] A. Rajkumar and S. Agarwal. A statistical convergence perspective of algorithms for rank aggregation from pairwise data. In Proceedings of the International Conference on Machine Learning (ICML), 2014. [SBGW17] N. B. Shah, S. Balakrishnan, A. Guntuboyina, and M. J. Wainright. Stochastically transitive models for pairwise comparisons: Statistical and computational issues. IEEE Transactions on Information Theory (to appear), 63(2):934–959, 2017. 33 [SBPH15] B. Szörényi, R. Busa-Fekete, A. Paul, and E. Hüllermeier. Online rank elicitation for plackett-luce: A dueling bandits approach. In Proceedings of Advances in Neural Information Processing Systems (NIPS), 2015. [STZ17] C. Suh, V. Tan, and R. Zhao. Adversarial top-k ranking. IEEE Transactions on Information Theory, 63(4):2201–2225, 2017. [SW15] N. B. Shah and M. Wainwright. Simple, robust and optimal ranking from pairwise comparisons. arXiv preprint arXiv:1512.08949, 2015. [Tra03] Kenneth Train. Discrete Choice Methods with Simulation. Cambridge University Press, 2003. [WMJ13] F. Wauthier, M.Jordan, and N. Jojic. Efficient ranking from pairwise comparisons. In Proceedings of the International Conference on Machine Learning (ICML), 2013. [ZCL14] Y. Zhou, X. Chen, and J. Li. Optimal pac multiple arm identification with applications to crowdsourcing. In Proceedings of the International Conference on Machine Learning (ICML), 2014. 34
8cs.DS
SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. arXiv:1602.00409v2 [math.GR] 10 Feb 2018 ALIREZA SALEHI GOLSEFIDY Abstract. Let Ω be a finite symmetric subset of GLn (Z[1/q0 ]), Γ := hΩi, and let πm be the group homomorphism induced by the quotient map Z[1/q0 ] → Z[1/q0 ]/mZ[1/q0 ]. Then the family of Cayley graphs {Cay(πm (Γ), πm (Ω))}m is a family of expanders as m ranges over fixed powers of square-free integers and powers of primes that are coprime to q0 if and only if the connected component of the Zariski-closure of Γ is perfect. Some of the immediate applications, e.g. orbit equivalence rigidity, largeness of certain ℓ-adic Galois representations, are also discussed. Contents 1. Introduction 2 1.1. Statement of the main results. 2 1.2. Comparing with the previous related results. 3 1.3. Applications 3 Acknowledgments. 7 2. Preliminary results and notation. 7 2.1. Notation. 7 2.2. Necessity. 8 2.3. A few reductions. 9 2.4. Algebraic homomorphisms and the congruence maps. 10 2.5. Ping-pong players. 12 2.6. Summary of the initial reductions. 14 2.7. Multiplicity bound. 14 3. Expansion, approximate subgroup, and bounded generation. 16 3.1. Largeness of level-Q approximate subgroups implies super-approximation. 16 3.2. Reduction to bounded generation and abelian unipotent radical. 19 4. Super-approximation: bounded power of square-free integers case. 23 4.1. The residue maps do not split. 23 4.2. Statistical non-splitting of residue maps. 25 Date: February 13, 2018. 1991 Mathematics Subject Classification. 22E40. A. S-G. was partially supported by the NSF grants DMS-1160472, DMS-1303121, DMS-1602137 and A. P. Sloan Research Fellowship. 1 2 ALIREZA SALEHI GOLSEFIDY 4.3. Bounded generation of perfect groups by commutators. 26 4.4. Proof of Theorem 1 for bounded powers of square-free integers. 28 5. Super-approximation: the p-adic case. 32 5.1. Escape from proper subgroups. 32 5.2. Getting a large ideal by adding/subtracting a congruence subgroup boundedly many times. 42 5.3. Getting a p-adically large vector in a submodule in boundedly many steps. 44 5.4. Proof of super-approximation: the p-adic case. 45 6. Appendix A: quantitative open image for p-adic analytic maps. 46 References 53 1. Introduction 1.1. Statement of the main results. Let Ω be a finite symmetric subset of GLn (Q), and Γ = hΩi. Since Ω is finite, for some q0 ∈ Z+ we have Γ ⊆ implies that (under certain Q GLn (Z[1/q0 ]). Strong approximation Q algebraic conditions) the closure of Γ in p∤q0 GLn (Zp ) is open in p∤q0 (G(Qp ) ∩ GLn (Zp )), where G is the Zariski-closure of Γ in GLn . In combinatorial language, this means that the Cayley graphs Cay (πm (G(Q) ∩ GLn (Z[1/q0 ])), πm (Ω)) , where m and q0 are coprime and πm is the group homomorphism induced by the quotient map πm : Z[1/q0 ] → Z[1/q0 ]/mZ[1/q0 ], have at most C := C(Ω) many connected components. The point being that C does not depend on m. Super-approximation1 tells us that these sparse graphs are highly connected, i.e. they form a family of expanders. A family {Xi }i∈I of d0 -regular graphs is called expander if there is c > 0 such that for any i ∈ I and any subset A of the set of vertices V (Xi ) of Xi we have c< |e(A, V (Xi ) \ A)| , min(|A|, |V (Xi ) \ A|) where e(A, V (Xi ) \ A) consists of the edges that connect a vertex in A to a vertex in V (Xi ) \ A. Expanders are extremely useful in communication and theoretical computer science (e.g. see [HLW06]). In the past decade they have been found useful in a wide range of pure math problems, e.g. affine sieve [BGS10, SGS13], sieve in groups [LM13], variation of Galois representations [EHK12], etc. (see [BO14] for a collection of surveys of related works and applications). In this article we prove the best possible super-approximation results for two families of residue maps. Let Vf (Q) be the set of primes in Q, and νp (q) be the p-valuation of q, i.e. the power of p in q. Theorem 1. Let Ω be a finite symmetric subset of GLN0 (Z[1/q0 ]), Γ := hΩi, and M0 be a fixed positive integer. Suppose Γ is an infinite group. Then the family of Cayley graphs {Cay(πm (Γ), πm (Ω))}m is a family of expanders as m runs through either {pn | n ∈ Z+ , p ∈ Vf (Q), p ∤ q0 } or {q| ∀p ∈ Vf (Q), νp (q) ≤ M0 } if and only if the connected component G◦ of the Zariski-closure G of Γ in GLN0 is perfect, i.e. [G◦ , G◦ ] = G◦ . 1Following A. Kontorovich’s suggestion, I call this phenomenon super-approximation. It is worth pointing out that this phenomenon has been called superstrong approximation [BO14] by some authors. SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 3 In the appendix, a quantitative open image for p-adic analytic maps is proved, which should be of independent interest. In a joint work with Zhang [SGZ], this result is used to generalize a theorem of Burger and Sarnak [BS91] to the setting of super-approximation (see Theorem 9 for the statement of this result.). 1.2. Comparing with the previous related results. The importance of Theorem 1 lies on the fact that it is an if-and-only-if statement. In fact, by Proposition 10, we get that, if {πmi (Γ), πmi (Ω)} is a family of expanders for some increasing sequence {mi } of integers that are relatively prime to q0 , then {πm (Γ), πm (Ω)}m is a family of expanders as m runs through integers specified in Theorem 1. Super-approximation for square-free numbers is the main theorem of [SGV12]. Of course it is a special case of Theorem 1 for m ∈ {q| ∀p ∈ Vf (Q), νp (q) ≤ M0 } and M0 = 1. It should, however, be noted that our proof relies on [SGV12]. Proof of this part of Theorem 1 is heavily influenced by the relevant part of [BV12]. But here, instead of working with the concrete structure of the congruence quotients of SLn (Z) as it was done in [BV12], one has to work with arbitrary perfect groups. So it is inevitable to make use of basic theorems from Bruhat-Tits theory to describe structure of a maximal compact subgroup of H(Qp ) where H is a semisimple Qp -group, and to use truncated or finite logarithmic maps [Pin98, Section 6] or [SG, Section 2.9]. In addition, one has to understand how such a maximal compact group acts on an open compact subgroup of U(Qp ) where U is a unipotent Qp -group, which makes the use of the language of schemes necessary. Proof of Theorem 1 for powers of primes relies on [SG] where the semisimple case is proved. Prior to [SG], the case of Zariski-dense subgroups of SLn (Z) was studied by Bourgain-Gamburd [BG08-b, BG09] and Bourgain-Varjú [BV12]. As it is pointed out in [SG, Section 1.3], the proofs by Bourgain and Gamburd [BG08-b, BG09] and Bourgain and Varjú [BV12] rely heavily on Archimedean dynamics. In particular, those ideas cannot be implemented for a finitely generated subgroup Γ of GLn (Q) if Γ is a bounded subgroup of GLn (R). But it is worth pointing out that, if Γ is a Zariski-dense subgroup of SLn (Z), Bourgain and Varjú [BV12] prove that {Cay(πm (Γ), πm (Ω))}m is a family of expanders with no restriction on m. Prior to the current work, no super-approximation result for powers of primes beyond semisimple case was known. To get such a result, one had to use new ideas and combine techniques from p-adic analytic analysis, p-adic analytic pro-p groups, and non-commutative algebra. 1.3. Applications. 1.3.1. Random-walk and spectral gap. Let Ω be a finite symmetric subset of a compact group G. Let µ be the counting probability measure on Ω and Γ := hΩi. Let Tµ : L2 (Γ) → L2 (Γ), Tµ (f ) := µ ∗ f, P where (µ ∗ f )(g) := g′ ∈supp µ µ(g ′ )f (g ′−1 g) and Γ is the closure of Γ in G. It is easy to see that Tµ is a self-adjoint operator, the constant function 1Γ is an eigenfunction with eigenvalue one, i.e. Tµ (1Γ ) = 1Γ , and kTµ k = 1. Let λ(µ; G) := sup{|λ|| λ ∈ spec(Tµ ), λ < 1}. We get a fairly good understanding of the random-walk in G with respect to µ if λ(µ; G) < 1, in which case it is said that either Γ y Γ or the random-walk with respect to µ has spectral gap. Let us recall a couple of well-known results which give us a connection between having spectral gap and explicit construction of expanders (see [Lub94, Chapter 4.3], [LZ03, Chapter 1.4], [SG, Remark 15]). Remark 2. (1) Let Γ be the group generated by a finite symmetric set Ω. Suppose {Ni }i∈I is a family of normal, finite-index subgroups of Γ. Suppose, for any i1 , i2 ∈ I, there is i3 ∈ I such that Ni3 ⊆ Ni1 ∩ Ni2 . Then, by Peter-Weyl theorem, one has λ(PΩ ; lim Γ/Ni ) = sup λ(PιNi (Ω) ; Γ/Ni ), ←− i 4 ALIREZA SALEHI GOLSEFIDY where ιNi : Γ → Γ/Ni is the natural quotient map. (2) Suppose {Ni }i∈I is a family of normal, finite-index subgroups of Γ. Then the family of Cayley graphs {Cay(Γ/Ni , ιNi (Ω))}i∈I is a family of expanders if and only if sup λ(PιNi (Ω) ; Γ/Ni ) < 1. i Based on these results, we get that Theorem 1 implies the following. Corollary 3. Let Ω be a finite symmetric subset of GLN0 (Z[1/q0 ]), and PΩ be the counting probability measure on Ω. Suppose the connected component G◦ of the Zariski-closure G of Γ := hΩi in GLN0 is perfect. Then for any positive integer M0 we have Y GLN0 (Z/pM0 Z)) < 1, λ(PΩ ; p∤q0 and sup λ(PΩ ; GLN0 (Zp )) < 1. p∤q0 Since a stronger form of the only-if part of Theorem 1 (see Proposition 10) holds, having spectral gap for a single place implies a uniform spectral gap for all the places. Corollary 4. Let Ω be a finite symmetric subset of GLN0 (Z[1/q0 ]), and PΩ be the counting probability measure on Ω. Then for some p ∤ q0 we have λ(PΩ ; GLN0 (Zp )) < 1 if and only if sup λ(PΩ ; GLN0 (Zp )) < 1. p∤q0 Spectral gap has a well-known weighted equidistribution consequence. Corollary 5. In the setting of Corollary 3, there is λ < 1 such that for any prime p which does not divide q0 and G(Qp ) ∩ GLN0 (Zp )-finite function f0 on G(Qp ) (which means that f0 is invariant under an open subgroup of G(Qp )) we have Z Z q X (l) | f0 (g)dgk2 |Γp · f0 |λl , f0 (g)dg| ≤ kf0 − PΩ (γ)f0 (γ) − Γp Γp γ∈Γ where Γp is the closure of Γ in GLN0 (Zp ) and it acts on functions on G(Qp ) via the right translation, i.e. (l) (g · f )(g ′ )R:= f (g ′ g), PΩ is the l-th convolution power of PΩ , dg is the probability Haar measure on Γp , and kf k2 := ( g∈Γp f (g)2 dg)1/2 . Proof. Since Ω is a symmetric set, we have that Z X (l) f0 (g)dg = Tµl (f0 )(I) − h1Γp , f0 i, (1) PΩ (γ)f0 (γ) − γ∈Γ Γp where I is the identity matrix and h, i is the dot product in L2 (Γp ). On the other hand, by Corollary 3, we have that (2) kTµl (f0 ) − h1Γp , f0 ik2 = kTµl (f0 − h1Γp , f0 i1Γp )k2 ≤ λl kf0 − h1Γp , f0 i1Γp )k2 , SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 5 where λ := supp∤q0 λ(PΩ ; GLN0 (Zp )). For any function f , let Γp,f := {g ∈ Γp | g · f = f }. Since for any g ∈ Γp and f ∈ L2 (Γp ) we have Tµ (g · f ) = g · Tµ (f ), we get that Γp,f ⊆ Γp,Tµ (f ) . So we have Z Z 2 l kTµ (f0 ) − h1Γp , f0 ik2 = |Tµl (f0 )(gg ′ ) − h1Γp , f0 i|2 dg ′ dg Γp /Γp,f0 = Z Γp /Γp,f0 = Z Γp /Γp,f0 Γp,f0 Z Γp,f0 |Tµl (f0 )(g) − h1Γp , f0 i|2 1 = [Γp : Γp,f0 ] (3) ≥ |(g ′ · Tµl (f0 ))(g) − h1Γp , f0 i|2 dg ′ dg X Z dg ′ dg Γp,f0 |Tµl (f0 )(g) − h1Γp , f0 i|2 gΓp,f0 ∈Γp /Γp,f0 − h1Γp , f0 i|2 . |Γp · f0 | |Tµl (f0 )(I) Equations (1), (2), and (3) imply the claim.  Corollary 5 is another indication that super-approximation is a suitable name for such a phenomenon as it implies a quantitative way to approximate points. 1.3.2. Orbit equivalence. Suppose Γ ⊆ G and Λ ⊆ H are dense subgroups of compact groups G and H. We say the left translation actions Γ y (G, mG ) and Λ y (H, mH ) are orbit equivalent if there exists a measure class preserving Borel isomorphism θ : G → H such that θ(Γg) = Λθ(g), for mG -almost every g ∈ G. Surprisingly, if Γ and Λ are amenable, the mentioned actions are orbit equivalent [OW80, CFW81]. In the past decade there have been a lot of progress on this subject, and as a result now it is known that one gets orbit equivalence rigidity under spectral gap assumption [Ioa14-a, Ioa14-b]. Corollary 6. Let Ω be a finite symmetric subset of GLN0 (Z[1/q0 ]), and PΩ be the counting probability measure on Ω. Suppose the connected component G◦ of the Zariski-closure G of Γ := hΩi in GLN0 is perfect. Let Γp be the closure of Γ in GLN0 (Zp ) where p ∤ q0 . Let Λ be a countable dense subgroup of a profinite group H. Then Γ y (Γp , mΓp ) and Λ y (H, mH ) are orbit equivalent if and only if there are open subgroups G0 ⊆ Γp and H0 ⊆ H and a continuous isomorphism δ : G0 → H0 such that [Γp : G0 ] = [H : H0 ] and δ(G0 ∩ Γ) = Λ ∩ H0 . In particular, H is p-adic analytic. Proof. This is a direct consequence of Corollary 3 and [Ioa14-a, Theorem A].  1.3.3. Variations of Galois representations in one-parameter families of abelian varieties. Since eight years ago, because of a surge of works by various people specially Cadoret, Tamagawa [Cad, CT12, CT13], Hui, and Larsen [Hui12, HL], we have got a much better understanding of the image of ℓ-adic and adelic Galois representations induced by Tate modules of an abelian scheme. On the other hand, Ellenberg, Hall, and Kowalski in [EHK12] gave a beautiful connection between variations of Galois representations and certain spectral gap property2. Here we make an observation that Ellenberg-Hall-Kowalski [EHK12] machinery combined with Theorem 1 gives an alternative approach towards [CT12, CT13]; in particular, we do not get any new result on this topic. In this section, let k be a finitely generated characteristic zero field, k be the algebraic closure of k, and U be a smooth algebraic curve over k such that U ×k k is connected. Let A → U be an abelian scheme of dimension g ≥ 1, defined over k. Take an embedding of k into C, and let ρ0 : π1 (U (C), y0 ) → AutU (A) ⊆ GL2g (Z) 2Instead of being expanders, they only need a weaker assumption on the relevant Schreier graphs, called esperantist graphs. 6 ALIREZA SALEHI GOLSEFIDY be the monodromy representation. Let Γ := ρ0 (π1 (U (C), y0 )), and G be the Zariski-closure of Γ in (GL2g )Q . Let Ω be a finite symmetric generating set of Γ. For any x ∈ U (k), the fiber Ax over x is an abelian variety defined over the residue field k(x) at x. For any prime l, let Tl,x be the Tate module of Ax , i.e. Tl,x := lim Ax [lm ](k), ←− where Ax [lm ](k) is the lm -th torsion elements of Ax (k). So Tl,x ≃ Z2g l and we get the l-adic Galois representation ρl,x : Gal(k/k(x)) → AutZl (Tl,x ) ≃ GL2g (Zl ). Lemma 7. In the above setting, the connected component G◦ of G is perfect. Proof. By [EHK12, Proposition 16], Γ has a finite index subgroup Λ such that πl (Λ) is a perfect group and generated by its order l elements for large enough prime l. In particular, the index of any proper subgroup of πl (Λ) is at least l. Let Γ◦ := Γ ∩ G◦ . So Γ◦ is Zariski-dense in G◦ . Since [πl (Λ) : πl (Λ ∩ Γ◦ )] ≤ [Γ : Γ◦ ], for large enough prime l we have that πl (Λ) = πl (Λ ∩ Γ◦ ). f On the other hand, the quotient map G◦ − → (G◦ )ab := G◦ /[G◦ , G◦ ] is defined over Q. Hence after realizing ◦ ab ′ (G ) as a subgroup of (GLn )Q , for large enough l we have that πl (f (Γ◦ )) is a homomorphic image of πl (Γ◦ )ab := πl (Γ◦ )/[πl (Γ◦ ), πl (Γ◦ )]. Suppose to the contrary that G◦ is not perfect. Then f (Γ◦ ) is a finitely generated, infinite, abelian group as it is a Zariski-dense subgroup of (G◦ )ab . Hence |πl (f (Γ◦ ))| → ∞ as l goes to infinity, which implies that |πl (f (Γ◦ ∩ Λ))| → ∞. Since πl (f (Γ◦ ∩ Λ)) is abelian and a homomorphic image of πl (Γ◦ ∩ Λ), we get a contradiction.  Now we can give an alternative proof of the main result of [CT12, CT13]. Proposition 8. In the above setting, for any integer d and any prime ℓ there is an integer B := B(d, ℓ, ρ0 ) such that Ud,ℓ := {x ∈ U (k)| [k(x) : k] ≤ d, [Γℓ : Im(ρℓ,x ) ∩ Γℓ ] > B}, is finite. Proof. Suppose to the contrary that there is a sequence {xi } of points in U (k) such that (1) xi 6= xj if i 6= j, (2) [k(xi ) : k] ≤ d, (3) [Γℓ : Im(ρℓ,xi ) ∩ Γℓ ] = Ni where Ni ∈ Z+ ∪ {∞}, and Ni → ∞. By Lemma 38, there is an increasing sequence {mi }i of positive integers and a sequence of open subgroups {Hi }i of Γℓ such that lim [Γℓ : Hi ] = ∞, Γℓ ∩ Im(ρℓ,xi ) ⊆ Hi , and Γℓ [ℓmi ] ⊆ Hi . i→∞ Going to a subsequence, if necessary, we can and will assume that πℓmi (Hi ) = πℓmi (Hj ) for any j ≥ i. Therefore we can and will assume that H1 ) H2 ) · · · . φi For each i, we get an open subgroup of π1et (U ×k k), and so we get an étale cover Ui −→ U of U that is defined ei ∈ Ui (k(xi )) which is in the fiber over xi ∈ U (k(xi )). Moreover, over k. Since Im(ρℓ,xi ) ⊆ Hi , there is x φij since {Hi }i is a decreasing sequence of open subgroups, we get k-étale covering maps Uj −−→ Ui for any i ≤ j that satisfy φi ◦ φij = φj . In particular, we have that [ Ui (k ′ ) (4) {φij (e xj )}j ⊆ [k′ :k]≤d SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 7 is an infinite subset for any i. On the other hand, since π1et (Ui ×k k) is the profinite closure of π1 (Ui (C), x0 ), the natural embedding induces an isomorphism between the Schreier graphs (5) Sch(π1 (U (C), x0 )/π1 (Ui (C), x e0,i ); Ω) ≃ Sch(πℓmi (Γℓ )/πℓmi (Hi ); πℓmi (Ω)), where x e0,i is a point over x0 . On the other hand, by Lemma 7 and Theorem 1, we have that (6) {Cay(πℓmi (Γ); πℓmi (Ω)}i is a family of expanders. Since the Schreier graphs in (5) are quotients of the Cayley graphs in (6) and their size goes to infinity, they form a family of expanders. Therefore by the main result of EllenbergHall-Kowalski [EHK12, Theorem 8] we have that the (geometric) gonality γ(Ui ) of Ui goes to infinity. Hence by a corollary [CT13, Theorem 2.1] of Falting’s theorem [Fal91] on Lang-Mordell conjecture (see [Fer94, Mc95, Maz00]) we have that [ Ui (k ′ ) [k′ :k]≤d is finite for large enough i. This contradicts (4).  1.3.4. Inducing super-approximation. As it was mentioned earlier, in the appendix a quantitative open function theorem (see Lemma 53′ ) is proved, which is of independent interest. This result plays an important role in my joint work with Zhang [SGZ], where we prove that one can induce super-approximation from a subgroup under a mild (and needed) algebraic condition. Theorem 9. Let Ω1 be a finite symmetric subset of GLN0 (Z[1/q0 ]), and Γ1 := hΩ1 i. Let Ω2 be a finite symmetric subset of Γ1 , and Γ2 := hΩ2 i. Let G◦i be the connected component of the Zariski-closure of Γi in GLN0 for i = 1, 2. Suppose the smallest normal subgroup of G◦1 which contains G◦2 is G◦1 . Then, if Γ2 has super-approximation, then Γ1 has, too; that is equivalent to say Y Y Zp ) < 1. Zp ) < 1 =⇒ λ(PΩ1 ; λ(PΩ2 ; p∤q0 p∤q0 Such a result for arithmetic groups was proved by Burger and Sarnak [BS91]. Acknowledgments. I would like to thank Adrian Ioana for pointing out the application of spectral gap to orbit rigidity. I am thankful to Cristian Popescu for useful conversations concerning ℓ-adic Galois representations. Special thanks are due to Efim Zelmanov for his support and encouragement. My sincere appreciation goes to the referees for all the corrections and suggestions, which made this article much easier to read, and for helping me to spot some inconsistencies in the first version of this work. 2. Preliminary results and notation. 2.1. Notation. In this note, for two real valued functions f and g, and a set of parameters X, we write f = OX (g) if there are positive functions C1 (X) and C2 (X) of the set of parameters such that for t ≥ C1 (X) we have 0 ≤ f ≤ C2 (X)g; notice that this is slightly different from the usual Landau symbol as OX (g) is assumed to be non-negative. For two real valued functions f and g of a real variable t and a set of parameters X, we write f = ΘX (g) if there are positive functions C1 (X), C2 (X), and C3 (X) such that C1 (X)g(t) ≤ f (t) ≤ C2 (X)g(t) for any t ≥ C3 (X). For two real valued functions f and g of a real variable t and a set of parameters X, we write f ≪X g if there are positive functions C1 (X) and C2 (X) such that for t ≥ C2 (X) we have f (t) ≤ C1 (X)g(t). So for two non-negative functions f and g we have f = OX (g) if and only if f ≪X g; and f = ΘX (g) if and only if g ≪X f ≪X g. 8 ALIREZA SALEHI GOLSEFIDY For a (commutative unital) ring R and a ∈ R, πa : R → R/aR is the quotient map. We denote also the induced group homomorphism GLn (R) → GLn (R/aR) and all of its restrictions by πa . For a subgroup Γ of GLn (R), Γ[a] denotes {γ ∈ Γ| πa (γ) = 1}; in particular Γ[1] = Γ. Q · · · · · A} for the subset {a1 · · · ac | a1 , . . . , aC ∈ A}; For a subset A of a group G, we write either C A or A | · A {z C times −1 −1 −1 A P denotes the subset {a | a ∈ A}; and A is called symmetric if A = A . For an additive group G, C A denotes the subset {a1 + · · · + aC | a1 , . . . , aC ∈ A}. For a measure µ on a group G, we let supp µ be the support of µ. For a measure µ on a group G and g ∈ G, we let µ(g) := µ({g}). For a measure µ with finite support on a group G and Pa complex valued function f on G, we let µ ∗ f be the convolution of µ and f , that means (µ ∗ f )(g) = s∈supp(µ) µ(s)f (s−1 g). For a (l) measure µ with finite support on a group G, P we let µ be the l-fold convolution of µ, that means for any (l) g ∈ G, we have µ (g) = (µ ∗ · · · ∗ µ)(g) = g1 ···gl =g µ(g1 ) · · · µ(gl ). We say a measure µ with finite support | {z } l times on a group G is symmetric if µ(g −1 ) = µ(g) for any g ∈ G. For a finite subset X of a group G, we let PX be the probability counting measure on X. The set of (rational) primes is denoted by Vf (Q). For any prime p, fp denotes the finite field with p elements; Qp is the field of p-adic numbers; Zp is the ring of p-adic integers; and vp : Qp \ {0} → Z (and its restriction to Q \ {0}) is the p-adic valuation, that means vp (x) = n if and only if x ∈ pn Zp \ pn+1 Zp . For any prime p and x ∈ Qp , we let |x|p := (1/p)vp (x) if x 6= 0, and |0|p := 0. 2.2. Necessity. In this section, we will prove that getting a family of expanders modulo an infinite sequence of integers implies that the connected component of the Zariski-closure is perfect (see Proposition 10). In particular, we get the necessary part of Theorem 1. Let us remark that proof of [SGV12, Section 5.1] can be adjusted to give the necessary part of Theorem 1 for any fixed prime p. The main point being that the proof in [SGV12] makes use of the fact that the congruence kernels modulo square-free numbers define a topology. The proof here is rather straightforward and has three parts: (a) Changing Γ to Γ◦ := Γ ∩ G◦ , we can and will assume G is Zariski-connected; (b) If G has infinite abelianization Gab := G/[G, G], then the order of the abelianization πqi (Γ)ab of πqi (Γ) gets arbitrarily large as qi goes to infinity. (c) If S is a finite symmetric generating set of an abelian group A, then the order of A is bounded by a function of |S| and λ(PS ; A) (see [LW93, Corollary 3.3]). Proposition 10. Let Ω be a finite symmetric subset of GLn (Z[1/q0 ]) and Γ = hΩi ⊆ GLn (Z[1/q0 ]). Let G◦ be the Zariski-connected component of the Zariski-closure G of Γ in (GLn )Q . If {Cay(πqi (Γ), πqi (Ω))}i is a family of expanders for integers q1 < q2 < · · · coprime with q0 , then G◦ is perfect, i.e. [G◦ , G◦ ] = G◦ . Proof. Let Γ◦ := Γ ∩ G◦ . Then, by [SG, Corollary 17], Γ◦ has a finite symmetric generating set Ω◦ and {Cay(πqi (Γ◦ ), πqi (Ω◦ ))}i is a family of expanders. Therefore for some positive integer C we have |πqi (Γ◦ )/[πqi (Γ◦ ), πqi (Γ◦ )]| < C for any i (see [LW93, Corollary 3.3]). f On the other hand, G◦ and [G◦ , G◦ ] are Q-groups, and the quotient map G◦ − → G◦ /[G◦ , G◦ ] is a Q◦ ◦ ◦ homomorphism. Therefore G /[G , G ] can be viewed as a Q-subgroup of (GLn′ )Q such that first the quotient map f induces a Q-homomorphism from G to (GLn′ )Q and second f (Γ◦ ) ⊆ GLn′ (Z[1/q0 ]). So there is an integer q ′ such that for any prime p we have kf (γ) − Ikp ≤ |q ′ |−1 p kγ − Ikp . Therefore f induces an SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 9 epimorphism from πqi (Γ◦ )/[πqi (Γ◦ ), πqi (Γ◦ )] onto πqi / gcd(qi ,q′ ) (f (Γ◦ )). Hence for any i we have |πqi / gcd(qi ,q′ ) (f (Γ◦ ))| < C. Since f (Γ◦ ) is a Zariski-dense subset of G◦ /[G◦ , G◦ ] and modulo arbitrarily large integers it has at most C elements, we have that G◦ /[G◦ , G◦ ] is finite. So by the connectedness we have that G◦ is perfect.  2.3. A few reductions. In this section, we make a few reductions and describe the group structure of πQ (Γ) using strong approximation [Nor89]. Lemma 11. It is enough to prove the sufficiency part of Theorem 1 under the following additional assumptions on the Zariski-closure G of Γ in (GLn0 )Q : There are connected, simply-connected, semisimple Q-group Gs , and unipotent Q-group U such that Gs acts on U and G ≃ Gs ⋉ U. Proof. A similar argument as in the proof of [SG, Lemma 18] works here. For the convenience of the reader, we present an outline of the proof. By the assumption, G◦ is a perfect group. Therefore the radical U of G◦ is unipotent. Let Gs be a Levi e s be the simply-connected cover of Gs , and ι : G e s ⋉ U → Gs ⋉ U = G◦ be the induced subgroup of G◦ , G e covering map. To lift the problem to G, we consider e e := ι−1 (Γ ∩ G◦ (Q)) ∩ G(Q), Λ e e Since G◦ (Q)/ι(G(Q)) and Λ := ι(Λ). is a torsion abelian group and Γ is a finitely generated group, we have that Λ is a normal finite index subgroup of Γ. Therefore by [SG, Corollary 17] we have that Λ has a finite symmetric generating set Ω′ and for any family of positive integers C we have that {Cay(πq (Γ), πq (Ω))}q∈C is a family of expanders if and only if {Cay(πq (Λ), πq (Ω′ ))}q∈C is a family of expanders. e → (GLn′ )Q . Since Γ ⊆ GLn0 (Z[1/q0 ]), after passing to a (normal) finite index Let us fix an embedding f : G 0 e ⊆ GLn′ (Z[1/q0 ]). Since ι is an isogeny defined subgroup of Λ, if needed, we can and will assume that f (Λ) 0 ′ e we have over Q, there is q0 ∈ Z such that for any positive integer q and γ ∈ Λ πq (f (γ)) = 1 implies πq/ gcd(q0′ ,q) (ι(γ)) = 1. e maps onto πq/ gcd(q,q′ ) (Λ) via the map induced by ι. Therefore if Theorem 1 is proved for the Hence πq (Λ) 0 e e ⊆ GLn′ (Z[1/q0 ]), we get the desired result for the group Γ. Hence we can focus on the group Λ group Λ 0 e and the claim follows. which is Zariski-dense in G;  Lemma 12. Let G and G be the Zariski-closure of Γ in (GLn0 )Z[1/q0 ] and (GLn0 )Q , respectively. Let Gs be a semisimple Q-subgroup of G, and U be a unipotent Q-subgroup of G such that G = Gs ⋉ U. It is enough to prove the sufficiency part of Theorem 1 under the following additional assumptions on the b of Γ in Q closure Γ p∤q0 GLn0 (Zp ): Q Q b= (1) Γ p∤q0 Pp is an open compact subgroup of p∤q0 G(Zp ). ′ (2) For some non-negative integer q0 and any prime p ∤ q0 , we have Pp = G(Qp ) ∩ GLn0 (Zp )[pkp ], where kp := vp (q0′ ) and GLn0 (Zp )[pkp ] := {g ∈ GLn0 (Zp )| kg − 1kp ≤ p−kp }. And Pp = Kp ⋉ Up where Kp := Gs (Qp ) ∩ GLn0 (Zp )[pkp ], Up := U(Qp ) ∩ GLn0 (Zp )[pkp ]. (3) There is a prime p0 such that, for p ≥ p0 , Kp = Gs (Qp ) ∩ GLn0 (Zp ) is a hyperspecial parahoric subgroup of Gs (Qp ), and Up = U(Qp ) ∩ GLn0 (Zp ). (4) For p ≥ p0 , the dimension of any non-trivial irreducible representation of πp (Γ) ≃ G(fp ) is at least |πp (Γ)|Odim G (1) . Proof. By [SG, Corollary 17], we are allowed to pass to a finite-index subgroup of Γ if needed. By Lemma 11 we can and will assume that G is connected, simply-connected, and perfect. Hence by Strong approximation 10 ALIREZA SALEHI GOLSEFIDY Q b is an open subgroup of we have that Γ p∤q0 G(Zp ) (see [Nor89, Theorem 5.4]). So passing to a finite-index subgroup we get part 1. By [Tit79, Section 3.8], for large enough p, Kp is a hyperspecial parahoric. (See the same reference for the definition of hyperspecial; here we use the property that πp (Kp ) is a product of quasi-simple groups where the number of factors and their ranks are bounded by dim Gs .) Since the action of Gs on U is defined over Q, one gets the other claims of part 2 and part 3. Moreover, for large enough p, πp (Γ) = πp (Kp ) ⋉ πp (Up ) is a perfect group. Hence by [SGV12, Corollary 14] the restriction of any non-trivial representation ρ of πp (Γ) to πp (Kp ) is non-trivial. Since Kp is hyperspecial, πp (Kp ) is a product of quasi-simple groups where the number of factors and their ranks are bounded by dim Gs . Therefore by [LS74] we have dim ρ ≥ |πp (Kp )|Odim Gs (1) ≥ |πp (Γ)|Odim G (1) .  b and so We notice that the restriction of πq to Γ factors through Γ, Y Y πpni (Kpi ) ⋉ πpni (Upi ). πpni (Ppi ) ≃ πQ pni (Γ) ≃ i i i i i i i 2.4. Algebraic homomorphisms and the congruence maps. In this section, an auxiliary result on the relation between the congruence maps and Q-group homomorphisms is proved (see Lemma 13). This relation is crucial for reducing the proof of the main theorem to the case where the unipotent radical is abelian. Here is a general formulation of the issue (without a reference to affine group schemes): suppose H1 ⊆ (GLn1 )Q and H2 ⊆ (GLn2 )Q are given, and ρ : H1 → H2 is a Q-groupQhomomorphism. For any positive integer q and i = 1, 2, let πq be the induced group homomorphism on p GLni (Zp ). For any prime p, let Hi,p := Hi (Qp ) ∩ GLni (Zp ). One would like to have that ρ and πq commute; that means the following (wrong) isomorphism Y Y (7) πq (ρ( H1,p )) ≃ ρ(πq ( H1,p )). p p Q Q Equation (7) has two issues: (a) ρ( p H1,p ) is not necessarily a subgroup of p H2,p , and so it does not make sense to talk about its congruence quotient, (b) ρ is defined by polynomials with rational coefficients Q that are not necessarily integer. So it does not make sense to talk about ρ of the finite group πq ( p H1,p ). In Lemma 13 under the assumption that ρ is surjective with a Q-section, an almost commuting of ρ and πq is proved; in particular, it is proved that, if q does not have small prime factors, then the isomorphism in Equation (7) holds. The main ingredient in the proof of Lemma 13 is the fact that a Q-homomorphism ρ : H1 → H2 between two algebraic Q-groups H1 and H2 induces a continuous homomorphism between the adelic points H1 (AQ ) and H2 (AQ ). After proving Lemma 13, it will be used for the quotient maps ρ1 : G → Gs and ρ2 : G → Gs ⋉ U/[U, U] where Gs is a Levi Q-subgroup of G, and U is the unipotent radical of G. Lemma 13. Let H ⊆ (GLn1 )Q be a Q-subgroup (with a given embedding). Let ρ : H → (GLn2 )Q be a Q-homomorphism. Then the following hold. (1) There is g ∈ GLn2 (Q) such that ρ(H(Q) ∩ GLn1 (Z[1/q0 ])) ⊆ g GLn2 (Z[1/q0 ])g −1 . (2) There is a positive integer q ′ such that for any prime p and any h ∈ H(Qp ) we have kρ(h) − 1kp ≤ |q ′ |−1 p kh − 1kp . ρ (3) Let 1 → L → H − → H̄ → 1 be a short exact sequence of Q-groups. Suppose there is a Q-section s : H̄ → H such that s(1) = 1. Let q0′ be a positive integer and kp := vp (q0′ ). For any prime p ∤ q0 , let Qp = H(Qp ) ∩ (1 + q0′ gln1 (Zp )) = {hp ∈ H(Qp )| khp − 1k ≤ p−kp }. Assume that ρ(Qp ) ⊆ GLn2 (Zp ), SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. Q (8) 11 ′ kp and s(ρ(Qp )) ⊆ GLn1 (Zp ) for any prime p ∤ q0 . Then there is a positive integer q ′ := p p such that for non-negative integers np ≥ kp′ + kp we have Y Y Y πpnp −kp′ (Qp )/πpnp −kp′ (L(Qp ) ∩ Qp ). πpnp (ρ(Qp )) ։ πpnp +kp′ (Qp )/πpnp +kp′ (L(Qp ) ∩ Qp ) ։ p∤q0 p∤q0 p∤q0 Proof. For any p there is gp ∈ GLn2 (Qp ) such that gp ρ(H(Qp ) ∩ GLn1 (Zp ))gp−1 ⊆ GLn2 (Zp ). Since ρ is defined over Q, for large enough p, we can assume that gp = 1. Hence there is gb = (gp ) ∈ GLn2 (AQ ) such that Y Y GLn2 (Zp ), GLn2 (Qp ) g −1 ⊆ GLn2 (R) g∆(ρ(H(Q) ∩ GLn1 (Z[1/q0 ])))b b p∤q0 p|q0 where ∆ is the diagonal embedding. On the other hand, we have   Y Y GLn2 (Qp ) GLn2 (AQ ) = ∆(GLn2 (Q)) · GLn2 (R) GLn2 (Zp ) . p|q0 So there is g ∈ GLn2 (Q) such that  ∆(gρ(H(Q) ∩ GLn1 (Z[1/q0 ]))g −1 ) ⊆ GLn2 (R) Y GLn2 (Qp ) p|q0 = ∆(GLn2 (Z[1/q0 ])), p∤q0 Y p∤q0  GLn2 (Zp ) ∩ ∆(GLn2 (Q)) which gives us the first part. The second part is an easy consequence of the fact that ρ can be represented by a polynomial with rational coefficients. Similarly there is a positive integer q ′ such that |q ′ |p ks(ρ(hp )) − 1kp ≤ kρ(hp ) − 1kp ≤ |q ′ |−1 p khp − 1kp , (9) for any prime p and hp ∈ H(Qp ). On the other hand, hp ∈ ker(πpn ◦ ρ) if and only if kρ(hp ) − 1kp ≤ p−n . (10) These imply that for hp ∈ ker(πpn ◦ ρ) we have πpn−kp′ (s(ρ(hp ))) = 1. And so if hp ∈ Qp and πpn (ρ(hp )) = 1, then we have hp = (hp s(ρ(hp ))−1 ) · s(ρ(hp )) ∈ (L(Qp ) ∩ Qp ) ker πpn−kp′ . (11) Let φe1 : Qp → πpnp −kp′ (Qp )/πpnp −kp′ (L(Qp ) ∩ Qp ), φe1 (hp ) := πpnp −kp′ (hp )πpnp −kp′ (L(Qp ) ∩ Qp ). Then clearly φe1 is surjective. By (11), φe1 factors through πpnp (ρ(Qp )); that means πpnp (ρ(Qp )) ։ πpnp −kp′ (Qp )/πpnp −kp′ (L(Qp ) ∩ Qp ). Let φe2 : Qp → πpnp (ρ(Qp )), φe2 (hp ) := πpnp (ρ(hp )). So clearly φe2 is surjective. By (9) and (10), we have, if ′ ′ −np −kp kp = p−np ; and so hp ∈ ker φe2 . Therefore πpnp +kp′ (hp ) = 1, then kρ(hp ) − 1kp ≤ |q ′ |−1 p khp − 1kp ≤ p p φe2 factors through π np +k′ (Qp ). By the definition of φe2 we have L(Qp ) ∩ Qp ⊆ ker φe2 . Hence we get a p p surjection πpnp +kp′ (Qp )/πpnp +kp′ (L(Qp ) ∩ Qp ) ։ πpnp (ρ(Qp )). The claim follows.  Let Gs be a simply connected semisimple Q-group which acts on a unipotent Q-group U. Then by the virtue of the proof of [SGV12, Corollary 14] G = Gs ⋉ U is a perfect group if and only if Gs ⋉ U/[U, U] is perfect. On the other hand, V := U/[U, U] is a vector Q-group, and the action of Gs on U induces a representation φ0 : Gs → GL(V) defined over Q. And Gs ⋉ V is perfect if and only if the trivial representation is not a subrepresentation of φ0 . Consider the following short exact sequences of Q-algebraic groups (12) ρ1 1 → U → G −→ Gs → 1 and ρ2 1 → [U, U] → G −→ Gs ⋉ V → 1. 12 ALIREZA SALEHI GOLSEFIDY We notice that, since the U is a Q-unipotent group, there is a Q-section from V to U, which can be extended to a Q-section for the second exact sequence of (12). The first exact sequence clearly splits. We fix certain Q-embeddings Gs ⊆ G ⊆ (GLn1 )Q and Gs ⋉ V ⊆ (GLn2 )Q . Let Γ ⊆ G ∩ GLn1 (Z[1/q0 ]) be a Zariski-dense subgroup. Then by Lemma 13 after passing to a finite index subgroup, if necessary, we can assume that ρ2 (Γ) ⊆ GLn2 (Z[1/q0 ]). By the above comment, we are also allowed to use (8) in Lemma 13 for the p-adic closure of Γ in G(Qp ) for any p ∤ q0 . 2.5. Ping-pong players. As in [SGV12, SG], we work with a Zariski-dense free subgroup of Γ. Following [SG, Proposition 22], using [SGV12, Proposition 7, Proposition 17, Proposition 20] we get the following. Proposition 14. Let Ω be a finite symmetric subset of GLn (Q) which generates a Zariski-dense subgroup Γ of a Zariski-connected perfect group G. Then there are a finite subset Ω′ of Γ and δ0 > 0 and l0 (which depend on Ω) such that Ω′ freely generates a Zariski-dense subgroup of G(Q) and (13) (l) PΩ′ (H(F )) ≤ e−δ0 l −1 for any field extension F/Q, and any proper subgroup H ( G ×Q F and l ≥ l0 , where Ω′ = Ω′ ∪ Ω′ and PΩ′ is the probability counting measure on Ω′ . Moreover, Ad(ρ1 (Ω′ )) freely generates a subgroup of Ad(Gs (Q)), where ρ1 : G → Gs is the quotient map; in particular, ker(Ad ◦ρ1 ) ∩ hΩ′ i = {1}. Proof. This is essentially proved in [SGV12, Proposition 7, Proposition 17, Proposition 20]. Here is an outline of the argument. By [SGV12, Proposition 17] there are irreducible representations ηi of G :→ GL(Wi ) defined over local fields Fi and algebraic deformations φi,v : G → Aff(Wi ) of ηi where the parameter v varies in an affine space Vi with the following properties: (1) (2) (3) (4) (5) for any i, ηi factors through Gs , and at least one of them factors through Ad(Gs ); for any i, ηi (Γ) ⊆ GL(Wi (Fi )) is unbounded; the linear part of φi,v is ηi for any v ∈ Vi (Fi ); for any non-zero vector v, the affine action of G(Fi ) on Wi (Fi ) via φi,v has no fixed point; for any proper algebraic subgroup H of G for some i either (a) there is a non-zero vector w ∈ Wi (Fi ) such that ηi (H(Fi ))[w] = [w] where [w] is the line Fi w, or (b) there is a parameter v ∈ Vi (Fi ) of norm 1 and a point w ∈ Wi (Fi ) such that w is fixed by H under the affine action of G on Wi given by φi,v . By [SGV12, Proposition 20 and Proposition 21], there is a finite subset Ω′ ⊆ Γ such that (1) for any i, ηi (Ω′ ) freely generates a subgroup of ηi (Γ); in particular Ad(ρ1 (Ω′ )) freely generates a subgroup of Ad(Gs (Q)) where ρ1 : G → Gs is the projection to the semisimple part. (2) there is c0 > 0 such that, for any index i, and non-zero vector w0 ∈ Wi (Fi ), we have |{γ ∈ Bl (Ω′ )| ηi (γ)[w0 ] = [w0 ]}| ≤ |Bl (Ω′ )|1−c0 , and, for any point w1 ∈ Wi (Fi ), and parameter vi ∈ Vi (Fi ) with norm one, |{γ ∈ Bl (Ω′ )| φi,v (γ)(w1 ) = (w1 )}| ≤ |Bl (Ω′ )|1−c0 , ′ where Bl (Ω′ ) is the the set of reduced words over Ω of length l. Hence, by the above geometric description of proper algebraic subgroups, for any proper algebraic subgroup H of G we have |Bl (Ω′ ) ∩ H(Q)| < |Bl (Ω′ )|1−c0 . SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. −1  (l) ′ 13 l |−1 , where I is . By a result of Kesten [Kes59, Theorem 3] we have PΩ′ (I) ≤ 2|Ω |Ω′ |2 P (l) 2 (2l) ′ the identity matrix. As Ω is symmetric, we have PΩ′ (I) = γ PΩ′ (γ) . Hence together with the Kesten bound we have  l 2|Ω′ | − 1 (2l) (l) (14) PΩ′ (γ) ≤ PΩ′ (I) ≤ . |Ω′ |2 Let Ω′ := Ω′ ∪ Ω′ We also notice that, since the random-walk in the group generated by Ω′ with respect to the probability (l) counting measure PΩ′ on Ω′ can be identified with the random-walk on a regular tree, PΩ′ is constant on (l) the set Bk (Ω′ ) of reduced words in Ω′ of length k for any positive integer k. Let pl,k := PΩ′ (γ) for some γ ∈ Bk (Ω′ ). For a proper subgroup H of G ×Q F , let H be the Zariski-closure of Γ ∩ H(F ) in G. Then H is a subgroup of (l) (l) G and PΩ′ (H(F )) = PΩ′ (H(Q)). Now we can finish the argument as in the proof of [SGV12, Proposition 7]: X (l) (l) PΩ′ (H(F )) = PΩ′ (H(Q)) = |BΩ′ (k) ∩ H(Q)| pl,k  ≤ k≥0 X 0≤k<l/10 (2|Ω′ |)l/10  (2|Ω′ |)k   2|Ω′ | − 1 |Ω′ |2 l + (2|Ω′ | − 1)−c0 l/10 X |Bk (Ω′ )|pl,k k≥l/10 + (2|Ω′ | − 1)−c0 l/10 ≤ e−δ0 l , (|Ω′ |/2)l for some δ0 and any l ≥ l0 where l0 is a fixed positive integer. ≤  Lemma 15. Let Ω be a finite symmetric subset of GLn0 (Z[1/q0 ]) and Γ = hΩi. Assume the Zariski-closure G of Γ is a connected, simply connected, perfect Q-group. Suppose Ω′ ⊆ Γ is a finite symmetric set which generates a Zariski-dense subgroup Λ of G. Then for any set of positive integers C consisting of integers coprime to q0 if {Cay(πq (Λ), πq (Ω′ ))}q∈C is a family of expanders, then {Cay(πq (Γ), πq (Ω))}q∈C is a family of expanders. b of Λ in Proof. By Nori’s strong approximation (see [Nor89, Theorem 5.4]), we have that the closure Λ Q Q b p∤q0 GLn0 (Zp ). For any q, any representation ρ p∤q0 GLn0 (Zp ) is of finite index in the closure Γ of Γ in b The extension of ρ to Γ b is denoted by ρ too. Only finitely of πq (Γ) can be viewed as a representation of Γ. b many of them have Λ in their kernel. Hence the restriction to Λ of only finitely many such representation is trivial. Let ρ be an irreducible representation of πq (Γ) whose restriction to PΛ is not trivial. Hence the restriction of ρ to Λ is a subrepresentation of L2 (πq (Λ))◦ := {f ∈ L2 (πq (Λ))| g∈πq (Λ) f (g) = 0}. Let u ∈ Vρ be a unit vector which is an ε-almost invariant vector with respect to Ω; that means kρ(γ)(u) − uk < ε, Q for any γ ∈ Ω. Since Ω generates Γ and Ω ⊆ Γ, for some r0 we have Ω′ ⊆ r0 Ω. Thus for any λ ∈ Ω′ we have kρ(λ)(u) − (u)k < r0 ε. ′ Assuming {Cay(πq (Λ), πq (Ω ))}q∈C is a family of expanders, there is ε0 > 0 such that ′ max′ kρ(λ)(u) − uk > ε0 . λ∈Ω Therefore ε > ε0 /r0 , which implies that no non-trivial irreducible representation of πq (Γ) (for q ∈ C) has an ε′ -almost invariant vector for some ε′ > 0.  Corollary 16. It is enough to prove the sufficiency part of Theorem 1 under the additional assumptions: (1) Ω = Ω ∪ Ω −1 where Ad(ρ1 (Ω)) freely generates a Zariski-dense subgroup of Ad(Gs ). 14 ALIREZA SALEHI GOLSEFIDY (2) For any field extension F/Q and proper subgroup H of G ×Q F , (13) holds. Remark 17. Notice that by changing Ω, the closure Γp of Γ in GLn0 (Zp ) is of the form described in Lemma 12 only for large enough p. For small primes Γp is still an open subgroup of G(Qp ). 2.6. Summary of the initial reductions. In the rest of the article, (unless it is explicitly mentioned otherwise) we assume that Ω ⊆ GLn0 (Z[1/q0 ]) is a finite symmetric set, and set Γ = hΩi. And let G and G be the Zariski-closure of Γ in (GLn0 )Z[1/q0 ] and (GLn0 )Q , respectively. (1) (Zariski closure) By Lemma 11, we can and will assume that G is a connected, simply connected, perfect group. We let Gs be a Levi Q-subgroup of G, and U be the unipotent radical of G. b (2) Q (Adelic closure) By Lemma 12 and Remark Q 17, we can and will assume that the closure Γ of Γ in G(Q ) which contains a finite index subgroup of the (Z ) is an open subgroup of GL p p p∤q0 p∤q0 Q n0 form p∤q0 Pp where Pp = Kp ⋉ Up and Kp and Up satisfy the properties mentioned in Lemma 12. In particular, Pp = G(Qp ) ∩ GLn0 (Zp )[pkp ], Kp = Gs (Qp ) ∩ GLn0 (Zp )[pkp ], and Up = U(Qp ) ∩ GLn0 (Zp )[pkp ] for some non-negative integers kp that are zero for large enough p. (3) (Generating set) We can and will assume that Ω is as in Corollary 16. In particular, ker(Ad ◦ρ1 )∩Γ = {1}, and any proper algebraic subgroup of G intersects Γ in an exponentially small subset (see Inequality (13)). 2.7. Multiplicity bound. In order to execute Sarnak-Xue [SX91] trick, we need to have a control on the degree of irreducible representations of πq (Γ). Here we prove such a result for an arbitrary modulus q which is of independent interest. Proposition 18. Let Γ ⊆ GLn (Z[1/q0 ]) be a finitely generated group whose Zariski-closure G is a Zariskiconnected perfect group. Suppose G is simply-connected; that means G = Gs ⋉ U where Gs is a simplyb connected semisimple Q group and U is a unipotent group. Let q be an integer which is co-prime to q0 . Let Γ be the closure of Γ in p∤q0 GLn (Zp ). b and δ > 0 which depend on Γ such Then there are a finite set Σ of complex irreducible representations of Γ that the following holds. For any complex irreducible representation ρ of πq (Γ) which does not factor through πq′ (Γ) for any proper divisor q ′ of q, we have that either b is in Σ, or (1) The lift of ρ to Γ (2) dim ρ ≥ |πq (Γ)|δ . For a group with entries in a number field and a semisimple Zariski-closure, a similar statement is proved in [SG, Proposition 33]. An identical argument works here, but for the sake of the convenience a proof is included. It is worth pointing out that the main (behind the scene) representation theoretic tool is Howe’s Kirillov theory for compact p-adic analytic groups [How77]. For any odd prime p, let a0 (p) := 1, and let a0 (2) := 2. Then exp : pa0 (p) gln (Zp ) → 1 + pa0 (p) gln (Zp ), and log going backward, can be defined and satisfy the usual properties. Let b0 (p) := 1 for any prime p ≥ 5, and let b0 (2) = b0 (3) = 2. Then, by Campbell-Hausdorff formula, we have that for any Lie Zp -subalgebra h of pa0 (p) gln (Zp ) we have that exp(h) is a subgroup of 1 + pa0 (p) gln (Zp ). Lemma 19. Let H be an algebraic subgroup of (GLn )Qp . Let Hc := H(Qp ) ∩ (1 + pc gln (Zp )) for any positive integer c. Let h := Lie(H)(Qp ) ∩ gln (Zp ). Suppose ps0 h ⊆ [h, h]. Let ρ be an irreducible complex representation of Hc , c ≥ b0 (p) + 1, and mρ := min{m ∈ Z+ | Hm ⊆ ker(ρ)}. Then dim ρ ≥ p(mρ −1−c−s0 )/2 . SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 15 Proof. Since the analytic Lie algebra of H(Qp ) coincides with Lie(H)(Qp ), we get that log : Hm → pm h is a bijection and the exponential map is its inverse (for a detailed proof see [SGZ, Proposition 7]). We notice also that pm+s0 (pm h) ⊆ [pm h, pm h] ⊆ pm (pm h). Hence by [SG, Lemma 32] we have dim ρ ≥ p(mρ −1−c−s0 )/2 .  Proof of Proposition 18. Let Gp,m := G(Qp )∩(1 + pm GLn (Zp )) for any prime p and non-negative integer m. m b be the closure of Γ in Q Let Γ p∤q0 GLn (Zp ), let Γp be the closure of Γ in GLn (Zp ), and Γp [p ] := Γp ∩ Gp,m . As in Lemma 12, by Nori’s strong approximation [Nor89, Theorem 5.4], there is a finite-index subgroup Q b in Q Λ of Γ such that its closure Λ p∤q0 Λp , where Λp ’s satisfy the following p∤q0 GLn (Zp ) is of the form properties. (1) For some positive integer c0 we have that, for any prime p ≥ c0 , Λp = Gp,0 and it is a perfect group, and πp (Λp ) is generated by p-elements; (2) For any prime p < c0 , we have Λp = Gp,c(p) where c(p) is chosen large enough such that Λp ⊆ Gp,8 . Since G is perfect, [Lie(G)(Q), Lie(G)(Q)] = Lie(G)(Q). Hence there is a positive integer s0 such that for any prime p we have ps0 gp ⊆ [gp , gp ] where gp := Lie(G)(Qp ) ∩ gln (Zp ). Let ρ : πq (Γ) → GL(V ) be a complex irreducible representation which does not factor through πq′ (Γ) for any proper divisor q ′ of q.QThen V = ⊕i ρ(gi )W where W is a simple πq (Λ)-module Q and gi ’s are some elements of πq (Γ). Suppose q = i pni i is the prime factorization of q. Since πq (Λ) ≃ i πpni i (Λpi ), there are irreducible b In particular, representations ηi : Λpi → GL(Wi ) such that W is isomorphic to ⊗i Wi as an Λ-module. Q dim W = i dim Wi . b we have that Λ b acts non-trivially on V , and so Except for finitely many irreducible representations ρ of Γ, b Suppose that ⊗i ηi is a non-trivial irreducible representation of Λ. b Λ b ⊆ ker(ρ)}, Σ ⊇ {ρ ∈ Irr(Γ)| b is the set of all the complex irreducible representations of Γ. b where Irr(Γ) For any i, ηi is an irreducible representation of Λpi = Gpi ,c(pi ) where c(pi ) is 0 for p ≥ c0 and given as above for c < p0 . Since ρ does not factor through πq′ (Γ) for a proper divisor q ′ of q, for any i we have mi := min{m ∈ Z+ | Gpi ,m ⊆ ker(ηi )} = max{ni , c(pi )}. Next we partition the indexes into five types: (1) ni − c(pi ) ≥ 2s0 + 2, and c(pi ) ≥ 8; (2) ni ≥ 2s0 + 10 and c(pi ) = 0; (3) 1 < ni < 2s0 + 10 and pi ≥ c0 ; (4) ni = 1 and pi ≥ c0 ; and (5) pi < c0 and ni < 2s0 + 10. Now we find a lower bound for the dimension of ηi for the first three types of indexes. Case 1. ni − c(pi ) ≥ 2s0 + 2 and c(pi ) ≥ 8. In this case, by Lemma 19, we have dim ηi ≥ p(ni −c(pi )−1−s0 )/2 ≥ p(ni −c(pi ))/4 = |πpni (Λpi )|δ1 i where δ1 is a positive number which depends only on dim G. Case 2. ni ≥ 2s0 + 10 and c(pi ) = 0. 16 ALIREZA SALEHI GOLSEFIDY In this case, the restriction of ηi to Gpi ,2 is non-trivial. Hence by Lemma 19 we have dim ηi ≥ p(ni −2−1−s0 )/2 ≥ pni /4 ≥ |πpni i (Λpi )|δ2 where δ2 is a positive number which depends only on dim G. Case 3. 1 < ni < 2s0 + 10 and p ≥ c0 . Notice that πpni (Gpi ,1 ) is a normal pi -subgroup of πpni (Λpi ). Since the dimension of any irreducible repi i resentation of a pi -group is a power of pi , we have that either the restriction of ηi to Gpi ,1 factors through Gpi ,1 /[Gpi ,1 , Gpi ,1 ] or dim ηi ≥ pi ≥ |πpni (Λpi )|δ3 , where δ3 is a positive number which depends on G. i Now suppose the restriction of ηi to Gpi ,1Pfactors through Gpi ,1 /[Gpi ,1 , Gpi ,1 ]. Then there is a line li in Wi which is invariant under Gpi ,1 and Wi = g∈Gp ,0 ηi (g)(li ). Since Gpi ,0 is perfect, the stabilizer of li should i be a proper subgroup of Gpi ,0 . Since πpni i (Gpi ,0 ) is generated by pi -elements, we get that the index of the stabilizer of li in Gpi ,0 is at least pi . And so again dim ηi ≥ pi ≥ |πpni (Λpi )|δ3 . i Case 4. ni = 1 and pi ≥ c0 . By [LS74] (see [SGV12, Section 4.2]), we have dim ηi ≥ |πpni i (Λpi )|δ4 where δ4 is a positive number which depends only on G. Q Since i in Case 5 pni i ≪G 1, by the above cases we get that either q ≪Γ 1 or dim ρ ≥ |πq (Γ)|δ where δ is a positive number which depends only on Γ. By enlarging Σ, we can assume that it contains all the irreducible b which factor through πq (Γ) for a positive integer q ≪Γ 1. Such Σ and δ satisfy the representations of Γ claimed properties.  3. Expansion, approximate subgroup, and bounded generation. 3.1. Largeness of level-Q approximate subgroups implies super-approximation. In this section, the Bourgain-Gamburd machine [BG08-a] is used to reduce a proof of spectral gap at level Q to a proof of the largeness of a generic level-Q approximate subgroup (see Theorem 20). We work in the setting of Section 2.6. As in [SG], let us introduce the following notation for convenience: for a finite symmetric subset A of Γ, positive integers l and Q, and a positive number δ, let PQ (δ, A, l) be the following statement 1 log Q) ∧ (|πQ (A · A · A)| ≤ |πQ (A)|1+δ ). δ One can think of A as a generic level-Q approximate subgroup if PQ (δ, A, l) holds for small enough δ. (15) (l) (PΩ (A) > Q−δ ) ∧ (l > Notice that the random-walk in πQ (Γ) gets interesting only at steps OΩ (log |πQ (Γ)|) = OΩ (log Q) since before this time the random-walk with respect to the probability measure PπQ (Ω) is similar to a randomwalk in a regular tree. The first two conditions of PQ (δ, A, l) imply that at OΩ (log Q)-range of random-walk the probability of hitting A is not exponentially small. And so A should be fairly generic. For instance Proposition 14 implies that A cannot be a subset of a proper algebraic subgroup if δ is small enough. The genericness of such A was crucial in the proof of [SG, Theorem 35] where the largeness of a generic level-Q approximate subgroup for a semisimple group is proved. Let C be either {pn |p ∈ Vf (Q), p ∤ q0 } or {q ∈ Z+ | gcd(q, q0 ) = 1, ∀p ∈ Vf (Q), vp (q0 ) ≤ N }, where vp (q) is the p-adic valuation of q. In this section, we deduce Theorem 1 from the following result. Theorem 20 (Approximate subgroups). In the above setting, for any ε > 0 there is δ > 0 such that PQ (δ, A, l) implies that |πQ (A)| ≥ |πQ (Γ)|1−ε SUPER-APPROXIMATION, II: ΘG (1) if Q ∈ C and Qε THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 17 ≫Ω 1. To show that Theorem 20 implies Theorem 1, we prove the following proposition based on the same proof as in [SG, Section 3.2]. In particular, we see that the reduction to understanding generic level-Q approximate subgroups can be done in much more generality. −1 Proposition 21. Let Ω ⊆ GLn (Z[1/q0 ]) be a finite subset and Ω := Ω ∪ Ω . Suppose Ω freely generates a subgroup Γ. Let C ′ be a family of positive integers which consists of numbers that are corpime to q0 . Suppose C ′ is closed under divisibility; that means if q ∈ C ′ and q ′ |q, then q ′ ∈ C ′ . Suppose the assertion of Theorem 20 holds for Ω and C ′ . Then the family of Cayley graphs {Cay(πq (Γ); πq (Ω))}q∈C ′ is a family of expanders. Proof. By Remark 2, we have to show supq∈C ′ λ(Pπq (Ω) ; πq (Γ)) < 1. For Q ∈ C ′ , let TQ : L2 (πQ (Γ)) → L2 (πQ (Γ)), TQ (f ) := πQ [PΩ ] ∗ f and λ(Q) := λ(PπQ (Ω) ; πQ (Γ)). It is well-known that λ(Q) is the second largest eigenvalue of TQ . Since L2 (πQ (Γ)) is a completely reducible representation of πQ (Γ), there is a unit function f0 ∈ L2 (πQ (Γ)) such that TQ (f0 ) = λ(Q)f0 and the πQ (Γ)-module Vρ generated by f0 is a simple πQ (Γ)-module. Since λ(Q) is not one, ρ is not the trivial representation of πQ (Γ). Since there are dim ρ-many copies of ρ as subrepresentations of L2 (πQ (Γ)), we have that the eigenvalue λ(Q) of TQ has multiplicity at least dim ρ. Since Q ∈ C ′ and C ′ is closed under divisibility, we can and will assume that ρ does not factor through πq (Γ) for some proper divisor q of Q. Hence by Proposition 18 we have that either the lift of ρ to ε0 b the closure of Γ in Q where ε0 a representation of Γ, p∤q0 GLn (Zp ), is in a finite set Σ or dim ρ ≥ |πQ (Γ)| is a positive number depending only on Γ. As we are seeking a uniform upper bound for λ(Q), without loss of generality we can and will assume that the lift of ρ is not in Σ. And so we have that multiplicity of the eigenvalue λ(Q) of TQ is at least |πQ (Γ)|ε0 . Therefore for any positive integer l we have (l) |πQ (Γ)|ε0 λ(Q)2l ≤ Tr(TQ2l ) = |πQ (Γ)|kPπQ (Ω) k22 . So it is enough to show (16) 1 (l) kPπQ (Ω) k2 ≤ |πQ (Γ)|− 2 + ε0 4 , for some l ≪Ω log Q where the implied constant depends only on Ω; it is worth pointing out that we can and will assume that Q is arbitrarily large depending only on Ω. In particular, we can and will assume the Largeness of level Q-Approximate Subgroups in the following sense: The LAS Assumption: there is c2 > 0 such that, if Q > 1/c2 and PQ (c2 , A, l) holds, then |πQ (A)| ≥ |πQ (Γ)|1−ε0 /8 . On the other hand, the first OΩ (log Q) steps of the random-walk with respect to the probability measure PπQ (Ω) can be identified with the random-walk with respect to the probability measure PΩ . And the latter is the random-walk on a regular infinite tree. Hence by the Kesten bound [Kes59, Theorem 3] we have  l 2|Ω| − 1 (l) (2l) kPΩ k22 = PΩ (I) ≤ = e−c1 l , |Ω|2 where c1 is a positive number which depends only on Ω. Hence for some positive integer l0 = ΘΩ (log Q) where the implied constants depend only on Ω and for some positive number c3 depending on Ω we have (17) (l ) (l ) kPπQ0 (Ω) k2 = kPΩ 0 k2 ≤ |πQ (Γ)|−c3 . Equation (17) can be considered as an initial L2 -flatness. An important result of Bourgain and Gamburd roughly indicates that the L2 -norm of a probability measure should substantially drop after a convolution by itself unless an approximate subgroup has a lot of mass [BG08-a] (see also [Var12, Lemma 15]). This result is proved using Tao’s non-commutative version of Balog-Szemerédi-Gowers theorem [Tao08]. Here is a precise formulation of their result: 18 ALIREZA SALEHI GOLSEFIDY Proposition 22 (Bourgain-Gamburd’s L2 -flattening.). Let µ be a symmetric probability measure with finite 1 support on a group G. Let K be a number more than 2. If kµ∗ µk2 ≥ K kµk2 , then there is a finite symmetric subset A of G which satisfies the following properties: −2 −R R • (Size of A is comparable with kµk−2 kµk−2 2 ) K 2 ≤ |A| ≤ K kµk2 ; R • (Getting an approximate subgroup) |A · A · A| ≤ K |A|; • (Almost equidistribution on A) mina∈A (µ ∗ µ)(a) ≥ K −R |A|−1 , where R is an absolute positive number. For a small (depending only on Ω and specified later) positive parameter δ, consider the following pseudocode: Algorithm 1 L2 -flattening process Give Q ∈ C ′ , δ ∈ (0, 1); l0 := ⌊log Q/2 log C(Ω)⌋; (as in Equation 17) (l ) µ0 := PπQ0 (Ω) ; i := 0; i while (kµi k2 > |πQ (Γ)|−1/2+ε0 /4 and kµi ∗ µi k2 ≤ kµi k1+δ 2 ) or (2 l0 < (1/δ) log Q) do µi+1 := µi ∗ µi ; i := i + 1; end while where C(Ω) := maxs∈Ω ksk, where ksk is the operator norm of s : Rn × k(v∞ , vp )p|q0 k := max{kv∞ k, kvp kp }p|q0 and the sup norm on Rn and Qnp . Q p|q0 Qnp → Rn × Q p|q0 Claim 1. For any 0 < δ < 1 and Q ∈ C ′ , the number i0 (δ, Q) of steps in Algorithm 1 is at most log( 2 logδC(Ω) ) Qnp with log(2/c3 ) log(1+δ) + where c3 is given in Equation (17). Proof of Claim 1. By the Young inequality we have kµi+1 k2 ≤ kµi k2 for any non-negative integer i. Hence by the initial flatness, Equation (17), we have kµi k2 ≤ kµ0 k2 ≤ |πQ (Γ)|−c3 for any non-negative integer i. Let j0 be the smallest integer such that 2j0 l0 ≥ (1/δ) log Q. Then for any j0 ≤ i < i0 (δ, Q) we have (1+δ) kµi+1 k2 ≤ kµi k2 . And so (1+δ)i0 −j0 kµi0 (δ,Q) k2 ≤ kµj0 k2 If i0 (δ, Q) > log(2/c3 ) log(1+δ) + log( 2 logδC(Ω) ), then i0 − j0 > log(2/c3 ) log(1+δ) . which implies kµi0 −1 k2 ≤ |πQ (Γ)|−1 . And this contradicts kµi0 −1 k2 > |πQ (Γ)|−1/2+ε0 /4 .  Claim 2. There is a positive number δ := δ(Ω) depending only on Ω, such that, for any Q ∈ C ′ which is at least 1/δ, kµi0 (δ,Q) k2 ≤ |πQ (Γ)|−1/2+ε0 /4 , where i0 (δ, Q) is given in Claim 1. Proof of Claim 2. We proceed by contradiction. So to the contrary assumption for any positive number δ there is Q(δ) ∈ C ′ such that (18) (19) (20) Q(δ) > 1/δ; in particular lim Q(δ) = ∞, kµi0 (δ,Q(δ)) k2 > |πQ(δ) (Γ)| kµi0 (δ,Q(δ)) ∗ µi0 (δ,Q(δ)) k2 ≥ δ→0 −1/2+ε0 /4 kµi0 (δ,Q(δ)) k1+δ 2 . , and SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 19 Hence by (20) and Proposition 22 (for K = kµi0 (δ,Q(δ)) k−δ 2 ) there is a symmetric subset A(δ) of πQ(δ) (Γ) such that (21) kµi0 (δ,Q(δ)) k−2+Rδ ≤ |A(δ)| ≤ kµi0 (δ,Q(δ)) k−2−Rδ , 2 2 (22) |A(δ)|, and |A(δ) · A(δ) · A(δ)| ≤ kµi0 (δ) k−Rδ 2 (23) µi0 (δ,Q(δ))+1 (A(δ)) ≥ kµi0 (δ,Q(δ)) kRδ 2 . Hence there is a function δ ′ (δ) of δ such that lim δ ′ (δ) = 0 and δ ′ (δ) ≥ δ, (24) δ→0 ′ (25) (because of Inequalities (21) and (22),) |A(δ) · A(δ) · A(δ)| ≤ |A(δ)|1+δ (δ) (26) (because of Inequalities (19) and (23),) µi0 (δ,Q(δ))+1 (A(δ)) ≥ Q(δ)−δ (δ) . ′ (2j l (δ)) (l(δ)) −1 (A(δ)) ∩ supp(PΩ We notice that µj = PπQ(δ)0 (Ω) , and let A(δ) := πQ(δ) then we have ), where l(δ) := 2i0 (δ,Q(δ))+1 l0 (δ); (27) A(δ) is a finite symmetric subset of Γ because A(δ) and PΩ are symmetric, (28) l(δ) ≥ (1/δ) log Q(δ) ≥ (1/δ ′ (δ)) log Q(δ) because of the second condition of the loop in Algorithm 1 and the inequality in (24), ′ (l(δ)) PΩ(δ) (A(δ)) = µi0 (δ)+1 (A(δ)) ≥ Q(δ)−δ (δ) by Inequality (26), (29) |πQ(δ) (A(δ) · A(δ) · A(δ))| ≤ |πQ(δ) (A(δ))|1+δ (30) ′ (δ) by Inequality (25). ′ Statements (27), (28), (29), and (30) imply that PQ(δ) (δ (δ), A(δ), l(δ)) holds for any δ. Now suppose δ is small enough so that δ ′ (δ) is less than c2 where c2 is given by the LAS Assumption (this can be done thanks to (24)). Then Q(δ) > 1/δ ≥ 1/δ ′ (δ) ≥ 1/c2 , and so by the LAS Assumption we have |πQ(δ) (A(δ))| = |A(δ)| ≥ |πQ(δ) (Γ)|1−ε0 /8 . (31) On the other hand, by Inequalities (21) and (19), we have ≤ |πQ(δ) (Γ)|1+Rδ/2−ε0 /2−Rδε0 /4 . |A(δ)| ≤ kµi0 (δ,Q(δ)) k−2−Rδ 2 Hence, if δ is small enough, we get |A(δ)| ≤ |πQ(δ) (Γ)|1+Rδ/2−ε0 /2−Rδε0 /4 ≤ |πQ(δ) (Γ)|1−ε0 /4 , which contradicts (31).  (l) (Going back to the proof of Proposition 21) By Claim 1 and Claim 2, for Q ≫Ω 1 in C ′ we have kPπQ (Ω) k2 ≤ |πQ (Γ)|−1/2+ε0 /4 where l := 2i0 (δ(Ω),Q) l0 ≪Ω log Q. And this gives us the needed L2 -norm upper bound (see Inequality (16)) for Q ≫Ω 1. The rest are only finitely many Q’s for which we do have spectral gap.  3.2. Reduction to bounded generation and abelian unipotent radical. The main goal of this section is to deduce Theorem 20 from the following. Theorem 23 (Bounded generation). In the setting of Section 2.6, suppose U is abelian. For any positive integer q, let Γ[q] := Γ ∩ GLn0 (Z[1/q0 ])[q], where πq GLn0 (Z[1/q0 ])[q] := ker(GLn0 (Z[1/q0 ]) −→ GLn0 (Z[1/q0 ]/qZ[1/q0 ])). Then for any 0 < ε ≪Ω 1 there are 0 < δ ≪Ω,ε 1 and positive integer C ≫Ω,ε 1 such that for a finite symmetric subset A of Γ Q (l) PΩ (A) > Q−δ for some l > (1/δ) log Q implies πQ (Γ[q]) ⊆ C πQ (A) for some q|Q and q ≤ Qε OG (1) if Q ∈ C and Qε ≫Ω 1. 20 ALIREZA SALEHI GOLSEFIDY The idea of the proof of Theorem 20 modulo Theorem 23. It is not clear to the author if a bounded generation result is true when the unipotent radical U is not abelian (specially since a perfect group might have a non-trivial center.). So to prove the largeness of a generic level-Q approximate subgroup A of Γ with Zariki-closure G := Gs ⋉ U, first we go to the quotient Gs ⋉ U/[U, U]. Let ρ2 : G → Gs ⋉ U/[U, U] be the quotient map. For simplicity let us assume ρ2 commutes with the congruence maps πQ . This −1 assumption together with the way the generating set Ω is chosen (recall that we have Ω = Ω ∪ Ω and ρ2 (Ω) freely generates a free group) implies that ρ2 (A) is a generic level-Q approximate subgroup of ρ2 (Γ). Now by the bounded generation result for ρ2 (Γ), we get a large congruence subgroup of ρ2 (Γ) modulo Q in a controlled number of steps. Next we use the techniques of studying a nilpotent group in order to translate our information on U/[U, U] to some data on U. For a unipotent group U (and in general any nilpotent group), it is a useful method to consider LU := γ1 (U)/γ2 (U) ⊕ γ2 (U)/γ3 (U) ⊕ · · · ⊕ γc (U)/γc+1 (U), where γi (U) is the i-th lower central series; that means γ1 (U) := U and γi+1 := [γi (U), U], and γc+1 (U) = {1}. It is well-known that [gi γi+1 (U), gj γj (U)] := gi−1 gj−1 gi gj γi+j+1 (U) for gi ∈ γi (U) and gj ∈ γj (U) defines a graded Lie ring structure on LU . And LU is generated by its degree 1 elements, i.e. γ1 (U)/γ2 (U), as a Lie ring. So we get an onto multi-linear map φk : γ1 (U)/γ2 (U) × · · · × γ1 (U)/γ2 (U) → γk (U)/γk+1 (U), {z } | φk (x1 , . . . , xk ) := [x1 , . . . , xk ], k-times where [x1 , . . . , xk ] := [[x1 , . . . , xk−1 ], xk ]. Having a set X which maps onto a set of representatives for a large congruence subgroup modulo Q in γ1 (U)/γ2 (U), using the above multi-linear maps φk , we can get a subset of U which Q is large modulo Q. Notice that at this step we can get a control only on the size of the product set πQ ( OU (1) X). Though we do get a set of representatives of a large congruence subset of the associated gradedQLie ring, we do not get such a structural understanding of the product set itself. Altogether we get that | C πQ (A)| is large. On the other hand, since |πQ (A) · πQ (A) · πQ (A)| ≤ |πQ (A)|1+δ , by the Ruzsa inequality (see [Hel05, Lemma 2.2]), we get | Q C πQ (A)| ≤ |πQ (A)| which helps us to finish the proof.  | Q 3 πQ (A)| |πQ (A)| C−2 ≤ |πQ (A)|1+(C−2)δ , Theorem 23 implies Theorem 20. By the contrary assumption, there is ε0 > 0 such that for any δ > 0 there are a finite symmetric subset Aδ , a positive integer lδ and Qδ ∈ C such that PQδ (δ, Aδ , lδ ) holds and at the same time |πQδ (Aδ )| < |πQδ (Γ)|1−ε0 . Since lδ > log Qδ /δ, we have limδ→0 lδ = ∞. Now we claim that Qδ → ∞ as δ → 0. If not, for infinitely many δ we have Qδ = Q, and πQ (Aδ ) = A is independent of δ. And so (l ) lim PπQδ (Ω) (πQ (Aδ )) = δ→0 1 |A| . < |πQ (Γ)| |πQ (Γ)|ε0 On the other hand, we have (l ) (l ) −δ . PπQδ (Ω) (πQ (Aδ )) ≥ PΩ δ (Aδ ) > Q−δ δ = Q Hence as δ → 0, we get |πQ (Γ)|−ε0 > 1, which is a contradiction. Let {kp }p∤q0 be such that Pp = G(Qp ) ∩ GLn0 (Zp )[pkp ] where {Pp }p is as in Section 2.6. Let ρ2 : G → Gs ⋉ U/[U, U] be the quotient map. Let us recall that, by the discussion at the end of Section 2.4, we can and will assume ρ2 (Pp ) ⊆ GLn2 (Zp ). SUPER-APPROXIMATION, II: Q THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 21 L ′ kp Let q0′ = p∤q0 p be a positive integer given by Lemma 13; that means for any sequence {mp }p∤q0 ∈ p∤q0 Z such that mp ≥ kp + kp′ we have (32) Y Y Y πpmp −kp′ (Pp )/πpmp −kp′ ([U, U](Qp )∩Pp ). πpmp (ρ2 (Pp )) ։ πpmp +kp′ (Pp )/πpmp +kp′ ([U, U](Qp )∩Pp ) ։ p∤q0 p∤q0 p∤q0 In order to use (32), we modify Qδ so that for any prime p either vp (Qδ ) ≥ kp′ or vp (Qδ ) = 0. To this end, Q it is enough to show that we are allowed to change Qδ to Qδ /qδ′ where qδ′ := p∤q0 ,0<vp (Qδ )<2k′ +kp pvp (Qδ ) . p Lemma 24. Let Aδ , Qδ , and lδ be as above. PQδ /qδ′ (ΘC ′ ,Ω (δ), Aδ , lδ ) holds and |πQδ /qδ′ (Aδ )| Suppose qδ′ |Qδ and ≤ |πQδ /qδ′ (Γ)|1−ε0 /2 qδ′ ′ < C (for some constant C ′ ). Then for 0 < δ ≪C ′ 1. 1/C ′′ Proof. Since limδ→0 Qδ = ∞, for C ′′ > 1 and small enough δ we have Qδ /qδ′ > Qδ . And so log(Qδ /qδ′ ) log Qδ > . δ C ′′ δ Q ′′ To show that PQδ /qδ′ (C ′′ δ, Aδ , lδ ) holds, it is enough to prove that we have |πQδ /qδ′ ( 3 Aδ )| ≤ |πQδ /qδ′ (Aδ )|1+C δ for large enough C ′′ . ′′ ′ −C δ P (lδ ) (Aδ ) > Q−δ , and δ > (Qδ /qδ ) lδ > We notice that, if c is small enough (depending on Ω), πQδ /qδ′ induces an injection on the ball of radius c log(Qδ /qδ′ ) (with respect to the word metric). By [BG09, Remark, page 1060] (see [SG, Lemma 8]), we ′ have P (⌊2c log(Qδ /qδ )⌋) (Aδ · Aδ ) > Q−2δ . Hence by the Kesten bound (see Inequality (14)) for small enough δ δ we have (33) |πQδ /qδ′ (Aδ · Aδ )| = |Aδ · Aδ ∩ B⌊2c log(Qδ /qδ′ )⌋ | ′ ′ ≥ P (⌊2c log(Qδ /qδ )⌋) (Aδ · Aδ )/kP (⌊2c log(Qδ /qδ )⌋) k∞ Θ ′ ≥ Q−2δ · (2c log(Qδ /qδ′ ))ΘΩ (1) ≥ Qδ C ,Ω δ Θ ′ (1) , (1) which implies that |πQδ /qδ′ (Aδ )| ≥ Qδ C ,Ω . Q Q Since |πQδ ( 3 Aδ )| ≤ | Qδ (Aδ )|1+δ , by the Ruzsa inequality (see [Hel05, Lemma 2.2]) and [Hel11, Lemma 7.4] we have Q Q |πQδ /qδ′ ( 3 Aδ )| |πQδ ( 5 Aδ )| 3δ |πQδ (Aδ )| ≥ ≥ , |πQδ (Aδ )| |πQδ /qδ′ (Aδ )| Q ′′ which implies that |πQδ /qδ′ ( 3 Aδ )|/|πQδ /qδ′ (Aδ )| ≤ |πQδ /qδ′ (Aδ )|C δ for large enough C ′′ . Since Qδ goes to infinity, it is clear that for small enough δ we have |πQδ /qδ′ (Aδ )| ≤ |πQδ /qδ′ (Γ)|1−ε0 /2 .  By Lemma 24 we can and will modify {Qδ }δ and assume that, if kp + kp′ > 0, then either vp (Qδ ) = 0 for any δ or kp + 2kp′ ≤ minδ vp (Qδ ) < supδ vp (Qδ ) = ∞. In particular, without loss of generality we can and will assume that q0′2 |Qδ for any δ. (l ) (l ) On the other hand, by Corollary 16, we have that ker(ρ2 ) ∩ Γ = {1}. So Pρ2δ(Ω) (ρ2 (Aδ )) = PΩ δ (Aδ ) > ′ −ΘΩ (δ) Q−δ for suitable constant and small enough δ. Hence by Theorem 23 for any 0 < ε′ ≪Ω 1 δ > (q0 Qδ ) there is a positive integer C = OΩ,ε′ (1) such that for any 0 < δ ≪ε′ ,Ω 1 we have Q (34) πq0′ Qδ (ρ2 (Γ)[qδ ]) ⊆ C πq0′ Qδ (ρ2 (Aδ )) ′ Θ(ε′ ) for some qδ |q0′ Qδ and qδ ≤ (q0′ Qδ )ε ≤ Qδ . Q On the other hand we have πq0′ Qδ ( p∤q0 ρ2 (Up )) ⊆ πq0′ Qδ (ρ2 (Γ)) (recall that Up := U(Qp ) ∩ GLn0 (Zp )[pkp ]. Let U p := GLn2 (Zp ) ∩ U(Qp )); and so we have that U p = Up for large enough p, and Up is an open subgroup of U p . By Lemma 24, we can and will assume that vp (Qδ ) are either zero or large enough depending on the 22 ALIREZA SALEHI GOLSEFIDY index of Up in U p for all the primes p. And so by enlarging qδ by a multiplicative constant we can and will assume that Q Q πq0′ Qδ (ρ2 ( p∤q0 U p )qδ ) ⊆ πq0′ Qδ (ρ2 (Γ)[qδ ]) ⊆ C πq0′ Qδ (ρ2 (Aδ )), Q Q Q where ρ2 ( p∤q0 U p )qδ := {xqδ | x ∈ ρ2 ( p∤q0 U p )}. So there is Bδ ⊆ C Aδ such that Y (35) πq0′ Qδ (ρ2 (Bδ )) = πq0′ Qδ (ρ2 ( U p )qδ ). p∤q0 Lemma 25. Let U be a unipotent Q-group with a given Q-embedding in GLn . For any prime p, let U p := U(Qp ) ∩ GLn (Zp ). Let φ : U → U/[U, U] be the quotient map. Fix a Q-basis {ei } of (U/[U, U])(Q) such that Q P φ(U p ) ⊆ i Zp ei for any prime p. Let q|Q be two positive integers. Suppose X is a finite subset of p U p P such πQ (φ(X)) = πQ (q i Zei ). Then Q Q |πQ ( p U p ))| , | C πQ (X)| ≥ CqC where C depends on the dimension of U and the choice of embeddings. Proof. Let γi (U) be the i-th lower central series; that means γ1 (U) := U and γi+1 (U) := [γi (U), U]. It is well-known that the long commutators (g1 , . . . , gk ) := ((g1 , . . . , gk−1 ), gk ), where (g1 , g2 ) := g1−1 g2−1 g1 g2 , induce multilinear maps fk from U/[U, U] × · · · × U/[U, U] (k times) to γk (U)/γk+1 (U), and the Q-span of {fk (ei1 , . . . , eik )} is (γk (U)/γk+1 (U))(Q). For any k, let φk : γk (U) → γk (U)/γk+1 (U). Then for any k we have Q Q πQ (φk ( 4k X ∩ γk (U)( p Qp )) ⊇ ∪i1 ,...,ik πQ (q k Zfk (ei1 , . . . , eik )), and so P Q Q πQ (φk ( 4k dim U X ∩ γk (U)( p Qp ))) ⊇ πQ (q k i1 ,...,ik Zfk (ei1 , . . . , eik )) In particular, we have (36) Q Q |πQ (φk ( 4k dim U X ∩ γk (U)( p Qp )))| ≥ (Q/q k )dim γk (U)−dim γk+1 (U) . Since φk ’s are regular morphisms defined over Q, there is a positive integer q1′ depending on the embedding of U and the choice of {ei }) such that for any prime power pm we have ! Y Y Y X ′ φk γk (U)( Qp ) ∩ U p [q1 Q] ⊆ Zp fk (ei1 , . . . , eik )). (Q p p p i1 ,...,ik Q Q P And so φk induces homomorphism φk : πq1′ Q (γk (U)( p Qp ) ∩ p U p ) → πQ ( i1 ,...,ik Zfk (ei1 , . . . , eik )), and we have φk ◦ πq1′ Q = πQ ◦ φk . Thus by (36) we have Y Y Q Q |πQ (φk ( 4k dim U X ∩ γk (U)( Qp )))| ≥ (Q/q dim U )dim U . (37) |πq1′ Q ( 4 dim U3 X)| ≥ p k Since U is a Q-unipotent, there is a positive integer Q −1 q2′ Qdim U ≤ |πQ ( p U p )| ≤ q2′ Qdim U . And so q2′ Q |πQ ( 4 dim U3 X)| ≥ and the claim follows. (depending on the embedding and U) such that Q |πQ ( p U p )| q2′ 2 q1′ dim U qdim U2 ;  Q ′ ′ By (35) there is Xδ ⊆ p Up such that πq0 Qδ (Xδ ) = πq0 Qδ (Bδ ), which implies that πQδ (ρ2 (Xδ )) = πQδ (ρ2 (Bδ )). Hence by Lemma 25 we have Q Q Q Q Q |πQδ ( p∤q U p )| |πQδ ( p∤q U p )| ′ 0 0 (38) |πQδ ( OΩ,ε′ (1) Aδ ) ∩ πQδ ( p∤q0 U p )| ≥ ≥ |πQδ ( p|Qδ U p )|1−ΘU (ε ) , ΘU (1) ≥ Θdim U (ε′ ) Θdim U (1)qδ ′ for small enough δ (depending on ε ) as limδ→0 Qδ = ∞. Qδ SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. On the other hand, by (34), we have Therefore we have (39) 23 Q Q πQδ ( p∤q0 Kp [qδ ]) ⊆ C πQδ (Aδ ). Q Q Q ′ |πQδ ( C Aδ ) ∩ πQδ ( p|Qδ Kp )| ≥ |πQδ ( p|Qδ Kp )|1−ΘGs (ε ) , for small enough δ (depending on ε′ ) as limδ→0 Qδ = ∞. Q b we have By (38), (39), limδ→0 Qδ = ∞, and the fact that p∤q0 Kp ⋉ Up is of finite index in Γ, Q ′ (40) |πQδ ( C Aδ )| ≥ |πQδ (Γ)|1−ΘΩ (ε ) , for small enough δ (depending on ε′ ). Q On the other hand, since |πQδ ( 3 Aδ )| ≤ |πQδ (Aδ )|1+δ by the Ruzsa inequality (see [Hel05]), we have Q (41) |πQδ ( C Aδ )| ≤ |πQδ (Aδ )|1+(C−2)δ ≤ |πQδ (Γ)|(1−ε0 )(1+(C−2)δ) . By (40) and (41), for any ε′ and small enough δ (in particular it can approach zero), we have 1 − ΘΩ (ε′ ) ≤ (1 − ε0 )(1 + (C(ε′ ) − 2)δ), which is a contradiction.  4. Super-approximation: bounded power of square-free integers case. By Section 3.2, to prove Theorem 1 for CN := {q ∈ Z+ | ∀p ∤ q0 , vp (q) ≤ N } it is enough to prove Theorem 23 (Bounded generation) for CN . In particular, we can assume that U is abelian. Since I believe it is interesting to know if some of the auxiliary results are true for more general perfect groups, I do not assume U is abelian till towards the end of this section. As a result some extra lemmas are proved which are not necessary for the proof of Theorem 23 for CN .3 4.1. The residue maps do not split. The main goal of this section is to show Lemma 29 which roughly asserts that πp does split under mild conditions. Lemma 26. Let G = H ⋉ U be a Q-group with a given Q-embedding into (GLn )Q , where H is a connected semisimple Q-group and U is a unipotent Q-group. Let G (resp. H, U) be the Zariski-closure of G (resp. H, U) in the Z-group scheme (GLn )Z , and g = Lie(G), h = Lie(H), and u = Lie(U). For large enough p, if V ( g(fp ) is a G(fp )-invariant proper subspace, then V + [u(fp ), u(fp )] is a proper subspace. Moreover if G is perfect, then V + z(fp ) is also a proper subspace, where z = Lie(Z(G)) is the Lie ring of the schematic center of G. Proof. Let AG := fp [Ad(G(fp ))] ⊆ Endfp (g(fp )) be the fp -span of Ad(G(fp )), and AH := fp [Ad(H(fp ))] be its subalgebra. Since H is connected semisimple, for large enough p, g(fp ) is a faithful completely reducible AH -module. Thus AH is a semisimple algebra, and so its Jacobson radical J(AH ) is zero. Let a be the ideal generated by {u − 1| u ∈ U(fp )}. Then we have the following short exact sequence of AG -modules: 0 → a → AG → AH → 0. Since AH is semisimple, J(AG ) ⊆ a. On the other hand, since U is a unipotent normal subgroup of G, a is a nilpotent ideal. So overall we have a = J(AG ). Suppose to the contrary that there is a proper AG -submodule V of g(fp ) such that V + [u(fp ), u(fp )] = g(fp ). If we show that J(AG )g(fp ) ⊇ [u(fp ), u(fp )], then we get that V + J(AG )g(fp ) = g(fp ). And so by Nakayama’s lemma we have V = g(fp ), which is a contradiction. 3If the reader is only interested in the proof of Theorem 23 for C , s/he can skip Lemma 26, Lemma 27, and Lemma 31. N 24 ALIREZA SALEHI GOLSEFIDY Since U is unipotent, log and exp define Q-morphisms between U and its Lie algebra. And for large enough p they induce bijections between U(fp ) and u(fp ). Furthermore for any t ∈ fp , x, y ∈ u(fp ) we have (42) Ad(exp(tx))(y) = exp(t ad(x))(y). Thus for t ∈ fp , x, y ∈ u(fp ) we have t−1 (Ad(exp(tx))(y) − y) = [x, y] + (43) dim XU i i=1 t ad(x)i (y) ∈ J(AG )g(fp ). i! Therefore for large enough p by the Vandermonde determinant we have that [x, y] ∈ J(AG )g(fp ) which shows our claim. To finish the proof, it is enough to notice that G is perfect if and only if H acts without a non-zero fixed vector on U/[U, U]. And so when G is perfect, for large enough p we have z(fp ) ⊆ [u, u](fp ) = [u(fp ), u(fp )].  Lemma 27. Let U ⊆ (GLn )Qp be a Qp -subgroup, and U := U(Qp ) ∩ GLn (Zp ). Then if p is large enough depending only on n, then we have m m πp2 (U ) = hg ∈ πp2 (U )| g p 6= 1i, and U [pm ] = U p := {up | u ∈ U }, for any positive integer m. Proof. Let exp and log define Qp -morphisms between Lie(U) and U. And so for large enough prime p we have (44) if kxkp , kukp ≤ 1 and xn = 0, (u − I)n = 0. k exp x − Ikp = kxkp , k log ukp = ku − Ikp Hence exp and log induce homeomorphisms between u := Lie(U)(Qp ) ∩ gln (Zp ) and U , and moreover for any positive integer m m m U [pm ] = U p := {up | u ∈ U }. (45) We have (45) because of the following observation: u ∈ U [pm ] ⇔ ku − Ikp ≤ p−m ⇔ u = exp x, x ∈ Lie(U)(Qp ) and kxkp ≤ p−m , m ⇔ u = exp(pm x′ ) = (exp x′ )p and x′ ∈ u, m ⇔ u ∈ Up . If g p = 1 for some g ∈ πp2 (U ), then for some u ∈ U we have g = πp2 (u) and up ∈ ker(πp2 ). So there is a m (unique) u′ ∈ U \ U p such that u′p = up for some m ∈ Z≥2 . Another use of the logarithm map, we have m−1 u = u′p . Hence i πp2 (U ) = {g p | g ∈ πp2 (U ), g p 6= 1, i = 0, 1, 2}.  Lemma 28. Let H be a simply-connected semisimple Q-group with a given embedding into (GLn )Q . Let πp P0 = H(Qp ) ∩ GLn (Zp ) and P1 := ker(P0 −→ GLn (Z/pZ)). Then for large enough p we have Pi = hU(Qp ) ∩ Pi | U ⊆ H unipotent Qp -subgroupi, for i = 0, 1. Proof. For large enough p, we have that H is quasi-split over Qp , and splits over an unramified extension of Qp , and P0 is a hyper-special parahoric subgroup. Let Qi = hU(Qp ) ∩ Pi | U ⊆ H unipotent Qp -subgroupi. Then clearly Qi is a normal subgroup of P0 . By the Bruhat-Tits theory, there is a smooth Zp -group scheme H such that (1) P0 = H(Zp ), (2) The generic fiber of H is isomorphic to H, SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 25 (3) The special fiber Hp := H ⊗Zp fp is a simply-connected semisimple fp -group since H is simply connected quasi-split over Qp and splits over an unramified extension of Qp , (4) πp (P0 ) = Hp (fp ) is a product of quasi-simple groups. Since H is quasi-split over Qp , πp (Q0 ) intersects any quasi-simple factor subgroup of Hp (fp ) in a non-central subgroup. As πp (Q0 ) is a normal subgroup of Hp (fp ), Hp (fp )+ is contained in πp (Q0 ). As Hp is simplyπp i connected, we get that πp (Q0 ) = πp (P0 ). For any positive integer i, let Pi := ker(P −−→ Hp (Zp /pi Zp )). It is well-known that Pi /Pi+1 as an Hp (fp )-module is isomorphic to Lie(Hp )(fp ) via the adjoint action. Let’s identify πpi (Q1 ∩Pi+1 ) with hi ⊆ Lie(Hp )(fp ) . Since Q1 ⊳ P , hi is Hp (fp )-invariant. On the other hand, since H is quasi-split, hi intersects each one of the Lie algebras of the simple factors of Hp . Since for large enough p the fp -points of the Lie algebra of the simple factors of Hp are simple Hp (fp )-module, hi = Lie(Hp )(fp ). Hence by induction we have πpi (Qj ) = πpi (Pj ) for j = 0, 1 and any positive integer i, which finishes the proof.  Lemma 29. Let G ⊆ (GLn )Q be a perfect Q-group. Assume that the semisimple part of G is simplyconnected; that means G ≃ H ⋉ U where H is a simply-connected semisimple Q-group and U is a unipotent Q-group. Let Pp = G(Qp ) ∩ GLn (Zp ), G be the closure of G in (GLn )Z , and g = Lie(G). Then (1) For large enough p, the following is a short exact sequence: 1 → g(fp ) → πp2 (Pp ) → πp (Pp ) → 1. (2) For large enough p and any proper subgroup V ( g(fp ) which is a normal subgroup of πp2 (Pp ), the following short exact sequence does not split 1 → g(fp )/V → πp2 (Pp )/V → πp (Pp ) → 1 Proof. For large enough p, Qp := H(Qp ) ∩ GLn (Zp ) is a hyperspecial parahoric subgroup which acts on Up := U(Qp ) ∩ GLn (Zp ), and Pp = Qp ⋉ Up . Furthermore for large enough p, the assumptions of Lemma 28 hold and so πpi (Pp ) = πpi (hPp ∩ U′ (Qp )| U′ unipotent Qp -subgroupi). Hence by Lemma 27 we have πp2 (Pp ) = hg ∈ πp2 (Pp ∩ U′ (Qp ))| U′ unipotent Qp -subgroup, g p 6= 1i. On the other hand, if for any Qp -unipotent subgroup U′ of G we have πp2 (Pp [p] ∩ U′ (Qp )) ⊆ V , then by Lemma 28 we get that πp2 (Pp [p]) ⊆ V which is a contradiction. Hence for some unipotent Qp -subgroup U′ there is x ∈ πp2 (Pp [p] ∩ U′ (Qp )) \ V . By Lemma 27 there is g ∈ GLn (Zp ) ∩ U′ (Qp ) such that πp2 (g p ) = x. Since U′ is a Qp -subgroup of G and Pp = GLn (Zp ) ∩ G(Qp ), we have that g ∈ Pp , and the order of πp2 (g) in πp2 (Pp )/V is p2 . Now suppose to the contrary that the given exact sequence splits; then πp2 (Pp )/V ≃ πp (Pp ) ⋉ (g(fp )/V ), and the latter is a linear group over fp . However any p-element of a linear group over fp is unipotent, and so it is of order p (for large enough p), which is a contradiction.  4.2. Statistical non-splitting of residue maps. In this section, following [BV12], we prove that any section of πp is statistically far from being a group homomorphism. Lemma 30. Let G, g, and Pp be as in Lemma 29. Then there is a positive number δ (depending on G) such that for large enough p (depending on G and its embedding in (GLn )Q ) the following holds: Let V ( g(fp ) be a proper subgroup which is normal in πp2 (Pp ), and ψ : πp (Pp ) → πp2 (Pp )/V be a section of the quotient map π : πp2 (Pp )/V → πp (Pp ); that means π ◦ ψ = idπp (Pp ) . Let µ = Pπp (Pp ) be the probability Haar measure (i.e. the normalized counting measure) on πp (Pp ). Then (µ × µ)({(x, y) ∈ πp (Pp ) × πp (Pp )| ψ(x)ψ(y) = ψ(xy)}) < p−δ . Proof. We notice that by Lemma 26, for large enough p, V + z(fp ) is a proper subspace of g(fp ) (which is normal in πp2 (Pp )). And so without loss of generality we can assume that V contains z(fp ). 26 ALIREZA SALEHI GOLSEFIDY Let A := {(x, y) ∈ πp (Pp ) × πp (Pp )| ψ(x)ψ(y) = ψ(xy)} and suppose to the contrary that (µ × µ)(A) ≥ p−δ . We will get a contradiction if δ is small enough. Let ν be the push-forward of µ via ψ. For any g ∈ πp (Pp ) we have X X µ(x)µ(y) (since supp ν = Imψ) ν(h1 )ν(h2 ) = (ν ∗ ν)(ψ(g)) = h1 h2 =ψ(g) = X x, y ∈ πp (Pp ) ψ(x)ψ(y) = ψ(g) µ(x)µ(y). (x, y) ∈ A xy = g (since g = π(ψ(g)) = π(ψ(x)ψ(y)) = π(ψ(x))π(ψ(y)) = xy.) In particular, we have (ν ∗ ν)(supp ν) = (µ × µ)(A). And so by the Cauchy-Schwarz inequality, we get p | supp ν|kν ∗ νk2 ≥ (ν ∗ ν)(supp ν) = (µ × µ)(A) ≥ p−δ . Hence kν ∗ νk2 ≥ p−δ kνk2 . Thus by [Var12, Lemma 15] (which is based on [BG08-a] (see Proposition 22)) there is a symmetric subset S ⊆ πp2 (Pp )/V with the following properties: (P1) (P2) (P3) |πp (Pp )|1−ΘG (δ) ≤ |S| ≤ |πp (Pp )|1+ΘG (δ) , Q | 3 S| ≤ |πp (Pp )|ΘG (δ) |S|, mins∈S (e ν ∗ ν)(s) ≥ (|πp (Pp )|ΘG (δ) |S|)−1 . Since the push-forward π[ν] of ν via π is the probability Haar measure of πp (Pp ), we have µ = π[e ν ∗ν]. And so the third part of properties of S implies that µ(π(S)) ≥ |πp (Pp )|−ΘG (δ) . Therefore |π(S)| ≥ |πp (Pp )|1−ΘG (δ) . On the other hand, by [SGV12, Corollary 14] and the main theorem of [LS74], we have that πp (Pp ) is a quasi-random group; that means the minimal degree of its non-trivial irreducible representations is at least |πp (Pp )|ΘG (1) for large enough p. Thus by Gowers’s result [Gow08] (we Q use the formulation in [NP11, Q Corollary 1]) we have that π( 3 S) = πp (Pp ) if δ is small enough. So S ′ = 3 S has the following properties: (1) π(S ′ ) = πp (Pp ), (2) S ′ is a |πp (Pp )|ΘG (δ) -approximate subgroup by [Tao08, Corollary 3.11], (3) |S ′ | ≤ |πp (Pp )|1+ΘG (δ) by properties (P1) and (P2) of S. Q Next we prove that there is 0 6= x ∈ 3 S ′ ∩ (g(fp )/V ). We proceed by contradiction. For any s1 , s2 ∈ S ′ , Q there is s3 ∈ S ′ such that π(s1 s2 ) = π(s3 ). Hence s1 s2 s−1 ∈ 3 S ′ ∩ (g(fp )/V ), and so by the contrary 3 assumption we have s1 s2 = s3 . Thus S ′ is a subgroup which contradicts Lemma 29. Since V contains z(fp ), π(S) = πp (Pp ) acts on (g(fpP )/V ) via the adjoint action without non-zero fixed point for large enough p. Hence by [SGV12, Lemma 30], OG (1) π(S ′ ) · x contains a non-zero subspace of g(fp )/V . Q Q Therefore | OG (1) S ′ ∩ (g(fp )/V )| ≥ p, and we get | OG (1) S ′ | ≥ p|πp (Pp )|. Since S ′ is an approximate subgroup, we get Q p|πp (Pp )| ≤ | OG (1) S ′ | ≤ |πp (Pp )|1+ΘG (δ) . So p ≤ |πp (Pp )|ΘG (δ) which is a contradiction for small enough δ (independent of p).  4.3. Bounded generation of perfect groups by commutators. Lemma 31. Let P be a finite p-group. Suppose |P | = pn and |P/[P, P ]| = pm . Then Q n−m {[g1 , g2 ]| g1 , g2 ∈ P } = [P, P ], where [g1 , g2 ] := g1 g2 g1−1 g2−1 . Proof. We proceed by induction on the nilpotency class of P . If P is abelian, there is nothing to prove. Now suppose the nilpotency class of P is c; that means its c + 1-th lower central series γc+1 (P ) is trivial and γc (P ) SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 27 is not trivial. It is well-known that γc (P ) is an fp -vector space which is spanned by the long commutators. Q So γc (P ) is contained in dimfp γc (P ) {[g1 , g2 ]| g1 , g2 ∈ P }. By the induction hypothesis, we have Q n−m−dimfp γc (P ) {[ḡ1 , ḡ2 ]| ḡ1 , ḡ2 ∈ P/γc (P )} = P/γc (P ). Q  And so n−m {[g1 , g2 ]| g1 , g2 ∈ P } = P . Lemma 32. Let G be a Zariski-connected perfect Q-subgroup of (GLn )Q , and let G be its Zariski-closure in (GLn )Z . Suppose that G is simply-connected; that means its semisimple part is simply-connected. Then there is a positive integer C depending on G such that for large enough prime p we have Q C {[g1 , g2 ]| g1 , g2 ∈ Gp (fp )} = Gp (fp ), where Gp = G ×Spec Z Spec fp . Proof. As it was mentioned earlier, for large enough p, Gp ≃ Hp ⋉ Up is a perfect fp -group, where Hp is a simply connected semisimple fp -group and Up is a unipotent fp -group. Moreover Gp (fp ) = Hp (fp ) ⋉ Up (fp ), and Vp := Up (fp )/[Up (fp ), Up (fp )] is a completely reducible Hp (fp )-module with no non-zero fixed vector. Let w(x1 , x2 ) = [x1 , x2 ] and, for any group K, let w(K) := {w(k1 , k2 )| k1 , k2 Q ∈ K}. Then by [Sha09, Theorem 1.1] (see an alternative approach in [NP11, Theorem 3]) we have that 3 w(Hp (fp )) = Hp (fp ) for large enough p. Let Hp = Hp (fp ) and Q Gp = Hp ⋉ Vp . Let ρ : Hp → GL(Vp ) be the homomorphism induced from the action of Hp on Vp . Then 7 w(Gp ) contains {ρ(h)((ρ(h′ ) − I)(v))| h, h′ ∈ Hp , v ∈ Vp }. Q And so 7 dimf Vp w(Gp ) contains the fp [Hp ]-submodule Mp of Vp generated by {(ρ(h) − I)(v)| h ∈ Hp , v ∈ p Vp }. Therefore Hp acts trivially on Vp /Mp . Since Vp is a completely reducible Hp -module with no non-zero fixed vectors, Mp = Vp . Thus Q O(dim G) w(Gp ) = Gp . And so by Lemma 31 applied for P := Up (fp ) the claim follows.  Lemma 33. Let G and G be as in Lemma 32, and N be a positive integer. Suppose the unipotent radical of G is abelian. Then there is a positive integer C depending on G and N such that for large enough p we have Q N N C {[g1 , g2 ]| gi ∈ G(Z/p Z)} = G(Z/p Z). Proof. By Lemma 32 we get the case of N = 1. It is well-known that πp induces the following short exact sequence πp 1 → g(fp ) → G(Z/p2 Z) −→ G(fp ) → 1, where g = Lie(G), and the conjugation action of G(Z/p2 Z) on g(fp ) factors through the adjoint action of G(fp ). Let u be the Lie algebra of the Zariski-closure of the unipotent radical of G in G. For large enough p, G(fp ) and g(fp ) are perfect, and g(fp ) is a completely reducible G(fp )-module without any non-zero invariant vectors (as U is abelian). So by a similar argument as in the proof of Lemma 32, we have Q 2 OG (1) w(G(Z/p Z)) ⊇ g(fp ), and so by Lemma 32, we have that Q OG (1) w(G(Z/p2 Z)) = G(Z/p2 Z). Now using the facts that G(Zp )[pi ]/G(Zp )[pi+1 ] ≃ g(fp ), the group commutators are mapped to the Lie algebra commutators, and g(fp ) is perfect, we get the desired result. (See [SG, Lemma 34] for the relations between the group commutators and the Lie algebra commutators.)  28 ALIREZA SALEHI GOLSEFIDY 4.4. Proof of Theorem 1 for bounded powers of square-free integers. Now we go to the proof of Theorem 1 for CN := {q ∈ Z+ | gcd(q, q0 ) = 1, ∀p ∈ Vf (Q), vp (q0 ) ≤ N }. Having the above lemmas the rest of the proof is a modification of the argument in [BV12, Section 3]. By Section 3.2, it is enough to prove Theorem 23 for CN . First we point out that it is enough to prove ≥p0 := {q ∈ Z+ | gcd(q, q0 ) = 1, ∀p ∈ Vf (Q), vp (q0 ) ≤ N, ∀p ≤ p0 , vp (q0 ) = 0}. This Theorem 23 for CN Lemma helps us to avoid all the small primes p where πp (Γ) does not behave nicely; in particular we will be able to assume Lemmas 26-33 to hold for all the prime divisors of Q. ≥p0 Lemma 34. Let p0 be a prime number. Then a bounded generation in the sense of Theorem 23 for CN implies Theorem 23 for CN where the implied constants depend also on p0 . Proof. Fix a positive number δ0 := δ0 (ε, Ω, p0 ) and a positive integer C0 := C0 (ε, Ω, p0 ) for which Theorem 23 ≥p0 . holds for CN Q p0 , we have [Γ : Γ[q0 ]] ≪G,p0 ,N 1. Suppose Q is For Q ∈ CN , let q0 := p|Q,p≤p0 pvp (Q) . Since q0 < pN 0 ≥p0 can be applied large enough (depending only on ε, Ω, p0 , N ) such that the bounded generation for CN ≥p0 for Q/q0 ∈ CN . Moreover we assume Q is large enough (again depending only on ε, Ω, p0 , N ) such that Q−δ0 /2 /[Γ, Γ[q0 ]] > (Q/q0 )−δ0 . Now suppose δ is a positive number which is at most δ0 /4, A is a symmetric (l) set, and l is a positive integer which is more than (1/δ) log Q such that PΩ (A) > Q−δ . Then (2l) PΩ (A · A ∩ Γ[q0 ]) ≥ Q−2δ /[Γ : Γ[q0 ]] > Q−δ0 /2 /[Γ : Γ[q0 ]] > (Q/q0 )−δ0 . ≥p0 we have that Hence PQ/q0 (δ0 , A · A ∩ Γ[q0 ], l) holds. Therefore by the bounded generation for CN Q (46) πQ/q0 (Γ[q]) ⊆ πQ/q0 ( C0 (A · A ∩ Γ[q0 ])), for some q|Q/q0 and q ≤ (Q/q0 )ε . Since Q and Q/q0 are coprime, πQ (Γ) can be diagonally embedded into πq0 (Γ)⊕ πQ/q0 (Γ), and by enlarging p0 , if needed, we can and will assume that πQ (Γ[qq0 ]) gets identified with {1}⊕πQ/q0 (Γ[q]) under the diagonal embedding of πQ (Γ) into πq0 (Γ)⊕πQ/q0 (Γ). Notice that πQ (A·A∩Γ[q0 ]) gets mapped to a subset of {1} ⊕ πQ/q0 (Γ[q]) and so by (46) we get that Q πQ (Γ[qq0 ]) ⊆ 2C0 πQ (A). And we have qq0 |Q and qq0 ≤ Qε q01−ε ≤ Q2ε for large enough Q (again depending on ε, Ω, p0 , N ).  Next we show a reduction which works for any family of positive integers C ′ : Lemma 35. To prove Theorem 23 for Q in a family of positive integers C ′ , it is enough to prove the bounded generation claim for a subset A for which PQ (δ, A, l) and PQ (δ, ρ1 (A), l) hold (where ρ1 : G → Gs is the quotient map). That means for any 0 < ε ≪Ω 1 there are 0 < δ ≪Ω,ε 1 and positive integer C ≫Ω,ε 1 for which the following holds: Q (Restricted BG): PQ (δ, A, l) ∧ PQ (δ, ρ1 (A), l) implies πQ (Γ[q]) ⊆ C πQ (A) for some q|Q such that O (1) q ≤ Qε if Q ∈ C ′ and Qε G ≫Ω 1. (l) Proof. Suppose δ is a positive number and PΩ (A) > Q−δ for a symmetric set A and a positive integer (l) l > (1/δ) log Q. Since ker(ρ1 ) ∩ Γ = {1}, we have Pρ1 (Ω) (ρ1 (A)) > Q−δ . Then by a similar argument as in (33) (based on the Kesten bound (see Inequality (14))) we have (47) |πQ (A)| > Qη0 and |πQ (ρ1 (A))| > Qη0 , for small enough δ (depending only on Ω) and some positive number η0 := η0 (Ω) which depends only on Ω. SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 29 Fix a positive number δ0 := δ0 (ε, Ω) and a positive integer C0 := C0 (ε, Ω) for which the Restricted BG holds. And let Q Q (48) IA := {i ∈ Z+ | | 3i+1 πQ (A)| ≤ | 3i πQ (A)|1+δ0 } and Q Q Iρ1 (A) := {i ∈ Z+ | | 3i+1 πQ (ρ1 (A))| ≤ | 3i πQ (ρ1 (A))|1+δ0 }. (49) Notice that |πQ (Γ)| ≤ QN0 (G) and |πQ (ρ1 (Γ))| ≤ QN0 (G) for some positive integer N0 which depends only on the dimension of G. Now let N1 := N1 (δ0 ) be the smallest positive integer such that (1 + δ0 )N1 η0 > N0 . (50) So by Inequalities (47) and (50), the complements of IA and Iρ1 (A) in Z+ have at most N1 elements. Hence there is a positive integer C1 ≤ 32N1 +1 ≪Ω,ε 1 such that Q Q Q Q |πQ ( C1 ρ1 (A)) · πQ ( C1 ρ1 (A)) · πQ ( C1 ρ1 (A))| ≤ |πQ ( C1 ρ1 (A))|1+δ0 and Q Q Q Q |πQ ( C1 A) · πQ ( C1 A) · πQ ( C1 A)| ≤ |πQ ( C1 A)|1+δ0 . Q Q Therefore, if δ < δ0 , then PQ (δ0 , C1 A, l) and PQ (δ0 , C1 (ρ1 (A)), l) hold. Thus, by the Restricted BG and the fact that C1 C0 ≪Ω,ε 1, we are done.  (Going back to the proof of Theorem 23 for CN :) Suppose p0 is a prime number such that p0 ≪Ω 1 and all the claims of Lemmas 26-33 hold for all the primes p ≥ p0 (later we will assume p0 is large enough depending on Ω to gain additional properties for πp (Γ) where p is a prime divisor of Q.). So by Lemma 34 we can assume ≥p0 ), without loss of generality we that all the prime factors of Q are at least p0 . By Lemma 35 (for C ′ := CN can and will assume that PQ (δ, A, l) and PQ (δ, ρ1 (A), l) hold. Q N Let Qs := p|Q p (, and so Q|QN s ). By [SGV12, Theorem 1], [SG, Lemma 31], and l > δ log Qs we have that 1 |πQs (A)| (l) ≤ PπQ (Ω) (πQs (A)) − s |πQs (Γ)| |πQs (Γ)| for small enough δ. And so we have (l) Qs −N δ ≤ Q−δ ≤ PπQ −Θ s (Ω) (πQs (A)) ≤ |πQs (A)| + 1 , |πQs (Γ)| (δ) which implies that |πQs (A)| ≥ |πQs (Γ)|Qs Ω,N . Since we assumed that the prime factors of Q are large Q Q Q enough, we have that πQs (Γ) ≃ p|Q πp (Γ). Writing Qs = lj=1 pj , to the product set li=1 πpi (Γ) one can associate a rooted tree with l levels. The root is considered to be the zero level. The vertices of the j-th Q level are elements of ji=1 πpi (Γ), and each vertex is connected to its projection in the previous level. By a regularity argument similar to the proof of [SG, Lemma 12] (see [BGS10, Lemma 5.2] or [Var12, Page 26]), one can show that there are a set A′ ⊆ A and a sequence of integers {ki }li=1 such that for any g ∈ A′ and for any 1 ≤ i ≤ l we have |{x ∈ πpi (Γ)| ∃h ∈ A′ : πp1 ···pi−1 (h) = πp1 ···pi−1 (g) and πpi (h) = x}| = ki , and |A′ | = l Y i=1 ki ≥ ( l Y 2 log |πpi (Γ)|)−1 |A|. i=1 By [SGV12, Corollary 14] and the main theorem of [LS74], πp (Γ) is a quasi-random group for large enough p; that means the dimension of any non-trivial irreducible representation of πp (Γ) is at least |πp (Γ)|ΘG (1) (for p ≫Ω 1) (see also Proposition 18). So by a result of Gowers [Gow08] (see [NP11, Corollary 1]) there is a positive number c0 depending on G such that for large enough p the following holds: if A, B, C ⊆ πp (Γ) 30 ALIREZA SALEHI GOLSEFIDY and |A|, |B|, |C| ≥ |πp (Γ)|1−c0 , then A · B · C = G. We assume that the prime factors of Q are large enough so that 2 log |πpi (Γ)| < |πpi (Γ)|c0 ε . Hence l Y ki ≥ |πQs (Γ)|1−ΘG (δ)−c0 ε . i=1 Let I := {i| ki < |πpi (Γ)| 1−c0 }; then we have |πQs (Γ)|/ Y |πpi (Γ)|c0 ≥ ki ≥ |πQs (Γ)|1−ΘG (δ)−c0 ε , i=1 i∈I and so l Y Y G (δ)+2ε pi ≤ Q Θ ≤ Q4ε s s , i∈I for small enough δ (depending on Ω, N and ε). Now by a similar argument as in [Var12, Page 26] (using the mentioned result of Gowers) one can show that πQi6∈I pi (A · A · A) = πQi6∈I pi (Γ). (51) Let Q′s = Q pi and q ′ = Qs /Q′s . By (51) there is a function f1 : πQ′s (Γ) → πq′N (Γ) such that Q 1−Θ (ε) {(g, f1 (g))| g ∈ πQ′s (Γ)} is contained in πQ′s q′N ( 3 A). Thus there is a fiber of f1 with at least Qs G,N many elements. Hence, as before by a regularization argument and another application of the mentioned Gowers’s result (for ε ≪G,N 1), there is q ′′ |Q′s and a function f2 : πQ′s /q′′ (Γ) → πq′′ (Γ) such that q ′′ ≤ QΘG,N (ε) and {(g, f2 (g), 1) ∈ πQ′s /q′′ (Γ) × πq′′ (Γ) × πq′N (Γ)|g ∈ πQ′s /q′′ (Γ)} Q is contained in πQ′s q′N ( OG (1) A). Hence, for any g1 , g2 ∈ πQ′s /q′′ (Γ), we have Q ([g1 , g2 ], 1, 1) = [(g1 , f2 (g1 ), 1), (g2 , 1, f1 (g2 , 1))] ∈ πQ′s q′N ( OG (1) A). i6∈I Therefore by Lemma 32 Q πQ′s q′N (Γ[q ′N ]) ⊆ πQ′s q′N ( QG (1) A). Q Let A′ be a subset of QG (1) A such that πQ′s q′N (Γ[q ′N ]) = πQ′s q′N (A′ ). Now we will go to the second level; Q that means we will show that there are a positive integer C and q̄|Q′s such that q̄ ≤ QΘG (ε) and πQ′s 2 ( C A′ ) contains πQ′s 2 (Γ[q̄ 2 ]). Lemma 36. In the above setting, assume U is abelian. Then for any ε > 0 there are δ > 0 and a positive integer C such that the following holds. Assume A ⊆ Γ and a square-free integer Qs have the following properties: (1) Qεs ≫Ω 1. (2) The prime factors of Qs are sufficiently large (depending on Ω); in particular the assertions of Q Lemma 29 hold, and πQ2s (Γ) ≃ p|Qs πp2 (Γ). (3) πQs (A) = πQs (Γ). (4) Q For any prime factor p of Qs , let Vp ( g(fp ) be a πp (Γ)-invariant under the adjoint action. And p|Qs Vp ⊆ πQ2s (A). Then there are Q′s and {Mp }p|Q′s such that (1) Q′s |Qs and Q1−ε ≤ Q′s . s (2) For ), and Mp is πp (Γ)-invariant under the adjoint action. Q any p, we Qhave Vp ( Mp ⊆ g(fpQ (3) p|Q′s Mp ⊕ p|(Qs /Q′s ) {0} ⊆ πQs 2 ( C A). SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 31 Proof. Since Vp ⊆ g(fp ), the map πp : πp2 (Γ) → πp (Γ) factors through πp2 (Γ)/Vp . Let us abuse the notation and still denote the induce homomorphism by πp : πp2 (Γ)/Vp → πp (Γ). Let ψ : πQs (Γ) → A ⊆ Γ be a section of πQs , and ψp : πQs (Γ) → πp2 (Γ)/Vp be ψp (g) = πp2 (ψ(g))Vp . As in the proof of [BV12, Proposition 3], let us consider the following expectation with respect to the probability Haar measure:   X X log p = E (52) log p · (Pπp (Γ) × Pπp (Γ) )({(x, y)| ψp (xy) = ψp (x)ψp (y)}) p|Qs p|Qs , ψp (xy)=ψp (x)ψp (y) ≤ X p−ΘG (1) log p ≤ log(Qεs ), p|Qs where the first inequality is given by Lemma 30 and the second inequality holds for Qεs ≫G 1. Inequality (52) implies that    Y E log  p|Qs ψp (x)ψp (y)ψp (xy)−1 6=1 p ≥ log(Q1−ε ). s ′ 1−ε and for any prime p|Q′s we have zp := So there are x, y ∈ πQs (Γ) and Q′s |Qs such that Q Qs ≥ Qs −1 ψp (x)ψp (y)ψp (xy) 6= 1. Hence there is a ∈ 3 A such that for any p|Q′s we have that πp2 (a) belongs to g(fp ) \ Vp where g(fp ) is identified with πp2 (Γ[p]). By our assumptions on G, πp (Γ) is generated by its pelements and g(fp ) is a completely reducible πp (Γ)-module with no non-zero invariant vectorP (the latter holds as G is perfect and its unipotent radical is abelian). Therefore by [SGV12, Corollary 31] OG (1) πp (Γ) · zp is the πp (Γ)-subspace Mp /Vp of g(fp )/Vp that is generated by zp . Q In the group πQ2s (Γ)/ p|Qs Vp , for any γ ∈ Γ, we have   Y Y g(fp )/Vp . Vp  = (πp (γ) · zp )p|Qs ∈ (53) πQ2s (γ)πQ2s (a)πQ2s (γ)−1  p|Qs p|Qs Q  Q Q ′2 (as a subset of V A) A, by (53) we have that π ( Qs OG (1) p|Qs p 3 Since πQs (A) = πQs (Γ) and a ∈ Q πQ2s (Γ)/ p|Qs Vp ) contains Y YP P Mp /Vp . OG (1) πp (Γ) · zp = OG (1) πQ′s (A) · (zp )p|Q′s = (Here πQs 2 (Γ)/ Q p|Qs p|Q′s p|Q′s Q Vp is viewed as (πQ′s 2 (Γ)/ p|Q′ Vp ) ⊕ (π(Qs /Q′s )2 (Γ)/ s Y Q Mp ⊆ πQ2s ( OG (1) A); Q p|Qs /Q′s Vp ).) And so p|Q′s and the claim follows.  (Going back to the proof of Theorem 23 for CN :) By Equation (51) and a repeated use of Lemma 36 (for Θ (ε) OG (1)-many times), we get that there is q|Qs such that q ≤ Qs G (if Qεs ≫G 1) and Y Y Q πp2 (Γ) × {1}. (54) πQs 2 ( OG (1) A) ⊇ πQs 2 (Γ[q 2 ]) = p|q p|(Qs /q) Let us recall that for large enough p (depending only on Ω) we have that, for any positive integer i, there i+1 is a πp (Γ)-module isomorphism Ψppi : Γ[pi ]/Γ[pi+1 ] → g(fp ); and for any gi ∈ Γ[pi ] and gj ∈ Γ[pj ] we have [gi , gj ] := gi gj gi−1 gj−1 ∈ Γ[pi+j ] and (55) i+j+1 i+1 j+1 Ψppi+j ([gi , gj ]Γ[pi+j+1 ]) = [Ψppi (gi Γ[pi+1 ]), Ψppj (gj Γ[pj+1 ])], 32 ALIREZA SALEHI GOLSEFIDY where the right hand side is the Lie bracket in g(fp ). (These maps are called the truncated or finite logarithmic maps. We refer the interested reader to [SG, Section 2.9] for a general and quick treatment of these maps and their basic properties.) Equation (55) defines a graded Lie algebra structure on Γ[p]/Γ[p2 ] ⊕ Γ[p2 ]/Γ[p3 ] ⊕ · · · ⊕ Γ[pN −1 ]/Γ[pN ] and shows that it is isomorphic to the graded Lie algebra g(fp ) ⊗ (tfp [t]/tN fp [t]) where fp [t] is the ring of polynomials in a single variable t, [xi ⊗ t̄i , xj ⊗ t̄j ] := [xi , xj ] ⊗ t̄i+j for any xi , xj ∈ g(fp ), and t̄ := t + tN fp [t]. Since, for large enough p (depending only on Ω), g(fp ) is a perfect Lie algebra, g(fp ) ⊗ (tfp [t]/tN fp [t]) is generated by the degree one elements, that means g(fp ) ⊗ t̄. So by (54) and (55) we get that Y Q πpN (Γ). (56) π(Qs /q)N ( OG,N (1) A) = π(Qs /q)N (Γ) = p|(Qs /q) Hence there is a function f1 : π(Qs /q)N (Γ) → πqN (Γ[q]) such that G(f1 ) := {(g, f1 (g))|g ∈ π(Qs /q)N (Γ)} is Q −1 and for any subset X of a group w(X) := contained in πQN ( OG,N (1) A). Let w(x1 , x2 ) := x1 x2 x−1 1 x2 s N N {w(x1 , x2 )| x1 , x2 ∈ X}. Then w(G(f1 )) ⊆ π(Qs /q) (Γ) × πq (Γ[q 2 ]). And so by Lemma 33 we have that Q there is a function f2 : π(Qs /q)N (Γ) → πqN (Γ[q 2 ]) such that its graph G(f2 ) is contained in πQN ( OG,N (1) A). s Q Repeating this argument log N times we get that πQN (Γ[q N ]) is contained in πQN ( OG,N (1) A), which finishes s s the proof of Theorem 23 for CN . 5. Super-approximation: the p-adic case. To prove Theorem 1 for C := {pm | p ∈ Vf (Q), p ∤ q0 , m ∈ Z+ }, by Section 3.2, it is enough to Prove Theorem 23 for C. In this section, we work in the setting of Section 2.6. In addition, we assume that U is abelian. So we assume that V is a vector Q-group, Gs is a connected, simply-connected, semisimple Q-group, there is a Q-homomorphism G → GL(V) with no non-zero fixed vector, and G = Gs ⋉ V is the Zariski-closure of Γ = hΩi. We also fix a Q-embedding G ⊆ (GLN0 )Q . By Lemma 35 (for C ′ := C), we can and will assume that PQ (δ, A, l) and PQ (δ, ρ1 (A), l) hold where ρ1 : G → Gs is the quotient map. It is worth pointing out that Theorem 23 for semisimple groups and powers of primes is proved in [SG, Theorem 36]. 5.1. Escape from proper subgroups. In this section, we explore the pro-p structure of an open subgroup of the p-adic closure Γp of Γ. The main goal is to escape proper subgroups of πQ (Γ) where Q = pn is a power of a prime p. Proposition 37. In the above setting, there is a positive number δ (depending on Ω) such that for any n ≫Ω 1 and any proper subgroup H of πpn (Γ) we have (l) Pπpn (Ω) (H) ≤ [πpn (Γ) : H]−δ , for l ≥ n δ log p. We start with a (well-known) lemma which gives us the Frattini subgroup of the congruence subgroups of G(Zp ), where (as before) G is the closure of G in (GLN0 )ZS . This kind of result for semisimple groups and large p goes back to Weisfeiler [Wei84]. e is a closed Lemma 38. Let G be as above, and G := G(Zp ). Suppose either p ≫G 1 or m0 ≫G 1. If H m0 m0 +1 m0 m0 e e ] = G[p ], then H = G[p ]. And so the Frattini subgroup Φ(G[pm0 ]) = subgroup of G[p ] and HG[p m0 +1 G[p ]. SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 33 m0 +k e Proof. By induction on k we prove that HG[p ] = G[pm0 ]. The base of the induction is given by the e ∩G[pm0 +k ])G[pm0 +k+1 ] = G[pm0 +k ]. Let assumption. To get the induction step, it is enough to prove that (H pm0 +1 g := Lie(G)(Zp ). By [SG, Lemma 34], we have Ψpm0 : G[pm0 ]/G[pm0 +1 ] → g/pg is an isomorphism if either m0 +1 p ≫G 1 or m0 ≫G 1 (see [SG, Section 2.9] for the definition and properties of finite logarithmic map Ψppm0 ). e such that πpm0 +1 (h) = πpm0 +1 (I + pm0 x). On the And so by the assumption, for any x ∈ g there is h ∈ H m0 +k+1 k other hand, if m0 ≥ 2, then πp (((I +pm0 x′ )p −I)/pm0 +1 ) = πp (x′ ). And so Ψppm0 +k (πpm0 +k+1 (hp )) = πp (x). m0 +k+1 Since, by [SG, Lemma 34], Ψppm0 +k : G[pm0 +k ]/G[pm0 +k+1 ] → g/pg is a bijection, we get the induction e is a closed subgroup, we have that H e = G[pm0 ]. step. Since H  The following lemma which is a module theoretic version of [SG05, Lemma 3.5] is proved next. It will be needed in the following sections, too. Lemma 39. Let R ⊆ Mn0 (Zp ) be a Zp -subalgebra (not necessarily with the identity element). Suppose Qnp 0 is a simple Qp [R]-module, where Qp [R] is the Qp -span of R. Then sup n n v∈Zp 0 \pZp 0 [Znp 0 : Rv] < ∞. Proof. Suppose to the contrary that there is a sequence of unit vectors vi such that [Znp 0 : Rvi ] goes to infinity as i goes to infinity. Since the set of unit vectors is a compact set, by passing to a subsequence we can assume that limi→∞ vi = v where v is a unit vector. Since Qnp 0 is a simple Qp [R]-module, the Qp -span of Rv is Qnp 0 . And so Rv is of finite-index in Znp 0 . Therefore Rv contains pk0 Znp 0 for some positive integer k0 . If i is large enough, v − vi ∈ pk0 +1 Zp . So Rvi + pk0 +1 Znp 0 = Rv + pk0 +1 Znp 0 ⊇ pk0 Znp 0 . Since Rvi is complete and the Frattini subgroup of pk0 Znp 0 is pk0 +1 Znp 0 , Rvi ⊇ pk0 Znp 0 which is a contradiction.  The following lemma roughly shows that an almost invariant subspace of Lie(Gs )(Qp ) is close to an invariant subspace. Lemma 40. Let Gs ⊆ (GLN0 )Q be (as before) a semisimple group. Let G := Gs (Qp ) ∩ GLN0 (Zp )[pk0 ] for a fixed positive integer k0 . Suppose m is large enough depending on the embedding of Gs in (GLN0 )Q and k0 . Then the following holds: Suppose W is a subspace of Lie(Gs )(Qp ) such that πpm (W ∩ glN0 (Zp )) is invariant under G. Then there is a normal closed subgroup GW of Gs and a positive integer C which depends only on the embedding of Gs in (GLN0 )Q and k0 such that p2C πpm−C (gW ) ⊆ pC πpm−C (W ∩ glN0 (Zp )) ⊆ πpm−C (gW ), (57) where gW := Lie(GW )(Qp ) ∩ glN0 (Zp ). Proof. Since Gs is semisimple, it is the almost product of Qp -simple factors Gi . And so Lie(G) = ⊕i Lie(Gi )(Qp ). Let g := Lie(G)(Qp ) ∩ glN0 (Zp ) and gi := Lie(Gi )(Qp ) ∩ glN0 (Zp ). Then there is a positive number c1 which depends only on the embedding of Gs in (GLN0 )Q such that M M p−c1 gi ; gi ⊆ g ⊆ (58) i i in particular, for any x ∈ Lie(G)(Qp ), we have kxkp ≤ max kxi kp ≤ pc1 kxkp , (59) where x = P i i xi and xi ∈ Lie(Gi )(Qp ). 34 ALIREZA SALEHI GOLSEFIDY P Let W := W ∩ glN0 (Zp ). For x ∈ W, let xi ∈ Lie(Gi )(Qp ) be such that x = i xi . For any gj ∈ Gj (Qp ) ∩ GLN0 (Zp )[pk0 ], Ad(gj ) changes only the j-th component. So, using the assumption that πpm (W) is invariant under Ad(gj ), we get that Ad(gj )xj − xj ∈ W + pm glN0 (Zp ). (60) Hence aj xj ⊆ W + pm glN0 (Zp ) where aj is the Zp -span of {Ad(gj ) − I| gj ∈ Gj (Qp ) ∩ GLN0 (Zp )[pk0 ]} (here we restrict to the action on Lie(Gj ), and consider aj as a subset of EndQp (Lie Gj (Qp ))). Notice that aj is an ideal of the Zp -span Rj of Ad(Gj (Qp ) ∩ GLN0 (Zp )[pk0 ]). And Lie(Gj )(Qp ) is a simple Qp [Rj ]-module, where Qp [Rj ] is the Qp -span of Rj . Hence Qp [Rj ] is a simple Qp -algebra as it has a simple faithful module. Therefore the Qp -span Qp [aj ] of aj is Rj , and Lie(Gj )(Qp ) is a simple Qp [aj ]-module. Hence, by Lemma 38, there is a positive integer c2 which depends only on k0 and the embedding of Gs in (GLN0 )Q such that M M (61) pc2 kxj k−1 gj ⊆ aj xj ⊆ W + pm glN0 (Zp ). j j P Let IW := {j| ∃x ∈ W, kxkp = 1 and kxj kp ≥ 1, where x = i xi , and xi ∈ Lie(Gi )(Qp )}, GW be the product of the simple factors Gi for i ∈ IW ; and so gW := (⊕i∈IW Lie(Gi )(Qp )) ∩ glN0 (Zp ). We can and will assume that c2 ≥ c1 , and we claim that (57) holds for C := c1 + c2 and gW . We start with the first inclusion in (57). For any j ∈ IW , there is x ∈ W such that its j-th simple component xj has norm at least 1. Therefore by (61) we have pc2 gj ⊆ W + pm glN0 (Zp ). And so by (58) we have M (62) pc1 +c2 gW ⊆ pc2 gj ⊆ W + pm glN0 (Zp ). j∈IW To show the second inclusion in (57), we proceed by contradiction. So assume to the contrary P that there is x ∈ W such that pC πpm−C (x) 6∈ πpm−C (gW ). By (58) there are xj ∈ gj such that pc1 x = j xj . By (62), there are x′ ∈ W and e ∈ g such that X xi = x′ + pm e. (63) pc 2 i∈IW Hence x′′ := pc1 +c2 x − x′ = (64) X pc2 xj + pm e = (pc2 xj + pm ej ) + j6∈IW j6∈IW P X X pm e j , j∈IW where e = i ei and ei ∈ Lie(Gi )(Qp ), is contained in W. Since e ∈ g, we have kekp ≤ 1. Therefore, by (59), we have (65) kpm ei kp ≤ p−m+c1 . P P On the other hand, since pC πpm−C (x) 6∈ πpm−C (gW ) and pC x = pc2 i∈IW xi + pc2 i6∈IW xi ∈ gW + P P pc2 i6∈IW xi , we have kpc2 j6∈IW xj kp > p−m+C , which implies that there is j0 6∈ IW such that kpc2 xj0 kp > p−m+C . (66) So by the inequalities given in (65) and (66) we have kpc2 xj0 + pm ej0 k = max{kpc2 xj0 kp , kpm ej0 kp } > p−m+C . (67) Therefore kx′′ kp ≥ p−c1 kpc2 xj0 + pm ej0 k >p −c1 −m+C p m ≥ kp ei kp . ′′ =p −m+c2 (by (64) and (59)) ≥p −m+c1 (by (67)) (by (65)) So after P normalizing x , we get a vector x ∈ W such that kxkp = 1 and, for any i ∈ IW , kxi kp < 1, where x = i xi and xi ∈ Lie(Gi )(Qp ). This is contrary to the definition of IW . SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 35  Lemma 41. As before let G = Gs ⋉ V ⊆ (GLN0 )Q , where Gs is a semisimple connected simply-connected Q-group and V is a Q-vector group. Let G := G(Qp ) ∩ GLN0 (Zp )[pk0 ] for a fixed positive integer k0 . Suppose m is large enough depending on the embedding of G in (GLN0 )Q and k0 . Then the following holds: Suppose W is a subspace of Lie(G)(Qp ) such that the projection of W onto Lie(Gs )(Qp ) is onto and πpm (W ∩ glN0 (Zp )) is invariant under G. Then W = Lie(G)(Qp ). Proof. Without loss of generality we can and will assume that V is non-zero. Suppose Gs acts on V via ρ : Gs → GL(V); that means for any g ∈ Gs (R) and v ∈ V(R) we have (g, 0)(1, v)(g, 0)−1 := (1, ρ(g)(v)) in G(R) for any Q-algebra R. To get a clear computation of the adjoint action, we use the dual numbers Qp [ε] := Qp ⊕ Qp ε where ε2 = 0 (this lemma is the only place where ε is not a real number, and it is an element of the dual numbers.). Recall that we can identify Lie(G)(Qp ) with   πε Gs (Qp ) ⋉ Vp (Qp ) ker Gs (Qp [ε]) ⋉ V(Qp [ε]) −→ where πε is the group homomorphism induced by the ring homomorphism πε : Qp [ε] → Qp . Under this identification the adjoint action is given by conjugation; that means, for x ∈ Lie(G)(Qp ), we have 1 + εx ∈ G(Qp [ε]); and for g ∈ G(Qp ), we have 1 + ε Ad(g)(x) = g(1 + εx)g −1 . The identity element of G = Gs ⋉V is (1, 0). And so (x, w) ∈ Lie(G)(Qp ) if and only if (1+εx, εw) ∈ G(Qp [ε]); and to compute Ad(v)(x, w) we have to compute (1, v)(1 + εx, εw)(1, v)−1 in G(Qp [ε]). We have (1, v)(1 + εx, εw)(1, −v) = (1, v)(1 + εx, 0)(1, εw − v) = (1 + εx, ρ(1 − εx)(v) − v + εw) = (1 + εx, ε(dρ(x)(v) + w)), which means Ad(1, v)(x, w) = (x, dρ(x)(v) + w). Notice that we are slightly abusing the notation and use the addition for the group operation of V though it is realized as a subgroup of (GLN0 )Q . By this computation, for any (x, w) ∈ W and v ∈ V(Qp ) ∩ GLN0 (Zp ), we have pk0 dρ(x)(v) := (0, pk0 dρ(x)(v)) = Ad(pk0 v)(x, w) − (x, w) ∈ (W ∩ glN0 (Zp )) + pm glN0 (Zp ). Thus we have   pk0 dρ Lie(Gs )(Qp ) ∩ glN0 (Zp ) V(Qp ) ∩ glN0 (Zp ) ⊆ (W ∩ glN0 (Zp )) + pm glN0 (Zp ). Since V is a completely reducible Gs module with no trivial factors, we have   dρ Lie(Gs )(Qp ) ∩ glN0 (Zp ) V(Qp ) ∩ glN0 (Zp ) ⊇ pO(1) (V(Qp ) ∩ glN0 (Zp )), where the implied constant depends on G and its embedding into (GLN0 )Q . Therefore V(Qp ) ⊆ W ; and the claim follows.  The next lemma is crucial in proving the bounded generation claim and its proof is fairly involved. By the strong-approximation, we know that the S-arithmetic group Γ0 := G(Q) ∩ GLN0 (ZS ), when infinite, is dense in Gp := G(Qp ) ∩ GLN0 (Zp ) for any prime p which is not in S (here G is as before a simply-connected, e of Gp , Γ0 ∩ H e is dense in H. e The next connected, perfect Q-group.). And so for any open subgroup H OΓ0 (1) e e are, however, trapped within lemma shows that elements of Γ0 ∩ H with the S-norm at most [Gp : H] a proper algebraic subgroup of G. Let ν∞ be the Archimedean place of Q, and Se := {ν∞ ∪ S. Notice that ZS can be diagonally embedded p}P Q x2 for x = (x1 , . . . , xN0 ) ∈ RN0 , and kxkp := in ν∈Se Qν as a discrete subgroup. Let kxkν∞ := Qi i N0 0 max{|xi |p }i for x = (x1 , . . . , xN0 ) ∈ Qp . For any (xν ) ∈ ν∈Se QN let k(xν )kSe := maxν∈Se kxν kν . For any ν ,Q Q N0 0 λ ∈ GLN0 (ZS ), we let kλkS be the operator norm of λ : Se Qν → Se QN ν . 36 ALIREZA SALEHI GOLSEFIDY Lemma 42. As before, let G = Gs ⋉ V ⊆ (GLN0 )Q , where Gs is a semisimple, connected, simply-connected Q-group and V is a Q-vector group. Let G be the Zariski-closure of G in (GLN0 )Z ; in particular G(ZS ) = G(Q) ∩ GLN0 (ZS ) for any finite set of primes S. Let S be a finite set of primes such that G(ZS ) is infinite. Suppose either p ≫G 1 or m0 ≫G 1. Let G := G(Zp ). Then there is a positive number δ such that for any e of G[pm0 ] the set prime p 6∈ S and an open subgroup H e := {λ ∈ G(ZS ) ∩ H| e kλkS ≤ [G(Zp ) : H] e δ} Lδ (H) is in a proper Zariski-closed subgroup of G. e Proof. Since GLN0 (ZS ) is a discrete set with respect to the S-norm, we can and will assume that [G(Zp ) : H] e is a subset of a finite subgroup and is large enough. Otherwise choosing δ small enough, we have that Lδ (H) we are done. Suppose p or m0 are large enough so that Lemma 38 holds. Let G := G(Zp ), g := Lie(G)(Zp ), and e := min{k ∈ Z+ | H e ⊇ G[pk ]}. l(H) e is an open subgroup, l(H) e is finite. By Lemma 38, for any m0 ≤ k ≤ l(H) e − 1, we have Notice that, since H k k+1 k+1 k k+1 e ∩ G[p ])G[p that (H ]/G[p ] is a proper fp -subspace of G[p ]/G[p ] ≃ g/pg. Thus we have (68) where d = dimfp g/pg. e e 0) e ≤ pd(l(H)−m , pl(H)−m0 ≤ [G[pm0 ] : H] e e Our first goal is to find a linear separation of an Ad(H)-orbit with a good margin (see Claim 1) when l(H) is large enough depending only on G. To achieve this goal, we start with finding primitive Zp -submodules of e g and gs := Lie(Gs )(Qp ) ∩ g that are almost Ad(H)-invariant (see (71) and (80)). Notice that, since V is a direct sum of non-trivial simple Gs -modules, for any prime p, G(Qp ) = Gs (Qp ) ⋉ V(Qp ) is compactly generated. Hence, by a result of Kneser [Kne64], G(ZS ) is a finitely generated group. We fix a finite generating set Ω′ of G(ZS ). e ≫G,C0 1, Claim 1. For any constant C0 > 1 (later it will depend on dim G), there is c(G) such that, if l(H) then for some w ∈ g and L ∈ g∗ := HomZp (g, Zp ) the following holds e |L(Ad(h)(w))|p ≤ [G(Zp ) : H] e −c ; (1) for any h ∈ H, ′ e −c/C0 . (2) for some γ ∈ Ω , |L(Ad(γ)(w))|p ≥ [G(Zp ) : H] Proof of Claim 1. Let l e ∩ G[pl′ ])G[pl ]/G[pl ]) ⊆ g/pl−l′ g, V := Ψppl′ ((H l ′ e and l′ := ⌈l/2⌉ + m0 (Recall that Ψpl′ (1 + pl x) := π l−l′ (x) is a finite logarithmic map.). So where l := l(H) p p Pd′ there are a Zp -basis {e1 , . . . , ed } of g and positive integers n1 ≤ · · · ≤ nd′ such that V = πpl−l′ ( i=1 pni Zp ei ) (for some d′ ≤ d). Since 0 = n0 ≤ n1 ≤ · · · ≤ nd′ ≤ ⌊l/2⌋ − m0 =: nd′ +1 , there is i0 such that (1/2d)l − m0 − 1 < ni0 − ni0 −1 ≤ (1/2)l − m0 . (69) Let W1 := (70) Pi0 −1 i=1 pni Zp ei ⊂ g (if i0 = 1, then W1 = 0). So ni e Ad(H)(W 1 ) ⊆ W1 + p 0 g. SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. Pi0 −1 37 Pi0 −1 Let W2 := i=1 Zp ei . Notice that W2 = W1 ∩ g where W1 = i=1 Qp ei is the Qp -span of W1 . Since e e we have for any 1 ≤ i ≤ i0 − 1 and h ∈ H πpni0 (W1 ) is H-invariant, ni Ad(h)(p ei ) = iX 0 −1 nj cj p e j + where pni0 c′j ej , j=1 j=1 cj , c′j d X ∈ Zp . Therefore Ad(h)(ei ) = iX 0 −1 (cj p nj −ni + pni0 −ni c′j )ej + d X pni0 −ni c′j ej . j=i0 j=1 e Since g is H-invariant, we have cj pnj −ni +pni0 −ni c′j ∈ Zp . Since nj is increasing, we have pni0 −ni ≥ pni0 −ni0 −1 for any i < i0 . Hence we have ni −ni0 −1 e g. Ad(H)(W 2 ) ⊆ W2 + p 0 (71) Next we would like to get some invariance in the semisimple part of g. We notice that Lie(G)(Qp ) = Lie(Gs )(Qp ) ⊕ V(Qp ) (we are identifying V with its Lie algebra.). For any x ∈ Lie(G)(Qp ), we write its components in the above decomposition by xs and xv ; that means x = xs + xv where xs ∈ Lie(Gs )(Qp ) and Lie(V)(Qp ). There is a positive integer d1 depending only on G such that (72) kxkp ≤ max{kxs kp , kxv kp } ≤ pd1 kxkp gs ⊕ V ⊆ g ⊆ p−d1 (gs ⊕ V), and where gs := Lie(Gs )(Qp )∩g and V := V(Qp )∩g. Let W2,s := {xs | x ∈ W2 } be the projection to Lie(Gs )(Qp ) of W2 . And so, by (71) and the fact that V is a normal subgroup of G, we have ni −ni0 −1 e g. Ad(H)(W 2,s ) ⊆ W2,s + V(Qp ) + p 0 (73) By (72), pd1 W2,s is a Zp -submodule of gs . Hence gs has a Zp -basis f1 , . . . , fds such that ′ (74) W2,s = ds X ′ pni Zp fi i=1 for some integers −d1 =: n′0 ≤ n′1 ≤ ··· ≤ n′d′s < n′d′s +1 n′j0 +1 − n′j0 ≥ (75) := ∞. Let j0 be the smallest index such that ni0 − ni0 −1 − d1 . 2ds (Notice that, since n′0 := 0 and n′d′s +1 := ∞, there is such j0 .) In particular, we have n′j0 < (76) ni0 − ni0 −1 − d1 . 2 Pj0 Pj0 Let W3,s := i=1 Zp fi . Notice that W3,s = W3,s ∩ gs where W3,s = i=1 Qp fi . So by (73) and (72) for any e we have 1 ≤ i ≤ j0 and h ∈ H, ′ n′i Ad(h)(p fi ) = ds X ′ pnj cj,s fj + pni0 −ni0 −1 where ∈ Zp and vi ∈ V(Qp ). Therefore ′ (77) p−d1 c′j,s fj + vi , j=1 j=1 cj,s , c′j,s ds X (Ad(h)(fi ))s = ds X j=1 ′ ′ ′ (pnj −ni cj,s + pni0 −ni0 −1 −d1 −ni c′j,s )fj + ds X j=d′s ′ pni0 −ni0 −1 −d1 −ni c′j,s fj . 38 ALIREZA SALEHI GOLSEFIDY e (Ad(h)(xs ))s ∈ gs , we have pn′j −n′i cj,s + pni0 −ni0 −1 −d1 −n′i c′ ∈ Zp and Since, for any xs ∈ gs and h ∈ H, j,s ′ pni0 −ni0 −1 −d1 −ni c′j,s ∈ Zp . By (76) we have ni0 − ni0 −1 − d1 − n′i > (78) ni0 − ni0 −1 − d1 . 2 By (75), for j ≥ j0 + 1 and i ≤ j0 , we have n′j − n′i ≥ (79) ni0 − ni0 −1 − d1 . 2ds By (77), (78), and (79), we get (80) ⌊(ni0 −ni0 −1 −d1 )/(2ds )⌋ e gs . Ad(H)(W 3,s ) ⊆ W3,s + V(Qp ) + p e Having (71) and (80), we are ready to find the desired linear separation of an Ad(H)-orbit. We do this considering various cases. Case 1. Suppose (81) Ad(G(ZS ))(W3,s ) 6⊆ W3,s + V(Qp ) + p⌊(ni0 −ni0 −1 −d1 )/(4ds C0 )⌋ gs . By (81), we have that there is λ ∈ Ω′ and 1 ≤ i ≤ j0 such that (82) (Ad(λ)(fi ))s 6∈ W3,s + p⌊(ni0 −ni0 −1 −d1 )/(4ds C0 )⌋ gs . For 1 ≤ i ≤ j0 , let fi∗ : g → Zp be a Zp -linear map such that fi∗ (fi ) = pd1 , fi∗ (fj ) = 0 for j 6= i, and fi∗ (x) = fi∗ (xs ). (Here xs is the Lie(Gs )(Qp )-component of x; and notice that because of (72) the image of fi∗ is a subset of Zp .) By (82), we have that there is j > j0 such that (83) |fj∗ (Ad(λ)(fi ))|p > p−⌊(ni0 −ni0 −1 −d1 )/(4ds C0 )⌋ . e we have And, by (80) and j > j0 ≥ i, for any h ∈ H, (84) |fj∗ (Ad(h)(fi )|p ≤ p−⌊(ni0 −ni0 −1 −d1 )/(2ds )⌋ . e ≫G,C0 1, we get that (83) and (84) imply w := fi and L := f ∗ satisfy the conditions of So by (69), for l(H) j Claim 1. Case 2. Suppose Lie(Gs )(Qp ) is the Qp -span W3,s of W3,s . Let us recall that W1 is the Qp -span of W1 . And W3,s is a subset of the projection of W1 to Lie(Gs )(Qp ). So by the assumption of Case 2, we have that the projection of W1 onto Lie(Gs )(Qp ) is onto. Since W1 is a proper subspace of Lie(G)(Qp ), by Lemma 41 and the strong approximation there is c3 ≪G 1 such that Pi0 Zp ei . So there is λ ∈ Ω′ and 1 ≤ i ≤ i0 πpc3 (W1 ∩g) is not G(ZS )-invariant. Recall that W2 = W1 ∩g = i=1 such that (85) Ad(λ)(ei ) 6∈ W2 + pc3 g. Let {e∗1 , . . . , e∗d } be the dual of {e1 , . . . , ed }. Then, by (85) we have that there is j ≥ i0 such that (86) |e∗j (Ad(λ)(ei ))|p > p−c3 . e we have And by (71) and j ≥ i0 > i, for any h ∈ H, (87) |e∗j (Ad(h)(ei ))|p ≤ p−(ni0 −ni0 −1 ) . e ≫G,C0 1, we get that (86) and (87) imply w := ei and L := e∗ satisfy the conditions of So by (69), for l(H) j Claim 1. SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 39 Case 3. Suppose Ad(G(ZS ))(W3,s ) ⊆ W3,s + V(Qp ) + p⌊(ni0 −ni0 −1 −d1 )/(4ds C0 )⌋ gs , (88) and Lie(Gs )(Qp ) is not the Qp -span W3,s of W3,s . By the strong approximation, the projection Kp of the closure of G(ZS ) to Gs (Qp ) contains Gs (Qp ) ∩ GLN0 (Zp )[pk0 ] where k0 depends only on G. So by Lemma 40 and (88), there are a positive integer c4 , which depends only on G, and a normal subgroup GW3,s of Gs such that p2c4 πpm−c4 (gW3,s ) ⊆ pc4 πpm−c4 (W3,s ) ⊆ πpm−c4 (gW3,s ), (89) where gW3,s := Lie(GW3,s )(Qp ) ∩ g and m := ⌊(ni0 − ni0 −1 − d1 )/(4ds C0 )⌋. Since W3,s is a proper subspace of Lie(Gs )(Qp ), by the first inclusion in (89) we have that GW3,s is a proper normal subgroup of Gs . So at least one simple factor Gi′0 is missing in Lie(GW3,s )(Qp ). Let gi′0 := Lie(Gi′0 )(Qp ) ∩ g. Then we have that gi′0 ∩ gW3,s = {0} and [gi′0 , gW3,s ] = {0}. Let x0 ∈ gi′0 be a unit vector. e Next we show that W3,s + Zp x0 + V(Qp ) is almost Ad(H)-invariant. e and suppose h ∈ G[pk ] \ G[pk+1 ] for some k < l′ := ⌈l/2⌉ + m0 . Then Let h ∈ H log h ∈ (pk glN0 (Zp ) ∩ g) \ pk+1 glN0 (Zp ). So l′ −k log hp ′ ′ e = pl −k log h ∈ pl glN0 (Zp ) ∩ log H. Hence πpni0 (p−k log h) ∈ πpni0 (W1 ). This implies that there is yh ∈ W2,s such that p−k log h ∈ yh + pni0 g + V(Qp ). And so yh = (90) Pd′s ′ i=1 ai pni fi , for some ai ∈ Zp , which implies p−k log h ∈ W3,s + p min{ni0 ,n′i′ +1 } 0 g + V(Qp ). By (75), we have min{ni0 , n′i′0 +1 } ≥ (91) ni0 − ni0 −1 − d1 − d1 ≥ 2C0 m − d1 . 2ds Hence by (90) and (91), we have p−k log h ∈ W3,s + p2C0 m−d1 g + V(Qp ). (92) By (89) and (92), we have (93) pc4 −k log h ∈ gW3,s + pmin{2C0 m−d1 ,m−c4 } g + V(Qp ). By (93) and the fact that [gW3,s , x0 ] = {0}, we have ad(log h)(x0 ) ∈ pmin{2C0 m−d1 ,m−c4 }−c4 g + V(Qp ). (94) e ≫G,C0 1 we have Thus by m = ⌊(ni0 − ni0 −1 − d1 )/(4ds C0 )⌋, (69), and (94), for l(H) (95) Ad(h)(x0 ) = exp(ad(log h))(x0 ) ∈ x0 + pmin{2C0 m−d1 ,m−c4 }−c4 g + V(Qp ). So by (80) and (95), we have (96) min{2C0 m−d1 ,m−c4 }−c4 e g + V(Qp ). Ad(H)(W 3,s + Zp x0 ) ⊆ W3,s + Zp x0 + p On the other hand, looking at the action of G(ZS ) on gi′0 , we can choose x0 ∈ gi′0 , L0 ∈ HomZp (gi′0 , Zp ), and a positive integer c5 which depends only on G such that for some λ ∈ Ω′ we have (97) |L0 ((Ad(λ)(x0 ))s )|p ≥ p−c5 , and L0 (x0 ) = 0. 40 ALIREZA SALEHI GOLSEFIDY Now let Lie(Gs )(Qp ) = ⊕i Lie(Gs,iP )(Qp ) be the decomposition of Lie(Gs )(Qp ) to its simple factors; and for any x ∈ Lie(G)(Qp ) let x = xv + i xs,i be the such that xv ∈ Lie(V)(Qp ) and xs,i ∈ Lie(Gs,i )(Qp ). Then for some positive integer c6 which depends only on G we have pc6 kxkp ≥ max{kxs,i kp }i . So there is a well-defined Zp -linear map L : g → Zp , L(x) := L0 (pc6 xs,i′0 ). We notice that |L(Ad(λ)(x0 ))|p ≥ p−c5 , and L(W3,s + Zp x0 ) = 0. (98) e we have And so by (96), for any h ∈ H, |L(Ad(h)(x0 ))|p ≤ p− min{2C0 m−d1 ,m−c4 }−c4 . (99) e ≫G,C0 1, we get that (98) and (99) imply w := x0 and L satisfy the conditions of Claim So by (69), for l(H) 1.  e are in a proper quadratic subvariety. Let g := Lie G. So Next we will show elements with small height in H there are finitely many ZS -linear maps fi (for 1 ≤ i ≤ s0 ) viewed as regular functions on the affine scheme (glN0 )ZS of N0 -by-N0 matrices such that for any (unital commutative) ZS -algebra R, we have g(R) = {x ∈ glN0 (R)| ∀i, fi (x) = 0}. (100) N02 Let us view glN0 (R) as R , and write its elements as vectors. This way we write fi (x1 , . . . , xN02 ) := P j aij xj , where aij ∈ ZS . And consider the matrix A := [aij ] ∈ Ms0 ×N02 (ZS ). Since ZS is a PID, there are γ1 ∈ GLs0 (ZS ), γ2 ∈ GLN02 (ZS ), and positive integers r1 |r2 | · · · |rN02 −d such that   0 0 γ2 , (101) A = γ1 0 diag(r1 , . . . , rN02 −d ) where diag(r1 , . . . , rN02 −d ) is the diagonal matrix with diagonal entries ri ’s (this is known as the Smith normal form when the diagonal block is at the top left corner.). Let us view the rows of γ2 as a ZS -basis N2 N2 {e∗1 , . . . , e∗N 2 } of the dual of ZS 0 . And let {e1 , . . . , eN02 } be the dual ZS -basis of ZS 0 . So by (100) and (101), 0 for any ZS -algebra R with no additive torsion element, we have (102) x ∈ g(R) ⇐⇒ e∗d+1 (x) = · · · = e∗N 2 (x) = 0 ⇐⇒ x ∈ 0 d M Rei . i=1 And so in this case we have (103) g∗ (R) := HomR (g(R), R) = d M Re∗i . i=1 Claim 2. Suppose {e1 , . . . , eN02 } is a ZS -basis of glN0 (ZS ) such that (102) and (103) hold for any ZS -algebra R with no additive torsion element. For (w1 , . . . , wd ) ∈ Rd , (l1 , . . . , ld ) ∈ Rd , and g ∈ G(R), let X e∗i (Ad(g)(ej ))li wj . ηg (w1 , . . . , wd ; l1 , . . . , ld ) := i,j 2d If δ is small enough, there is (w1 , . . . , wd , l1 , . . . , ld ) ∈ Q (Q is the algebraic closure of Q) such that e we have ηh (w1 , . . . , wd ; l1 , . . . , ld ) = 0, (1) For any h ∈ Lδ (H) (2) For some γ ∈ Ω′ we have ηγ (w1 , . . . , wd ; l1 , . . . , ld ) 6= 0. e and some γ ∈ Ω′ Proof of Claim 2. By Claim 1, there are w ∈ g(Zp ) and L ∈ g(Zp )∗ such that for any h ∈ H we have e −c , e −c/C0 , and |L(Ad(h)(w))|p ≤ [G(Zp ) : H] (104) |L(Ad(γ)(w))|p ≥ [G(Zp ) : H] SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 41 for some c which depends only on G and some large positive number C0 which will be specified later. Pd Pd Suppose L(Ad(λ)(w))−1 w = i=1 xi ei and L = i=1 yi e∗i ; and let x0 := (x1 , . . . , xd ) and y0 := (y1 , . . . , yd ). Since g(Zp ) = g = Lie(G)(Qp ) ∩ glN0 (Zp ), it is a primitive Zp -submodule of glN0 (Zp ); and so (105) e c/C0 . kx0 kp = |L(Ad(h)(w))|−1 p kwkp ≤ [G(Zp ) : H] e and some And clearly ky0 kp ≤ 1. By (104) and the way x0 and y0 are defined, we get that for any h ∈ H ′ γ ∈ Ω we have (106) e −c(1−1/C0 ) . ηγ (x0 , y0 ) = 1, and |ηh (x0 , y0 )| ≤ [G(Zp ) : H] To prove the claim, we proceed by contradiction and use an effective version of Nullstellensatz theorem [BY91] (or [MW, Theorem IV]). Suppose the following has no solution over Q: e ηh (x, y) = 0, ηγ (x, y) = 1, ∀ h ∈ Lδ (H), where γ ∈ Ω′ is the one given in (106). Notice that the total degree of ηg is two for any g ∈ G(Zp ); and the e is at most [G(Zp ) : H] e ΘΩ (δ) . So by the effective Nullstellensatz, S-norm of the coefficients of ηh for h ∈ Lδ (H) there are polynomials qγ , qh ∈ ZS [T1 , . . . , T2d ] and D0 ∈ ZS such that X (107) qγ (x, y)(ηγ (x, y) − 1) + qh (x, y)ηh (x, y) = D0 , and e h∈Lδ (H) (108) e ΘΩ (δ) , deg qγ , deg qh ≤ N (d), and kD0 kS ≤ [G(Zp ) : H] e and N (d) is a positive integer which depends only on d := dim G. So by (108), (105), and where h ∈ Lδ (H) the fact that y0 ∈ Zdp , we have e N (d)c/C0 . |qh (x0 , y0 )|p ≤ [G(Zp ) : H] (109) e we have Hence by (109) and (106), for any h ∈ Lδ (H) (110) e −c |qh (x0 , y0 )ηh (x0 , y0 )|p ≤ [G(Zp ) : H]   1− N (d)+1 C 0 . Now suppose C0 = 2N (d) + 2; so by (106), (107), and (110), we have (111) |D0 |p = qγ (x0 , y0 )(ηγ (x0 , y0 ) − 1) + X qh (x0 , y0 )ηh (x0 , y0 ) e h∈Lδ (H) p Hence by (108) and (111) we get e c/2 ≤ kD0 kS ≤ [G(Zp ) : H] e ΘΩ (δ) , [G(Zp ) : H] which gives us a contradiction for δ ≪Ω 1. d e −c/2 . ≤ [G(Zp ) : H]  d (Going back to the proof of Lemma 42.) For a given (w, l) ∈ Q × Q , let Vw,l (Q) := {g ∈ G(Q)| ηg (w, l) = 0}. Then Vw,l gives us a closed subvariety of G. And since it is coming from an intersection of a hyperplane in glN0 (Q) and G(Q), both its number of irreducible components and their degrees are bounded by a positive integer N1 := N1 (G) which depends only on G. Hence by [EMO05, Proposition 3.2] and its proof, there is a positive integer N2 := N2 (G) such that for any subset A of G(Q) which generates a Zariski-dense subgroup of G(Q) we have Q (112) N2 A 6⊆ Vw,l (Q), 42 ALIREZA SALEHI GOLSEFIDY d d d d e ⊆ Vw,l (Q). for any (w, l) ∈ Q × Q . By Claim 2, if δ ≪G 1, there is (w, l) ∈ Q × Q such that LN2 δ (H) And so Q e e (113) N2 Lδ (H) ⊆ LN2 δ (H) ⊆ Vw,l (Q). e does not generate a Zariski-dense subgroup of G(Q); Therefore by (112) and (113) we have that Lδ (H) proving Lemma.  Proof of Proposition 37. By Nori’s strong approximation [Nor89, Theorem 5.4] we know that [G(Zp ) : Γ] ≪Γ e := {h ∈ G(Zp )| πpn (h) ∈ H}. 1, where Γ is the closure of Γ in G(Zp ). For a proper subgroup H of πpn (Γ), let H e is in a proper algebraic subgroup H of G for small enough δ1 . So by So by Lemma 42 we have that Lδ1 (H) Proposition 14 we have that P (l) ({γ ∈ Γ| πpn (γ) ∈ H}) ≤ e−δ0 l (114) if 1 ≪ l ≪ δ1 log[πpn (Γ) : H] where δ0 is given by Proposition 14 and δ1 is given by Lemma 42. If for some l ≥ n δ (l) log p we have Pπpn (Ω) (H) ≥ [πpn (Γ) : H]−δ , then by [BG09, Remark, page 1060] (see [SG, Lemma 8]) for any l′ ≤ enough. n δ (2l′ ) log p we have Pπpn (Ω) (H) ≥ [πpn (Γ) : H]−2δ . This contradicts (114) if δ is small  5.2. Getting a large ideal by adding/subtracting a congruence subgroup boundedly many times. The main goal of this section is to prove Proposition 43. At the end we also provide a few lemmas that are needed for using Proposition 43 in the context of modules. The results of this section rely on properties of p-adic analytic maps that are proved in the appendix. Proposition 43. Let Gs ⊆ (GLN0 )Q be a semisimple Q-subgroup. Let ρ : Gs → GL(V) be a Q-homomorphism, where V is a Q-vector group. Suppose no non-zero vector of V(Q) is ρ(Gs (Q))-invariant. For a prime p, let P [pl ] := {g ∈ Gs (Qp ) ∩ GLN0 (Zp )| πpl (g) = 1}. Then for l ≫Gs ,ρ 1 we have P P l ΘGs ,ρ (l) l Zp [ρ(P [1])]. ΘG ,ρ (1) ρ(P [p ]) ⊇ p ΘG ,ρ (1) ρ(P [p ]) − s s (Notice that the implied constants are independent of p.) Let us point out that the same proof gives us also the local version of Proposition 43. Proposition 43′ . Let Gs ⊆ (GLN0 )Q be a semisimple Qp -subgroup. Let ρ : Gs → GL(V) be a Qp homomorphism, where V is a Qp -vector group. Let P [pl ] := {g ∈ Gs (Qp ) ∩ GLN0 (Zp )| πpl (g) = 1}. Suppose that V(Qp ) has no non-zero Gs (Qp ) fixed vector. Then for l ≫Gs ,ρ 1 we have P P l ΘGs ,ρ (l) l Zp [ρ(P ))]. ΘG ,ρ (1) ρ(P [p ]) ⊇ p ΘG ,ρ (1) ρ(P [p ]) − s s Lemma 44. Let K be a field (only in this Lemma), and G be a subgroup of GLN0 (K). Suppose V := K N0 is a completely reducible G-module, and V has no non-zero G-fixed vector. Then there is no a ∈ MN0 (K) such that Tr(ag) = 1 for any g ∈ G. Proof. Suppose to the contrary that there is such a ∈ MN0 (K). Let A := K[G] be the K-span of G. Since A has a faithful semisimple finite dimensional A-module, A is a semisimple K-algebra. Let a := hg − 1| g ∈ Gi be the ideal generated by G − 1 in A. Since Tr(ag) = 1 for any g ∈ G, we have that Tr(ax) = 0 for any x ∈ a. Thus a is a proper ideal. On the other hand, since A is semisimple, by the idempotent decomposition there are α1 , α2 ∈ A such that (1) α2i = αi , (2) α1 + α2 = 1, (3) a = Aα1 . SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 43 Since a is a proper ideal, α1 6= 1. And so there is a non-zero vector v ∈ V in the kernel of α1 , which implies that av = Aα1 v = 0. Therefore for any g ∈ G we have gv = v which contradicts the assumption that V does not have a non-zero G-fixed point.  Proof of Proposition 43. Since Gs is a semisimple group, V(Qp ) is a completely reducible Qp [ρ(Gs (Qp ))]module, for any prime p. As Gs (Qp ) is Zariski-dense in Gs (Qp ), we have that Qp [ρ(Gs (Qp ))] = Qp [ρ(Gs (Qp ))]. Therefore Qp [ρ(Gs (Qp ))] has a faithful completely reducible module, which implies that Qp [ρ(Gs (Qp ))] is a semisimple algebra. Hence the nilradical of Qp [ρ(Gs (Qp ))] is zero, too. Thus Qp [ρ(Gs (Qp ))] is a semisimple algebra and V(Qp ) is a completely reducible Qp [ρ(Gs (Qp ))]-module. Next we show that V(Qp ) does not have a non-zero Gs (Qp )-invariant vector. If not, V(Qp )Gs (Q) := {v ∈ P V(Qp )| ρ(Gs (Q))(v) = v} is non-zero. For v0 ∈ V(Qp )Gs (Q) we have v0 = i ai vi where ai ∈ Qp are Qlinearly independent and vi ∈ V(Q). Since ρ is defined over Q, for g ∈ Gs (Q) we have ρ(g)(vi ) ∈ V(Q) for any i. Hence ρ(g)(v0 ) = v0 implies that for any i we have ρ(g)(vi ) = vi . Since Gs (Q) is Zariski-dense in Gs , we get that ρ(Gs (Q))(vi ), which is a contradiction. Hence Lemma 44 implies that the constant function 1 does not belong to the linear span of the analytic functions ρij where ρij are the entries of ρ : Gs (Qp ) → GL(V(Qp )) with respect to a Qp -basis of V(Qp ). So we get the desired result by Corollary 50.  Next we prove a corollary of Lemma 39. Corollary 45. Let R ⊆ Mn0 (Zp ) be a Zp -subalgebra. Let 0 = Wk0 +1 ⊆ Wk0 ⊆ . . . ⊆ W1 = Qnp 0 be a composition series of Qnp 0 as an Qp [R]-module, where Qp [R] is the Qp -span of R. Suppose vi ∈ Mi := Wi ∩ Znp 0 and kvi k := inf{kvi + wkp | w ∈ Wi+1 } ≥ q −1 , where q is a power of p. Then k0 X Rvi ⊇ q ΘR,{Wj } (1) Znp 0 . i=1 Proof. For any 1 ≤ i ≤ k0 , we get a ring homomorphism from R to EndQp (Wi /Wi+1 ). Let Ri be its image. Notice that Mi /Mi+1 can be embedded into Wi /Wi+1 and for any v ∈ Mi we have Ri (v+Mi+1 ) = Rv+Mi+1 . So by Lemma 39 for the ring Ri we have that, q ΘR,Wi (1) Mi ⊆ Rvi + Mi+1 ⊆ Mi . By induction on i one can easily see that, for any 1 ≤ i ≤ k0 , we have q ΘR,{Wj } (1) Znp 0 = q ΘR,{Wj } (1) M1 ⊆ i X Rvj + Mi+1 . j=1  Lemma 46. Let R ⊆ Mn0 (ZS ) be a ZS -subalgebra. Assume the Q-span Q[R] of R is a semisimple algebra. Suppose p is a large prime number (depending on R), and W is a composition factor of Qnp 0 ; that means there are two Qp [R]-submodules W1 ⊆ W2 such that W = W2 /W1 is a simple Qp [R]-module. Then for any v ∈ WZp := (W2 ∩ Znp 0 ) + W1 /W1 we have Zp [R]v = WZp if v 6∈ pWZp . Proof. By Wedderburn theorem and Artin-Brauer-Noether theorem, for large enough p we have that L (1) Qp [R] ≃ i Mni (Ki ) where Ki are finite extensions of QL p, (2) under the above identification Zp [R] gets identified with i Mni (O L Ki ),ni . (3) under the above identification Znp 0 naturally gets identified with i OK i 44 Hence WZp is isomorphic to ni . we have Mni (OKi )v = OK i ALIREZA SALEHI GOLSEFIDY ni OK i ni where Zp [R] acts via Mni (OKi ). It is clear that for any unit vector v ∈ OK i  Corollary 47. Let R ⊆ Mn0 (ZS ) be a ZS -subalgebra. Assume the Q-span Q[R] of R is a semisimple algebra. Let 0 = Wk0 +1 ⊆ Wk0 ⊆ . . . ⊆ W1 = Qnp 0 be a composition series of Qnp 0 as an Qp [R]-module, where Qp [R] is the Qp -span of R. Suppose vi ∈ Mi := Wi ∩ Zpn0 and kvi k := inf{kvi + wkp | w ∈ Wi+1 } = 1. Then, for large enough p, we have Znp 0 = k0 X Rvi . i=1 Proof. It is a direct corollary of Lemma 46.  5.3. Getting a p-adically large vector in a submodule in boundedly many steps. The main goal of this short section is proving a key lemma (Lemma 48). Using this Lemma, we will be able to get a Qp -basis of V(Qp ) consisting of large vectors in boundedly many steps. Lemma 48. Let Ω, Γ and G be as above. In particular, G = Gs ⋉ V where Gs is a semisimple Qp group and V is a Qp -vector group; and for some non-negative integer kp ≪Ω 1 (which is zero for large enough p) Qp [pkp ] = Kp ⋉ Vp where Qp is the closure of Γ in G(Qp ), Qp [pkp ] := Qp ∩ GLN0 (Zp )[pkp ], Kp := Gs (Qp ) ∩ GLN0 (Zp )[pkp ], and Vp := V(Qp ) ∩ GLN0 (Zp )[pkp ] (see Section 2.6). Let V′ ⊆ V be a non-zero Qp -subgroup which is Gs -invariant. For any 0 < ε ≪Ω,V′ 1, there are δ > 0 and a positive integer C such that the following holds: Suppose p is a prime number, Q = pn , and nε ≫Ω,V′ 1. Q If PQ (δ, A, l) holds and πQ (Γ[q2 ]) ⊆ πQ ( C A)πQ (Vp ∩ V′ (Qp )) where q2 = pn2 and n2 ≤ ε2 n, then Q (115) {v ∈ V′ (Qp )| kvkp > Qε , πQ (v) ∈ πQ ( 4C A)} is non-empty. Proof. Since V′ is Gs -invariant and it commutes with V, V′ is a normal subgroup of G. On the other hand, GLN0 (Zp )[pkp ] is a normal subgroup of GLN0 (Zp ) and Qp ⊆ GLN0 (Zp ); and so Vp ∩ V′ (Qp ) = V′ (Qp ) ∩ GLN0 (Zp )[pkp ] is a normal subgroup of Qp . Let ηq1 : πq1 (Qp ) → πq1 (Qp )/πq1 (Vp ∩ V′ (Qp )) be the projection map where q1 = pn1 and n1 = ⌊εn⌋. So by the assumption there is a section s : ηq1 (πQ (Qp [q2 ])) → πq1 (Qp ) Q such that the image of s is a subset of πq1 ( C A) (by section we mean ηq1 (s(x)) = x). Notice that −1 −1 −1 −1 ηq1 (s(x−1 s(x1 )s(x−1 ηq1 (s(x1 ))ηq1 (s(x2−1 )) = (x−1 (x1 )(x−1 1 x2 ) 2 )) = ηq1 (s(x1 x2 )) 1 x2 ) 2 ) = 1. Q ′ −1 Hence s(x−1 s(x1 )s(x−1 q1 (Vp ∩ V (Qp )). Now if we assume to the contrary that 1 x2 ) 2 ) ∈ πq1 ( 3C A) ∩ πQ the set in (115) is empty, then we get that πq1 ( 3C A) ∩ πq1 (Vp ∩ V′ (Qp )) = {1}. And so s is a group homomorphism. So H := Im(s) is a subgroup of πq1 (Qp ), and [πq1 (Qp ) : H] ≥ |πq1 (Vp ∩ V′ (Qp ))| ≥ pΘV′ (nε) . By Proposition 37 we have that (2l) Pπq (Ω) (H) ≤ [πq1 (Γ) : H]−ΘΩ (1) ≤ p−ΘΩ,V′ (nε) . 1 Q On the other hand, if x ∈ πq1 ( 2C A) ∩ πq1 (Γ[q2 ]), then Q x−1 s(ηq1 (x))) ∈ πq1 ( 4C A) ∩ πq1 (Vp ∩ V′ (Qp )). (116) So by the contrary assumption we have that x ∈ H, which means Q (117) πq1 ( 2C A) ∩ πq1 (Γ[q2 ]) ⊆ H. SUPER-APPROXIMATION, II: By the assumption we have THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. (l) PΩ (A) 45 > Q−δ (where δ is small positive number to be determined later). So 2 (l) (x′ )) > Q−δ |πq2 (Γ)|−1 = p−ΘΩ (nε PΩ (A ∩ πq−1 2 ) 2 = p−n(δ+ΘΩ (ε )) , 2 for some x′ ∈ πq2 (Γ). Hence P (2l) (A · A ∩ Γ[q2 ]) > p−nΘΩ (ε ) for small enough δ. Therefore by (117) and (116) we have −nΘΩ (ε2 ) < −nΘΩ,V′ (ε), which is a contradiction if 0 < ε ≪Ω,V′ 1.  5.4. Proof of super-approximation: the p-adic case. Let us recall that G = Gs ⋉ V where Gs is a semisimple Qp -group and V is a Qp -vector group; let ρ : Gs → GL(V) be the Qp -representation which gives us the action of Gs on V. Let us recall that, since G is perfect, no non-zero vector of V(Qp ) is ρ(Gs (Qp ))-invariant. Let Vi be Qp -subgroups of V such that (1) Vi (Qp ) are irreducible Gs (Qp )-modules. 0 Vi . (2) V = ⊕ki=1 Let P [pk ] := {g ∈ Gs (Qp )| kg − 1kp ≤ p−k } for any non-negative integer k. Inductively we do the following simultaneously: (1) construct a permutationL σ : {1, . . . , k0 } → {1, . . . , k0 }, (2) find vectors vj ∈ Wj := i∈{1,...,k0 }\{σ(1),...,σ(j−1)} Vσ(i) (Qp ), such that the following holds: (1) for small enough δ, large enough C (depending on ε, Ω, and Vi ) and any 1 ≤ j ≤ k0 we have   Q Θ (1) (118) πQ Γ[pn(ε G ) ] ⊆ πQ ( Θ(C) A)πQ (Vp ∩ Wj ); (2) vj ∈ Wj ; (3) v 1 , . . . , v j generate W1 /Wj+1 as a Gs (Qp )-module, where v i is the projection of vi . (4) logp kv j kp ≫ nεΘG (1) ;  Pj P P Θ (1) Θ (1) n(εΘG (1) ) (5) ])(vi ) − ΘG (1) ρ(P [pn(ε G ) ])(vi ) + Wj+1 ⊇ pn(ε G ) Vp . i=1 ΘG (1) ρ(P [p By [SG, Theorem 36], if δ is small enough and C is large enough, (118) holds for j = 1. Now we suppose (118) holds for 1 ≤ j ≤ j0 and we have already found v1 , . . . , vj0 −1 as desired. We will define σ(j0 ) and find vj0 so that the above properties hold. Since (118) holds for j = j0 , by Lemma 48 there is vj0 ∈ Wj0 such that Q (119) logp kvj0 kp ≫ nεΘG (1) , and πQ (vj0 ) ∈ πQ ( Θ(C) A). Since logp kvj0 kp ≫ nεΘG (1) , the projection v j0 of vj0 to Vσ(j0 ) for some σ(j0 ) ∈ {1, . . . , k0 } \ {σ(1), . . . , σ(j0 − 1)} Θ (1) has length at least ΘVi (pΘ(nε G ) ). Now by Proposition 43, and Corollaries 45 and 47 one gets all the mentioned properties except the first one. By [SG, Theorem 36] we have that for small enough δ and large enough C Q Θ(1) (120) πQ (P [pnε ]) ⊆ πQ ( C A)πQ (Vp ). To simplify our notation let us drop the constant power of ε in the rest of the argument. Hence by (119) we have Q (121) πQ (pnε Vp ) ⊆ πQ ( Θ(C) A)πQ (Vp ∩ Wj ). 46 ALIREZA SALEHI GOLSEFIDY For any g1 , g2 ∈ P [pnε ] and v1 , v2 ∈ Vp , we have [(g1 , v1 ), (g2 , v2 )] ∈ P [p2nε ] ⋉ (pnε Vp ). Hence by (120) and (121) we have (122) Q πQ ({[g1 , g2 ]| g1 , g2 ∈ P [pnε ]}) ⊆ πQ ( Θ(C) A)πQ (Vp ∩ Wj ). Let X := {[g1 , g2 ]| g1 , g2 ∈ P [pnε ]}. Using properties of the finite logarithmic maps (see [SG, Lemma 34]), we have Q ( dim Gs X ∩ P [pknε+Θ(1) ])P [p2knε ] = P [pknε+Θ(1) ], Q for any integer k ≥ 2. Therefore πQ ( Θ(− log ε) X) ⊇ πQ (P [pnΘ(ε) ]). Hence Q (123) πQ (P [pnΘ(ε) ]) ⊆ πQ ( Θ(C) A)πQ (Vp ∩ Wj ). And so by (121) and (123) we have which finishes the proof. Q πQ (Γ[pnΘ(ε) ]) ⊆ πQ ( Θ(C) A)πQ (Vp ∩ Wj ), 6. Appendix A: quantitative open image for p-adic analytic maps. The main goal of this appendix is to prove that one can get a large open set by adding the image of an analytic function in controlled number of times (see Proposition 49). Proposition 49. Let K be a characteristic zero non-Archimedean local field. Let O := OK be its ring of integers, and p be a uniformizing element. Let U ⊆ K n0 be a neighborhood of the origin, and F := (f1 , . . . , fd0 ) : U → K d0 be an analytic function. Suppose the constant function 1 is not in the K-span of fi . Then for any l ≫F 1 we have P P ΘF (l) d0 l n0 l n0 O . ΘF (1) F (p O ) ⊇ (K-span of F (U )) ∩ p ΘF (1) F (p O ) − In fact, we prove the following refinement of Proposition 49. In Proposition 49′ , we pinpoint how the implied constants depend on the given analytic functions (with a few extra technical assumptions). This type of control helps us to prove Corollary 50. Corollary 50 is the only result in the appendix that is needed in the main part of the article. In Corollary 50, we deal with polynomial maps that are defined over a number field, and prove that their images in all the non-Archimedean completions are uniformly large. Proposition 49′ . Let K be a characteristic zero non-Archimedean local field. Let O := OK be its ring of integers, and p be a uniformizing element. Let F := (f1 , . . . , fd0 ) : On0 → Od0 be an analytic function of the form X F (x) = (ci,1 xi , . . . , ci,d0 xi ), i i where i = (i1 , . . . , in0 ) ranges over multi-indexes non-negative integers and xi = xi11 · · · xnn00 . Suppose (1) |ci,j |p ≤ 1 for any i = (i1 , . . . , im ) and any 1 ≤ j ≤ d0 , ′ (2) L : K d0 → K d0 is a linear embedding such that F (x) = L(fj1 (x), . . . , fjd′ (x)) for some indexes 0 1 ≤ ju ≤ d0 , (3) | det(cii ,ju )1≤i,u≤d′0 |p = |pk0 |p for some multi-indexes i1 , . . . , id′0 whose coordinates add up to a number at most m0 and some indexes j1 , . . . , jd′0 . Then for any l ≫d′0 ,n0 ,m0 ,k0 ,kLkp 1 we have P P l n0 Θ(l) d0 l n0 O , Θ(1) F (p O ) − Θ(1) F (p O ) ⊇ (K-span of F (U )) ∩ p where all the implied constants depend on d0 , n0 , m0 and k0 . SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 47 Corollary 50. Let κ be a number field. Let f1 , . . . , fd0 ∈ κ[x1 , . . . , xn0 ]. Suppose 1, f1 , . . . , fd0 are linearly independent where 1 is the constant polynomial one. Let F := (f1 , . . . , fd0 ). Then for any l ≫F 1 and any p ∈ Vf (κ) we have P P l n0 ΘF (l) d0 l n0 Op , ΘF (1) F (p Op ) ⊇ (κp -span of F (Op )) ∩ p ΘF (1) F (p Op ) − where κp is the completion of κ with respect to the finite place p ∈ Vf (κ), Op is the ring of integers of κp , and p also shows a uniformizing element of Op . Let us recall the needed notation from p-adic analysis. If U is an open subset of K, then ∇k U := {(x1 , . . . , xk ) ∈ U × · · · × U | xi 6= xj if i 6= j}. If f : U → K, then Φk f : ∇k+1 U → K is defined recursively Φk−1 f (x1 , x3 , . . . , xk ) − Φk−1 f (x2 , . . . , xk ) , Φk f (x1 , . . . , xk ) := x1 − x2 and Φ0 f = f . If f is an analytic function, then Φn f can be uniquely extended to a continuous function n i Φ f : U n+1 → K for any n and f (i) (a) = i!Φ f (a, . . . , a). Similarly for open subsets Ui ⊆ K and a (multivariable) function f : U1 × · · · × Um → K we can define the kth order difference quotient Φki f of f with respect to the ith variable. And then for a multi-index i := (i1 , . . . , im ) we set Φi f := Φi11 ◦ Φi22 ◦ · · · ◦ Φimm f. Φi f : ∇i1 +1 U1 × · · · × ∇im +1 Um → K, im +1 If f is analytic, then Φi f can be uniquely extended to a continuous function Φi f : U1i1 +1 × · · · × Um → K, and ∂i f (a1 , . . . , am ) = i!Φi f (θi (a1 , . . . , am )), where i! := i1 !i2 ! · · · im ! and θi (a1 , . . . , am ) := (a1 , . . . , a1 , a2 , . . . , a2 , . . . , am , . . . , am ). | {z } | {z } | {z } i1 +1−times i2 +1−times im +1−times m Let U := U1 × · · · × Um ⊆ K be an open subset, fi : U → K be analytic functions, and F := (f1 , . . . , fd ) : U → K d (in computations, it is considered as a d-by-1 column matrix). Then dF (x) is a d-by-m matrix dF (x) := [∂j fi (x)]. For any 1 ≤ i, j ≤ m, let Φei +ej F (•) be the column vector whose kth entry is Φei +ej fk (•). In the above setting, by Taylor expansion we have (124) F (x0 + x) = F (x0 ) + dF (x0 )x + R2 F (x0 + x, x0 ), P where R2 F (x0 + x, x0 ) is of the form i,j xi xj Φei +ej F (•) (the entries are the entries of either x0 + x or x0 ) and x = (x1 , . . . , xm ). For a d-by-m matrix X = [v1 · · · vm ] with entries in K, let N (X) := max 1≤i1 ≤···≤id ≤m | det[vi1 · · · vid ]|. Let {ei }i be the standard basis of K n ; and for any I := {i1 < i2 <V · · · < im } ⊆ {1, . . . , n}, let eI := m (K n ). For any ei1 ∧ . . . ∧ eim . It is well-known that {eI }I⊆{1,...,n}, |I|=m is a basis of X V xI eI ∈ m (K n ), we let kxk := max{|xI || I ⊆ {1, . . . , n}, |I| = m}. x= I⊆{1,...,n}, |I|=m Lemma 51. (1) If w1 , . . . , wd are the rows of X ∈ Md,m(K), then N (X) = kw1 ∧· · ·∧wd k; in particular N (X) = 0 if rank(X) < d. (2) If X ∈ Md,m (O) and N (X) ≥ |pk0 |, then for any positive integer l and y ∈ pl+k0 Od there is x ∈ pl Om such that Xx = y. (3) For any 1 ≤ i ≤ m and vectors vj we have N [v1 · · · vi (vi+1 − vi ) · · · (vm − vi )] ≤ (d + 1)N [v1 · · · vm ]. 48 ALIREZA SALEHI GOLSEFIDY Proof. The first part is clear. Now suppose that N (X) ≥ |pk0 |; then there are d columns vi1 , . . . , vid such that | det[vi1 · · · vid ]| ≥ |pk0 |. Let XI = [vi1 · · · vid ]. Then XI adj(XI )y = det(XI )y, and so there is x′ ∈ pl Od such that XI x′ = y. Therefore there is x ∈ pl Om such that Xx = y. For the third part, we get an upper-bound for the determinant of a d-by-d submatrix: | det[vi1 · · · vij (vij+1 − v) · · · (vid − v)]| = kvi1 ∧ · · · ∧ vij ∧ (vij+1 − v) ∧ · · · ∧ (vid − v)k = kvi1 ∧ · · · ∧ vid − d X vij+1 ∧ · · · ∧ vik−1 ∧ v ∧ vik+1 ∧ · · · ∧ vid k k=j+1 ≤ (d + 1)N ([v1 · · · vm ]), where v is either 0 or vi .  In what follows, a series of Lemmas are proved in pairs. In the first ones the constants depend on F , and they are geared towards proving Proposition 49. In the second ones, we make the needed modification and make them suitable for proving Proposition 49′ . Lemma 52 (Hensel’s lemma). Let x0 ∈ K m and U ⊆ K m be an open neighborhood of x0 . Let fi : U → K be analytic functions and F = (f1 , . . . , fd ). Suppose there is a positive integer k0 such that (1) (2) (3) (4) x0 + pk0 Om ⊆ U , kdF (x0 )k ≤ 1, for any i, j, if kx′ − θei +ej (x0 )k ≤ |pk0 |, then kΦei +ej F (x′ )k ≤ 1, N (dF (x0 )) ≥ |pk0 |. Then for any l ≥ k0 and any y ∈ Od there is x1 ∈ x0 + pl Om such that kF (x1 ) − F (x0 ) − pl+k0 yk ≤ |p2l |. Proof. By (124) we have that (125) kF (x0 + pl x) − F (x0 ) − pl dF (x0 )xk = k X (pl xi )(pl xj )Φei +ej F (xij )k, i,j where x = (x1 , . . . , xm ), kxk ≤ 1 and kxij − θei +ej (x0 )k ≤ |pl |. Now by Lemma 51 for any y ∈ Od there is x ∈ Om such that dF (x0 )x = pk0 y. And so by (125) kF (x0 + pl x) − F (x0 ) − pl+k0 yk ≤ |p2l |.  Lemma 53 (Quantitative open function theorem). Let x0 ∈ K m and U ⊆ K m be an open neighborhood of x0 . Let fi : U → K be analytic functions and F = (f1 , . . . , fd ). Suppose (1) kdF (x0 )k ≤ 1, (2) k∂ij F (x0 )k ≤ 1, for any i, j, (3) N (dF (x0 )) ≥ |pk0 |, for some positive integer k0 . Then for any large enough integer l (depending on F and U ) we have F (x0 + pl Om ) ⊇ F (x0 ) + pl+k0 Od . Proof. By the continuity of dF and Φei +ej F , for large enough l (in particular l > k0 ), we have that (1) kdF (x)k ≤ 1 if kx − x0 k ≤ |pl |, (2) kΦei +ej F (x′ )k ≤ 1 if kx′ − θei +ej (x0 )k ≤ |pl |, (3) N (dF (x)) ≥ |pk0 | if kx − x0 k ≤ |pl |. SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 49 By induction on i we prove that for any y ∈ Od there are xi ∈ x0 + pl Om and integers li ≥ 2l such that (1) l1 := 2l and li+1 := 2(li − k0 ), (2) kF (xi ) − F (x0 ) − pl+k0 yk ≤ |pli |. Lemma 52 gives us the base of the induction. By induction hypothesis, there is xi ∈ x0 + pl Om such that F (xi ) − F (x0 ) − pl+k0 y ∈ pli Od . Hence by Lemma 52 there is xi+1 ∈ xi + pli −k0 Om ⊆ x0 + pl Om such that kF (xi+1 ) − F (xi ) + (F (xi ) − F (x0 ) − pl+k0 y)k ≤ |p2(li −k0 ) | = |pli+1 |. This proves the induction step. One can easily see that {li } is a strictly increasing integer sequence. So {xi } is a Cauchy sequence. Therefore limi→∞ xi = x ∈ x0 + pl Om by the compactness of x0 + pl Om , and by the continuity of F we have F (x) = F (x0 ) + pl+k0 y.  Lemma 53′ . Let F := (f1 , . . . , fd0 ) : On0 → Od0 , F (x) = such that P i i i (ci,1 x , . . . , ci,d0 x ) be an analytic function (1) |ci,j | ≤ 1 for any i and j, (2) N (dF (0)) ≥ |pk0 | for some positive integer k0 . Then for any l ≫k0 1 we have F (pl O) ⊇ F (0) + pl+k0 Od0 . P Proof. Since F (x) := i (ci,1 xi , . . . , ci,d0 xi ) and |ci,j | ≤ 1, we have kdF (x)k ≤ 1 and kΦei +ej F (x′ )k ≤ 1 for any kxk ≤ 1 and kx′ k ≤ 1. Since |ci,j | ≤ 1 and N (dF (0)) ≥ |pk0 |, we have that N (dF (x)) ≥ |pk0 | for any x ∈ pk0 +1 O. One can finish the argument as in the proof of Lemma 53.  Lemma 54. Let U be a neighborhood of 0 ∈ K, and fi : U → K be analytic functions. Suppose 1, f1 , . . . , fd are linearly independent. Then for large enough m (depending on fi ) and large enough l (depending on fi and m) we have that, for any x1 , . . . , xm ∈ pl O, N ([fi′ (xj )]) ≫ Y |(xi − xj )|, 1≤i<j≤m where the implied constant depends on fi . (j) Proof. Notice that we can rescale, i.e. change fi to gi (x) := fi (pk x), and make sure that |fi (0)| ≤ 1 for any 1 ≤ i ≤ d and any positive integer j. (j) Since fi are analytic and 1, f1 , . . . , fd are linearly independent, for large enough m we have that rank([fi (0)]) = (j) d, where 1 ≤ i ≤ d and 1 ≤ j ≤ m. So N ([fi (0)]) = |pk0 | for some non-negative integer k0 . Hence by the j j continuity of Φ fi , for large enough l, we have that N ([Φ fi (xj )]) ≫ 1 if xj ∈ pl Oj+1 for any 1 ≤ j ≤ m. 50 ALIREZA SALEHI GOLSEFIDY Let F (x) be the column vector [f1 (x) · · · fd (x)]T . Then by the repeated use of the third part of Lemma 51 we have N ([fi′ (xj )]) = N [F ′ (x1 ) · · · F ′ (xm )] ≥ (d + 1)−1 N [F ′ (x1 )(F ′ (x2 ) − F ′ (x1 )) · · · (F ′ (xm ) − F ′ (x1 ))] ! m Y 1 1 −1 |xi − x1 | N [F ′ (x1 )Φ F ′ (x2 , x1 ) · · · Φ F ′ (xm , x1 )] ≥ (d + 1) i=2 ≥ ···  ≥ (d + 1)−m  ≫ Y 1≤i<j≤m Y |xi − xj |.  1 2 |xi − xj | N [F ′ (x1 )Φ F ′ (x2 , x1 )Φ F ′ (x3 , x2 , x1 ) · · · Φ m−1 F ′ (xm , . . . , x1 )] 1≤i<j≤m  Lemma 54′ . Let F := (f1 , . . . , fd0 ) : O → Od0 , F (x) = that P i i i (ci,1 x , . . . , ci,d0 x ) be an analytic function such (1) |ci,j | ≤ 1 for any i and j, (2) | det(cie ,j )| = |pk0 | for some indexes i1 , . . . , id0 ≤ m0 and some positive integer k0 . Then for any l ≫k0 1 we have that, for any x1 , . . . , xm0 ∈ pl O, Y N ([fi′ (xj )]) ≥ |pΘk0 ,d0 ,m0 (1) | |xi − xj |. 1≤i<j≤m0 j ie Proof. Since |ci,j | ≤ 1 and | det(ci,j )| = |pk0 |, we have that N (Φ fi (xj )) ≥ | det(Φ fj (xie ))| = |pk0 | for any xj ∈ pk0 +1 Oj . Now one gets the claim as in the proof of Lemma 54.  Lemma 55. Let U be a neighborhood of 0 ∈ K, and fi : U → K be analytic functions. Suppose 1, f1 , . . . , fd are linearly independent. Let F = (f1 , . . . , fd ). Then for any l ≫F 1 we have P P l ΘF (l) d l O . ΘF (1) F (p O) ⊇ p ΘF (1) F (p O) − Proof. By Lemma 54 for large enough m0 (depending on F ) and large enough l (depending on F and m0 ) we have Y N (dFe (x)) ≫ |xi − xj |, 1≤i<j≤m0 where Fe(x) = F (x1 ) + · · · + F (xm0 ) and x = (x1 , . . . , xm0 ) has norm at most |pl |. Let x0 = (x1 , . . . , xm0 ) be such that |xi | ≤ |pl | for any i and |xi − xj | ≥ |p2l | for any i 6= j. So N (dFe (x0 )) ≫ pΘF,m0 (l) . By rescaling, if (j) needed, we can assume that |fi (0)| ≤ 1 for any 1 ≤ i ≤ d and any positive integer j. And so kdFe (x0 )k ≤ 1 and k∂ij Fe(x0 )k ≤ 1. Therefore by Lemma 53 we have and so P m0 Fe (pl Om0 ) = Fe(x0 + pl Om0 ) ⊇ Fe(x0 ) + pΘm0 ,F (l) Od , F (pl O) − ′ P m0 F (pl O) = Fe(pl Om0 ) − Fe(pl Om0 ) ⊇ pΘm0 ,F (l) Od . d0 Lemma 55 . Let F := (f1 , . . . , fd0 ) : O → O , F (x) = that (1) |ci,j | ≤ 1 for any i and j, P i i (ci,1 x i  , . . . , ci,d0 x ) be an analytic function such SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 51 (2) | det(cie ,j )| = |pk0 | for some indexes i1 , . . . , id0 ≤ m0 and some positive integer k0 . Then for any l ≫k0 ,m0 1 we have P m0 F (pl O) − P m0 Pm0 Proof. As in the proof of Lemma 55, let Fe(x) = l l m0 F (pl O) ⊇ pΘm0 ,d0 ,k0 (l) Od0 . F (xi ). Hence by Lemma 54′ for l ≫k0 1 we have Y |xi − xj |, N (dFe (x)) ≥ |pΘk0 ,d0 ,m0 (1) | for any x ∈ p O . Let x0 ∈ p O there is such x0 . Hence m0 i=1 1≤i<j≤m0 be such that |xi − xj | ≥ |p2l | for any i 6= j. Notice that, since l ≫m0 1, N (dFe (x0 )) ≥ |pΘm0 ,d0 ,k0 (l) |. Let Fx0 (x) := Fe(x + x0 ). Hence Fx0 has a Taylor series expansion and its coefficients have norm at most one. Moreover N (dFx0 (0)) ≥ |pΘm0 ,d0 ,k0 (l) |. Therefore by Lemma 53′ we have Fx0 (pl O) ⊇ Fx0 (0) + pΘm0 ,d0 ,k0 (l) Od0 . One can finish the proof as above.  n0 Lemma 56. Let U ⊆ K be a non-empty open subset. Let fi : U → K be analytic functions such that 1, f1 , . . . , fd are linearly independent. Then there is a polynomial curve r : K → K n0 such that 1, f1 ◦ r, . . . , fd ◦ r are linearly independent, and defined on a neighborhood of 0 ∈ K. Proof. Let x0 be a point in U . After rescaling, if needed, we can assume that |∂i fj (x0 )/i!| ≤ 1 for any i which is not zero. Since 1, f1 , . . . , fd are linearly independent, for large enough m we have that rank[∂i fj (x0 )]1≤kik1 ≤m, 1≤j≤d = d. Thus N ([∂i fj (x0 )/i!]) = |pk0 |, (126) where k0 is a non-negative integer. Now let 2 n0 −1 r(t) := x0 + p(t, ts , ts , . . . , ts ) where s is sufficiently large (to be determined later). By the Taylor expansion of fj we have X (j) Pn 0 k−1 fj (r(t)) = ai pkik1 t k=1 ik s , i where i = (i1 , . . . , in0 ) and (j) ai (127) = ∂i fj /i!. And so  ∞ X  fj (r(t)) = n=0 {i| P X (j) k−1 =n} k ik s  ai pkik1  tn . We make the following two observations: P P (j) (j) kik1 P ≡ {i|kik∞ <s, P ik sk−1 =n} ai pkik1 (mod ps ), (1) {i| k ik sk−1 =n} ai p k P P (2) If kik∞ , ki′ k∞ < s and k ik sk−1 = k i′k sk−1 , then i = i′ . In particular we have {i| P X k−1 =n} k ik s (j) ai pkik1 ( 0 ≡ (j) ai(n) pki(n)k1 if n ≥ sn0 0 ≤ n ≤ sn0 − 1 (mod ps ) 52 ALIREZA SALEHI GOLSEFIDY P where i(n) := (i1 , . . . , in0 ) gives us the s-adic digits of n; that means n = k ik sk−1 . Therefore we have    X   (j) (j) ki(n)k1 (128) N  ai pkik1  ]) (mod ps ).  ≡ N ([ai(n) p {i| P k−1 =n} k ik s 1≤n≤sn0 −1, 1≤j≤d Now suppose s > dm + k0 ; in particular, if kik1 ≤ m, then i = i(n) for some n < sn0 . And so we have (j) N ([ai(n) pki(n)k1 ]) ≥ |pmd+k0 |. (129) Hence by (128), (129) and s > dm + k0 we have   X  (j) N  ai pkik1  {i| which implies that P k−1 =n} k ik s   rank  {i| P  1≤n≤sn0 −1, 1≤j≤d X (j) k−1 =n} k ik s and 1, f1 ◦ r, . . . , fd ◦ r are linearly independent.  ai pkik1   s  6≡ 0 (mod p ), 1≤n≤sn0 −1, 1≤j≤d    = d, Lemma 56′ . Let F := (f1 , . . . , fd0 ) : On0 → Od0 be an analytic function of the form X F (x) = (ci,1 xi , . . . , ci,d0 xi ),  i i where i = (i1 , . . . , in0 ) ranges over multi-indexes non-negative integers and xi = xi11 · · · xnn00 . Suppose (1) |ci,j | ≤ 1 for any i = (i1 , . . . , im ) and any 1 ≤ j ≤ d0 , (2) | det(cii ,j )| = |pk0 | for some multi-indexes i1 , . . . , id0 whose coordinates add up to a number at most m0 and some positive integer k0 . Then there is a polynomial curve r : O → On0 such that | det(c′ie ,j )| ≥ |pΘm0 ,d0 ,k0 (1) | for some indexes P ie ≪m0 ,n0 ,d0 ,k0 1 where fj ◦ r(x) = i c′i,j xi . Proof. A close examination of proof of Lemma 56 yields that (128), (129) imply N ([c′i,j ]1≤i≤(d0 m0 +k0 +1)n0 −1,1≤j≤d ) ≥ |pm0 d0 +k0 |, which gives us the claim.  Corollary 57. Let U ⊆ K m0 be a non-empty open set. Let fj : U → K be analytic functions, and F := (f1 , . . . , fd ). Suppose 1, f1 , . . . , fd are linearly independent. Then for any l ≫F 1 we have P P l l ΘF (l) d O . ΘF (1) F (p O) − ΘF (1) F (p O) ⊇ p Proof. By Lemma 56 there is a polynomial curve r such that 1, f1 ◦ r, . . . , fd ◦ r are linearly independent and defined on a neighborhood of 0 ∈ K. Hence by Lemma 54 we are done.  Corollary 57′ . Let F := (f1 , . . . , fd0 ) : On0 → Od0 be an analytic function of the form X F (x) = (ci,1 xi , . . . , ci,d0 xi ), i where i = (i1 , . . . , in0 ) ranges over multi-indexes non-negative integers. Suppose (1) |ci,j | ≤ 1 for any i = (i1 , . . . , im ) and any 1 ≤ j ≤ d0 , (2) | det(cii ,j )| = |pk0 | for some multi-indexes i1 , . . . , id0 whose coordinates add up to a number at most m0 and some positive integer k0 . SUPER-APPROXIMATION, II: THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. Then for l ≫m0 ,n0 ,d0 ,k0 1 we have P Θ(1) F (pl O) − P Θ(1) 53 F (pl O) ⊇ pΘ(l) Od0 , where all the implied constants depend on m0 , n0 , d0 , k0 . Proof. This is direct corollary of Lemma 55′ and Lemma 56′ .  P Proof of Proposition 49. Suppose {fi1 , . . . , fid } is a basis of i Kfi . So 1, fi1 , . . . , fid are linearly independent. And moreover there is an injective linear map L : K d → K d0 such that F = L ◦ F , where F (x) = (fi1 (x), . . . , fid (x)). By Corollary 57 we have that P P l l ΘF (l) d O . Θ (1) F (p O) − Θ (1) F (p O) ⊇ p F F for any l ≫F 1. Applying L to the both sides and using the linearity of L we have P P l ΘF (l) l L(Od ) ⊇ pΘF (l) Od0 ∩ Im(L). ΘF (1) F (p O) ⊇ p ΘF (1) F (p O) −  Proof of Proposition 49′ . By a similar argument as in the proof of Proposition 49, Corollary 57′ implies the desired result.  Proof of Corollary 50. Let Oκ be the ring of integers of κ. There is a ∈ Oκ such that for any i Suppose f j1 , . . . , f jd′ 0 f i (x) := fi (ax) ∈ Oκ [x1 , . . . , xn0 ]. Pd0 ′ is a basis of i=1 κf i . So there is a linear embedding L : κd0 → κd0 such that (f 1 (x), . . . , f d0 (x)) = L(f j1 , . . . , f jd′ ). 0 So the operator norm of the induced linear embedding Lp : and zero. d′ κ p0 → κdp0 are uniformly bounded from infinity Since f j1 , . . . , f jd′ are linearly independent, there are multi-indexes i1 , . . . , id′0 such that 0 where f j (x) = P 0 6= det(cii ,ju ) ∈ Oκ , i i ci,j x . So | det(cii ,ju )|p = 1 for almost all p ∈ Vf (κ). By the above discussion, one can easily finish the proof using Proposition 49′ .  References [BY91] C. Bernstein, A. Yger, Effective Bézout identities in Q[z1 , . . . , zn ], Acta Math. 166 (1991) 69–120. [BG08-a] J. Bourgain, A. Gamburd, Uniform expansion bounds for Cayley graphs of SL2 (fp ), Annals of Mathematics 167 (2008) 625–642. [BG08-b] J. Bourgain, A. Gamburd, Expansion and random walks in SLd (Z/pn Z):I, Journal of the European Mathematical Society 10 (2008) 987–1011. [BG09] J. Bourgain, A. Gamburd, Expansion and random walks in SLd (Z/pn Z):II. With an appendix by J. Bourgain, Journal of the European Mathematical Society 11, no. 5., (2009) 1057–1103. [BGS10] J. Bourgain, A. Gamburd, P. Sarnak, Affine linear sieve, expanders, and sum-product, Inventiones mathematicae 179, no. 3., (2010) 559–644. [BV12] J. Bourgain, P. Varjú, Expansion in SLd (Z/qZ), q arbitrary, Inventiones mathematicae 188, no 1, (2012) 151–173. [BO14] E. Breuillard, H. Oh (editors), Thin groups and superstrong approximation, MSRI Publ. 61, Cambridge Univ. Press., Cambridge 2014. [BS91] M. Burger and P. Sarnak, Ramanujan duals II, Inventiones mathematicae 106, no. 1, (1991) 1–11. [Cad] A. Cadoret, An open adelic image theorem for abelian schemes, to appear in International Mathematics Research Notices. [CT12] A. Cadoret, A. Tamagawa, A uniform open image theorem for l-adic representations, I, Duke Mathematical Journal 161 (2012) 2605–2634. 54 [CT13] [CFW81] [Din06] [EHK12] [EMO05] [Fal91] [Fer94] [GS04] [Gow08] [Hel05] [Hel11] [HLW06] [How77] [Hui12] [HL] [Ioa14-a] [Ioa14-b] [Kes59] [Kne64] [LS74] [Lub94] [LM13] [LW93] [LZ03] [MW] [Maz00] [Mc95] [NP11] [Nor89] [OW80] [Pin98] [SG05] [SG] [SGS13] [SGV12] [SGZ] [SX91] ALIREZA SALEHI GOLSEFIDY A. Cadoret, A. Tamagawa, A uniform open image theorem for l-adic representations, II, Duke Mathematical Journal 162 (2013) 2301–2344. A. Connes, J. Feldman, B.Weiss, An amenable equivalence relations is generated by a single transformation, Ergodic Theory and Dynamical Systems 1 (1981) 431–450. O. Dinai, Poly-log diameter bounds for some families of finite groups, Proceeding of the American Mathematical Society 134, no 11, (2006) 3137–3142. J. Ellenberg, C. Hall, E. Kowalski, Expander graphs, gonality, and variation of Galois representations, Duke Mathematical Journal 161, no.7, (2012) 1233–1275. A. Eskin, S. Mozes, H. Oh, On uniform exponential growth for linear groups, Inventiones mathematicae 160, no. 1, (2005) 1–30. G. Faltings, Diophantine approximation on abelian varieties, Annals of Mathematics (2) 133 (1991) 549–576. G. Frey, Curves with infinitely many points of fixed degree, Israel J. Math. 85 (1994) 79–85. A. Gamburd, M. Shahshahani, Uniform diameter bounds for some families of Cayley graphs, International Mathematics Research Notices 71 (2004) 3813–3824. W.T. Gowers, Quasirandom Groups, Combinatorics, Probability and Computing 17 (2008) 363–387. H. Helfgott, Growth and generation in SL2 (Z/pZ), Annals of Mathematics 167 (2008) 601–623. H. Helfgott, Growth in SL3 (Z/pZ), Journal of the European Mathematical Society 13, no. 3, (2011) 761–851. S. Hoory, N. Linial, A. Widgerson, Expander graphs and their application, Bull. American Mathematical Society 43, no. 4, (2006) 439–561. R. Howe, Kirillov theory for compact p-adic groups, Pacific Journal of Mathematics 73, no. 2, (1977) 365–381. C.-Y. Hui, Specialization of monodromy and ℓ-independence, C. R. Acad. Sci. Paris, Ser. I 350 (2012) 5–7. C.-Y. Hui, M. Larsen, Adelic openness without the Mumford-Tate conjecture, preprint. Available online: http://arxiv.org/pdf/1312.3812v2.pdf A. Ioana, Orbit equivalence and Borel reducibility rigidity for profinite actions with spectral gap, to appear in Journal of the European Mathematical Society. Available online: http://arxiv.org/pdf/1309.3026v4.pdf A. Ioana, Strong ergodicity, property (T), and orbit equivalence rigidity for translation actions, to appear in J. Reine Angew. Math. Available online: http://arxiv.org/pdf/1406.6628.pdf H. Kesten, Symmetric random walks on groups, Transactions of the American Mathematical Society 92 (1959) 336–354. M. Kneser, Erzeugende und Relationen verallgemeinerter Einheitengruppen, J. Reine Angew. Math. 214-215 (1964) 345–349. V. Landazuri, G. M. Seitz, On the minimal degrees of projective representations of the finite Chevalley groups, Journal of Algebra 32 (1974) 418–443. A. Lubotzky, Discrete Groups, Expanding Graphs and Invariant Measures, Birkhäuser, 1994. A. Lubotzky, C. Meiri, Sieve methods in group theory I: powers in linear groups, Journal of the American Mathematical Society 25, no. 4, (2012) 1119–1148. A. Lubotzky, B. Weiss, Groups and expanders, In Expanding graphs (Princeton, NJ, 1992) DIMACS Series 10, Discrete Mathematics and Theoretical Computer Science 95–109. American Mathematical Society, Providence, RI, 1993. A. Lubotzky, A. Żuk, Property(τ ), preliminary version, 2003. http://www.ma.huji.ac.il/~ alexlub/BOOKS/On%20property/On%20propert D. W. Masser, G. Wüstholz, Fields of large transcendence degree generated by values of elliptic functions, Inventiones mathematicae 72, no. 3 ,(1983) 407–464. B. Mazur, Abelian varieties and the Mordell–Lang conjecture, 199-227; in D. Haskell, A. Pillay, C. Steinhorn (ed.), Model theory, algebra, and geometry, MSRI Publ. 39, Cambridge Univ. Press., Cambridge, 2000. M. McQuillan, Division points on semi-abelian varieties, Inventiones mathematicae 120 (1995) 143–159. N. Nikolov, L. Pyber, Product decompositions of quasirandom groups and a Jordan type theorem, Journal of the European Mathematical Society 13, no. 4, (2011) 1063–1077. M. V. Nori, On subgroups of GLn (fp ), Inventiones mathematicae 88, no. 2, (1987) 257–275. D. Ornstein, B.Weiss, Ergodic theory of amenable groups. I. The Rokhlin lemma., Bulletin of the American Mathematical Society (N.S.) 1 (1980) 161–164. R. Pink, Compact subgroups of linear algebraic groups, Journal of Algebra 206 (1998) 438–504. A. Salehi Golsefidy, Character degrees of p-groups and pro-p groups, Journal of Algebra 286 (2005) 476–491. A. Salehi Golsefidy, Super-approximation, I: p-adic semisimple case, to appear in International Mathematics Research Notices. https://doi.org/10.1093/imrn/rnw208 A. Salehi Golsefidy, P. Sarnak, Affine sieve, Journal of the American Mathematical Society 26, no. 4, (2013) 1085– 1105. A. Salehi Golsefidy, P. Varjú, Expansions in perfect groups, Geometric And Functional Analysis 22, no. 6, (2012) 1832–1891. A. Salehi Golsefidy, X. Zhang, Inducing super-approximation, preprint. P. Sarnak and X. Xue, Bounds for multiplicities of automorphic representations, Duke Mathematical Journal 64, no. 1, (1991) 207–227. SUPER-APPROXIMATION, II: [Sha09] [Tao08] [Tit79] [Var12] [Wei84] THE p-ADIC AND BOUNDED POWER OF SQUARE-FREE INTEGERS CASES. 55 A. Shalev, Word maps, conjugacy classes, and a noncommutative Waring-type theorem, Annals of Mathematics (2) 170, no. 3, (2009) 1383–1416. T. Tao, Product set estimates for non-commutative groups, Combinatorica 28, no. 5, (2008) 547–594. J. Tits, Reductive groups over local fields, Proceedings of symposia in pure mathematics 33 (1979), part 1, 29–69. P. Varjú, Expansion in SLd (OK /I), I square-free, Journal of the European Mathematical Society 14, no. 1, (2012) 273–305. B. Weisfeiler, Strong approximation for Zariski-dense subgroups of semisimple algebraic groups, Annals of Mathematics 120 (1984) 271–315. Mathematics Dept, University of California, San Diego, CA 92093-0112 E-mail address: [email protected]
4math.GR
Model Selection with Nonlinear Embedding for Unsupervised Domain Adaptation Hemanth Venkateswara, Shayok Chakraborty, Troy McDaniel, Sethuraman Panchanathan arXiv:1706.07527v1 [cs.AI] 23 Jun 2017 Center for Cognitive Ubiquitous Computing, Arizona State University, Tempe, AZ, USA {hemanthv, shayok.chakraborty, troy.mcdaniel, panch}@asu.edu Abstract Domain adaptation deals with adapting classifiers trained on data from a source distribution, to work effectively on data from a target distribution. In this paper, we introduce the Nonlinear Embedding Transform (NET) for unsupervised domain adaptation. The NET reduces cross-domain disparity through nonlinear domain alignment. It also embeds the domainaligned data such that similar data points are clustered together. This results in enhanced classification. To determine the parameters in the NET model (and in other unsupervised domain adaptation models), we introduce a validation procedure by sampling source data points that are similar in distribution to the target data. We test the NET and the validation procedure using popular image datasets and compare the classification results across competitive procedures for unsupervised domain adaptation. Introduction There are large volumes of unlabeled data available online, owing to the exponential increase in the number of images and videos uploaded online. It would be easy to obtain labeled data if trained classifiers could predict the labels for unlabeled data. However, classifier models do not perform well when applied to unlabeled data from different distributions, owing to domain-shift (Torralba and Efros 2011). Domain adaptation deals with adapting classifiers trained on data from a source distribution, to work effectively on data from a target distribution (Pan and Yang 2010). Some domain adaptation techniques assume the presence of a few labels for the target data, to assist in training a domain adaptive classifier (Aytar and Zisserman 2011; Duan, Tsang, and Xu 2012; Hoffman et al. 2013). However, real world applications need not support labeled data in the target domain and adaptation here is termed as unsupervised domain adaptation. Many of the unsupervised domain adaptation techniques can be organized into linear and nonlinear procedures, based on how the data is handled by the domain adaptation model. A linear domain adaptation model performs linear transformations on the data to align the source and target domains or, it trains an adaptive linear classifier for both the domains; for example a linear SVM Copyright c 2017, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. Figure 1: (Best viewed in color) Two-moon binary classification problem with source data in blue and target data in red. We assume the target labels are unknown. (a) Original data, (b) KPCA aligns the data along nonlinear directions of maximum variance, (c) MMD aligns the two domains, (d) MMD+Similarity-based Embedding aligns the domains and clusters the data to ensure easy classification. (Bruzzone and Marconcini 2010). Nonlinear techniques are deployed in situations where the source and target domains cannot be aligned using linear transformations. These techniques apply nonlinear transformations on the source and target data in order to align them. For example, Maximum Mean Discrepancy (MMD) is applied to learn nonlinear representations, where the difference between the source and target distributions is minimized (Pan et al. 2011). Even though nonlinear transformations may align the domains, the resulting data may not be conducive to classification. If, after domain alignment, the data were to be clustered based on similarity, it can lead to effective classification. We demonstrate this intuition through a binary classification problem using a toy dataset. Figure (1a), displays the source and target domains of a two-moon dataset. Figure (1b), depicts the transformed data after KPCA (nonlinear projection). In trying to project the data onto a common ‘subspace’, the source data gets dispersed. Figure (1c), presents the data after domain alignment using Maximum Mean Discrepancy (MMD). Although the domains are now aligned, it does not necessarily ensure enhanced classification. Figure (1d), shows the data after MMD and similarity-based em- bedding, where data is clustered based on class label similarity. Cross-domain alignment along with similarity-based embedding, makes the data classification friendly. In this work, we the present the Nonlinear Embedding Transform (NET) procedure for unsupervised domain adaptation. The NET performs a nonlinear transformation to align the source and target domains and also cluster the data based on label-similarity. The NET algorithm is a spectral (eigen) technique that requires certain parameters (like number of eigen bases, etc.) to be pre-determined. These parameters are often given random values which need not be optimal (Pan et al. 2011; Long et al. 2013; Long et al. 2014). In this work, we also outline a validation procedure to finetune model parameters with a validation set created from the source data. In the following, we outline the two main contributions in our work: • Nonlinear embedding transform (NET) algorithm for unsupervised domain adaptation. • Validation procedure to estimate optimal parameters for an unsupervised domain adaptation algorithm. We evaluate the validation procedure and the NET algorithm using 7 popular domain adaptation image datasets, including object, face, facial expression and digit recognition datasets. We conduct 50 different domain adaptation experiments to compare the proposed techniques with existing competitive procedures for unsupervised domain adaptation. Related Work For the purpose of this paper, we discuss the relevant literature under the categories linear domain adaptation methods and nonlinear domain adaptation methods. A detailed survey on transfer learning procedures can be found in (Pan and Yang 2010). A survey of domain adaptation techniques for vision data is provided by (Patel et al. 2015). The Domain Adaptive SVM (DASVM) (Bruzzone and Marconcini 2010), is an unsupervised method that iteratively adapts a linear SVM from the source to the target. In recent years, the popular unsupervised linear domain adaptation procedures are Subspace Alignment (SA) (Fernando et al. 2013), and the Correlation Alignment (CA) (Sun, Feng, and Saenko 2015). The SA algorithm determines a linear transformation to project the source and target to a common subspace, where the domain disparity is minimized. The CA is an interesting technique which argues that aligning the correlation matrices of the source and target data is sufficient to reduce domain disparity. Both the SA and CA are linear procedures, whereas the NET is a nonlinear method. Although deep learning procedures are inherently highly nonlinear, we limit the scope of our work to nonlinear transformation of data that usually involves a positive semidefinite kernel function. Such procedures are closely related to the NET. However, in our experiments, we do study the NET with deep features also. The Geodesic Flow Kernel (GFK) (Gong et al. 2012), is a popular domain adaptation method, where the subspace spanning the source data is gradually transformed into the target subspace along a path on the Grassmann manifold of subspaces. Spectral procedures like the Transfer Component Analysis (TCA) (Pan et al. 2011), the Joint Distribution Alignment (JDA) (Long et al. 2013) and Transfer Joint Matching (TJM) (Long et al. 2014), are the most closely related techniques to the NET. All of these procedures involve a solution to a generalized eigen-value problem in order to determine a projection matrix to nonlinearly align the source and target data. In these spectral methods, domain alignment is implemented using variants of MMD, which was first introduced in the TCA procedure. JDA introduces joint distribution alignment which is an improvement over TCA that only incorporates marginal distribution alignment. The TJM performs domain alignment along with instance selection by sampling only relevant source data points. In addition to domain alignment with MMD, the NET algorithm implements similarity-based embedding for enhanced classification. We also introduce a validation procedure to estimate the model parameters for unsupervised domain adaptation approaches. Domain Adaptation With Nonlinear Embedding In this section, we first outline the NET algorithm for unsupervised domain adaptation. We then describe a crossvalidation procedure that is used to estimate the model parameters for the NET algorithm. We begin with the problem definition where we consider two domains; source domain S and target domain T . Let s ⊂ S be a subset of the source doDs = {(xsi , yis )}ni=1 t ⊂ T be the subset of the main and Dt = {(xti , yit )}ni=1 s target domain. Let XS = [x1 , . . . , xsns ] ∈ Rd×ns and XT = [xt1 , . . . , xtnt ] ∈ Rd×nt be the source and target data points respectively. Let YS = [y1s , . . . , yns s ] and YT = [y1t , . . . , ynt t ] be the source and target labels respectively. Here, xsi and xti ∈ Rd are data points and yis and yit ∈ {1, . . . , C} are the associated labels. We define X := [x1 , . . . , xn ] = [XS , XT ], where n = ns +nt . The problem of domain adaptation deals with the situation where the joint distributions for the source and target domains are different, i.e. PS (X, Y ) 6= PT (X, Y ), where X and Y denote random variables for data points and labels respectively. In the case of unsupervised domain adaptation, the labels YT are unknown. The goal of unsupervised domain adaptation is to estimate the labels of the target data ŶT = [ŷ1t , . . . , ŷnt t ] corresponding to XT using Ds and XT . Nonlinear Domain Alignment A common procedure to align two datasets is to first project them to a common subspace. Kernel-PCA (KPCA) estimates a nonlinear basis for such a projection. In this case, data is internally mapped to a high-dimensional (possibly infinite-dimensional) space defined by Φ(X) = [φ(x1 ), . . . , φ(xn )]. φ : Rd → H is the mapping function and H is a RKHS (Reproducing Kernel Hilbert Space). The dot product between the mapped vectors φ(x) and φ(y), is estimated by a positive semi-definite (psd) kernel, k(x, y) = φ(x)⊤ φ(y). The dot product captures the similarity between x and y. The kernel similarity (gram) matrix consisting of similarities between all the data points in X, is given by, K = Φ(X)⊤ Φ(X) ∈ Rn×n . The matrix K is used to deter- The (n × n) adjacency matrix W, captures the similarity relationships between datapoints, where, mine the projection matrix A, by solving, max tr(A⊤ KHK⊤ A). A⊤ A=I (1) Wij := 1 1 n Here, H is the n × n centering matrix given by H = I − , where I is an identity matrix and 1 is a n × n matrix of 1s. A ∈ Rn×k , is the matrix of coefficients and the nonlinear projected data is given by Z = [z1 , . . . , zn ] = A⊤ K ∈ Rk×n . Along with projecting the source and target data to a common subspace, the domain-disparity between the two datasets must also be reduced. We employ the Maximum Mean Discrepancy (MMD) (Gretton et al. 2009), which is a standard nonparametric measure to estimate domain disparity. We adopt the Joint Distribution Adaptation (JDA) (Long et al. 2013), algorithm which seeks to align both the the marginal and conditional probability distributions of the projected data. The marginal distributions are aligned by estimating the coefficient matrix A, which minimizes: min A ns 1 1 X ⊤ A ki − ns i=1 nt n X 2 A⊤ kj j=ns +1 = tr(A⊤ KM0 K⊤ A). H (2) M0 , is the MMD matrix which given by, (M0 )ij  1   ns ns , xi , xj ∈ Ds = nt1nt , xi , xj ∈ Dt   −1 , otherwise, ns nt (3) (Mc )ij (4) Here, Ds and Dt are the sets of source and target data points (c) respectively. Ds is the subset of source data points with (c) (c) (c) class label c and ns = |Ds |. Similarly, Dt is the subset (c) (c) of target data points with class label c and nt = |Dt |. Since the target labels being unknown, we use predicted tar(c) get labels to determine Dt . We initialize the target labels using a classifier trained on the source data and refine the labels over iterations. Combining both the marginal and conditional distribution terms leads us to the JDA model, which is given by, min A C X tr(A⊤ KMc K⊤ A). 1 yis = yjs or i = j s 0 yi 6= yjs or labels unknown. (6) To ensure that the projected data is clustered based on data similarity, we minimize the sum of squared distances between data points weighted by the adjacency matrix. This can be expressed as a minimization problem, min Z 1 X zi zj √ −p 2 ij di dj 2 Wij = min tr(A⊤ KLK⊤ A). A (7) P P Here, di = k Wik and dj = k Wjk . They form √ the diagonal entries of D, the (n×n) diagonal matrix. ||z / di − i p zj / dj ||2 , is the squared normalized distance between the projected data points zi and zj , which get clustered together when Wij = 1, (as they belong to the same category). The normalized distance is a more robust clustering measure as compared to the standard Euclidean distance ||zi − zj ||2 , (Chung 1997). Substituting Z = A⊤ K, yields the trace term, where L, denotes the symmetric positive semi-definite graph laplacian matrix with L := I − D−1/2 WD−1/2 , and I is an identity matrix. Optimization Problem Likewise, the conditional distribution difference can also be minimized by introducing matrices Mc , with c = 1, . . . , C, defined as,  (c) 1  xi , xj ∈ Ds (c) (c) ,   ns ns   (c) 1    n(c) n(c) , xi , xj ∈ Dt t t ( (c) (c) = xi ∈ Ds , xj ∈ Dt  −1  ,  (c) (c)   ns(c) nt(c) xj ∈ Ds , xi ∈ Dt    0, otherwise. ( (5) c=0 To arrive at the optimization problem, we consider the nonlinear projection in Equation (1), the joint distribution alignment in Equation (5) and the similarity based embedding in Equation (7). Maximizing Equation (1) and minimizing Equations (5) and (7) can also be achieved by maintaining Equation (1) constant and minimizing Equations (5) and (7). Minimizing the similarity embedding in Equation (7) can result in the projected vectors being embedded in a low dimensional subspace. In order to maintain the subspace dimensionality, we introduce a new constraint in place of Equation (1). The optimization problem for NET is obtained by minimizing Equations (5) and (7). The goal is to estimate the (n × k) projection matrix, A. Along with regularization and the dimensionality constraint, we get, min α.tr(A⊤ K A⊤ KDK⊤ A=I Mc K⊤ A) c=0 + β.tr(A⊤ KLK⊤ A) + γ||A||2F . (8) The first term controls the domain alignment and is weighted by α. The second term ensures similarity based embedding and is weighted by β. The third term is the regularization (Frobenius norm) that ensures a smooth projection matrix A and it is weighted by γ. The constraint on A (in place of A⊤ KHK⊤ A = I), prevents the projection from collapsing onto a subspace with dimensionality less than k, (Belkin and Niyogi 2003). We solve Equation (8) by forming the Lagrangian, Similarity Based Embedding In addition to domain alignment, the NET algorithm ensures that the projected data Z, is classification friendly (easily classifiable). To this end we introduce laplacian eigenmaps in order to cluster datapoints based on class label similarity. C X L(A, Λ) =α.tr A⊤ K C X c=0  Mc K⊤ A + β.tr(A⊤ KLK⊤ A) + γ||A||2F + tr((I − A⊤ KDK⊤ A)Λ), (9) Algorithm 1 Nonlinear Embedding Transform target data. The model is tested on the validation set to estimate parameters yielding highest classification accuracies. Require: X, YS , constants α, β, regularization γ and projection dimension k. Ensure: Projection matrix A, projected data Z. 1: Compute kernel matrix K, for predefined kernel k(., .) 2: Define the adjacency matrix W (Eq. (6)) P 3: Compute D = diag(d1 , . . . , dn ), where di = j Wij 4: Compute normalized graph laplacian L = I − D−1/2 WD−1/2 5: Solve Eq (10) and select k smallest eigen-vectors as columns of A 6: Estimate Z ← A⊤ K 7: Train a classifier with modified data {[z1 , . . . , zns ], YS } Experiments In this section, we evaluate the NET algorithm and the model selection proposition across multiple image classification datasets and several existing procedures for unsupervised domain adaptation. Datasets where the Lagrangian constants are represented by the diagonal matrix Λ = diag(λ1 , . . . , λk ). Setting the derivative ∂L ∂A = 0, yields the generalized eigen-value problem,  αK C X c=0  Mc K⊤ + βKLK⊤ + γI A = KDK⊤ AΛ. (10) The solution A in (8) are the k-smallest eigen-vectors of Equation (10). The projected data points are then given by Z = A⊤ K. The NET algorithm is outlined in Algorithm 1. Model Selection In unsupervised domain adaptation the target labels are treated as unknown. Current domain adaptation methods that need to validate the optimum parameters for their models, inherently assume the availability of target labels (Long et al. 2013), (Long et al. 2014). However, in the case of real world applications, when target labels are not available, it is difficult to verify if the model parameters are optimal. In the case of the NET model, we have 4 parameters (α, β, γ, k), that we want to predetermine. We introduce a technique using Kernel Mean Matching (KMM) to sample the source data to create a validation set. KMM has been used to weight source data points in order to reduce the distribution difference between the source and target data (Fernando et al. 2013), (Gong, Grauman, and Sha 2013). Source data points with large weights have a similar marginal distribution to the target data. These data points are chosen to form the validation set. The KMM estimates the weights wi , i = 1, . . . , ns , P s P t 2 t by minimizing n1s ni=1 wi φ(xsi ) − n1t n j=1 φ(xj ) H . In P nt order to simplify, we define κi := nnst j=1 k(xsi , xtj ), s s i = 1, . . . , ns and KSij = k(xi , xj ). The minimization is then represented as a quadratic programming problem, 1 min = w⊤ KS w − κ⊤ w, w 2 ns X s.t. wi ∈ [0, B], wi − ns ≤ ns ǫ. (11) i=1 The first constraint limits the scope of discrepancy between source and target distributions, with B → 1, leading to an unweighted solution. The second constraint ensures the measure w(x)PS (x), is a probability distribution (Gretton et al. 2009). In our experiments, we select 10% of the source data with the largest weights to create the validation set. We fine tune the values of (α, β, γ, k), using the validation set. For fixed values of (α, β, γ, k), the NET model is trained using the source data (without the validation set) and We conduct our experiments across 7 different datasets. Their characteristics are outlined in Table (1). MNIST-USPS datasets: These are popular handwritten digit recognition datasets. Here, the digit images are subsampled to 16 × 16 pixels. Based on (Long et al. 2014), we consider two domains MNIST (2,000 images from MNIST) and USPS (1,800 images from USPS). CKPlus-MMI datasets: The CKPlus (Lucey et al. 2010), and MMI (Pantic et al. 2005) are popular Facial Expression recognition datasets. They contain videos of facial expressions. We choose 6 categories of facial expression, viz., anger, disgust, fear, happy, sad, surprise. We create two domains, CKPlus and MMI, by selecting video frames with the most intense expressions. We use a pretrained deep convolutional neural network (CNN), to extract features from these images. In our experiments, we use the VGG-F model (Chatfield et al. 2014), trained on the popular ImageNet object recognition dataset. The VGG-F network is similar in architecture to the popular AlexNet (Krizhevsky, Sutskever, and Hinton 2012). We extract the 4096-dimensional features that are fed into the fully-connected f c8 layer. We apply PCA on the combined source and target data to reduce the dimension to 500 and use these features across all the experiments. COIL20 dataset: It is an object recognition dataset consisting of 20 categories with two domains, COIL1 and COIL2. The domains consist of images of objects captured from views that are 5 degrees apart. The images are 32 × 32 pixels with gray scale values (Long et al. 2013). PIE dataset: The “Pose, Illumination and Expression” (PIE) dataset consists of face images ( 32 × 32 pixels) of 68 individuals. The images were captured with different head-pose, illumination and expression. Similar to (Long et al. 2013), we select 5 subsets with differing head-pose to create 5 domains, namely, P05 (C05, left pose), P07 (C07, upward pose), P09 (C09, downward pose), P27 (C27, frontal pose) and P29 (C29, right pose). Office-Caltech dataset: This is currently the most popular benchmark dataset for object recognition in the domain adaptation computer vision community. The dataset consists of images of everyday objects. It consists of 4 domains; Amazon, Dslr and Webcam from the Office dataset and Caltech domain from the Caltech-256 dataset. The Amazon domain has images downloaded from the www.amazon.com website. The Dslr and Webcam domains have images captured using a DSLR camera and a webcam respectively. The Caltech domain is a subset of the Caltech-256 dataset that was created by selecting categories common with the Office dataset. The Office-Caltech dataset has 10 categories of objects and a total of 2533 images (data points). We experiment with two kinds of features for the Office-Caltech dataset; (i) 800-dimensional SURF features (Gong et al. 2012), (ii) Deep features. The deep features are extracted using a pre-trained network similar to the CKPlusMMI datasets. Table 1: Statistics for the benchmark datasets Dataset Type #Samples #Features #Classes Subsets MNIST USPS CKPlus MMI COIL20 PIE Ofc-Cal SURF Ofc-Cal Deep Digit Digit Face Exp. Face Exp. Object Face Object Object 2,000 1,800 1,496 1,565 1,440 11,554 2,533 2,505 256 256 4096 4096 1,024 1,024 800 4096 10 10 6 6 20 68 10 10 MNIST USPS CKPlus MMI COIL1, COIL2 P05, ..., P29 A, C, W, D A, C, W, D Existing Baselines We compare the NET algorithm with the following baseline and state-of-the-art methods. Like NET, the TCA, TJM Table 2: Baseline methods that are compared with the NET. Method SA CA GFK TCA TJM JDA Reference Subspace Alignment (Fernando et al. 2013) Correlation Alignment (Sun, Feng, and Saenko 2015) Geodesic Flow Kernel (Gong et al. 2012) Transfer Component Analysis (Pan et al. 2011) Transfer Joint Matching (Long et al. 2014) Joint Distribution Adaptation (Long et al. 2013) and JDA are all spectral methods. While all the four algorithms use MMD to align the source and target datasets, the NET, in addition, uses nonlinear embedding for classification enhancement. TCA, TJM and JDA, solve for A in a setting similar to Equation (10). However, unlike NET, they do not have the similarity based embedding term and α = 1, is fixed in all the three algorithms. Therefore, these models have only 2 free parameters (γ and k), that need to be pre-determined in contrast to NET, which has 4 parameters, (α, β, γ, k). Since TCA, TJM and JDA, are all quite similar to each other, for the sake of brevity, we evaluate model selection (estimating optimal model parameters) using only JDA and NET. The SA, CA and GFK algorithms, do not have any critical free model parameters that need to be predetermined. In our experiments, NETv is a special case of the NET, where model parameters (α, β, γ, k), have been determined using a validation set derived from Equation (11). Similarly, JDAv is a special case of JDA, where (γ, k), have been determined using a validation set derived from Equation (11). In order to ascertain the optimal nature of the parameters determined with a source-based validation set, we estimate the best model parameters using the target data (with labels) as a validation set. These results are represented by NET in the figures and tables. The results for the rest of the algorithms Table 3: Recognition accuracies (%) for domain adaptation experiments on the digit and face datasets. {MNIST(M), USPS(U), CKPlus(CK), MMI(MM), COIL1(C1) and COIL2(C2). M→U implies M is source domain and U is target domain. The best and second best results in every experiment (row) are in bold and italic respectively. The shaded columns indicate accuracies obtained with model selection. Expt. M→U U→M C1→C2 C2→C1 CK→MM MM→CK P05→P07 P05→P09 P05→P27 P05→P29 P07→P05 P07→P09 P07→P27 P07→P29 P09→P05 P09→P07 P09→P27 P09→P29 P27→P05 P27→P07 P27→P09 P27→P29 P29→P05 P29→P07 P29→P09 P29→P27 Average SA 67.39 51.85 85.97 84.17 31.12 39.75 26.64 27.39 30.28 19.24 25.42 47.24 53.47 26.84 23.26 41.87 44.97 28.13 35.62 63.66 72.24 36.03 23.05 26.03 27.76 30.31 41.14 CA 59.33 50.80 84.72 82.78 31.89 37.74 40.33 41.97 55.36 29.04 41.51 53.43 63.77 35.72 35.47 47.08 53.71 34.68 51.17 66.05 73.96 40.50 26.89 31.74 31.92 34.70 47.55 GFK 66.06 47.40 85.00 84.72 28.75 37.94 26.21 27.27 31.15 17.59 25.27 47.37 54.22 27.02 21.88 43.09 46.38 26.84 34.27 62.92 73.35 37.38 20.35 24.62 28.49 31.27 40.65 TCA 60.17 39.85 90.14 88.33 32.72 31.33 40.76 41.79 59.60 29.29 41.78 51.47 64.73 33.70 34.69 47.70 56.23 33.09 55.61 67.83 75.86 40.26 27.01 29.90 29.90 33.67 47.59 TJM 64.94 52.80 91.67 89.86 30.35 40.62 10.80 7.29 15.14 4.72 16.63 21.69 26.04 10.36 14.98 27.26 27.55 8.15 25.96 28.73 38.36 7.97 9.54 8.41 6.68 10.06 26.79 JDA 67.28 59.65 92.64 93.75 29.78 28.39 58.81 54.23 84.50 49.75 57.62 62.93 75.82 39.89 50.96 57.95 68.45 39.95 80.58 82.63 87.25 54.66 46.46 42.05 53.31 57.01 60.63 JDAv 71.94 59.65 95.28 93.89 25.82 26.79 77.53 66.42 90.78 52.70 74.70 79.66 81.14 63.73 77.16 78.39 84.92 65.93 92.83 90.18 90.14 72.18 60.20 71.39 74.02 76.66 72.85 NET 75.39 62.60 93.89 92.64 29.97 45.83 77.84 70.96 91.86 52.08 74.55 77.08 83.84 69.24 73.98 79.01 83.48 70.04 93.07 89.99 89.71 76.84 67.32 70.23 74.63 75.43 74.67 NETv 72.72 61.35 90.42 88.61 30.54 40.08 69.00 57.41 84.68 45.40 57.92 54.60 86.09 47.30 68.67 67.34 87.47 67.65 92.44 93.68 90.20 79.53 52.67 57.52 62.81 80.98 68.73 (SA, CA, GFK, TCA, TJM and JDA), are obtained with the parameter settings described in their respective works. Experimental Details For fair comparison with existing methods, we follow the same experimental protocol as in (Gong et al. 2012; Long et al. 2014). We conduct 50 different domain adaptation experiments with the previously mentioned datasets. Each of these is an unsupervised domain adaptation experiment with one source domain (data points and labels) and one target domain (data points only). When estimating Mc , we choose 10 iterations to converge to the predicted test/validation labels. Wherever necessary, we use a Gaussian kernel for k(., .), with a standard width equal to the median of the squared distances over the dataset. We train a 1Nearest Neighbor (NN) classifier using the projected source data and test on the projected target data for all the experiments. We choose a NN classifier as in (Gong et al. 2012; Long et al. 2014), since it does not require tuning of crossvalidation parameters. The accuracies reflect the percentage of correctly classified target data points. Parameter Estimation Study Here we evaluate our model selection procedure. The NET algorithm has 4 parameters (α, β, γ, k), and the JDA has 2 parameters (γ, k), that need to be pre-determined. To determine these parameters, we weight the source data points using Equation (11) and select 10% of the source data points with the largest weights. These source data points have a distribution similar to the target and they are Table 4: Recognition accuracies (%) for domain adaptation experiments on the Office-Caltech dataset with SURF and Deep features. {Amazon(A), Webcam(W), Dslr(D), Caltech(C)}. A→W implies A is source and W is target. The best and second best results in every experiment (row) are in bold and italic respectively. The shaded columns indicate accuracies obtained with model selection. Expt. C→A D→A W→A A→C D→C W→C A→D C→D W→D A→W C→W D→W Average SA 43.11 29.65 32.36 38.56 31.88 29.92 37.58 43.95 90.45 37.29 36.27 87.80 44.90 CA 36.33 28.39 31.42 33.84 29.56 28.76 36.94 38.22 85.35 31.19 29.49 83.39 41.07 (a) # bases k GFK 45.72 26.10 27.77 39.27 30.45 28.41 34.40 43.31 82.17 41.70 35.59 79.66 42.88 SURF Features TCA TJM JDA 44.47 46.76 44.78 31.63 32.78 33.09 29.44 29.96 32.78 39.89 39.45 39.36 30.99 31.43 31.52 32.15 30.19 31.17 33.76 45.22 39.49 36.94 44.59 45.22 85.35 89.17 89.17 33.90 42.03 37.97 32.88 38.98 41.69 85.42 85.42 89.49 43.07 46.33 46.31 JDAv 45.41 29.85 29.33 39.27 31.08 31.43 31.85 40.13 88.53 38.98 37.97 86.78 44.22 NET 46.45 39.67 41.65 43.54 35.71 35.89 40.76 45.86 89.81 44.41 44.41 87.80 49.66 NETv 46.24 35.60 39.46 43.10 34.11 32.77 36.31 36.31 91.72 35.25 33.56 90.51 46.24 (b) MMD weight α SA 88.82 84.33 84.01 80.55 76.26 78.90 82.17 80.89 100.00 82.37 77.29 98.98 84.55 CA 91.12 86.63 82.76 82.47 75.98 74.98 87.90 82.80 100.00 80.34 79.32 99.32 85.30 GFK 90.60 88.40 88.61 81.01 78.63 76.80 82.80 77.07 100.00 84.41 78.64 98.31 85.44 Deep Features TCA TJM JDA 89.13 91.01 90.07 88.19 88.72 91.22 86.21 88.09 91.43 75.53 78.08 83.01 74.43 76.07 80.09 76.71 79.18 82.74 82.17 87.26 89.81 75.80 82.80 89.17 100.00 100.00 100.00 76.61 87.12 87.12 78.31 88.48 85.76 97.97 98.31 98.98 83.42 87.09 89.12 (c) Embed weight β JDAv 89.34 90.18 87.04 78.27 78.17 78.90 77.07 80.25 100.00 79.32 77.97 98.98 84.63 NET 92.48 91.54 92.58 83.01 82.10 82.56 91.08 92.36 99.36 90.85 90.85 99.66 90.70 NETv 90.70 91.43 91.95 82.28 83.38 82.28 80.89 90.45 100.00 87.46 84.07 99.66 88.71 (d) Regularization γ Figure 2: NET Validation Study. Each figure depicts the accuracies over the source-based validation set. When studying a parameter (say k), the remaining parameters (α, β, γ) are fixed at the optimum value. The legend is, Digit (Di), Coil (Cl), MMI&CK+ Face (Fc), PIE (Pi), Office-Caltech SURF (O-S) and Office-Caltech Deep (O-D). used as a validation set to determine the optimal values for the model parameters (α, β, γ, k). The parameter space consists of k ∈ {10, 20, . . . , 100, 200} and α, β, γ from the set {0, 0.0001, 0.0005, 0.001, 0.005, 0.01, 0.05, 0.1, 0.5, 1, 5, 10}. For the sake of brevity, we present one set of parameters for every dataset, although in practice, a unique set of parameters can be evaluated for every domain adaptation experiment. Given a set of model parameters, we conduct the domain adaptation experiment using the entire source data (data and labels) and the target data (data only). The accuracies obtained are represented as shaded columns JDAv and NETv in Tables (3) and (4). In order to evaluate the validity of our proposed model selection method, we also determine the parameters using the target data as a validation set. These results are represented by the NET column in Tables (3) and (4). Since the NET column values have been determined using the target data, they can be considered as the best accuracies for the NET model. The rest of the column values SA, CA, GFK, TCA, TJM and JDA, were estimated with model parameters suggested in their respective papers. The recognition accuracies for NETv is greater than that of the other domain adaptation methods and is nearly comparable to the NET. In Table (3), the JDAv has better performance than the JDA. This goes to show that a proper validation procedure does help select the best set of model parameters. It demonstrates that the proposed model selection procedure is a valid technique for evaluating an unsupervised domain adaptation algorithm in the absence of target data labels. Figures (2) and (3), depict the variation of average validation set accuracies over the model parameters. Based on these curves, the optimal parameters are chosen for each of the datasets. NET Algorithm Evaluation The NET algorithm has been compared to existing unsupervised domain adaptation procedures across multiple datasets. The results of the NET algorithm are depicted under the NET column in Tables (3) and (4). The parameters used to obtain these results are depicted in Table (5). The accuracies obtained with the NET algorithm are consistently better than any of the other spectral methods (TCA, TJM and JDA). NET also consistently performs better compared to non-spectral methods like SA, CA and GFK. Discussion and Conclusions The average accuracies obtained with JDA and NET using the validation set are comparable to the best accuracies with JDA and NET. This empirically validates the model selection proposition. However, there is no theoretical guarantee that the parameters selected are the best. In the absence of (a) # bases k (b) Regularization γ Figure 3: JDA Validation Study. Each figure depicts the accuracies over the source-based validation set. When studying a parameter (say k), the remaining parameter γ is fixed at the optimum value. The legend is, Digit (Di), Coil (Cl), MMI&CK+ Face (Fc), PIE (Pi), Office-Caltech SURF (OS) and Office-Caltech Deep (O-D). Table 5: Parameters used for the NET model. Dataset α β γ k MNIST & USPS MMI & CK+ COIL PIE Ofc-SURF Ofc-Deep 1.0 0.01 1.0 10.0 1.0 1.0 0.01 0.01 1.0 0.001 1.0 1.0 1.0 1.0 1.0 0.005 1.0 1.0 20 20 60 200 20 20 theoretical validation, further empirical analysis is advised when using the proposed technique for model selection. In this paper, we have proposed the Nonlinear Embedding Transform algorithm and a model selection procedure for unsupervised domain adaptation. The NET performs favorably compared to competitive visual domain adaptation methods across multiple datasets. This material is based upon work supported by the National Science Foundation (NSF) under Grant No:1116360. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the NSF. References [Aytar and Zisserman 2011] Aytar, Y., and Zisserman, A. 2011. Tabula rasa: Model transfer for object category detection. In Intl. Conference on Computer Vision. [Belkin and Niyogi 2003] Belkin, M., and Niyogi, P. 2003. Laplacian eigenmaps for dimensionality reduction and data representation. Neural computation 15(6):1373–1396. [Bruzzone and Marconcini 2010] Bruzzone, L., and Marconcini, M. 2010. Domain adaptation problems: A dasvm classification technique and a circular validation strategy. Pattern Analysis and Machine Intelligence, IEEE Trans. on 32(5):770–787. [Chatfield et al. 2014] Chatfield, K.; Simonyan, K.; Vedaldi, A.; and Zisserman, A. 2014. Return of the devil in the details: Delving deep into convolutional nets. In British Machine Vision Conference. [Chung 1997] Chung, F. R. 1997. Spectral graph theory, volume 92. American Mathematical Soc. [Duan, Tsang, and Xu 2012] Duan, L.; Tsang, I. W.; and Xu, D. 2012. Domain transfer multiple kernel learning. Pattern Analysis and Machine Intelligence, IEEE Trans. on 34(3):465–479. [Fernando et al. 2013] Fernando, B.; Habrard, A.; Sebban, M.; and Tuytelaars, T. 2013. Unsupervised visual domain adaptation using subspace alignment. In IEEE Conference on Computer Vision and Pattern Recognition, 2960–2967. [Gong et al. 2012] Gong, B.; Shi, Y.; Sha, F.; and Grauman, K. 2012. Geodesic flow kernel for unsupervised domain adaptation. In IEEE Conference on Computer Vision and Pattern Recognition. [Gong, Grauman, and Sha 2013] Gong, B.; Grauman, K.; and Sha, F. 2013. Connecting the dots with landmarks: Discriminatively learning domain-invariant features for unsupervised domain adaptation. In Intl. Conference on Machine learning, 222–230. [Gretton et al. 2009] Gretton, A.; Smola, A.; Huang, J.; Schmittfull, M.; Borgwardt, K.; and Schölkopf, B. 2009. Covariate shift by kernel mean matching. Dataset shift in machine learning 3(4):5. [Hoffman et al. 2013] Hoffman, J.; Rodner, E.; Donahue, J.; Saenko, K.; and Darrell, T. 2013. Efficient learning of domain-invariant image representations. In Intl. Conference on Learning Representations. [Krizhevsky, Sutskever, and Hinton 2012] Krizhevsky, A.; Sutskever, I.; and Hinton, G. E. 2012. Imagenet classification with deep convolutional neural networks. In Neural Information Processing Systems, 1097–1105. [Long et al. 2013] Long, M.; Wang, J.; Ding, G.; Sun, J.; and Yu, P. S. 2013. Transfer feature learning with joint distribution adaptation. In Intl. Conference on Machine Learning, 2200–2207. [Long et al. 2014] Long, M.; Wang, J.; Ding, G.; Sun, J.; and Yu, P. 2014. Transfer joint matching for unsupervised domain adaptation. In IEEE Conference on Computer Vision and Pattern Recognition, 1410–1417. [Lucey et al. 2010] Lucey, P.; Cohn, J. F.; Kanade, T.; Saragih, J.; Ambadar, Z.; and Matthews, I. 2010. The extended cohn-kanade dataset (ck+): A complete dataset for action unit and emotion-specified expression. In IEEE Conference on Computer Vision and Pattern Recognition, 94– 101. [Pan and Yang 2010] Pan, S. J., and Yang, Q. 2010. A survey on transfer learning. Knowledge and Data Engineering, IEEE Trans. on 22(10):1345–1359. [Pan et al. 2011] Pan, S. J.; Tsang, I. W.; Kwok, J. T.; and Yang, Q. 2011. Domain adaptation via transfer component analysis. Neural Networks, IEEE Trans. on 22(2):199–210. [Pantic et al. 2005] Pantic, M.; Valstar, M.; Rademaker, R.; and Maat, L. 2005. Web-based database for facial expression analysis. In IEEE Conference on Multimedia and Expo. IEEE. [Patel et al. 2015] Patel, V. M.; Gopalan, R.; Li, R.; and Chellappa, R. 2015. Visual domain adaptation: A sur- vey of recent advances. IEEE Signal Processing Magazine 32(3):53–69. [Sun, Feng, and Saenko 2015] Sun, B.; Feng, J.; and Saenko, K. 2015. Return of frustratingly easy domain adaptation. In Intl. Conference on Computer Vision, TASK-CV. [Torralba and Efros 2011] Torralba, A., and Efros, A. A. 2011. Unbiased look at dataset bias. In IEEE Conference on Computer Vision and Pattern Recognition, 1521–1528.
2cs.AI
MODEL MISSPECIFICATION AND BIAS FOR INVERSE PROBABILITY WEIGHTING AND DOUBLY ROBUST ESTIMATORS INGEBORG WAERNBAUM1 AND LAURA PAZZAGLI2 Abstract. In the causal inference literature a class of semi-parametric estimators are arXiv:1711.09388v1 [math.ST] 26 Nov 2017 called robust if the estimator has desirable properties under the assumption that at least one of the working models is correctly specified. A standard example is a doubly robust estimator that specifies parametric models both for the propensity score and the outcome regression. When estimating a causal parameter in an observational study the role of parametric models are often not to be true representations of the data generating process, instead the motivation for their use is to facilitate the adjustment for confounding, for example by reducing the dimension of the covariate vector, making the assumption of at least one true model unlikely. In this paper we propose a crude analytical approach to study the large sample bias of estimators when all models are assumed to be approximations of the true data generating process, i.e., all models are misspecified. We apply our approach to three prototypical estimators, two inverse probability weighting estimators (IPW), using a misspecified propensity score model, and a doubly robust (DR) estimator, using misspecified models for the outcome regression and the propensity score. To compare the consequences of the model misspecifications for the estimators we show conditions for when using normalized weights leads to a smaller bias compared to a simple IPW estimator. To analyze the question of when the use of two misspecified models are better than one we derive necessary and sufficient conditions for when the DR estimator has a smaller bias than the simple IPW estimator and when it has a smaller bias than the IPW estimator with normalized weights. For most conditions in the comparisons, the covariance between the propensity score model error and the conditional outcomes plays an important role. The results are illustrated in a simulation study. Keywords: Average causal effects, comparing biases, propensity score, robustness 1. Introduction Identifying an average causal effect of a treatment with observational data requires adjustment for background variables that affect both the treatment and the outcome under study. Often parametric models are assumed for parts of the joint distribution of the treatment, outcome and background variables (covariates) and large sample properties of estimators are derived under the assumption that the parametric models are correctly specified. A class of semiparametric estimators called inverse probability weighting (IPW) estimators use the difference of the weighted means of the outcomes for the treatment groups as an estimator of the average causal effect, see e.g. Lunceford and Davidian (2004). IPW 2 INGEBORG WAERNBAUM1 AND LAURA PAZZAGLI2 estimators reweights the observed outcomes to a random sample of all potential outcomes, missing and observed, by letting each observed outcome account for itself and other individuals with similar characteristics proportionally to the probability of their outcome being observed. IPW estimators are used in applied literature (Kwon, Jeong, et al. 2015) and their properties have been studied in the missing data and causal inference literature, see e.g. Vansteelandt, Carpenter, et al. (2010) and Seaman and White (2013) for reviews. Earlier research have considered properties of IPW estimators for estimating the average causal effect under the assumption that a parametric propensity score (PS) model is correctly specified (Lunceford and Davidian 2004; Yao, Sun, et al. 2010). Properties of IPW estimators using different weights, often referred to as stabilized (Hernán, Brumback, et al. 2000; Hernán and Robins 2006) or normalized (Hirano and Imbens 2001; Busso, DiNardo, et al. 2014) have been discussed together with the impact of violations to an assumption of overlap (positivity) (Khan and Tamer 2010; Petersen, Porter, Gruber, Wang, and van der Laan 2010). To decrease the reliance on the choice of a parametric model of the PS an approach with doubly or multiply robust estimators have emerged. An estimator is referred to as a doubly robust estimator (DR) (Bang and Robins 2005; Tsiatis 2007) since it is a consistent estimator of the average causal effect if either the model for the propensity score or the outcome regression (OR) model is correct (Scharfstein, Rotnitzky, et al. 1999). The efficiency of the DR estimator is a key property and its variance has been described under correct specification of at least one of the models (Cao, Tsiatis, et al. 2009). When both models are correct the estimator reaches the semiparametric efficiency bound described in Robins and Rotnitzky (1994). The large sample properties of IPW estimators with standard, normalized and variance minimized weights, together with a prototypical DR estimator were studied and compared in Lunceford and Davidian (2004) under correct specification of the PS and OR models. There are few studies on doubly or multiply robust estimators under misspecification of both the PS and the OR models. Kang and Schafer (2007) studied and compared the performance of various DR and non-DR estimators under misspecification of both models. They concluded that many DR methods perform better than simple inverse probability weighting. However a regression-based estimator under a misspecified model was not improved upon. The paper was commented and the relevance of the results were discussed by several authors see e.g., Tsiatis and Davidian (2007), Tan (2007), Robins, Sued, et al. (2007). In Waernbaum (2012) a matching estimator was compared to IPW and DR estimators under misspecification of both the PS and OR models. Here, a robustness class for the matching estimator under misspecification of the PS model was described. In this paper we describe three commonly used semi-parametric estimators of the average causal effect under the assumption that none of the working models are correctly specified. For this purpose we study the difference between the probability limit of the estimator under model misspecification and the true average causal effect. The purpose MODEL MISSPECIFICATION AND BIAS 3 of this definition of the bias is that the estimators under study converges to a well-defined limit however not necessarily consistent for the true average causal effect. We study the biases of two IPW estimators and a DR estimator and compare them under the same misspecification of the PS-model. In the comparisons with the DR estimator the biases provide a means to describe when two wrong models are better than one. To analyze the consequences of the model misspecifications we compare the absolute values of the biases in two parts separately, one for each of the two potential outcome means (µ1 , µ0 ). For the comparisons we provide sufficient and necessary conditions for inequalities involving the absolute value of the biases of the different estimators. We use a running example of a data generating process with misspecified PS and OR models to illustrate the inequalities. A simulation study is performed to investigate the biases for finite samples. The data generating processes and the misspecified models from the simulation designs are also used for numerical approximations of the large sample properties derived in the paper. In recent studies strategies for bias reduction under model misspecification have been proposed by inclusion of additional conditions in the estimating equations for both IPW (Imai and Ratkovic 2014) and DR estimators (Vermeulen and Vansteelandt 2015). However, the general approach for analyzing model misspecification provided in this paper could also be used to study the biased reduced estimators. The paper proceeds as follows. Section 2 presents the model and theory together with the estimators and their properties when the working models are correctly specified. Section 3 presents a general approach and assumptions to study model misspecification. In Section 4 the generic biases are derived and comparisons between the estimators are performed. We present a simulation study in Section 5 containing both finite sample properties of the estimators and numerical large sample approximations and thereafter we conclude with a discussion. 2. Model and theory The potential outcome framework defines a causal effect as a comparison of potential outcomes that would be observed under different treatments (Rubin 1974). Let X be a vector of pre-treatment variables, referred to as covariates, T a binary treatment, with realized value T = 1 if treated and T = 0 if control. The causal effect of the treatment is defined as a contrast between two potential outcomes, for example the difference, Y (1) − Y (0), where Y (1) is the potential outcome under treatment and Y (0) is the potential outcome under the control treatment. The observed outcome Y is assumed to be the potential outcomes for each level of the observed treatment Y = T Y (1) + (1 − T )Y (0), so that the data vector that we observe is (Ti , Xi , Yi ), where i = 1, . . . , n are assumed independent and identically distributed copies. In the remainder of the paper we will drop the subscript i for the random variables when not needed. Since each individual only can be subject to one treatment either Y (1) or Y (0) will be missing. If the treatment is randomized the difference of sample averages of the treated and controls will be an INGEBORG WAERNBAUM1 AND LAURA PAZZAGLI2 4 unbiased estimator of the average causal effect ∆ = E [Y (1) − Y (0)], the parameter of interest. In the following we will use the notation µ1 = E [Y (1)] and µ0 = E [Y (0)]. When the treatment is not assigned at random the causal effect of the treatment can be estimated if all confounders are observed Assumption 1. [No unmeasured confounding] Y (t) ⊥ ⊥ T |X, t = 0, 1. and if the treated and controls have overlapping covariate distributions Assumption 2. [Overlap] η < P (T = 1|X) < 1 − η, for some η > 0. Throughout the paper we assume that Assumptions 1 and 2 hold. Under these assumptions we can estimate the average causal effect with the observed data by marginalizing over the conditional means (1) ∆ = E [E(Y | X, T = 1) − E(Y | X, T = 0)] . For matching/stratification estimators (see Imbens and Wooldridge 2009 for a review) the inner expectation in (1) is evaluated by grouping treated and controls in matched pairs or strata formed by the resulting cells of the cross classification of the covariates. Instead of comparing treated and controls on a high dimensional vector of the covariates it is sufficient to condition on a scalar function of the covariates, e(X) = P (T = 1|X), called the propensity score (Rosenbaum and Rubin 1983). Instead of conditioning on the propensity score as in (1), the propensity score can be used as a weight   TY (1 − T )Y ∆=E − = E [Y (1) − Y (0)] , e(X) 1 − e(X) where the last equality follows from Assumption 1. Usually it is assumed that the propensity score and the outcome regression follow parametric models. Assumption 3. [Propensity score model] The propensity score e(X) follows a model e(X, β) parametrized by, β = (β1 , . . . , βp ) and ê(X) is the estimated propensity score e(X, β̂) with a n1/2 -consistent estimator of β Assumption 4. [Outcome regression model] The conditional expectation, µt (X) = E(Y (t)|X), t = 0, 1 follows a model µt (X, αt ), t = 0, 1 parametrized by αt = (αt1 , . . . , αtqt ) and µ̂t (X) is the estimated outcome regression µt (X, α̂t ) with a n1/2 -consistent estimator of αt . Consider the example, e(X, β) = [1+exp(−X 0 β)]−1 and ê(X) are the fitted values of the propensity score when β̂ is a maximum likelihood estimator of β. Similarly the outcome MODEL MISSPECIFICATION AND BIAS 5 regression model could be a linear model µt (X, αt ) = X 0 αt where µ̂t (X), t = 0, 1 are the fitted values when α̂t is the ordinary least squares estimator. We study two IPW estimators and a DR estimator described in Lunceford and Davidian ˆ IPW an estimator defined by: (2004). We denote by ∆ 1 n n i=1 i=1 X Ti Yi 1 X (1 − Ti )Yi ˆ IPW = 1 ∆ − . 1 n ê(Xi ) n 1 − ê(Xi ) (2) ˆ IPW is The variance of ∆ 1 2 σIPW = VIPW1 − aT I −1 a 1 (3) where VIPW1 is the asymptotic variance when the propensity score is known   Y (1)2 Y (0)2 VIPW1 = E − (µ1 − µ0 )2 , + e(X) 1 − e(X) a is a (p × 1) vector   a=E Y (1) Y (0) + e(X) 1 − e(X)  e0 (X)  for the partial derivatives e0 (X) = ∂/∂β {e(X, β)} and I is the p × p covariance matrix ˆ IPW each observed treated individual is weighted of the estimated propensity score. In ∆ 1 by 1/e(X) and each control is weighted by 1/ [1 − e(X)]. Since the weights generate the missing potential outcomes for each of the treatment and control groups respectively we want to divide the weighted sum with the number of individuals in the generated sample consisting of the observed and missing potential outcomes which may not be n for a given ˆ IPW with normalized sample (Hirano, Imbens, et al. 2003). This gives an IPW estimator ∆ 2 weights (4) ˆ IPW = ∆ 2 n X i=1 Ti ê(Xi ) !−1 n X Ti Yi − ê(Xi ) i=1 n X i=1 1 − Ti 1 − ê(Xi ) !−1 n X (1 − Ti )Yi i=1 1 − ê(Xi ) and variance 2 σIPW = VIPW2 − bT I −1 b 2 (5) where VIPW2 is the asymptotic variance when the propensity score is known " # (Y (1) − µ1 )2 (Y (0) − µ0 )2 VIPW2 = E + , e(X) 1 − e(X) and b is a (p × 1) vector   b=E Y (1) − µ1 Y (0) − µ0 + e(X) 1 − e(X)  e0 (X)  . , INGEBORG WAERNBAUM1 AND LAURA PAZZAGLI2 6 Under Assumptions 1-3 the IPW estimators are consistent estimators of the average √ ˆ 2 causal effect ∆ with asymptotic distribution n(∆ IPWk − ∆) ∼ N (0, σ IPWk ), k = 1, 2. In addition we study a DR estimator (Lunceford and Davidian 2004; Tsiatis 2007) ˆ DR = 1 ∆ n − (6) 1 n n X Ti Yi − (Ti − ê(Xi ))µ̂1 (Xi ) i=1 n X i=1 ê(Xi ) (1 − Ti )Yi + (Ti − ê(Xi ))µ̂0 (Xi ) . 1 − ê(Xi ) Under Assumptions 1-4 we have the large sample distribution √ ˆ 2 ) n(∆DR −∆) ∼ N (0, σDR where 2 σDR = VIPW2 − d, (7) and " s d =E 1 − e(X) (µ1 (X) − µ1 ) + e(X) s !#2 e(X) (µ0 (X) − µ0 ) , 1 − e(X) 2 2 ≤ σ2 with the property that σDR IPW1 , σIPW2 which was shown by the theory of Robins and colleagues (Robins and Rotnitzky 1994). 3. Model misspecification: a general approach Our interest lies in the behaviors of the estimators when the propensity score and the outcome regression models are misspecified. For this purpose we replace Assumptions 3 and 4 with two other assumptions defining the probability limit of the estimators under a general misspecification. The misspecifications will further be used to define a general bias of the IPW and DR-estimators. When the propensity score is misspecified an estimator, e.g., a quasi maximum likelihood estimator (QMLE) is not consistent for β in Assumption 3. However, a probability limit for an estimator under model misspecification exists under general conditions, see e.g. White (1982, Theorem 2.2) for QMLE or Wooldridge (2010, Section 12.1) and Boos and Stefanski (2013, Theorem 7.1) for estimators that can be written as a solution of an estimating equation (M-estimators). In the following, and as an alternative to Assumptions 3 and 4, we will assume that such limits exists. Below we define an estimator ê∗ (X) of the propensity score under a misspecified model emis (X, β ∗ ). Assumption 5. [Misspecified PS parameters] p Let β̂ ∗ be an estimator under model misspecification, emis (X, β ∗ ), then β̂ ∗ −→ β ∗ . Under model misspecification the probability limit of βˆ∗ is generally well defined however emis (X, β ∗ ) is not equal to the propensity score e(X). In the following we use the notation ê∗ (X) = emis (X, β̂ ∗ ) as the estimated propensity score and e∗ (X) = emis (X, β ∗ ) under MODEL MISSPECIFICATION AND BIAS 7 Assumption 5. Below we give an example for true and misspecified parametric models, however, for Assumption 5 we do not need the existence of a true parametric model. Example 1 β1 X − β2 X 2 )]−1 For one confounder X and a true PS model e(X, β) = [1 + exp(−β0 − assume that we misspecify the propensity score with a probit model emis (X, β ∗ ) = Ψ(−β0∗ − β1∗ X), i.e., we misspecify the link function and omit a second order term. Let β̂ ∗ = (β̂0∗ , β̂1∗ ) be the QMLE estimator of the parameters in emis (X, β ∗ ) obtained by maximizing the quasi-likelihood ln L = n X  Ti ln emis (Xi , β ∗ ) + (1 − Ti ) ln(1 − emis (Xi , β ∗ )) , i=1 p Then ê∗ (X) = Ψ(−β̂0∗ − β̂1∗ X), β̂ ∗ = (β̂0∗ , β̂1∗ ) −→ β ∗ = (β0∗ , β1∗ ) under Assumption 5 and e∗ (X) = Ψ(−β0∗ − β1∗ X) . When considering the existence of true and misspecified parametric models, as illustrated in Example 1, the parameters in β and the limiting parameters β ∗ under the misspecified model need not to be of the same dimension. For instance, the true model could contain higher order terms and interactions that are not present in the estimation model. The next assumption concerns overlap under model misspecification. Assumption 6. [Overlap under misspecification] ν < e∗ (X) < 1 − ν, for some ν > 0. In addition to the PS model we also consider misspecified outcome regression models, ∗ ∗ mis ∗ µmis t (X, αt ), t = 0, 1. Denote by α̂t , t = 0, 1 the estimator of the parameters in µt (X, αt ). Assumption 7. [Misspecified OR model parameters] p ∗ ∗ ∗ Let α̂t∗ be an estimator under model misspecification µmis t (X, αt ), t = 0, 1, then α̂t −→ αt , t = 0, 1. ∗ In the following we use the notation µ̂∗t (X) = µmis t (X, α̂t ) as the estimated OR and ∗ ∗ ∗ µ∗t (X) = µmis t (X, αt ) under Assumption 7 and µt for the expected value E [µt (X)], t = 0, 1. Assumptions 5 and 7 are defined for misspecified PS and OR models for the purpose of describing their influence on the estimation of ∆. The estimators (2), (4) and (6) can be written by estimating equations where the equations solving for the PS and OR parameters are set up below the main equation for the IPW and DR estimators, see e.g Lunceford and Davidian (2004) and Williamson, Forbes, and White (2014). Assuming parametric PS and OR models the IPW estimators correspond to solving 2 + p estimating equations Pn i=1 ψ(θ, Yi , Ti , Xi ) = 0 for the parameters θIPWk = (µ1 , µ0 , β), k = 1, 2 and for the DR estimator 2 + p + q1 + q0 estimating equations for the parameters θDR = (µ1 , µ0 , β, α1 , α0 ). Using the notation for the misspecified models in assumptions 5 and 7 the estimating equations change according to the dimensions of the parameters β ∗ and αt∗ , t = 0, 1. A INGEBORG WAERNBAUM1 AND LAURA PAZZAGLI2 8 key condition for Assumptions 5 and and 7 to hold is that the misspecification of the PS and/or OR provides estimating equations that uniquely define the parameter although, as a consequence of the misspecification, it will not be the true average causal effect. In the next section we present the asymptotic bias for the IPW and DR estimators under study with general expressions including the limits of the misspecified propensity score and outcome regression models. 4. Bias resulting from model misspecification ˆ DR ˆ IPW and ∆ ˆ IPW , ∆ 4.1. General biases. In order to study the large sample bias of ∆ 2 1 ˆ ∗IPW , ∆ ˆ ∗IPW and ∆ ˆ ∗DR by replacing under model misspecification we define the estimators ∆ 1 2 ê(X) in Equations (2), (4) and (6) with ê∗ (X). For the DR-estimator we additionally replace µ̂t (X) with µ̂∗t (X), t = 0, 1. To assess the properties of the estimators we assume 1, 2, 5, 6 and 7 and regularity conditions for applying a weak law of large numbers for averages with estimated parameters, see Appendix A.1. Note that Assumption 3 and 4 are no longer needed. We evaluate the difference between the probability limits of the estimators under model misspecification and the average causal effect ∆ for the IPW and DR estimators: ˆ∗ Theorem 8 (Bias under model misspecification for ∆ IPW1 ). Under Assumptions 1-2 and 5-6 p ˆ∗ ∆ IPW1 − ∆ −→ E     e(X) 1 − e(X) µ1 (X) − E µ0 (X) − (µ1 − µ0 ). e∗ (X) 1 − e∗ (X) ˆ∗ Theorem 9 (Bias under model misspecification for ∆ IPW2 ). Under Assumptions 1-2 and 5-6 p ˆ∗ ∆ IPW2 − ∆ −→ E h e(X) e∗ (X) µ1 (X) E h e(X) e∗ (X) i i E − h i 1−e(X) 1−e∗ (X) µ0 (X) E h 1−e(X) 1−e∗ (X) i − (µ1 − µ0 ). ˆ ∗DR ). Under Assumptions 1-2 and Theorem 10 (Bias under model misspecification for ∆ 5-7  (e(X) − e∗ (X)) (µ1 (X) − µ∗1 (X)) ∆DR − ∆ −→E e∗ (X)   [e(X) − e∗ (X)] (µ0 (X) − µ∗0 (X)) +E . (1 − e∗ (X)) p ˆ∗  See Appendix A.2 for proofs. We refer to the limits in Theorem 8, 9, and 10 as the asymptotic biases of the respective ˆ ∗IPW ), Bias(∆ ˆ ∗IPW ) and Bias(∆ ˆ ∗DR ) although they are the difference estimators, i.e., Bias(∆ 1 2 between the probablity limits of the estimators and the true ∆ and not the difference in ˆ ∗ is displayed by Theorem 10 since if expectations. The double robustness property of ∆ DR p ˆ ∗ −→ either e(X) = e∗ (X) or µt (X) = µ∗ (X), t = 0, 1 we have that ∆ ∆. t DR To provide an illustrative example of the biases of the estimators we obtain the misspecified models’ limits by misspecifying the link functions in generalized linear models. MODEL MISSPECIFICATION AND BIAS 9 However, a nonparametric data generating process could also be used. For the propensity score we use binary response models with logit link (true) and a cloglog link (misspecified), for the outcome regression models we use poisson models with log links (true) and gaussian models (misspecified) with identity links. We use numerical approximations to provide values on the parameters in e∗ (X) and µ∗t (X), t = 0, 1 under the given true and misspecified models e(X), emis (X), µt (X) and µmis t (X), t = 0, 1. Example 2 [Bias from link misspecifications] Let X ∼ U nif orm(−2, 2) and T ∼ Bernoulli(e(X)). Assume that e(X) = [1 + exp (0.5 − X)]−1 , µ1 (X) = exp (2.3 + 0.14X), µ∗1 (X) = 10.06 + 1.48X, e∗ (X) = 1 − exp [− exp(−0.81 + 0.74X)] , µ0 (X) = exp (1.4 + 0.20X), µ∗0 (X) = 4.14 + 0.79X. The marginal means are µ1 = 10.11 and µ0 = 4.16, so that ∆ = 5.94. Here we have that, ˆ ∗IPW ) = −0.16, Bias(∆ ˆ ∗IPW ) = 0.05, and Bias(∆ ˆ ∗DR ) = −0.02 Bias(∆ 1 2 4.2. Comparisons. To analyze the impact of the model misspecification on the estimators’ biases in Section 4.1 we compare the biases for two parts separately. The first part concerns the bias with respect to µ1 and the second part with respect to µ0 . The first ˆ ∗IPW ) in Theorem 8 is part of Bias(∆ 1  (8) E      e(X) e(X) e(X) µ (X) − µ = cov , µ (X) + E − 1 µ1 , 1 1 1 e∗ (X) e∗ (X) e∗ (X) ˆ ∗IPW ) in Theorem 9 is and the first part of Bias(∆ 2 E (9) h i e(X) e∗ (X) µ1 (X) E h e(X) e∗ (X) i cov − µ1 = h i e(X) e∗ (X) , µ1 (X) E h e(X) e∗ (X) i . ˆ∗ For ∆ IPW1 we see in (8) that the mean difference between the expected value of the conditional outcome, scaled with the PS-model error, and the marginal outcome contributes ˆ∗ to the bias. For ∆ the contribution (9) is the difference between the conditional and IPW2 the marginal outcome with the same error scaling, but here, the expected value of the ˆ ∗IPW we PS-model error, E [e(X)/e∗ (X)], also enters the bias in the denominator. For ∆ 1 see from the right hand side of 8 that the sign depends on the covariance of [e(X)/e∗ (X)] ˆ ∗IPW we see from the right hand and µ1 (X), and the sign of E [e(X)/e∗ (X) − 1] µ1 . For ∆ 2 side of (9) that the sign of depends on the covariance only. Hence, the part of the biases described above can be in different directions for the same model misspecification, see also Example 2 for the bias in total. In the sequel we will give results concerning the absolute values of the first part of the biases in Theorems 8, 9 and 10 but the results can be directly applied for the second INGEBORG WAERNBAUM1 AND LAURA PAZZAGLI2 10 part of the biases by replacing e(X)/e∗ (X), with (1 − e(X))/(1 − e∗ (X)) and µ1 (X) with ˆ∗ ˆ∗ ˆ ∗IPW ), Bias1 (∆ µ0 (X), see Appendix A.3. We define Bias1 (∆ IPW ) and Bias1 (∆DR ) as 1 2   e(X) µ1 (X) − µ1 , e∗ (X) i h E ee(X) ∗ (X) µ1 (X) ˆ ∗IPW ) = h i − µ1 , Bias1 (∆ 2 e(X) E e∗ (X)    e(X) ∗ ∗ ˆ − 1 (µ1 (X) − µ1 (X)) . Bias1 (∆DR ) = E e∗ (X) ˆ∗ Bias1 (∆ IPW1 ) = E (10) (11) (12) Below, we give a sufficient and necessary condition for when the absolute value of ˆ ∗IPW ) is smaller than the absolute value of Bias1 (∆ ˆ ∗IPW ). Bias1 (∆ 2 1 ˆ ∗IPW ) and Bias1 (∆ ˆ ∗IPW ) ). Theorem 11 (Comparing Bias1 (∆ 2 1 h i e(X)   E e∗ (X) µ1 (X) e(X) h i − µ1 < E ∗ µ1 (X) − µ1 . e (X) E ee(X) ∗ (X) if and only if         e(X) e(X) e(X) e(X) cov ∗ cov ∗ , µ1 (X) < E ∗ , µ1 (X) + E ∗ − 1 µ1 . e (X) e (X) e (X) e (X) The proof follows directly from the multiplication rules of absolute values. The theorem h displays i that the comparison of the biases depends on the magnitude and sign of e(X) E e∗ (X) − 1 µ1 and the covariance. It is no surprise that the covariance of e(X)/e∗ (X) and µ1 (X) (and similarly of [1 − e(X)] / [1 − e∗ (X)] and µ0 (X)) plays a role for the bias of the estimators. If µ1 (X) was a constant it could be taken out of the expectations of the first terms in (10) and (11) and the PS-model error would be cancelled by the denominator E [e(X)/e∗ (X)]. In this case the bias in (11) would be 0, and thus smaller than (10). ˆ ∗IPW ) and Bias1 (∆ ˆ∗ Example 2 1 [Example 2 revisited for Bias1 (∆ IPW1 )] 2    e(X) e(X) E ∗ = 0.98, cov ∗ , µ1 (X) = 0.065, µ1 = 10.11. e (X) e (X) To apply Theorem 11 for the data generating process in Example 2 we evaluate   e(X) cov ∗ , µ1 (X) e (X)   e(X) <E ∗ e (X)      e(X) e(X) cov ∗ , µ1 (X) + E ∗ − 1 µ1 e (X) e (X) |0.064| < 0.98 · |0.064 − 0.02 · 10.11| = 0.13, ˆ∗ ˆ∗ and we conclude that Bias1 (∆ IPW2 ) < Bias1 (∆IPW1 ). MODEL MISSPECIFICATION AND BIAS 11 We proceed by investigating the difference between the bias of the IPW estimators (10), (11) and the bias of the DR estimator (12). Hence, we analyze the question of when two ˆ ∗ ) and Bias1 (∆ ˆ∗ wrong models are better than one. We start by comparing Bias1 (∆ DR IPW1 ). ∗ ˆ In the following theorem we show a necessary condition for Bias1 (∆ ) to be smaller than DR ˆ∗ Bias1 (∆ IPW1 ). In the sequel all proofs are provided in Appendix A.3. ˆ ∗ ) smaller than Bias1 (∆ ˆ∗ Theorem 12 (Necessary condition for Bias1 (∆ DR IPW1 )). If       e(X) e(X) ∗ E − 1 (µ1 (X) − µ1 (X)) < E − 1 µ1 (X) , e∗ (X) e∗ (X) then  E      e(X) e(X) ∗ − 1 µ1 (X) < 2 · E − 1 µ1 (X) . e∗ (X) e∗ (X) The theorem states that if the DR estimator improves upon the simple IPW-estimator under misspecification of both the PS and the OR model, then, the absolute value of the misspecified outcome model is less than double the absolute value of the true conditional mean under the same scaling of the PS-model error. Below we give two examples of sufficient conditions for the DR-estimator to have a smaller bias than the simple IPW estimator. ˆ ∗DR ) smaller than Bias(∆ ˆ ∗IPW )). If a) µ∗ = Theorem 13 (Sufficient conditions for Bias(∆ 1 1 µ1 and cov h e(X) e∗ (X) , µ1 (X) i − cov h e(X) ∗ e∗ (X) , µ1 (X) i < cov h i e(X) e∗ (X) , µ1 (X) +E h e(X) e∗ (X) i − 1 µ1 , or, b)      e(X) e(X) ∗ − 1 µ (X) < 2 · E − 1 µ (X) , 1 1 e∗ (X) e∗ (X)  i h  i − 1 µ∗1 (X) and E ee(X) − 1 µ (X) are either both positive or both ∗ (X) 1  E and E h e(X) e∗ (X) negative, then  E      e(X) e(X) ∗ − 1 (µ (X) − µ (X)) < E − 1 µ (X) . 1 1 1 e∗ (X) e∗ (X) One of the criteria in a), that µ1 = µ∗1 , is reasonable to assume when the corresponding moment condition is used in the estimation of the misspecified outcome model. Also, we have that criterion b) is the same as the necessary condition with the added assumption that the expectation of the (PS-error scaled) conditional outcomes have the same sign. ˆ ∗ ) and Bias1 (∆ ˆ∗ Example 2 2 [Example 2 revisited for Bias1 (∆ DR IPW1 )] For the data generating process in Example 2 we investigate the first part of the bias INGEBORG WAERNBAUM1 AND LAURA PAZZAGLI2 12  E      e(X) e(X) ∗ − 1 (µ1 (X) − µ1 (X)) < E − 1 µ1 (X) e∗ (X) e∗ (X) 0.01 < 0.11 implies  E      e(X) e(X) ∗ − 1 µ1 (X) < 2 · E − 1 µ1 (X) e∗ (X) e∗ (X) 0.10 < 0.22 which is consistent with Theorem 12. Assessing the sufficient conditions, in Theorem 13 a) we have that µ1 = 10.11 ≈ µ∗1  e(X) ∗ , µ (X) = 0.074, cov ∗ e (X) 1  = 10.07, and thereby,         e(X) e(X) ∗ e(X) e(X) cov ∗ , µ1 (X) − cov ∗ , µ (X) < cov ∗ , µ1 (X) + E ∗ − 1 µ1 e (X) e (X) 1 e (X) e (X) |−0.064 + 0.074| < |−0.064 − 0.02 · 10.11| 0.01 < 0.27. h  i h i e(X) The conditions in b) cannot be applied since E ee(X) − 1 µ (X) and cov , µ (X) ∗ (X) 1 1 e∗ (X) do not have the same sign. ˆ ∗ ) smaller than Bias1 (∆ ˆ∗ Theorem 14 (Necessary condition for Bias1 (∆ DR IPW2 )). If i h    E ee(X) ∗ (X) µ1 (X) e(X) ∗ i h − 1 (µ (X) − µ (X)) < − µ1 , E 1 1 e∗ (X) E e(X) e∗ (X) then h i e(X)     cov , µ (X) ∗ 1 e (X) e(X) e(X) ∗ i h E − 1 (µ (X)) − < E − 1 [µ (X)] 1 1 e∗ (X) e∗ (X) E ee(X) ∗ (X) h i e(X)    cov , µ (X) 1 e∗ (X) e(X) h i <E − 1 [µ1 (X)] + . ∗ e (X) E e(X)   e∗ (X) From the theorem we see that for the DR estimator to improve upon the normalized IPW estimator we need that the outcome misspecification is within an interval defined by the true conditional outcome and the absolute value of the covariance. This means that the smaller the covariance is, the more accuracy of the outcome model is required for the ˆ ∗ to be less biased than ∆ ˆ∗ ∆ DR IPW2 . Under similar assumptions as in Theorem 13 we describe sufficient conditions for the ˆ ∗ ) and Bias1 (∆ ˆ∗ comparison of Bias1 (∆ ). DR IPW2 MODEL MISSPECIFICATION AND BIAS 13 ˆ ∗ ) smaller than Bias1 (∆ ˆ∗ Theorem 15 (Sufficient conditions for Bias1 (∆ DR IPW2 )). If a) h i e(X) h i h i cov e∗ (X) ,µ1 (X) e(X) ∗ i h µ1 = µ∗1 and cov ee(X) < ∗ (X) , µ1 (X) − cov e∗ (X) , µ1 (X) e(X) E or h if, b) E e(X) e∗ (X) e∗ (X)  i h i − 1 µ1 (X) and cov ee(X) , µ (X) are either both positive or both negative, ∗ (X) 1 and  E  e(X) − 1 µ∗1 (X) e∗ (X)   < E   e(X) − 1 µ1 (X) + e∗ (X) cov h e(X) e∗ (X) , µ1 (X) E h e(X) e∗ (X) i i then,  E i h e(X)   µ (X) E e∗ (X) 1 e(X) h i − 1 (µ1 (X) − µ∗1 (X)) < − µ1 . ∗ e (X) E ee(X) ∗ (X) ˆ ∗DR ) and Bias1 (∆ ˆ ∗IPW ) the numerical example again For a comparison between Bias1 (∆ 2 shows that the necessary conditions of Theorem 14 and the sufficient condition in Theorem 15 a) are satisfied. 5. Simulation study In order to investigate the asymptotic biases and also the finite sample performance ˆ∗ ˆ∗ ˆ∗ of ∆ IPW1 , ∆IPW2 and ∆DR under model misspecification of both the PS and the OR models we perform a simulation study with three different designs A, B and C. The first part of the simulations evaluate the finite sample performances of the estimators and consist of 1000 replications of sample sizes 500, 1000 and 5000. We generate covariates X1 ∼ Uniform(1,4), X2 ∼ Poisson(3) and X3 ∼ Bernoulli(0.4). We use generalized linear models to generate a binary treatment T and potential outcomes Y (t), t = 0, 1 with second order terms of X1 and X2 in both the PS and OR models. The PS-distributions for the treated and controls are bounded away from zero and 1 under the true models and under the model misspecifications. The PS and OR models (for the DR estimator) are stepwise misspecified. We have three designs where: A: a quadratic term X1 2 is omitted in the PS and OR models; B: two quadratic terms, X1 2 and X2 2 , are omitted in the PS and OR models; C: two quadratic terms are omitted and the both the OR and PS link functions are misspecified. The glm family and link functions together with the true parameter values are given in Table 1 which also contains the details for the misspecified models. The simulation is performed with the statistical software R (R Core Team 2015). In Table 2 we give the simulation bias, standard error and MSE of the three estimators. ˆ IPW , ∆ ˆ IPW and ∆ ˆ DR the When using the true models, i.e, when studying the estimators ∆ 1 2 bias is small and decreases when the sample size increases and the standard errors follow ˆ DR followed by ∆ ˆ IPW and ∆ ˆ IPW (Lunceford the expected order with the smallest for ∆ 2 1 INGEBORG WAERNBAUM1 AND LAURA PAZZAGLI2 14 and Davidian 2004). Under misspecification the bias does not decrease with the sample size but gets closer to the asymptotic biases, see Table 3. Under misspecification the ˆ∗ standard errors follow the same pattern as under the true models. The bias of ∆ IPW1 is ∗ ∗ ∗ ˆ ˆ ˆ the largest whereas the ∆ and ∆ are similar. The MSE of ∆ is the smallest, IPW2 DR DR ˆ∗ ˆ∗ however for n = 5000, ∆ IPW2 and ∆DR are very similiar. ˆ∗ In Table 3 we give numerical approximations for Bias(∆ IPW1 ), ˆ∗ ˆ∗ Bias(∆ IPW2 ) and Bias(∆DR ) using a sample size of n = 1, 000, 000. We also show the same approximations for ˆ∗ ˆ∗ ˆ∗ Biast (∆ IPW1 ), Biast (∆IPW2 ) and Biast (∆DR ), t = 0, 1. Here, we see that the total bias ˆ ∗IPW in Design A but smaller for ∆ ˆ ∗DR in Design B and C. The absolute is smallest for ∆ 2 ˆ ∗DR in all designs. We also give the value of the biases in the two parts are smallest for ∆ expectations and covariances that are used for the necessary and sufficient conditions in Theorems 11-15. We immediately see that the necessary condition for the absolute valˆ ∗DR ) to be smaller than the absolute value of Biast (∆ ˆ ∗IPW ) holds for both ues of Biast (∆ 1 t = 0, 1. The means (µ0 , µ1 ) are close to the means under model misspecification (µ∗0 , µ∗1 ) which is an assumption needed in order to evaluate the sufficient conditions in Theorems 13 a) and 15 a). By inspecting the covariances and the additional critera of the Theorems 13 a) and 15 a) in Table 3 we can see that the resulting inequalities of the theorems are in line with the results for the asymptotic biases. Since we have that E [(e(X)/e∗ (X) − 1) µ1 (X)] and cov [e(X)/e∗ (X), µ1 (X)] and E [((1 − e(X))/(1 − e∗ (X)) − 1) µ0 (X)] and cov [(1 − e(X))(1 − e∗ (X)), µ0 (X)] do not have the same sign in Design A and C the sufficient conditions in Theorems 13 b) and 15 b) cannot be applied. 6. Discussion In this paper we investigate biases of two IPW estimators and a DR estimator under model misspecification. For this purpose, we use a generic probability limit, under misspecification of the PS and OR models, which exists under general conditions. Since the propensity score enters the estimator in different ways for the IPW estimators under study the consequences of the model misspecification are different. The bias of the IPW estimators depend on the covariance between the PS-model error and the conditional outcome in different ways and the resulting bias can be in different directions. Comparing the bias of the DR estimator with a simple IPW estimator the necessary condition for the DR estimator to have a smaller bias is that the expectation of the outcome model under misspecification is less than twice the true conditional outcome, where the expectations also includes a scaling with the PS-model error. For the comparison with the normalized IPW estimator the (PS-error scaled) misspecified outcome involves an interval defined by the true conditional outcome adding and subtracting the absolute value of the covariance between the PS-model error and the conditional outcome. To our knowledge, there are only simulation studies comparing DR-estimators with other estimators (Kang and Schafer 2007; Waernbaum 2012) under the assumption that References 15 all models are misspecified. In this paper we study the same problem with an analytical approach although the comparisons are made between a DR estimator and IPW estimators. Acknowledgement The authors acknowledge the Royal Swedish Academy of Sciences and the Swedish Research Council, (grant number 2016-00703) for financial support. 1 Department of Statistics, Umeå University, Sweden, Institute for Evaluation of Labour Market and Education Policy, IFAU, Uppsala, Sweden, 2 Division of Statistics, Department of Economics, University of Perugia, Italy, E-mail address: [email protected] Figure 1. Density plots of the propensity score distributions, ê(X) and ê∗ (X) for treated and controls for Design A (top), B (middle), and C (bottom). Design A, e*(X) for treated and controls 2.0 1.5 Density 0.0 0.0 0.5 1.0 1.5 1.0 0.5 Density 2.0 2.5 2.5 Design A, e(X) for treated and controls 0.2 0.4 0.6 0.8 1.0 1.2 0.0 0.2 0.4 0.6 0.8 e(X) e*(X) Design B, e(X) for treated and controls Design B, e*(X) for treated and controls 1.0 1.2 2.0 1.0 0.5 0.0 0.0 0.2 0.4 0.6 0.8 1.0 1.2 −0.2 0.0 0.2 0.4 0.6 e(X) e*(X) Design C, e(X) for treated and controls Design C, e*(X) for treated and controls 0.8 1.0 0.8 1.0 1.5 Density 2.0 0.0 0.0 0.5 1.0 1.0 3.0 2.0 0.0 Density 1.5 Density 1.5 1.0 0.5 Density 2.0 2.5 2.5 3.0 0.0 0.0 0.2 0.4 0.6 0.8 1.0 1.2 −0.2 e(X) 0.0 0.2 0.4 0.6 1.2 e*(X) References Bang, H. and J. M. Robins (2005). Doubly robust estimation in missing data and causal inference models. Biometrics 61 (4), 962–973. Boos, D. D. and L. Stefanski (2013). M-estimation (estimating equations). In Essential Statistical Inference, Volume 120, pp. 297–337. Springer New York. 16 References Busso, M., J. DiNardo, et al. (2014). New evidence on the finite sample properties of propensity score reweighting and matching estimators. Review of Economics and Statistics 96 (5), 885–897. Cao, W., A. A. Tsiatis, et al. (2009). Improving efficiency and robustness of the doubly robust estimator for a population mean with incomplete data. Biometrika 96 (3), 723–734. Hernán, M. A., B. Brumback, et al. (2000). Marginal structural models to estimate the causal effect of zidovudine on the survival of hiv-positive men. Epidemiology 11 (5), 561–570. Hernán, M. A. and J. M. Robins (2006). Estimating causal effects from epidemiological data. Journal of Epidemiology and Community Health 60 (7), 578–586. Hirano, K. and G. W. Imbens (2001). Estimation of causal effects using propensity score weighting: An application to data on right heart catheterization. Health Services and Outcomes Research Methodology 2 (3), 259–278. Hirano, K., G. W. Imbens, et al. (2003). Efficient estimation of average treatment effects using the estimated propensity score. Econometrica 71 (4), 1161–1189. Imai, K. and M. Ratkovic (2014). Covariate balancing propensity score. Journal of the Royal Statistical Society: Series B (Statistical Methodology) 76 (1), 243–263. Imbens, G. W. and J. M. Wooldridge (2009). Recent developments in the econometrics of program evaluation. Journal of Economic Literature 47 (1), 5–86. Kang, J. D. and J. L. Schafer (2007). Demystifying double robustness: A comparison of alternative strategies for estimating a population mean from incomplete data. Statistical Science 22 (4), 523–539. Khan, S. and E. Tamer (2010). Irregular identification, support conditions, and inverse weight estimation. Econometrica 78 (6), 2021–2042. Kwon, T., I. G. Jeong, et al. (2015). Adjuvant chemotherapy after radical cystectomy for bladder cancer: a comparative study using inverse-probability-of-treatment weighting. Journal of Cancer Research and Clinical Oncology 141 (1), 169–176. Lunceford, J. K. and M. Davidian (2004). Stratification and weighting via the propensity score in estimation of causal treatment effects: a comparative study. Statistics in Medicine 23 (19), 2937–2960. Petersen, M. L., K. E. Porter, S. Gruber, Y. Wang, and M. J. van der Laan (2010). Diagnosing and responding to violations in the positivity assumption. Statistical Methods in Medical Research 21 (1), 31–54. R Core Team (2015). R: A Language and Environment for Statistical Computing. Vienna, Austria: R Foundation for Statistical Computing. Robins, J., M. Sued, et al. (2007). Comment: Performance of double-robust estimators when “inverse probability” weights are highly variable. Statistical Science 22 (4), 544–559. References 17 Robins, J. M. and A. Rotnitzky (1994). Estimation of regression coefficients when some regressors are not always observed. Journal of the American Statistical Association 89 (427), 846–866. Rosenbaum, P. R. and D. B. Rubin (1983). The central role of the propensity score in observational studies for causal effects. Biometrika 70 (1), 41–55. Rubin, D. B. (1974). Estimating causal effects of treatments in randomized and nonrandomized studies. Journal of Educational Psychology 66 (5), 688–701. Scharfstein, D. O., A. Rotnitzky, et al. (1999). Adjusting for nonignorable drop-out using semiparametric nonresponse models. Journal of the American Statistical Association 94 (448), 1096–1120. Seaman, S. R. and I. R. White (2013). Review of inverse probability weighting for dealing with missing data. Statistical Methods in Medical Research 22 (3), 278–295. Tan, Z. (2007). Comment: Understanding OR, PS and DR. Statistical Science 22 (4), 560–568. Tsiatis, A. A. (2007). Semiparametric theory and missing data. Springer Science & Business Media. Tsiatis, A. A. and M. Davidian (2007). Comment: Demystifying double robustness: A comparison of alternative strategies for estimating a population mean from incomplete data. Statistical Science 22 (4), 569–573. Vansteelandt, S., J. Carpenter, et al. (2010). Analysis of incomplete data using inverse probability weighting and doubly robust estimators. Methodology 6 (1), 37–48. Vermeulen, K. and S. Vansteelandt (2015). Bias-reduced doubly robust estimation. Journal of the American Statistical Association 110 (511), 1024–1036. Waernbaum, I. (2012). Model misspecification and robustness in causal inference: comparing matching with doubly robust estimation. Statistics in Medicine 31 (15), 1572– 1581. White, H. (1982). Maximum likelihood estimation of misspecified models. Econometrica: Journal of the Econometric Society 50 (1), 1–25. Williamson, E., A. Forbes, and I. White (2014). Variance reduction in randomised trials by inverse probability weighting using the propensity score. Statistics in Medicine 33 (1), 721–737. Wooldridge, J. (2010). Econometric Analysis of Cross Section and Panel Data. Econometric Analysis of Cross Section and Panel Data. MIT Press. Yao, L., Z. Sun, et al. (2010). Estimation of average treatment effects based on parametric propensity score model. Journal of Statistical Planning and Inference 140 (3), 806–816. 18 References Appendix A. A.1. Regularity conditions for applying a weak law of large numbers for averages of functions with estimated parameters. The convergence in probability of ˆ∗ ˆ∗ ˆ ∗ to their corresponding expectations would follow directly from a ∆ ,∆ and ∆ IPW1 IPW2 DR WLLN for an iid sample of (Ti , Xi , Yi ) except for the estimated parameters β̂ ∗ in ê∗ (Xi ) and and α̂t∗ in µ̂∗t (Xi ), t = 0,h 1. To justify the biases in Section 4 consider a general i p representation of a function g T, Y, X, θ̂ where θ̂ −→ θ0 and i p 1X h g Xi , Ti , Yi , θ̂ −→ E [g(T, X, Y, θ0 )] n (13) ˆ ∗IPW , ∆ ˆ ∗IPW and (α̂∗ , β̂ ∗ ) for ∆ ˆ ∗DR and under AsThe θ̂ in (13) corresponds to β̂ ∗ for ∆ 1 2 sumptions 5 and 7 the consistency of θ̂ is ensured. Regularity conditions for the function g can be given see e.g., Boos and Stefanski (2013, Theorem 7.3) who show that (13) holds for differentiable h ifunctions with bounded derivatives (wrt θ). The regularity conditions for g Xi , Ti , Yi , θ̂ , for the three estimators, imply conditions on the models e∗ (X, β ∗ ) and µ∗t (X, αt∗ ) such that the regularity condition for g is satisfied. Under (13) we can insert the limiting values β ∗ and α∗ and their corresponding e∗ (X) and µ∗t (X), t = 0, 1 when taking a WLLN. A.2. Biases. Under the regularity conditions and assumptions 5-6 (IPW) and 5-7 (DR) ˆ ∗IPW : we derive the bias in Theorem 8 below. For ∆ 1     n n 1 X (1 − Ti )Yi p TY (1 − T ) Y 1 X Ti Yi − −→ E ∗ −E , n ê∗ (Xi ) n 1 − ê∗ (Xi ) e (X) (1 − e∗ (X)) i=1 i=1 and           TY (1 − T ) Y TY (1 − T ) Y E ∗ −E =E E ∗ X −E E X e (X) (1 − e∗ (X)) e (X) [1 − e∗ (X)]     (1 − e(X)) e(X) µ1 (X) − E µ (X) . =E ∗ 0 e (X) (1 − e∗ (X)) subtracting with ∆ gives ˆ∗ Bias(∆ IPW1 ) =E     e(X) 1 − e(X) µ1 (X) − E µ0 (X) − (µ1 − µ0 ). e∗ (X) 1 − e∗ (X) The biases of Theorems 9 and 10 are derived similarly. A.3. Comparisons. To study the consequences of model misspecification for the estimators we compare each difference involving µ1 (X) and µ0 (X) separately. For example we ˆ∗ study Bias(∆ IPW1 ) References ˆ∗ ∆IPW1 19     e(X) 1 − e(X) − ∆ −→E ∗ µ1 (X) − E µ0 (X) − (µ1 − µ0 ) e (X) 1 − e∗ (X)     1 − e(X) e(X) µ1 (X) − µ1 + µ0 − E µ0 (X)] =E ∗ e (X) 1 − e∗ (X) p ˆ ∗IPW ) and Bias(∆ 2 p ˆ∗ ∆ IPW2 − ∆ −→ E E = h i e(X) e∗ (X) µ1 (X) E h h E h e(X) e∗ (X) E h − i i 1−e(X) 1−e∗ (X) µ0 (X) E h 1−e(X) 1−e∗ (X) i e(X) e∗ (X) µ1 (X) e(X) e∗ (X) i E h − µ 1 + µ0 − i − (µ1 − µ0 ) i 1−e(X) 1−e∗ (X) µ0 (X) h E 1−e(X) 1−e∗ (X) i . The inequalities concerning the biases are made with respect to the absolute values for two parts separately, i.e, for Theorem 11  (14) E  e(X) µ1 (X) − µ1 < e∗ (X) E h i e(X) e∗ (X) µ1 (X) E h e(X) e∗ (X) i − µ1 . Since | − a| = |a| the same comparison for the second part are i h 1−e(X)  µ (X) E 1−e∗ (X) 0 1 − e(X) i h E µ0 (X) − µ0 < − µ0 , ∗ 1−e(X) 1 − e (X) E 1−e ∗ (X)  (15) and the conditions derived for the first part of the biases, (10) and (11), can be directly applied to (15) replacing e(X)/e∗ (X), with (1−e(X))/(1−e∗ (X)) and µ1 (X) with µ0 (X). Similarly, for the second part of the bias in Theorem 10 we have that (1 − e(X))(1 − e∗ (X)) (µ0 (X) − µ∗0 (X)) E (1 − e∗ (X))   (e(X) − e∗ (X)) (µ0 (X) − µ∗0 (X)) = E (1 − e∗ (X))   and the conditions derived for the first part of the bias, (12), can be directly applied to (15) additionally replacing µ∗1 (X) with µ∗0 (X). Proof of Theorem 12. 1. Assuming that E  E h e(X) e∗ (X)  i − 1 µ1 (X) > 0:      e(X) e(X) ∗ − 1 (µ1 (X) − µ1 (X)) < E − 1 µ1 (X) , e∗ (X) e∗ (X) Here, we have  −E         e(X) e(X) e(X) ∗ − 1 µ1 (X) < E − 1 (µ1 (X) − µ1 (X)) < E − 1 µ1 (X) , e∗ (X) e∗ (X) e∗ (X) 20 References and       e(X) e(X) ∗ (16) 0<E − 1 µ1 (X) < 2 · E − 1 µ1 (X) . e∗ (X) e∗ (X) h  i 2. Assuming that E ee(X) − 1 µ (X) < 0: ∗ (X) 1  E      e(X) e(X) ∗ − 1 (µ1 (X) − µ1 (X)) < −E − 1 µ1 (X) , e∗ (X) e∗ (X) Here, we have          e(X) e(X) e(X) ∗ − 1 µ1 (X) < E − 1 (µ1 (X) − µ1 (X)) < −E − 1 µ1 (X) , e∗ (X) e∗ (X) e∗ (X)       e(X) e(X) ∗ − 1 µ1 (X) < E − 1 µ1 (X) < 0 e∗ (X) e∗ (X) E (17) 2·E and by (16) and (17)       e(X) e(X) ∗ E − 1 µ1 (X) ≤ 2 · E − 1 µ1 (X) . e∗ (X) e∗ (X)  Proof of Theorem 13. a) We have that       e(X) e(X) e(X) ∗ ∗ cov ∗ , µ1 (X) − cov ∗ , µ (X) = E − 1 (µ1 (X) − µ1 (X)) . e (X) e (X) 1 e∗ (X)  by µ∗1 = µ1 . Also,       e(X) e(X) e(X) cov ∗ , µ1 (X) + E ∗ − 1 E [µ1 (X)] = E − 1 µ1 (X) . e (X) e (X) e∗ (X)  Further, assuming that        e(X) e(X) e(X) ∗ e(X) cov ∗ , µ1 (X) − cov ∗ , µ (X) < cov ∗ , µ1 (X) + E ∗ − 1 µ1 , e (X) e (X) 1 e (X) e (X)  it follows that  E      e(X) e(X) ∗ E < . − 1 (µ (X) − µ (X)) − 1 µ (X) 1 1 1 e∗ (X) e∗ (X) c) see proof of Theorem 12.  References 21 Proof of Theorem 14. 1. Assuming that: h i e(X)  E µ (X) ∗ 1 e (X) e(X) h i cov ∗ , µ1 (X) > 0 ⇐⇒ − µ1 > 0 e(X) e (X) E e∗ (X)  Here, we have h i e(X)  E µ (X) 1 ∗ e (X) e(X) h i h i − + µ1 < E − 1 (µ1 (X) − µ∗1 (X)) < − µ1 , e∗ (X) E ee(X) E ee(X) ∗ (X) ∗ (X)          e(X) e(X) e(X) e(X) ∗ , µ1 (X) < E ∗ − 1 (µ (X) − µ (X)) < cov , µ (X) , −cov ∗ E 1 1 1 e (X) e (X) e∗ (X) e∗ (X) E h e(X) µ (X) e∗ (X) 1 i   and (18) h i h i    cov e(X) , µ1 (X)       cov e(X) , µ1 (X) e∗ (X) e∗ (X) e(X) e(X) e(X) ∗ h i h i E − 1 µ1 (X) − <E − 1 µ1 (X) < E − 1 µ1 (X) + e∗ (X) e∗ (X) e∗ (X) E e(X) E e(X) e∗ (X) e∗ (X) 2. Assuming that: h i e(X)  E µ (X) e∗ (X) 1 e(X) h i cov ∗ , µ1 (X) < 0 ⇐⇒ − µ1 < 0, e (X) E ee(X) ∗ (X)  then it follows that E h i   E ee(X) ∗ (X) µ1 (X) e(X) h i h i − 1 (µ1 (X) − µ∗1 (X)) < − − µ1 < E + µ1 e∗ (X) E ee(X) E ee(X) ∗ (X) ∗ (X)          e(X) e(X) e(X) e(X) ∗ , µ1 (X) < E ∗ E − 1 (µ (X) − µ (X)) < −cov , µ (X) , cov ∗ 1 1 1 e (X) e (X) e∗ (X) e∗ (X) h e(X) µ (X) e∗ (X) 1 i  and (19) h i h i    cov e(X) , µ1 (X)       cov e(X) , µ1 (X) ∗ ∗ e (X) e (X) e(X) e(X) e(X) h i h i E <E , − 1 µ1 (X) + − 1 µ∗1 (X) < E − 1 µ1 (X) − ∗ (X) ∗ (X) e(X) e∗ (X) e e E E e(X) e∗ (X) e∗ (X) hence by (18) and (19) we conclude that E h e(X) e∗ (X)  i − 1 µ1 (X) − cov h i e(X) ,µ (X) e∗ (X) 1 h i e(X) E e∗ (X) <E h e(X) e∗ (X)  i h  i − 1 µ∗1 (X) < E ee(X) ∗ (X) − 1 µ1 (X) + cov  Proof of Theorem 15. For a) assuming µ∗1 = µ1 implies        e(X) e(X) ∗ e(X) ∗ cov ∗ , µ1 (X) − cov ∗ , µ (X) = E − 1 (µ1 (X) − µ1 (X)) . e (X) e (X) 1 e∗ (X) h i e(X) ,µ (X) e∗ (X) 1 h i e(X) E e∗ (X) , 22 References Also, cov h i e(X) e∗ (X) , µ1 (X) E h e(X) e∗ (X) i E = h i e(X) e∗ (X) µ1 (X) E h e(X) e∗ (X) i − µ1 , and by i h e(X)  , µ (X) cov ∗ 1 e (X) e(X) e(X) ∗ i h , cov ∗ , µ1 (X) − cov ∗ , µ1 (X) < e (X) e (X) E ee(X) ∗ (X)    it follows that i h e(X)   µ (X) E ∗ 1 e (X) e(X) h i E − µ1 . − 1 (µ1 (X) − µ∗1 (X)) < ∗ e (X) E ee(X) ∗ (X) h  i h i e(X) For b) we use that if E ee(X) − 1 µ (X) and cov , µ (X) are both positive ∗ (X) 1 1 e∗ (X)  then,  E          e(X) e(X) e(X) e(X) − 1 µ1 (X) + cov ∗ , µ1 (X) = E − 1 µ1 (X) + cov ∗ , µ1 (X) e∗ (X) e (X) e∗ (X) e (X) and           e(X) e(X) e(X) e(X) − E − 1 µ1 (X) + cov ∗ , µ1 (X) < E − 1 µ1 (X) + cov ∗ , µ1 (X) . e∗ (X) e (X) e∗ (X) e (X) h  i h i e(X) If E ee(X) ∗ (X) − 1 µ1 (X) and cov e∗ (X) , µ1 (X) are both negative, then we have  E          e(X) e(X) e(X) e(X) − 1 µ1 (X) + cov ∗ , µ1 (X) < E − 1 µ1 (X) + cov ∗ , µ1 (X) , e∗ (X) e (X) e∗ (X) e (X) and  − E          e(X) e(X) e(X) e(X) − 1 µ1 (X) + cov ∗ , µ1 (X) = E − 1 µ1 (X) + cov ∗ , µ1 (X) , e∗ (X) e (X) e∗ (X) e (X) and the necessary condition from Theorem 14 follows.  Gaussian, identity OR Gaussian, identity OR Binomial, cauchit Gamma, identity PS OR Design C Binomial, logit PS Design B Binomial, logit Class PS Design A Models Binomial, logit Gaussian, identity X1 , X2 , X12 , X22 , X3 Gaussian, identity X1 , X2 , X12 , X22 , X3 Binomial, logit X1 , X2 , X12 , X22 , X3 Gaussian, identity X1 , X2 , X12 , X22 , X3 X1 , X2 , X12 , X22 , X3 Binomial, logit Class X1 , X2 , X3 X1 , X2 , X3 X1 , X2 , X3 X1 , X2 , X3 X1 , X2 , X22 , X3 X1 , X2 , X22 , X3 Linear predictor MISSPECIFIED MODEL X1 , X2 , X12 , X22 , X3 α1 = (4, 1.1, 0.1, 0.5, 0.3, 0.2) β = (−1, 0.6, 0.1, 0.9, 0.1, 0.7), α0 = (3, 0.5, 0.2, 0.5, 0.2, 0.2) Linear predictor and parameter values TRUE MODEL Table 1. Simulation Designs A, B and C References 23 24 References Table 2. Simulation results ESTIMATORS ˆ∗ ∆ ˆ∗ ∆ IPW1 n Models 500 True 1000 5000 Design ˆ∗ ∆ DR IPW2 Bias SD MSE Bias SD MSE Bias SD MSE 0.018 0.368 0.136 0.013 0.138 0.019 <0.001 0.11 0.012 False A 0.118 0.390 0.166 0.019 0.136 0.019 0.021 0.119 0.015 False B 0.262 0.324 0.174 0.033 0.126 0.017 0.024 0.110 0.013 False C 0.229 0.349 0.174 -0.061 0.128 0.020 0.037 0.115 0.015 0.010 0.254 0.065 0.002 0.098 0.010 < 0.001 0.075 0.006 False True A 0.112 0.270 0.085 0.008 0.097 0.009 0.018 0.079 0.007 False B 0.260 0.214 0.113 0.034 0.088 0.009 0.025 0.078 0.007 False C 0.243 0.222 0.108 -0.056 0.092 0.012 0.043 0.081 0.008 0.007 0.107 0.011 0.005 0.044 0.002 0.003 0.035 0.001 False True A 0.112 0.116 0.026 0.013 0.044 0.002 0.025 0.037 0.002 False B 0.260 0.090 0.076 0.033 0.039 0.003 0.025 0.036 0.002 False C 0.226 0.096 0.060 -0.057 0.040 0.005 0.040 0.036 0.003 References 25 Table 3. Asymptotic approximations from Designs A, B and C. Design A Parameter B C µ1 11.127 11.127 12.130 µ∗1 11.092 11.098 12.097 µ0 8.628 8.628 9.633 µ∗0 8.578 8.564 9.582 ˆ∗ Bias(∆ IPW1 ) ˆ Bias(∆∗ ) 0.096 0.264 0.213 0.007 0.033 -0.057 ˆ∗ Bias(∆ 0.017 0.025 0.037 ˆ∗ Bias1 (∆ IPW1 ) ˆ Bias1 (∆∗ ) 0.024 0.128 0.130 -0.028 0.013 -0.089 ˆ∗ (∆ 0.009 0.009 0.029 1.005 1.010 1.019 -0.029 0.015 -0.095 -0.040 0.006 -0.121 0.060 0.113 0.224 0.030 0.128 0.130 0.019 0.119 0.102 ˆ ∗IPW ) Bias2 (∆ 1 ˆ ∗IPW ) Bias2 (∆ 0.076 0.137 0.083 0.039 0.022 0.031 ˆ∗ (∆ 0.011 0.018 0.008 0.995 0.987 0.995 -0.037 -0.017 -0.033 -0.026 -0.004 -0.024 -0.038 0.111 -0.052 -0.074 -0.128 -0.085 -0.065 -0.114 -0.075 IPW2 DR ) IPW2 Bias1 DR ) h i E ee(X) ∗ (X) h i cov ee(X) ∗ (X) , µ1 (X) h i ∗ cov ee(X) ∗ (X) , µ1 (X) h i E ee(X) − 1 µ1 ∗ h (X)  i E ee(X) ∗ (X) − 1 µ1 (X) h i  ∗ E ee(X) ∗ (X) − 1 µ1 (X) 2 Bias2 DR ) h i 1−e(X) E 1−e ∗ h (X) i 1−e(X) cov 1−e∗ (X) , µ0 (X) h i 1−e(X) ∗ cov 1−e ∗ (X) , µ0 (X) h i 1−e(X) E 1−e − 1 µ0 ∗ h (X)  i 1−e(X) E 1−e − 1 µ (X) ∗ (X) 0 h  i 1−e(X) E 1−e∗ (X) − 1 µ∗0 (X)
10math.ST
1 ND-Tree-based update: a Fast Algorithm for the Dynamic Non-Dominance Problem arXiv:1603.04798v2 [cs.DS] 7 Nov 2017 Andrzej Jaszkiewicz, Thibaut Lust Abstract—In this paper we propose a new method called NDTree-based update (or shortly ND-Tree) for the dynamic nondominance problem, i.e. the problem of online update of a Pareto archive composed of mutually non-dominated points. It uses a new ND-Tree data structure in which each node represents a subset of points contained in a hyperrectangle defined by its local approximate ideal and nadir points. By building subsets containing points located close in the objective space and using basic properties of the local ideal and nadir points we can efficiently avoid searching many branches in the tree. ND-Tree may be used in multiobjective evolutionary algorithms and other multiobjective metaheuristics to update an archive of potentially non-dominated points. We prove that the proposed algorithm has sub-linear time complexity under mild assumptions. We experimentally compare ND-Tree to the simple list, Quad-tree, and M-Front methods using artificial and realistic benchmarks with up to 10 objectives and show that with this new method substantial reduction of the number of point comparisons and computational time can be obtained. Furthermore, we apply the method to the non-dominated sorting problem showing that it is highly competitive to some recently proposed algorithms dedicated to this problem. Index Terms—Multiobjective optimization, Pareto archive, Many-objective optimization, Dynamic non-dominance problem, Non-dominated sorting I. I NTRODUCTION I N this paper we consider the dynamic non-dominance problem [1], i.e. the problem of online update of a Pareto archive with a new candidate point. The Pareto archive is composed of mutually non-dominated points and this property must remain fulfilled following the addition of the new point. The dynamic non-dominance problem is typically used in multiobjective evolutionary algorithms (MOEAs) and more generally in other multiobjective metaheuristics (MOMHs), whose goal is to generate a good approximation of the Pareto front. Many MOEAs and other MOMHs use an external archive of potentially non-dominated points, i.e. a Pareto archive containing points not dominated by any other points generated so far, see e.g. [2], [3], [4], [5], [6], [7], [8], [9]. We consider here MOEAs that generate iteratively new candidate points and use them immediately to update a Pareto archive. Updating a Pareto archive with a new point y means that: • y is added to the Pareto archive if it is non-dominated w.r.t. any point in the Pareto archive, A. Jaszkiewicz is with Poznan University of Technology, Faculty of Computing, Institute of Computing Science, ul. Piotrowo 2, 60-965 Poznan, Poland, e-mail: [email protected]. T. Lust is with Sorbonne Universités, UPMC, Université Paris 06, CNRS, LIP6, UMR 7606, F-75005, Paris, France, e-mail: [email protected]. all points dominated by y are removed from the Pareto archive. The time needed to update a Pareto archive, in general, increases with a growing number of objectives and a growing number of points. In some cases it may become a crucial part of the total running time of a MOEA. The simplest data structure for storing a Pareto archive is a plain list. When a new point y is added, y is compared to all points in the Pareto archive until either all points are checked or a point dominating y is found. In order to speed up the process of updating a Pareto archive some authors proposed the use of specialized data structures and algorithms, e.g. Quad-tree [10]. However, the results of computational experiments reported in literature are not conclusive and in some cases such data structures may in fact increase the update time compared to the simple list. A frequently used approach allowing reduction of the time needed to update a Pareto archive is the use of bounded archives [11] where the number of points is limited and some potentially non-dominated points are discarded. Please note, however, that such an approach always reduces the quality of the archive. In particular, one of the discarded points could be the one that would be selected by the decision maker if the full archive was known. Bounded archives may be especially disadvantageous in the case of many-objective problems, since with a growing number of dimensions it is more and more difficult to represent a large set with a smaller sample of points. The use of bounded archives may also lead to some technical difficulties in MOEAs (see [11]). Summarizing, if an unbounded archive can be efficiently managed and updated, it is advantageous to use this kind of archive. In this paper, our contribution is fourfold: firstly, we propose a new method, called ND-Tree-based update, for the dynamic non-dominance problem. The method is based on a dynamic division of the objective space into hyperrectangles, which allows to avoid many comparisons of objective function values. Secondly, we show that the new method has sub-linear time complexity under mild assumptions. Thirdly, a thorough experimental study on different types of artificial and realistic sets shows that we can obtain substantial computational time reductions compared to state-of-the-art methods. Finally, we apply ND-Tree-based update to the non-dominated sorting problem obtaining promising results in comparison to some recently proposed dedicated algorithms. The remainder of the paper is organized as follows. Basic definitions related to multiobjective optimization are given in Section II. In Section III, we present a state of the art of the methods used for online updating a Pareto archive. The main contribution of the paper, i.e. ND-Tree-based update method • 2 is described in Section IV. Computational experiments are reported and discussed in Section V. In sections VI, ND-Treebased is applied to the non-dominated sorting problem. II. BASIC DEFINITIONS A. Multiobjective optimization We consider a general multiobjective optimization (MO) problem with a feasible set of solutions X and p objective functions yk (x) to minimize. The image of the feasible set in the objective space is a set of points Y = y(X ) where y(x) = (y1 (x), y2 (x), . . . , yp (x)). In MO, points are usually compared according to the Pareto dominance relation: Definition 1. Pareto dominance relation: we say that a point u = (u1 , ..., up ) dominates a point v = (v1 , ..., vp ) if, and only if, uk ≤ vk ∀ k ∈ {1, . . . , p} ∧ ∃ k ∈ {1, . . . , p} : uk < vk . We denote this relation by u  v. Definition 2. Non-dominated point: a point y ∗ corresponding to a feasible solution is called non-dominated if there does not exist any other point y ∈ Y such that y  y ∗ . The set YN of all non-dominated points is called Pareto front. Definition 3. Coverage relation: we say that a point u covers a point v if u  v or u = v. We denote this relation by u  v. Please note that coverage relation is sometimes referred to as weak dominance [12]. Definition 4. Mutually non-dominated relation: we say that two points are mutually non-dominated or non-dominated w.r.t. each other if neither of the two points covers the other one. Definition 5. Pareto archive (YN ): set of points such that any pair of points in the set are mutually non-dominated, i.e ∀y ∈ YN , @y 0 ∈ YN | y 0  y. In the context of MOEAs, the Pareto archive contains the mutually non-dominated points generated so far (i.e. at a given iteration of a MOEA) that approximates the Pareto front YN . In other words YN contains points that are potentially nondominated at a given iteration of the MOEA. Please note that in MOEAs not only points but also representations of solutions are preserved in the Pareto archive, but the above definition is sufficient for the purpose of this paper. The new method ND-Tree-based update is based on the (approximate) local ideal and nadir points that we define below. Definition 6. The local ideal point of a subset S ⊆ YN denoted as z ∗ (S) is the point in the objective space composed of the best coordinates of all points belonging to S, i.e. zk∗ (S) = min{yk }, ∀ k ∈ {1, . . . , p}. A point zb∗ (S) such that y∈S zb∗ (S)  z ∗ (S) will be called Approximate local ideal point. Naturally, the (approximate) local ideal point covers all points in S. Definition 7. The local nadir point of a subset S ⊆ YN denoted as z∗ (S) is the point in the objective space composed of the worst coordinates of all points belonging to S, i.e. z∗k (S) = max{yk }, ∀ k ∈ {1, . . . , p}. A point zb∗ (S) such y∈S that z∗ (S)  zb∗ (S) will be called Approximate local nadir point. Naturally, the (approximate) local nadir point is covered by all points in S. B. Dynamic non-dominance problem The problem of updating a Pareto archive (also called nondominance problem), can be divided into two classes: the static non-dominance problem is to find the set of non-dominated points YN among a set of points Y . The other class is the dynamic non-dominance problem [1] that typically occurs in MOEAs. We formally define this problem as follows. Consider a candidate point y and a Pareto archive YN . The problem is to update YN with y and consists in the following operations. If y is covered by at least one point in YN , y is discarded and YN remains unchanged. Otherwise, y is added to YN . Moreover, if some points in YN are dominated by y, all these points are removed from YN , in order to keep only mutually non-dominated points (see Algorithm 1). Algorithm 1 DynamicNonDominance Parameter l: A Pareto archive YN Parameter ↓: New candidate point y if (@ y 0 ∈ YN | y 0  y) then YN ← YN ∪ {y} for each (y 0 ∈ YN | y  y 0 ) do YN ← YN \{y 0 } In this work we consider only the dynamic non-dominance problem. Note that in general static problems may be solved more effectively than their dynamic counterparts since they have access to richer information. Indeed, some efficient algorithms for static non-dominance problem have been proposed, see [13], [14], [15], [16]. MOEAs and other MOMHs usually update the Pareto archive using the dynamic version of the non-dominance problem, i.e. the Pareto archive is updated with each newly generated candidate point. In some cases it could be possible to store all candidate points and then solve the static nondominance problem. The latter approach has, however, some disadvantages: • MOEAs need to store not only points in the objective space but also full representations of solutions in the decision space. Thus, storing all candidate points with corresponding solutions may be very memory consuming. • Some MOEAs use the Pareto archive during the run of the algorithm, i.e. Pareto archive is not just the final output of the algorithm. For example in [17], one of the parents is selected from the Pareto archive. In [7] the success of adding a new point to the Pareto archive influences the probability of selecting weight vectors in further iterations. The same applies to other MOMHs as well. For example, the Pareto local search (PLS) method [18] works directly with the Pareto archive and searches 3 neighborhood of each solution from the archive. In such methods, computation of the Pareto archive cannot be postponed till the end of the algorithm. Note that as suggested in [19] the dynamic non-dominance problem may also be used to speed up the non-dominated sorting procedure used in many MOEAs. As the Pareto archive contains all non-dominated points generated so far the first front is immediately known and the non-dominated sorting may be applied only to the subset of dominated points. Using this technique, Drozdı́k et al. showed that their new method called M-Front could obtain better performance than Deb’s fast nondominated sorting [20] and Jensen-Fortin’s algorithm [21], [22], one of the fastest non-dominated sorting algorithms. III. S TATE OF THE ART We present here a number of methods for the dynamic non-dominance problem proposed in literature and used in the comparative experiment. This review is not supposed to be exhaustive. Other methods can be found in [23], [24] and reviews in [25], [26]. We describe linear list, Quad-tree and one recent method, M-Front [19]. A. Linear List 1) General case: In this structure, a new point is compared to all points in the list until a covering point is found or all points are checked. The point is only added if it is nondominated w.r.t. all points in the list, that is in the worst case we need to browse the whole list before adding a point. The complexity in terms of number of points comparison is thus in O(N ) with N the size in the list. 2) Biobjective case: sorted list: When only two objectives are considered, we can use the following specific property: if we sort the list according to one objective (let’s say the first), the non-dominated list is also sorted according to the second objective. Therefore, roughly speaking, updating the list can be efficiently done in the following way. We first determine the potential position i of the new candidate point in the sorted list according to its value of the first objective, with a binary search. If the new point is not dominated by the preceding one in the list (if there is one), the new point is not dominated and can be inserted at position i. If the new point has been added, we need to check if there are some dominated points: we browse the next points in the list, until a point is found that has a better evaluation according to the second objective. All the points found that have a worse evaluation according to the second objective have to be removed since they are dominated by the new point. The worst-case complexity is still in O(N ) since it can happen that a new point has to be compared to all the other points (in the special case where we add a new point in the first position and all the points in the sorted list are dominated by this new point). But on average, experiments show that the behavior of this structure for handling biobjective updating problems is much better than the simple list. The algorithm of this method is given in Algorithm 2 (for the sake of clarity, we only present the case where the candidate point y has a distinct value for the first objective compared to all the other points in the archive YN ). Algorithm 2 Sorted list Parameter l: A biobjective Pareto archive YN Parameter ↓: New candidate point y if YN = ∅ then YN ← YN ∪ {y} else - -| Looking for the position i of y in YN i ← BinarySearch(YN , y1 ) (i−1) if (i = 0) or (y2 < y2 ) then - -| y is added at position i in YN Insert(YN , y, i) j ←i+1 while (j < |YN |) and (y2 ≤ y2j ) do - -| y j is dominated YN ← YN \{y j } j ←j+1 B. Quad-tree The use of Quad-tree for storing potentially non-dominated points was proposed by Habenicht [27] and further developed by Sun and Steuer [28] and Mostaghim and Teich [10]. In Quad-tree, points are located in both internal nodes and leaves. Each node may have p2 children corresponding to each possible combination of results of comparisons on each objective where a point can either be better or not worse. In the case of mutually non-dominated points p2 − 2 children are possible since the combinations corresponding to dominating or covered points are not used. Quad-tree allows for a fast checking if a new point is dominated or covered. A weak point of this data structure is that when an existing point is removed its whole sub-tree has to be re-inserted to the structure. Thus, removal of a dominated point is in general costly. C. M-Front M-Front has been proposed relatively recently by Drozdı́k et al. [19]. The idea of of M-Front is as follows. Assume that in addition to the new point y a reference point ref relatively close to y and belonging to the Pareto archive YN is known. The authors define two sets: RSU (y, ref ) = {z ∈ YN | ∃k ∈ {1, . . . , p} : zk ≥ refk ∧ zk ≤ yk } RSL (y, ref ) = {z ∈ YN | ∃k ∈ {1, . . . , p} : zk ≥ yk ∧ zk ≤ refk } and prove that if a point z ∈ YN is dominated by y then it belongs to RSL (y, ref ) and if z dominates y then it belongs to RSU (y, ref ). Thus, it is sufficient to compare the new points to sets RSL (y, ref ) and RSU (y, ref ) only. To find all points with objective values in a certain interval M-Front uses additional indexes one for each objective. Each index sorts the Pareto archive according to one objective. To find a reference point close to y, M-Front uses the kd tree data structure. The k-d tree is a binary tree, in which each intermediate node divides the space into two parts based on a value of one objective. While going down the tree the algorithm cycles over particular objectives, selecting one 4 objective for each level. Drozdı́k et al. [19] suggest to store references to points in leaf nodes only, while intermediate nodes keep only split values. IV. ND-T REE - BASED UPDATE A. Presentation In this section we present the main contribution of the paper. The new method for updating a Pareto archive is based on the idea of recursive division of archive YN into subsets contained in different hyperrectangles. This division allows to considerably reduce the number of comparisons to be made. More precisely, consider a subset S ⊆ YN composed of mutually non-dominated points and a new candidate point y. Assume that some approximate local ideal zb∗ (S) and approximate local nadir points zb∗ (S) of S are known. In other words, all points in S are contained in the axes-parallel hyperrectangle defined by zb∗ (S) and zb∗ (S). We can define the following simple properties that allow to compare a new point y to the whole set S: Property 1. If y is covered by zb∗ (S), then y is covered by each point in S and thus can be rejected. This property is a straightforward consequence of the transitivity of the coverage relation. Property 2. If y covers zb∗ (S), then each point in S is covered by y. This property is also a straightforward consequence of the transitivity of the coverage relation. Property 3. If y is non-dominated w.r.t. both zb∗ (S) and zb∗ (S), then y is non-dominated w.r.t. each point in S. Proof. If y is non-dominated w.r.t. zb∗ (S) then there is at least one objective on which y is worse than zb∗ (S) and thus worse than each point in S. If y is non-dominated w.r.t. zb∗ (S) then there is at least one objective on which y is better than zb∗ (S) and thus better than each point in S. So, there is at least one objective on which y is better and at least one objective on which y is worse than each point in S. If none of the above properties holds, i.e. y is neither covered by zb∗ (S), does not cover zb∗ (S), nor is non-dominated w.r.t. both zb∗ (S) and zb∗ (S), then all situations are possible, i.e. y may either be non-dominated w.r.t. all points in S, covered by some points in S or dominate some points in S. This can be illustrated by showing examples of each of the situations. Consider for example a set S = {(1, 1, 1), (0, 2, 2), (2, 2, 0)} with zb∗ (S) = z ∗ (S) = (0, 1, 0) and zb∗ (S) = z∗ (S) = (2, 2, 2). A new point (1, 1, 0) dominates a point in S, a new point (1, 1, 2) is dominated (thus covered) by a point in S, and points (0, 3, 0) and (2, 0, 1) are non-dominated w.r.t. all points in S. The properties are graphically illustrated for the biobjective case in Figure 1. As can be seen in this figure, in the biobjective case, if y is covered by zb∗ (S) and y is nondominated w.r.t. zb∗ (S) then y is dominated by at least one point in S. Note, however, that this does not hold in the case of three and more objectives as shown in the above example - the point (0, 3, 0) is covered by zb∗ (S) = (0, 1, 0), non-dominated w.r.t. zb∗ (S) = (2, 2, 2) and (0, 3, 0) is not dominated by any points in S. Fig. 1. Comparison of a new point to all points in set S based on comparisons to zb∗ (S) and zb∗ (S) only. In fact it is possible to distinguish more specific situations when none of the three properties hold, e.g. a situation when a new point may be covered but cannot dominate any point, but since we do not distinguish them in the proposed algorithm we do not define them formally. The above properties allow in some cases to quickly compare a new candidate point y to all points in set S without the need for further comparisons to individual points belonging to S. Such further comparisons are necessary only if none of the three properties hold. Intuitively, the closer the approximate local ideal and nadir points the more likely it is that further comparisons can be avoided. To obtain close approximate local ideal and nadir points we should: • Split the whole set of non-dominated points into subsets of points located close in the objective space. • Have good approximations of the exact local ideal and nadir points. On the other hand calculation of the exact points may be computationally demanding and a reasonable approximation may assure the best overall efficiency. Based on these properties, we can now define the ND-Tree data structure. Definition 8. ND-Tree data structure is a tree with the following properties: 1) With each node n is associated a set of points S(n). 2) Each leaf node contains a list L(n) of points and S(n) = L(n). 3) For each internal node n, S(n) is the union of disjoint sets associated with all children of n. 4) Each node n stores an approximate ideal point zb∗ (S(n)) and approximate nadir point zb∗ (S(n)). 5) If n0 is a child of n, then zb∗ (S(n))  zb∗ (S(n0 )) and zb∗ (S(n0 ))  zb∗ (S(n)). The algorithm for updating a Pareto archive with ND-Tree is given in Algorithm 3. The idea of the algorithm is as follows. We start by checking if the new point y is covered or nondominated w.r.t. all points in YN by going through the nodes 5 of ND-Tree and skipping children (and thus their sub-trees) for which Property 3 holds. This procedure is presented in Algorithm 4. The new point is first compared to the approximate ideal point (zb∗ (S(n)) and nadir point (zb∗ (S(n)) of the current node. If the new point is dominated by zb∗ (S(n) it is immediately rejected (Property 1). If zb∗ (S(n) is covered, the node and its whole sub-tree is deleted (Property 2). Otherwise if zb∗ (S(n))  y or y  zb∗ (S(n)), the node needs to be analyzed. If n is an internal node we call the algorithm recursively for each child. If n is a leaf node, y may be dominated by or dominate some points of n and it is necessary to browse the whole list L(n) of the node n. If a point dominating y is found, y is rejected, and if a point dominated by y is found, the point is deleted from L(n). If after checking ND-Tree the new point was found to be non-dominated it is inserted by adding it to a close leaf (Algorithm 5). To find a proper leaf we start from the root and always select a child with closest distance to y. As a distance measure we use the Euclidean distance to the middle point, i.e. a point lying in the middle of line segment connecting approximate ideal and approximate nadir points. Once we have reached a leaf node, we add the point y to the list L(n) of the node and possibly update the ideal and nadir points of the node n (Algorithm 7). However, if the size of L(n) became larger than the maximum allowed size of a leaf set, we need to split the node into a predefined number of children. To create children that contain points that are more similar to each other than to those in other children, we use a simple clustering heuristic based on Euclidean distance (see Algorithm 6). The approximate local ideal and nadir points are updated only when a point is added. We do not update them when point(s) are removed since it is a more complex operation. This is why we deal with approximate (not exact) local ideal and nadir points. Algorithm 3 ND-Tree-based update Parameter l: A Pareto archive YN organized as ND-Tree Parameter ↓: New candidate point y if YN = ∅ then Create a leaf node n with L(n) = {y} and use it as a root else n ← root node if UpdateNode(n l,y ↓) then Insert(n l,y ↓) B. Comparison to existing methods Like other methods ND-Tree-based update uses a tree structure to speed up the process of updating the Pareto archive. The tree and its use is, however, quite different from Quad-tree or k-d tree used in M-Front. For example, both Quad-tree or k-d tree partition the objective space based on comparisons on particular objectives, while in ND-Tree the space is partitioned Algorithm 4 UpdateNode Parameter l: A node n Parameter ↓: New candidate point y Parameter ↑: Boolean (True if y is not dominated by any points in the tree of root n, False otherwise) if zb∗ (S(n))  y then - -| Property 1, y is rejected return False else if y  zb∗ (S(n)) then - -| Property 2 Remove n and its whole sub-tree else if zb∗ (S(n))  y or y  zb∗ (S(n)) then if n is a leaf node then for each z ∈ L(n) do if z  y then return False else if y  z then L(n) ← L(n)\{z} else for each Child n0 of n do if not UpdateNode (n0 l,y ↓) then return False else if n0 became empty then Remove n0 if there is only one child n0 remaining then Remove node n and use n0 in place of n else - -| Property 3 Skip this node return True Algorithm 5 Insert Parameter l: A node n Parameter ↓: New candidate point y if n is a leaf node then L(n) ← L(n) ∪ {y} UpdateIdealNadir (n l,y ↓) if Size of L(n) became larger than maximum size of a leaf set then Split (n l) else Find child n0 of n being closest to y Insert(n0 l,y ↓) based on the distances of points. Both Quad-tree or k-d tree have strictly defined degrees. In k-d tree it is always two (binary tree) while in Quad-tree it depends on the number of objectives. In ND-Tree the degree is a parameter. In Quadtree the points are kept in both internal nodes and leaves, while ND-Tree keeps points in leaves only. In M-Front k-d tree is used to find an approximate nearest neighbor and the Pareto archive is updated using other structures (sorted lists for each objective). In our case, ND-Tree is the only data structure used 6 Algorithm 6 Split Parameter l: A node n Find the point z ∈ L(n) with the highest average Euclidean distance to all other points in L(n) Create a new child n0 with list set L(n0 ) = {z} L(n) ← L(n)\{z} UpdateIdealNadir (n0 l,z ↓) while The required number of children are not created do Find the point z ∈ L(n) with the highest average Euclidean distance to all points in all children of n 0 0 Create a new child n with an empty list set L(n ) L(n0 ) ← L(n0 ) ∪ {z} UpdateIdealNadir (n0 l,z ↓) L(n) ← L(n)\{z} while L(n) is not empty do z ← first point in L(n) Find child n0 of n being closest to z L(n0 ) ← L(n0 ) ∪ {z} UpdateIdealNadir (n0 l,z ↓) L(n) ← L(n)\{z} Algorithm 7 UpdateIdealNadir Parameter l: A node n Parameter ↓: New candidate point y Check in any component of y is lower than corresponding component in zb∗ (S(n)) or greater than corresponding component in zb∗ (S(n)) and update the points if necessary if zb∗ (S(n)) or zb∗ (S(n)) have been changed then if n is not a root then np ← parent of n UpdateIdealNadir (np l,y ↓) Fig. 2. Example of fully unbalanced ND-Tree. In this case: T (N ) = 4 + T (N − 1) where N is the number of points in the archive and T (N ) is the number of point comparisons needed to update an archive of size N . Term 4 appears because we check two children and for each child approximate ideal and nadir points are compared. Solving the recurrence we get: T (N ) = 4 + 4N (2) Thus, the algorithm has O(N ) time complexity. We are not aware of any result showing that the worstcase time complexity of any algorithm for the dynamic nondominance problem may be lower than O(N ) in terms of point comparisons. So, our method does not improve the worstcase complexity but according to our experiments performs significantly better in practical cases. 2) Best case: Assume first that the candidate point is not covered by any point in YN . In the optimistic case, at each intermediate node the points are equally split into predefined number of children and there is only one child that has to be further processed (i.e. there is only one child for which none of the three properties hold). In fact we could consider even more optimistic distribution of points when the only node that has to be processed contains just one point, but the equal split is much more realistic assumption. In this case: T (N ) = 2C + T (N/C) = Θ(logC N ) by the algorithm. C. Computational complexity 1) Worst case: The worst case for the UpdateNode and Insert algorithm is when we need to compare the new point to each intermediate node of the tree. For example, consider the following particular case: two objectives, ND-Tree with maximum leaf size equal to 2, 2 children, and constructed by processing the following list of points (with K ∈ N∗ ): (0, 0), (1, -1), (2K , −2K ), (2K−1 , −2K−1 ),..., (4, -4), (2, -2). This list of points is constructed in such a way that the first two points are put in one leftmost leaf and the third point creates a separate leaf. Then each further point is closer to the child on the left side but finally after splitting the leftmost node the new point creates a new leaf. The ND-Tree obtained is shown in Figure 2. Consider now that the archive is updated with point (0.5, -0.5). This point will need to be compared to all N − 1 intermediate nodes and then to both points in leftmost leaf. (1) (3) where C is the number of children. If the candidate point is covered by a point in YN the UpdateNode algorithm may stop even earlier and there will be no need to run Insert algorithm. 3) Average case: Analysis and even definition of average case for such complex algorithms is quite difficult. The simplest case to analyze is when each intermediate node has two children which allows us to follow the analysis of well-known algorithms like binary search or Quicksort. If a node has N points then one of the two children may have 1, . . . , N − 1 points and the other child the remaining number of points. Assuming that each split has equal probability and only one child is selected: T (N ) = 4 + N −1 1 X T (k) N (4) k=1 Multiplying both sides by N : N T (N ) = 4N + N −1 X k=1 T (k) (5) 7 Assuming that N ≥ 2: (N − 1)T (N − 1) = 4(N − 1) + N −2 X T (k) (6) k=1 Subtracting equations 5 and 6: N T (N ) − (N − 1)T (N − 1) = 4N − 4(N − 1) + N −1 X T (k) − k=1 Simplifying: T (N ) = N −2 X T (k) (7) k=1 4 + T (N − 1) N (8) The main part of Split algorithm has constant time complexity since it depends only on the maximum size of a leaf set which is a constant parameter of the algorithm. UpdateIdealNadir algorithm goes up the tree starting from a leaf which is equivalent to going down the tree and selecting just one child. So, its analysis is exactly the same as of Insert algorithm. We also need to consider the complexity of the operation of removal of node n and its sub-tree. In the worst case, the removed node is the root, and thus all N point need to be removed. Such situation is very unlikely, since it happens when the new point dominates all points in the current archive. Typically, the new point will dominate only few points. Solving this recurrence: T (N ) = 4HN − 1 where HN is N-th harmonic number. Using well-known properties of harmonic numbers we get T (N ) = Θ(log N ). We can expect, however, that in realistic cases more than one child will need to be further processed in UpdateNode algorithm because the candidate point may cover approximate nadir points or may be covered by approximate ideal points of more than one child. Assume that the probability of selecting both children is equal to c1 . Then: T (N ) = 4 + 1 (1 + c1 ) N N −1 X T (k) (10) k=1 Following the above reasoning we get: N + c1 2 + T (N − 1) N N Solving this recurrence, we obtain: T (N ) = T (N ) = Γ(c1 + N + 1) 2 − Γ(N + 1) c1 (that can be checked by substituting (12) in (11)). Since Γ(N + α) lim =1 N →∞ Γ(N )N α (11) (12) (13) We have: T (N ) = Θ(N c1 ) V. C OMPUTATIONAL EXPERIMENTS (9) (14) and the algorithm remains sub-linear for any c1 < 1. In the worst case, both children need to be selected, so c1 = 1 and T(N ) = Θ(N ) which confirms the analysis presented above. This analysis may give only approximate insight into behaviour of the algorithm since in UpdateNode algorithm c1 will not be constant at each level. We may rather expect that while going down the tree from the root towards leaves the probability that two children will need to be processed will decrease because approximate nadir and ideal points of the children will lie closer. Anyway, this analysis shows that the performance of UpdateNode algorithm may be improved by decreasing the probability that a child has to be processed. This is why we try to locate in one node points lying close to each other in Insert and Split algorithms. In Insert algorithm always one child is processed, so the time complexity remains Θ(log N ) in average case. We will show results obtained with ND-Tree and other methods in two different cases: A) Results for artificially generated sets which allow us to easily control the number of points in the sets and the quality of the points. B) Results for sets generated by a MOEA, namely MOEA/D [2] for the multiobjective knapsack problem. We compare the simple list, sorted list (biobjective case), Quad-tree, M-Front and ND-Tree for these sets according to the CPU time [ms]. To avoid the influence of implementation details all methods were implemented from the scratch in C++ in as much homogeneous way as possible, i.e. when possible the same code was used to perform the same operations like Pareto dominance checks. For the implementation of Quad-tree, we use Quad-tree2 version as described by Mostaghim and Teich [10]. For M-Front, we use as much as possible the description found in the paper of Drozdı́k et al. [19]. However the authors do not give the precise algorithm of k-d tree used in their method. In our implementation of k-d tree, when a leaf is reached a new division is made using the average value of the current level objective. The split value is average between the value of new point and the point in the leaf. Also like in Drozdı́k et al. [19] the approximate nearest neighbor is found exactly as in the standard exact nearest neighbor search, but only four evaluations of the distance are allowed. Note that at https://sites.google.com/site/ndtreebasedupdate/ we present results of an additional experiment showing that for a higher number of objectives the details of the implementation of k-d tree do not have any substantial influence on the running time. We also noticed that a number of elements of M-Front can be improved to further reduce the running time. The improvement is in our opinion significant enough to call the new method M-Front-II. In particular in some cases MFront-II was several times faster than original M-Front in our computational experiments. The modifications we introduced are as follows: • In original M-Front the sets RSL (y, ref ) and RSU (y, ref ) are built explicitly and only then the points contained in these sets are compared to y. In M-Front-II we build them only implicitly, i.e. we 8 immediately compare the points that would be added to the sets to y. • We analyze the objectives in such a way that we start with objectives for which refk ≤ yk . In other words, we start with points from set RSU (y, ref ). Since many new points are dominated this allows to stop the search immediately when a point dominating y is found. Note that a similar mechanism is in fact used in original M-Front but only after the sets RSL (y, ref ) and RSU (y, ref ) are explicitly built. • The last modification is more technical. M-Front uses linked lists (std::list in C++) to store the indexes and a hash-table (std::unordered_map in C++) to link points with their positions in these lists. We observed, however, that even basic operations like iterating over the list are much slower with linked lists than with static or dynamic arrays (like std::vector in C++). Thus we use dynamic arrays for the indexes. In this case, however, there is no constant iterator that could be used to link the points with their positions in these indexes. So, we use a binary search to locate a position of a point in the sorted index whenever it is necessary. The overhead of the binary search is anyway smaller than the savings due to the use of faster indexes. For ND-Tree we use 20 as the maximum size of a leaf and p+1 as the number of children. These values of the parameters were found to perform well in many cases. We analyze the influence of these parameters later in this section. The code, as well as test instances and data sets, are available at https://sites.google.com/site/ndtreebasedupdate/. All of the results have been obtained on an Intel Core i7-5500U CPU at 2.4 GHz. A. Artificial sets 1) Basic, globally convex sets: The artificial sets are composed of n points with p objectives to minimize. The sets are created as follows. We generate randomly P n points y i in p p {0, . . . , Vmax } with the following constraint: k=1 (Vmax − i 2 2 yk ) ≤ Vmax . With this constraint, all the non-dominated points will be located inside the hypersphere with the center at (Vmax , . . . , Vmax ) and with a radius of length equal to Vmax . In order to control the quality P of the generated points, p i 2 we also add a quality constraint: ≥ i=k (Vmax − yk ) 2 (1 − ) ∗ Vmax . In this way, with a small , only high-quality points will be generated. We believe that it is a good model for points generated by real MOEAs since a good MOEA should generate points lying close to the true Pareto front. The hypersphere is a model of the true Pareto front and parameter  controls the maximum distance from the hypersphere. We have generated data sets composed of 100 000 and 200 000 points, with Vmax = 10000, and for p = 2 to 10. In the main experiment we use data sets with 100 000 points because for the larger sets running times of some methods became very long. Also because of very high running times for sets with many objectives, in the main experiment we used sets with up to 6 objectives. For each value of p, five different quality levels are considered: quality q1,  = 0.5 ; q2,  = 0.25 ; q3,  = 0.1 ; q4,  = 0.05 ; q5,  = 0.01. The fraction of non-dominated points grows both with increasing quality and number of objectives and in extreme cases all points may be non-dominated (see Table I). TABLE I N UMBERS OF NON - DOMINATED POINTS IN ARTIFICIAL SETS p Quality 2 2 2 2 2 3 3 3 3 3 4 4 4 4 4 5 5 5 5 5 6 6 6 6 6 q1 q2 q3 q4 q5 q1 q2 q3 q4 q5 q1 q2 q3 q4 q5 q1 q2 q3 q4 q5 q1 q2 q3 q4 q5 |YN | convex 519 713 1046 1400 2735 4588 6894 12230 19095 53813 14360 21680 39952 64664 98283 28944 42246 77477 96002 99975 45879 65195 96687 99788 100000 |YN | non-convex 379 613 1037 1454 2748 2587 5344 11497 18648 53255 6853 16420 37709 63140 98243 13437 34357 75796 95867 99975 22956 57966 96480 99786 100000 |YN | clustered 449 552 785 1059 1781 3729 5514 9720 15502 44173 11963 18120 35460 57725 97137 23966 38028 71063 93842 98521 40483 61096 94978 99652 99999 2) Globally non-convex sets: In order to test whether the global convexity of the above sets influences the behavior of the tested methods we have also generated sets whose Pareto fronts are globally non-convex. They were obtained by simply changing the sign of each objective in the basic sets. 3) Clustered sets: In these sets, the points are located in small clusters. We have generated sets composed of 100 clusters, where each cluster contains 1000 points (the sets are thus composed of 100 000 points). The sets have been obtained as follows: we start with the 200 000 points from the basic convex sets. We select from the set one random point, and we then select the 999 points closest to this point (using the Euclidean distance). We repeat this operation 100 times to obtain the 100 clusters of the sets. The shapes of exemplary biobjective globally convex, globally non-convex and clustered data sets can be seen at https: //sites.google.com/site/ndtreebasedupdate/. Each method was run 10 times for each set, with the points processed in a different random order for each run. The average running times for basic sets are presented in Figures 3 to 7. We use average values since the different values were generally well distributed around the average with small deviations. Please note that because of large differences the running time is presented in logarithmic scale. In addition, in Figure 8 we illustrate the evolution of the running times according to the number of objectives for the data sets of intermediate quality q3. In this case we use sets with up to 10 objectives. With 7 and more objectives even the sets of intermediate quality q3 contain almost only nondominated points (see Table I). This is why the running times 9 of the simple list are practically constant for 7 and more objectives, because the simple list boils down in this case to the comparison of each new point to all points in the list. The running times of all other methods including ND-Tree increase with a growing number of objectives, but ND-Tree remains 5.5 times faster than the second best method (Quad-tree) for sets with 10 objectives. Furthermore, we measured the number of comparisons of points with the dominance relation for the data sets of intermediate quality q3 with p = 2, ..., 10. For ND-Tree-based Fig. 6. CPU time (logarithmic scale) for five-objective convex data sets. Fig. 3. CPU time (logarithmic scale) for biobjective convex data sets. Fig. 7. CPU time (logarithmic scale) for six-objective convex data sets. Fig. 4. CPU time (logarithmic scale) for three-objective convex data sets. Fig. 8. CPU time (logarithmic scale) vs. number of objectives for convex data sets of quality q3. TABLE II P OINT COMPARISONS PER MS Method List M-Front M-Front-II ND-Tree Quad-tree Fig. 5. CPU time (logarithmic scale) for four-objective convex data sets. Comparisons per ms 26 752 3 476 8 370 17 733 9 040 10 update it includes also comparisons to the approximate ideal and nadir points and for Quad-tree comparisons to sub-nodes. The results are presented in Figure 9. Please note that the results for the two versions of M-Front overlap in the Figure. Fig. 10. CPU time (logarithmic scale) for three-objective non-convex data sets. Fig. 9. Number of point comparisons (logarithmic scale) vs. number of objectives for convex data sets of quality q3. The differences in running times cannot be fully explained by the number of point comparisons because the methods differ significantly in the number of point comparisons per milliseconds (see Table II). This ratio is highest for the simple list because this method performs very few additional operations. It is also relatively high for ND-Tree. Other methods perform many other operations than point comparisons that strongly influence their running times. This is particularly clear in comparison of M-Front and M-Front-II. These method perform the same number of point comparisons, but M-Front-II is several times faster than M-Front because in the latter method the sets RSL (y, ref ) and RSU (y, ref ) are built explicitly and this method uses slower linked lists. Overall, ND-Tree performs fewest number of point comparisons for data sets with p ≥ 4. These results indicate that ND-Tree-based update substantially reduces the number of comparisons with respect to the simple list. For example for p = 10, all points in the data set are non-dominated, thus on average each of the 100000 new points has to be compared to an archive composed of 49999.5 points, while with ND-Tree-based update it only requires 2029 point comparisons on average. The results obtained for non-convex and clustered sets were very similar to the results with basic sets. Thus, in Figures 10 to 13 we show only exemplary results for the three- and sixobjective cases. These results indicate that the running times of the tested methods are not substantially affected by the global shape of the Pareto front. 4) Discussion of the results for artificial sets: The main observations from this experiment are: • ND-Tree performs the best in terms of CPU time for all test sets with three and more objectives. In some cases the differences to other methods are of two orders of magnitude and in some cases the difference to the second best method is of one order of magnitude. NDTree behaves also very predictably, its running time grows slowly with increasing number of objectives and increasing fraction of non-dominated points. Fig. 11. CPU time (logarithmic scale) for six-objective non-convex data sets. Fig. 12. CPU time (logarithmic scale) for three-objective clustered data sets. 11 in this case and 10 runs for each method (see Figure 14). The CPU time is cumulative time of processing a given number of points. In addition, since the running time is much smaller for ND-Tree its results are presented in Figure 15 separately. We see that ND-Tree is the fastest method for any number of points and its cumulative running time grows almost linearly with the number of points. In other words, time of processing a single point is almost constant. Please note that unlike in other figures the linear scale is used in these two figures in order to make them more informative. Fig. 13. CPU time (logarithmic scale) for six-objective clustered data sets. • • • • • For biobjective instances sorted list is the best choice. In this case, M-Front and M-Front-II also behave very well since they become very similar to sorted list. The simple list obtains its best performances for data sets with many dominated points like p = 2 with lowest quality. In this case the new point is often dominated by many points, so the search process is quickly stopped after finding a dominating point. Quad-tree performs very badly for data sets with many dominated points, e.g. in biobjective instances where it is the worst method in all cases. In this case, many points added to Quad-tree are then removed and the removal of a point from Quad-tree is a costly operation. As discussed above when an existing point is removed its whole subtree has to be re-inserted to the structure. On the other hand, it is the second best method for most data sets with six and more objectives. M-Front-II is much faster than M-Front on data sets with larger fraction of dominated points. In this case, M-FrontII may find a dominating point faster without building explicitly the whole sets RSL (y, ref ) and RSU (y, ref ). The performance of both M-Front and M-Front-II deteriorates with an increasing number of objectives. With six and more objectives M-Front is the slowest method in all cases. Intuitively this can be explained by the fact that M-Front (both versions) uses each objective individually to reduce the search space. In the case of two objectives the values of one objective carry a lot of information since the order on one objective induces also the order on the other one. The more objectives, the less information we get from an order on one of them. Furthermore, sets RSL (y, ref ) and RSU (y, ref ) are in fact unions of corresponding sets for particular objectives, which also results in their growth. Finally, in many objective case, a reference point close on Euclidean distance does not need to be very close on each objective, since it will rather have a good balance of differences on many coordinates. In an additional experiment we analyzed the evolution of the running times of all methods with increasing number of points. We decided to use one intermediate globally convex data set with p = 4 and quality q3. We used 200 000 points Fig. 14. CPU time (linear scale) vs. the number of points for four-objective convex data sets of quality q3. Fig. 15. CPU time (linear scale) vs. the number of points for ND-Tree only (four-objective convex data sets of quality q3). ND-Tree has two parameters - the maximum size (number of points) of a leaf, and the number of children, so the question arises how sensitive it is to the setting of these parameters. To study it we again use the intermediate data set with p = 4 and quality q3 and run ND-Tree with various parameters, see Figure 16. Please note that number of children cannot be larger than the maximum size of a leaf +1 since after exceeding the maximum size the leaf is split into the given number of children. We see that ND-Tree is not very sensitive to the two parameters: the CPU time remains between about one and three seconds regardless of the values of the parameters. The best results are obtained with 20 for the maximum size of a leaf and with 6 for the number of children. 12 TABLE III N UMBERS OF NON - DOMINATED POINTS IN SETS GENERATED BY MOEA/D p 2 3 4 5 6 |YN | 140 1789 5405 10126 16074 Fig. 16. ND-Tree CPU time for different values of parameters (four-objective convex data sets of quality q3). Data series correspond to maximum leaf size. CPU time in linear scale. In our opinion the results confirm that ND-Tree performs relatively well for a wide range of the values of the parameters. In fact, it would remain the best method for this data set with any of the parameters settings tested. Fig. 17. CPU time (logarithmic scale) on MOEA/D sets. B. Sets generated by MOEA/D In order to test if the observations made for artificial sets hold for sets generated by real evolutionary algorithms, we use sets of points generated by well-known MOEA/D algorithm [2] for multiobjective multidimensional knapsack problem instances with 2 to 6 objectives. We used the code available at http://dces.essex.ac.uk/staff/zhang/webofmoead.htm [2]. We used the instances with 500 items available with the code with 2 to 4 objectives. The profits and weights of these instances were randomly generated uniformly between 1 and 100. We have generated ourselves the 5 and 6 objectives instances by adding random profits and weights, between 1 and 100. MOEA/D was run for at least 100 000 iterations and the first 100 000 points generated by the algorithm were stored for the purpose of this experiment. The numbers of non-dominated points are given in Table III. Figure 17 presents running times of each of the tested methods as well the running times of MOEA/D excluding the time needed to update the Pareto archive. These results confirm that the observations made for artificial sets also hold in the case of real sets. ND-Tree is the fastest method for three and more objectives. Quad-tree performs particularly badly in the biobjective case. Both versions of M-Front relatively deteriorate with a growing number of objectives. Furthermore, these results show that the time of updating the Pareto archive may be higher than the remaining running time of MOEA/D. In particular, for the six-objective instance the running time of M-Front is 5 times higher than the remaining running time of MOEA/D. The running time of the simple list, Quad-tree and M-Front-II are comparable to the remaining running time of MOEA/D, and only the running time of ND-Tree is 10 times shorter. This confirms that the selection of an appropriate method for updating the Pareto archive may have a crucial influence on the running time of a MOEA. We have also generated sets of points by applying another MOMH, namely Pareto local search [18] to solve the multiobjective traveling salesman problem (MOTSP). These results can be found at https://sites.google.com/site/ ndtreebasedupdate/ (the same conclusions apply). VI. ND-T REE - BASED NON - DOMINATED SORTING ND-Tree-based update may also be applied to the problem of the non-dominated sorting. This problem arises in the nondominated sorting-based MOEAs, e.g. NSGA-III [29] where a population of solutions needs to be assigned to different fronts based on their dominance relationships. We solve the non-dominated sorting problem in the very straightforward way, i.e. we find the first front by updating an initially empty Pareto archive with each point in the population. Then the points from the first front are removed from the population and the next front is found in the same way. This process is repeated until all fronts are found. We compare this approach to some recently proposed nondominated sorting algorithms, i.e. ENS-BS/SS [30] and DDANS [31]. ENS-BS/SS algorithm sorts the points lexicographically based on the values of objectives. Then it considers each solution using this order to efficiently find the last front that contains a point dominating the considered point. For each front this method in fact solves the dynamic non-dominance problem with the simple list and if the considered solution is non-dominated within this front it needs to be compared to each solution in this front. If there is just one front in the population, the method boils down to solving the dynamic nondominance problem with the simple list and requires O(N 2 ) comparisons. DDA-NS algorithm sorts the population according to each objective which requires O(N log N ) objective function comparisons and builds comparison matrices for each 13 objectives. Then it uses some matrix operations which in general have O(N 2 ) complexity to build the fronts. We also compare our algorithm to M-Front-II [19] applied in the same way as ND-Tree-based update. Please note that similarly to what was done in [31] we apply M-Front-II for finding each front, while in [19] only the first front was found by M-Front. Also, like [30], [31] we used populations of size 5000. We used both random populations drawn with uniform probability from a hypercube, and populations composed of 5000 randomly selected points from our data sets of intermediate quality q3. For each number of objectives 10 populations were drawn. The results are presented in Figures 18 to 21. We report both CPU times and the number of comparisons of points. We also show the number of fronts on the right y-axis. Please note that we do not show the number of comparisons for DDA-NS, since this algorithm does not explicitly compares points with the dominance relation. The slowest algorithm is DDA-NS. Our results are quite contradictory to the results reported in [31] where DDA-NS is the fastest algorithm in most cases. Please note, however, that in [31] the algorithms were implemented in MATLAB which, as the authors note, is very efficient in matrix operations. On the other hand, the CPU times reported in [31] are of orders of magnitude higher compared to our experiment which suggests rather that the MATLAB implementation of M-Front and ENS-BS/SS is quite inefficient. Fig. 19. #comparisons in non-dominated sorting algorithms for artificial sets with quality q3. Fig. 20. CPU times of non-dominated sorting algorithms for random populations. Fig. 18. CPU times of non-dominated sorting algorithms for artificial sets with quality q3. ENS-BS/SS performs well for populations with many fronts but its performance deteriorates when the number of fronts is reduced. As it was mentioned above if there is just one front in the population, the method boils down to the dynamic non-dominance problem solved with the simple list. This is why in the case of populations drawn from our sets which contain points of higher quality than random populations, and for higher numbers of objectives, where the populations often contain just one front, the number of comparisons saturates at a constant level. In most cases ND-Tree-based non-dominated sorting is the most efficient method in terms of both CPU time and the number of comparisons. These results are very promising but only preliminary and further experiments, especially with Fig. 21. #comparisons in non-dominated sorting algorithms for random populations. 14 populations generated by real MOEAs, are necessary. Please note that as suggested in [19] the practical efficiency of the non-dominated sorting in the context of a MOEA may be further improved by maintaining the first front in a Pareto archive. VII. C ONCLUSIONS We have proposed a new method for the dynamic nondominance problem. According to the theoretical analysis the method remains sub-linear with respect to the number of points in the archive under mild assumptions and the time of processing a single point observed in the computational experiments are almost constant. The results of computational experiments with both artificial data sets of various global shapes, as well as results with sets of points generated by two different multiobjective methods, i.e. MOEA/D evolutionary algorithm and Pareto local search metaheuristic, indicate that the proposed method outperforms competitive methods in the case of three- and more objective problems. In biobjective case the best choice remains the sorted list. We believe that with the proposed method for updating a Pareto archive, new state-of-the art results could be obtained for many multiobjective problems with more than two objectives. Indeed, results of our computational experiment indicate that the choice of an appropriate method for updating the Pareto archive may have crucial influence on the running time of multiobjective evolutionary algorithms and other metaheuristics especially in the case of higher number of objectives. Interesting directions for further research are to adapt NDTree to be able to deal with archives of a relatively large but bounded size or to solve the static non-dominance problem. We have also obtained promising results by applying NDTree-based update to the non-dominated sorting and comparing it to some state-of-the-art algorithms for this problem. Further experiments are, however, necessary especially with populations generated by real MOEAs. Furthermore, good results of ENS algorithm for populations with many fronts suggest that a combination of ENS with ND-Tree may be an interesting direction for further research. ACKNOWLEDGMENT The research of Andrzej Jaszkiewicz was funded by the the Polish National Science Center, grant no. UMO2013/11/B/ST6/01075. R EFERENCES [1] O. Schütze, “A new data structure for the nondominance problem in multi-objective optimization,” in Proceedings of the 2nd International Conference on Evolutionary Multi-criterion Optimization, ser. EMO’03. Berlin, Heidelberg: Springer-Verlag, 2003, pp. 509–518. [2] Q. Zhang and H. Li, “MOEA/D: A multiobjective evolutionary algorithm based on decomposition,” Evolutionary Computation, IEEE Transactions on, vol. 11, no. 6, pp. 712–731, 2007. [3] E. Zitzler, M. Laumanns, and L. Thiele, “SPEA2: Improving the Strength Pareto Evolutionary Algorithm,” Computer Engineering and Networks Laboratory (TIK), Swiss Federal Institute of Technology (ETH) Zurich, Zurich, Switzerland, Tech. Rep. 103, May 2001. [4] C. A. C. Coello, G. T. Pulido, and M. S. Lechuga, “Handling multiple objectives with particle swarm optimization,” IEEE Transactions on Evolutionary Computation, vol. 8, no. 3, pp. 256–279, June 2004. [5] S. Agrawal, B. K. Panigrahi, and M. K. Tiwari, “Multiobjective particle swarm algorithm with fuzzy clustering for electrical power dispatch,” IEEE Transactions on Evolutionary Computation, vol. 12, no. 5, pp. 529–541, Oct 2008. [6] B. Li, K. Tang, J. Li, and X. Yao, “Stochastic ranking algorithm for many-objective optimization based on multiple indicators,” IEEE Transactions on Evolutionary Computation, vol. 20, no. 6, pp. 924–938, Dec 2016. [7] X. Cai, Y. Li, Z. Fan, and Q. Zhang, “An external archive guided multiobjective evolutionary algorithm based on decomposition for combinatorial optimization,” IEEE Transactions on Evolutionary Computation, vol. 19, no. 4, pp. 508–523, Aug 2015. [8] S. Yang, M. Li, X. Liu, and J. Zheng, “A grid-based evolutionary algorithm for many-objective optimization,” IEEE Transactions on Evolutionary Computation, vol. 17, no. 5, pp. 721–736, Oct 2013. [9] L. Tang and X. Wang, “A hybrid multiobjective evolutionary algorithm for multiobjective optimization problems,” IEEE Transactions on Evolutionary Computation, vol. 17, no. 1, pp. 20–45, Feb 2013. [10] S. Mostaghim and J. Teich, “Quad-trees: A data structure for storing Pareto sets in multiobjective evolutionary algorithms with elitism,” in EMO, Book Series: Advanced Information and Knowledge, A. Abraham, L. Jain, and R. Goldberg, Eds. Springer-Verlag, 2004, pp. 81–104. [11] J. Fieldsend, R. Everson, and S. Singh, “Using unconstrained elite archives for multiobjective optimization,” IEEE Transactions on Evolutionary Computation, vol. 7, no. 3, pp. 305–323, June 2003. [12] W. Brockhoff, Theory of Randomized Search Heuristics: Foundations and Recent Developments. World Sc. Publ. Comp., 2010, ch. Theoretical aspects of evolutionary multiobjective optimization, pp. 101–139. [13] H. T. Kung, F. Luccio, and F. P. Preparata, “On finding the maxima of a set of vectors,” J. ACM, vol. 22, no. 4, pp. 469–476, Oct. 1975. [14] H. N. Gabow, J. L. Bentley, and R. E. Tarjan, “Scaling and related techniques for geometry problems,” in Proceedings of the Sixteenth Annual ACM Symposium on Theory of Computing, ser. STOC ’84. New York, NY, USA: ACM, 1984, pp. 135–143. [15] F. P. Preparata and M. I. Shamos, Computational Geometry: An Introduction. New York, NY, USA: Springer-Verlag New York, Inc., 1985. [16] P. Gupta, R. Janardan, M. Smid, and B. Dasgupta, “The rectangle enclosure and point-dominance problems revisited,” International Journal of Computational Geometry & Applications, vol. 7, no. 5, pp. 437–455, 1997. [17] K. Deb, M. Mohan, and S. Mishra, “Evaluating the -domination based multi-objective evolutionary algorithm for a quick computation of pareto-optimal solutions,” Evol. Comput., vol. 13, no. 4, pp. 501– 525, Dec. 2005. [18] L. Paquete, M. Chiarandini, and T. Stützle, “Pareto local optimum sets in the biobjective traveling salesman problem: an experimental study,” in Metaheuristics for Multiobjective Optimisation, X. Gandibleux, M. Sevaux, K. Sörensen, and V. T’kindt, Eds. Berlin: Springer. Lecture Notes in Economics and Mathematical Systems Vol. 535, 2004, pp. 177–199. [19] M. Drozdı́k, Y. Akimoto, H. Aguirre, and K. Tanaka, “Computational cost reduction of nondominated sorting using the M-front,” IEEE Transactions on Evolutionary Computation, vol. 19, no. 5, pp. 659–678, 2015. [20] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist multiobjective genetic algorithm: NSGA-II,” IEEE Transactions on Evolutionary Computation, vol. 6, no. 2, pp. 182–197, Apr 2002. [21] M. Jensen, “Reducing the run-time complexity of multiobjective EAs: The NSGA-II and other algorithms,” IEEE Transactions on Evolutionary Computation, vol. 7, no. 5, pp. 503–515, Oct 2003. [22] F.-A. Fortin, S. Grenier, and M. Parizeau, “Generalizing the improved run-time complexity algorithm for non-dominated sorting,” in Proceedings of the 15th Annual Conference on Genetic and Evolutionary Computation. New York, NY, USA: ACM, 2013, pp. 615–622. [23] O. Schütze, S. Mostaghim, M. Dellnitz, and J. Teich, “Covering Pareto sets by multi-level evolutionary subdivision techniques,” in Proceedings of the Second Int. Conf. on Evolutionary Multi-Criterion Optimization. Berlin: Springer, 2003, pp. 118–132. [24] J. E. Fieldsend, R. M. Everson, and S. Singh, “Using unconstrained elite archives for multiobjective optimization,” IEEE Transactions on Evolutionary Computation, vol. 7, no. 3, pp. 305–323, 2003. [25] N. Altwaijry and M. Bachir Menai, “Data structures in multi-objective evolutionary algorithms,” Journal of Computer Science and Technology, vol. 27, no. 6, pp. 1197–1210, 2012. [26] S. Mostaghim, J. Teich, and A. Tyagi, “Comparison of data structures for storing Pareto-sets in MOEAs,” in Evolutionary Computation, 2002. CEC ’02., vol. 1, May 2002, pp. 843–848. [27] W. Habenicht, Essays and Surveys on MCDM: Proceedings of the Fifth International Conference on Multiple Criteria Decision Making, 15 [28] [29] [30] [31] Mons, Belgium, August 9–13, 1982. Springer, 1983, ch. Quad Trees, a Datastructure for Discrete Vector Optimization Problems, pp. 136–145. M. Sun and R. Steuer, “Quad trees and linear list for identifying nondominated criterion vectors,” INFORM Journal on Computing, vol. 8, no. 4, pp. 367–375, 1996. K. Deb and H. Jain, “An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part i: Solving problems with box constraints,” IEEE Transactions on Evolutionary Computation, vol. 18, no. 4, pp. 577–601, Aug 2014. X. Zhang, Y. Tian, R. Cheng, and Y. Jin, “An efficient approach to nondominated sorting for evolutionary multiobjective optimization,” IEEE Transactions on Evolutionary Computation, vol. 19, no. 2, pp. 201–213, April 2015. Y. Zhou, Z. Chen, and J. Zhang, “Ranking vectors by means of the dominance degree matrix,” IEEE Transactions on Evolutionary Computation, vol. 21, no. 1, pp. 34–51, Feb 2017.
8cs.DS
LOCAL ASYMPTOTIC EQUIVALENCE OF PURE QUANTUM STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE arXiv:1705.03445v1 [math.ST] 9 May 2017 CRISTINA BUTUCEA1 , MĂDĂLIN GUŢĂ2 , MICHAEL NUSSBAUM3 Abstract. Quantum technology is increasingly relying on specialised statistical inference methods for analysing quantum measurement data. This motivates the development of “quantum statistics”, a field that is shaping up at the overlap of quantum physics and “classical” statistics. One of the less investigated topics to date is that of statistical inference for infinite dimensional quantum systems, which can be seen as quantum counterpart of non-parametric statistics. In this paper we analyse the asymptotic theory of quantum statistical models consisting of ensembles of quantum systems which are identically prepared in a pure state. In the limit of large ensembles we establish the local asymptotic equivalence (LAE) of this i.i.d. model to a quantum Gaussian white noise model. We use the LAE result in order to establish minimax rates for the estimation of pure states belonging to Hermite-Sobolev classes of wave functions. Moreover, for quadratic functional estimation of the same states we note an elbow effect in the rates, whereas for testing a pure state a sharp parametric rate is attained over the nonparametric Hermite-Sobolev class. Keywords and phrases: Le Cam distance, local asymptotic equivalence, quantum Gaussian process, quantum Gaussian sequence, quantum states ensemble, nonparametric estimation, quadratic functionals, nonparametric sharp testing rates. 1. Introduction A striking insight of quantum mechanics is that randomness is a fundamental feature of the physical world at the microscopic level. Any observation made on a quantum system such as an atom or a light pulse, results in a non-deterministic, stochastic outcome. The study of the direct map from the system’s state or preparation to the probability distribution of the measurement outcomes, has been one of the core topics in traditional quantum theory. In recent decades the focus of research has shifted from fundamental physics towards applications at the interface with information theory, computer science, and metrology, sharing the paradigm that individual quantum systems as carriers of a new type of information [52]. In many quantum protocols, the experimenter has incomplete knowledge and control of the system and its environment, or is interested in estimating an external field parameter which affects the system dynamics. In this case one deals with a statistical inverse problem of inferring unknown state parameters from the measurement data obtained by probing a large number of individual quantum systems. The theory and practice arising from tackling such questions is shaping up into the field of quantum statistics, which lies at the intersection of quantum theory and statistical inference [39, 37, 36, 56, 6, 1]. One of the central problems in quantum statistics is state estimation: given an ensemble of identically prepared, independent systems with unknown state, the task is to estimate the state by performing appropriate measurements and devising estimators based on the measurement data. A landmark experiment aimed at creating multipartite entangled states [34] highlighted the direct practical relevance of efficient estimation techniques for large dimensional systems, the complexity of estimating large dimensional states, and the need for solid statistical methodology in computing reliable “error bars”. This has motivated the development of new methods such as compressed sensing and matrix ℓ1 -minimisation [29, 28, 22], spectral thresholding for low rank states [14], confidence regions [17, 18, 65, 62, 21]. Another important research direction is towards developing a quantum decision theory as the overall mathematical framework for inference involving quantum systems seen as a form of “statistical data”. Typically, the route to finding the building blocks of this theory starts with a decision problem (e.g. testing between two states, or estimating certain parameters of a state) and the problem of finding optimal measurement settings and statistical procedures for treating the (classical, random) measurement data. For instance, in the context 1 CREST, ENSAE, Université Paris-Saclay, 3, ave. P. Larousse 92245 MALAKOFF Cedex, FRANCE, University of Nottingham, School of Mathematical Sciences, University Park, NG7 2RD Nottingham, UK, 3 Department of Mathematics, Malott Hall, Cornell University, Ithaca, NY 14853, USA 2 1 2 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE of asymptotic binary hypothesis testing, two key results are the quantum Stein lemma [38, 55] and the quantum Chernoff bound [2, 53, 3, 50]. As in the classical case, they describe the exponential decay of appropriate error probabilities for optimal measurements, and they provide operational interpretations for quantum relative entropy, and respectively quantum Chernoff distance. Similarly, an important problem in state estimation is to identify measurements which allow for the smallest possible estimation error. A traditional approach has been to establish a “quantum Cramér-Rao bound” (QCRB) [39, 37, 10] for the covariance of unbiased estimators, where the right side is the inverse of the “quantum Fisher information matrix”, the latter depending only on the structure of the quantum statistical model. However, while the QCRB is achievable asymptotically for onedimensional parameters, this is not the case for multi-parameter models due to the fact that the measurements which are optimal for different one-dimensional components, are generally incompatible with each other. These difficulties can be overcome by developing a fundamental theory of comparison and convergence of quantum statistical models, as an extension of its classical counterpart [63, 48]. While classical “data processing” is described by randomisations, physical transformations of quantum systems are described by quantum channels [52]. Following up on this idea, Petz and Jencova [58] have obtained a general characterisation of equivalent models, as families of states that are related by quantum channels in both directions. This naturally leads to the notion of Le Cam distance between quantum statistical models as the least trace-norm error incurred when trying to map one model into another via quantum channels [43]. In this framework, the asymptotic theory of state estimation can be investigated by adopting ideas from the classical local asymptotic normality (LAN) theory [48]. Quantum LAN theory [31, 33, 43] shows that the sequence of models describing large samples of identically prepared systems can be approximated by a simpler quantum Gaussian shift model, in the neighbourhood of an interior point of the parameter space. The original optimal state estimation problem is then solved by combining LAN theory with known procedures for estimation of Gaussian states [30, 32, 25]. In this paper we extend the scope of the quantum LAN theory to cover non-parametric quantum models; more precisely we will be interested in the set of pure states (one-dimensional projections) on infinite dimensional Hilbert spaces. Infinite dimensional systems such as light pulses, free particles, are commonly encountered in quantum physics, and their estimation is an important topic in quantum optics [49]. The minimax results derived in this paper can serve as a benchmark for the performance of specific methods such as for instance quantum homodyne tomography [1, 13], by comparing their risk with the minimax risk derived here. The paper is organised as follows. In Section 2 we review the basic notions of quantum mechanics needed for understanding the physical context of our investigation. In particular, we define the concepts of state, measurement and quantum channel which can loosely be seen as quantum analogs of probability distribution and Markov kernels, respectively. We further introduce the formalism of quantum Gaussian states, the Fock spaces and second quantisation, which establish the quantum analogs of Gaussian distributions, Gaussian sequences and Gaussian processes in continuous time. In Section 3.1 we review results in classical statistics on nonparametric asymptotic equivalence which serve as motivation and comparison to our work. In Section 3.2 we introduce the general notion of a quantum statistical model and the Le Cam distance between two models. In particular, in Section 3.3 we define the i.i.d. and Gaussian quantum models which are analysed in the remainder of the paper. One of the main results is Theorem 4.1 giving the local asymptotic equivalence (LAE) between the non-parametric i.i.d. pure states model and the Gaussian shift model. This extends the existing local asymptotic normality theory from parametric to non-parametric (infinite dimensional) models. Section 5 details three applications of the LAE result in Theorem 4.1. In Section 5.1 we derive the asymptotic minimax rates and provide concrete estimation procedures for state estimation with respect to the trace-norm and Bures distances, which are analogues of the norm-one and Hellinger distances respectively. The main results are Theorems 5.1 and 5.3 which deal with the upper and respectively lower bound for a model consisting of ensemble of n independent identically prepared systems in a pure state belonging to a Hermite-Sobolev class S α (L) of wave functions. In Theorem 5.1 we describe a specific measurement procedure which provides an estimator whose risk attains the nonparametric rate n−α/(2α+1) . The lower bound follows by using the LAE result to approximate the model with a Gaussian one, combined with the lower bound for the corresponding quantum Gaussian model derived in Theorem 5.2. In Section 5.2 we consider the estimation of a state functional corresponding to the expectation of a power N 2β of the number operator. Theorems 5.4 and 5.5 establish the upper and lower bounds for functional estimation for the Hermite-Sobolev class S α (L). The minimax rates are n−1/2 (parametric) if α ≥ 2β, and n−1+β/α if β < α < 2β. In Section 5.3 we investigate non-parametric testing between a single state and a composite hypothesis consisting of all states outside a ball of shrinking radius. Surprisingly, we find that the minimax testing rates are parametric, in contrast to the non-parametric estimation rates. This fact is closely related to the fact that the optimal estimation and testing measurements are incompatible with each other, so LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 3 that no single measurement strategy can allow for minimax estimation and testing in the same time. Results on the minimax optimal rate for testing and the sharp asymptotics are given in Theorems 5.6 and 5.7 respectively. Notation. Following physics convention, the vectors of a Hilbert space H will be denoted by the “ket” |vi, so that the inner product of two vectors is the “bra-ket” hu|vi ∈ C which is linear with respect to the right entry and anti-linear with respect to the left entry. Similarly, M := |uihv| is the rank one operator acting as M : |wi 7→ M |wi = hv|wi|ui. We denote by L(H) the space of bounded linear operators on H which is a C∗ algebra with respect to the operator norm kAk := supψ6=0 kAψk/kψk. Additionally, T1 (H) ⊂ L(H) is the space of Hilbert-Schmidt (or trace-class) operators equipped with the norm-one kτ k1 := Tr(|τ |), where the operator |τ | := (τ ∗ τ )1/2 is the absolute value of τ , and τ ∗ is the adjoint of τ . Finally, we denote by T2 (H) ⊂ L(H) the space of Hilbert-Schmidt operators equipped with the norm-two kτ k22 := Tr(|τ |2 ), which is a Hilbert space with respect to the inner product (τ, σ) := Tr(τ ∗ σ). 2. Quantum mechanics background In this section we review some basic notions of quantum mechanics (QM), in as much as it is required for understanding the subsequent results of the paper. Since QM is a probabilistic theory of quantum phenomena, it is helpful to approach the formalism from the perspective of analogies and differences with “classical” probability. We refer to [52] for more details on the quantum formalism. 2.1. States, measurements, channels. The QM formalism assigns to each quantum mechanical system (e.g. an atom, light pulse, quantum spin) a complex Hilbert space H, called the space of states. For instance, the finite dimensional space Cd is the Hilbert space of a system with d “energy levels”, while L2 (R) is the space of “wave functions” of a particle moving in one dimension, or of a monochromatic light pulse. The state of a quantum system is represented mathematically by a density matrix. Definition 1. Let H be the Hilbert space of a quantum system. A density matrix (or state) on H is a linear operator ρ : H → H which is positive (i.e. it is selfadjoint and has non-negative eigenvalues), and has trace one. We denote by S(H) the convex space of states on H. Its linear span is the space of trace class operators T1 (H), which is the non-commutative analogue of the space of absolutely integrable functions on a probability space L1 (Ω, Σ, P). For any states ρ1 or ρ2 , the convex combination λρ1 + (1 − λ)ρ2 is also a state which corresponds to randomly preparing the system in either the state ρ1 or ρ2 with probabilities λ and respectively 1 − λ. The extremal elements of the convex set S(H) are the one dimensional projections Pψ = |ψihψ| where |ψi is a normalised vector, i.e. kψk = 1. Such states are called pure (as opposed to mixed states which are convex combinations of pure ones), and are uniquely determined by the vector |ψi. Conversely, the vector |ψi is fixed by the state up to a complex phase factor, i.e. |ψi and |ψ ′ i := eiφ |ψi represent the same state. Although the quantum state encodes all information about the preparation of the system, it is not a directly observable property. Instead, any measurement produces a random outcome whose distribution depends on the state, and thus reveals in a probabilistic way a certain aspect of the system’s preparation. The simplest type of measurement is determined by an orthonormal basis (ONB) {|ii}dimH and a set of possible outcomes {λi }dimH i=1 i=1 in the following way: the outcome is a random variable X taking the value λi with probability given by the diagonal elements of ρ in this particular basis Pρ ([X = λi ]) = ρii = hi|ρ|ii. More generally, a measurement M with outcomes in a measurable space (Ω, Σ) is determined by a positive operator valued measure. Definition 2. A positive operator valued measure (POVM) is a map M : Σ → L(H) having the following properties 1) positivity: M (E) ≥ 0 for all events E∈Σ P 2) sigma additivity: M (∪i Ei ) = i M (Ei ) for any countable set of mutually disjoint events Ei 3) normalization: M (Ω) = 1. The outcome of the corresponding measurement associated to M has probability distribution Pρ (E) = Tr(ρM (E)), E ∈ Σ. 4 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE The most important example of a POVM, is that associated to the measurement of an observable, the latter being represented mathematically by a selfadjoint operator A : H → H. The Spectral Theorem shows that such operators can be “diagonalised”, i.e. they have a spectral decomposition Z xP (dx) A= σ(A) where σ(A) is the spectrum of A, and {P (E) : E ∈ Σ} is the collection of spectral projections of A. The corresponding measurement has outcome a ∈ σ(A) with probability distribution Pρ [a ∈ E] = Tr(ρP (E)). Unlike “classical” systems which can be observed without disturbing their state, quantum systems are typically perturbed by the measurement, so the system needs to be reprepared in order to obtain more information about the state. In this sense, the system can be seen as a “quantum sample” which it can be converted into a “classical” sample only by performing a measurement. Thus, a measurement can be seen as a “quantum-todP classical randomisation”, i.e. a linear map M which sends a state ρ to the probability density M(ρ) ≡ pρ := dPρ with respect to a reference measure P. The latter can be taken to be Pρ0 for a strictly positive density matrix ρ0 . The following lemma summarises this perspective on measurements. Lemma 2.1. Let H be a Hilbert space, and let (Ω, Σ) be a measurable space. For any fixed state ρ0 > 0 on H, there is a one-to-one correspondence between POVMs M over (Ω, Σ) and quantum-to-classical randomisations, i.e. linear maps M : T1 (H) → L1 (Ω, Σ, P) which are positive and normalised (maps states into probability densities). The correspondence is given by Z dPρ . M(ρ) ≡ pρ := pρ (ω)Pρ0 (dω), Pρ (E) = Tr(M (E)ρ) = dP A For comparison, recall that a linear map R : L1 (Ω′ , Σ′ , P′ ) → L1 (Ω, Σ, P) is a stochastic operator if it maps probability densities into probability densities [61]. Typically such maps arise from Markov kernels and describe randomizations of dominated statistical experiments (models). While a measurement is a quantum-to-classical randomization, a “quantum-to-quantum randomization” describes how the system’s state changes as a result of time evolution or interaction with other systems. The maps describing such transformations are called quantum channels. Definition 3. A quantum channel between systems with Hilbert spaces H1 and H2 is a trace preserving, completely positive linear map T : T1 (H1 ) → T1 (H2 ). The two properties mentioned above are similar to those of a classical randomization, so in particular T maps states into states. However, unlike the classical case, T is required to satisfy a stronger positivity property: T is completely positive if Idm ⊗ T is positive for all m ≥ 1, where Idm is the identity map on the space of m dimensional matrices. This ensures that when the system is correlated with an ancillary system Cm , and the latter undergoes the identity transformation, the final joint state is still positive, as expected on physical grounds. The simplest example of a quantum channel is a unitary transformation ρ 7→ U ρU ∗ , where U is a unitary operator on H. More generally, if |ϕi ∈ K is a pure state of an ancillary system, and V is a unitary on H ⊗ K, then ρ 7→ T (ρ) := TrK (V (ρ ⊗ |ϕihϕ|)V ∗ ) is a quantum channel describing the system state after interacting with the ancilla. By computing the partial trace TrK over K with respect to an orthonormal basis {|fi i}dimK i=1 we obtain the following expression X Ki ρKi∗ (1) T (ρ) = i where Ki are operators on H definedP by hψ|Ki |ψ i := hψ ⊗ fi |U |ψ ′ ⊗ ϕi. Note that by definition, these operators satisfy the normalisation condition i Ki∗ Ki = 1. Conversely, the Kraus Theorem shows that any quantum channel is of the form (1) with operators Ki respecting the normalisation condition. ′ 2.2. Continuous variables, Fock spaces and Gaussian states. In this section we look at the class of “continuous variables” (cv) systems, which model a variety of physical systems such as light pulses, or free particles. Such systems play an important role in this work as “carriers” of quantum Gaussian states, and in particular in the local asymptotic equivalence result. We refer to [49] for further reading. LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 5 2.2.1. One mode systems. We start with the simplest case of a “one-mode” cv system, after which we show how this construction can be extended to more general “multi-mode” cv systems. The Hilbert space of a one-mode system is L2 (R), i.e. the space of square integrable wave functions on the real line. On this we define the selfadjoint operators acting on appropriately defined domains as dψ(q) (Qψ)(q) = qψ(q), (P ψ)(q) = −i dq which satisfy the “canonical commutation relations” QP − P Q = i1. To better understand the meaning of the observable Q, let us consider its measurement for a pure state ρ = |ψihψ| with wave function |ψi. The outcome takes values in R, and its probability distribution has density with respect to the Lebesgue measure 2 P 2 pQ ρ (x) = |ψ(x)| . Similarly, the probability density of the observable P is given by pρ (x) = |ψ̃(x)| , where 2 ψ̃ ∈ L (R) is the Fourier transform of the function ψ(·). When the system under consideration is the free particle, Q and P are usually associated to the position and momentum observables, while for a monochromatic light mode they correspond to the electric and magnetic fields. Note that the distributions of P and Q are not sufficient to identify the state, even in the case of a pure state. However, it turns out that the state is uniquely determined by the collection of probability distributions of all quadrature observables Xφ := cos(φ)·Q+sin(φ)·P for angles φ ∈ [0, 2π]. To understand this, it is helpful to think of the state of the one-mode cv system as a quantum analogue of a joint distribution of two real valued variables, i.e. a 2D distribution. Indeed, in the latter case, the distribution is determined by collection of marginals along all directions in the plane (its Radon transform); this fact is exploited in PET tomography which aims at estimating the 2D distribution from samples of its Radon transform. In the quantum case, since Q and P do not commute with each other, they cannot be measured simultaneously and cannot be assigned a joint distribution in a meaningful way. However, the “quasidistribution” defined below has some of the desired properties, and is very helpful in visualising the quantum state. Definition 4. For any state ρ ∈ T1 (L2 (R)) we define the quantum characteristic function of ρ fρ (u, v) := Tr(exp(−iuQ − ivP )ρ). W fρ with respect to both variables is called Wigner function Wρ , or quasiThe inverse Fourier transform of W distribution associated to ρ: Z Z 1 fρ (u, v)dudv. exp(iuq + ivp)W Wρ (q, p) = (2π)2 A consequence of this definition is that the marginal of Wρ (q, p) along an arbitrary direction with angle φ is the probability density of the quadrature Xφ introduced above. This is the basis of a quantum state estimation scheme called “quantum homodyne tomography” [49, 1], where the Wigner function plays the role of the 2D distribution from “classical” PET tomography. One of the important differences however, is that the Wigner functions need not be positive in general, and satisfy other constraints which are specific to the quantum setting and can be exploited in the estimation procedure. The Wigner function representation offers an intuitive route to defining the notion of Gaussian state. Definition 5. A state ρ of a one-mode cv system is called Gaussian if its Wigner function Wρ is a Gaussian probability density, or equivalently if it has the quantum characteristic function   V T f · exp(iuq0 + ivp0 ). Wρ (u, v) = exp −(u, v) (u, v) 2 where (q0 , p0 ) ∈ R2 and V (a real positive 2 × 2 matrix) are the mean and variance of Wρ , respectively. In particular, all the quadratures Xφ of a Gaussian state have Gaussian distribution. As consequence of the commutation relation QP − P Q = i1 the observables Q and P cannot have arbitrarily small variance simultaneously; in particular, the covariance matrix V must satisfy the “uncertainty principle” Det(V ) ≥ 1/4, where the equality is achieved if and only if the state is a pure Gaussian state. We will be particularly interested in coherent states |G(z)i which are pure Gaussian states whose Wigner functions have covariance matrix V = I2 /2, where I2 is the 2×2 identity matrix. To give a concrete Hilbert space representation, it is convenient to introduce a special orthonormal basis of L2 (R), consisting of the eigenvectors √ {|0i, |1i, . . . } of√the number operator N = a∗ a, with N |ki = k|ki. Here, the operators a∗ = (Q − iP )/ 2 and a = (Q + iP )/ 2 are called creation and annihilation operators and act as “ladder operators” on the number basis vectors (or Fock states) √ √ a|ki = n|k − 1i, a∗ |ki = k + 1|k + 1i. 6 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE The coherent states denoted by |G(z)i are obtained by applying the unitary Weyl (displacement) operators to the vacuum state |0i ∞ X zk √ |ni, (2) |G(z)i = exp (za∗ − z̄a) |0i = exp(−|z|2 /2) k! k=0 where z ∈ C is the eigenvalue √ of the annihilation operator√a|G(z)i = z|G(z)i; in particular, the quadrature means are hG(z)|Q|G(z)i = 2Re(z) and hG(z)|P |G(z)i = 2Im(z), and the Wigner function is given by   √ √ 1 W|zi (q, p) = exp −(q − 2x)2 − (p − 2y)2 , q, p ∈ R. (3) π Equation (2) implies that the number operator N has a Poisson distribution with mean |z|2 . Additionally, it can be seen from the Fourier expansion in the second equality that the unitary Γ(φ) = exp(iφN ) acts by rotating the coherent states by an angle φ in the complex plane, i.e. Γ(φ)|G(z)i = |G(eiφ z)i. Another important class of Gaussian states are the mixed diagonal states ∞ X Φ(r) = (1 − r) rk |kihk|, 0 < r < 1 (4) k=0 which are also called thermal states, cf. section 3.3 in [49]. The corresponding Wigner function is a centred Gaussian   2 1 q + p2 WΦ(r) (q, p) = . (5) exp − 2πσ 2 (r) 2σ 2 (r) 1+r with covariance matrix V = σ 2 (r) · I2 where σ 2 (r) = 12 1−r . Proposition 2.2. Consider the family of coherent states {|G(z)ihG(z)|, z ∈ C}, with random displacement (location) z distributed according to Π(dz), having a Gaussian law with covariance matrix σ 2 · I2 . Then, the R mixed state Φ = |G(z)ihG(z)|Π(dz) is a thermal state Φ(r), with r = 2σ 2 . 2σ 2 + 1 Proof. Consider the corresponding Wigner function   Z 1 1 dxdy WΦ (q, p) = W|G(z)i (q, p) exp − 2 (x2 + y 2 ) 2σ 2πσ 2     Z Z √ √ 1 dx dy x2 y2 2 2 √ = · exp −(p − 2 y) − 2 √ exp −(q − 2 x) − 2 πσ 2 2σ 2σ 2π 2π   1 q 2 + p2 = . exp − π(4σ 2 + 1) 2(2σ 2 + 1/2) Therefore, the state Φ is identical to the thermal state Φ(r) with 2σ 2 + 21 = 1 1+r 2 1−r , or equivalently r = 2σ2 1+2σ2 . (6)  This fact will be used later on in in section 5 in applications to functional estimation and testing. 2.2.2. Fock spaces and second quantisation. The above construction can be generalised to multimode systems by tensoring several one-mode systems. Thus, the Hilbert space of a k-mode system is L2 (R)⊗k ∼ = L2 (Rk ), upon which we define “canonical pairs” (Qi , Pi ) acting on the i-th tensor as above, and as identity on the other tensors. Similarly we define the one-mode operators ai , a∗i , Ni . The number basis consists now of tensor products |ni := ⊗ki=1 |ni i indexed by the sequences of integers n = (n1 , . . . , nk ). A multimode coherent state is a tensor product of one-mode coherent states ! k ∞ Y X  zin k † † 2 √ |ni ∈ L2 (R)⊗k (7) |G(z)i = ⊗i=1 |G(zi )i = exp za − az |0i = exp(−|z| /2) n ! i n=0 i=1 where z = (z1 , . . . , zk ) is the vector of means, a = (a1 , . . . , ak ), and † denotes the transposition and adjoint (complex conjugation) of individual entries. We will now extend this construction to systems with infinitely many modes. One way to do this is by defining an infinite tensor product of one-mode spaces, as completion of the space spanned by tensors in which all but a finite number of modes are in the vacuum state. Instead, we will present an equivalent but more elegant construction called second quantisation which will be useful for later considerations. LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE Definition 6. Let K be a Hilbert space. The Fock space over K is the Hilbert space M F (K) = K ⊗s n 7 (8) n≥0 where K⊗s n denotes the n-fold symmetric tensor product, i.e. the subspace of K⊗n consisting of vectors which are symmetric under permutations of the tensors. The term K⊗s 0 =: C|0i is called the vacuum state. In this definition the space K should be regarded as the “space of modes” rather than physical states. As we will see below, by fixing an orthonormal basis in K, we can establish an isomorphism between the Fock space F (K) and a tensor product of one-mode cv spaces, one for each basis vector. In particular, if K = C, then F (C) ∼ = L2 (R) so that the one-dimensional subspaces in the direct sum in (8) correspond to the number basis vectors |0i, |1i, · · · ∈ L2 (R) of a one-mode cv system. We now introduce the general notion of coherent state on a Fock space. Definition 7. Let F (K) be the Fock space over K. For each |vi ∈ K we define an associated coherent state M 1 2 √ |vi⊗n ∈ F (K). |G(v)i := e−kvk /2 n! n≥0 The coherent vectors form a dense subspace of F (K). This fact can be used to prove the following factorisation property, and to define the annihilation operators below. Let K = K0 ⊕ K1 be a direct sum decomposition of K into orthogonal subspaces, and let |vi = |v0 i ⊕ |v1 i be the decomposition of a generic vector |vi ∈ K. Then the map U : F (K) U : |G(v)i → F (K0 ) ⊗ F (K1 ) 7→ |G(v0 )i ⊗ |G(v1 )i is unitary. We will use this correspondence to identify F (K) with the tensor product F (K0 ) ⊗ F (K1 ). By the same argument, for any orthonormal basis {|e1 i, |e2 i, . . . } of K, the Fock space F (K) is isomorphic with the tensor product of one mode spaces Fi := F (C|ei i) and the coherent states factorise as O Fi F (K) ∼ = i |G(u)i so that we recover the formula (7). ∼ = O i |G(ui )i, ui = hei |ui. (9) We define the annihilation operators through their action on coherent states as follows: for each mode |ui ∈ K the associated annihilator a(u) : F (K) → F (K) is given by a(u) : |G(v)i = hu|vi|G(v)i, |vi ∈ K. Then the annihilation and (their adjoint) the creation operators satisfy the commutation relations a(u)a∗ (w) − a∗ (w)a(u) = hu|vi1. For each mode we can also define the canonical operators Q(u), P (u) and the number operator N (u) in terms of a(u), a∗ (u) as in the one-mode case. Moreover, if |ui = |u0 i ⊕ |u1 i is the decomposition of |ui as above, then a(u0 ) acts as a(u0 ) ⊗ 1F (K1 ) , when the Fock space is represented in the tensor product form. Similar decompositions hold for a∗ (u0 ), N (u0 ), a(u1 ), a∗ (u1 ), N (u1 ). The second quantisation has the following functorial properties which will be used later on. Definition 8. Let W : K → K be a unitary operator. The quantisation operator Γ(W ) is the unitary defined by Γ(W ) : F (K) → F (K) by M Γ(W ) := W ⊗n (10) n≥0 where W ⊗n acts on the n-th level of the Fock space K ⊗s n . From the definition it follows that the action of Γ(W ) on coherent states is covariant in the sense that Γ(W ) : F (K) Γ(W ) : |G(v)i → F (K) 7 → |G(W v)i. 8 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE In particular, it follows from the definitions that Γ(eiφ 1) = exp(iφN ), where N is the total number operator, whose action on the n-th level of the Fock space is N |vi⊗n = n|vi⊗n . Note that while |vi and eiφ |vi differ only by a phase and hence represent the same state, the corresponding coherent states |G(v)i and Γ(eiφ )|G(v)i = |G(eiφ v)i are linearly independent and represent different states. As in the single mode case, the coherent states can be obtained by acting with the unitary displacement (or Weyl) operators onto the vacuum |G(u)i = exp(a∗ (u) − a(u))|0i Moreover, the coherent states |G(u)i are Gaussian with respect to all coordinates. The means of annihilation operators are given by√ hG(u)|a(w)|G(u)i = hw|vi, from which we can deduce that the the coordinates √ (Q(w), P (w)) have means ( 2Rehw|ui, 2Imhw|ui). The covariance of coherent states is constant (independent of the displacement u), and is given by h0|a(w)a∗ (v)|0i = hw|vi. This implies that orthogonal modes (i.e. hw|vi = 0) have independent pairs of coordinates. 2.3. Metrics on the space of states. For future reference we review here the states space metrics used in the paper. Recall that the space of states S(H) on a Hilbert space H is the cone of positive, trace one operators in T1 (H). The norm-one (or trace-norm) distance between two states ρ0 , ρ1 ∈ S(H) is given by kρ0 − ρ1 k1 := Tr(|ρ0 − ρ1 |) √ where |τ | := τ ∗ τ denotes the absolute value of τ . The norm-one distance can be interpreted as the maximum difference between expectations of bounded observables kρ0 − ρ1 k1 = sup A:kAk≤1 |Tr(ρ0 A) − Tr(ρ1 A)|. Another interpretation is in terms of quantum testing. Let M = (M0 , M1 ) be a binary POVM used to test between hypotheses H0 := {measured state is ρ0 } and H1 := {measured state is ρ1 }. The sum of error probabilities is PM e = Tr(M0 ρ1 ) + Tr(M1 ρ0 ). By optimizing over all possible POVM we obtain [37] the optimal error probability sum 1 (11) P∗e := inf PM e = 1 − kρ0 − ρ1 k1 . M 2 In the special case of pure states, the norm-one distance is given by p k|ψ0 ihψ0 | − |ψ1 ihψ1 |k1 = 2 1 − |hψ0 |ψ1 i|2 , (12) as proven e.g. in [44]. The previous formula becomes for coherent states p k|G(ψ0 )ihG(ψ0 )| − |G(ψ1 )ihG(ψ1 )|k1 = 2 1 − exp(−kψ0 − ψ1 k2 ). The second important metric is the Bures distance whose square is given by  q √ √ 2 ρ0 ρ1 ρ0 ) db (ρ0 , ρ1 ) := 2(1 − Tr and is a quantum extension of the Hellinger distance. In the case of pure states the Bures distance becomes so for coherent states it is given by d2b (|ψ0 ihψ0 | , |ψ1 ihψ1 |) = 2(1 − |hψ0 |ψ1 i|) (13)    1 . d2b (|G(ψ0 )ihG(ψ0 )| , |G(ψ1 )ihG(ψ1 )|) := 2 1 − exp − kψ0 − ψ1 k2 2 Similarly to the classical case, the following inequality holds for arbitrary states [23] d2b (ρ0 , ρ1 ) ≤ kρ0 − ρ1 k1 ≤ 2db (ρ0 , ρ1 ). Moreover, since |hψ0 |ψ1 i| ≤ |hψ0 |ψ1 i|, the additional inequality holds for pure states √ kρ0 − ρ1 k1 ≥ 2db (ρ0 , ρ1 ). 2 (14) (15) This means that for pure states, the trace and Bures distances are equivalent (up to constants). Finally, we will be using the fact that both the norm-one and the Bures distance are contractive under quantum channels. T : T1 (H) → T1 (H′ ), i.e. kT (ρ0 ) − T (ρ1 )k1 ≤ kρ0 − ρ1 k1 , d2b (T (ρ0 ), T (ρ1 )) ≤ d2b (ρ0 , ρ1 ). LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 9 3. Classical and quantum statistical models In this section we review key elements of quantum statistics, and introduce the quantum statistical models which will be analysed later on. For comparison, we review certain asymptotic equivalence results for related classical statistical models. 3.1. Classical models. Here we review several asymptotic normality results for classical models which are analogous to the quantum models investigated in the paper. A classical statistical model is defined as a family of probability distributions Q = {Pf : f ∈ W} on a measurable space (X , A), indexed by an unknown, possibly infinite dimensional parameter f to be estimated, which belongs to a parameter space W. In the asymptotic framework considered here we assume that we are given a (large) number n of independent, identically distributed samples X1 , . . . , Xn from Pf , from which we would like to estimate f . If d : W × W → R+ is a chosen loss function, then the risk of an estimator fˆn = fˆn (X1 , . . . , Xn ) is i h R(fˆn , f ) = Ef d(fˆn , f )2 . In nonparametric statistics, the parameter of the model f is often a function that belongs to a smoothness class. We consider two classes W: the periodic Sobolev class S α (L) of functions on [0, 1] with smoothness α > 1/2, and the Hölder class Λα (L), with smoothness α > 0. For any f ∈ L2 [0, 1], let {fj , j ∈ Z} be the set of Fourier coefficients with respect to the standard trigonometric basis. The classes are defined as     XZ S α (L) := f : [0, 1] → R : |fj |2 |j|2α du ≤ L .   j∈Z and Λα (L) := {f : [0, 1] → R : |f (x) − f (y)| ≤ L|x − y|α , x, y ∈ [0, 1]} . In addition, when densities f are considered, we will assume that W includes an additional restriction to a class ) ( Z f (x)dx = 1 Dε = f : [0, 1] → [ε, ∞) : [0,1] for some ε > 0. Density model. The classical density model consists of n observations X1 , . . . , Xn which are independent, identically distributed (i.i.d.) with common probability density f n o Pn = P⊗n : f ∈W . f Gaussian regression model with fixed equidistant design. In this model, we observe Y1 , ..., Yn such that   i 1/2 + ξi , i = 1, ..., n, Yi = f n where the errors ξ1 , ..., ξn are i.i.d., standard Gaussian variables. Denote the Gaussian regression model by ) ( n    O  i 1/2 ,1 : f ∈ W . N f Rn = n i=1 Gaussian white noise model. In this model the square-root density f 1/2 is observed with Gaussian white noise of variance n−1 , i.e. 1 dYt = f 1/2 (t)dt + √ dWt , t ∈ [0, 1]. (16) n If we denote by Qf the probability distribution of {Y (t) : t ∈ [0, 1]}, the corresponding model is Fn := {Qf : f ∈ W} . Gaussian sequence model. In this model we observe a sequence of Gaussian random variables with means equal to the coefficients of f 1/2 in some orthonormal basis of L2 [0, 1] for f ∈ F 1 yj = θj (f 1/2 ) + √ ξj , n i = 1, 2, . . . (17) 10 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE where {ξi }i≥1 are Gaussian i.i.d. random variables. We denote this model    O    1 :f ∈W . Nn = N θj f 1/2 ,   n j≥1 In [54] it was shown that the sequences of models Pn and Fn are asymptotically equivalent in the sense that their Le Cam distance converges to zero as n → ∞ when W = Λα (L) ∩ Dε with α > 1/2; in [12], a similar result was established for Rn and Fn (more precisely, with f 1/2 any real valued function f 1/2 ∈ Λα (L)). Later, [60] showed that models Fn and Nn are asymptotically equivalent over periodic Sobolev classes f 1/2 ∈ S α (L) with smoothness α > 1/2. Among many other results [27] considered generalized linear models, [11] regression models with random design and [59] multivariate and random design, [26] compared the stationary Gaussian process with the Gaussian white noise model Fn . In all classical results, the underlying nonparametric function was assumed to belong to a smoothness class in order to establish asymptotic equivalence of models. In the quantum setup of pure states and Gaussian states that we discuss later on, no such smoothness assumption is needed. 3.2. Quantum models, randomisations and convergence. In this subsection we introduce the basic notions of a theory of quantum statistical models which is currently still in its early stages, cf. [33, 25] for more details. We will focus on the notions of quantum-to-classical randomisation carried out through measurements, and quantum-to-quantum randomisations implemented by quantum channels, which allow us to define the equivalence and the Le Cam distance between models. In analogy to the classical case, we make the following definition. Definition 9. A quantum statistical model over a parameter space Θ consists of a family of quantum states Q = {ρθ : θ ∈ Θ} on a Hilbert space H, indexed by an unknown parameter θ ∈ Θ. A simple example is a family of pure states {ρθ = |ψθ ihψθ | : θ ∈ R} with |ψθ i := exp(iθH)|ψi, where H is a selfdajoint operator generating the one-dimensional family of unitaries exp(iθH), and |ψi ∈ H is a fixed vector. Physically, the parameter θ could be for instance time, a phase, or an external magnetic field. Another example is that of a completely unknown state of a finite dimensional system, which can be parametrised in terms of its density matrix elements, or the eigenvalues and eigenvectors. In order to increase the estimation precision one typically prepares a number n of identical and independent copies of the state ρθ , in which case the corresponding model is Qn := {ρ⊗n : θ ∈ Θ}. Our work deals with non-parametric quantum statistical θ models for which the underlying Hilbert space is infinite dimensional, as we will detail below. In order to obtain information about the parameter θ, we need to perform measurements on the system prepared in ρθ . Using the random measurement data, we then employ statistical methods to solve specific decision problems. For instance, the task of estimating an unknown quantum state (also known as quantum tomography) is a key component of quantum engineering experiments [34]. In particular, the estimation of large dimensional states has received significant attention in the context of compressed sensing [29, 22], and estimation of low rank states [14]. Suppose that we perform a measurement M on the system in state ρθ , and obtain a random outcome O ∈ Ω with distribution PM θ (E) := Tr(ρθ M (E)), cf. section 2. The measurement data is therefore described by the classical model P M := {PM θ : θ ∈ Θ}, and the estimation problem can be treated using “classical” statistical methods. The measurement map M M : T1 → L1 (Ω, Σ, P) dPθ : ρθ 7→ pθ := dP can be seen as a randomisation from a classical to a quantum model, which intuitively means that Q is more informative that P M for any measurement M . Here P can be chosen to be the distribution corresponding to an arbitrary full rank (strictly positive) state ρ which insures the existence of all probability densities pθ . One of the distinguishing features of quantum statistics is the possibility to choose appropriate measurements for specific statistical problems (e.g. estimation, testing) and the fact that optimal measurements for different problems may be incompatible with each other. In the applications section we will discuss specific instances of this phenomenon. LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 11 Beside measurements, the quantum model Q can be transformed into another quantum model Q′ := {ρ′θ : θ ∈ Θ} on a Hilbert space H′ by means of a quantum randomisation, i.e. by applying a quantum channel T T : T1 (H) → T1 (H′ ) : ρθ 7→ ρ′θ . The model Q′ is less informative than Q in the sense that for any measurement M ′ on H′ one can construct ′ the measurement M := M ′ ◦ T on H such that PM = PM θ θ for all θ. If there exists another channel S such ′ that S(ρθ ) = ρθ for all θ we say (in analogy to the classical case) that the models Q and Q′ are equivalent ; in particular, for any statistical decision problem, one can match a procedure for one model with a procedure with the same risk, for the other model. A closely related concept is that of quantum sufficiency whose theory was developed in [58]. More generally, we define the Le Cam distance in analogy to the classical case [48]. Definition 10. Let Q and Q′ be two quantum models over Θ. The deficiency between Q and Q′ is defined by δ (Q, Q′ ) := inf sup kT (ρθ ) − ρ′θ k1 T θ∈Θ where the infimum is taken over all channels T . The Le Cam distance between Q and Q′ is defined as ∆ (Q, Q′ ) := max (δ (Q, Q′ ) , δ (Q′ , Q)) . (18) Its interpretation is that models which are “close” in the Le Cam distance have similar statistical properties. In practice, this metric is often used to approximate a sequence of models by another sequence of simpler models, providing a method to establish asymptotic minimax risks. In particular, the approximation of i.i.d. quantum statistical models by quantum Gaussian ones has been investigated in [31, 33, 43], in the case of finite dimensional systems with arbitrary mixed states. Our goal is to extend these results to non-parametric models consisting of pure states on infinite dimensional Hilbert spaces. The following lemma will be used later on. P Lemma 3.1. Let Q, Q′ be two quantum models as defined above. Let ρi = i µi,j ρθi,j be two arbitrary mixtures P (i = 1, 2) of states in Q and let ρ′i = i µi,j ρ′θi,j be their counterparts in Q′ . Then kρ′1 − ρ′2 k1 − 2∆(Q, Q′ ) ≤ kρ1 − ρ2 k1 ≤ kρ′1 − ρ′2 k1 + 2∆(Q, Q′ ). Proof. Since quantum channels are contractive with respect to the norm-one and by the triangle inequality we get kS(ρ′1 ) − S(ρ′2 )k1 ≤ kρ′1 − ρ′2 k1 kρ1 − ρ2 k1 ≤ kρ1 − S(ρ′1 )k1 + kS(ρ′1 ) − S(ρ′2 )k1 + kS(ρ′2 ) − ρ2 k1 ≤ 2∆(Q, Q′ ) + kρ′1 − ρ′2 k1 The second inequality can be shown in a similar way.  3.3. The i.i.d. and the quantum white noise models. We now introduce the non-parametric quantum models investigated in the paper, and discuss the relationship with the classical models described in section 3.1. Let H be an infinite dimensional Hilbert space and let B := {|e0 i, |e1 i, P . . . } be a fixed orthonormal basis in H. ∞ The Fourier decomposition of an arbitrary vector is written as |ψi = j=0 ψj |ej i. Since most of the models will consist of pure states, we will sometimes define them in terms of the Hilbert space vectors rather than the density matrices, but keep in mind that the vectors are uniquely defined only up to a complex phase. Let us consider the general problem of estimating an unknown pure quantum state in H. For finite dimensional systems, the risk with respect to typical rotation invariant loss functions scales linearly with the number of parameters [24], hence with the dimension of the space. Therefore, since H is infinite dimensional, it is not possible to develop a meaningful estimation theory without any prior information about the state. Motivated by physical principles and statistical methodology we introduce the following Hermite-Sobolev classes [8] and [9] of pure states characterised by an appropriate decay of the coefficients with respect to the basis B:   ∞   X |ψj |2 j 2α ≤ L, and kψk = 1 , α > 0, L > 0. (19) S α (L) := |ψihψ| :   j=0 To gain some intuition about the meaning of this class, let us assume that B is the Fock basis of a one-mode cv system. Then the constraint translates into the moment condition for the number operator hψ|N 2α |ψi ≤ L; this is a mild assumption considering that all experimentally feasible states have finite moments to all orders. Even more, the coefficients of typical states such as coherent, squeezed, and Fock states decay exponentially with the photon number. 12 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE Our first model describes n identical copies of a pure state belonging to the Sobolev class Qn := {|ψihψ|⊗n : |ψihψ| ∈ S α (L)}. (20) In section 5.1 we show that the minimax rate of Qn for the norm-one and Bures distance loss functions is n−α/(2α+1) . This is identical to the minimax rate of the classical i.i.d. model described in section 3.1. We now introduce the corresponding quantum Gaussian model. Let F := √ F (H) be the Fock space over H, √ and let |G(√ nψ)i ∈ F be the coherent state with “displacement” vector nψ. As discussed in section 2.2.2, the vector nψ should be seen now as the expectation of the infinite dimensional Gaussian state rather than a quantum state in itself, for which reason we have omitted the ket notation. We define the coherent states model  √ √ (21) Gn = G( nψ) G( nψ) : |ψi ∈ H, such that |ψihψ| ∈ S α (L) . Using the factorisation property (9) with respect to the orthonormal basis B,√we see that the model is equivalent to the product of independent one-mode coherent Gaussian states of mean nψi ∞ O √ √ ∼ G( nψi ) G( nψ) = i=1 which is analogous to the classical Gaussian sequence model Nn defined in equation (17). Similarly, we can draw an analogy with the white noise model Fn by realising H as L2 ([0, 1]). Let us define the quantum stochastic process [57] on F (L2 ([0, 1]))   B(t) := a χ[0,t] + a∗ χ[0,t] and note that [B(t), B(s)] = 0 for all t, s ∈ [0, 1] so that {B(t) : t ∈ [0, 1]} is a commutative family of operators. This implies that {B(t) : t ∈ [0, 1]} have a joint probability distribution which is uniquely determined by the quantum state, and can be regarded as a classical stochastic process. If the state is the vacuum |0i, the process is √ has the same distribution as the Brownian motion. Consider now the process √ Gaussian and X(t) := W ( nψ)∗ B(t)W ( nψ). which is obtained by applying a unitary Weyl transformation to B(t). In physics terms we work here in the “Heisenberg picture” where the transformation acts on operators while √ the state is fixed. Using quantum stochastic calculus one can derive the following differential equation for X(t)/ n 1 1 √ dX(t) = ψ(t)dt + √ dB(t). n n √ Therefore, X(t)/ n is similar to the process (16) with the exception that it has a complex rather than real valued drift function. Note that in this correspondence ψ(t) plays the role of f 1/2 , which agrees with the intuitive interpretation of the wave function √ as square √ root of the state |ψihψ|. Alternatively, one can use the Schrödinger picture, where the state is | nψi = W ( nψ)|0i, such that the process B(t) has the same law as X(t) under the vacuum state. In section 5.1 we show that the minimax rate of Gn for loss functions based on the norm-one and the Bures distance, is n−α/(2α+1) . Although the rate is identical to that of the corresponding classical model, the result does not follow from the classical case but relies on an explicit measurement strategy for the upper bounds, and on the quantum local asymptotic equivalence Theorem 4.1 for the lower bound. Furthermore, the minimax rate for the estimation of certain quadratic functionals are established in section 5.2, and the minimax testing rates are derived in section 5.3. While the former are similar to the classical ones, the quantum testing rates are parametric as opposed to non-parametric in the classical case. This reflects the fact that in the quantum case, the optimal measurements for different statistical problems are in general incompatible with each other and in some cases they differ significantly from what is expected on classical basis. 4. Local asymptotic equivalence for quantum models In this section we prove that the sequence (20) of non-parametric pure states models is locally asymptotically equivalent (LAE) with the sequence (21) of quantum Gaussian models, in the sense of the Le Cam distance. This is one of the main results of the paper and will be subsequently used in the applications. Throughout the section |ψ0 i is a fixed but arbitrary state in an infinite dimensional Hilbert space H. We let H0 := {|ψi ∈ H : hψ0 |ψi = 0} denote the orthogonal complement of C|ψ0 i. Any vector state |ψi ∈ H decomposes uniquely as p |ui ∈ H0 (22) |ψi = |ψu i := 1 − kuk2 |ψ0 i + |ui, where the phase has been chosen such that the overlap hψ|ψ0 i is real and positive. Therefore, the pure states are uniquely parametrised by vectors |ui ∈ H0 . LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 13 Further to the i.i.d. and Gaussian models Qn and Gn defined in (20) and respectively (21), we now introduce their local counterparts which are parametrised by the local parameter |ui rather than by |ψi. Let γn be a sequence such that γn = o(n−1/4 ), and define the pure state models Qn (ψ0 , γn ) := Gn (ψ0 , γn ) := {|ψu⊗n i ∈ H⊗n : |ui ∈ H0 , kuk ≤ γn } √ {|G( nu)i ∈ F (H0 ) : |ui ∈ H0 , kuk ≤ γn }. (23) (24) The LAE Theorem below shows that these local models are asymptotically equivalent. An interesting fact is that LAE holds without imposing global restrictions such as defined by the Sobolev classes, rather it suffices that the local balls shrink at rate γn which is faster than n−1/4 . This contrasts with the classical case where both types of conditions are needed, as explained in section 3.1. However, since the state cannot be “localised” without any prior knowledge, in applications we need to make additional assumptions which allow us to work in a small neighbourhood and make use of local asymptotic equivalence. In particular, the convergence holds for the restricted models where the Sobolev condition is imposed on top of the local one. This will be used in establishing the estimation, testing, and functional estimation results. Theorem 4.1. Let Qn (ψ0 , γn ) and Gn (ψ0 , γn ) be the models defined in (23) and respectively (24). Then the following convergence holds uniformly over states |ψ0 i: lim sup sup ∆(Qn (ψ0 , γn ), Gn (ψ0 , γn )) = 0 (25) n→∞ |ψ0 i∈H where ∆(·, ·) is the quantum Le Cam distance defined in equation (18). Proof. The direct map channel Tn is defined as an isometric embedding Tn : T1 (H⊗s n ) → T1 (F (H0 )) ρ 7→ Vn ρVn∗ . where Vn : H⊗s n → F (H0 ) is an isometry defined below. Since we deal with pure states, it suffices to prove that √ lim sup sup sup Vn ψu⊗n − G( nu) = 0. n→∞ |ψ0 i∈H kuk≤γn We now define the isometric embedding Vn by showing its explicit action on the vectors of an ONB. For any permutation σ ∈ Sn , let Uσ : |u1 i ⊗ · · · ⊗ |un i 7→ |uσ−1 (1) i ⊗ · · · ⊗ |uσ−1 (n) i P 1 ⊗n be the unitary action on H by tensor permutations. Then Ps := n! σ∈Sn Uσ is the orthogonal projector onto the subspace of symmetric tensors H⊗s n . We construct an orthonormal basis in H⊗s n as follows. Let B0 := {|e1 i, |e2 i, .P . . } be an orthonormal basis in H0 . Let ñ = (n0 , n) = (n0 , n1 , . . . ) be an infinite sequence of integers such that i≥0 ni = n, and note that only a finite number of ni s are different from zero. Then the symmetric vectors   r O n! Ps |ψ0 i⊗n0 ⊗ |ei i⊗ni  |ñi = |n0 , n1 , n2 , . . . i := n0 ! · n1 ! · . . . i≥1 form an ONB of H ⊗s n . As discussed N in section 2.2.2 the Fock space F (H0 ) can be identified with the infinite tensor product of one-mode Fock spaces i≥1 F (C|ei i) which has an orthonormal number basis (or Fock basis) consisting of products of number basis vectors of individual modes O |ni := |ni i i≥1 where ni 6= 0 only for a finite number of indices. We define Vn : H⊗s n → F (H0 ) as follows Vn : |ñi 7→ |ni. Its image consists of states with at most n “excitations”, with |ψ0 i⊗n being mapped to the vacuum state |0i. √ We would like to show that the embedded state Vn |ψu i⊗n are well approximated by the coherent states |G( nu)i uniformly over the local neighbourhood kuk ≤ γn . For this we will make use of the covariance and functorial properties of the second quantisation construction in order to reduce the non-parametric LAE statement to the corresponding one for 2-dimensional systems. Let |ui ∈ H0 be a fixed unit vector. Let j : C2 7→ H be the isometric embedding j : |0i 7→ |ψ0 i, j : |1i 7→ |ui 14 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE and let j0 : C|1i → H0 be the restriction of j to the one dimensional subspace C|1i. Since second quantisation is functorial under contractive maps, there is a corresponding isometric embedding J0 = Γ(j0 ) satisfying J0 : F (C|1i) → F (H0 ) |G(α)i  2 ⊗s n (26) 7→ |G(j0 (α))i = |G(αu)i. Let Ṽn : C → F (C|1i) be the isometry constructed in the same way as Vn , where |0i plays the role of p |ψ0 i and C|1i is the analogue of H0 . As before, let |ψα i = 1 − |α|2 |0i + α|1i, with |α| ≤ 1. Then by the properties of the embedding map Vn we have From equations (26) and (27) we find sup |α|≤γn (27) J0 Ṽn |ψα i⊗n = Vn |ψαu i⊗n . √ ⊗n − G( nαu) = sup Vn ψαu |α|≤γn √ Ṽn ψα⊗n − G( nα) Since the right-hand side of the above equality is independent of |ui the same equality holds with supremum on the left side taken over all |ui ∈ H0 with kuk ≤ γn . Therefore the LAE for the non-parametric models has been reduced to that of a two-dimensional (qubit) model which has already been established in [31]. Therefore we obtain a first version of LAE in which the i.i.d and Gaussian models are expressed in terms of the local parameter |ui √ lim sup sup sup Vn ψu⊗n − G( nu) = 0. n→∞ |ψ0 i∈H kuk≤γn Conversely, we define the reverse channel Sn : T1 (F (H)) as follows. Let Pn denote the orthogonal projection in F (H) onto the image space of Vn , i.e. the subspace with total excitation number at most n X F≤n (H0 ) := Lin{|n1 , n2 , . . . i : ni ≤ n}. i≥1 Let Rn : F (H0 ) → H ⊗s n be a right inverse of Vn , i.e. Rn Vn = 1. Then the reverse channel is defined as Sn (ρ) = Rn Pn ρPn Rn∗ + Tr(ρ(1 − Pn ))|ψ0 ihψ0 |⊗n . Operationally, the action of Sn consists of two steps. We first perform a projection measurement with projections Pn and (1 − Pn ); if the first outcome occurs the conditional state of the system is Pn ρPn /Tr(Pn ρn ) , while if the second outcome occurs the state is (1 − Pn )ρ(1 − Pn )/Tr((1 − Pn )ρn ). In the second stage, if the first outcome was obtained we map the projected state through the map Rn into a state in H⊗n , while if the second outcome was obtained, we prepare the fixed state |ψ0 ihψ0 |⊗n . √ When applied to the pure Gaussian states |G( nψu )i, the output of Sn is the mixed state √ √ Sn (|G( nψu )ihG( nψu )|) = pnu |φnu ihφnu | + (1 − pnu )|ψ0 ihψ0 |⊗n where √ √ Rn Pn |G( nψu )i := , pnu = kPn G( nψu )k2 √ n pu The key observation is that the Gaussian states are almost completely supported by the subspace F≤n (H0 ), uniformly with respect to the ball kuk ≤ γn . This means that |φnu i lim sup sup sup (1 − pnu ) = 0 n→∞ |ψ0 i kuk≤γn which together with the fact that Rn is the inverse of Vn implies √ √ lim sup sup sup Sn (|G( nψu )ihG( nψu )|) − |ψu ihψu |⊗n n→∞ |ψ0 i kuk≤γn 1 = 0. This completes the proof of (25).  5. Applications In this section we discuss three major applications of the local asymptotic equivalence result in Theorem 4.1, namely to the estimation of pure states, estimation of a physically meaningful quadratic functional, and finally to testing between pure states. We stress that local asymptotic equivalence allows us to translate these problems into similar but easier ones involving Gaussian states. This strategy has already been successfully employed [31] in finding asymptotically optimal estimation procedures for finite dimensional mixed states, which otherwise appeared to be a difficult problem due to the complexity of the set of possible measurements. LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 15 As discussed in section 3.3, we will assume that we are given n independent systems, each prepared in a state |ψi ∈ H belonging to the Sobolev ellipsoid S α (L) defined in equation (19). The corresponding quantum statistical model Qn was defined in equation (20), and the Gaussian counterpart model Gn was defined in equation (21). Here is a summary of the results. In Theorem 5.2 we show that the estimation rates over such ellipsoids are n−α/(2α+1) ; this is similar to the well-known rates, e.g. for density estimation, in nonparametric statistics (see [64]). The estimation of the quadratic functional X F (ψ) = |ψj |2 j 2β , for some fixed β > 0 j≥0 of the unknown pure state presents two regimes: a parametric rate n−1 for the MSE is attained when the unknown state has enough "smoothness" (that is α ≥ 2β), whereas a nonparametric rate n−2(1−β/α) is obtained when β < α < 2β. This double regime is known in nonparametric estimation for the density model, with different values for both the rates and the values of the parameters where the phase-transition occurs, cf [15], [45] and references therein. Parametric rates and sharp asymptotic constants are obtained for the testing problem of a pure state against an alternative described by the Sobolev-type ellipsoid with an L2 -ball removed. In the classical density model only nonparametric rates for testing of order n−2α/(4α+1) can be obtained for the L2 norm. In our quantum i.i.d. model, parametric rate n−1/2 is shown to be minimax for testing H0 : ψ = ψ0 , for some ψ0 in S α (L) over the nonparametric set of alternatives: H1 : ψ ∈ S α (L) is such that k|ψihψ| − |ψ0 ihψ0 |k1 ≥ cn−1/2 . The sharp asymptotic constant we obtain for testing is specific for ensembles of pure states. As we discuss in the sequel, quantum testing of states allows us to optimize over the measurements, and thus to obtain the most distinguishable likelihoods for the underlying unknown quantum state. 5.1. Estimation. We consider the problem of estimating an unknown pure state belonging to the HermiteSobolev class S α (L) given an ensemble of n independent, identically prepared systems. The corresponding sequence of statistical models Qn was defined in equation (20). We first describe a specific measurement procedure which provides an estimator whose risk attains the nonparametric rate n−2α/(2α+1) . We prove the lower bounds for estimating a Gaussian state in the model Gn defined in (21). Subsequently we use LAE to establish a lower bound showing that the rate is optimal in the i.i.d. model as well. Before deriving the bounds we briefly review the definitions of the loss functions used here and the relations between them, cf. section 2.3. Recall that the trace norm distance between states ρ and ρ′ is given by kρ − ρ′ k1 := Tr(|ρ − ρ′ |), and is the quantum analogue of the norm-one p√ √ distance between probability densities. ρρ′ ρ)), and is a quantum extension of the The square of the Bures distance is given by d2b := 2(1 − Tr( Hellinger distance. These distances satisfy the inequalities (14). In the case of pure states (i.e. ρ = |ψihψ|, and ρ′ = |ψ ′ ihψ ′ |) these metrics become (cf. (12) and (13)), p d2b (ρ , ρ′ ) = 2(1 − |hψ|ψ ′ i|). kρ − ρ′ k1 = 2 1 − |hψ|ψ ′ i|2 , Since vectors are not uniquely defined by the states, the distances cannot be expressed directly in terms of the length kψ − ψ ′ k. However if we consider a reference vector |ψ0 i and define the representative vector |ψi such that hψ0 |ψi ≥ 0, then we can write (as in section 4) p p |ψu′ i = 1 − ku′ k2 |ψ0 i + |u′ i, |ui, |u′ i ⊥ |ψ0 i |ψu i = 1 − kuk2 |ψ0 i + |ui, and the distances have the same (up to a constant) quadratic approximation d2b (ρu , ρu′ ) = ku − u′ k2 + O(max(kuk, ku′k)4 ), kρu − ρu′ k21 = 4ku − u′ k2 + O(max(kuk, ku′k)4 ), (28) where the correction terms are of order 4 as kuk and ku k tend to 0. Below we show that asymptotically with n the estimation risk for norm-one square and Bures distance square will have the same rate as that of estimating the local parameter u with respect to the Hilbert space distance. ′ 5.1.1. Upper bounds. We first describe a two steps measurement procedure, which provides an estimator whose risk has rate n−2α/(2α+1) . 16 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE Theorem 5.1. Consider the i.i.d. quantum model Qn given by equation (20). There exists an estimator ρbn := |ψbn ihψbn | such that   lim sup sup n2α/(2α+1) Eρ d2 (ρ̂n , ρ) ≤ C, n→∞ |ψi∈S α (L) where ρ := |ψihψ|, d(ρ̂n , ρ) denotes either the trace-norm distance, or the Bures distance, and C > 0 is a constant depending only on α > 0 and L > 0. Proof of Theorem 5.1. According to inequalities (14) and (15) the two distances are equivalent on pure states, so it suffices to prove the upper bound for the trace-norm distance. Firstly, a projective operation is applied to each of the n copies separately, whose aim is to truncate the state to a finite dimensional subspace of dimension dn = [n1/(2α+1) ] + 1. Let Pn be the projection onto the subspace Hn spanned by the first dn basis vectors {|e0 i, . . . , |edn −1 i}. For a given state |ψi the operation consists of randomly projecting the state with Pn or (1 − Pn ), which produces i.i.d. outcomes Oi ∈ {0, 1} with P(Oi = 1) = pn = kPn ψk2 . The posterior state conditioned on the measurement outcome is  Pn |ψihψ|Pn (n) (n)  with probability pn  |ψ ihψ | := pn |ψihψ| 7→  (1−Pn )|ψihψ|(1−Pn )  with probability 1 − pn 1−pn Since |ψihψ| ∈ S α (L), the probability 1 − pn is bounded as 1 − pn = ∞ X i=dn |ψi |2 = ∞ X i=dn i−2α i2α |ψi |2 ≤ d−2α n ∞ X i=1 i2α |ψi |2 = n−2α/(2α+1) L. (29) Pn Let ñ = i=1 Oi be the number of systems for which the outcome was equal to 1, so that ñ has binomial distribution Bin(n, pn ). Then E(ñ/n) = pn and Var(ñ/n) = pn (1 − pn )/n = O(1/n). Therefore ñ/n →1 in probability. In the second step we discard the systems for which the outcome was 0, and we collect those with outcome 1, so that the joint state is |ψ (n) ihψ (n) |⊗ñ which is supported by the symmetric subspace Hn⊗s ñ . In order to estimate the truncated state |ψ (n) i (and by implication |ψi), we perform a covariant measurement Mn [35] whose space of outcomes is the space of pure states ρ̂n = |ψ̂n ihψ̂n | over Hn , and the infinitesimal POVM element is   ñ + dn − 1 ⊗n Mn (dρ̂) = ρ̂ dρ̂. (30) dn − 1 The covariance property means that the unitary group has a covariant action on states and their corresponding probability distributions ∗ ∗ Mn n PM UρU ∗ (dρ̂) = Tr(U ρU · dρ̂) = Pρ (d(U ρ̂U )). Recall that the trace-norm distance squared for pure states is given by d21 (ρ, ρ′ ) := kρ − ρ′ k21 = 4(1 − |hψ|ψ ′ i|2 ). In [35] it has been shown that, conditionnally on ñ, the risk of the estimator ρ̂ with respect to the trace-norm square distance is1 h i 4(d − 1) n . Eñ d21 (ρ̂n , ρ(n) ) = dn + ñ √ Using the triangle inequality we have d21 (ρ̂n , ρ) ≤ 2(d21 (ρ̂n , ρ(n) ) + d21 (ρ, ρ(n) )). Since |ψ (n) i = Pn |ψi/ pn , the bias term is d21 (ρ, ρ(n) ) = 4(1 − pn ), which by (29) is bounded by 4n−2α/(2α+1) L. Therefore    2  (dn − 1) + 8n−2α/(2α+1) L. E db (ρ̂n , ρ) ≤ 8E dn + ñ For an arbitrary small ε > 0, we have         (dn − 1) dn ñ ñ (dn − 1) 1 E ≤P +C . <1−ε +E · I( ≥ 1 − ε) ≤ O dn + ñ n dn + n · ñ/n n n n Putting together the last two upper bounds concludes the proof.  1Reference [35] uses a fidelity distance erroneously called “Bures distance" , which for pure states coincides with the trace-norm distance up to a constant LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 17 5.1.2. Lower bounds - Unimprovable rates. We will first consider the Gaussian model Gn given by equation (21) which is indexed by Hilbert √ space vectors ψ ∈ H in the Sobolev class S α (L), playing the role of means of quantum Gaussian states |G( nψ)i. In Theorem 5.2 we find a lower bound for the mean square error of any estimator ψ̂. This is then used in conjunction with the local asymptotic equivalence Theorem 4.1 to obtain a lower bound for the risk of the i.i.d. model Qn , with respect to the norm-one and Bures distances. Theorem 5.2. Consider the quantum Gaussian model Gn given by equation (21). There exists some constant c > 0 depending only on α and L such that i h lim inf inf sup n2α/(2α+1) Eψ kψbn − ψk22 ≥ c, n→∞ ψ bn ψ∈S α (L) where the infimum is taken over all estimators ψbn , understood as combination of measurements and classical estimators. The proof is given in Section 6. We now proceed to consider the i.i.d. model Qn defined in (20). We are given n copies of an unknown pure state |ψihψ|, with ψ in the Sobolev class S α (L). The goal is to find an asymptotic lower bound for the estimation risk (with respect to the Bures or norm-one loss functions) which matches the upper bound derived in section 5.1.1. Since both loss functions satisfy the triangle inequality, it can be shown that by choosing estimators which are mixed states, rather than pure states, one can improve the risk by at most a constant factor 2. Therefore we consider estimators which are pure states. In order to fix the phase of the vector representing the true and the estimated state, we will assume that hψ|e0 i ≥ 0 and hψ̂|e0 i ≥ 0. Theorem 5.3. Consider the i.i.d. quantum model Qn given by equation (20). There exists some constant c > 0 depending only on α > 1/2 and L > 0 such that   lim inf inf sup n2α/(2α+1) Eρ d2 (ρ̂n , ρ) ≥ c, n→∞ |ψ bn i |ψi∈S α (L) where ρ := |ψihψ|, the infimum is taken over all estimators ρbn := |ψbn ihψbn | (defined by a combination of measurement and a classical estimator), and the loss function d(ρ̂, ρ) is either the norm-one or the Bures distance. The proof is given in Section 6. 5.2. Quadratic functionals. This section deals with the estimation of the quadratic functional X F (ψ) = |ψj |2 · j 2β , for some fixed 0 < β < α, j≥0 which is well defined for all pure states |ψi in the ellipsoid S α (L). If the Hilbert space H is represented as L2 (R) and {|ji : j ≥ 0} is the Fock basis (cf. section 2.2.1) then F (ψ) is the moment of order 2β of the number operator N : F (ψ) = Tr(|ψihψ| · N 2β ). Below we derive upper and lower bounds for the rate of the quadratic risk for estimating F (ψ), which is of order n−1 if α ≥ 2β, and n−2(1−β/α) if β < α < 2β. 5.2.1. Upper bounds. Let us describe an estimator Fbn of F (ψ) in the quantum i.i.d. model. We P consider the measurement of the number operator with projections {|jihj|}j≥0 . For a pure state |ψi = j≥0 ψj |ji, we obtain an outcome X taking values j ∈ N with probabilities pj := Pψ (X = j) = |ψj |2 , for j ≥ 0. By measuring each quantum sample |ψi separately, we obtain i.i.d. copies X1 , . . . , Xn of X, allowing us to estimate each pj empirically, by n 1X p̂j = I(Xk = j), j ≥ 0. n k=1 which is an unbiased estimator of pj with variance pj (1 − pj )/n. The estimator of the quadratic functional is defined as N X p̂j · j 2β (31) Fbn = j=1 for an appropriately chosen truncation parameter N defined below. The next theorem, shows that a parametric rate can be attained for estimating the quadratic functional F (ψ) if α ≥ 2β, whereas a nonparametric rate is attained if β < α < 2β. 18 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE Theorem 5.4. Consider the i.i.d. quantum model Qn given by equation (20). Let Fbn be the estimator (31) of F (ψ) with N ≍ n1/4(α−β) , for α ≥ 2β, respectively N ≍ n1/2α , for β < α < 2β. Then  −1 2  n , if α ≥ 2β 2 2 where ηn = sup Eψ F̂n − F (ψ) = O(1) · ηn , (32) −2(1−β/α) n , if β < α < 2β. α ψ∈S (L) Proof of Theorem 5.4. The usual bias-variance decomposition yields  2    2 Eψ Fbn − F (ψ) = Eψ Fbn − F (ψ) + V arψ Fbn . The bias can be upper bounded as F (ψ) − Eψ Fbn = F (ψ) − N X j=1 pj · j 2β = X j≥N +1 pj · j 2β ≤ N −2(α−β) X j≥N +1 pj · j 2α ≤ LN −2(α−β) . For the variance, let us note that the vector Vb = n · (p̂1 , . . . , p̂N , p̂∗N +1 ), with pb∗N +1 = n−1 n X k=1 I(Xk ≥ N + 1), P has a multinomial distribution with parameters n and probability vector V := (p1 , . . . , pN , p∗N +1 = j≥N +1 pj )⊤ . The covariance matrix of a multinomial vector writes n·(Diag(V )−V ·V ⊤ ), where Diag(V ) denotes the diagonal matrix with entries from V . In particular, if pb := (p̂1 , ..., p̂N )⊤ , p := (p1 , ..., pN )⊤ and B := (1, 22β , ..., N 2β )⊤ then 1 Covψ (Fbn ) = Covψ (B ⊤ · pb) = B ⊤ · Covψ (b p) · B = · B ⊤ · (Diag(p) − p · p⊤ ) · B. n This gives N 1 1X pj · j 4β . Covψ (Fbn ) ≤ · B ⊤ · Diag(p) · B = n n j=1 The bound of this last term and the resulting bound of the risk is treated separately for the two cases. a) Case α ≥ 2β. In that case, N X j=1 pj · j 4β ≤ N X L pj · j 2α ≤ L implying that V ar(Fbn ) ≤ . n j=1 The upper bound of the risk is, in this case,  2 L Eψ Fbn − F (ψ) ≤ L2 N −4(α−β) + . n If we choose N ≍ n1/(4(α−β)) or larger, then the parametric rate is attained for the risk: 2  Eψ Fbn − F (ψ) = O(1) · n−1 . b) Case β < α < 2β. Here we have, N Covψ (Fbn ) ≤ N 1X N 4β−2α 1X pj · j 4β ≤ pj · j 4β−2α j 2α pj ≤ L. n j=1 n j=1 n The upper bound of the risk becomes  2 N 4β−2α Eψ Fbn − F (ψ) ≤ L2 N −4(α−β) + L. n The optimal choice of the parameter N that balances the two previous terms is N ≍ n1/(2α) , giving the attainable rate for the quadratic risk  2 Eψ Fbn − F (ψ) = O(1) · n−2(1−β/α) . Cases a) and b) together prove that the rate ηn2 is attainable.  LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 19 5.2.2. Lower bounds. The next Theorem proves the optimality of the previously attained rate for the estimation of quadratic functionals. Theorem 5.5. Consider the i.i.d. quantum model Qn given by equation (20). Then, there exists some constant c > 0 depending only on α, β (with α > β > 0), and L > 0 such that lim inf inf sup n→∞ F bn ψ∈S α (L)  2 ηn−2 · Eψ Fbn − F (ψ) ≥ c, where the infimum is taken over all measurements and resulting estimators Fbn of F (ψ). The proof is given in Section 6. 5.3. Testing. In the problem of testing for signal in classical Gaussian white noise, over a smoothness class with an L2 -ball removed, minimax rates of convergences (separation rates) are well known [41]; they are expressed in the rate of the ball radius tending to zero along with noise intensity, such that a nontrivial asymptotic power is possible. We will consider an analogous testing problem here for pure states. Accordingly, let ρ = |ψihψ| denote pure states, let ρ0 = |ψ0 ihψ0 | be a fixed pure state to serve as the null hypothesis, and let (33) B (ϕ) = {kρ − ρ0 k1 ≥ ϕ} be the complement of a trace norm ball around ρ0 . We want to test in the i.i.d. quantum model Qn given by equation (20) the following hypotheses about a pure state ρ : H0 : ρ = ρ0 H1 (ϕn ) : ρ ∈ S α (L) ∩ B (ϕn ) (34) for {ϕn }n≥1 a decreasing sequence of positive real numbers. Consider a binary POVM M = (M0 , M1 ), acting on the product states ρ⊗n , cf. Definition 2. We denote the testing risk between two fixed hypotheses by the sum of the two error probabilities ⊗n ⊗n RnM = RnM (ρ⊗n , M ) = Tr(ρ⊗n · M0 ). 0 ,ρ 0 · M1 ) + Tr(ρ In the minimax α-testing approach which dominates the literature on the classical Gaussian white noise case, one ⊗n would require Tr(ρ⊗n · 0 · M1 ) ≤ α while trying to minimize the worst case type 2 error supρ∈S α (L)∩B(ϕn ) Tr(ρ M0 ). However we will consider here the so-called detection problem [40] where the target is the worst case total error probability PM e (ϕn ) = sup ρ∈S α (L)∩B(ϕn ) ⊗n RnM (ρ⊗n , M ) = Tr(ρ0⊗n · M1 ) + 0 ,ρ sup ρ∈S α (L)∩B(ϕn ) Tr(ρ⊗n · M0 ). The minimax total error probability is then obtained by optimizing over T : P∗e (ϕn ) = inf M binary POVM PM e (ϕn ) . 5.3.1. Separation rate. A sequence {ϕ∗n }n≥1 is called a minimax separation rate if any other sequence {ϕn }n≥1 fulfills P∗e (ϕn ) → 1 if ϕn /ϕ∗n → 0 and P∗e (ϕn ) → 0 if ϕn /ϕ∗n → ∞. (35) Below we establish that ϕ∗n = n−1/2 is a separation rate in the current problem, even though the alternative H1 (·) in (34) is a nonparametric set of pure states. Recall relations (11), (12) describing the total optimal error for testing between simple hypotheses given by two pure states. Theorem 5.6. Consider the i.i.d. quantum model Qn given by equation (20), and the testing problem (34). Assume that ρ0 is in the interior of S α (L), i.e ρ0 ∈ S α (L′ ) for some L′ < L. Then ϕ∗n = n−1/2 is a minimax separation rate. The proof is given in the Section 6. 20 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 5.3.2. Sharp asymptotics. Having identified the optimal rate of convergence in the testing problem (i.e. the minimax separation rate), we will go a step further and aim at a sharp asymptotics for the minimax testing error. We will adopt the approach of [20], extended in [41], where testing analogs of the Pinsker-type sharp risk asymptotics in nonparametric estimation were obtained. The result will be framed as follows: if the radius  is chosen ϕn ∼ cn−1/2 for a certain c > 0, then the minimax testing error behaves as P∗e (ϕn ) ∼ exp −c2 /4 . Thus the sharp asymptotics is expressed as a type of scaling result: a choice of constant c in the radius implies a certain minimax error asymptotics depending on c. To outline the problem, consider the upper and lower error bounds obtained in the proof of the separation rate. In (62) we obtained the bound  n (ϕn ) ≤ exp −c2n /4 (36) PM e ⊗n if ϕn = cn n−1/2 , where Mn was the sequence of projection tests Mn = (ρ⊗n 0 , I − ρ0 ). The lower risk bound obtained in the course of proving Theorem 5.6 was q inf PM (ϕ ) ≥ 1 − 1 − (1 − c2n n−1 /4)n . n e M binary POVM If cn = c we can summarize this as p  1 − 1 − exp (−c2 /4) + o (1) ≤ P∗e (ϕn ) ≤ exp −c2 /4 . Our result will be that the upper bound is sharp and represents the minimax risk asymptotics. Theorem 5.7. Consider the i.i.d. quantum model Qn given by equation (20), and the testing problem (34). Assume that ρ0 ∈ S α (L′ ) for some L′ < L. At the minimax separation rate for the radius, i.e. for ϕn ≍ n−1/2 we have lim nϕ2n log P∗e (ϕn ) = −1/4. n The proof is given in the Section 6. 5.4. Discussion. State estimation. Tomography and optimal rates. Consider a model where the Sobolev-type assumption ρ ∈ S α (L) about the pure state ρ = |ψi hψ| (cf. (19)) is replaced by a finite dimensionality assumption: ρ ∈ Hd where Hd = {|ψi hψ| : ψj = 0, j ≥ d} and d is known. One observes n identical copies of the pure state ρ = |ψi hψ|, with possibly d = dn → ∞, i. e. the model Qn of (20) is replaced by  Qn := ρ⊗n : ρ ∈ Hd . Since Hd can be written Hd = S1,d where Sr,d := {ρ : hei |ρ|ej i = 0, i, j ≥ d, rank(ρ) = r} , the model is effectively a special case of the d × d density matrices of rank(ρ) = r considered in [47]. In [47] however, it is not known in advance that r = 1 but ρ is a density matrix of possibly low rank r, and the aim is estimation of ρ using quantum state tomography performed on n identical copies of ρ. Data are obtained by defining an observable ⊗ni=1 Ei where E1 , . . . , En are i.i.d. uniformly selected elements of the Pauli basis of the linear space of d × d Hermitian matrices, and applying the corresponding measurement to ρ⊗n . Let ρ̂∗n denote an arbitrary estimator of ρ based on that measurement. A lower asymptotic risk bound for norm-one risk is established; in the special case d2 r2 = o (n) it reads as h i r2 d2 2 ∗ kρ̂ − ρk ≥ c inf sup E (37) ρ n 1 ρ̂∗ n n ρ∈Sr,d for some c > 0 (Theorem 10 in [47]). It is also shown in [47] that (37) is attained, up to a different constant and logarithmic terms, by an entropy penalized least squares type estimator based on measurement of ⊗ni=1 Ei , even when the rank r is unknown. Analogous optimal rates for d × d mixed states ρ with Pauli measurements, but under sparsity assumptions on the entries of the matrix ρ have been obtained in [16]. Returning to our setting of pure states, where r = 1 is known, with an infimum over all measurements of ρ⊗n and corresponding estimators ρ̂n , according to [35] one has h i 4 (d − 1) 2 inf sup Eρ kρ̂n − ρk1 = (38) ρ̂n ρ∈S1,d d+n and the bound is attained by an estimator of the pure state ρ based on the covariant measurement (cf. equation (30) ). Comparing (37) for r = 1 and dn → ∞, dn = o (n) with (38), we find that the latter bound is of LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 21 order dn /n whereas the former is of order d2n /n. It means that for estimation of finite dimensional pure states, estimators based on the Pauli type measurement ⊗ni=1 Ei do not attain the optimal rate when dn → ∞. It may be conjectured that the same holds for the optimal rate over ρ ∈ S α (L), i.e. our rate of Theorem 5.1. We emphasize again that our results establish lower asymptotic risk bounds over all quantum measurements and estimators, whereas lower risk bounds within one specific measurement scheme [46] [47] [16] are essentially results of non-quantum classical statistics. Separate measurements. A notable fact is also that ⊗ni=1 Ei is a separate (or local) measurement, i.e. produces independent random variables (or random elements) Y1 , . . . , Yn each based on a measurement of a copy of ρ, whereas the covariant measurement (cp. (30)) we used for attainment our risk bound of Theorem 5.1 is of collective (or joint) type with regard to the product ρ⊗n . Separate measurements are of interest from a practical point of view since collective measurements of large quantum systems may be unfeasible in implementations [51]. In [5] it is shown that for fixed d = 2, the bound (38) can be attained asymptotically as n → ∞ (up to a factor 1 + o (1)) by a separate measurement of ρ⊗n ; it is an open question whether in our infinite dimensional setting, the optimal rate of Theorem 5.1 can be attained by a separate measurement. For mixed qubits (d = 2), an asymptotic efficiency gap between separate and collective measurements is known to exist [4]. Quadratic functionals. The elbow phenomenon. The change of regime which occurs in the optimal MSE rate ηn2 in (32) has been described as the elbow phenomenon in the literature [15]. In the classical Gaussian sequence model, it takes the following shape. Consider observations introduced in (17): yj = ϑj + n−1/2 ξj , j = 1, 2, . . . , P∞ 2α 2 where {ξj } are i.i.d. standard normal, and the parameter ϑ = (ϑj )∞ j=1 j ϑj ≤ L j=1 satisfies a restriction P ∞ 2β 2 for some α > 0. For estimation of the quadratic functional F̃ (ϑ) = j=1 j ϑj with β < α, the minimax MSE rate of convergence is (   n−1 if α ≥ 2β + 1/4 1 4 (α − β) −2r̃ 2 4(α−β) = n for r̃ = min η̃n = , 2 4α + 1 n−2 4α+1 if β < α < 2β + 1/4 (cf [45] and references cited therein). The same rate holds for estimation of the squared L2 -norm of the β-th 2 derivative of a density inan α-Hölder  class, cf. [7]. Comparing with our rate ηn in (32) which can be written 4(α−β) 1 , we see that both rates exhibit the elbow phenomenon, but at different ηn2 = n−2r for r = min 2 , 4α critical values for (α, β), and the rate for the quantum case is slightly faster in the region α < 2β + 1/4. A tail functional of a discrete distribution. Our method of proof for the optimal rate ηn2 = n−2r shows that ∞ it is also the optimal rate in the following non-quantum problem: suppose P = {pj }j=0 is a probability P∞ 2α measure on the nonnegative integers, satisfying a restriction j=0 j pj ≤ L, and the aim is to estimate the P∞ linear functional F0 (P ) = j=0 j 2β pj (which might be called a linear tail functional) on the basis of n i.i.d. PN observations X1 , . . . , Xn having law P . Indeed, Theorem 5.4 shows that the estimator F̂n = j=0 j 2β p̂j with Pn p̂j = n−1 i=1 I (Xi = j) attains the rate ηn2 for mean square error, for an appropriate choice of N . On the other hand, the observations X1 , . . . , Xn are obtained from one specific measurement in the quantum model 2 (20), in such a way that pj = |ψj | for j ≥ 0 and F0 (P ) = F (ψ). If the rate ηn2 is unimprovable in the quantum model then it certainly is in the present derived (less informative) classical model. In the latter model, we note that since F0 (P ) is linear and the law P is restricted to a convex body, optimality of the rate ηn2 can be confirmed by standard methods, e.g. based on the concept of modulus of continuity [19]. The current problem is thus an example where the elbow phenomenon is present for estimation of a linear functional; a specific feature here is that the probability measure P is discrete. Fuzzy quantum hypotheses. Our method of proof of the lower bound for quadratic functionals, which works in the approximating quantum Gaussian model, utilizes the well-known idea of setting up two prior distributions and then invoking a testing bound between simple hypotheses. This has been described as the method of fuzzy hypotheses in the literature [64]. A summary of the present quantum variant could be as follows. First, the Gaussian quantum model is represented in a fashion analogous to the classical sequence model (17) where the ϑj correspond to the displacement parameter uj in certain Gaussian pure states (the coherent states). These displacement parameters are then assumed to be random as independent, non-identically distributed normal, for j = 1, . . . , N where N = o(n). Now Gaussian averaging over the displacements uj leads to certain non-pure Gaussian states, i.e. the thermal states as the alternative, which happen to commute with the vacuum pure state (corresponding to uj = 0) as the null hypothesis. Even though both are again Gaussian states, by commutation 22 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE the problem is reduced to testing between two ordinary discrete probability distributions, i.e. the point mass at 0 and a certain geometric distribution with parameter rj , depending on j = 1, . . . , N . The combined error probability for this classical testing problem with N independent observations gives the lower risk bound. Nonparametric testing. The separation rate n−1/2 . Recall that for the classical Gaussian sequence model (17), for the testing problem H0 : ϑ 0 P= ∞ 2α 2 H1 (ϕn ) : j=1 j ϑj ≤ L and kϑk2 ≥ ϕn (39) (Sobolev ellipsoid with an L2 -ball removed), the separation rate is ϕn = n−2α/(4α+1) [41]. We established that ϕn = n−1/2 is the separation rate for the quantum nonparametric testing problem (34) involving a pure state ρ. While this “parametric” rate for a nonparametric problem is somewhat surprising, it should be noted that there also exist testing problems for classical i.i.d. data with nonparametric alternative where that separation rate applies; cf [41], sec. 2.6.2. In our case, the rate n−1/2 appears to be related to the fast rate ϕ2n = n−1 in the following nonparametric ∞ classical problem: given n i.i.d. observations X1 , . . . , Xn having law P = {pj }j=0 on the nonnegative integers, the hypotheses are H0 : P = δ0 (the degenerate law at 0) (40) H1 (ϕn ) : kP − δ0 k1 ≥ ϕ2n . For that, note first that ∞ X pj = 2 (1 − p0 ) . kP − δ0 k1 = 1 − p0 + j=1 The likelihood ratio test for δ0 against any P ∈ H1 (ϕn ) rejects if max1≤j≤n Xj > 0, thus it does not depend on P . The pertaining sum of error probabilities is n n     1 1 ≤ 1 − ϕ2n P max Xj = 0 = pn0 = 1 − kP − δ0 k1 1≤j≤n 2 2 and with a supremum over P ∈ H1 (ϕn ), the upper bound is attained. This means that for ϕn = cn−1/2 , the minimax sum of error probabilities tends to exp −c2 /2 , so that ϕ2n = n−1 is the separation rate here as claimed. In fact there is a direct connection to the quantum nonparametric testing problem (34): in the latter, for n = 1, ∞ consider a measurement defined as follows. Let {|ẽj i}j=0 be an orthonormal basis in H such that ρ0 = |ẽ0 i hẽ0 | ∞ and consider the POVM {|ẽj i hẽj |}j=0 ; the corresponding measurement yields a probability measure P on the ∞ nonnegative integers. Here the state ρ0 is mapped into δ0 and an alternative state ρ is mapped into P = {pj }j=0 such that p0 = Tr (ρ0 ρ). Condition (33) on the distance of the two states implies (cp (12)) q p p ϕn ≤ kρ − ρ0 k1 = 2 1 − Tr (ρ0 ρ) = 2 1 − p0 = 2 kP − δ0 k1 so that up to a constant, the testing problem (40) is obtained. In the quantum problem (34), we noted that the optimal test between ρ0 and a specific alternative ρ depends  ⊗n on ρ, but found that the test (binary POVM) Mn = ρ⊗n is minimax optimal in the sense of the rate 0 , I − ρ0 and also in the sense of a sharp risk asymptotics. The sharp minimax optimality seems to be a specific result ∞ for the quantum case. We note that the optimal test Mn can be realized via a measurement {|ẽj i hẽj |}j=0 as ⊗n described above, applied separately to each component of ρ , resulting in independent identically distributed r.v.’s X1 , . . . , Xn . The test Mn then amounts to rejecting H0 if max1≤j≤n Xj > 0. Note that this measurement is incompatible with the one (30) providing the optimal rate for state estimation. Other separation rates. In our proof of the lower bound for quadratic functionals, we formulated the nonparaP metric testing problem for pure states (50) where the alternative includes the restriction j≥0 |ψj |2 j 2β ≥ ηn , and established that the rate ηn = n−1+β/α is unimprovable there. Introduce a seminorm  1/2 X 2 kψk =  |ψj | j 2β  2,β j≥1 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 23 (excluding the term for j = 0) and write the restriction as kψk2,β ≥ ϕn = ηn1/2 ; (41) then the case β = 0 gives (cp (12)) X 1 2 2 2 2 ϕ2n ≤ |ψj | = 1 − |ψ0 | = 1 − |hψ|e0 i| = k|e0 i he0 | − |ψi hψ|k1 , 4 j≥1 in other words, for ρ0 = |e0 i he0 | and ρ = |ψi hψ|, the restriction (41) is equivalent to kρ − ρ0 k1 ≥ 2ϕn . In that sense, the testing problems (34) and (50) are equivalent up to a constant, if β = 0 and ρ0 = |e0 i he0 |. For β > 0, the testing problem (50) is a quantum pure state analog of the generalization of the classical problem (39) where kϑk2 ≥ ϕn is replaced by kϑk2,β ≥ ϕn (α-ellipsoid with a β-ellipsoid removed); the separation rate in the latter is ϕn = n−2(α−β)/(4α+1) , cf. [41], sec. 6.2.1. In (50) the separation rate is ϕn = n−1/2+β/2α , i.e. of the more typical nonparametric form as well. References [1] Artiles, L, Gill, R., and Guţă, M. An invitation to quantum tomography. J. Royal Statist. Soc. B (Methodological), 67:109–134, 2005. [2] K. M. R. Audenaert, J. Calsamiglia, R. Muñoz Tapia, E. Bagan, Ll. Masanes, A. Acin, and F. Verstraete. Discriminating states: The quantum Chernoff bound. Phys. Rev. Lett., 98:160501, 2007. [3] K. M. R. Audenaert, M. Nussbaum, A. Szkola, and F. Verstraete. Asymptotic error rates in quantum hypothesis testing. Commun. Math. Phys., 279:251–283, 2008. [4] E. Bagan, M. A. Ballester, R. D. Gill, R. Muñoz Tapia, and O. Romero-Isart. Separable measurement estimation of density matrices and its fidelity gap with collective protocols. Phys. Rev. Lett., 97:130501, Sep 2006. [5] E. Bagan, A. Monras, and R. Muñoz Tapia. Comprehensive analysis of quantum pure-state estimation for two-level systems. Phys. Rev. A, 71:062318, Jun 2005. [6] O. E. Barndorff-Nielsen, Gill, R., and Jupp, P. E. On quantum statistical inference (with discussion). J. R. Statist. Soc. B, 65:775–816, 2003. [7] P. J. Bickel and Y. Ritov. Estimating integrated squared density derivatives: sharp best order of convergence estimates. Sankhyā Ser. A, 50(3):381–393, 1988. [8] B. Bongioanni and J. L. Torrea. Sobolev spaces associated to the harmonic oscillator. Proc. Indian Acad. Sci. Math. Sci., 116(3):337–360, 2006. [9] Bruno Bongioanni. Sobolev spaces diversification. Rev. Un. Mat. Argentina, 52(2):23–34, 2011. [10] S. L. Braunstein and Caves C. M. Statistical distance and the geometry of quantum states. Phys. Rev. Lett., 72:3439–3443, 1994. [11] Lawrence D. Brown, T. Tony Cai, Mark G. Low, and Cun-Hui Zhang. Asymptotic equivalence theory for nonparametric regression with random design. Ann. Statist., 30(3):688–707, 2002. Dedicated to the memory of Lucien Le Cam. [12] Lawrence D. Brown and Mark G. Low. Asymptotic equivalence of nonparametric regression and white noise. Ann. Statist., 24(6):2384–2398, 1996. [13] C. Butucea, M. Guţă, and L. Artiles. Minimax and adaptive estimation of the Wigner function in quantum homodyne tomography with noisy data. Annals of Statistics, 35:465–494, 2007. [14] C. Butucea, M. Guţă, and T. Kypraios. Spectral thresholding quantum tomography for low rank states. New Journal of Physics, 17:113050, 2015. [15] T. Tony Cai and Mark G. Low. Nonquadratic estimators of a quadratic functional. Ann. Statist., 33(6):2930–2956, 2005. [16] Tony Cai, Donggyu Kim, Yazhen Wang, Ming Yuan, and Harrison H. Zhou. Optimal large-scale quantum state tomography with Pauli measurements. Ann. Statist., 44(2):682–712, 2016. [17] A. Carpentier, J. Eisert, D. Gross, and R. Nickl. Uncertainty Quantification for Matrix Compressed Sensing and Quantum Tomography Problems. arXiv:1504.03234. [18] M. Christandl and R. Renner. Reliable quantum state tomography. Phys.Rev. Lett., 109:120403, 2012. [19] David L. Donoho and Richard C. Liu. Geometrizing rates of convergence ii,iii. Ann. Statist., 19(2):633–667, 668–701, 1991. [20] M. S. Ermakov. Minimax detection of a signal in Gaussian white noise. Teor. Veroyatnost. i Primenen., 35(4):704–715, 1990. [21] P. Faist and R. Renner. Practical and reliable error bars in quantum tomography. Phys. Rev. Lett., 117:010404, 2016. [22] S. T. Flammia, D. Gross, Y.-K. Liu, and J. Eisert. Quantum Tomography via Compressed Sensing: Error Bounds, Sample Complexity, and Efficient Estimators. New. J. Phys., 14:095022, 2012. 24 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE [23] C. A. Fuchs and J. van de Graaf. Cryptographic distinguishability measures for quantum-mechanical states. IEEE Transactions Information Theory, 45, 1999. [24] R. D. Gill and S. Massar. State estimation for large ensembles. Phys. Rev. A, 61:042312, 2000. [25] Richard D. Gill and Mădălin I. Guţă. On asymptotic quantum statistical inference. In From probability to statistics and back: high-dimensional models and processes, volume 9 of Inst. Math. Stat. (IMS) Collect., pages 105–127. Inst. Math. Statist., Beachwood, OH, 2013. [26] Georgi K. Golubev, Michael Nussbaum, and Harrison H. Zhou. Asymptotic equivalence of spectral density estimation and Gaussian white noise. Ann. Statist., 38(1):181–214, 2010. [27] Ion Grama and Michael Nussbaum. Asymptotic equivalence for nonparametric generalized linear models. Probab. Theory Related Fields, 111(2):167–214, 1998. [28] D. Gross. Recovering Low-Rank Matrices From Few Coefficients in Any Basis. IEEE Transactions on Information Theory, 57:1548–1566, 2011. [29] D. Gross, Y.-K. Liu, S.T. Flammia, S. Becker, and J. Eisert. Quantum State Tomography via Compressed Sensing. Physical Review Letters, 105:150401, 2010. [30] M. Guţă, B. Janssens, and J. Kahn. Optimal estimation of qubit states with continuous time measurements. Commun. Math. Phys., 277:127–160, 2008. [31] M. Guţă and J. Kahn. Local asymptotic normality for qubit states. Phys. Rev. A, 73(5):052108, 2006. [32] M. Guta and J. Kahn. Local asymptotic normality and optimal estimation for d-dimensional quantum systems. In Quantum Stochastics and Information: statistics, filtering and control, pages 300–322. World Scientific, 2008. [33] Mădălin Guţă and Anna Jenčová. Local asymptotic normality in quantum statistics. Comm. Math. Phys., 276(2):341–379, 2007. [34] H. Häffner, W. Hänsel, C. F. Roos, J. Benhelm, D. Chek-al kar, M. Chwalla, T. Körber, U. D. Rapol, M. Riebe, P. O. Schmidt, C. Becher, O. Gühne, W. Dür, and R. Blatt. Scalable multiparticle entanglement of trapped ions. Nature, 438:643, 2005. [35] M. Hayashi. Asymptotic estimation theory for a finite-dimensional pure state model. Journal of Physics A: Mathematical and General, 31(20), 1998. [36] Masahito Hayashi, editor. Asymptotic theory of quantum statistical inference: selected papers. World Scientific, 2005. [37] Carl W. Helstrom. Quantum Detection and Estimation Theory. Academic Press, New York, 1976. [38] F. Hiai and D. Petz. The proper formula for relative entropy and its asymptotics in quantum probability. Commun. Math. Phys., 143:99–114, 1991. [39] A. S. Holevo. Probabilistic and Statistical Aspects of Quantum Theory. North-Holland, 1982. [40] Yuri Ingster and Natalia Stepanova. Estimation and detection of functions from anisotropic Sobolev classes. Electron. J. Stat., 5:484–506, 2011. [41] Yuri I. Ingster and Irina A. Suslina. Nonparametric goodness-of-fit testing under Gaussian models, volume 169 of Lecture Notes in Statistics. Springer-Verlag, New York, 2003. [42] P. Ji and M. Nussbaum. Sharp minimax adaptation over Sobolev ellipsoids in nonparametric testing. To appear, Electron. J. Stat. [43] J. Kahn and M. Guţă. Local asymptotic normality for finite dimensional quantum systems. Commun. Math. Phys., 289:597–652, 2009. [44] Vladislav Kargin. On the Chernoff bound for efficiency of quantum hypothesis testing. Ann. Statist., 33(2):959–976, 2005. [45] Jussi Klemelä. Sharp adaptive estimation of quadratic functionals. Probab. Theory Related Fields, 134(4):539–564, 2006. [46] Vladimir Koltchinskii. Von Neumann entropy penalization and low-rank matrix estimation. Ann. Statist., 39(6):2936–2973, 2011. [47] Vladimir Koltchinskii and Dong Xia. Optimal estimation of low rank density matrices. J. Mach. Learn. Res., 16:1757–1792, 2015. [48] L. Le Cam. Asymptotic Methods in Statistical Decision Theory. Springer Verlag, New York, 1986. [49] Ulf Leonhardt. Measuring the Quantum State of Light. Cambridge University Press, 1997. [50] K. Li. Discriminating quantum states: The multiple Chernoff distance. Ann. Statist., 44:1661–1679, 2016. [51] Ranjith Nair, Saikat Guha, and Si-Hui Tan. Realizable receivers for discriminating coherent and multicopy quantum states near the quantum limit. Phys. Rev. A, 89:032318, Mar 2014. [52] Michael A. Nielsen and Isaac L. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, Cambridge, 2000. [53] M. Nussbaum and A. Szkola. The Chernoff lower bound for symmetric quantum hypothesis testing. Ann. Statist., 37:1040–1057, 2006. [54] Michael Nussbaum. Asymptotic equivalence of density estimation and Gaussian white noise. Ann. Statist., 24(6):2399–2430, 1996. LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 25 [55] T. Ogawa and H. Nagaoka. Strong converse and Stein’s lemma in quantum hypothesis testing. IEEE Transactions on Information Theory, 46:2428–2433, 2000. [56] M. G. A. Paris and J. Řeháček, editors. Quantum State Estimation, 2004. [57] K. R. Parthasarathy. An Introduction to Quantum Stochastic Calculus. Modern Birkhäuser Classics. Birkhäuser/Springer Basel AG, Basel, 1992. [58] D. Petz and Jencova, A. Sufficiency in quantum statistical inference. Commun. Math. Phys., 263:259 – 276, 2006. [59] Markus Reiß. Asymptotic equivalence for nonparametric regression with multivariate and random design. Ann. Statist., 36(4):1957–1982, 2008. [60] Angelika Rohde. On the asymptotic equivalence and rate of convergence of nonparametric regression and Gaussian white noise. Statist. Decisions, 22(3):235–243, 2004. [61] H. Strasser. Mathematical Theory of Statistics. de Gruyter, 1985. [62] K. Temme and F. Verstraete. Quantum chi-squared and goodness of fit testing. J. Math. Phys., 56:012202, 2015. [63] E. Torgersen. Comparison of Statistical Experiments. Cambridge University Press, 1991. [64] Alexandre B. Tsybakov. Introduction to Nonparametric Estimation. Springer Series in Statistics. Springer, New York, 2009. [65] M. Walter and J. M. Renes. Lower bounds for quantum parameter estimation. IEEE Transactions on Information Theory, 60:8007–8023, 2014. 6. Proofs h i Proof of Theorem 5.2. Let us denote by RnE = inf ψbn supψ∈S α (L) Eψ kψbn − ψk22 the minimax risk. α The first step is to reduce the set of states S α (L) to a finite hypercube denoted S1:N (L) consisting of certain P 1/(2α+1) non-zero coefficients with respect to the “truncated” vectors |ψi = 1≤i≤N ψi |ei i which have N ≍ n standard basis. This will provide a lower bound to the minimax risk. The coefficients are chosen as σj ψj = ± √ , σj2 = λ(1 − (j/N )2α ), j = 1, . . . , N, for some fixed λ > 0 n and we check that they satisfy the ellipsoid constraint X j≥1 N |ψj |2 j 2α = N 2α+1 2αλ λ X 2α (j − j 4α N −2α ) ≤ (1 + o(1)) ≤ L n j=1 n (2α + 1)(4α + 1) for an appropriate choice of λ > 0. Using the factorisation property (9) we can identify the corresponding Gaussian states with the N -mode state √ defined by |φi = ⊗N |G( nψ )i, where the remaining modes are in the vacuum state and can be ignored. j j=1 Thus RnE ≥ inf = inf sup b ψ∈S α (L) ψ 1:N sup b ψ∈S α (L) ψ 1:N i h Eψ kψb − ψk22   N X |ψbj − ψj |2  . Eψ  j=1 α The supremum over the finite hypercube S1:N (L) is bounded from below by the average over all its elements. This turns the previous maximal risk into a Bayesian risk, that we can further bound from below as follows: RnE ≥ inf = inf ≥ 1 2N b ψ b ψ X α (L) j=1 ψ∈S1:N N X 1 N 2 j=1 N X inf b j=1 ψj N X 1 2N X α (L) ψ∈S1:N X α (L) ψ∈S1:N i h Eψ |ψbj − ψj |2 i h Eψ |ψbj − ψj |2 i h Eψ |ψbj − ψj |2 . (42) 26 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE √ In the second line ψb is the result of an arbitrary measurement and estimation procedure of the state |G( nψ)i. In the third line each infimum is over procedures for estimating the component ψj only; since such procedure may not be compatible with a single measurement, the third line is upper bounded by the second. The second major step in the proof of the lower bounds is to reduce the risk over all measurements, to testing two simple hypotheses. Let us bound from below the term (42) for arbitrary fixed j between 1 and N : i h X 1 bj − ψj |2 | ψ E ψ 2N ψ∈S α (L)   1:N h h X X √ 2i √ 2 i 1 1 1 Eψ |ψbj − σj / n| + N −1 Eψ |ψbj − (−σj / n)| =  2  2N −1 2 α α = 1n 2 h ψ∈S(j+) (L) √ Eρ+ |ψbj − σj / n|2 j i ψ∈S(j−) (L) h io √ + Eρ− |ψbj − (−σj / n)|2 , j (43) √ α where the sum over ψ ∈ S(j±) (L) means that the j th coordinate is fixed to ±σj / n and all k th coordinates, √ √ for k 6= j, take values in {σk / n, −σk / n}. In the third line, we denote by ρ± j the average state over states in α S(j±) (L). − Let us define the testing problem of the two hypotheses H0 : ρ = ρ+ j against H1 : ρ = ρj . For a given estimator ψbj we construct the test   σj σj ∆ = I ψbj − √ > ψbj − (− √ ) , n n and decide H1 or H0 , if ∆ equals 1 or 0, respectively. By the Markov inequality, we get that # "   2 σj2 σj σ σj j . ≥ Eρ± ψbj − (± √ ) Pρ± ψbj − (± √ ) ≥ √ j n n j n n On the one hand,   √ σj b ≥ Pρ+ (∆ = 1). Pρ+ |ψj − σj / n| ≥ √ j j n (44) σ σ Indeed, under Pρ+ , the event ∆ = 1 implies that |ψbj − √jn | > |ψbj + √jn |, which further implies by the triangular j inequality that σj 2σj 2σj σj σj ψbj − √ ≥ √ − ψbj + √ ≥ √ − ψbj − √ , n n n n n σ giving |ψbj − ψj | ≥ √j . By a similar reasoning for the P − distribution we get n ρj   √ σj b √ ≥ Pρ− (∆ = 0). Pρ− |ψj + σj / n| ≥ j j n By using (44) and (45) in (43)       σj2  √ 2 √ 2 1 Eρ+ ψbj − σj / n Pρ+ (∆ = 1) + Pρ− (∆ = 0) . + Eρ− ψbj − (−σj / n) ≥ j j j j 2 2n (45) To summarise, we have lower bounded the MSE by the probability of error for testing between the states ρ± j . At closer inspection, these states are of the form |G(σj )ihG(σj )| ⊗ ρ and |G(−σj )ihG(−σj )| ⊗ ρ where ρ is a fixed state obtained by averaging the coherent states of all the modes except j. Recall that the optimal testing error in (11) gives a further bound from below 1 − ρ− Pρ+ (∆ = 1) + Pρ− (∆ = 0) ≥ 1 − kρ+ j k1 . j j 2 j Moreover, the state ρ can be dropped without changing the optimal testing error We conclude that − 2 kρ+ j − ρj k1 = k|G(σj )ihG(σj )| − |G(−σj )ihG(−σj )|k1 = 2(1 − exp(−2σj )). inf bj ψ 1 2      σj2 √ 2 √ 2 · exp(−2σj2 ) Eρ+ ψbj − σj / n + Eρ− ψbj − (−σj / n) ≥ j j 2n LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 27 and we further use this in (43) to get RnE    N N  X σj2 j 2α j 2α N λ X N 2 1−( ) exp −2 · λ(1 − ( ) ) ≥ c . · exp(−2σj ) = · ≥ 2n n 2N N N n j=1 j=1 Indeed, the average over j is the Riemann sum associated to the integral of a positive function and can be bounded from below by some constant c > 0 depending on α. Moreover, N/n ≍ n−2α/(2α+1) and thus we finish the proof of the theorem.    Proof of Theorem 5.3. Let R̃nE = inf |ψbn i sup|ψi∈S α (L) Eρ d(ρ̂n , ρ)2 be the minimax risk for Qn . We bound from below the risk by restricting to (pure) states in a neigbourhood Σn (e0 ) of the basis vector |e0 i defined as follows. As in (22) we write the state and the estimator in terms of their corresponding local vectors p p |ψi = 1 − kuk2 |e0 i + |ui, |ψ̂i = 1 − kûk2 |e0 i + |ûi, |ui, |ûi ⊥ |e0 i. Then the neighbourhood is given by Σn (e0 ) := {|ψu i : kuk ≤ γn }, where γn = (n log n)−1/4 . Such states are described by the local model Qn (e0 , γn ), cf. equation (23). The risk is bounded from below by   R̃nE ≥ inf sup Eρ d(ρ̂n , ρ)2 . bn i |ψi∈S α (L)∩Σn (e0 ) |ψ By using the triangle inequality we can assume that ψ̂ ∈ Σn (e0 ), while incurring at most a factor 2 in the risk. By using the quadratic approximation (28) we find that d2 (b ρn , ρ) = kku − ûk2 + o(n−1 ) (46) where k = 1 or k = 4 depending on which distance we use. Since n−1 decreases faster than n−2α/(2α+1) , the second term does not contribute to the asymptotic rate and can be neglected, so that the problem has been reduced to that of estimating the local parameter u with respect to the Hilbert space distance. To study the latter, we further restrict the set of states to a hypercube similar to the one in the proof of Theorem 5.2, P α (L). As before, consisting of states |ψu i with “truncated” local vectors |ui = 1≤i≤N ui |ei i belonging to S1:N 1/(2α+1) there are N ≍ n non-zero coefficients of the form σj uj = ± √ , σj2 = λ(1 − (j/N )2α ), j = 1, . . . , N. n It has been already shown that such vectors belong to the ellipsoid S α (L). Additionally, we show that they also belong to the local ball Σn (e0 ). Indeed kuk2 = N X j=1 2 N N  1X  1X 2 2α σj = λ 1 − (j/N ) n j=1 n j=1   N  N 1 X  N 2α  = λ 1 − (j/N ) ≤ C1 , n N j=1 n |uj | = where we used that as N → ∞ the expression between the parentheses tens to a finite integral. As N scales as n1/(2α+1) , the upper bound becomes ke0 − ψu k2 ≤ C2 n−2α/(2α+1) = o(γn2 ) and the state |ψu i belongs to the local ball Σn (e0 ). Taking into account (46) the risk is therefore lower bounded as   R̃nE ≥ inf sup Eρu ku − ûk2 + o(n−1 ). u b u∈S α (L) 1:N where ρu = |ψu ihψu |, and the infimum is now taken over the local component |ûi of an estimator |ψ̂i = p 1 − kûk2 |e0 i + |ûi. The first term is further lower bounded by passing to the Bayes risk for the uniform α distribution over S1:N (L), similarly to the proof of Theorem 5.2 R̃nE ≥ N X j=1 By following the same steps we get X   1 Eρu |b u j − u j |2 2N α inf u bj = u∈S1:N (L) ≥ 1 2N X α (L) u∈S1:N   Eψu |b uj − uj |2 + o(n−1 ). h h io √ i √ 1n Eτ + |ψbj − σj / n|2 + Eτ − |ψbj − (−σj / n)|2 , j j 2  σ2 σj2  1 j Pτ + (∆ = 1) + Pτ − (∆ = 0) ≥ · (1 − kτj+ − τj− k1 ), j 2n 2n 2 (47) 28 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE α where we denote by τj± the average state over states |ψu ihψu |⊗n with u ∈ S(j±) (L), and ∆ is a test for the + − hypotheses H0 : τ = τj and H1 : τ = τj . In the last inequality we used the Helstrom bound [37] which expresses the optimal average error probability for two states discrimination in terms of the norm-one distance between states. We now make use of the local asymptotic equivalence result in Theorem 4.1. From (25) we know that there exist quantum channels Sn such that  √ √ |ψu ihψu |⊗n − Sn |G( nu)ihG( nu)| 1 ≤ ∆(Qn , Gn ) = o(1). δn := max α u∈S1:N (L) By Lemma 3.1 we get − kτj+ − τj− k1 ≤ kρ+ j − ρj k1 + 2δn where ρ± j are the corresponding mixtures in the Gaussian model as defined in the proof of Theorem 5.2. From (47) we then get 1 2N X α (L) u∈S1:N   σj2 σj2 1 − u j − u j |2 ≥ Eρu |b · (1 − kρ+ − ρ k − δ ) ≥ · (exp(−2σj2 ) − δn ) 1 n j 2n 2 j 2n The rest of the proof follows as in the proof of Theorem 5.2, with the additional remark that min exp(−2σj2 ) = λ(1 − N −α ) ≍ λ j and infinitely larger than δn , for n large enough.   2 Proof of Theorem 5.5. Denote by RnF = inf Fbn supψ∈S α (L) ηn−2 · Eψ Fbn − F (ψ) the minimax risk. The case a) where α ≥ 2β reduces to the Cramér-Rao bound that proves that the parametric rate 1/n is always a lower bound for the mean square error for estimating F (ψ). We prove that in the case b) where β < α < 2β, this bound from below increases to n−2(1−β/α) (up to constants). By the Markov inequality,  2 1  ηn  . (48) ηn−2 · Eψ Fbn − F (ψ) ≥ · Pψ |Fbn − F (ψ)| ≥ 4 2 α Let us restrict the set n (e0 , γn ) (see equation p of pure states S (L) to its intersection with the local model Q 2 (23)) where |ψu i = 1 − kuk · |e0 i + |ui is such that kuk ≤ γn , with γn = (n log n)−1/4 . In other words, u belongs to the set     X sα (L, γn ) = u ∈ ℓ2 (N∗ ) : |uj |2 j 2α ≤ L and kuk ≤ γn .   j≥1 Using the fact that F (e0 ) = 0, we have  1 ηn  sup · Pψ |Fbn − F (ψ)| ≥ 2 ψ∈S α (L) 4 ) (   1 ηn  ηn  b b ≥ max Pe0 |Fn | ≥ , sup Pψu |Fn − F (ψu )| ≥ 4 2 2 u∈sα (L,γn ),F (ψu )≥ηn ( )     1 η η n n ≥ Pe0 |Fbn | ≥ + sup Pψu |Fbn − F (ψu )| ≥ 8 2 2 u∈sα (L,γn ),F (ψu )≥ηn ( )   ηn  ηn  1 Pe0 |Fbn | ≥ + sup Pψu |Fbn | < ≥ 8 2 2 u∈sα (L,γn ),F (ψu )≥ηn (49) where in the last inequality we used that |Fbn | < ηn /2 and F (ψu ) ≥ ηn imply |Fbn − F (ψu )| ≥ ηn /2. Note also that F (ψu ) = F (u) for |ui ∈ H0 ; we now consider the testing problem with hypotheses  H0 : |ui = |0i (50) H1 (α, L, γn , ηn ) : |ui, with u ∈ sα (L, γn ) and F (u) ≥ ηn . Let ∆ = ∆(ηn ) = I(|Fbn | ≥ ηn /2) be the test that accepts the null hypothesis when ∆ = 0 and rejects the null hypothesis when ∆ = 1. Then the right-hand side of (49) is lower bounded by the sum of the error LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 29 probability of type I and of the maximal error probability of type II of ∆. We can describe ∆ as a binary POVM M = (M0 , M1 ), depending on ηn : M (ηn ) = (M0 (ηn ), M1 (ηn )). Thus,  ηn  = Tr(|e0 ihe0 |⊗n · M1 ) (51) Pe0 |Fbn | ≥ 2 and  ηn  Pψu |Fbn | < = Tr(|ψu ihψu |⊗n · M0 ). 2 By putting together (48)-(52), we get that the minimax risk has the lower bound 1 RnF ≥ inf 8 M ⊗n he⊗n 0 |M1 |e0 i + sup u∈sα (L,γn ),F (u)≥ηn (52) ! hψu⊗n |M0 |ψu⊗n i . Now, using the local asymptotic equivalence Theorem 4.1 with respect to the state |ψ0 i := |e0 i we map the i.i.d. ensemble |ψu i⊗n to the Gaussian state |G(u)i ∈ F (H0 ). The lower bound becomes ! √ √ 1 F Rn ≥ inf h0|Q1 |0i + (53) sup hG( nu)|Q0 |G( nu)i + o(1) 8 Q u∈sα (L,γn ),F (u)≥ηn where the infimum is taken over tests Q = (Q0 , Q1 ) and the o(1) terms stems from the vanishing Le Cam distance ∆(Qn (e0 , γn ), Gn (e0 , γn )). The lower bound has been transformed into a testing problem for the Gaussian model. In order to bound from below the maximal error probability of type II, we define a prior distribution on the set of alternatives and average over the whole set with respect to this a priori distribution. Similarly to the classical proofs of lower bounds, our construction will lead to a test of simple hypotheses: the former null and the constructed averaged state. Assume that {uj }j≥1 are all independently distributed, such that uj has a complex (bivariate) Gaussian distribution N2 (0, 12 σj2 · I2 ) for all j from 1 to N , and that uj = 0 for all j > N , where I2 is the 2 × 2 identity matrix. The σj2 are defined as  2α ! j 2 , (54) σj = λ 1 − N + where λ, N > 0 are selected such that X X j 2α σj2 = L(1 − ε) and j 2β σj2 = n−1+β/α (1 + ε), j≥1 (55) j≥1 for an arbitrary ε > 0. Let us denote by Π the joint prior distribution of {uj }j≥1 . Such a choice of the prior distribution was first introduced by Ermakov [20] for establishing sharp minimax risk bounds for nonparametric testing in the Gaussian white noise model. This construction represents an analog of the prior distribution used in Pinsker’s theory for sharp estimation of functions. In our case, using a Gaussian prior as an alternative hypothesis leads to the well-known Gaussian thermal state. The essence of this construction is that the random vectors u = {uj }j≥1 concentrate asymptotically, with probability tending to 1, on the spherical segment {u ∈ ℓ2 (N) : C n−1 ≤ kuk2 ≤ C n−1 (1 + 2ε′ )}, for ε′ > 0 depending on ε and some constant C > 0 depending on α and β described later on, and on the alternative set of hypothesis, H1 (α, L, γn , ηn ). Note that the spherical segment is included in the set kuk ≤ γn , as γn = (n log n)−1/4 ≫ n−1/2 . This is proven by the following lemma. Lemma 6.1. A unique solution (λ, N ) of (54), (55), exists for n large enough and admits an asymptotic expansion with respect to n ((2β + 1)(2β + 2α + 1))(α+1/2)/(α−β) (1 + ε)(α+1/2)/(α−β) , Cλ = (β+1/2)/(α−β) (1 − ε) 2α(L(2α + 1)(4α + 1))(β+1/2)/(α−β)  1/(2(α−β)) 1/(2(α−β))  1−ε L(2α + 1)(4α + 1) 1/2α N ∼n CN , CN = . 1+ε (2β + 1)(2β + 2α + 1) λ ∼ n−1−1/2α Cλ (56) 30 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE The independent complex Gaussian random variables uj ∼ N2 (0, 21 σj2 I2 ), with σj ’s and (λ, N ) given in (54), (55), are such that, for an arbitrary ε > 0,   N X 2 |uj | ≤ C n−1 (1 + 2ε′ ) → 1, (57) P C n−1 ≤ j=1   N X 2 P j 2α |uj | ≤ L → 1, (58) j=1   N X 2 j 2β |uj | ≥ n−1+β/α  → 1, P (59) j=1 where C = Cλ · CN · 2α/(2α + 1) is a positive constant depending on α and β, and ε′ > 0 depends only on ε. Proof of Lemma 6.1. The solution of the problem (54), (55) can be found in [20] (see also [42], Lemma 8 ) for β = 0; a similar reasoning applies here. Let us prove that the random variables {uj }j=1,...,N satisfy (57) to (59). We have  2α ! N N X X j 2α 2 1− σj = λ ∼ λN N 2α + 1 j=1 j=1 ∼ Cλ CN 2α n−1 (1 + ε)α/(α−β) (1 − ε)−β/(α−β) = C n−1 (1 + ε′ ), 2α + 1 where we denote ε′ = (1 + ε)α/(α−β) (1 − ε)−β/(α−β) − 1 which is positive for all ε ∈ (0, 1).   2 2 Note that E |uj | = σj2 and V ar |uj | = σj4 . We have     N N   X X 2 2 |uj | ≤ C n−1 (1 + 2ε′ ) = 1 − P  |uj | < C n−1  − P |uj |2 > C n−1 (1 + 2ε′ ) . P C n−1 ≤ j=1 j=1 Now, by the Markov inequality,     N N X X 2 2 |uj | < C n−1  = P  (|uj | − σj2 ) < C n−1 − C n−1 (1 + ε′ + o(1)) P j=1 j=1   N X 2 ≤ P  (σj2 − |uj | ) > C n−1 (ε′ + o(1)) j=1 ≤ ≍ Moreover, PN j=1 V ar(|uj | C 2 n−2 ε′2 /2 2 ) ≤ PN 4 j=1 σj C 2 n−2 ε′2 2 λ2 N ≍ n−1/2α = o(1). C 2 n−2 ε′2     N N X X 2 2 P |uj | > C n−1 (1 + 2ε′ ) = P  (|uj | − σj2 ) > C n−1 (ε′ + o(1)) = o(1), j=1 j=1 which finishes the proof of (57). Also, in view of (55), we have     N N X X 2 2 j 2α |uj | > L = P  P j 2α (|uj | − σj2 ) > L ε j=1 j=1 ≤ PN j=1 2 ≍   2 j 4α V ar |uj | L 2 ε2 4α+1 λ N L 2 ε2 = PN ≍ n−1/2α = o(1), 4α 4 j=1 j σj L 2 ε2 (60) LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE 31 proving (58). Also,     N N X X 2 2 P j 2β |uj | < n−1+β/α  ≤ P  j 2β (|uj | − σj2 ) < −n−1+β/α ε j=1 j=1 ≤ ≍ PN 2 4β j=1 j V ar(|uj | ) n−2+2β/α ε2 = PN 4β 4 j=1 j σj n−2+2β/α ε2 λ2 N 4β+1 ≍ n−1/2α = o(1), n−2+2β/α ε2 proving (59).  Let us go back to (53) and bound from below the maximal error probability of type II by the averaged risk, with respect to our prior measure Π: Z √ √ √ √ Tr(|G( n u)ihG( n u)| · Q0 )Π(du) sup hG( n u)|Q0 |G( n u)i ≥ u∈sα (L),F (u)≥ηn = Tr ≥ Tr Z Z H1 (α,L,γn ,ηn ) √ √ |G( n u)ihG( n u)|Π(du) · Q0 √ √ |G( n u)ihG( n u)|Π(du) · Q0   − Z H1 (α,L,γn ,ηn )C √ √ Tr(|G( n u)ihG( n u)| · Q0 )Π(du) − Π(H1 (α, L, γn , ηn )C ). √ √ In the last inequality we used that Tr(|G( n u)ihG( n u)|·Q0 ) ≤ 1. By Lemma 6.1, Π(H1 (α, L, γn , ηn )C ) = o(1) and thus we deduce from (53) that   Z √ √ 1 F + o(1). Rn ≥ inf Tr (|G(0)ihG(0)| · Q1 ) + Tr |G( n u)ihG( n u)|Π(du) · Q0 8 Q We recognize in the previous line the sum of error probabilities of type I and II for testing two simple quantum hypotheses, i.e. the underlying state is either |G(0)i or the mixed state Z √ √ Φ := |G( n u)ihG( n u)|Π(du). As a last step of the proof, we characterize more precisely the previous mixed Gaussian state as a thermal state and use classical results from quantum testing of two simple hypotheses to √ give the bound from below of the testing risk. Recall from Section 2.2.2, equation (9) that coherent√states |G( n u)i factorize as tensor product of one-mode coherent states with displacements uj , i.e. ⊗j≥1 |G( nuj )i. A coherent state with displacement z = x + iy with x, y ∈ R is fully characterized by its Wigner function given by equation (3). Since the prior is Gaussian, our mixed state Φ is Gaussian and can be written     Z N Z O O √ √ √ √ |G( n u)ihG( n u)|Π(du) =  |G( n uj )ihG( n uj )|Πj (duj ) ⊗  |0ih0| j=1 := N O j=1  Φj ⊗  O j≥N +1  j≥N +1 |0ih0| where Πj represents the bivariate centred Gaussian distribution with covariance matrix σj2 /2·I2 over the complex plane uj = xj + iyj . Using equation (6), and setting σ 2 = nσj2 /2 there, we find that the individual modes with index j ≤ N are centred Gaussian thermal states Φj = Φ(rj ) (cf. definition (4)) with rj = nσj2 /(nσj2 + 1). In order to bound from below the right-hand side term in (53) we use the theory of quantum testing of two simple hypotheses H0 : ⊗j≥1 Φ(0) against H1 : ⊗N j=1 Φ(rj ) ⊗j≥N +1 Φ(0). Using (11), it is easy to see that this testing problem is equivalent to H0 : (Φ(0))⊗N against H1 : ⊗N j=1 Φ(rj ). As the vacuum and the thermal state are both diagonalized by the Fock basis, they commute, which reduces ⊗N the problem to a classical test between the N -fold products of discrete distributions H0 : {G(0)} and H1 :  ∞ N {⊗j=1 G(rj )}. In view of the form (4) of the thermal state, G(rj ) is the geometric distribution (1 − rj )rjk k=0 and G(0) is the degenerate distribution concentrated at 0. The optimal testing error is given by the maximum 32 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE likelihood test which decides H0 if and only if all observations are 0. The type I error is 0 and the type II error is   N N N Y Y X 1  (1 − rj ) = σj2  ≥ exp(−c), 2 + 1 ≥ exp −n nσ j j=1 j=1 j=1 for some c > 0, where in the last inequality we used (60). Using this in (53), we get as a lower bound RnF ≥ exp(−c) + o(1) ≥ c0 , where c0 > 0 is some constant depending on c. This finishes the proof.  ⊗n Proof of Theorem 5.6. Let ϕn = cn n−1/2 for a positive sequence cn . Let Mn = (ρ⊗n 0 , I −ρ0 ) be the well-known projection test for the problem (34). Then ⊗n ⊗n RnMn = Tr(ρ⊗n · ρ⊗n 0 ) + Tr(ρ0 · (I − ρ0 )) = (Tr(ρ · ρ0 ))n = |hψ|ψ0 i|2n . Let us recall that for any pure states ρ = |ψihψ| and ρ0 = |ψ0 ihψ0 |, we have p kρ − ρ0 k1 = 2 1 − |hψ|ψ0 i|2 , thus |hψ|ψ0 i|2 = 1 − 41 kρ − ρ0 k21 and hence RnMn = (61)  n 1 1 − kρ − ρ0 k21 . 4 For any ρ satisfying the alternative hypothesis H1 (ϕn ), we have kρ − ρ0 k1 ≥ ϕn and consequently n  n  c2n −1 1 2 n = 1 − ϕ n (ϕ ) ≤ 1 − PM n e 4 n 4  2   2 n c c = exp − n . ≤ exp − n n−1 4 4 (62) n (ϕn ) → 0, so that the second relation in (35) is fulfilled. If now ϕn /ϕ∗n → ∞ then cn → ∞ and PM e Consider now the case ϕn /ϕ∗n → 0 so that cn → 0. For any vector v ∈ H define 2 kvkα = ∞ X j=0 2 |hej |vi| j 2α ; (63) 2 then kvkα is a seminorm on the space of v fulfilling kvkα < ∞. The assumption that ρ0 = |ψ0 ihψ0 | ∈ S α (L′ ) 2 means that kψ0 kα ≤ L′ < L. For some N > 0, consider the linear space H0,N = {u ∈ H : hu|ψ0 i = 0, hu|ej i = 0, j > N } ; it is nonempty if N ≥ 1. Let u ∈ H0,N , kuk = 1 be an unit vector; and for ε > 0 consider p ψu,ε = ψ0 1 − ε2 + εu. (64) Then kψu,ε k = 1, ρu,ε = |ψu,ε ihψu,ε | is a pure state, and According to (61) we then have |hψu,ε |ψ0 i|2 = 1 − ε2 . q kρu,ε − ρ0 k1 = 2 1 − |hψu,ε |ψ0 i|2 = 2ε so for a choice ε = cn n−1/2 /2 it follows kρu,ε − ρ0 k1 = ϕn and ρu,ε ∈ B (ϕn ). On the other hand, by (64) and the triangle inequality p kψu,ε kα ≤ 1 − ε2 kψ0 kα + ε kukα . Now kukα < ∞ for u ∈ H0,N , and by assumption kψ0 kα < L1/2 , so for sufficiently large n kψu,ε kα ≤ L1/2 and thus ρu,ε ∈ S α (L). Thus ρu,ε ∈ S α (L) ∩ B (ϕn ) for sufficiently large n. By (11) the optimal error probability for testing between states ρu,ε and ρ0 fulfills inf M binary POVM ⊗n RnT (ρ⊗n 0 , ρu,ε , M ) = 1 − 1 ⊗n ρ − ρ⊗n u,ε 2 0 1 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE q q ⊗n 2 1 − |hψ0⊗n |ψu,ε i| = 1 − 1 − |hψ0 |ψu,ε i|2n q q n n = 1 − 1 − (1 − ε2 ) = 1 − 1 − (1 − c2n n−1 /4) . n Obviously if c2n → 0 then 1 − c2n n−1 /4 → 1 so that 33 =1− inf M binary POVM (65) ⊗n RnM (ρ⊗n 0 , ρu,ε , M ) ≥ 1 + o (1) . But since ρu,ε ∈ S α (L) ∩ B (ϕn ) we have P∗e (ϕn ) ≥ inf M binary POVM ⊗n RnM (ρ⊗n 0 , ρu,ε , M ) ≥ 1 + o (1) , so that the first relation in (35) is shown.   Proof of Theorem 5.7. It suffices to prove that if ϕn = cn n−1/2 with cn → c > 0 then P∗e (ϕn ) → exp −c2 /4 . In view of the upper bound (36), if suffices to prove  P∗e (ϕn ) ≥ exp −c2 /4 (1 + o (1)) . (66) Recall (cf. (61)) that for any pure states ρ = |ψihψ| and ρ0 = |ψ0 ihψ0 |, the condition kρ − ρ0 k1 ≥ ϕn in H1 (ϕn ) is equivalent to a condition for the fidelity F 2 (ρ, ρ0 ) = |hψ|ψ0 i|2 ≤ 1 − ϕ2n /4. Let H0 ⊂ H be the orthogonal complement of C|ψ0 i in H. Consider the vector p ψu = 1 − kuk2 · ψ0 + u, u ∈ H0 and the corresponding pure state |ψu ihψu | defined in terms of the local vector u. We restrict the alternative hypothesis to a smaller set of states such that kuk ≤ γn , with γn = n−1/4 (log n)−1 . Since the fidelity is given by F 2 (ρ0 , |ψu ihψu |) = |hψu |ψ0 i|2 = 1 − kuk2 , the restricted hypothesis is characterised by 1 − γn2 ≤ F 2 (ρ0 , |ψu ihψu |) ≤ 1 − ϕ2n /4, or ϕ2n /4 ≤ kuk2 ≤ γn2 . and additionally by kψu kα ≤ L where k·kα is given by (63). Consider again the linear space H0,N defined in the proof of Theorem 5.7 for a choice N = Nn ∼ log n. Since H0,N ⊂ H0 , we can further restrict the local vector u to u ∈ H0,N . Note that for u ∈ H0,N and kuk ≤ γn we have 2 kukα = N X j=0 2 |hej |ui| j 2α ≤ N 2α kuk2 ≤ N 2α γn2 ∼ (log n)2α n−1/2 (log n)−2 = o (1) . It follows that q kψu kα ≤ 1 − kuk2 kψ0 kα + kukα ≤ L for sufficiently large n, thus ψu ∈ S α (L). We can now write the test problem with restricted alternative as H0 : ρ = ρ0 H1′ (ϕn ) : ρ = |ψu ihψu |: u ∈ H0,N , ϕn /2 ≤ kuk ≤ γn . By the strong approximation proven in Theorem 4.1 we get that the models √ √ {|ψu ihψu |⊗n , kuk ≤ γn } and {|G( nu)ihG( nu)|, kuk ≤ γn } √ are asymptotically equivalent, where G( nu) is the coherent vector in the Fock space Γs (H0 ) pertaining to √ nu. Note that this proof is very similar to the previous proofs of lower bounds, with a major difference: the reduced set of states under the alternative hypothesis is defined with repect to ρ0 given by the null hypothesis H0 instead of an arbitrary state previously. In the asymptotically equivalent Gaussian white noise model, the modified hypotheses concern Gaussian states which can be written in terms of their coherent vectors as H0 : |G(0)i √ H1 (ϕn ) : |G( nu)i: u ∈ H0,N , ϕn /2 ≤ kuk ≤ γn . (67) 34 LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE In order to prove the theorem it is sufficient to prove that inf sup Mn ϕn /2≤kuk≤γn , u∈H0,N as n → ∞.  ≥ exp −c2 /4 + o (1) √ √ RnM (|G(0)ihG(0)|, |G( nu)ihG( nu)|, Mn ) (68) (69) PN Note that dim H0,N = N ; let {gj , j = 1, . . . , N } be an orthogonal basis of H0,N and let |ui = j=1 uj |gj i. √ The quantum Gaussian white noise model {|G( nu)i, u ∈ H0,N , kuk ≤ γn } is then equivalent to the quantum √ Gaussian sequence model {⊗N j=1 |G( nuj )i, kuk ≤ γn }. From now on |G(z)i denotes the coherent vector in the Fock space F (C) pertaining to z := x + iy ∈ C. Recall that such a state is fully characterized by its Wigner function WG(z) , which in the case of coherent states is the density fuction of a bivariate Gaussian distribution. We shall bound from below the maximal type 2 error probability in the risk RnM in (68)  √ √ sup Tr |G( nu)ihG( nu)| · Mn0 (70) ϕn /2≤kuk≤γn , u∈H0,N by an average over u, where the average is taken with respect to a prior distribution defined as follows. Assume that uj , j = 1, . . . , N are independently distributed following a complex centered Gaussian law with variance c2 1+ε σ2 2 2 I2 , where σ = 4n N , for some fixed and arbitrary small ε > 0, and I2 is the 2 by 2 identity matrix. Lemma 6.2. Let Π be the distribution of independent complex random variables uj , for j = 1, ..., N , each one distributed as   σ2 c2 1 + ε N 0, I2 , σ 2 = , 2 4n N for fixed ε > 0 and m = log n. Then as n → ∞   2 c2 cn ≤ kuk2 ≤ n (1 + ε)2 → 1, P 4n 4n and in particular P (ϕn /2 ≤ kuk ≤ γn ) → 1, as n → ∞, as n → ∞. Proof. We have     N 2 2 2 X c c 1 + ε c  P kuk2 < n = P  (|uj |2 − σ 2 ) < n − N 4n 4n 4n N j=1 ≤ PN Var( j=1 |uj |2 ) 2 N σ4 = (c2 ε + o(1))2 /16n2  2 1+ε 1 N c4 (1 + ε)2 /16n2N 2 = = o(1), = 2 ε + o(1) N (c2 ε + o(1)) /16n2 (c2n − c2 (1 + ε)) /16n2 since N ∼ log n → ∞. Similarly, as (1 + ε)2 > 1 + ε, one shows that   c2 P kuk2 > n (1 + ε)2 → 0, 4n as n → ∞ and thus we get P  c2 c2n ≤ kuk2 ≤ n (1 + ε)2 4n 4n  → 1. As γn2 = n−1/2 (log n)−2 decays slower than c2n /n, and ϕn /2 = cn n−1/2 /2, we deduce that P (ϕn /2 ≤ kuk ≤ γn ) → 1 as n → ∞ which ends the proof of the lemma.  Let us denote by Π the prior distribution introduced in Lemma 6.2. Let us go back to (70) and bound the expression from below as follows:  √ √ sup Tr |G( nu)ihG( nu)| · Mn0 ϕn /2≤kuk≤γn , u∈H0,N ≥ Z ϕn /2≤kuk≤γn √ √ Tr(|G( nu)ihG( nu)|Mn0 )Π(du) LAE OF PURE STATES ENSEMBLES AND QUANTUM GAUSSIAN WHITE NOISE ≥ ≥ Z Z √ √ Tr(|G( nu)ihG( nu)|Mn0 )Π(du) − Z {ϕn /2≤kuk≤γn }c 35 √ √ Tr(|G( nu)ihG( nu)|Mn0 )Π(du) √ √ c Tr(|G( nu)ihG( nu)|Mn0 )Π(du) − Π ({ϕn /2 ≤ kuk ≤ γn } ) . By Lemma 6.2, we get for (68) sup ϕn /2≤kuk≤γn , u∈H0,N ≥ Tr(|G(0)ihG(0)|Pn1 ) + Tr Z √ RnM (G(0), G( nu), Mn )  √ √ |G( nu)ihG( nu)|Π(du) · Mn0 + o(1). (71) The integral on the right side is a mixed state which can be written as Z N Z O √ √ √ √ Φ := |G( nu)ihG( nu)|Π(du) = |G( nuj )ihG( nuj )| · Πj (duj ). j=1 Similarly to the proof of Theorem 5.5 we use equation (6) to show that each of the Gaussian integrals above produces a thermal (Gaussian) state ∞ X nσ 2 Φ(r) = (1 − r) rk |kihk|, r= . nσ 2 + 1 k=0 Since |G(0)ihG(0)| = Φ(0), the main terms in (71) are the sum of error probabilities for testing two simple hypothesis H0 : Φ(0)⊗N against H1 : Φ(r)⊗N . Moreover, we have two commuting product states under the two simple hypotheses, which reduces the problem to a classical test between the N -fold products of discrete  ∞ distributions H0 : {G(0)}⊗N and H1 : {G(r)}⊗N . Here G(r) is the geometric distribution (1 − r)rk k=0 ; in particular s G(0) is the degenerate distribution concentrated at 0. The optimal testing error is given by the maximum likelihood test which decides H0 if and only if all observations are 0. The type 1 error is 0 and the type 2 error is (1 − r)N = (nσ 2 + 1)−N ≥ exp(−N · nσ 2 )   2   c (1 + ε) c2 1 + ε = exp − . = exp −N n 4n N 4 Since ε > 0 was arbitrary, this establishes the lower bound (69) and thus (66). 
10math.ST
PARAMETRIZING FILTERS OF A CNN WITH A GAN Yannic Kilcher∗, Gary Bécigneul∗, Thomas Hofmann Department of Computer Science ETH Zurich {yannic.kilcher,gary.becigneul,thomas.hofmann}@inf.ethz.ch arXiv:1710.11386v1 [cs.LG] 31 Oct 2017 A BSTRACT It is commonly agreed that the use of relevant invariances as a good statistical bias is important in machine-learning. However, most approaches that explicitly incorporate invariances into a model architecture only make use of very simple transformations, such as translations and rotations. Hence, there is a need for methods to model and extract richer transformations that capture much higherlevel invariances. To that end, we introduce a tool allowing to parametrize the set of filters of a trained convolutional neural network with the latent space of a generative adversarial network. We then show that the method can capture highly non-linear invariances of the data by visualizing their effect in the data space. 1 I NTRODUCTION In machine-learning, solving a classification task typically consists of finding a function f : X → Y, from a rather large data space X to a much smaller space of labels Y. Such a function will therefore necessarily be invariant to a lot of transformations of its input data. It is now clear that being able to characterize such transformations can greatly help the learning procedure, one of the most striking examples being perhaps the use of convolutional neural networks (CNN) for image classification (Krizhevsky et al., 2012), with built-in translation invariance via convolutions and subsequent pooling operations. But as a convolutional layer is essentially a fully connected layer with a constraint tying some of its weights together (LeCun et al., 1995), one could expect other invariances to be encoded in its weights after training. Indeed, from an empirical perspective, CNNs have been observed to naturally learn more invariant features with depth (Goodfellow et al., 2009; Lenc & Vedaldi, 2015), and from a theoretical perspective, it has been proven that under some conditions satisfied by the weights of a convolutional layer, this layer could be re-indexed as performing a convolution over a bigger group of transformations than only translations (Mallat, 2016). It is exciting to note that there has recently been a lot of interest in theoretically extending such successful invariant computational structures to general groups of transformations, notably with group invariant scattering operators (Mallat, 2012), deep symmetry networks (Gens & Domingos, 2014), group invariant signal signatures (Anselmi et al., 2015), group invariant kernels (Mroueh et al., 2015) and group equivariant convolutional networks (Cohen & Welling, 2016). However, practical applications of these have mostly remained limited to linear and affine transformations. Indeed, it is a challenge in itself to parametrize more complicated, non-linear transformations preserving labels, especially as they need to depend on the dataset. In this work, we seek to answer this fundamental question: What invariances in the data has a CNN learned during its training on a classification task and how can we extract and parameterize them? The following is a brief summary of our method: Considering an already trained CNN on a labeled dataset, we train a generative adversarial network (GAN) (Goodfellow et al., 2014) to produce filters of a given layer of this CNN, such that the filters’ convolution output be indistinguishable from the one obtained with the real CNN. We combine this with an InfoGAN (Chen et al., 2016) discriminator to prevent the generator from producing always the same filters. As a result, the generator provides us with a smooth, data-dependent, non-trivial parametrization of the set of filters of this CNN, characterizing complicated transformations irrelevant for this classification task. Finally, we ∗ contributed equally 1 describe how to visualize what these smooth transformations of the filters would correspond to in the image space. 2 2.1 BACKGROUND G ENERATIVE A DVERSATIAL N ETWORKS A Generative Adversarial Network (Goodfellow et al., 2014) consists of two players, the generator G and the discriminator D, playing a minimax game in which G tries to produce samples indistinguishable from some given true distribution pdata , and D tries to distinguish between real and generated samples. G typically maps a random noise z to a generated sample G(z), transforming the noise distribution into a distribution pg supposed to match pdata . The objective function of this minimax game with maximum likelihood is given by min max V (D, G) = Ex∼pdata [log D(x)] + Ez [log(1 − D(G(z)))]. G D The noise space, input of the generator, is also called its latent space. 2.2 I NFORMATION M AXIMIZING G ENERATIVE A DVERSARIAL N ETS In an InfoGAN (Chen et al., 2016), the generator takes as input not only the noise z but also another variable c, called the latent code. The aim is to make the generated samples G(z, c) depend on cQ:= (c1 , ..., cn ) in a structured way, for instance by choosing independent ci ’s, modelling p(c) as i p(ci ). In order to avoid a trivial correspondence between c and G(z, c), the InfoGAN procedure maximizes the mutual information I(c, G(z, c)). The mutual information I(X, Y ) between two random variables, defined with an entropy H as I(X, Y ) := H(X) − H(X|Y ) = H(Y ) − H(Y |X) is symmetric, measures the amount of information that is known about the value of one random variable when the value of the other one is known, and is equal to zero when they are independent. Hence, maximizing the mutual information I(c, G(z, c)) prevents G(z, c) from being independent of c. In practice, I(c, G(z, c)) is indirectly maximized using a variational lower bound LI (G, Q) ≤ I(c, G(z, c)), where Q(c|x) approximates P (c|x) and LI (G, Q) := Ec∼p(c),x∼G(z,c) [log Q(c|x)] + H(c). The minimax game becomes min max VI (D, G, Q) = V (D, G) − λLI (G, Q), G,Q D where λ is a hyperparameter controlling the mutual information regularization. 3 E XTRACTING I NVARIANCES BY L EARNING F ILTERS Let CNN be an already trained CNN, whose `th -layer representation of an image I will be denoted by CNN` (I), with CNN0 (I) = I. As our goal is to learn what kind of filters such a CNN would learn at layer `, it could be tempting to simply train a GAN to match the distribution of filters of this CNN’s layer. However, this set of filters is way too small of a dataset to train a GAN (G, D), which would cause the generator G to massively overfit instead of extracting the smooth, hidden structure lying behind our discrete set of filters. To cope with this problem, instead of feeding the discriminator D alternatively with filters produced by G and real filters from CNN` , we propose to feed D with the activations of these filters caused by the data passing through the CNN, i.e. alternatively with CNN` (I) or Conv(CNN`−1 (I), G(z)), corresponding respectively to real and fake samples. Here, I is an image sampled from data, z is sampled from the latent space of G and Conv(CNN`−1 (I), G(z)) is the activation obtained by passing I through each layer of CNN but while replacing the filters of the `th -layer by G(z). 2 In short, in each step, the generator G produces a set of filters for the `th -layer of the CNN. Next, different samples of data are passed through one CNN using its real filters and through the same CNN, but having its `th -layer filters replaced by the fake filters produced by G. The discriminator D will then try to guess if the activation it is fed was produced using real or generated filters at the `th -layer, while the generator G will try to produce filters making the subsequent activations indistinguishable from some obtained with real filters. However, even though this formulation allows us to train the GAN on a dataset of reasonable size, saving us from an otherwise unavoidable overfitting, G could a priori still always produce the same set of filters to fool D. Ideally it simply reproduces the real filters of CNN` . To overcome this problem, we augment our model by an InfoGAN discriminator whose goal will be to predict which noise z was used to produce Conv(CNN`−1 (I), G(z)). This prevents G from always producing the same filters, by preventing z and G(z) from being indenpendent random variables. Note that, just as the GAN discriminator, the InfoGAN discriminator does not act directly on the output of G - the filters - but on the activation output that these filters produce. In this setting, the noise z of the generator G plays the role of the latent code c of the InfoGAN. As in the original InfoGAN paper (Chen et al., 2016), we train a neural network Q to predict the latent code z, which shares all its layers but the last one with the discriminator D. Finally, by modelling the latent codes as independent gaussian random variables, the term LI (G, Q) in the variational bound being a log-likelihood, it is actually given by an L2 -reconstruction error. The joint training of these three neural networks is described in Algorithm 1 and illustrated in Figure 1. 3 Real Layer L Predicts real / fake signal Layer L-1 Layer 2 Layer 1 Data D Discriminator Fake Layer L Fake Filters Predicts z from signal InfoGAN Loss Generator z Q G Figure 1: Illustration of how the different neural networks interact with each other. CNN layers are depicted in light gray. The flow of data is shown in green, while the generation of the filters by the generative model is shown in red. The discriminator part of the GAN is shown in blue. Note that the discriminator does not have direct access to the generated filters, but can only observe the data after it has passed through them. The CNN is fixed, while G, D and Q are trained jointly. 4 Algorithm 1 Minibatch stochastic gradient descent training of D, G and Q. 1: for number of training iterations do 2: • Sample minibatch of m noise samples {z (1) , ..., z (m) } from noise prior pnoise (z). 3: • Generate the filters Gθg (z (1) ), ..., Gθg (z (m) ). 4: • Sample minibatch of m examples {I (1) , ..., I (m) } from data distribution pdata (I). 5: • Pass the data through the CNN with the real and generated filters, to obtain the CNN` (I (i) )’s and Conv(CNN`−1 (I (i) ), Gθg (z (i) ))’s respectively. 6: • Feed these to Dθd and Qθq , letting Dθd guess if it was fed CNN` (I (i) ) or Conv(CNN`−1 (I (i) ), Gθg (z (i) )), and letting Qθq recover the z (i) . 7: • Update the discriminator by ascending its stochastic gradient: m ∇θ d 8: 1 X [log Dθd (CNN` (I (i) )) + log(1 − Dθd (Conv(CNN`−1 (I (i) ), Gθg (z (i) ))))]. m i=1 • Update the generator by descending its stochastic gradient: m ∇θ g 1 X [log(1 − Dθd (Conv(CNN`−1 (I (i) ), Gθg (z (i) )))) m i=1 + λkz (i) − Qθq (Conv(CNN`−1 (I (i) ), Gθg (z (i) )))k22 ]. 9: • Update the InfoGAN discriminator by descending its stochastic gradient: ! m λ X (i) (i) (i) 2 ∇θ q kz − Qθq (Conv(CNN`−1 (I ), Gθg (z )))k2 . m i=1 end for 10: The gradient-based updates can use any standard gradient-based learning rule. We used RM- Sprop in our experiments. 5 4 V ISUALIZING THE LEARNED TRANSFORMATIONS Using our method, we can parameterize the filters of a trained CNN and thus characterize its learned invariances. But in order to assess what has actually been learned, we need a way to visualize these invariances once the GAN has been trained. More specifically, given a data sample x, we would like to know what transformations of x the CNN regards as being invariant. We do this in the following manner: We take some latent noise vector z and obtain its generated filters G(z). Using those filters, we pass the data sample x through the network to obtain Conv(CNN`−1 (x), Gθg (z)) =: a(x|z) , which we call the activation profile of x given z. Next we select two dimensions i and j of z at random and construct a grid of noise vectors {zk |zki ∈ [−ξ, ξ], zkj ∈ [−ξ, ξ]}k by moving around z in the dimensions i and j in a small neighborhood. For each zk , we use Gradient Descent to start from x and find the data point x0k that gives the same activation profile for the filters generated using zk as the data point x gave for the filters generated using z. Formally, for each zk we want to find x0k , s.t. x0k = argmin ka(x0 |zk ) − a(x|z) k22 + Ψ(x0 ), x0 0 where Ψ(x ) is a regularizer corresponding to a natural image prior. Specifically, we use the loss function proposed in (Mahendran & Vedaldi, 2015). By using Gradient Descent and starting from the original data point x, we make sure that the solution we find is likely in the neighborhood of x, i.e. can be obtained by applying a small transformation to x. As a result, from our grid of z-vectors, we obtain a grid of x-points. This grid in data space represents a manifold traversal in a small neighborhood on the manifold of learned invariances. If our method is successful, we expect to see sensible continuous transformations of the original data point along the axes of this grid. 5 E XPERIMENTAL R ESULTS We apply our method of extracting invariances on a convolutional neural network trained on the MNIST dataset. In particular, we train a standard architecture featuring 5 convolutional layers with ReLU nonlinearities, max-pooling and batch normalization for 10 epochs on the 10-class classification task. Once converged, we use our GAN approach to learn the filters of the 4th convolutional layer in the CNN. Since this is one of the last layers in the network, we expect the invariances that we extract to be very high-level and highly nonlinear. 5.1 V ISUALIZING THE LEARNED INVARIANCES The results can be seen in Figure 3 and a sample of the learned filters themselves can be seen in Figure 2. Our expectations are clearly met as the resulting outputs are in fact an ensemble of highly nonlinear and high-level transformations of the data. Even more visualizations can be found in the Appendix. We further hypothesize that if we apply the same method to the filters of one of the first layers in the network, the transformations that we learn will be much more low-level and more pixel-local. To test this, we use our method on the same CNN’s second convolutional layer. The results can be seen in Figure 4. As expected, the transformations are much more low-level, such as simple brightness changes or changes to the stroke width. 6 Figure 2: Learned filters of the CNN’s 4th layer. We summed one third of the orignal channels together in order to visualize the learned filters. Figure 3: Invariance transformations extracted from the CNN’s 4th layer. The middle sample of each grid represents the original data sample, while the rest of the grid are found by matching the original sample’s activation profile. 7 Figure 4: Invariance transformations extracted from the CNN’s 2nd layer. The middle sample of each grid represents the original data sample, while the rest of the grid are found by matching the original sample’s activation profile. 8 5.2 A SSESSING THE QUALITY OF THE GENERATOR In order to assess the quality of the generator, we need to be sure that: (i) filters produced by the generator would yield a good accuracy on the original classification task of our CNN, and (ii) the generator can produce a variety of different filters for different latent noises. For the first part, we randomly drew 10 noise vectors z (1) , ..., z (10) , computed the corresponding set of filters G(z (i) ) for each of them, and then each data sample x, after going through CNNl−1 , is passed through each of these 10 `th -layer and averaged over them, so that the signal fed to the next layer becomes: 10 1 X Conv(CNNl−1 (x), G(z (i) )), 10 i=1 all the next layers being re-trained. This averaging can be seen as an average pooling w.r.t. the transformations defined by the generator, which, if the transformations we learned were indeed irrelevant for the classification task, should not induce any loss in accuracy. Our expectations are confirmed, as the test accuracy obtained by following the above procedure is of 0.982, against a test accuracy of 0.971 for the real CNN. As for the second part, Figure 5 shows a Multi-Dimensional Scaling (MDS) of both the original set of filters of CNN` , and of generated filters for randomly sampled noise vectors. We observe that different noise vectors produce a variety of different filters, which confirms that the generator has not overfitted on the set of real filters. Further, since the generator has learned to produce a variety of filters for each real filter, all the while retaining its classification accuracy, this means that we have truly captured the invariances of the data with regard to the CNN’s classification task. Figure 5: Multi-Dimensional Scaling for the filters produced by the GAN. Individual colors represent different samples for the same filter of the true CNN. The large cluster sizes shows that the GAN is producing a wide variety of different filters for each corresponding real filter. 6 C ONCLUSION AND FUTURE WORK Introducing an invariance to irrelevant transformations for a given task is known to constitute a good statistical bias, such as translations in CNNs. Although a lot of work has already been done regarding how to implement known invariances into a computational structure, practical applications of these mostly include very simple linear or affine transformations. Indeed, characterizing more complicated transformations seems to be a challenge in itself. In this work, we provided a tool allowing to extract transformations w.r.t. which a CNN has been trained to be invariant to, in such a way that these transformations can be both visualized in the image space, and potentially re-used in other computational structures, since they are parametrized by a generator. The generator has been shown to extract a smooth hidden structure lying behind the discrete set of possible filters. It is the first time that a method is proposed to extract the symmetries learned by a CNN in an explicit, parametrized manner. 9 Applications of this work are likely to include transfer-learning and data augmentation. Future work could apply this method to colored images. As suggested by the last subsection, the parametrization of such irrelevant transformations of the set of filters could also potentially define another type of powerful pooling operation. R EFERENCES Fabio Anselmi, Joel Z Leibo, Lorenzo Rosasco, Jim Mutch, Andrea Tacchetti, and Tomaso Poggio. Unsupervised learning of invariant representations in hierarchical architectures. Theoret. Comput. Sci., dx.doi.org/10.1016/j.tcs.2015.06.048, 2015. Xi Chen, Yan Duan, Rein Houthooft, John Schulman, Ilya Sutskever, and Pieter Abbeel. Infogan: Interpretable representation learning by information maximizing generative adversarial nets. In Advances in Neural Information Processing Systems, pp. 2172–2180, 2016. Taco Cohen and Max Welling. Group equivariant convolutional networks. In International Conference on Machine Learning, pp. 2990–2999, 2016. Robert Gens and Pedro M Domingos. Deep symmetry networks. In Advances in neural information processing systems, pp. 2537–2545, 2014. Ian Goodfellow, Honglak Lee, Quoc V Le, Andrew Saxe, and Andrew Y Ng. Measuring invariances in deep networks. In Advances in neural information processing systems, pp. 646–654, 2009. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative adversarial nets. In Advances in neural information processing systems, pp. 2672–2680, 2014. Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pp. 1097–1105, 2012. Yann LeCun, Yoshua Bengio, et al. Convolutional networks for images, speech, and time series. The handbook of brain theory and neural networks, 3361(10):1995, 1995. Karel Lenc and Andrea Vedaldi. Understanding image representations by measuring their equivariance and equivalence. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 991–999, 2015. Aravindh Mahendran and Andrea Vedaldi. Understanding deep image representations by inverting them. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 5188–5196, 2015. Stéphane Mallat. Group invariant scattering. Communications on Pure and Applied Mathematics, 65(10):1331–1398, 2012. Stéphane Mallat. Understanding deep convolutional networks. Phil. Trans. R. Soc. A, 374(2065): 20150203, 2016. Youssef Mroueh, Stephen Voinea, and Tomaso A Poggio. Learning with group invariant features: A kernel perspective. In Advances in Neural Information Processing Systems, pp. 1558–1566, 2015. 10 A M ORE I NVARIANCE V ISUALIZATIONS Figure 6: Invariance transformations extracted from the CNN’s 4th layer. The middle sample of each grid represents the original data sample, while the rest of the grid are found by matching the original sample’s activation profile. 11 Figure 7: Invariance transformations extracted from the CNN’s 4th layer. The middle sample of each grid represents the original data sample, while the rest of the grid are found by matching the original sample’s activation profile. 12
2cs.AI
Optimizing Active Cyber Defense Wenlian Lu1,2 , Shouhuai Xu3 , and Xinlei Yi1 arXiv:1603.08312v1 [cs.CR] 28 Mar 2016 1 3 School of Mathematical Sciences, Fudan University Shanghai, P. R. China, 200433 Emails: {wenlian,11210180008}@fudan.edu.cn 2 Department of Computer Science, University of Warwick Coventry CV4 7AL, UK Department of Computer Science, University of Texas at San Antonio San Antonio, Texas 78249, USA Email: [email protected] Abstract. Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading “white” or “benign” worms to combat against the attackers’ malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of optimal active cyber defense in the setting of strategic attackers and/or strategic defenders. Specifically, we investigate infinite-time horizon optimal control and fast optimal control for strategic defenders (who want to minimize their cost) against non-strategic attackers (who do not consider the issue of cost). We also investigate the Nash equilibria for strategic defenders and attackers. We discuss the cyber security meanings/implications of the theoretic results. Our study brings interesting open problems for future research. Keywords: cyber security model, active cyber defense, optimization, epidemic model 1 Introduction The importance of cyber security is well recognized now. However, our understanding of cyber security is still at its infant stage. In general, the attackers are constantly escalating their attack power and sophistication, while the defenders largely lag behind. To be specific, we mention the following asymmetry between cyber attack and cyber defense: The effect of malware-like attacks is automatically amplified by the network connectivity, while the defense effect is not. This phenomenon had been implied by many previous results (e.g., [28, 9, 6, 26, 34]), but was not explicitly pointed out until very recently [35]. The asymmetry is fundamentally caused by that the defense is reactive, including intrusion detection systems, firewalls and anti-malware tools. The asymmetry can be eliminated by the idea of active cyber defense [35], where the defender also aims to take advantage of the network connectivity. The concept of active cyber defense is not completely new because researchers have proposed for years the idea of using the defender’s “white” or “benign” worms to combat against the attackers’ malwares [5, 1, 29, 23, 16, 18, 13, 30]. In a sense, active cyber defense already happened in practice; for example, the Welchia worm attempted to “kill” the Blaster worm in compromised computers [23, 20]. It appears that full-fledged active cyber defense is perhaps inevitable in the near future according to some recent reports [18, 24, 31]. It is therefore more imperative than ever to systematically characterize the effectiveness of active cyber defense. This motivates the present study. 1.1 Our Contributions This paper is inspired by the recent mathematical model of active cyber defense dynamics [35], which characterizes the effect of various model parameters (including the underlying complex network structures) in the setting where neither the attacker nor the defender is strategic (i.e., both the attacker and the defender do not consider the issue of cost). Here we study a new perspective of active cyber defense, namely the strategic interaction between the attacker and the defender. On one hand, our study moves a step beyond [35] because we incorporate control-theoretic and game-theoretic models to accommodate strategic interactions. On the other hand, our study assumes away the underlying complex network structures that are explicitly investigated in [35]. This means that our study is essentially based on the homogeneous (or well-mixed) assumption that each compromised computer can attack the same portion of computers. Tackling the problem of strategic attack-defense interactions with explicit complex network structures is left for future research. Therefore, we deem the present paper as a significant first step toward ultimately understanding the effectiveness of strategic active cyber defense. Specifically, we make the following contributions. First, we investigate two flavors of optimal control for strategic defenders against non-strategic attackers: infinite-time horizon optimal control and fast optimal control. In the setting of infinite-time horizon optimal control for the defender, we characterize the conditions under which the defender should adjust its active cyber defense power in a certain quantitative fashion. For example, we identify a condition under which the defender should give up using active cyber defense alone, and instead should resort to other defense methods as well (e.g., proactive defense). In the setting of fast optimal control, where the defender wants to occupy a certain portion of the network as soon as possible and at the minimal cost, there is a significant difference between the case that the active defense cost is linear and the case that the active defense cost is quadratic. Second, we identify the Nash equilibrium strategies when both the defender and the attacker are strategic. The findings are interesting. For example, when the defender (or attacker) is reluctant to use/expose its advanced active cyber defense tools (or zero-day exploits), it will give up escalating its active defense (or attack) power; otherwise, there are three scenarios: (i) If the defender (or attacker) initially occupies only a certain small portion of the network, it will give up escalating its active defense (or attack). (ii) If the defender (or attacker) initially occupies a certain significant portion of the network, it will escalate its active defense (or attack) as much as possible. (iii) If the defender (or attacker) initially occupies a certain large portion of the network, it will not escalate its active defense (or attack) — a sort of diminishing returns. The rest of the paper is structured as follows. Section 2 briefly reviews the related prior work. Section 3 describes the basic active cyber defense model under the homogeneous assumption. Section 4 investigates optimal control for strategic defenders against non-strategic attackers. Section 5 studies Nash equilibria for strategic defenders and attackers. Section 6 concludes the paper with some open problems. Lengthy proofs are deferred to the Appendix. The main notations used in the paper are listed below: αB , αR defender B’s defense power αB and attacker R’s attack power αR iB (t), iR (t) portions of the nodes occupied respectively by the defender and the attacker at time t, where iB (t) + iR (t) = 1 πB , πB (t) πB is control variable and πB (t) is control function π̂B solution in the infinite-time horizon optimal control case ∗ ∗∗ πB , πB solutions in the case of fast optimal control with linear and quadratic cost functions, respectively z discount rate kB normalization ratio between the defender’s detection cost and recovery cost λ normalization ratio between the unit of time and the defender’s active defense cost kR normalization ratio between the attacker’s maintenance cost and penetration cost 2 Related Work Our investigation is built on recent studies in mathematical computer malware models. These models originated in the mathematical biological epidemic models introduced in the 1920’s [19, 12], which were first adapted to study the spreading of computer virus in the 1990’s [10, 11]. All these models made the homogeneous assumption that each individual (e.g., computer) in the population has equally infection effect on the other individuals in the population, and the assumption that the infected individuals recover because of reactive defense (e.g., anti-malware tools). In the past decade, there were many studies that aim to eliminate the aforementioned homogeneous assumption, by explicitly incorporating the heterogeneous network structures [28, 9, 6, 26, 34, 32]. The mathematical tools used for these studies are Dynamical Systems in nature. These studies demonstrated that the attack effect of malware spreading against reactive defense is automatically amplified by the largest eigenvalue of the adjacency matrix, which represents the underlying complex network structure. This is the attack-defense asymmetry phenomenon mentioned above. The attack-defense asymmetry phenomenon motivated the study of mathematical models of active cyber defense [35], which is a relatively new sub-field in cyber security [18, 24, 31] as previous explorations were mainly geared toward legal and policy issues [5, 1, 29, 23, 16, 18, 13, 30]. One real-life incident of the flavor of active cyber defense is that the Welchia worm attempted to “kick out” another kind of worms (e.g., the Blaster worm) [23, 20]. In the first mathematical characterization of active cyber defense [35], neither the attacker nor the defender is strategic (i.e., they do not consider the issue of cost), albeit the model accommodates the underlying complex network structure. In the present paper, we move a step toward ultimately understanding optimal active cyber defense, where the attacker and/or the defender are/is strategic (i.e., they want to minimize their cost). Finally, we note that automatic patching [27] is not active cyber defense because automatic patching aims to prevent attacks, whereas active cyber defense aims to identify and possibly clean up infected computers. There have been many studies (e.g., [33, 21, 8, 4, 14, 22, 15, 25]) on applying Control Theory and Game Theory to understand various issues related to computer malware spreading. Our study is somewhat inspired by the botnet-defense model investigated in [4]. All the studies mentioned above only considered reactive defense; whereas we investigate how to optimize active cyber defense. For general information about the applications of Control Theory and Game Theory to cyber security, we refer to [2, 17] and the references therein. 3 The Basic Active Cyber Defense Model Consider a population of nodes, which can abstract computers in a cyber system. At any point in time, a node is either occupied by defender B (i.e., the node is secure), or occupied by attacker R (i.e., the node is compromised). Denote by iB (t) the portion of nodes that are occupied by the defender at time t, and by iR (t) the portion of nodes that are occupied by the attacker at time t, where iB (t)+iR (t) = 1 for any t ≥ 0. In the interaction between cyber attack and active cyber defense, the defender and the attacker can “grab” nodes from each other in the same fashion. Let αB abstract defender B’s power in grabbing attackeroccupied nodes using active cyber defense, and αR abstract attacker R’s power in compromising defender-occupied nodes using malware-like cyber attacks. Under the homogeneous assumption that (i) each secure node has the same power in “grabbing” the attacker-occupied nodes and (ii) each compromised node has the same power in compromising the defender-occupied nodes, we obtain the following Dynamical System model: ( diB (t) = αB iB (t)iR (t) − αR iR (t)iB (t) dt diR (t) dt = αR iR (t)iB (t) − αB iB (t)iR (t), where iB (t) + iR (t) = 1, iB (t) ≥ 0, and iR (t) ≥ 0 for all t ≥ 0. Due to the symmetry, we only need to consider diB (t) = αB iB (t)(1 − iB (t)) − αR iB (t)(1 − iB (t)). dt (1) If neither the attacker nor the defender is strategic (i.e., they do not consider the issue of cost), the dynamics of system (1) can be characterized as follows. – If the attacker is more powerful than the defender, namely αR > αB , the attacker will occupy the entire network in the fashion of the Logistic equation (i.e., when iR is small, iR increases slowly; when iR is around a threshold value, iR increases exponentially; when iR is large, iR increases slowly). – If the defender is more powerful than the attacker, namely αB > αR , the defender will occupy the network in the same fashion as in the above case. – If the attacker and the defender are equally powerful, namely αR = αB , the system state is in equilibrium. In other words, iB (t) = iB (0) and iR (t) = iR (0) = 1 − iB (0) for any t > 0. The above model accommodates non-strategic attackers and non-strategic defenders, and is the starting point for our study of optimal active cyber defense. 4 4.1 Optimal Control for Strategic Defender Against Non-Strategic Attacker Infinite-time Horizon Optimal Control In this setting, the non-strategic attacker R maintains a fixed degree of attack power αR , while the defender B is strategic. That is, the strategic defender aims to minimize its cost (specified below) by adjusting its defense power αB via αB = b + πB (a − b), while obeying the dynamics of (1), where πB ∈ [0, 1] is the control variable and αB ∈ [b, a] is the defender’s defense power with 1 ≥ a > b ≥ 0. The cost to the defender consists of two parts. – The recovery cost for recovering the compromised nodes to secure states (e.g., re-installing the operating systems and updating the backup data files, interference with the computers’ routine functions). We represent this cost by fB (iB (t)) for some real-valued function fB (·). We assume fB′ (·) < 0 because the more nodes the defender occupies, the lower the cost for the defender to recover the compromised nodes. – The detection cost for detecting (or recognizing) compromised nodes via active cyber defense, which partly depends on the attack’s evasiveness. We represent this cost by kB ·πB (·), where kB is the normalization ratio between the detection cost and the recovery cost, and πB (·) is the control function that specifies the adjustable degree of active cyber defense power. This is plausible because using more powerful active defense mechanisms (e.g., more sophisticated/advanced “white” worms) causes a higher cost but allows the defender to fight against the attacks more effectively. The above definition of cost accommodates at least the following family of active cyber defense: The defender uses “white” worms to detect the compromised nodes, then possibly manually recovers the compromised nodes. This is perhaps the most probable scenario because for example, the attacker’s malware may have corrupted or deleted some data files in the compromised computers. Note that the detection cost highlights the difference between (i) active-cyber-defense based detection, where the defender’s detection tools (i.e., “white” worms) do not reside on the compromised computers, and (ii) reactive-cyber-defense based detection such as the current generation of anti-virus software, where the detection tools do not spread over the network. Assuming that the attacker maintains a fixed degree of attack power αR , the defender’s optimization goal is to minimize the total cost with a constant discount rate z over an infinite-time horizon, namely inf 0≤πB (·)≤1  Z JB (πB (·)) = 0 ∞  e−zt (fB (iB (t)) + kB · πB (t))dt , (2) where fB′ (·) < 0, πB (·) ∈ [0, 1], and the attacker’s fixed degree of attack power αR is treated as a constant. Now the optimization problem reduces to identifying the optimal defense strategy π̂B . To solve the minimization problem, we use Pontryagin’s Minimum Principle to find the Hamiltonian associated to (2): HB (iB , πB , p) = fB (iB ) + kB πB + p[αB iB (1 − iB ) − αR iB (1 − iB )] = (kB + piB (1 − iB )(a − b))πB + fB (iB ) + pbiB (1 − iB ) − pαR iB (1 − iB ),(3) where p is the adjoint equation  ′ B ṗ = − ∂H ∂iB + zp = −fB (iB ) + p[z − (αB − αR )(1 − 2iB )] p1 (∞) = 0. (4) The optimal strategy π̂B is obtained by minimizing the Hamiltonian HB (iB , πB , p). Since HB (iB , πB , p) is linear in πB , the optimal control strategy π̂B takes the following bang-bang control form:  1 if    π̂B = uB (0 < uB < 1, to be determined) if   0 if ∂HB ∂πB ∂HB ∂πB ∂HB ∂πB B where ∂H ∂πB = kB + piB (1 − iB )(a − b). In the singular form period of time, we have p= −kB . iB (1 − iB )(a − b) <0 =0 (5) >0 ∂HB ∂πB = 0 and for a (6) Further differentiating ∂HB ∂πB with respect to t, we have   d ∂HB = ṗiB (1 − iB )(a − b) + p(1 − 2iB )i̇B (a − b) dt ∂πB   = iB (1 − iB )(a − b) − fB′ (iB ) + p[z − (αB − αR )(1 − 2iB )]   +p(1 − 2iB )(a − b) αB iB (1 − iB ) − αR iB (1 − iB ) = −iB (1 − iB )(a − b)fB′ (iB ) − kB z Define FB (iB ) = −iB (1 − iB )(a − b)fB′ (iB ) − kB z. Then we need to study the roots of FB (·) = 0. B 0.2 0.15 B y=i (1−i )(a−b) 0.25 0.1 y=k z B 0.05 i i 2 1 0 0 0.2 0.4 i B 0.6 0.8 1 Fig. 1. Illustration of the roots of FB (iB ) = 0 with fB (iB ) = 1−iB , a−b = 1 and kB z = 1/8, where the x-axis represents iB and the y-axis represents y(iB ) = iB (1 − iB )(a − b). The arrows indicate the directions the outcome under optimal control will head for. Before presenting the results, we discuss the ideas behind them. In this paper, we focus on case fB (iB ) = 1 − iB , which can be easily extended to any linear recovery-cost function. If kB z < 14 (a − b), then FB (iB ) = 0 has two roots: 1− i1 = q Bz 1 − 4 ka−b 2 1+ and i2 = q Bz 1 − 4 ka−b 2 with 0 < i1 < i2 < 1. As illustrated in Figure 1, this implies  if iB < i1  FB (iB ) < 0 FB (iB ) > 0 if i1 < iB < i2  FB (iB ) < 0 if iB > i2 . Then, the optimal strategy π̂B of the singular form can be obtained by solving i̇B |iB =i1 or iB =i2 = 0. Theorem 1. Suppose the non-strategic attacker maintains a fixed degree of attack power αR , fB (iB ) = 1 − iB and kB z < 14 (a − b). Let i1 < i2 be the roots of R −b . The optimal control strategy for defender B is: FB (iB ) = 0. Let uB = αa−b  0 if iB < i1     if iB = i1  uB if i1 < iB < i2 . π̂B = 1 (7)   u if i = i  B B 2   0 if iB > i2 Proof of Theorem 1 is deferred to Appendix A. In practice, i1 and i2 can be obtained numerically. Theorem 1 (also as illustrated in Figure 1) shows that the outcome of the infinite-time horizon optimal control, namely limt→∞ iB (t), depends on the initial system state iB (0) as follows: – If 1 > iB (0) > i2 , the defender should use the least powerful/costly active defense mechanisms (i.e., αB = b) because π̂B = 0. Moreover, the outcome of the optimal defense is that the defender will occupy i2 portion of the network, namely limt→∞ iB (t) = i2 . This suggests a sort of diminishing returns in active cyber defense: It is more cost-effective to pursue “good enough” security (i.e., limt→∞ iB (t) = i2 < 1) than to pursue “perfect” security (i.e., limt→∞ iB (t) = 1) even if it is possible. – If 0 = iB (0) < i1 , the defender should use the least powerful/costly active defense mechanisms (i.e., αB = b) because π̂B = 0. Moreover, the outcome of the optimal defense is that the defender should give up (using active cyber defense as the only defense methods), as the attacker will occupy the entire network, namely limt→∞ iB (t) = 0. In other words, the defender should resort to other defense methods as well (e.g., proactive defense). – If iB (0) ∈ (i1 , i2 ), the defender should use the most powerful/costly active defense mechanisms (i.e., αB = a) because π̂B = 1. Moreover, the outcome of the optimal defense is that the defender will occupy i2 portion of the network, namely limt→∞ iB (t) = i2 . This also suggests a sort of diminishing returns mentioned above. – If iB (0) = i1 or iB (0) = i2 , the defender should adjust its deployment R −b of active cyber defense mechanisms according to uB = αa−b , which means αB = αR . Moreover, the outcome of the optimal defense is that iB (t) = iB (0) for all t > 0. Now we consider the degenerated scenarios of kB z ≥ 1/4(a − b). The proof is similar to, but much simpler than, the proof of Theorem 1, and thus omitted. Theorem 2. Suppose the non-strategic attacker maintains a fixed degree of attack power αR and fB (iB ) = 1 − iB . – If kB z = 1/4(a − b), then FB (iB ) = 0 has only one root, i1 = i2 = 21 . The optimal control strategy is  if iB < i1 0 R −b if iB = i1 π̂B = uB = αa−b (8)  0 if iB > i1 . – If kB z > 1/4(a − b), then FB (iB ) = 0 has no root. The optimal control strategy is π̂B = 0. The cyber security implications of Theorem 2 are the following. In the case kB z = 41 (a − b), the outcome under the optimal control depends on the initial system state as follows: – If 1 > iB (0) > i1 , the defender should use the least powerful/costly active cyber defense mechanisms because π̂B = 0. The outcome is that the defender will occupy i1 portion of the network, namely limt→∞ iB (t) = i1 . – If 0 = iB (0) < i1 , the defender should use the least powerful/costly active cyber defense mechanisms because π̂B = 0. The outcome is that the defender will give up using active cyber defense alone, as the attacker will occupy the entire the network, namely limt→∞ iB (t) = 0. In other words, the defender should resort to other defense methods as well (e.g., proactive defense). – If iB (0) = i1 , the defender will adjust its degree of active cyber defense power R −b , which means αB = αR . The outcome is that according to π̂B = uB = αa−b iB (t) = iB (0) for all t > 0. In the case kB z > 1/4(a−b), the defender should use the least powerful/costly active cyber defense mechanisms because π̂B = 0. The outcome is that limt→∞ iB (t) = 0, meaning that the defender should give up using active cyber defense alone and resort to other defense methods as well (e.g., proactive defense). By considering Theorems 1 and 2 together, we draw some deeper insights. Specifically, for a given z, different kB ’s suggest different optimal active defense 1 (a − b), meaning that the cost of optimal strategies. More specifically, if kB > 4z control is dominating, then defender B should use the least powerful/costly active cyber defense mechanisms because π̂B (t) = 0 for all t and the outcome is limt→∞ iB = 0. In other words, the defender should give up using active cyber defense alone, and resort to other kinds of defense methods as well (e.g., proactive 1 (a − b), meaning that the cost of control is not dominating, defense). If kB < 4z the defender should enforce optimal control according to the initial state iB (0). In particular, if kB = 0, meaning that the special case that the cost of control is not counted, defender B should use the most powerful/costly active defense mechanisms as π̂B (t) = 1 for all t, and the outcome is that limt→∞ iB = 1, namely that the defender will occupy the entire network. 4.2 Fast Optimal Control for Strategic Defenders against Non-Strategic Attackers Now we consider fast optimal control for strategic defenders against non-strategic attackers, as motivated by the following question: Suppose the attacker maintains a fixed degree of attack power αR and the defender initially occupies iB (0) = i0 < ie portions of the nodes, how can the defender use optimal control to occupy the desired ie portions of the nodes as soon as possible? More precisely, the optimization is to minimize the sum of active defense cost and time (after appropriate normalization), which can be described by the following functional: Z T h(πB (t))dt JF (πB (·)) = T + λ 0 where h(·) is the cost function with respect to the control function πB (·). We consider two scenarios of cost functions: linear and quadratic. In both scenarios, we need to identify defender B’s optimal strategy with respect to the dynamics of (1) and a given objective ie > i0 for some hitting time T that is to be identified. Scenario I: Fast optimal control with linear cost functions. In this scenario, we have h(πB ) = πB . The optimization task is to minimize the active defense cost plus the time T : ) ( Z T πB (t)dt (9) JF (πB (·)) = T + λ inf 0≤πB (·)≤1 0  di (t)  Bdt = αB iB (t)(1 − iB (t)) − αR iB (t)(1 − iB (t)) subject to i (0) = i0  B iB (T ) = ie where λ > 0 Ris the normalization ratio between the unit of time and the active T defense cost 0 πB (t)dt, and i0 < ie . That is, λ, i0 and ie are given, but T is RT free. Note that the active defense cost 0 πB (t)dt includes both detection and recovery cost, where πB (t) is the control function. Theorem 3. The solution to the fast optimal control problem (9) is where T1 = 1 a−αR ∗ (πB , T ∗ ) = (1, T1 ),   ie 1−i0 . ln 1−i i0 e (10) Proof of Theorem 3 is deferred to Appendix B. The cyber security implication of Theorem 3 is the following. In order to achieve fast optimal control, the defender should use the most powerful/costly active cyber defense mechanisms, namely πB (t) = 1 for t < T ∗ , until the system state becomes iB (T ∗ ) = ie at time T ∗ . After time T ∗ , if the defender continues enforcing πB (t) = 1 for t > T ∗ , then limt→∞ iB (t) = 1, meaning that the defender will occupy the entire network. Scenario II: Fast optimal control with quadratic cost functions. In this 2 scenario, we have h(πB ) = πB . The optimization task is to minimize the following sum of active defense cost and time, which differs from the linear cost (9) in that 2 the cost function πB is replaced with cost function πB : ( ) Z T inf 0≤πB (·)≤1 JF (πB (·)) = T + λ 0 2 (t)dt πB  di (t)  Bdt = αB iB (t)(1 − iB (t)) − αR iB (t)(1 − iB (t)) subject to i (0) = i0  B iB (T ) = ie (11) where R T 2 λ > 0 is the ratio between the unit of time and the active defense cost 0 πB (t)dt (including both recovery cost and detection cost), and i0 < ie . That is, λ, i0 and ie are given, but T is free. Theorem 4. The solution to the fast optimal control problem (11) is ( a−b (u∗ , T2 ), if λ ≥ a+b−2α and a − b > 2(αR − b), ∗∗ ∗∗ R (πB , T ) = (1, T3 ), otherwise (12) where r αR − b b − αR 2 1 + , + u = a−b a−b λ   1 ie 1 − i0 , ln T2 = b + (a − b)u∗ − αR 1 − ie i0   1 ie 1 − i0 T3 = . ln a − αR 1 − ie i0 ∗ Proof of Theorem 4 is deferred to Appendix C. It cyber security implication is: Unlike in the setting of linear cost function (Theorem 3), the defender should not necessarily enforce the most powerful/costly active cyber defense mechanisms as ∗∗ πB is not always equal to 1. If the defender continues enforcing πB (t) = 1 for t > T ∗∗ after the system reaches state iB (T ∗∗ ) = ie at time T ∗∗ , the defender will occupy the entire network, namely limt→∞ iB (t) = 1. 5 Nash Equilibria for Strategic Attacker and Defender Now we ask the question: What if the attacker is also strategic? Analogous to the way of modeling strategic defenders, we assume αR ∈ [b, a]. (It is straightforward to extend the current setting αB , αR ∈ [b, a] to the setting αB ∈ [bB , aB ] and αR ∈ [bR , aR ].) A strategic attacker can adjust its attack power αR = b + πR (a − b), via control variable πR (·) ∈ [0, 1]. That is, the attacker can launch more sophisticated attacks (i.e., greater πR leading to greater αR ), which however incurs higher cost (e.g., the investment for obtaining more powerful attack tools). Since both the defender and the attacker are strategic, we naturally consider a game-theoretic model. Specifically, the defender B’s optimization task is   Z ∞ −zt JB (πB (·), πR (·)) = e (fB (iB (t)) + kB · πB (iB (t)))dt , φB (iB ) = inf 0≤πB (·)≤1 0 and the attacker R’s optimization task is  Z JR (πB (·), πR (·)) = φR (iB ) = inf 0≤πR (·)≤1 0 ∞  e−zt (fR (iB (t)) + kR · πR (iB (t)))dt , where πB (·), πR (·) ∈ [0, 1], fB′ (·) < 0 (as in the infinite-time horizon optimal control case investigated above), fR′ (·) > 0 because fR (iB (t)) represents the maintenance cost to the attacker, kR is the normalization ratio between the attacker’s maintenance cost and penetration cost (which depends on the capability of the attack tools), and kR · πR (·) is the penetration cost. Note that fR′ (·) > 0 is relevant because the attacker may need to conduct some costly (or risky) activities after “grabbing” a node from the defender (e.g., downloading attack payloads from some remote server, while this downloading operation may increase the chance that the compromised node is detected by active defense). Since fR′ (·) > 0 implies dfR /diR < 0, the attacker’s optimization task for πR is in parallel to the optimization for πB . The Hamiltonians associated to defender B’s and attacker R’s optimization problems are: HB (iB , πB (iB ), πR (iB ), p1 ) = fB (iB ) + kB πB + p1 [αB iB (1 − iB ) − αR iB (1 − iB )] = (kB + p1 iB (1 − iB )(a − b))πB + fB (iB ) + p1 biB (1 − iB ) − p1 αR iB (1 − iB ); HR (iB , πB (iB ), πR (iB ), p2 ) = fR (iB ) + kR πR + p2 [αB iB (1 − iB ) − αR iB (1 − iB )] = (kR − p2 iB (1 − iB )(a − b))πR + fR (iB ) + p2 αB iB (1 − iB ) − p2 biB (1 − iB ). The adjoint equation is  ′ B ṗ1 = − ∂H  ∂iB + zp1 = −fB (iB ) + p1 [z − (αB − αR )(1 − 2iB )]   p1 (∞) = 0 ′ R ṗ = − ∂H   ∂iB + zp2 = −fR (iB ) + p2 [z − (αB − αR )(1 − 2iB )]  2 p2 (∞) = 0. Theorem 5. Suppose fB (iB ) = 1 − iB , fR (iB ) = iB . Then, the Nash equilibria under various scenarios are listed in Table 1, where FB (iB ) = −iB (1 − iB )(a − b)fB′ (iB ) − kB z and FR (iB ) = iB (1 − iB )(a − b)fR′ (iB ) − kR z. Proof of Theorem 5 is similar to the proof of Theorem 1 and omitted due to space limitation. Its cyber security implication is: The outcome of playing the Nash equilibrium strategies also depends on the initial system state and the relationship between kB and kR . As illustrated in Figure 2, if kB < kR with kR z < 41 (a−b), meaning that the attacker is more concerned with its control cost (e.g., reluctant to use/expose its advanced attack tools such as zero-day exploits) than the defender, then FB (iB ) = 0 has two roots i1 , i2 and FR (iB ) = 0 has two roots i3 , i4 . Then, we have i1 < i3 < i4 < i2 (the only possibility under the given conditions). Therefore, the outcomes under the Nash equilibrium strategies are summarized as follows: – If iB (0) < i1 , then iB (t) = iB (0) and iR (t) = iR (0) for all t > 0 because π̂B = π̂R = 0 are the Nash equilibrium strategies. – If i3 > iB (0) > i1 , then π̂B = 1 and π̂R = 0 until iB = i3 , which implies that iB (t) strictly increases until iB = i3 . When iB (t) = i3 at some point in time t = t1 , π̂B = π̂R = 1 implies iB (t) = i3 for t > t1 . Table 1. Nash equilibrium strategies for defender and attacker in various cases. kB Roots of FB (iB ) = 0 Roots of FR (iB ) = 0 kR kB z < 1 4 (a − b) kR z < 1 4 (a − b) kB z < 1 4 (a − b) kR z = 1 4 (a − b) kB z < 1 4 (a − b) kR z > 1 4 (a − b) kB z = 1 4 (a − b) kR z < 1 4 (a − b) kB z = 1 4 (a − b) kR z = 1 4 (a − b) kB z = 1 4 (a − b) kR z > 1 4 (a − b) kB z > 1 4 (a − b) kR z < 1 4 (a − b) kB z > kB z > 1 4 (a 1 4 (a − b) kR z = − b) kR z > 1 4 (a 1 4 (a − b) − b) Nash equilibria  0 if iB (0) ≤ i1 1 if i1 < iB (0) < i2 π̂B =   0 if iB (0) ≥ i2 0 < i1 < i2 < 1 0 < i3 < i4 < 1  0 if iB (0) < i3 1 if i3 ≤ iB (0) ≤ i4 π̂R =  0 if i (0) > i B 4   0 if iB (0) ≤ i1 1 if i1 < iB (0) < i2 π̂B =  0 if i (0) ≥ i B 2  0 < i1 < i2 < 1 i3 = i4 = 21  0 if iB (0) < i3 1 if iB (0) = i3 π̂R =   0 if iB (0) > i3  0 if iB (0) ≤ i1 1 if i1 < iB (0) < i2 π̂ = 0 < i1 < i2 < 1 No real-valued roots B  0 if i (0) ≥ i B 2  π̂R = 0  0 if iB (0) < i1 1 if iB (0) = i1 π̂B =   0 if iB (0) > i2 0 < i1 = i2 = 21 0 < i3 < i4 < 1  0 if iB (0) ≤ i3 1 if i3 < iB (0) < i4 π̂R =  0 if i (0) ≥ i B 4   0 if iB (0) < i1 πR if iB (0) = i1 π̂B =   0 if iB (0) > i2 0 < i1 = i2 = 12 i3 = i4 = 12  0 if iB (0) < i3 πB if iB (0) = i3 π̂R =  0 if i (0) > i B 3 0 < i1 = i2 = 21 No real-valued roots π̂B = 0, π̂R = 0 π̂B = 0   0 if iB (0) ≤ i3 No real-valued roots 0 < i3 < i4 < 1 1 if i3 < iB (0) < i4 π̂R =  0 if i (0) ≥ i B 4 π̂B = 0, π̂R = 0 No real-valued roots i3 = i4 = 21 π̂B = 0, π̂R = 0 No real-valued roots No real-valued roots B 0.2 0.15 B y=i (1−i )(a−b) 0.25 0.1 y=k z R y=k z B 0.05 i 0 0 1 0.2 i4 i 3 0.4 i B 0.6 i 2 0.8 1 Fig. 2. Illustration of the roots of FB (iB ) = 0 with fB (iB ) = 1 − iB , and the roots of FR (iB ) = 0 with fR (iB ) = iB , where a − b = 1, kB z = 1/8 and kR z = 1/6. The x-axis represents iB and the y-axis represents y(iB ) = iB (1 − iB )(a − b). Arrows indicate the directions the outcome under the Nash equilibrium heads for. Black-colored bars indicate that the trajectory under the Nash equilibrium stays static. – If i4 > iB (0) > i3 , then iB (t) = iB (0) and iR (t) = iR (0) for all t > 0 because π̂B = π̂R = 1. – If i2 > iB (0) > i4 , then π̂B = 1 and π̂R = 0 until iB = i2 , which implies that iB (t) strictly increases until iB = i2 . When iB (t) = i2 at some point in time t = t2 , π̂B = π̂R = 1 implies iB (t) = i3 for t > t2 . – If iB (0) > i2 , then iB (t) = iB (0) and iR (t) = iR (0) for all t > 0 because π̂B = π̂R = 1. If kR > 14 (a − b) > kB , meaning that the attacker is extremely concerned with its control cost (e.g., not willing to easily use/expose its advanced attack tools such as zero-day exploits) but the defender is not, then it always holds that π̂R = 0 because FR (iB ) = 0 has no root but FB (iB ) = 0 has two roots i1 < i2 . From Table 1, we see that limt→∞ iB (t) = 1 always holds, namely that the attacker gives up using its advanced attack tools. If both kB > 14 (a− b) and kR > 41 (a− b), meaning that both the defender and the attacker are extremely concerned with their control costs (i.e., neither the defender wants to easily use/expose its advanced active defense tools, nor the attacker wants to use/expose its advanced attack tools such as zero-day exploits), then it always holds that π̂B = π̂R = 0 because FB (iB ) = 0 and FR (iB ) = 0 have no real-valued roots. As a result, iB (t) = iB (0) for any t > 0. The scenarios that one or both FB (iB ) = 0 and FR (iB ) = 0 have one root can be regarded as degenerated cases of the above. Moreover, the cases of kB > kR (i.e., the defender is more concerned about its control cost, such as not willing to easily use/expose its advanced active defense tools), the outcomes under the Nash equilibria can be derived analogously. 6 Conclusion We have investigated how to optimize active cyber defense, by presenting optimal control solutions for strategic defenders against non-strategic attackers, and identifying Nash equilibrium strategies for strategic defenders and attackers. We have discussed the cyber security implications of the theoretic results. This paper brings interesting problems for future research. First, it is interesting to extend the models to accommodate nonlinear fB (·) and fR (·). Second, the models are geared toward active cyber defense. A comprehensive defense solution, as hinted in our analysis, should require the optimal integration of reactive, active, and proactive cyber defense. Therefore, we need to extend the models to accommodate reactive defense and proactive cyber defense. Moreover, it is interesting to investigate how to extend the models to accommodate moving target defense, which has not be systematically evaluated yet [7]. Third, how to extend the models to accommodate the underlying network structures? Acknowledgement. Wenlian Lu was jointly supported by the Marie Curie International Incoming Fellowship from the European Commission (no. FP7PEOPLE-2011-IIF-302421), the National Natural Sciences Foundation of China (no. 61273309), the Shanghai Guidance of Science and Technology (SGST) (no. 09DZ2272900) and the Laboratory of Mathematics for Nonlinear Science, Fudan University. Shouhuai Xu was supported in part by ARO Grant #W911NF-12-10286 and AFOSR Grant FA9550-09-1-0165. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of any of the funding agencies. References 1. D. Aitel. Nematodes – beneficial worms. http://www.immunityinc.com/ downloads/nematodes.pdf, Sept. 2005. 2. T. Alpcan and T. Başar. Network Security: A Decision and Game Theoretic Approach. Cambridge University Press, 2011. 3. M. Bardi and I. Capuzzo-Dolcetta. Optimal control and viscosity solutions of Hamilton-Jacobi-Bellman equations. Birkhauser, 2008. 4. Alain Bensoussan, Murat Kantarcioglu, and SingRu Hoe. A game-theoretical approach for finding optimal strategies in a botnet defense model. In Proc. GameSec’10, pages 135–148, 2010. 5. F. Castaneda, E. Sezer, and J. Xu. Worm vs. worm: preliminary study of an active counter-attack mechanism. In Proc. ACM WORM’04, pages 83–93, 2004. 6. D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos. Epidemic thresholds in real networks. ACM Trans. Inf. Syst. Secur., 10(4):1–26, 2008. 7. M. Collins. A cost-based mechanism for evaluating the effectiveness of moving target defenses. In Proc. GameSec’12, pages 221–233, 2012. 8. Neal Fultz and Jens Grossklags. Blue versus Red: Towards a Model of Distributed Security Attacks. In Proc. Financial cryptography and data security (FC’99), pages 167–183. 2009. 9. A. Ganesh, L. Massoulie, and D. Towsley. The effect of network topology on the spread of epidemics. In Proc. of IEEE Infocom 2005, 2005. 10. J. Kephart and S. White. Directed-graph epidemiological models of computer viruses. In Proc. IEEE Symposium on Security and Privacy, pages 343–361, 1991. 11. J. Kephart and S. White. Measuring and modeling computer virus prevalence. In Proc. IEEE Symposium on Security and Privacy, pages 2–15, 1993. 12. W. Kermack and A. McKendrick. A contribution to the mathematical theory of epidemics. Proc. of Roy. Soc. Lond. A, 115:700–721, 1927. 13. J. Kesan and C. Hayes. Mitigative counterstriking: Self-defense and deterrence in cyberspace. Harvard Journal of Law and Technology (forthcoming, available at SSRN: http: // ssrn. com/ abstract= 1805163 ). 14. M. Khouzani, S. Sarkar, and E. Altman. A dynamic game solution to malware attack. In Proc. IEEE INFOCOM, pages 2138–2146, 2011. 15. M. Khouzani, S. Sarkar, and E. Altman. Saddle-point strategies in malware attack. IEEE Journal on Selected Areas in Communications, 30(1):31–43, 2012. 16. H. Lin. Lifting the veil on cyber offense. IEEE Security & Privacy, 7(4):15–21, 2009. 17. M. Manshaei, Q. Zhu, T. Alpcan, T. Basar, and J. Hubaux. Game theory meets network security and privacy. ACM Computing Survey, to appear. 18. W. Matthews. U.s. said to need stronger, active cyber defenses. http://www. defensenews.com/story.php?i=4824730, 1 Oct 2010. 19. A. McKendrick. Applications of mathematics to medical problems. Proc. of Edin. Math. Soceity, 14:98–130, 1926. 20. R. Naraine. ’friendly’ welchia worm wreaking havoc. http://www.internetnews.com/ent-news/article.php/3065761/ Friendly-Welchia-Worm-Wreaking-Havoc.htm, August 19, 2003. 21. J. Omic, A. Orda, and P. Van Mieghem. Protecting against network infections: A game theoretic perspective. In Infocom’09, pages 1485–1493, 2009. 22. R. Pı́bil, V. Lisý, C. Kiekintveld, B. Bosanský, and M. Pechoucek. Game theoretic model of strategic honeypot selection in computer networks. In Proc. GameSec’12, pages 201–220, 2012. 23. B. Schneier. Benevolent worms. http://www.schneier.com/blog/archives/ 2008/02/benevolent_worm_1.html, February 19, 2008. 24. L. Shaughnessy. The internet: Frontline of the next war? http://www.cnn.com/ 2011/11/07/us/darpa/, November 7, 2011. 25. George Theodorakopoulos, Jean-Yves Le Boudec, and John S. Baras. Selfish response to epidemic propagation. IEEE Trans. Aut. Contr., 58(2):363–376, 2013. 26. Piet Van Mieghem, Jasmina Omic, and Robert Kooij. Virus spread in networks. IEEE/ACM Trans. Netw., 17(1):1–14, February 2009. 27. M. Vojnovic and A. Ganesh. On the race of worms, alerts, and patches. IEEE/ACM Trans. Netw., 16:1066–1079, October 2008. 28. Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos. Epidemic spreading in real networks: An eigenvalue viewpoint. In Proc. IEEE SRDS’03, pages 25–34, 2003. 29. N. Weaver and D. Ellis. White worms don’t work. ;login: The USENIX Magazine, 31(6):33–38, 2006. 30. Homeland Security News Wire. Active cyber-defense strategy best deterrent against cyber-attacks. http://www.homelandsecuritynewswire.com/ active-cyber-defense-strategy-best-deterrent-against-cyber-attacks, 28 June 2011. 31. J. Wolf. Update 2-u.s. says will boost its cyber arsenal. http://www.reuters.com/ article/2011/11/07/cyber-usa-offensive-idUSN1E7A61YQ20111107, November 7, 2011. 32. S. Xu, W. Lu, and L. Xu. Push- and pull-based epidemic spreading in arbitrary networks: Thresholds and deeper insights. ACM Transactions on Autonomous and Adaptive Systems (ACM TAAS), 7(3):32:1–32:26, 2012. 33. S. Xu, W. Lu, L. Xu, and Z. Zhan. Adaptive epidemic dynamics in networks: Thresholds and control. ACM Transactions on Autonomous and Adaptive Systems (ACM TAAS), to appear. 34. S. Xu, W. Lu, and Z. Zhan. A stochastic model of multivirus dynamics. IEEE Trans. Dependable Sec. Comput., 9(1):30–45, 2012. 35. Shouhuai Xu, Wenlian Lu, and Hualun Li. A stochastic model of active cyber defense dynamics. Internet Mathematics, to appear. A Proof of Theorem 1 Proof. By the Dynamic Programming (DP) argument [3], we know that defender B’s value function of the optimal solution can be defined as:   Z ∞ −zt JB (πB (·)) = e (fB (iB (t)) + kB · πB (t))dt . (13) φ(iB ) = inf 0≤πB (·)≤1 0 This leads to the following Bellman equation:   ′ fB (iB ) + kB πB (t) + φ (iB )[αB iB (1 − iB ) − αR iB (1 − iB )] zφ(iB ) = inf 0≤πB (·)≤1 = = inf HB (iB , πB (t), φ′ (iB )) inf HB (iB , πB (t), p), where p = φ′ (iB ). 0≤πB (·)≤1 0≤πB (·)≤1 (14) From (5), we know that the optimal strategy π̂B takes the form: π̂B = 1kB +piB (1−iB )(a−b)<0 + uB 1kB +piB (1−iB )(a−b)=0 , (15) where 1 is the indicator function. The infimum of Hamiltonian (3) is: inf 0≤πB (·)≤1 HB (iB , πB , p) = fB (iB ) + [kB + piB (1 − iB )(a − b)]1kB +piB (1−iB )(a−b)<0 + p(b − αR )iB (1 − iB ). Hence, we have zφ(iB ) = fB (iB ) + [kB + piB (1 − iB )(a − b)]1kB +piB (1−iB )(a−b)<0 + p(b − αR )iB (1 − iB ) = fB (iB ) + [kB + φ′ (iB )iB (1 − iB )(a − b)]1kB +φ′ (iB )iB (1−iB )(a−b)<0 + φ′ (iB )(b − αR )iB (1 − iB ). (16) Let y(iB ) = kB + φ′ (iB )iB (1 − iB )(a − b). In what follows, we are to verify that (7) satisfies (15) with φ(iB ) defined by (16), which means that (7) minimizes the Hamiltonian in the term of (13). This completes the proof. In order to verify that (7) satisfies (15) with φ(iB ) defined by (16), we differentiate (16) with respect to iB to obtain [(b − αR ) + (a − b)1y<0 ]iB (1 − iB )y ′ − zy − FB (iB ) = 0, (17) which can be rewritten as y′ − z FB (iB ) y− = 0. [(b − αR ) + (a − b)1y<0 ]iB (1 − iB ) [(b − αR ) + (a − b)1y<0 ]iB (1 − iB ) (18) If kB + φ′ (iB )iB (1 − iB )(a − b) < 0 namely y(iB ) < 0, (18) should be   R R z z FB (x) d − x dξ − x dξ y(x)e 0 (a−αR )ξ(1−ξ) − e 0 (a−αR )ξ(1−ξ) = 0. (19) dx (a − αR )x(1 − x) If kB + φ′ (iB )iB (1 − iB )(a − b) > 0 namely y(iB ) > 0, (18) should be:   R1 R1 z z d FB (x) dξ dξ x (b−αR )ξ(1−ξ) y(x)e − e x (b−αR )ξ(1−ξ) = 0. dx (b − αR )x(1 − x) (20) Therefore, we only need to prove that the optimal defense strategy (7) satisfies (17), namely (19) or (20). The proof is split into cases, depending on x residing in interval (i2 , 1) or (0, i1 ) or (i1 , i2 ), or x = i1 , or x = i2 . Case 1: i2 < x < 1. By (20), we have y(x)e R1 z dξ x (b−αR )ξ(1−ξ) − Z x i2 R1 z FB (ζ) dξ e ζ (b−αR )ξ(1−ξ) dζ = 0. (b − αR )ζ(1 − ζ) Hence, we have y(x) = Z x i2 Rx FB (ζ) eζ (b − αR )ζ(1 − ζ) z (b−αR )ξ(1−ξ) dξ dζ. (21) Since iB > i2 , we have y(x) > 0. Therefore, we have π̂B = 0 for iB ∈ (i2 , 1). Case 2: 0 < x < i1 . By (20), we have y(x)e − Rx 0 z dξ (b−αR )ξ(1−ξ) − Z x i1 R FB (ζ) − ζ e 0 (b − αR )ζ(1 − ζ) z dξ (b−αR )ξ(1−ξ) dζ = 0. Hence, x Rx Rx z FB (ζ) dξ e ζ (b−αR )ξ(1−ξ) dζ + kB e 0 0 (b − αR )ζ(1 − ζ) Z x Rx z a−b ′ dξ fB (ζ)e ζ (b−αR )ξ(1−ξ) dζ =kB − 0 b − αR y(x) = Z z dξ (b−αR )ξ(1−ξ) (22) Since iB < i1 , we have y(x) > 0. Therefore we have π̂B = 0 for iB ∈ (0, i1 ). Case 3: i1 < x < i2 . By (19), we have y(x)e R1 z dξ x (a−αR )ξ(1−ξ) − Z x i2 R1 z FB (ζ) dξ e ζ (a−αR )ξ(1−ξ) dζ = 0. (a − αR )ζ(1 − ζ) Hence y(x) = Z x i2 Rx FB (ζ) eζ (a − αR )ζ(1 − ζ) z dξ (a−αR )ξ(1−ξ) dζ. (23) Since iB ∈ (i1 , i2 ), we have y(x) < 0. This implies π̂B = 1. Cases 4 & 5: x = i1 or x = i2 . By (21,22,23), we have y(x) = 0. If x = i1 or −kB x = i2 , we can derive φ′ (iB ) = i∗ (1−i ∗ )(a−b) from the definition of y(·). According R −b . Differentiating with respect to i∗ , to (16), we have: zφ(i∗ ) = fB (i∗ ) + kB αa−b ∗ ∗ ′ ∗ we have −i (1 − i )(a − b)fB (i ) − kB z = FB (i∗ ) = 0. Consider the singular form iB (t) = i∗ for a period of time. We obtain that i̇B |iB =i∗ = 0 and thus R −b π̂B = uB = αa−b , where i∗ = i1 or i∗ = i2 . ⊓ ⊔ B Proof of Theorem 3 Proof. To solve the minimization problem, we formulate the current value Hamiltonian associated with (9): HF (iB , πB , q) = λπB + q(αB − αR )iB (1 − iB ) = [λ + q(a − b)iB (1 − iB )]πB + q(b − αR )iB (1 − iB ). F The adjoint equation is q̇ = − ∂H ∂iB = −q(αB − αR )(1 − 2iB ), with the boundary condition ∗ HF (i∗B (T ∗ ), πB (T ∗ ), q(T ∗ )) + 1 = 0, (24) ∗ where T ∗ denotes the optimal hitting time that iB (T ∗ ) = ie , πB (·) denotes the ∗ optimal feedback control, and iB (·) denotes the corresponding trajectory. ∗ The optimal control πB is obtained by minimizing Hamiltonian HF (iB , πB , q). ∗ Since HF (iB , πB , q) is linear in πB , the optimal control πB takes the following bang-bang form:  F 1 if ∂H   ∂πB < 0  ∗ F πB = u∗B (0 < u∗B < 1, to be determined) if ∂H ∂πF = 0   0 if ∂HF > 0 ∂πB F where ∂H ∂πB = λ + q(a − b)iB (1 − iB ). From (24), there are two possibilities: (i). ∂HF ∂HF a−b R ∂HF If ∂πB ≥ 0, then 0 = b−α a−b ( ∂πB − λ) + 1, which implies ∂πB = αR −b + λ is a b−αR ∂HF F F < 0, then 0 = ∂H positive constant. (ii). If ∂H ∂πB + a−b ( ∂πB − λ) + 1, which h ∂πB i b−αR a−b F implies ∂H ∂πB = a−αR a−b λ − 1 is a negative constant. It can be seen that only under the above (ii), the constraint iB (T ) = ie can be obtained for some T . Then, the solution to the optimal fast control should be πB (t) = 1 for all time. ∗ So (πB , T ∗ ) = (1, T1 ), where T1 satisfies iB (T1 ) = that is, T1 = C 1 a−αR ln  ie 1−i0 1−ie i0 1 i0 (a−αR )T1 1−i0 e i0 + 1−i0 e(a−αR )T1 = ie ,  . This completes the proof. ⊓ ⊔ Proof of Theorem 4 Proof. To solve the optimization problem, we formulate the current value Hamiltonian associated with (11): 2 HF (iB , πB , q) = λπB + q(αB − αR )iB (1 − iB ) 2 = λπB + q(a − b)iB (1 − iB )πB + q(b − αR )iB (1 − iB ). F The adjoint equation is q̇ = − ∂H ∂iB = −q(αB − αR )(1 − 2iB ), and the boundary condition is ∗∗ HF (iB (T ∗∗ ), πB (T ∗∗ ), q(T ∗∗ )) + 1 = 0, (25) ∗∗ where T ∗∗ denotes the optimal final time, πB (·) denotes the optimal feedback control, iB (·) denotes the corresponding trajectory, and iB (T ∗∗ ) = ie . Let D = q(a − b)iB (T ∗∗ )(1 − iB (T ∗∗ )). From (25) we have b − αR D + 1 = 0. (26) a−b ∗∗ The optimal control, πB , is obtained by minimizing the Hamiltonian HF (iB , πB , q). Because the Hamiltonian HF (iB , πB , q) is quadratic in πB , the optimal control, ∗∗ πB , takes the following form:  D  >1 1 if − 2λ   ∗∗ D D πB = − 2λ (0 < u∗B < 1, to be determined) if 0 ≤ − 2λ ≤1   0 D if − < 0. ∗∗ ∗∗ 2 ∗∗ HF (iB (T ∗∗ ), πB (T ∗∗ ), q(T ∗∗ )) + 1 = λ(πB ) + DπB + 2λ D From (26), we know there are three possibilities. (i). If − 2λ < 0, then 0 = b−αR a−b D D + 1, namely that D = is a positive constant. (ii) If − 2λ > 1, then a−b αR −b b−αR a−b 0 = a−b D + 1, namely that D = − a−αR (λ + 1) is also a constant. Note that a−b D < −2λ if and only if a − b ≤ 2(αR − b), or if and only if λ < a+b−2α and R D a − b > 2(αR − b). (iii). If 0 ≤ − 2λ ≤ 1, then  2 2    D D b − αR D 0=λ − + 1, − 2λ − − 2λ − 2λ 2λ a−b 2λ namely that b − αR λ− D=2 a−b r  b − αR 2 4 λ + 4λ a−b a−b D ∈ (0, 1) if and only if λ ≥ a+b−2α and a − b > is a constant. Note that − 2λ R 2(αR − b). In term of minimizing the Hamiltonian HF under the above case (i), we ∗∗ have πB = 0 for all time, which is impossible to obtain iB (T ) = ie ; under the ∗∗ above case (ii), we have πB = 1 for all time; under the above case (iii), we have D ∗∗ πB = −2λ for all time. To sum up, we have  ∗ a−b (u , T2 ) if λ ≥ a+b−2α and a − b > 2(αR − b) ∗∗ R (πB , T ∗∗ ) = (27) (1, T3 ) otherwise r  αR −b a−b b−αR a−b where u∗ = D −2λ iB (T2 ) = i0 (b+(a−b)u∗ −αR )T2 1−i0 e i0 + 1−i e(b+(a−b)u∗ −αR )T2 0 1 = + 2 + λ1 , and T2 and T3 satisfy = ie , respectively. This completes the proof. iB (T3 ) = 1 i0 (a−αR )T3 1−i0 e i0 + 1−i e(a−αR )T3 0 = ie , ⊓ ⊔
3cs.SY
Concurrent Pump Scheduling and Storage Level Optimization Using Meta-Models and Evolutionary Algorithms1 Morad Behandish1 and Zheng Yi Wu2 arXiv:1711.04988v1 [cs.NE] 14 Nov 2017 1 Department of Computer Science and Engineering, University of Connecticut, USA 2 Applied Research Group, Bentley Systems, Incorporated, USA Abstract In spite of the growing computational power offered by the commodity hardware, fast pump scheduling of complex water distribution systems is still a challenge. In this paper, the Artificial Neural Network (ANN) meta-modeling technique has been employed with a Genetic Algorithm (GA) for simultaneously optimizing the pump operation and the tank levels at the ends of the cycle. The generalized GA+ANN algorithm has been tested on a real system in the UK. Comparing to the existing operation, the daily cost is reduced by about 10−15%, while the number of pump switches are kept below 4 switches-per-day. In addition, tank levels are optimized ensure a periodic behavior, which results in a predictable and stable performance over repeated cycles. Keywords. Pump Scheduling; Meta-Modeling; Graphics Processing Unit; Artificial Neural Network; Genetic Algorithm. 1. Introduction Drinking water and waste water utilities account for about 3 − 4% of the total energy use in the United States, and are responsible for more than 45 million tons of greenhouse gas emission annually, as reported by the US Environmental Protection Agency (EPA). According to the same report, these systems account for 30 − 40% of total energy consumption of municipal governments, and the energy-related operating costs are expected to increase as much as 20% in the next fifteen years due to population growth and tightening drinking water regulations (EPA (2012)). These facts pronounce the increasing need for the water industry to improve water management strategies. The problem of operation optimization is most frequently addressed by pump scheduling, i.e., predicting a set of either implicit control rules or explicit time-based specifications on when to turn pumps on and off, such that the supply or disposal service requirements are met with minimal energy cost. Pump scheduling has been extensively researched over the past few decades, using a variety of optimization techniques, the most popular of which has been Genetic Algorithms (GAs), including the studies by Mackle et al. (1995); Beckwith and Wong (1995); Engelbrecht and Haarhoff (1996); Nitivattananon et al. (1996); De Schaetzen et al. (1998); Wu et al. (2001); Kelner and Léonard (2003) and Van Zyl et al. (2004). The earliest studies were mostly conducted based on a single objective function (i.e., operation energy or cost). Multi-objective evolutionary optimization algorithms have also been used by Savic et al. (1997); Sotelo et al. (2002); Barán et al. (2005); López-Ibáñez et al. (2005), and Wang et al. (2009). In either case, pump scheduling with the 1 This article was presented in the 12th International Conference on Computing and Control for the Water Industry (CCWI’2013) and published on 04/23/2014 in Procedia Engineering. For citation, please use: Behandish, Morad and Wu, Zheng Yi, 2014. “Concurrent Pump Scheduling and Storage Level Optimization Using Meta-Models and Evolutionary Algorithms.” Procedia Engineering, 70, pp.103–112. Preprint submitted to Procedia Engineering Technical Report No. BENT-TR-14-04, April 23, 2014 Figure 1: Evolutionary optimization of water distribution systems: (a) the multi-ANN meta-model used to predict the hydraulic response; (b) the Genetic Algorithm (GA) used to optimize the pump operation schedule; (c) and (d) reproduction operators of the GA. direct application of hydraulic solvers is computationally intensive when applied to models of large utilities. To overcome this difficulty, parallel computing technology has been utilized by von Lücken et al. (2004); Wu and Zhu (2009) and Wu and Behandish (2012a,b) to speed up the optimization. The speed-up factors scale well by increasing the number of physical computing cores; however, expensive multiprocessor systems are required, especially for real-time applications demanding continuous updates of the pump control policies. In addition to the pump schedule, there are other hydraulic parameters that are indirectly related to the energy consumption. One such set of parameters are the operation ranges of storage tank levels, which can introduce an independent set of additional decision variables alongside pump control settings. In real systems, a tank is not necessarily designed to result in optimal energy consumption when its entire capacity is utilized, nor is necessarily placed at optimal locations. As a result, some tanks might have more impacts on energy saving than the others if they are filled when electricity is inexpensive and drained during the peak-demand periods. Different techniques have been used for hydraulic system modeling, ranging from empirical models to simplified hydraulic models and state-of-the-art hydraulic simulation packages, as reviewed by Rao and Alvarruiz (2007). An alternative effective solution to reduce the computation time is offered by machine learning. Artificial Neural Networks (ANNs) have been extensively utilized for predicting the hydraulic state of water distribution and disposal systems in the recent years by Broad et al. (2005) and Tabach et al. (2007), and for the specific problem of real-time pump operation control by Jamieson et al. (2007); Rao and Alvarruiz (2007), and Rao and Salomons (2007). These techniques were applied to real systems in Salomons et al. (2007); Martinez et al. (2007); Shamir and Salomons (2008) and Behandish and Wu (2012). Furthermore, the ANN training process lends itself well to high-throughput parallel processing on the Graphics Processing Unit (GPU), as demonstrated by Wu and Eftekharian (2011) and Behandish and Wu (2012). The multi-ANN meta-modeling was later improved and generalized by Behandish and Wu (2013) to encompass a wider spectrum of systems with diverse state variable combinations to be predicted with significantly improved accuracy and robustness. In this article, the generalized multi-ANN meta-modeling technique developed by the authors is utilized in combination with a modified Genetic Algorithm (GA). The modified GA is employed to search for the decision space made of both discrete variables (e.g., pump/valve statuses) and continuous variables (e.g., tank levels). The results on a case study system are provided and compared with those of the earlier studies in terms of energy saving, number of required pump switches, and periodic tank water level variations. 2 Figure 2: Multi-ANN meta-model construction: (a) sensitivity analysis results; (b) sample sub-ANN structures to predict the hydraulic response. 2. Generalized Meta-Modeling Fig. 1 (a) is a schematic illustration of the Extended Period Simulation (EPS) in a succession of time, with each snapshot being replicated by a set of independent neural networks (Behandish and Wu (2013)). The initial conditions such as the storage tank levels are specified at time t0 , while control variables including pump and valve statuses (on or off), pump speed settings (when applicable), etc., are explicitly controlled for each time interval. In addition, time patterns are pre-specified for nodal demands, electricity tariffs, reservoir heads, etc. Each snapshot of the simulation relates the state variables at time ti to those at ti+1 = ti + δt, where typically δt = 1 hour. Before setting up such a network, a sensitivity analysis was carried out to find out which state variables to select as the inputs of each sub-ANN to predict a particular output (Behandish and Wu (2013)). Fig. 2 (a) shows the results of the sensitivity analysis for a Demand Monitoring Zone (DMZ) system in the UK. The corresponding sub-ANN constructions are depicted in Fig. 2 (b), where the inputs with the highest impacts on each output are maintained. Therefore, 12 sub-ANN structures are formed based on these input/output couplings, together with an additional sub-ANN that is used to predict the energy consumption rates from the pump statuses. The sub-ANNs are trained one at a time or in parallel on the GPU with NVIDIAs Compute Unified Device Architecture (NVIDIA (2012)), using large datasets obtained with the hydraulic model. The reader is referred to Behandish and Wu (2013) for further details on the generalized meta-modeling. 3. Optimization Model The trained and verified multi-ANN meta-model was integrated with an evolutionary optimization algorithm to evaluate the fitness of a trial solution for the system operation control, and to search for a near-optimal solution. Two distinct sets of decision variables are considered in general: 1. Control variables: The control variables include the statuses and settings of a control element (i.e., pump or valve) at every control interval. The statuses are defined as the fraction of the time interval δt during which the pump or valve has been kept open (e.g., 0 for closed, 1 for open) and the settings can represent pump speeds, valve flow/pressure settings, etc., as detailed by Behandish and Wu (2013). 2. Initial Conditions: The initial storage tank levels, which are typically constrained to be recovered at the end of the operation cycle, are also included in the decision variable set. The tank levels at t = t0 are decided by the optimizer, and those at t > t0 are predicted successively by the meta-model. 3 Using the convention of Behandish and Wu (2013), all state variables are normalized with the following linear equation, to make them dimensionless and with similar orders of magnitude: s̄(t) = si (t) − si,min , si,max − si,min i = 1, 2, · · · , n. (1) The first set of decision variables can be represented in two matrices, one for statuses and the other for settings. The former is a (nP +nV )×m matrix [Ai,k ] made of nP pump statuses 0 ≤ AP,i (tk ) ≤ 1 (1 ≤ i ≤ nP ), and nV valve statuses 0 ≤ AV,i ≤ 1(tk ) (1 ≤ i ≤ nV ) over m control intervals starting at tk = t0 + kδt (0 ≤ k ≤ m − 1). Similarly, the latter is a (n0P + n0V ) × m matrix [S̄i,k ] that represents n0P normalized pump settings 0 ≤ S̄P,i (tk ) ≤ 1 (1 ≤ i ≤ n0P ), and n0V normalized valve settings 0 ≤ S̄V,i (tk ) ≤ 1 (1 ≤ i ≤ n0V ) defined over the same m control intervals. The second set of decision variables, on the other hand, can be represented by a vector [P̄j,0 ] made of nT normalized tank levels P̄T,j (t0 ) at the beginning of the cycle. As schematically depicted in Fig. 1 (b), the Genetic Algorithm (GA) generates the trial solution set SGA of the aforementioned n = (nP + nV + n0P + n0V ) × m + nT variables. The trial solution together with other parameters Spar , that may include the demand patterns, the reservoir head patterns, the pre-specified pump and valve settings, etc., all in normalized forms, are passed to the multi-ANN meta-model. For each GA trial, the extended period simulation is replicated by the successive calls to the trained ANNs. The ANN outputs may include the pump energy rates, the tank levels, and possibly other dependent state variables such as the junction pressures and the pipe flow rates. Part of the output is passed to the fitness computing routine, where the object function and penalty function are evaluated. The objective function is defined as the total pumping energy cost, normalized in the following form: F̄ (SGA ; Spar ) = m−1 1 X C̄(tk )Ētot (tk ), m (2) k=0 where C̄(t) = C(t)/Cmax is the normalized electricity tariff, Ētot (t) = Etot (t)/Emax is the normalized energy consumption rate aggregated over all pumps, ∆t = topt − t0 is the operation time, δt = ∆t/m is the control interval, and tk = t0 + kδt is the discrete time step 0(≤ k ≤ m − 1). The water distribution service requirements are quite diverse among different systems. In this article, three different classes of generalized constraints are defined and implemented as follows: 1. Time-Based Constraints: The time-based constraints specify all of the requirements on the selected hydraulic state responses over the control horizon, ranging from the tank levels and the junction pressures to the pipe flow rates, etc. These constraints are typically expressed as si,min (t) ≤ si (t) ≤ si,max (t), where si (t) is any state variable that is dependent on the decision variables, and si,min (t) and si,max (t) are the prescribed lower-bound and upper-bound. The most common time-based constraints are: (a) Lower-bounds on tank levels PT,j (t) ≥ PT,min , e.g., PT,min = 30% of capacity, maintained for emergency. (b) Upper-bounds on tank levels PT,j (t) ≤ PT,max , e.g., PT,max = 95% of capacity, to avoid water overtopping. (c) Requirements on storage at early morning hours PT,j (t) ≥ PT,AM (t), e.g., PT,AM (t) = 80% of capacity at early morning t = 6:00 to 8:00 AM, and PT,AM (t) = −∞ at all other times (i.e., no lower-bound). (d) Lower-bounds on node pressures PJ,j (t) ≥ PJ,min , e.g., PJ,min = minimum pressure required at consumer end. (e) Upper-bounds on node pressures PJ,j (t) ≤ PJ,max , e.g., PJ,max = maximum pressure required to avoid leakage, or the maximum pressure that the junctions can endure, whichever is smaller. (f) Lower-bounds on pipe flow rates QI,j (t) ≥ QI,min , e.g., QI,min = minimum flows required to avoid stagnation and maintain water quality. (g) Upper-bounds on pipe flow rates QI,j (t) ≤ QI,max , e.g., QI,max = maximum flows that pipes can endure. 4 2. Periodicity Constraints: Regardless of the time-variant constraints on the values, some state variables are constrained to return to their initial values at the end of the cycle as an operational requirement, so that the operation would repeat itself periodically under similar conditions at the subsequent cycles. For instance, a tank level at the end of the cycle can be constrained to be in a tolerance range of its initial water level, e.g., |PT,j (topt ) − PT,j (topt )| ≤ ∆PT,j . 3. Switch Constraints: A pump scheduling scenario is of practical significance only if the number of pump switches per day (i.e., the number of times that each pump is turned on and off) is restricted, e.g., to 4 or 6 switches per day for each pump. This is because numerous pump switches are detrimental to the pump’s life-cycle, resulting in prohibitively large maintenance and replacement costs. The violation of each inequality constraint written in the standard form of g(·) ≤ 0, is quantified with hg(·)i := min{0, g(·)}. For a trial solution SGA , the violation measured over the cycle ∆t = topt − t0 is formulated as: Ḡ(SGA ; Spar ) = + m−1 n X c1,i X i=1 n X m c2,j [hs̄i (tk ) − s̄max,i (tk )i + hs̄min,i (tk ) − s̄i (tk )i] , nP D E X D E topt t ∆s̄j |0 − ∆s̄max,j + c3,p ηp |0opt − ηmax,p . (4) p=1 j=1 t (3) k=0 t where |∆s̄j |0opt := |s̄j (topt ) − s̄j (t0 )|, and ηp |0opt is the actual number of pump switches per cycle, e.g., 24 hours. The first term on the right is the sum of violations of the time-base constraints, integrated for each state variable over the time interval ∆t = topt − t0 . The second term measures the violation of the periodicity requirements with the normalized tolerances ∆s̄max,j , and the last term quantifies the violation of pump switch constraints with the maximum allowable number of switches ηmax,p . The state variables s̄i (t) in the first two terms can be the normalized tank levels s̄i (t) := P̄T,i (t) (1 ≤ i ≤ nT ), the normalized junction pressures s̄i (t) := P̄J,i (t) (1 ≤ i ≤ nJ ), the normalized pipe flow rates s̄i (t) := Q̄I,i (t) (1 ≤ i ≤ nI ), etc. The weight factors c1,i , c2,j , and c3,p are set to 1 by default for constrained variables, and to 0 for the unconstrained variables. The objective function and the violation function formulated in Eqs. (2) and (4) are combined using additive penalty method into the following penalized objective function: F̄ ∗ (SGA ; Spar ) = F̄ (SGA ; Spar ) + P × Ḡ(SGA ; Spar ), (5) where P is the penalty factor, typically selected in the order of P ∼ 102 − 103 depending on how strictly the constraints are being enforced. The penalized objective function F ∗ (SGA ; Spar ) is used as a measure of fitness of the trial decision set SGA generated by the GA. The lower the value of this function is, the fitter the trial scenario is, hence more likely it is to survive or pass its properties to the next generations of the evolutionary optimization. 4. Optimization Algorithm The optimization problem is solved by combining the classic binary operators with those of a modified Genetic Algorithm (GA) (Mundo and Yan (2007)). The hybrid search algorithm is schematically illustrated in Fig. 1 (b). The algorithm iterates over ngen generations, and at each generation g where 0 ≤ g ≤ ngen − 1, a population of npop individuals (i.e., chromosomes) are maintained. Each individual is represented by a set of normalized decision variables SGA,g composed of the control variables (i.e, the matrices of pump/valve statuses and normalized settings) and initial conditions (i.e., the vectors of normalized initial storage levels) as explained in Section 3. The normalized decision variables SGA,0 of the initial population are randomly assigned with values in [0, 1], corresponding to random values in the physical domain in each state variable’s min/max range. The subsequent generations SGA,g (1 ≤ g ≤ ngen − 1) are descended from their parents in the previous generation SGA,g−1 , through a series of evolutionary operations. The modified GA utilizes a 5 combination of evolutionary operators that are designed for binary-coded chromosomes (e.g., for pump/valve statuses that are constrained to a small number of switches) as well as real-valued variables (e.g., tank levels or pump speed settings, if applicable) without a need to use binary-coding for the latter. At the beginning of each iteration, the fitness of the individuals are computed using the multi-ANN meta-model and sorted in descending order of the penalized objective function F ∗ (SGA ; Spar ). The algorithm follows an elitist strategy, hence a constant fraction felit ∼ 1 − 5% of the population consisting of the fittest individuals are directly sent to the next generation. Another fraction frand ∼ 5 − 15% of the population is randomized at every generation, to enhance the exploration and avoid local minima. The rest of the population consisting of 1 − (felit + frand ) ∼ 80 − 95% are generated from reproduction (i.e., breeding) operations. The selection of the parents for reproduction can be based on different probability distributions. In this algorithm, the method of normalized geometric ranking selection is used (Mundo and Yan (2007)), in which the probability of an individual to be selected is calculated from its rank in the sorted array based on fitness: P0 (1 − P0 )r , r = 0, 1, · · · , npop − 1, (6) Prep (r) = 1 − (1 − P0 )npop where 0 < P0 < 1 is a constant and is proportional to the probability of selecting the fittest individual, r is the rank of the individual (r = 0 for the fittest individual, and r = npop − 1 for the least fit individual of that generation). Once the parents are selected, different reproduction operators are employed to produce one offspring at a time: 1. Linear Combination: With a probability of 0 ≤ Pcom ≤ 1, the offspring genes are generated using a linear combination of the parents’ genes: s̄off,i = s̄A,i + Rcom (s̄B,i − s̄A,i ),   Rcom ∈ − , 1 +  , (7) where the subscripts “off”, A, and B refer to the offspring and the two parents, respectively (Mundo and Yan (2007)), as exemplified in Fig. 1 (c) with Rcom = 0.6. The combination factor Rcom is a random number in [−, 1 + ) where  ∼ 0 − 0.2 is the overshoot. It is evident that this reproduction scheme applies to the real-valued decision variables only. Therefore, for the pump/valve statuses restricted to binary values, the linear combination is replaced with a simple random selection, i.e., for every gene s̄off,i := s̄A,i , or s̄off,i := s̄B,i , each with 50% probability. 2. Single Split Cross-Over: With a probability of 0 ≤ Pcrs ≤ 1, the offspring genes are generated from a single point cross-over operation on the parents. For the pump/valve statuses and settings arranged into matrices, the splitting can occur along the rows or columns, each with a 50% probability. For the initial conditions arranged into a vector, on the other hand, it is a simple splitting along the one-dimensional array, as illustrated in Fig. 1 (d). 3. Direct Transfer: With a probability 1 − (Pcom + Pcrs ), one of the two parents are directly transferred to the next generation, each with 50% probability. This could be replaced with an elitist procedure, in which the fitter parent is more likely to be transferred. With the above operations, one offspring is created by a pair of parents. The selection of the parents and the reproduction have to be repeated 1 − (felit + frand ) times to generate enough number of offsprings for the next generation. The produced offsprings are subjected to mutation with a small probability Pmut ∼ 1 − 2% to avoid local minima and promote global exploration of the search landscape. For the real-valued decision variables, a uniform random mutation operation is employed, which means a reassignment of one of the normalized decision variables into a random value in [0, 1], corresponding to a random value in the physical min/max range, as illustrated in Fig. 1 (c). For binary-coded decision variables, on the other hand, the mutated gene is changed from 0 to 1 and from 1 to 0, as shown in Fig. 1 (d). As illustrated in Fig. 1 (b), once the next generation of npop ∼ 100 − 300 new individuals are produced, the procedure is repeated for enough number of generations ngen = 5, 000, until a near-optimal set of control variables and initial tank levels is found. In addition to the selection, reproduction, and mutation, every 6 several generations nres ∼ 100 − 500, the entire population except the elite fraction are completely reset to random decision variables to simulate several optimization sessions following one another, always keeping the best results obtained so far. 5. Results & Discussion The generalized GA+ANN technique was applied to a Demand Monitoring Zone (DMZ) in the UK (Wu et al. (2009)). The hydraulic model for this system is composed of 3, 537 junctions, 3, 273 pipes, 5 reservoirs, 12 storage tanks, 19 constant-speed pumps, and 420 valves. The optimization was carried out over ∆t = 24 hours with time steps δt = 1 hour. Two different optimization scenarios are reported here, one with pump scheduling of 9 active pumps (the same pumps utilized in the existing operation), which involves (9 × 24) = 216 decision variables, and the other with simultaneous pump scheduling and storage optimization of all 12 tanks, which gives rise to 216 + 12 = 238 decision variables. For this particular case study, the three categories of constraints defined in Section 3 are specified, including: (1) for 10 out of 12 tank levels, PT,j ≥ 30% of capacities for emergency, and PT,j ≤ 95% of capacities to avoid overtopping; (2) the periodicities of the same tank levels are enforced as |PT,j (24) − PT,j (0)| ≤ 10cm, which is less than 2.5% of the smallest tank capacity. (3) For every active pump, a maximum of 4 switches per 24 hours are allowed. No explicit constraints on junction pressures or pipe flow rates are specified. The GA parameters are set as: P = 1, 000, ngen = 5, 000, nres = 100, npop = 300, felit = 0.01, frand = 0.10, P0 = 0.05, Pcom = 0.40, Pcrs = 0.50, and Pmut = 0.01. The GA+ANN solutions are compared with the existing operation and the pump scheduling study by Wu et al. (2009) on the same system. The existing operation uses simple controls that define when the pumps are turned on and off based on tank levels; for instance, the pump “PILWTH” is turned on if the tank “BUTa2” level falls below 5.30 meters, and turned off if the level starts to exceed 5.73 meters. The thresholds are based on experience and does not necessarily ensure cost-effective operation. The study by Wu et al. (2009), on the other hand, used rule-based controls, but additional rules were specified with greater thresholds on the minimum storage at night when the electricity is inexpensive; e.g., at clock-times between 10:00 PM and 8:00 AM, the pump “PILWTH” is turned on if tank “BUTa2” level falls below 5.73 meters, and turned off otherwise. Both simple and rule-based controls secure the controlled tank levels between the limits, but they rely on the known relationships of pumps with tanks, and do not guarantee any bound on the number of pump switches that is required for this purpose. The cost can be significantly reduced by optimizing the rules in the latter method, but as shown in Table 1, this comes at the expense of numerous pump switches enforced by the control rules. For instance, the utilization of pump “PILWTH” is decreased by about 60% with the optimized rules, saving around ₤190 per day. However, as Fig. 3 shows, the reduced pump utilization is made possible with numerous pump switches at high frequencies to satisfy the rules, which not desirable in practice. Table 1 compares the pump utilization characteristics of the 4 different operations, obtained with EPANET using a time step of 5 minutes for every one of the 4 scenarios. It is observed that the rulebased control strategy saves about 30% of the daily cost, but the number of pump switches is prohibitively large (see Fig. 3). The near-optimal GA+ANN solution, on the other hand, can results in 10 − 15% cost saving with a maximum of 4 pump switches per day. Furthermore, both of the existing simple and rulebased controls result in large differences between the initial and the final tank levels, making it difficult to anticipate the operating cost and performance of subsequent cycles. The GA+ANN solution, on the other hand, guarantees repeatability of the operation by bringing the tank levels back to the initial conditions at the end of each cycle. It is also worthwhile noting that the existing simple and rule-based controls are on 7 out of 12 tanks, hence emptied or overtopped levels are observed for the other 5 tanks; while GA+ANN studies constrain 10 tanks to be periodic. Fig. 4 (a) shows the difference between the initial and the final tank levels for the two GA+ANN scenarios where the shaded area represents the feasible space |PT,j (24)−T, j(0)| ≤ 10cm. The energy and cost of both scenarios are plotted in panel (b) and compared with those of the current operation. The solution of pump scheduling and storage optimization is obtained with F̄ = 0.4199 and Ḡ = 0.0000 (no violation), resulting in saving of around ₤130 per day. However, the result of sole pump scheduling is obtained with F̄ = 0.4687 7 Table 1: Comparison of pump utilization, energy cost, number of pump switches (#PS), and tank level periodicities for 4 operation scenarios. Case Studies  Pump ID Simple Controls Rule-Based Controls Near-Optimal GA+ANN Near-Optimal GA+ANN (Existing Operation) (Based on Wu et al. (2009)) (Pump Scheduling Only) (Pump Sch. + Storage Opt.) Util. Cost 100 % 100 % 0.00% 36.0% 36.0% 13.6% 52.7% 93.6% 0.00% ₤226.3 ₤350.4 ₤00.00 ₤24.39 ₤24.39 ₤04.14 ₤46.79 ₤276.6 ₤00.00 #PS 0 0 0 2 2 2 3 2 0 Total N/A ₤953.0 N/A Cost Savings No. Switches Periodicities N/A ηmax < 4 per day (X) |∆max |  10.0 cm (5) X2420052 X2420014 X2420075 X2410361 X2419963 X241998C X2450024 PILWTH NEWMRKT Util. Cost 100 % 41.7% 21.5% 41.7% 41.7% 26.8% 23.0% 36.0% 41.7% ₤179.1 ₤127.2 ₤51.48 ₤22.54 ₤22.54 ₤04.23 ₤15.21 ₤84.91 ₤177.6 #PS 0 28 26 3 3 48 56 116 3 N/A ₤684.8 N/A ₤268.2 (28.15%) ηmax  4 per day (5) |∆max |  10.0 cm (5) Util. Cost 79.2% 41.7% 37.5% 58.3% 41.7% 25.0% 37.5% 79.2% 12.5% ₤178.1 ₤127.2 ₤192.3 ₤39.41 ₤27.34 ₤05.69 ₤34.80 ₤236.3 ₤59.48 #PS 4 2 4 4 2 4 4 4 2 N/A ₤900.7 N/A ₤52.36 (5.49%) ηmax = 4 per day (X) |∆max | = 15.3 cm (5) Util. Cost 83.3% 37.5% 41.7% 12.5% 75.0% 25.0% 37.5% 75.0% 8.33% ₤183.5 ₤122.6 ₤173.7 ₤06.36 ₤47.81 ₤05.67 ₤27.53 ₤211.7 ₤32.89 #PS 4 4 4 4 4 2 2 4 2 N/A ₤821.8 N/A ₤131.29 (13.78%) ηmax = 4 per day (X) |∆max | = 10.3 cm (X) Figure 3: Pump flows over 24 hours for 4 operation scenarios. The results are obtained with EPANET using a simulation time step of 5 minutes. Figure 4: GA+ANN optimization results: (a) tank level difference between the two ends of cycle; (b) comparison of the energy consumptions; and (c) comparison of the energy costs. The post-processing results are generated with EPANET using a simulation time step of 1 hour. 8 Figure 5: Storage level variations over 24 hours for 4 operation scenarios. For GA+ANN results, both meta-model prediction and hydraulic model post-processing results are shown. The post-processing results are generated with EPANET using a simulation time step of 1 hour. and Ḡ = 0.1966, showing some violation of the periodicity constraints depicted in Fig. 4 (a), and less saving of ₤50 per day. Although this result after 5, 000 GA generations does not necessarily mean that no feasible solution exists for the latter case, nevertheless it shows that starting from non-optimal initial conditions of the existing operation introduces difficulties to the GA optimizer to find a feasible solution with significant cost reduction. This demonstrates the importance of a proper choice of the initial combination of tank levels that would be able to recover in 24 hours, and also explains some of the difficulties faced in the previous pump scheduling studies in Wu and Behandish (2012a,b). Fig. 5 compares the tank level variations for the four operation scenarios. For the GA+ANN solutions, both meta-model predictions (used within GA) and hydraulic model post-processing results are illustrated. The meta-model accuracy was validated with the accumulated errors of less than ±5cm per 24 hours, which is a significant improvement over the 20 − 30cm errors of earlier development (Behandish and Wu (2012) and Wu and Behandish (2012a,b)). It is observed that when the initial tank levels are confined to the existing operation values, the GA+ANN results do not deviate much from the existing operation over the first few hours. The solution with concurrent pump scheduling and storage optimization, on the other hand, utilizes a larger fraction of tank capacities and recovers all of the constrained tank levels to ±10cm of initial values. The saving of around 835KWH (₤130) per day corresponds to an annual saving of around 300MWH (₤480,000), which is significant for a DMZ system of this size. 6. Conclusions The study has demonstrated that in addition to the pump scheduling policy, the decisions on tank operation range can play a significant role in water distribution operation cost and storage utilization, and to guarantee the repeatability of the operation policy with predictable behavior over subsequent cycles. The GA+ANN algorithm is generalized to represent a wide range of complex systems and their requirements for pump and valve operation control, carried out concurrently with the optimization of tank operation ranges. Finally, the set of near-optimal tank levels obtained in this offline optimization with a typical demand profile can be useful information for the implementation of the real-time pump operation optimization. 9 References References EPA, Energy Efficiency for Water and Wastewater Utilities, URL water.epa.gov/infrastructure/sustain/energyefficiency. cfm, 2012. G. Mackle, G. A. Savic, G. A. Walters, Application of Genetic Algorithms to Pump SCheduling for Water Supply, in: 1st International Conference on Genetic Algorithms in Engineering Systems: Innovations and Applications (GALESIA), IET, 400–405, 1995. S. P. Beckwith, K. P. Wong, A Genetic Algorithm Approach for Electric Pump Scheduling in Water Supply Systems, in: IEEE International Conference on Evolutionary Computation, vol. 1, IEEE, 21, 1995. R. J. Engelbrecht, J. Haarhoff, Optimization of Variable-Speed Centrifugal Pump Operation with a Genetic Algorithm, in: The 3rd International Conference on Computer Methods and Water Resources (CMWR III), 1996. V. Nitivattananon, E. Sadowski, R. Quimpo, Optimization of Water Supply System Operation, Journal of Water Resources Planning and Management 122 (5) (1996) 374–384. W. B. F. De Schaetzen, D. A. Savic, G. A. Walters, A Genetic Algorithm Approach to Pump Scheduling in Water-Supply Systems, in: Hydroinformatics, vol. 98, 897–900, 1998. Z. Wu, P. Boulos, W. de Schaetzen, C.-H. Orr, M. Moore, M. Soft, Using Genetic Algorithms for Water Distribution System Optimization, in: Proceedings of the ASCE Environmental and Water Resources Institute’s (EWRI’s) World Water & Environmental Resource Congress, 20–24, 2001. V. Kelner, O. Léonard, Optimal Pump Scheduling for Water Supply Using Genetic Algorithms, in: International Congress on Evolutionary Methods for Design, Optimization and Control with Applications to Industrial Problems (EUROGEN), 2003. J. E. Van Zyl, D. A. Savic, G. A. Walters, Operational Optimization of Water Distribution Systems Using a Hybrid Genetic Algorithm, Journal of Water Resources Planning and Management 130 (2) (2004) 160–170. D. A. Savic, G. A. Walters, M. Schwab, Multiobjective Genetic Algorithms for Pump Scheduling in Water Supply, in: Evolutionary Computing Lecture Notes in Computer Science, vol. 1305, Springer, 227–235, 1997. A. Sotelo, C. von Lücken, B. Barán, Multiobjective Evolutionary Algorithms in Pump Scheduling Optimisation, in: Proceedings of the 3rd International Conference on Engineering Computational Technology, Civil-Comp press, 175–176, 2002. B. Barán, C. von Lücken, A. Sotelo, Multi-Objective Pump Scheduling Optimisation Using Evolutionary Strategies, Advances in Engineering Software 36 (1) (2005) 39–47. M. López-Ibáñez, T. Devi Prasad, B. Paechter, Multi-Objective Optimisation of the Pump Scheduling Problem Using SPEA2, in: IEEE Congress on Evolutionary Computation, vol. 1, IEEE, 435–442, 2005. J.-Y. Wang, T.-P. Chang, J.-S. Chen, An Enhanced Genetic Algorithm for Bi-Objective Pump Scheduling in Water Supply, Expert Systems with Applications 36 (7) (2009) 10249–10258. C. von Lücken, B. Barán, A. Sotelo, Pump Scheduling Optimization Using Asynchronous Parallel Evolutionary Algorithms, CLEI Electronic Journal 7 (2). Z. Y. Wu, Q. Zhu, Scalable Parallel Computing Framework for Pump Scheduling Optimization, in: World Water and Environmental Resource Congress, 2009. Z. Y. Wu, M. Behandish, Comparing Methods of Parallel Genetic Optimization for Pump Scheduling Using Hydraulic Model and GPU-Based ANN Meta-Model, in: 14th Water Distribution Systems Analysis Conference (WDSA), Engineers Australia, 1088, 2012a. Z. Y. Wu, M. Behandish, Real-Time Pump Scheduling Using Genetic Algorithm and Artificial Neural Network Based on Graphics Processing Unit, in: 14th Water Distribution Systems Analysis Conference (WDSA), Engineers Australia, 1088, 2012b. Z. Rao, F. Alvarruiz, Use of an Artificial Neural Network to Capture the Domain Knowledge of a Conventional Hydraulic Simulation Model, Journal of Hydroinformatics 9 (1) (2007) 15–24. D. R. Broad, G. C. Dandy, H. R. Maier, Water Distribution System Optimization Using Metamodels, Journal of Water Resources Planning and Management 131 (3) (2005) 172–180. E. E. Tabach, L. Lancelot, I. Shahrour, Y. Najjar, Use of Artificial Neural Network Simulation Metamodelling to Assess Groundwater Contamination in a Road Project, Mathematical and Computer Modelling 45 (7) (2007) 766–776. D. Jamieson, U. Shamir, F. Martinez, M. Franchini, Conceptual design of a Generic, Real-time, Near-Optimal Control System for Water-Distribution Networks, Journal of Hydroinformatics 9 (1) (2007) 3–14. Z. Rao, E. Salomons, Development of a Real-Time, Near-Optimal Control Process for Water-Distribution Networks, Journal of Hydroinformatics 9 (1) (2007) 25–37. E. Salomons, A. Goryashko, U. Shamir, Z. Rao, S. Alvisi, Optimizing the Operation of the Haifa-A Water-DistributionNetwork, Journal of Hydroinformatics 9 (1) (2007) 51–64. F. Martinez, V. Hernandez, J. Alonso, Z. Rao, S. Alvisi, Optimizing the Operation of the Valencia Water-Distribution Network, Journal of Hydroinformatics 9 (1) (2007) 65–78. U. Shamir, E. Salomons, Optimal Real-Time Operation of Urban Water Distribution Systems Using Reduced Models, Journal of Water Resources Planning and Management 134 (2) (2008) 181–185. M. Behandish, Z. Y. Wu, GPU-based Artificial Neural Network Configuration and Training for Water Distribution System Analysis, in: ASCE Annual World Environmental and Water Resources Congress, Albuquerque, NM, U.S.A., 2012. Z. Y. Wu, A. A. Eftekharian, Parallel Artificial Neural Network Using CUDA-Enabled GPU for Extracting Hydraulic Domain Knowledge of Large Water Distribution Systems, in: ASCE Annual World Environmental and Water Resources Congress, 2011. 10 M. Behandish, Z. Y. Wu, Generalized GPU-based Artificial Neural Network Surrogate Model for Extended Period Hydraulic Simulation, in: ASCE Annual World Environmental and Water Resources Congress, 2013. NVIDIA, CUDA C Programming Guide, URL docs.nvidia.com/cuda/pdf/CUDA_C_Programming_Guide.pdf, 2012. D. Mundo, H.-S. Yan, Kinematic Optimization of Ball-Screw Transmission Mechanisms, Mechanism and Machine Theory 42 (1) (2007) 34–47. Z. Y. Wu, K. Woodward, T. Allen, Pump scheduling study on a demand monitoring zone, in: International Conference on Computing and Control for Water Industry (CCWI), 2009. 11
9cs.NE
On sequential hypotheses testing via convex optimization Anatoli Juditsky ∗ Arkadi Nemirovski † April 12, 2018 arXiv:1412.1605v2 [math.ST] 24 Feb 2017 Abstract We propose a new approach to sequential testing which is an adaptive (on-line) extension of the (off-line) framework developed in [10]. It relies upon testing of pairs of hypotheses in the case where each hypothesis states that the vector of parameters underlying the distribution of observations belongs to a convex set. The nearly optimal under appropriate conditions test is yielded by a solution to an efficiently solvable convex optimization problem. The proposed methodology can be seen as a computationally friendly reformulation of the classical sequential testing. 1 Introduction Let ωi ∈ Ω, i = 1, 2, ... be a sequence of independent and identically distributed (iid) observations with a common density w.r.t. a given measure P on the observation space Ω, known to belong to a given parametric family {pµ (·) : µ ∈ M}. Assume that we are given a (finite) number I of subsets X i , 1 ≤ i ≤ I, of the parameter space M; these sets define hypotheses Hi on the density p(·) underlying our observation, Hj stating that the parameter of this density belongs to Hj : p(·) = pµ (·) with µ ∈ X i . We are interested in the problem of multiple testing of composite hypotheses: our goal is, given observations ωi to decide on the hypotheses H1 , ..., HI . When the size K of the observation ω K = (ω1 , ..., ωK ) is fixed, the performance of a test T K (·) – a measurable mapping of ΩK into {1, ..., I} – can be quantified by the maximal error probability of rejecting the true hypothesis: Risk(T K ) = max sup Probµ,K {ω K : T K (ω K ) 6= i} 1≤i≤I µ∈X i (1) where Probµ,K is the probability w.r.t. the distribution of the observation ω K corresponding to the “true” parameter µ ∈ M. Then the problem of optimal testing can be approached through minimization of the risk over the class of tests. Yet, in many practical applications, especially in those where observations come at a price, such approach may be too conservative. The sequential approach to testing, introduced in the pioneering papers of Barnard [2] and Wald [19, 20] is now a reach area of statistical theory and offers many strong results (see also ∗ LJK, Université Grenoble Alpes, B.P. 53, 38041 Grenoble Cedex 9, France, [email protected] Georgia Institute of Technology, Atlanta, Georgia 30332, USA, [email protected] Research of the first author was supported by the CNRS-Mastodons project GARGANTUA, and the LabEx PERSYVAL-Lab (ANR-11-LABX-0025). Research of the second author was supported by NSF grants CMMI1232623, CMMI-1262063, CCF-1415498. † 1 [8, 9, 1] for references or [13] for a recent review). For the problem of interest this approach can be summarized as follows: given an upper bound  of the risk the problem is reexamined sequentially, when new observations are available. The test terminates when either a decision with the risk ≤  is possible, or when maximal allowed observation count K is reached (in which case the test produces no decision). Usually, the sequential test is based on the Generalized Likelihood or Mixture Likelihood statistics, and its performance is evaluated by its asymptotical, as  → +0 and K → ∞. The approach we pursuit in this paper is of completely different spirit. It originates from [12] and was applied to the testing problem in [10] in the case where the size of the observation sample is fixed. The main “building block” of this approach is a construction, based on Convex Programming (and thus computationally efficient) allowing, under appropriate assumptions, to build a provably nearly optimal test for deciding, given observation ω K , between a pair of composite hypotheses of the sort H1 : µ ∈ X and H2 : µ ∈ Y where X and Y are convex compact subsets of M. This approach is applicable in several important situations, namely where (a) pµ is Gaussian density on Rn with expectation µ and fixed covariance matrix, (b) pµ is the distribution of the Poisson vector in Rm with independent components with parameters µi , and (c) is a distribution of a discrete random variable taking values in {1, ..., m} with µ ∈ R+ being the vector of probabilities of the corresponding distribution. As a compensation for rather restrictive assumptions on the families of densities pµ , the approach in question is extremely permissive as far the structure of the sets X and Y is concerned: what we require (apart from compactness and convexity) is the efficient tractability of X and Y . While the analytical expressions for the test characteristics are not available in the proposed approach, rather detailed information about performance guarantees of the resulting decisions can be obtained by efficient situation-oriented computation. In [10] we introduced a calculus of pairwise tests to design nearly optimal testing procedures in the situation where the sets X i corresponding to different hypotheses H i are unions of (not too large number of) convex sets with the risk of the test defined as in (1) (in the minimax setting).1 What follows can be seen as an adaptive version of the testing procedure from [10] – when the “true distribution” of observations corresponds to the value µ of the parameter which is “deeply inside” of some X i , the correct decision (Hi is accepted) can be taken much faster (using a smaller observation sample) than in the case of µ close to some “wrong” H i ’s. On the other hand, it is nothing but a “computationally friendly” application of the classical Sequential Analysis methodology to the problem in question. The paper is organized as follows. In section 2 we give a summary of the results of [10] on hypothesis testing in good observation schemes and discuss the construction of quasi-optimal “off-line” test. Then in section 3 we introduce the sequential problem setting and construct a generic test aggregation procedure which allows to reduce multiple testing to pairwise testing. Finally, in section 4 we consider in detail a particular implementation of the proposed approach and present some very preliminary simulation results. The proofs missing in the main body of the paper are postponed to the appendices. 1 It should be mentioned that what we call below “simple tests” were used to test composite hypotheses represented by convex sets in the white noise model (a) in [6, 7, 11] and in the distribution model (c) in [14, 15, 3, 4, 5, 16]. 2 2 Preliminaries What follows is the summary of the approach of [12] as applied to hypotheses testing; for detailed presentation of the constructions and results of this section, same as for the related proofs, see [10]. 2.1 Good observation schemes We start with introducing good observation schemes, those with which we intend to work. Recall that we are interested to make inferences from a random observation ω taking values in a given observation space Ω and obeying probability density w.r.t. a given measure P on Ω; this density is known to belong to a given parametric family {pµ (·) : µ ∈ M} of probability densities, taken w.r.t. P , on Ω. We intend to work under the following assumptions on our “observation environment:” 1. M ⊂ Rm is a convex set which coincides with its relative interior; 2. Ω is a Polish (i.e., separable complete metric) space equipped with a Borel σadditive σ-finite measure P , supp(P ) = Ω, and distributions Pµ ∈ P possess densities pµ (ω) w.r.t. P . We assume that • pµ (ω) is continuous in µ ∈ M, ω ∈ Ω and is positive; • the densities pµ (·) are “locally uniformly summable:” for every compact set R M M M ⊂ M, there exists a Borel function p (·) on Ω such that Ω p (ω)P (dω) < ∞ and pµ (ω) ≤ pM (ω) for all µ ∈ M , ω ∈ Ω; 3. We are given a finite-dimensional linear space F of continuous functions on Ω containing constants such that ln(pµ (·)/pν (·)) ∈ F whenever µ, ν ∈ M. Note that the latter assumption implies that distributions Pµ , µ ∈ M, belong to an exponential family.  R 4. For every φ ∈ F, the function Fφ (µ) = ln Ω exp{φ(ω)}pµ (ω)P (dω) is well defined and concave in µ ∈ M. In the just described situation, where assumptions 1-4 hold, we refer to the collection O = ((Ω, P ), {pµ (·) : µ ∈ M}, F) as good observation scheme (o.s.). 2.1.1 Basic examples Basic examples of good o.s.’s are as follows: Gaussian o.s. Here Ω = Rm , P is the Lebesque measure on Ω, M = Rm and pµ (ω) = N (µ, Im ) is the density of Gaussian random vector with the unit covariance matrix2 and expectation µ. The space F is comprised of all affine functions on Ω = Rm , and because Z  aT ω+b ln e pµ (ω)dω = b + aT µ + 21 aT a, Rm Gaussian o.s. is good. 2 of course, we could replace the unit covariance with any other positive definite covariance matrix, common for all distributions from the family in question 3 Poisson o.s. Here Ω = Zm + is the discrete set of m-dimensional vectors with nonnegative integer entries, P is the counting measure on Ω, M = Rm ++ is the set of positive m-dimensional vectors, and pµ (·), µ = [µ1 ; ...; µm ] > 0, is the probability distribution of a random vector ω = [ω1 ; ...; ωm ], where ωi is Poisson random variable with parameter µi , and with independent of each other ω1 , ..., ωm . The space F is comprised of all affine functions on Ω. Note that   m X X ln  exp(aT ω + b)pµ (ω) = (eai − 1)µi + b ω∈Zm + i=1 is concave in µ, and thus Poisson o.s. is good. Discrete o.s. Here Ω = {1, ..., m} is a finite set, P is a counting measure on Ω, and M is comprised of all non-vanishing probability densities taken w.r.t. P , that is, the parameter space M is comprised of all m-dimensional vectors µ = [µ1 ; ...; µm ] > 0 with entries summing up to 1, and the random variable ω distributed according to pµ (·) takes value ω ∈ Ω with probability µω . The space F is comprised of all real-valued functions on Ω = {1, ..., m}. Since for φ ∈ Rm , ! ! m X X φ(ω) φω ln e pµ (ω) = ln e µω ω=1 ω∈Ω is concave in µ ∈ M, the Discrete o.s. is good. We have seen that Gaussian, Poisson, and Discrete o.s.’s are good. More examples of good o.s.’s can be obtained by taking direct products. Direct products of good o.s.’s. Let Ot = ((Ωt , Pt ), {pµt ,t (·) : µt ∈ Mt }, Ft ), 1 ≤ t ≤ K, be good o.s.’s. We can associate with this collection a new o.s. – their direct product, which, informally, describes the situation where our observation is ω K = (ω1 , ..., ωK ), with ωt drawn, independently across t, from the o.s.’s Ot . Formally, the direct product is the o.s. OK =  (ΩK , P K ) = ( K Q Ωt , P K = P1 × .. × PK ), t=1 {pµK (ω1 , ..., ωK ) = pµ1 ,1 (ω1 )...pµK ,K (ωK ) : µK = [µ1 ; ...; µK ] ∈ MK = M1 × ... × MK }, PK F K = {f (ω1 , ..., ωK ) = t=1 ft (ωt ) : ft ∈ Ft , 1 ≤ t ≤ K} , and this o.s. turns to be good provided all factor Ot are so. Note that with this definition, the parameter µK underlying the distribution of observation ω K is the collection of parameters µt , t = 1, ..., K, underlying distributions of the components ω1 ,...,ωK of ω K . Now consider the special case of this construction where all factors Ot are identical to each other: Ot = ((Ω, P ), {pµ (·) : µ ∈ M}, F), 1 ≤ t ≤ K. In this case we can “shrink” the direct product OK of our K identical o.s.’s to the o.s. O(K) by passing to observations ω K = (ω1 , ..., ωK ) with ω1 , ..., ωK drawn, independently of each other, from the same density pµ (·), rather than being drawn from their own densities pµt ,t (·). The formal description of O(K) is as follows: • for O(K) , the observation space ΩK = Ω×...×Ω and the reference measure P K = P ×...×P are exactly the same as for OK ; 4 (K) • the family of probability densities {p(·)} for O(K) is {pµ (ω1 , ..., ωK ) = K Q pµ (ωt ) : µ ∈ t=1 M}; • the family F for O(K) is F (K) = {f (K) (ω1 , ..., ωK ) = f (ω1 ) + ... + f (ωK ) : f ∈ F}. Note that O(K) is a good o.s., provided O is so. We shall refer to the just defined O(K) as to stationary K-repeated observations associated with O. 2.2 Pairwise hypothesis testing Detectors and their risks. Let Ω be a Polish space and X1 , X2 be two nonempty sets of Borel probability distributions on Ω. Given a detector – a real-valued Borel function φ on Ω, we define the risk (φ|X1 , X2 ) of this detector w.r.t. (X1 , X2 ) as the smallest  such that R ΩRexp{−φ(ω)}p(dω) ≤  ∀p ∈ X1 , (2) Ω exp{φ(ω)}p(dω) ≤  ∀p ∈ X2 , The sets X1 , X2 give rise to two hypotheses, H1 , H2 , on the distribution of a random observation ω ∈ Ω, with Hχ stating that the distribution p(·) of this observation belongs to Xχ , χ = 1, 2, while a detector φ gives rise to the test Tφ which, given an observation ω, accepts H1 (and rejects H2 ) when φ(ω) ≥ 0, and rejects H1 (and accepts H2 ) otherwise. We define the risk of a test T deciding between H1 and H2 as a maximal p(·)-probability of the test rejecting the hypothesis Hχ , χ = 1, 2, when it is true: " # Risk = max sup p({ω : T (ω) = −1}), sup p({ω : T (ω) = 1}) , p(·)∈X1 p(·)∈X2 where T (ω) = 1 when the test T , as applied to observation ω, accepts H1 , and T (ω) = −1 otherwise. Clearly, the risk of the test Tφ associated with detector φ is ≤  := (φ|X1 , X2 ). Indeed, denoting by p(·) the distribution of the observation, when H1 is true, the test rejects this hypothesis when φ(ω) < 0, and p(·)-probability of this event, by the first inequality in (2) and due to the definition of  := (φ|X1 , X2 ), is at most ; when H2 is true, the test rejects H2 and accepts H1 when φ(ω) ≥ 0, and p(·)-probability of the latter event is ≤  due to the second inequality in (2). Note that if we have at our disposal a test, say T , which decides between H1 and H2 with the risk bounded with ¯ ∈ (0, 1/2), we can associate with it the detector   1 − ¯ 1 φ̄(ω) = 2 ln T (ω) ¯ One can easily see that the risk of φ̄(·) satisfies the bounds of (2) with p  = 2 ¯(1 − ¯). As we will see in an instant, tests associated with detectors satisfying (2) allow for a simple calculus – one can “propagate” the tests properties to the case of repeated observations and multiple testing. Our first goal is to describe a systematic construction of detectors satisfying (2) in the situation where the underlying o.s. is good. 5 Near-optimal tests. As far as testing pairs of hypotheses is concerned, the main result of [10] – and the starting point of our developments in this paper – is as follows: Theorem 1 [10, Theorem 2.1] Let O = ((Ω, P ), {pµ (·) : µ ∈ M}, F) be a good o.s., and let X1 , X2 be two nonempty convex compact subsets of M. Consider the optimization problem  Z q  ψ(µ, ν) := ln pµ (ω)pν (ω)P (dω) (3) Opt = Opt(X1 , X2 , O) := max µ∈X1 ,ν∈X2 Ω The function ψ(µ, ν) : M × M → R is concave and continuous, so that (3) is a convex optimization problem. This problem is solvable, and every optimal solution (µ∗ , ν∗ ) to this problem gives rise to the detector 1 φ(ω) = ln(pµ∗ (ω)/pν∗ (ω)) : Ω → R (4) 2 with the following properties: (i) [risk bound] Denoting by Xχ the set of all probability distributions on Ω with densities, w.r.t. P , of the form pµ (·) with µ ∈ Xχ , χ = 1, 2, the risk of the detector φ w.r.t. (X1 , X2 ) is (φ|O, X1 , X2 ) := ? (O, X1 , X2 ) = exp{Opt}; consequently, the risk of the test Tφ induced by the detector φ, when deciding on the hypotheses H1 , H2 associated with X1 , X2 , as at most exp{Opt}. (ii) [near-optimality] Assume that for some  ∈ (0, 1/4), “in the nature” there exists a test T (a deterministic Borel function T (ω) of ω ∈ Ω taking values 1 (“H1 accepted, H2 rejected”) and -1 (“H2 accepted, H1 rejected”) with risk in deciding on H1 , H2 based on an observation ω at most . Then √ ∗ (X1 , X2 ) ≤ 2 . We interpret (ii) as a statement of near-optimality of the test T defined in (i) – whenever the hypotheses H1 , H2 associated with X1 , X2 can be decided upon with small risk, the risk of our test Tφ also is small. Note that (ii) also suggests that (maximal) degradation of the test performance when passing from the optimal test to the near-optimal one associated with detector (4) may be significant in the setting of Theorem 1, when the decision is taken on the basis of one observation. When repeated observations are available, the sub-optimality of the proposed tests is expressed by a moderate absolute factor, when measured in terms of the length of the observation sample necessary to attain the desired testing accuracy. Corollary 1 [10, Proposition 2.1] Let O = ((Ω, P ), {pµ (·) : µ ∈ M}, F), X1 , X2 be as in Theorem 1, and K be a positive integer. Assume we have at our disposal stationary K-repeated observation ω K stemming from O, and let Hχ , χ = 1, 2, be the hypotheses on the density Q K stating that µ ∈ X . Then pµ (ω1 , ..., ωK ) = K χ t=1 pµ (ωt ) of ω (i) The optimal solution (µ∗ , ν∗ ) to the problem (3) associated with O, X1 , X2 , is optimal for the same problem associated with O(K) , X1 , X2 , and ? (O(K) , X1 , X2 ) = [? (O, X1 , X2 )]K ; moreover, the detectors φ and φ(K) associated with this optimal solution by Theorem 1 as applied to (O, X1 , X2 ) and (OK , X1 , X2 ), respectively, are linked by the relation φ(K) (ω1 , ..., ωK ) = K X t=1 6 φ(ωt ). (ii) Assume that for some  ∈ (0, 1/4) and some positive integer K̄, there exists a test which decides on the hypotheses H1 , H2 via stationary K̄-repeated observation ω K̄ with risk ≤ . Setting   2K̄ , K = Ceil  2 ln(2) 1 − ln(1/) we ensure that the risk of the test based on detector φ(K) (·) when deciding on the hypotheses Hχ , χ = 1, 2, is ≤  as well. Note that K/K̄ → 2 as  → +0. 2.3 Testing multiple hypotheses The completing “building block” from [10] we need is a simple technique for passing from pairwise tests to tests deciding on N ≥ 2 hypotheses. The situation we are interested in is as follows. We are given a Polish observation space Ω along N ≥ 2 nonempty families Xj , 1 ≤ j ≤ N , of Borel probability distributions on Ω, and have at our disposal pairwise detectors – real-valued Borel functions φij (ω) : Ω → R and risk bounds ij ∈ (0, 1], 1 ≤ i, j ≤ N , such that φ R ij (·) = −φji (·), ji = ij , 1 ≤ i, j ≤ N Ω exp{−φij (ω)}p(dω) ≤ ij ∀p(·) ∈ Xi , 1 ≤ i, j ≤ N. (5) Our goal is, given a positive integer K, to decide via stationary K-repeated observation ω K = M S (ω1 , ..., ωK ), with ω1 , ..., ωK drawn, independently of each other, from a distribution p(·) ∈ Xj , j=1 between hypotheses Hj , 1 ≤ j ≤ N , with Hj stating that p(·) ∈ Xj . Note that the present setting is a straightforward extension of the situation considered in section 2.2. In particular, given what was called in this section “a detector φ with (X1 , X2 )-risk ≤ ,” and setting φ1,2 = φ, φ2,1 = −φ, φ1,1 ≡ φ2,2 ≡ 0, 1,2 = 2,1 = , 1,1 = 2,2 = 1, we meet the requirements (5) corresponding to the case N = 2. Vice versa, given detectors and risks satisfying (5) for the case N = 2 and setting φ = φ1,2 ,  = 1,2 , we get a detector φ with (X1 , X2 )-risk ≤ . We are about to “aggregate” detectors φij into a testing procedure deciding on the hypotheses H1 , ..., HN via stationary K-repeated observations ω K . It makes sense to consider a slightly more general problem, specifically, as follows: assume that on the top of the setup data Xj , φij (·), ij , we are given an N × N symmetric (proximity) matrix C with zero-one entries and zero diagonal. We interpret the relation Cij = 0 as closeness of hypotheses Hi and Hj 3 , and we refer to indices i, j (and hypotheses Hi , Hj ) such that Cij = 0 as C-close. We expect our testing procedure not to reject the true hypothesis, while rejecting all hypotheses which are not not C-close to it. On the other hand, we do not care about distinguishing the true hypothesis from C-close alternatives. 3 In the general case considered in [10], the closeness (i.e., the zero-one matrix C with zero diagonal) not necessary is symmetric; here we restrict ourselves with symmetric closeness only. 7 The construction. set Given Xj , φij (·), ij satisfying (5) along with positive integer K, let us K φK ij (ω ) = K X (K) φij (ωt ), ij = K ij , t=1 and let XjK , j = 1, ..., N be a family of probability distributions of ω K = (ω1 , ..., ωK ) where ωt are i.i.d. with distribution p(·) ∈ Xj . Clearly, (5) implies that (K) (K) φK (·) = −φK ji (·), ji = ij , 1 ≤ i, j ≤ N R ij (K) K K K ∀p(·) ∈ XiK , 1 ≤ i, j ≤ N. ΩK exp{−φij (ω )}p(dω ) ≤ ij Now, let α = [αij ] be a skew-symmetric N × N matrix, and let K φij (ω K ) = φK ij (ω ) − αij . We associate with φ the test TK which, given observation ω K , builds the N × N matrix with the entries φij (ω K ) and accepts all hypotheses Hi which satisfy the condition φij (ω K ) > 0 ∀(j : Cij = 1), and rejects all remaining hypotheses. Note that TK can accept no hypotheses at all, or can accept more than one hypothesis. The properties of TK are summarized in the following simple statement (see [10, section 2.3.1]): Proposition 1 Let ε = max 1≤i≤N X K ij exp{−αij }. (6) j:Cij =1 Let ω K = (ω1 , ..., ωK ) be sampled independently from the distribution p∗ (·) ∈ Xi∗ , for some i∗ ∈ {1, ..., N }. Then the p∗ (·)-probability of the event “TK does not accept the true hypothesis Hi∗ or accepts a hypothesis Hi which is not C-close to Hi∗ ” is ≤ ε. The risk bound ε, as given by (6), depends on the “shifts” αij = −αji , and we would like to use the shifts resulting in as small as possible value of ε in (1). It is shown in [10, section 3] that the corresponding shifts solve the convex optimization problem     X T Opt = min f (α) = max K exp{α } : α = −α , (7) ij ij  1≤i≤N α∈RN ×N  j:Cij =1 the optimal ε in (6) being exactly Opt. Moreover, from [10, Proposition 3.3] it immediately follows (see below), that Opt is nothing but the spectral norm kDk2,2 of the entry-wise nonnegative symmetric matrix D = [dij = K ij Cij ]1≤i,j≤N . Moreover, it is immediately seen (cf. [10, section 3.2]) that if the Perron-Frobenius eigenvector g of the entrywise nonnegative symmetric matrix D is positive, an optimal solution to (7) is given by αij = ln(gj ) − ln(gi ). (8) 8 In the general case the Perron-Frobenius eigenvector of D can have zero entries, and, moreover, (7) may happen not to have optimal solutions at all; we, however, can easily find δ-optimal, with a whatever small δ > 0, solutions to the problem by utilizing in (8) in the role of g the Perron-Frobenius eigenvector of a matrix D0 with the entries d0ij > dij close to dij , specifically, such that kD0 k2,2 ≤ kDk2,2 + δ. In fact, Proposition 3.3 from [10] states that if E = [eij ] is a symmetric N × N matrix with zero diagonal and positive off-diagonal entries, then the optimal value in the optimization problem   N   X OptE = min max eij exp{αij } : α = −αT α 1≤i≤N  j=1 is equal to the spectral norm kEk2,2 . Let now eij = dij (= K ij Cij ) for 1 ≤ i, j ≤ N such that Cij = 1, and let eij = δ > 0 for i 6= j such that Cij = 0, so that all off-diagonal entries of E are positive. Note that when δ ↓ 0, both the spectral norms of kEk2,2 and kDk2,2 , and the optimal values Opt and OptE become arbitrarily close to each other. Since for the “perturbed” matrix E the spectral norm kEk2,2 coincides with the optimal value OptE , the same holds true for the “unperturbed” matrix D. 3 3.1 Sequential Hypothesis Testing Problem setting Let us consider the situation of section 2.3. Specifically, assume that we are given N ≥ 2 nonempty families Xj of Borel probability distributions on a Polish observation space Ω. Let, further, I [ J := {1, 2, ..., N } = Ji i=1 be a partition of the set of indicesSof Xj ’s into I ≥ 2 non-overlapping nonempty groups J1 , ..., JI . We associate with the sets X i = j∈Ji Xj the hypotheses Hi , stating that the elements ω1 , ..., ωK of the K-repeated stationary observation sample ω K are drawn independently from the common distribution p ∈ X i , and our goal is to decide from observation ω K on the hypotheses H1 , ..., HI . It is convenient to think about the (values of the) indices i = 1, ..., I of the sets X i as of the colors of these sets.4 We also assume that we have at our disposal pairwise detectors – Borel functions φij : Ω → R – for the sets Xj , j = 1, ..., N which satisfy relations (5). From now on, we make the following assumption: A: When the indices j and j 0 ∈ J are of different colors (in other words, do not belong to the same group Ji ), the risk jj 0 (= j 0 j ) of the detector φjj 0 (same as the detector φj 0 j ) satisfies jj 0 < 1. Note that assumption A implies that for j and j 0 of different colors the sets of distributions Xj and Xj 0 are at positive Hellinger distance from each other. This implies that our color 4 Let us agree that these colors are inherited by different entities associated with X i ’s such as index groups Ji , indices j ∈ Ji , corresponding sets Xj and distributions p ∈ X i . 9 assignments are unambiguous, and our goal may be reformulated as that of identifying the color of the distribution underlying the observations. From the results of section 2.3 it easily follows that if assumption A holds then for any given  > 0, we can decide on the hypotheses H1 , ..., HI with risk ≤  (meaning that the probability to reject the true hypothesis, same as the probability to accept a wrong one, is ≤ ), provided that the number K of observations is large enough. This being said, the “large enough” K could be indeed quite large if there are pairs j ∈ Ji , j 0 ∈ Ji0 , i 6= i0 , with close to 1 values of jj 0 . As a tradeoff, we can switch from decision rules based on K observations to sequential decision rules, for which the decision is made on the basis of on-line adjustable number of observations. We can expect that if we are lucky and the distribution p∗ underlying our observation is “deeply inside” of some X i∗ and thus is “far” from all X i , i 6= i∗ , the true hypothesis Hi∗ will be accepted much sooner than in the case when p∗ is close to some of “wrong” X i ’s. Our objective now is to build sequential tests utilizing the results of section 2. 3.2 Sequential test: construction The setup for our “generic” sequential test is given by 1. required risk  ∈ (0, 1); 2. positive integer S – number of stages, along with the following entities, defined for 1 ≤ s ≤ S and forming s-th component of the setup: P (a) positive reals s , 1 ≤ s ≤ S, such that Ss=1 s = ; ιS js (b) representations Xj = Xjιs , j ∈ J , where Xjιs are nonempty subsets of Xj ; ι=1 (c) tolerances δs ∈ (0, 1). To avoid messy notation, we enumerate, for every s ≤ S, the sets Xjιs , 1 ≤ j ≤ N, 1 ≤ ι ≤ ιjs , and call the resulting sets Z1s , ..., ZLs s . Thus, Zqs is one of the sets Xjιs , and we assign to Zqs and the index q the same color as that of j. Detectors. We suppose for every s ≤ S and every pair (q, q 0 ), 1 ≤ q, q 0 ≤ Ls , we are given pairwise detectors φqq0 ,s and reals qq0 ,s ∈ (0, 1] associated with Zqs and Zq0 s and satisfying the relations 0 φ R qq0 ,s (·) = −φq0 q,s (·), qq0 ,s = q0 q,s , 1 ≤ q, q ≤ Ls 0 0 0 Ω exp{−φqq ,s (ω)}p(dω) ≤ qq ,s ∀p(·) ∈ Zqs , 1 ≤ q, q ≤ Ls . s-closeness. Let Hqs be the hypotheses on the distribution p(·) of an observation stating p(·) ∈ Zqs ; by convention, Hqs is of the same color as Zqs . Let us say that hypothesis Hq0 s is s-close to hypothesis Hqs (same as q 0 is s-close to q), if either Hqs and Hq0 s are of the same color, or qq0 ,s > δs if they are of different colors. Let C = C s be the Ls × Ls matrix with (q, q 0 )-entry equal to 0 if and only if q is s-close to q 0 , and equal to 1 otherwise. This matrix clearly meets the requirements imposed on C in section 2.3: it is a symmetric matrix (recall that qq0 ,s = q0 q,s ) with 0/1 entries and zero diagonal. 10 Tests Ts . Now let us apply to the collection of hypotheses {Hqs : 1 ≤ q ≤ Ls }, detectors {φqq0 ,s (·) : 1 ≤ q, q 0 ≤ Ls } and the just defined matrix C s the construction from section 2.3, assuming that when deciding upon hypotheses H1s , ..., HLs s , we have at our disposal k-repeated observation ω k , with a given k. Specifically, consider the optimization problem       X k T Opt(k, s) = min fs (α) := max qq0 ,s exp{αqq0 } : α = −α ; (9) q  α∈RLs ×Ls    q 0 : C s 0 =1 qq as was shown in section 2.3, the value Opt(k, s) is nothing but the spectral norm of the entry-wise s . nonnegative symmetric matrix with the entries kqq0 ,s Cqq 0 s = 1, Opt(k, s) goes to 0 as k → ∞, so that the smallest Since qq0 ,s ≤ δs ∈ (0, 1) when Cqq 0 k = k(s) such that Opt(k, s) < s is well defined. And since Opt(k(s), s) < s , problem (9) with k = k(s), whether solvable or not, admits a feasible solution ᾱ(s) such that fs (ᾱ(s) ) ≤ s . (s) Applying to detectors φqq0 ,s (·) = φqq0 ,s (·) − ᾱqq0 and to C = C s the construction from section 2.3, we get a test Ts deciding on the hypotheses Hqs , 1 ≤ q ≤ Ls , via k(s)-repeated observation ω k(s) , with properties as follows: Let ω1 , ..., ωk(s) be drawn, independently of each other, from common distribution p∗ (·) obeying the hypothesis Hq∗ s for some 1 ≤ q∗ ≤ Ls . Then the p∗ (·)-probability of the event “Ts does not accept the true hypothesis Hq∗ s or accepts a hypothesis Hqs with q not s-close to i∗ ” is at most s . S-th setup component. We assume that when s = S, the partition of Xj is trivial: ιjS = 1 and Xj1S = Xj for all j ≤ N . Furthermore, we define K = k(S) such that δS ≥ qq0 ,S whenever q, q 0 are of different colors, implying that q and q 0 are S-close if and only if q and q 0 are of the same color.5 For the reasons which will become clear in a moment, we are not interested in those components of our setup for which k(s) > K; if components with this property were present in our original setup, we can just eliminate them, reducing S accordingly. Finally, we can reorder the components of our setup to make k(s) nondecreasing in s. Thus, from now on we assume that k(1) ≤ k(2) ≤ ... ≤ k(S) =: K. Sequential test T corresponding to the outlined setup when applied to the observation ω K works by stages s = 1, 2, ..., S: at stage s we apply test Ts to the initial fragment ω k(s) of ω K . If the outcome of the latter test is acceptance of a nonempty set of hypotheses Hqs and all these hypotheses are of the same color i, test T accepts the hypothesis Hi and terminates, otherwise it proceeds to stage s + 1 (when s < S) or terminates without accepting any hypothesis (s = S). Note that by construction T never accepts more than one of the hypotheses H1 , ..., HI . 3.3 Sequential test: analysis For a distribution p ∈ X = N S Xj , let s[p] ∈ {1, 2, ..., S} be defined as follows: for every s, p j=1 belongs to (perhaps, several) of the sets Zqs , 1 ≤ q ≤ Ls . Further, let Qs [p] be the set of all We can do so because by assumption A all quantities qq0 ,s , 1 ≤ q, q 0 ≤ LS = N , with q, q 0 of different colors are less than 1. 5 11 q’s such that p ∈ Zqs . Note that the color of every q ∈ Qs [p] (recall that the sets Zqs and the corresponding values of q have already been assigned colors) is the same as the color of p. Now, given p ∈ X , for some s ≤ S it may happen that ∃q ∈ Qs [p] : all q 0 s-close to q are of the same color as q. (10) In particular, the latter condition definitely takes place when s = S, since, as we have already seen, q and q 0 are S-close if and only if q and q 0 are of the same color. Hence for s = S the conclusion in (10) is satisfied for all q ∈ QS [p]. Now let s[p] be the smallest s such that (10) takes place, and let the corresponding q be denoted by q[p]. Thus for all p ∈ X , s[p] ∈ {1, 2, ..., S}, q[p] ∈ {1, ..., Ls[p] }, p ∈ Zq[p]s[p] ; whenever q 0 ∈ {1, ..., Ls[p] } is s[p]-close to q[p], q 0 and q[p] are of the same color. The main result of this section is as follows. Proposition 2 Let ω1 , ..., ωK be drawn, independently of each other, from a distribution p∗ ∈ S X (= N X ), so that p∗ ∈ Xj∗ for some j∗ ≤ N , and let i∗ be such that j∗ ∈ Ji∗ (i.e., i∗ is the j j=1 color of p∗ ). Then p∗ -probability of the event   T , as applied to ω K , terminates not later than at the stage s[p∗ ] K E= ω : and accepts upon termintation the true hypothesis Hi∗ is at least 1 − . 4 Implementing sequential test Observe that in order for the just described sequential test to recover the “non-sequential” test from section 2.3, it suffices to utilize setup with S = 1 (recall that our construction fully specifies the setup component with s = S). This being said, with our sequential test the running time (the number of observations used to make the inference) depends on the true distribution underlying the observations, and we can use several degrees of freedom in our setup in order to save on the number of observations when the true distribution is “deeply inside” the true hypothesis. We are about to illustrate some of the options available for the basic good o.s.’s presented in section 2.1. 4.1 Preliminaries Assume that our o.s. is either Gaussian, or Poisson, or Discrete, see section 2.1.1. We denote by n the dimension of the associated parameter vector µ: µ = [µ1 ; ...; µn ]. Assume that we are given the risk level  ∈ (0, 1) and a collection of J nonempty compact convex sets Xj ⊂ M painted in I ≥ 2 colors (i.e., the set of indices {1, ..., J} is split into I ≥ 2 non-overlapping nonempty sets J1 , ..., JI , i being the common color of all sets Xj , j ∈ Ji ). Sets Xj give rise to the sets Xj of probability distributions defined by the corresponding densities pµ (·), µ ∈ Xj . Note that for all considered o.s.’s different values of the parameter µ ∈ M correspond to different probability densities pµ . We assume that the sets Xj , Xj 0 of different colors do not intersect thus giving rise to non-intersecting sets of distributions Xj and Xj 0 . 12 Given this input, we intend to specify the setup for sequential test deciding on the associated hypotheses Hi , 1 ≤ i ≤ I. Let ψ(µ, ν) : M × M → R be the rate function Z q  ψ(µ, ν) = ln pµ (ω)pν (ω)P (dω) , Ω associated with the o.s. in question. An immediate computation shows that 2.3])  1 − νk22 , µ, ν ∈ M = Rn ,  − 8 kµ √ √ 1 Pn − 2 P `=1 ( µ` −  ν` )2 , µ, ν ∈ M = {x ∈ Rn : x > ψ(µ, ν) = P0}, √  n n n ln ω=1 µω νω , µ, ν ∈ M = {x ∈ R : x > 0, ω=1 xω = 1}, (cf. [10, section Gaussian case Poisson case Discrete case Theorem 1 states that for the considered o.s.’s, given two nonempty convex compact subsets X, Y of M and setting ΨXY = max ψ(µ, ν), µ∈X,ν∈Y the quantity exp{ΨXY } is exactly the risk of the detector φ(·) yielded by Theorem 1 as applied to X, Y and the o.s. in question. Besides this, ψ(µ, ν) clearly is a smooth concave and symmetric (ψ(µ, ν) = ψ(ν, µ)) function on its domain, and ψ(µ, ν) < 0 whenever µ 6= ν. For j ∈ {1, ..., J}, we set ψj (µ) = max ψ(µ, ν) : M → R. ν∈Xj Since ψ(µ, ν) is concave in µ, ν ∈ M, and Xj is a convex compact set, the functions ψj (·) are concave and continuous on M. Let now R be the set of all ordered pairs (j, j 0 ), 1 ≤ j, j 0 ≤ J, with j, j 0 of different colors; note that (j, j 0 ) ∈ R if and only if (j 0 , j) ∈ R. For a pair j, j 0 , 1 ≤ j, j 0 ≤ J, let ψjj 0 = ΨXj Xj 0 := max µ∈Xj ,ν∈Xj 0 ψ(µ, ν) = max ψj 0 (µ). µ∈Xj (11) Note that for (j, j 0 ) ∈ R the convex compact sets Xj , Xj 0 do not intersect, thus ψjj 0 < 0, and the objective in the optimization problem on the right hand side of (11) is negative on the compact feasible set of the problem. We set d = min [−ψjj 0 ], (j,j 0 )∈R (12) so that d > 0. Finally, for (j, j 0 ) ∈ R and a nonnegative r we say that a linear inequality `(µ) ≤ 0, µ ∈ M, defines a (jj 0 r)-cut if for all µ ∈ Xj such that `(µ) ≤ 0, ψjj 0 (µ) ≤ −r. Example: default cuts. For (j, j 0 ) ∈ R, let (µjj 0 , νjj 0 ) be (µ, ν)-components of an optimal solution to the optimization problem (11). Setting ejj 0 = ∇µ ψ(µjj 0 , νjj 0 ), fjj 0 = ∇ν ψ(µjj 0 , νjj 0 ), (j, j 0 ) ∈ R, 13 and invoking optimality conditions for (11) along with concavity of ψ(·, ·), we get for all (j, j 0 ) ∈ R:  T (a)  ejj 0 [µ − µjj 0 ] ≤ 0, T f 0 [ν − νjj 0 ] ≤ 0, (b) ∀(µ ∈ Xj , ν ∈ Xj 0 ) : (13)  jj T T 0 0 0 ψ(µ, ν) ≤ ψjj + ejj 0 [µ − µjj ] + fjj 0 [ν − νjj ]. (c) We conclude that setting `jj 0 (µ) = ψ(µjj 0 , νjj 0 ) + eTjj 0 (µ − µjj 0 ) − r, we get an affine function of µ ∈ M which upper-bounds ψjj 0 (·) − r on Xj . Indeed, for any ν ∈ Xj 0 , µ ∈ Xj ψ(µ, ν) ≤ ≤ T ψ(µjj 0 , νjj 0 ) + eTjj 0 (µ − µjj 0 ) + fjj 0 (ν − νjj 0 ) ψ(µjj 0 , νjj 0 ) + eTjj 0 (µ − µjj 0 ) (we have used (13.c,b)). Taking in the resulting inequality the supremum over ν ∈ Xj 0 , we arrive at `jj 0 (µ) ≥ ψj 0 (µ) − r, µ ∈ Xj . The bottom line is that `jj 0 (µ) ≤ 0 is a (jj 0 r)-cut; we shall refer to this cut as default. Default cuts: refinement in Gaussian case. As it will become clear from the sequel, for our purposes the larger is the set {µ ∈ Xj : `(µ) ≤ 0}, the better is (jj 0 r)-cut `(µ) ≤ 0. It is immediately seen that in the Gaussian case the default cuts as defined above can be easily improved. Indeed, let Gaussian case take place, and let (j, j 0 ) ∈ R. In this case, in the above notation we have ψ(µ, ν) = − 18 kµ − νk22 , (ajj 0 , bjj 0 ) is a pair of k · k2 -closest to each other points in Xj and Xj 0 , ejj 0 = − 41 (ajj 0 − bjj 0 ) is nonzero and separates Xj and Xj 0 : 1 2 ∀(µ ∈ Xj , ν ∈ Xj 0 ) : eTij (µ − ν) ≤ eTij (ajj 0 − b0jj ) = − δjj 0 , δjj 0 = kajj 0 − bjj 0 k2 , 4 whence, setting ηjj 0 = −ejj 0 /kejj 0 k2 , ψj 0 (µ) = − 1 1 2 T T min kµ − νk22 ≤ − min |ηjj 0 [µ − ν]| & (∀µ ∈ Xj ) : ηjj 0 (µ − ajj 0 ) ≥ 0. 8 ν∈Xj 0 8 ν∈Xj 0 (14) It follows that µ ∈ Xj ⇒ ψj 0 (µ) ≤ − 2 1 1 T T 2 min |ηjj ηjj 0 (µ − ajj 0 ) +δjj 0 , 0 [µ − ν]| = − 8 ν∈Xj 0 8 | {z } ≥0 implying that the linear inequality √ T `jj 0 r (µ) := 2 2r − δjj 0 − ηjj 0 (µ − ajj 0 ) ≤ 0 (15) is a (jj 0 r)-cut. On the other hand, the default (jj 0 r) cat as defined by our general construction in Gaussian case is δjj 0 T 1 2 r − δjj η 0 (µ − ajj 0 ) ≤ 0. 0 − 8 4 jj T (µ − a 0 ) ≥ 0}, it is Taking into account that, as we have already mentioned, Xj ⊂ {µ : ηjj 0 jj immediately seen that the validity of the latter inequality at µ ∈ Xj implies the validity of (15), that is, the default cut cuts off Xj a smaller set than the cut (15). By this reason, from now on, when in the Gaussian case, we refer to the (jj 0 r)-cut (15) as to the default one. 14 4.2 Specifying the setup The setup for our sequential test is as follows. 1. We select a sequence of positive integers {k̄(s)}∞ s=1 satisfying k̄(1) = 1, k̄(s) < k̄(s + 1) ≤ 2k̄(s), s = 1, 2, ... and specify S as the smallest positive integer such that  k̄(S) > d−1 ln SJ 2 / ; (16) (17) (S is well defined due to k̄(s) ≥ s). For 1 ≤ s ≤ S, we set s = r(s) = k̄(s)−1 ln(SJ 2 /), δs = exp{−r(s)}.  S, (18) 2. For every j ∈ {1, ..., J} and every s ∈ {1, ..., S}, we specify closed convex subsets Xjιs , 1 ≤ ι ≤ ιjs , of Xj as follows. For every pair (j, j 0 ) ∈ R, we select somehow a (jj 0 r(s))-cut `jj 0 s (·) ≤ 0 and set 0 j Xjs = {µ ∈ Xj : `jj 0 s (µ) ≥ 0}, j 0 ∈ J j , j Xjs = {µ ∈ Xj : `jj 0 s (µ) ≤ 0, j 0 ∈ J j }, (19) where for 1 ≤ j ≤ J the set J j contains all indices 1 ≤ j 0 ≤ J of the color different from that of j. Eliminating form this list all sets which are empty, we end up with a number ιjs ≤ J of nonempty convex compact sets Xjιs , 1 ≤ ι ≤ ιjs , with Xj being their union. Observe that r(S) < d by (17), and for (j, j 0 ) ∈ R we clearly have max ψj 0 (µ) = ψjj 0 ≤ max ψjj 0 = −d (j,j 0 )∈R µ∈Xj implying that affine functions `jj 0 S (µ) ≡ −1 specify legitimate (jj 0 r(S))-cuts. These are exactly the cuts we use when s = S. Let us agree that for a subset of the parameter space M denoted by a capital Latin letter, the script version of the letter denotes the set of all densities pµ with parameters µ from the original set; e.g., if A denotes a subset of M, then A = {pµ : µ ∈ A}. This agreement works in both directions: if, say, A is a subset of {pµ : µ ∈ M }, then A = {µ ∈ M : pµ ∈ A}. With this j0 j j0 j convention, the above sets Xjs , j ∈ J j , Xjs , Xjιs give rise to families Xjs , j ∈ J j , Xjs , Xjιs of probability distributions on Ω; these families (and densities from the families) inherit colors from their indices j. We claim that the resulting entities form a legitimate setup for a sequential test. All we need in order to justify this claim is to verify that the S-component of our setup is as required, that is, that (a) for every j ∈ {1, ..., J}, ιjS = 1, whence Xj1S = Xj and LS = J, and that (b) q, q 0 ∈ {1, ..., LS } (recall that LS = J) are S-close if and only if q and q 0 are of the same color. 15 0 j To verify (a), note that `jj 0 S (·) ≡ −1 whenever (j, j 0 ) ∈ R, implying that XjS = ∅ when j 0 j ∈ J j and XjS = Xj , as claimed in (a). To verify (b), note that as it was already mentioned, for j, j 0 of different colors, the risk of the detector yielded by Theorem 1 as applied to the sets X = Xj , Y = Xj 0 , is exp{ψjj 0 }, that is, this risk is ≤ exp{−d}. Invoking the already verified (a), we conclude that qq0 ,S ≤ exp{−d} whenever 1 ≤ q, q 0 ≤ LS = J and q, q 0 are of different colors. As we have seen, r(S) < d, whence δS = exp{−r(S)} > exp{−d}. The bottom line is that whenever 1 ≤ q, q 0 ≤ J and q, q 0 are of different colors, we have qq0 ,S < δS ; this observation combines with the definition of S-closeness to imply that q, q 0 are S-close if and only if q, q 0 are of different colors, as claimed in (b). The legitimate setup we have presented induces a sequential test, let it be denoted by T . We are about to analyse the properties of this test. 4.3 Analysis Our first observation is that for the sequential setup we have presented one has k(s) ≤ k̄(s), 1 ≤ s ≤ S. To verify this claim, we need to check that when k = k̄(s), we have Opt(k, s) < s =  . S As we have already mentioned (see the comment after the definition (9) of Opt(·, ·)), Opt(k, s) is the spectral norm of the entrywise nonnegative symmetric matrix Dks of the size Ls × Ls with entries not exceeding δsk . Since, by construction, Ls ≤ J 2 and the diagonal of D is zero, the spectral norm of Dks does not exceed (J 2 − 1)δsk . The latter quantity indeed is < s when k = k̄(s), see (18). Worst-case performance. In the analysis to follow, we assume that  ∈ (0, 14 ). By Proposition 2, the sequential test T always accepts at most one of the hypotheses H1 , ..., HI , and the probability not to accept the true hypothesis is at most ; moreover, the number of observations used by T never exceeds k(S) ≤ K := k̄(S). On the other hand, from the definition (12) of d and Corollary 1 it follows that in order for a whatever test to decide on the hypotheses H1 , ..., HI with risk  via stationary repeated observations, the size of the observation sample should be at least6 1  ln(1/) + 2 ln(1/) − ln(2) ln(1/) K = ≥ . (20) ln(1/) d 4d As a result, unless d is “astronomically small”, K is within logarithmic factor of K + , implying quasi-optimal worst-case performance of the test T . The precise statement is as follows: Proposition 3 Let d > 0, J ≥ 2 and  ∈ (0, 41 ) satisfy, for some κ ≥ 1, the relation Then ln(1/d) ≤ κ ln(J 2 /). (21)  κ ln(J 2 /) K ≤ max 1, 5 . d (22)  6 Indeed, this is exactly the smallest number of observations which is necessary, according to Corollary 1, to separate with the risk ≤  the pair of hypotheses corresponding to (j, j 0 ) ∈ R for which ψjj 0 = −d. 16 For proof, see the appendix. For all practical purposes we can assume that d ≥ 10−6 , otherwise the lower bound K + on the number of observations required by (1 − )-reliable test would be impractically large. Assuming d ≥ 10−6 , (21) is satisfied with κ = 5 (recall that  ≤ 41 and J ≥ 2). Thus, for all practical purposes we may treat the quantity κ from the premise of Proposition 3 as a moderate absolute constant, implying that the upper bound K on the worst-case observation time of our (1 − )-reliable sequential test T indeed is within a logarithmic factor O(1) ln(J/) ln(1/) of the lower + bound K on the worst-case observation time of an “ideal” (1 − )-reliable test. Remark 1 It is easily seen that when k̄(s) grows with s as rapidly as allowed by (16): k̄(s) = 2s−1 , the result completely similar to the one of Proposition 3 holds true in a much wider than (21) range of values of d, specifically, in the range ln(1/d) ≤ CJ 2 /, for a whatever constant 2 C ≥ 1; and in this range, one has K ≤ C 0 max[1, ln(Jd /) ], with C 0 depending solely on C. S Actual performance. For µ ∈ X := Jj=1 Xj let s∗ (µ) be the smallest s ≤ S such that for j some j ≤ J it holds µ ∈ Xjs (see (19)). Equivalently:  s∗ (µ) = min s : ∃j ≤ J : µ ∈ Xj & `jj 0 s (µ) ≤ 0 ∀j 0 ∈ J j . (23) 0 j = ∅ whenever j 0 ∈ J j , so that Note that s∗ (µ) is well defined – we have already seen that XjS s = S is feasible for the right hand side problem in (23). S Recall that in Section 3.3 we have associated with a distribution p ∈ j Xj a set of indices Qs [p], 1 ≤ s ≤ S, and indices s[p] and S q[p]. Now S we are in the situation where there is one-to-one correspondence µ 7→ pµ between j Xj and j Xj ; with this in mind (and allowing for slight abuse of notation), in what follows we S set s[µ] = s[pµ ], q[µ] = q[pµ ], Qs [µ] = Qs [pµ ]. In other words, by construction, for µ ∈ X := j Xj , Qs [µ] is the set of indices q of those of the sets Zqs (the latter sets are obtained by linear ordering of the Ls sets Xjιs ) which contain µ, s[µ] is the smallest s such that for some q ∈ Qs [µ], all q 0 ≤ Ls which are s-close to q are of the same color as the one of q, and the latter property is shared by q[µ] ∈ Qs[µ] [µ]. Proposition 4 One has s[µ] ≤ s∗ (µ). S Assume that the observations are drawn from density pµ (·), µ ∈ j Xj . By Proposition 2, with pµ -probability ≥ 1 −  our sequential test T terminates in no more than s[µ] ≤ s∗ (µ) steps and upon termination recovers correctly the color i[µ] of µ (i.e., accepts the true hypothesis Hi[µ] , and only this hypothesis). Thus, if µ is “deeply inside” one of the sets Xj , meaning that s∗ (µ) is much smaller than S, our sequential test will, with reliability 1 − , identify correctly the true hypothesis Hi[µ] much faster than in S stages. 4.4 Selecting the cuts Defining the cuts `jj 0 s (·) is one of principal “degrees of freedom” of the just described construcj0 tion. Informally speaking, we would like these cuts to result in as small sets Xjs , j0 ∈ J j as possible, thus increasing chances for the probability density underlying our observations to j belong to Xjs for a small value of s (such a value, as we remember, with probability 1 −  upper-bounds the number of stages before termination). Thus, to improve over the basic option 17 represented by the default cuts one may look, for instance, for cuts which minimize, given s j0 and (j, j 0 ) ∈ R, the mj -dimensional volume of the set Xjs , where mj is the dimension of Xj . Setting m = mj , X = Xj and Y = {x ∈ X : ψj 0 (x) ≥ −r(s)}, this goal boils down to solving the following geometric problem: (*): Given a convex compact set X ⊂ Rm with a nonempty interior and a nonempty convex compact subset Y of X, find an affine function `(x) such that the linear inequality `(x) ≥ 0 is valid on Y and minimizes, under this requirement, the average linear size  1/m Size(X`(·) ) := mesm (X`(·) ) of the set X`(·) = {x ∈ X : `(x) ≥ 0}. Problem (*) seems to be heavily computationally intractable. We are about to present a crude suboptimal solution to (*). We can assume w.l.o.g. that Y intersects with the interior of X.7 Let us equip X with a ϑ-selfconcordant barrier F (·).8 Then the minimizer x̄ of F on Y is uniquely defined, belongs to int X and can be found efficiently by solving the (solvable) convex optimization problem minx∈Y F (x). ¯ By optimality conditions for the latter problem, the affine function `(x) = h∇F (x̄), x − x̄i is nonnegative on Y and thus is a feasible solution to (*). Further, from the basic facts of the theory of self-concordant barriers it follows that A. The Dikin ellipsoid of F at x̄ – the set D = {x ∈ X : hx − x̄, ∇2 F (x̄)[x − x̄]i ≤ 1} – is contained in X; 9 B. The set X`(·) ¯ = {x ∈ X : hx − x̄, ∇F (x̄)i ≥ 0} is contained in the set √ D+ = {x ∈ Rm : hx − x̄, ∇2 F (x̄)[x − x̄]i ≤ ρ2 := (ϑ + 2 ϑ)2 , hx − x̄, ∇F (x̄)i ≥ 0}. From B it follows that + 0 0 Size(X`(·) ¯ ) ≤ Size(D ) = ρSize(D ), D = {x ∈ D : hx − x̄, ∇F (x̄)i ≥ 0}. (24) On the other hand, if `(·) is a feasible solution to (*), then the set X`(·) contains Y and thus contains x̄, implying that `(x̄) ≥ 0. Consequently, by A we have D̄ := {x ∈ D : `(x) ≥ 0} ⊂ {x ∈ X : `(x) ≥ 0} = X`(·) , whence Size(X`(·) ) ≥ Size(D̄). 7 Indeed, otherwise we can specify `(·) as an affine function separating Y and X, so that `(x) ≥ 0 when x ∈ Y and `(x) ≤ 0 on X and `(·) is nonconstant on X. Clearly, `(·) is a feasible solution to (*) with Size(X`(·) ) = 0. 8 That is, F is a three times continuously differentiable strictly convex function on int X which is an interior penalty for X (i.e., diverges to +∞ along every sequence of interior points of X converging to a boundary point of X), and, in addition, satisfies specific differential inequalities; for precise definition and related facts to be used in the sequel, see [18]. A reader will not lose much when assuming that X is a convex P compact set given by a strictly feasible system fi (x) ≤ bi , 1 ≤ i ≤ m, of convex quadratic inequalities, F (x) = − m i=1 ln(bi − fi (x)) and ϑ = m. √ √ 9 What is ϑ + 2 ϑ below is 3ϑ in [18]; refinement 3ϑ → ϑ + 2 ϑ is due to F. Jarre, see [17, Lemma 3.2.1]. 18 Since `(x̄) ≥ 0 and `(·) is affine, we have D̄ ⊃ D00 := {x ∈ D : `(x) ≥ `(x̄)}, and the mdimensional volume of D00 is at least half of the m-dimensional volume of D0 (since every one of the sets D00 , D0 is either the entire ellipsoid D, or is the intersection of D with half-space with the boundary hyperplane passing through the center of D). It follows that Size(D̄) ≥ Size(D00 ) ≥ 2−1/m Size(D0 ). Thus, for every feasible solution `(·) to (*) it holds Size(X`(·) ) ≥ Size(D̄) ≥ 2−1/m Size(D0 ) ≥ 2−1/m ρ−1 Size(X`(·) ¯ ), ¯ to (*) (which can be where the concluding ≥ is due to (24). We see that the feasible solution `(·) √ 1/m 1/m found efficiently) is optimal within the factor 2 ρ=2 [ϑ + 2 ϑ]. This factor is moderate when X is an ellipsoid (or the intersection of O(1) ellipsoids), and can be unpleasantly large when ϑ is large. However, this is the best known to us computationally tractable approximation to the optimal solution to (*). 4.5 Application in the Gaussian case Comparing cut policies. To get impression on the effect of different cut policies (default cuts vs. cuts based on self-concordant barriers), consider the Gaussian case with J = 2, X1 = {x ∈ Rn : δ ≤ x1 ≤ 1 + δ, 0 ≤ xi ≤ 1, 2 ≤ i ≤ n}, X2 = {x ∈ Rn : −1 ≤ xi ≤ 0, 1 ≤ i ≤ n}, I1 = {1}, J2 = {2} (i.e., color of X1 is 1, and color of X2 is 2), and let k̄(s) = 2s−1 , s = 1, 2, .... We have   P ψ(µ, ν) = − 18 kµ − νk22 , ψ1 (ν) = − 18 (ν1 − δ)2 + ni=2 νi2 , ψ2 (µ) = − 81 kµk22 ; 2 ψ1,2 = ψ2,1 = − 81 δ 2 , d := min[−ψ1,2 , −ψ2,1 ] = δ8 ; a1,2 = b2,1 = e := [1; 0; ...; 0], b1,2 = a2,1 = 0 ∈ Rn , e1,2 = f2,1 = e, f1,2 = e2,1 = 0. Further, 2 ln(4S/) , 1 ≤ s ≤ S, 2s where  is the target risk, and S is the smallest positive integer such that r(S) as given by the 2 above formula is < χ = δ8 Now, the default cuts are (see (15)) √ (1, 2, r) : `1,2,r (µ) := −µ1 + 2 2r√≤ 0 (2, 1, r) : `2,1,r (ν) := −δ + ν1 + 2 2r ≤ 0 r(s) = and the sets Zqs associated with the default cuts are: ( p 1 = {µ : max[δ, 2 2r(s)] ≤ µ ≤ 1 + δ & 0 ≤ µ ≤ 1, 2 ≤ i ≤ n}, Z1s = X1,s 1 i p color # 1: 2 Z = X1,s = {µ : δ ≤ µ1 ≤ 2 2r(s) & 0 ≤ mui ≤ 1, 2 ≤ i ≤ n}; ( 2s p 2 = {ν : −1 ≤ ν ≤ min[0, δ − 2 2r(s)] & − 1 ≤ ν ≤ 0, 2 ≤ i ≤ n}, Z3s = X2,s 1 i p . color # 2: 1 = {ν : δ − 2 2r(s) ≤ ν ≤ 0 & − 1 ≤ ν ≤ 0, 2 ≤ i ≤ n}. Z4s = X2,s 1 i The “good” sets here are Z1s and Z3s , meaning that if a single observation is distributed according to N (µ, Id ) with µ belonging to Z1s or Z3s , our sequential test T with probability at least 19 Figure 1: X1 , X2 (blue squares) and cuts (red – default, magenta – smart) for s = 11 [n = 2,  = 0.01, δ = 0.1, S = 14, r(11) = 0.0092]. cuts default smart n=2 0.32 3.8e-2 n=3 0.32 7.6e-3 n=4 0.32 1.4e-3 n=5 0.32 2.2e-4 n=6 0.32 3.4e-5 n = 20 0.32 <1.3e-18 Table 1: n-dimensional volumes of “bad” sets Zqs for s = 11 [ = 0.01, δ = 0.1, S = 14, r(11) = 0.0092]. 1 −  terminates in course of the first s stages with correct conclusion on the color of µ. We see also that when δ  1 and s is “moderate,” meaning that r(s)  δ 2 , the bad sets Z2s , Z4s , in p terms of their n-dimensional volume, form O(1) r(s)-fractions of the respective boxes X1 , X2 , provided default cuts are used. When using “smart” cuts – those induced by self-concordant barriers for X1 , X2 – it is immediately seen that in the range 1  δ  r(s)  δ 2 (what exactly  means, depends on n), the bad sets Z2s and Z4s become simplexes: p Pn ci λi ≤ r(s)n}, Z2s = {µ = [δ; 0; ...; 0] + [λ1 ; ...; λn ] : λ ≥ 0, p i=1 P Z4s = {ν = −[λ1 ; ...; λn ] : λ ≥ 0, ni=1 ci λi ≤ r(s)n}, where ci = ci (n, s) are of order of 1; the good sets Z1s , Z3s are the closures of the complements of these simplexes to the respective boxes X1 , X2 . The new bad sets are much smaller than p the old ones; e.g., their volumes are of order of rn/2 (s) – much smaller than the volumes O( r(s)) of the old bad sets, see Figure 1 and Table 1. Upper bounding s[µ]. In Gaussian case with default cuts, the quantity s∗ (µ) which, as we have just seen, is a (1 − )-reliable upper bound on the number of stages in which T recognizes (1 − )-reliably the true hypothesis Hi[µ] provided the observations are drawn from pµ (·), admits a transparent geometric upper bound. Observe, first, that in Gaussian case we have χ= 1 min min ka − bk22 . 8 (j,j 0 )∈R a∈Xj ,b∈Xj 0 20 (25) Now let ρ(µ) be the largest ρ such the k · k2 -ball of radius ρ centered at µ is contained in certain Xj . We claim that p p s[µ] ≤ s∗ (µ) ≤ s̄(µ) := min{s ≤ S : 2 2r(s) ≤ 2 2χ + ρ(µ)}, (26) meaning that the deeper µ is “inside” one of Xj (the larger is ρ(µ)), the smaller is the number of observations needed for T to identify correctly the color of µ. Justification of (26) is as follows. The first inequality in (26) has already been proved. To prove the second inequality, observe, first, that s̄ := s̄(µ) is well defined (indeed, as we have seen, r(S) < χ). Let j be such that the k · k2 -ball B of radius ρ(µ) centered at µ is contained in Xj , and let j 0 ∈ Jjo . In the notation from the description of the Gaussian case default T 0 0 0 cuts we have, by (14), ηjj 0 [µ − aj∗ j ] ≥ 0 for all µ ∈ Xj and thus for all µ ∈ B, and therefore T ηjj 0 [µ − ajj 0 ] ≥ ρ(µ), since by construction kηjj 0 k2 = 1. Further, δjj 0 is the k · k2 -distance √ between Xj and Xj 0 , whence δjj 0 ≥ 2 2χ due to (25) combined with j 0 ∈ Cjo . Thus, p T ∀(j 0 ∈ Jjo ) : δjj 0 + ηjj 2χ + ρ(µ). 0 (µ − ajj 0 ) ≥ 2 (27) Invoking the definition of s̄ := s̄(µ) and the description (15) of (jj 0 r(s̄))-cuts, we conclude from (27) that µ indeed satisfies all these cuts and therefore µ ∈ Xjjs̄ , that is, s∗ (µ) ≤ s̄ (recall the definition of s∗ (µ)), as claimed. Numerical illustration. The following numerical experiment highlights the power of sequential testing in the Gaussian case with default cuts. In this experiment, we are given J = 4 sets Xj ⊂ R2 ; X1 is the square {0.01 ≤ x1 , x2 ≤ 1}, X2 , X3 , X4 are obtained from X1 by reflections w.r.t. the coordinate axes and the origin. The partition of the index set into groups Ji is trivial – these groups are the elements of J = {1, 2, 3, 4}, so that our goal is to recognize which of the sets Xj contains the mean µ of the observation. Figure 2 presents the graph of the logarithm of the 0.99-reliable upper bound on the number of observations used by the sequential test with S = 20, k̄(s) = 2s−1 and d = 5.0e−5 as a function of the mean µ of the observation. We see that the savings from sequential testing are quite significant. The related numbers are as follows: 4 S when selecting µ in Xj at random according to the uniform distribution, the empirical averj=1 age of the number of observations before termination is as large as 1.6 · 105 , reflecting the fact that Xj are pretty close to each other. At the same time, the median number of observations before termination is just 154, reflecting the fact that in our experiment µ, with reasonably high probability, indeed is “deeply inside” the set Xj containing µ. References [1] R. Bakeman. Observing interaction: An introduction to sequential analysis. Cambridge University Press, 1997. [2] G. A. Barnard. Sequential tests in industrial statistics. Supplement to the Journal of the Royal Statistical Society, pages 1–26, 1946. [3] L. Birgé. Approximation dans les spaces métriques et théorie de l’estimation: inégalités de Cràmer-Chernoff et théorie asymptotique des tests. PhD thesis, Université Paris VII, 1980. 21 Figure 2: “Power” of sequential test, Gaussian case. Left display: sets X1 , X2 , X3 , X4 ; right 4 S display: ln(k(s∗ (µ))) as a function of µ ∈ Xi ,  = 0.01. i=1 [4] L. Birgé. Sur un théorème de minimax et son application aux tests. Probab. Math. Stat., 3:259–282, 1982. [5] L. Birgé. Robust testing for independent non identically distributed variables and Markov chains. In Specifying Statistical Models, pages 134–162. Springer, 1983. [6] M. Burnashev. On the minimax detection of an imperfectly known signal in a white noise background. Theory Probab. Appl., 24:107–119, 1979. [7] M. Burnashev. Discrimination of hypotheses for gaussian measures and a geometric characterization of the gaussian distribution. Math. Notes, 32:757–761, 1982. [8] H. Chernoff. Sequential analysis and optimal design, volume 8. Siam, 1972. [9] B. K. Ghosh. A brief history of sequential analysis. Handbook of Sequential Analysis, pages 1–19, 1991. [10] A. Goldenshluger, A. Juditski, and A. Nemirovski. Hypothesis testing by convex optimization. arXiv preprint arXiv:1311.6765, 2013. [11] Y. Ingster and I. A. Suslina. Nonparametric goodness-of-fit testing under Gaussian models, volume 169 of Lecture Notes in Statistics. Springer, 2002. [12] A. B. Juditsky and A. S. Nemirovski. Nonparametric estimation by convex programming. The Annals of Statistics, 37(5a):2278–2300, 2009. [13] T. L. Lai. Sequential analysis: some classical problems and new challenges. Statistica Sinica, 11(2):303–350, 2001. [14] L. Le Cam. Convergence of estimates under dimensionality restrictions. The Annals of Statistics, pages 38–53, 1973. 22 [15] L. Le Cam. On local and global properties in the theory of asymptotic normality of experiments. Stochastic processes and related topics, 1:13–54, 1975. [16] L. Le Cam. Asymptotic Methods in Statistical Decision Theory. Springer Series in Statistics. Springer, 1986. [17] A. Nemirovski. Interior point polynomial time methods in convex programming, 2004. http://www.isye.gatech.edu/~nemirovs/Lect_IPM.pdf. [18] A. Nemirovskii and Y. Nesterov. Interior-point polynomial algorithms in convex programming. Society for Industrial and Applied Mathematics, Philadelphia, 1994. [19] A. Wald. Sequential tests of statistical hypotheses. The Annals of Mathematical Statistics, 16(2):117–186, 1945. [20] A. Wald and J. Wolfowitz. Optimum character of the sequential probability ratio test. The Annals of Mathematical Statistics, pages 326–339, 1948. A Proof of Proposition 2 Let p∗ , j∗ , i∗ be the entities from the proposition. For 1 ≤ s ≤ S, there exist qs ∈ {1, ..., Ls } such that p∗ ∈ Zqs s ; without loss of generality, we can assume that qs[p∗ ] = q[p∗ ]. For 1 ≤ s ≤ S let E1s = {ω K : Ts as applied to ω k(s) does not accept the hypothesis Hqs s }, E2s = {ω K : Ts as applied to ω k(s) accepts a hypothesis Hqs with q not C s -close to qs }, E s = E1s ∪ E2s . From the just outlined properties of Ts it follows that p∗ -probability of E s does not exceed s . Now let E ∗ = {ω K : no one of the events E1s , E2s , 1 ≤ s ≤ S, takes place.}, P so that p∗ -probability of E ∗ is at least 1 − 2 Ss=1 s = 1 − . All we need is to verify that E ⊃ E ∗ , which is immediate. Indeed, let s∗ = s[p∗ ], q∗ = q[p∗ ] (so that q∗ = qs∗ due to qs[p∗ ] = q[p∗ ]), and let ω K ∈ E ∗ . By the latter inclusion, E1s∗ does not take place, what implies that (a) Ts∗ as applied to ω k(s∗ ) accepts Hq∗ s∗ . Besides this, since ω K ∈ E ∗ , we have ω k(s∗ ) 6∈ E2s∗ , implying, by definition of E2s∗ , that all hypotheses Hqs∗ accepted by Ts∗ as applied to ω k(s∗ ) are such that q is C s∗ -close to q∗ = q[p∗ ]. By definition of s∗ = s[p∗ ] and q∗ = q[p∗ ], for all q which are C s∗ -close to q∗ , the hypotheses Hqs∗ are of the same color as the accepted by Ts∗ , by (a), hypothesis Hq∗ s∗ . Thus, when ω K ∈ E ∗ , we have (b) the set of hypotheses Hqs∗ accepted by Ts∗ is nonempty, and all these hypotheses are of the same color, equal to the color of µ. Invoking the description of T , we conclude that when ω K ∈ E ∗ , the test T terminates not later than at step s∗ = s[p∗ ] and the termination is productive – some of the hypotheses Hi indeed are accepted (in fact, in this case exactly one of the hypotheses Hi is accepted, since, as it was already mentioned, T never accepts more than one hypothesis). Now let ω K ∈ E ∗ , and let s̄ be the step at which T terminates. As we have already seen, s̄ ≤ s∗ = s[p∗ ] and T terminates accepting exactly one hypothesis Hī , where ī is a deterministic 23 function of ω k(s̄) . Since p∗ obeys hypothesis Hqs̄ s̄ (by definition of qs̄ ) and ω K 6∈ E1s̄ , the test Ts̄ as applied to ω k(s̄) accepts the hypothesis Hqs̄ s̄ (which, by construction, has the same color i∗ as p∗ ). The latter observation combines with the termination rule for T to imply that the outcome of T in the case of ω K ∈ E ∗ is the hypothesis Hi of the same color i as Hqs̄ s̄ , that is, the hypothesis i with the same color as the color i∗ of p∗ , that is, the true hypothesis Hi∗ , and that the outcome is obtained not later than at the stage s[p∗ ].  B Proof of Proposition 3 Let d > 0, J ≥ 2,  ∈ (0, 14 ), κ > 2, and κ ≥ 1 satisfy (21). Relation (22) is trivially true when S = 1 and thus K = k̄(1) = 1. We denote ϑ = J 2 /, and assume from now on that S > 1, so that (17) is not satisfied when S = k̄(S) = 1 and therefore d ≤ ln(ϑ). 10 . We claim that  4κ ln(ϑ) . S ≤ S̄ := σ = 3d  (28) To justify this claim, it suffices to verify that ln(ϑS̄)/k̄(S̄) < d. (29) Indeed, we have σ ≥ 4/3, whence σ ≤ S̄ ≤ 32 σ. Using the bound k̄(S) ≥ 2S̄ ≥ 2σ, we conclude that the left hand side in (29) does not exceed Cd, with C given by C= ln (2κϑ ln(ϑ)/d) ln (2κϑ ln(ϑ)) + κ ln(ϑ) ≤ , 8 8 3 κ ln(ϑ) 3 κ ln(ϑ) where the concluding ≤ is due to ln(1/d) ≤ κ ln(ϑ) (the latter is nothing but (21)). From the relations ϑ = J 2 / > 16 and κ ≥ 1 it immediately follows that C < 1, implying the validity of (29) and thus – the validity of (28). 20 . Since 1 < S ≤ S̄, we have d≤ ln([S − 1]ϑ) ln([S̄ − 1]ϑ) ln(σϑ) ≤ ≤ . k̄(S − 1) k̄(S − 1) k̄(S − 1) Thus 2 ln( 34 κϑ ln(ϑ)/d) 2 ln(σϑ) K = k̄(S) ≤ 2k̄(S − 1) ≤ = d d  2 ln( 43 κϑ ln(ϑ)) + κ ln(ϑ) κ ln(ϑ) [by (21)] ≤ = C0 , d d 2[ln( 43 κ ln(ϑ)) + (κ + 1) ln(ϑ)] C0 = . κ ln(ϑ) Since ϑ > 16 and κ ≥ 1 we have C 0 ≤ 5, and we arrive at (22). 24  C Proof of Proposition 4 Let s∗ = s∗ (µ), and let j∗ be such that µ ∈ Xjj∗∗s∗ , see the definition of s∗ (µ). The set Xjj∗∗s∗ 3 µ is some Zq∗ s∗ with q∗ ∈ Qs∗ [µ]. We claim that (!) all q 0 which are s∗ -close to q∗ are of the same color as q∗ ; note that the validity of (!) means that setting s = s∗ , q = q∗ , we meet the requirements in (10), implying, by definition of s[µ], our target relation s[µ] ≤ s∗ . To verify (!), let q 0 be s∗ -close to q∗ , so that by definition of s-closeness either (a) q 0 and q∗ are of the same color, or (b) q 0 and q∗ are of different colors and q0 q∗ ,s∗ > δs∗ = exp{−r(s∗ )}; all we need to prove is that (b) in fact is impossible. Assume, on the contrary, that (b) takes place, and let us lead this assumption to a contradiction. As it was already mentioned, q0 q∗ ,s∗ = exp{λ} where λ = max µ∈Zq∗ s∗ ,ν∈Zq0 s∗ ψ(µ, ν). Thus, we are in the case when the color i of q 0 differs from the color i∗ of q∗ and λ := max µ∈Zq∗ s∗ ,ν∈Zq0 s∗ ψ(µ, ν) > −r(s∗ ). (30) Since q 0 is of color i, we have Zq0 s∗ ⊂ Xj 0 for some j 0 ∈ Ji , and since i 6= i∗ , j 0 and j∗ are of different colors, or, equivalently, j 0 ∈ J j∗ . Now, by the definition of q∗ we have Zq∗ s∗ = Xjj∗∗s∗ = {µ ∈ Xj∗ : `j∗ js∗ (µ) ≤ 0 ∀j ∈ J j∗ }. Hence, taking into account that j 0 ∈ J j∗ and that `j∗ j 0 s∗ (·) ≤ 0 is (j∗ j 0 s∗ )-cut, µ ∈ Zq∗ s∗ implies that ψj 0 (µ) ≤ −r(s∗ ). In its turn, the latter relation, due to Zq0 s∗ ⊂ Xj 0 and that ψj 0 (·) = maxν∈Xj 0 ψ(µ, ν), implies that ψ(µ, ν) ≤ −r(s∗ ), max µ∈Zq∗ s∗ ,ν∈Zq0 s∗ which contradicts (30).  25
10math.ST
There and Back Again: A General Approach to Learning Sparse Models arXiv:1706.08146v1 [cs.LG] 25 Jun 2017 Vatsal Sharan Stanford University [email protected] Kai Sheng Tai Stanford University [email protected] Peter Bailis Stanford University [email protected] Gregory Valiant Stanford University [email protected] Abstract We propose a simple and efficient approach to learning sparse models. Our approach consists of (1) projecting the data into a lower dimensional space, (2) learning a dense model in the lower dimensional space, and then (3) recovering the sparse model in the original space via compressive sensing. We apply this approach to Non-negative Matrix Factorization (NMF), tensor decomposition and linear classification—showing that it obtains 10× compression with negligible loss in accuracy on real data, and obtains up to 5× speedups. Our main theoretical contribution is to show the following result for NMF: if the original factors are sparse, then their projections are the sparsest solutions to the projected NMF problem. This explains why our method works for NMF and shows an interesting new property of random projections: they can preserve the solutions of non-convex optimization problems such as NMF. 1 Introduction In what settings can sparse models be trained more efficiently than their dense analogs? Sparse models commonly arise in feature selection (e.g., diagnostic tasks [1, 2, 3, 4]), in problems with few, highly indicative features (e.g., time-series prediction [5, 6]), and in resource-constrained environments (i.e., a sparse model is needed for more efficient inference [7, 8]). In these tasks, sparsity can reduce the data requirements for a desired predictive power, and improve interpretability and inference speed; and a range of popular techniques provide means of learning these sparse models from dense and/or high-dimensional data [9, 10]. In this work, we study an additional dimension of sparse statistical models: the extent to which a model’s sparsity can be leverage for a computational advantage. We present a general and efficient approach to learning sparse models that explicitly leverages the target model sparsity. We adapt now-classic techniques from compressive sensing [11, 12] in a simple framework for learning sparse models from high-dimensional data: (1) project data to a lowerdimensional subspace using a random projection, (2) learn a dense model in this lower-dimensional subspace, then (3) recover a sparse model in the original dimensionality using compressive sensing. This approach has several benefits. First, it allows us to perform the bulk of model training in an often much lower-dimensional dense subspace, offering in significant efficiency gains when data is high-dimensional and the target model is sparse. Second, it is useful in settings where the dataset is very large and cannot be fit in memory; our approach allows us to work with a much smaller, low dimensional projection but still recover the original model. Third, it provides a conceptually simple approach to learning sparse models, combining powerful ideas from dimensionality reduction and compressive sensing. Although low-dimensional projections are extremely popular tools for speeding up a variety of optimization and learning problems [13, 14, 15], our framework is conceptually different, as we are interested in being able to recover the sparse solution in the original space from the (possibly dense) solution in the lower-dimensional space. Note that this is not even information theoretically possible for many tasks even if the original model or solution is sparse: if the solution in the lowerdimensional space is not a projection of the original solution, then performing a compressive sensing based recovery has no hope of recovering the original solution (even if the original solution is sparse). Our contributions. We develop a simple framework for learning sparse models and investigate it in the context of Non-negative Matrix Factorization (NMF), tensor decomposition, and linear classification. We show that our approach recovers the true solution with a negligible error across several synthetic and real datasets. Empirically, sparse learning allows 10× compression with negligible loss in accuracy on real data, and obtains up to 5× speedups in terms of wall clock time to obtain the same accuracy. Theoretically establishing why such speed-ups and high fidelity reconstructions are possible and justified requires care: we establish novel uniqueness guarantees for NMF which demonstrate that if the original factors are sparse, then the projection of the factors of the original, high-dimensional NMF problem is the sparsest possible factorization for the low-dimensional projected NMF problem. As NMF algorithms implicitly [16] or explicitly [17] learn sparse factorizations, our results explain why the factorization is preserved by projection, explaining the empirical success of our procedure. Our results do not assume separability [18] of the NMF factors, a commonly used—but very strong— assumption for showing uniqueness of NMF. We also derive simple conditions for uniqueness and provable recovery for tensor decomposition in the projected space. These theoretical insights, backed by our empirical findings, illustrate the benefits of random projections to learn sparse models— learning is faster, without compromising model quality. Our results on the uniqueness of NMF after random projection—and our empirical findings—open a new perspective on the properties of random projections. It is well known that random projections can preserve distances and other geometric properties (e.g., [19]), but our results show that random projections can also preserve the solutions to non-convex optimization problems such as NMF. Our approach successfully leverages this property to efficiently learn sparse models, and we believe this aproach has several promising applications beyond our target settings. We briefly outline the three main classes of sparse models we consider in this paper: Non-negative Matrix Factorization (NMF). The goal of NMF is to approximate a non-negative matrix M ∈ Rm×n with a product of two non-negative matrices W ∈ Rm×r and H ∈ Rr×n . The matrix W is regarded as the dictionary, and H stores the combination weights of each column of M in terms of the dictionary W . Applications of NMF include document clustering [20] and image analysis [16, 21]. A crucial property of NMF that enables it to learn good representation of the data is that the coefficients H are typically sparse [16, 17], so that each document or image is expressed as a combination of few basis vectors in the dictionary. In settings such as document clustering or image classification, the columns of M correspond to samples from the data set (e.g., documents or images). In many scenarios, n  m, as the number of samples is large for big datasets. We are interested in this setting, where n is very large but the factor H is sparse. Tensor Decomposition. The goal of tensor decomposition is to decompose a tensor T ∈ Pr Rm1 ×m2 ×n with rank r in terms of its factors T = i=1 Ai ⊗ Bi ⊗ Ci . Here, Ai denotes the ith column of the factor A ∈ Rm1 ×r and ⊗ denotes the outer product: a, b, c ∈ Rn then a⊗b⊗c ∈ Rn×n×n and (a ⊗ b ⊗ b)ijk = ai bj ck . As in NMF, we consider settings where the third mode corresponding to the factor C represents data points and is very large—but sparse. The first two modes could correspond to features for each data point; for example in a topic modeling setup [22], the first two modes could represent word co-occurrences, with the third mode representing different documents. Linear Classification. We also consider the problem of finding the linear classifier to classify m data points in n dimensions. In modern datasets, the number of features n is often very large, containing numerous irrelevant features [1, 2, 3, 4]. In these settings, the best (and/or most interpretable) classifier is sparse, as it only relies on the few features which are predictive/indicative. 2 Related Work Sparse Recovery. In the compressive sensing or sparse recovery framework, there is a sparse signal x ∈ Rn , and we are given measurements Ax, A ∈ Rd×n , where d  n. The goal is to recover x using the measurements Ax, and the property that x is sparse. Compressive sensing has been 2 extensively studied by several different communities, and many algorithms have been proposed which have a high compression rate and allow fast decoding [23, 24, 11]. Particularly relevant to our work is the work on sparse recovery using sparse projection matrices [25, 26, 27, 12], and we use these results to efficiently recover back the solution in the original space from the solution in the projected space. As is evident, the key difference of our approach from compressive sensing is that we do not have direct access to the measurements Aw∗ of the solution w∗ in the projected space, and instead hope to recover an approximation to Aw∗ by solving the optimization problem in the projected space. Non-negative Matrix Factorization. Many algorithms have been proposed for NMF, the most popular ones are multiplicative updates [16] and Alternating Least Squares (ALS). As mentioned in the introduction, for many modern datasets n  m as the number of samples is very large. Approaches such as ALS and multiplicative weights do not scale to this online setting where the data set is very large and does not fit in memory. For the online setting, many algorithms [28, 29, 30] have been proposed for the dictionary learning problem, where the goal is to only learn the matrix W , but these approaches are unable to learn the coefficient matrix H. In the context of using random projection for NMF, Wang and Li [31] obtained speedups compared to ALS by projecting down the matrix via a random projection. However, they do not attempt to directly recover the factors in the original space by using the factors in the projected space and exploiting properties of the original solution such as its sparsity. Tensor Decomposition. The most popular algorithm for tensor decomposition is Alternating Least Squares (ALS), which proceeds by fixing two of the factor matrices and solving for the third one via a least squares problem, and continuing this till convergence. Recently, there has been a burst of exciting work on speeding up ALS via sampling and sketching approaches [32, 33, 34, 35]. These approaches obtain significant speedups over the naive ALS algorithm, but they do not leverage the fact that the factors of the tensor are sparse, which is what we aim to exploit in our paper. Random Projections for Classification. Say we have data points x ∈ Rn with labels y ∈ {0, 1} which are separated by a linear classifier w∗ ∈ Rn , therefore y = sign(xT w∗ ). If we perform a random projection of the points to d dimensions, are they still separable? A number of papers [36, 37, 38] have examined this basic question, and a one line summary of the results is that if the original data points are separable with a large margin, then a random projection preserves the margin. In our framework however, the goal is not to just classify accurately in the projected space, but to recover the optimal classifier in the projected space. Zhang et al. [39] also consider the question of obtaining the optimal classifier in the original space from the optimal classifier in the projected space. They show that a novel approach based on the dual of the optimization problem in the projected space can recover the original classifier if the data matrix is approximately low rank.1 In our framework, we instead aim to employ the sparsity of the original classifier w∗ in order to be able to recover it. 3 Our Approach We instantiate our framework in the context of NMF, tensor decomposition and linear classification. In each case, we obtain a lower-dimensional problem via a random projection (described in detail in Sec. 3.1). Denote the random projection matrix as P ∈ Rd×n , where n is the original dimension and d < n. After solving the projected problem, we obtain an approximation to the solution in the original space by solving a sparse recovery problem via the following linear program (LP): ŵ∗ = minimize kwk1 , subject to P w = w̃∗ w (1) where w ∈ Rn and w̃∗ ∈ Rd is the solution of the projected problem2 . In the compressive sensing literature, this technique is also known as basis pursuit [40]. We now describe the specifics of each application of our method. Non-negative Matrix Factorization. Consider the problem of factorizing a non-negative matrix M ∈ Rm×n into a product of non-negative matrices M = W H. We are interested in the setting where matrix H is sparse and n  m. We first project M to M̃ = M P T . This corresponds to projecting each row of H from n dimensions to d dimensions. We then factorize M̃ = W̃ H̃ by Zhang et al. [39] also obtain guarantees when the true classifier w∗ is sparse, but require that the data points have most of their mass on the non-zero entries of w∗ in this case, and hence are actually close to low rank. 2 In settings like NMF where the desired solution is non-negative, we can add the additional constraint x ≥ 0 to Eq. 1. In practice, we find that projecting the solutions of Eq. 1 post-hoc onto the non-negative orthant is often an effective heuristic. Omitting the additional constraint typically yields faster solution times. 1 3 solving the NMF problem for M̃ . We set our estimate Ŵ of W to be W̃ . To recover H from H̃, we solve the compressive sensing problem in Eq. 1 for each row of Hi of H. Therefore, for a rank-r approximation, we solve r instances of Eq. 1. The outputs of the compressive sensing step are our estimates of the rows of H. Tensor The goal here is to decompose a tensor T ∈ Rm1 ×m2 ×n in terms of r factors: Pdecomposition. r T = i=1 Ai ⊗ Bi ⊗ Ci where n  m1 , m2 and C is sparse. We project the tensor T along the 3rd Pr mode to a projected tensor T̃ ∈ Rm1 ×m2 ×d , which has factorization T̃ = i=1 Ai ⊗ Bi ⊗ C̃i , where C̃i = P Ci . To understand this projection, denote T(n) as the mode n matricization of the tensor T , which is the flattening of the tensor T along the nth mode obtained by stacking the matrix slices together as columns of T(n) . To project T , we project its mode 3 matricization T(3) ∈ Rm1 m2 ×n to obtain the projection of the mode 3 matricization T̃(3) ∈ Rm1 m2 ×d of T̃ by computing T̃(3) = T(3) P T . We decompose T̃ in the projected space to obtain the factors Ã, B̃, C̃. Our estimates Â, B̂, Ĉ for the original factors are  = Ã, B̂ = B̃ and Ĉ is obtained by solving the compressive sensing problem in Eq. 1 for each column Ci . As above, this yields r instances of Eq. 1. Linear classification. For the problem of classifying data points x(i) ∈ Rn , 1 ≤ i ≤ m, we first perform a random projection to project the points into d dimensions using the projection matrix P . Hence the projected points x̃(i) ∈ Rd are given by x̃(i) = P x(i) . We then solve the classification problem in the projected space to learn a classifier w̃∗ . Finally, we use compressive sensing to recover an estimate of the true classifier ŵ∗ from w̃∗ . 3.1 Choosing the projection matrix P There are several requirements which our projection matrix P must satisfy. The first, more obvious, requirement is that we should be able to solve the compressive sensing problem to recover the sparse solution in the original space from the solution in the projected space. A slightly more subtle requirement is that P should be chosen such that if w∗ is the optimal solution in the original space, then the solution in the projected space is w̃∗ = P w∗ , so that compressive sensing based recovery can then be carried out. This requires uniqueness of the optimization problem in the projected space, the requirement for which could depend on the original optimization problem. In Section 4 we analyze these requirements for NMF and tensor decomposition. Finally, for computational efficiency, we want projections which are efficient to compute, and which have the property that the sparse recovery problem can be solved efficiently using them. Consider a sparse projection matrix P ∈ {0, 1}d×n such that every column of P has exactly p non-zero entries, we refer to p as the number of buckets, because each coordinate in the original n dimensional space contributes to p locations in the projected d dimensional space. Let the support of the non-zero entries of each column of P be chosen independently and uniformly at random. The key property of P which enables compressive sensing is that P is the adjacency matrix of a bipartite expander [41]. Consider a bipartite graph G with n nodes on the left part and d nodes on the right part such that every node in the left part has degree p. We call G a (γn, α) expander if every subset of at most t ≤ γn nodes in U has at least αtp neighbors in V . It is not difficult to show that a randomly chosen matrix P with p non-zero entries per column is the adjacency matrix of a (γn, 4/5) expander for γn = d/(pe5 ) with high probability if p = O(log n). We formally prove this as Lemma 5 in Appendix D. Note that as P is sparse, the projection step can be carried out efficiently. For the basis pursuit problem described in (1), seminal results in compressive sensing [23, 24, 11] show that using dense projection P guarantees recovery with d = O(k log n) if the original solution is k-sparse. This property was subsequently extended to sparse projection matrices, and we will leverage this fact. Theorem 3 of Berinde et al. [12] shows that if x is k-sparse, then with P as defined above x can be recovered from P x using the LP if P is the adjacency matrix of a (2k, 4/5) expander. A randomly chosen P with d = O(k log n) will be a (2k, 4/5) expander with high probability (Lemma 5), and hence can be used for sparse recovery of k-sparse signals. Efficient recovery algorithms [26, 27] which are much faster than solving the LP are also known for sparse projection matrices. Hence using P defined as above ensures that the sparse recovery step is computationally efficient and provably works if the original solution w∗ is k-sparse and the solution w̃∗ in the projected space is w̃∗ = P w∗ . However, we still need to ensure that the solution w̃∗ = P w∗ . We analyze when this is the case for NMF and tensor decomposition next in Section 4. We summarize these conditions in Table 1 for 4 Table 1: Parameters for the projection matrix P ∈ {0, 1}d×n suggested by our theoretical analysis for NMF and tensor decomposition (TD). p is the number of non-zero entries per column of P . Task Parameter Number of buckets p Projection dimension d NMF r: rank of matrix O(log n) O((r + k) log n) TD r: rank of tensor O(log n) max{r, O(k log n)} NMF and tensor decomposition. Note that the bounds suggested by our theoretical results are tight up to logarithmic factors, as projecting the matrix or the tensor to dimension below the rank will not preserve uniqueness of the decomposition. 4 Guarantees for our approach In this section, we will show uniqueness guarantees for performing non-negative matrix factorization and tensor decomposition on the projected matrix or tensor. This will establish that the factors in the projected space correspond to a projection of the factors in the original space, a prerequisite for being able to use compressive sensing to recover the factors in the original space. 4.1 Guarantees for non-negative matrix factorization Donoho and Stodden [18] showed that non-negative matrix factorization is unique under the separability condition. However, separability is a very strong assumption. Instead of using separability, we will show uniqueness results for NMF using sparsity of the weight matrix H. Our uniqueness results for NMF in the original space (Part (a) of Theorem 1) are similar in principle to uniqueness results obtained for sparse coding by Spielman et al. [42]. We show that if a matrix M has a true rank r factorization M = W H and H is sparse, then for any other rank r factorization M = W 0 H 0 , H 0 has strictly more non-zero entries than H. As NMF has been found to recover sparse solutions [16, 17], and many algorithms explicitly enforce sparsity [17], it is reasonable to hope that the recovery procedure will be successful if the true solution is the sparsest possible solution. The main contribution of Theorem 1 is Part (b), which shows uniqueness results in the projected space. This is significantly more challenging than showing uniqueness in the original space, because in the original space we could use the fact the entries of H are drawn independently at random to simplify our arguments. However we lose access to this independence after the random projection step as the entries of the projected matrix are no longer independent. Instead, the proof in the projected space uses the expansion properties of the projection matrix P to control the dependencies, enabling us to prove uniqueness results in the projected space. Theorem 1 only assumes that W is full column rank, and that the non-zero entries of H are independent Gaussian random variables. The Gaussian assumption is not necessary and is stated for simplicity—any continuous probability distribution for the non-zero entries of H suffices. Theorem 1 shows that if the rows of H are k-sparse, then projecting into Ω(p(r + k)) dimensions preserves uniqueness, with failure probability at most re−βk /n for some constant β > 0. Theorem 1. Consider a rank r matrix M ∈ Rm×n which has factorization M = W H where W ∈ Rm×r is full column rank, H ∈ Rr×n and H = B Y where each row of B has exactly k non-zero entries chosen uniformly at random, each entry of Y is drawn independently from N (0, 1) and denotes the element wise product. Assume k > C, where C is a fixed constant. Consider the projection matrix P ∈ {0, 1}d×n where each column of P has exactly p non-zero entries, p = O(log n) and P is a (γn, 4/5) expander with γ = d/(npe5 ) . Assume d = Ω(p(r + k)). Let M̃ = M P T . Note that M̃ has a factorization M̃ = W H̃ where H̃ = HP T . Then, (a) For any other rank r factorization M = W 0 H 0 , kHk0 < kH 0 k0 with failure probability at most re−βk /n for some β > 0. (b) For any other rank r factorization M̃ = W 0 H 0 , kH̃k0 < kH 0 k0 with failure probability at most re−βk /n for some β > 0. Proof. We prove Part (a) of Theorem 1 in Appendix B. Here, we provide the outline of the proof for the more challenging Part (b), moving proof details to Appendix B. We will argue about the row space of the matrix H̃. We first claim that the row space of M̃ equals the row space of H̃. To verify, note that the row space of M̃ is a subspace of the row space of H̃. As W is full column rank, the rank of the row space of M̃ equals the rank of the row space of H̃. Therefore, the row space of M̃ equals 5 the row space of H̃. By the same argument, for any alternative factorization M̃ = W 0 H 0 , the row space of H 0 must equal the row space of M̃ – which equals the row space of H̃. As the row space of H 0 equals the row space of H̃, therefore H 0 must lie in the row space of H̃. Therefore, our goal will be to prove that the rows of H̃ are the sparsest vectors in the row space of H̃, which implies that for any other alternative factorization M̃ = W 0 H 0 , kH̃k0 < kH 0 k0 . The outline of the proof is as follows. First, we argue that the if we take any subset S of the rows of H̃, then the number of columns which have non-zero entries in at least one of the rows in S is large. This implies that taking a linear combination of all the S rows will result in a vector with a large number of non-zero entries—unless the non-zero entries cancel in many of the columns. But using the properties of the projection matrix P and the fact that the non-zero entries of the original matrix H are drawn from a continuous distribution, we show this happens with zero probability. Lemma 1 shows that the number of columns which are have at least one zero entry in a subset S of the rows of H grows proportionately with the size of S. The proof proceeds by showing that choosing B such that each row has k randomly chosen non-zero entries ensures expansion for B with high probability, and the fact that P is given to be an expander. Lemma 1. For any subset S of the rows of H̃, define N (S) to be the subset of the columns of H̃ which have a non-zero entry in at least one of the rows in S. Then for every subset S of rows of H̃, |N (S)| ≥ min{16|S|kp/25, d/200} with failure probability re−βk /n. We now prove the second part of the argument–that any linear combination of rows in S cannot have much fewer non-zero entries than N (S), as the probability that many of the non-zero entries get canceled is zero. Lemma 2 is the key to showing this. Define a vector x as fully dense if all its entries are non-zero. Lemma 2. For any subset S of the rows of H̃, let U be the submatrix of H̃ corresponding to the S rows and N (S) columns. Then with probability one, every subset of the columns of U of size at least |S|p does not have any fully dense vector in its left null space. Proof. Without loss of generality, assume that S corresponds to the first |S| rows of H̃, and N (S) corresponds to the first |N (S)| columns of H̃. We will partition the columns of U into |S| groups {G1 , . . . , G|S| }. Each group will have size at most p. To select the first group, we choose any entry y1 of Y which appears in the first column of U . For example, if the first row of H has a one in its first column, and P (1, 1) = 1, then the random variable Y1,1 appears in the first column of U . Say we choose y1 = Y1,1 . We then choose G1 to be the set of all columns where y1 appears. We then remove the set of columns G1 from U . To select the second group, we pick any one of the remaining columns, and choose any entry y2 of Y which appears in that column of U . G2 is the set of all columns where y2 appears. We repeat this procedure to obtain |S| groups, each of which will have size at most p as every variable appears in p columns. Let Nj be the left null space of the first j groups of columns. We define N0 = R|S| . We will now show that either rank(Ni ) = |S| − i or Ni does not contain a fully dense vector. We prove this by induction. Consider the jth step, at which we have j groups {G1 , . . . , Gj }. By the induction hypothesis, either Nj does not contain any fully dense vector, or rank(Nj ) = |S| − j. If Nj does not contain any fully dense vector, then we are done as this implies that Nj+1 also does not contain any fully dense vector. Assume that Nj contains a fully dense vector x. Choose any column Uc which has not been already been assigned to one of the sets. By the following elementary proposition, the probability that x is orthogonal to Uc is zero. We provide a proof in the appendix. Proposition 1. Let v = (v1 , . . . , vn ) ∈ Rn be a vector of n independent N (0, 1) random variables. For any subset S ⊆ {1, . . . , n}, let v(S) ∈ R|S| refer to the subset of v corresponding to the indices in S. Consider t such subsets S1 , . . . , St . Let each set Si defines some linear relation αSTi v(Si ) = 0, for some αSi ∈ R|Si | . Assume that the variable vi appear in the set Si . Then the probability distribution of the set of variables {vt+1 , . . . , vn } conditioned on the linear relations defined by S1 , . . . , St is still continuous and its density function has full support. In particular, any linear combination of the set of variables {vt+1 , . . . , vn } has zero probability of being zero. If Nj contains a fully dense vector, then with probability one, rank(Nj+1 ) = rank(Nj )−1 = n−j−1. This proves the induction argument. Therefore, with probability one, either rank(N|S| ) = 0 or N|S| does not contain a fully dense vector and Lemma 2 follows. 6 Figure 1: Pearson correlation of recovered factors for the Enron dataset with NMF (left) and EEG data with non-negative tensor factorization (right). ‘Recovered coefficients’ here refers to the factors obtained along the larger mode of the matrix/tensor which was projected down. The ‘dictionary’ refers to the factors along the modes which were not projected down. Table 2: Frobenius errors and runtimes (mins) for NMF on original and compressed data. Dataset n×d orig. err. orig. time comp. err. comp. time MNIST [46] RCV1 [47] Enron [48] NYTimes [48] 60, 000 × 786 21, 531 × 18, 758 39, 861 × 28, 102 131, 688 × 102, 659 1.42E3 6.41E3 4.51E3 1.04E4 3.1 14.8 18.8 300.2 1.78E3 (+25.3%) 6.50E3 (+ 1.4%) 4.97E3 (+10.0%) 1.07E4 (+ 3.3%) 1.5 (48%) 2.0 (14%) 5.3 (28%) 72.1 (24%) Rank r = 10; m = b0.1nc; compressed times include projection and LP recovery We now complete the proof for the second part of Theorem 1. Note that the rows of H̃ have at most kp non-zero entries. Consider any set S of rows of H̃. Consider any linear combination v ∈ Rd of the set S rows, such that all the combination weights x ∈ R|S| are non-zero. By Lemma 1, |N (S)| ≥ min{16|S|kp/25, d/200} with failure probability re−βk /n. We claim that v has more than |N (S)| − |S|p non zero entries. We prove by contradiction. Assume that v has |N (S)| − |S| or fewer non zero entries. Consider the submatrix U of H̃ corresponding to the S rows and N (S) columns. If v has |N (S)| − |S|p or fewer non zero entries, then there must be a subset S 0 of the |N (S)| columns of U with |S 0 | = |S|p, such that each of the columns in S 0 has at least one non-zero entry, and the fully dense vector x lies in the left null space of S 0 . But by Lemma 2, the probability of this happening is zero. Hence v has more than |N (S)| − |S|p non zero entries. Lemma 3 obtains a lower bound on |N (S)| − |S|p using simple algebra. Lemma 3. |N (S)| − |S|p ≥ 6kp/5 for |S| > 1 for d ≥ 400p(r + k). Hence any linear combination of more than one row of H̃ has at least 6kp/5 non-zero entries with failure probability re−βk /n. Hence the rows of H̃ are the sparsest vectors in the row space of H̃ with failure probability re−βk /n. 4.2 Guarantees for tensor decomposition Showing uniqueness for tensor decomposition after random projection is not difficult, as tensor decompsition is unique for every general condition on the factor matrices [43, 44]. For example, tensors have a unique decomposition if all the factor matrices are full rank. The following elementary fact follows from this property whenever the projection matrix P is full column rank, which is true with high probability over the randomness in choosing P . Pr Fact 1. Consider a n-dimensional rank r tensor T = i=1 wi Ai ⊗ Bi ⊗ Ci . If A, B and C are full column rank, then the tensor has a unique decomposition after projecting into any dimension d ≥ r. Hence tensors have a unique decomposition on projecting to dimension at least the rank r. For tensor decomposition, we can go beyond uniqueness and prove that efficient recovery of the factors is also possible in the projected space. We show this using known guarantees for the tensor power method [45], a popular tensor decomposition algorithm. Our results for provable recovery require projection dimension d = O(r4 log r). This is higher than the uniqueness requirement, possibly due to gaps in the analysis of the tensor power method. We state these results in Appendix C. 5 Experiments 7 Figure 2: Visualization of a sample factor from the decomposition of the EEG signal tensor. The top row is from the decomposition in the original space. The bottom row is from the decomposition of a compressed version of the tensor where the temporal dimension is reduced by 10x. Notice that we are able to recover the major features of all 3 factors, including the one compressed by 10x. We evaluate the practical feasibility of sparse model recovery through a series of experiments on real and synthetic data. Our experiments were run on a server equipped with a Xeon E7-4870 CPU at 2.4GHz with 1TB of RAM. All timing measurements were taken under single-threaded execution. Non-negative Matrix Factorization. We evaluate the performance of compressed NMF on a number of standard non-negative datasets. In our experiments, we used MATLAB’s built-in nnmf with Alternating Least Squares. Unless otherwise stated, the optimization was run to convergence with a tolerance of 10−5 . We set the rank to 10. In Table 2 we give normalized Frobenius errors along with wall clock runtimes for NMF in the original and compressed space. We use LP-based reconstruction for the recovery step. Table 2 shows that the compressed NMF runs achieve achieve up to 5× speedup at the cost of slightly increased error. Figure 3: Sparse recovery of a linear classifier on the C ENSUS I NCOME dataset (original d = 123) with 2500 additional distractor features. The dashed line shows the F1 score of an L1regularized logistic regressor trained in the uncompressed space. Plotted scores As we are usually interested in learning interesting fac- are medians of 5 runs. Observe that we tors via NMF rather than just minimizing squared error, can obtain a 6.5× compression with a the linear correlation between the recovered factors and 6% loss in accuracy. ground-truth factors gives a finer-grained evaluation of recovery quality than Frobenius error alone. We use the factors obtained in the original space at convergence as a proxy for ground-truth in the absence of cluster labels for evaluation. Since the two sets of factors may not be in the same order, we compute correlation scores via a maximum bipartite matching. In Fig. 1, we plot the correlation of the factors from the Enron word-document count matrix for various compression factors. At a fixed quality level of 0.5 (as measured by correlation), we are able to achieve 4× speedups by operating in the compressed space, and are able to recover back the solution in the original space to small error using compressive sensing, even for 10× compression. Tensor Decomposition. The CHB-MIT Scalp EEG Database [49] is a collection of scalp electroencephalogram (EEG) recordings of children susceptible to epileptic seizures. Each EEG recording consists of 23 real-valued time series; each channel corresponds to a measurement of electrical activity in the different region of the brain. We preprocess one EEG trace from the dataset (CHB01) by computing the spectrogram of each channel. This yields a non-negative tensor of size 27804 × 303 × 23 (time×frequency×channel) corresponding to approximately 40 hours of data. We expect that this data should exhibit the desired sparsity property since EEG signals typically exhibit well-localized time-frequency structure. In our experiments, we set the rank to 10. We compute a non-negative decomposition of this tensor using projected CP-ALS [50]. The tensor was projected along the first (temporal) mode using the random projection described in Section 3.1. As with NMF, we treat the factors obtained in the original space at convergence as ground truth and evaluate the mean correlation of the factors via a maximum bipartite matching. In Fig. 1 (right), we plot the correlation of each factor over time for three compression ratios. As in our NMF experiments, we observe that for the uncompressed dictionary factors (second and third figures of the EEG data), our approach converges to a good solution with 0.5 correlation 5× faster 8 than running the decomposition along the original dimension. For the compressed factors (first figure of the EEG data) we get a more modest 2× speedup for d/n ≥ 0.1. Fig 2 shows that we are able to accurately recover the original factors even with a 10× compression. We provide additional details regarding this experiment and a qualitative analysis of the resulting decomposition in the Appendix. Linear Classification. We present empirical results on recovering sparse linear classifiers trained on a compressed feature space. We use the 2-class C ENSUS I NCOME dataset [48] augmented with 2,500 random binary features sampled iid from Bernoulli(0.5). Including the distractor features, the total dimensionality is n = 2623. We use the standard train-test split of 32,561/16,281. For a range of projection dimensions d, we trained logistic regressors on the compressed data and recovered linear classifiers in the original space using sparse recovery. The sparsity of the random projections was fixed at s = dm/50e. In addition to performing sparse recovery by solving the equality-constrained `1 -minimization problem (Eq. 1), we also experimented with less-stringent `2 -ball constraints [51]: kP w − w̃∗ k2 ≤ ε. In our experiments, we used the heuristic setting ε = 12 kP T w̃∗ k∞ . We also compare the test performance of the recovered classifiers against the test performance obtained by the naive approach of projecting the test data using the random projection P and classifying directly with the weights w̃∗ learnt in the compressed space. Our results for this experiment are summarized in Fig. 3. The `2 -ball constraint slightly outperforms the stricter equality constraint across all values of d. At d = 400, we achieve ∼ 6.5× compression of the feature space at a loss of 3.7 F1 points versus a classifier trained in the uncompressed space (i.e. 94% of the baseline score). Both recovery techniques significantly outperform the naive approach, highlighting the importance of the denoising effect realized by sparse recovery. 6 Conclusion We proposed a simple framework for learning sparse models by combining ideas from dimension reduction and compressive sensing, and theoretical and empirical results illustrate the viability of our approach for NMF and tensor decomposition as well as preliminary results for linear classifiers. A natural direction of future work is to extend these theoretical and experimental results to more models and applications that require learning sparse models. References [1] Robert Tibshirani. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. Series B (Methodological), pages 267–288, 1996. [2] Isabelle Guyon and André Elisseeff. An introduction to variable and feature selection. Journal of machine learning research, 3(Mar):1157–1182, 2003. [3] Myunghwan Kim, Roshan Sumbaly, and Sam Shah. Root cause detection in a service-oriented architecture. In ACM SIGMETRICS Performance Evaluation Review, volume 41, pages 93–104. ACM, 2013. [4] Peter Bailis, Edward Gan, Samuel Madden, Deepak Narayanan, Kexin Rong, and Sahaana Suri. MacroBase: Prioritizing attention in fast data. In SIGMOD. ACM, 2017. [5] Jushan Bai and Serena Ng. Forecasting economic time series using targeted predictors. Journal of Econometrics, 146(2):304–317, 2008. [6] Ling Huang, Jinzhu Jia, Bin Yu, Byung-Gon Chun, Petros Maniatis, and Mayur Naik. Predicting execution time of computer programs using sparse polynomial regression. In Advances in neural information processing systems, pages 883–891, 2010. [7] Jeremy Fowers, Kalin Ovtcharov, Karin Strauss, Eric S Chung, and Greg Stitt. A high memory bandwidth FPGA accelerator for sparse matrix-vector multiplication. In FCCM, 2014. [8] Song Han, Junlong Kang, Huizi Mao, Yiming Hu, Xin Li, Yubin Li, Dongliang Xie, Hong Luo, Song Yao, Yu Wang, et al. Ese: Efficient speech recognition engine with sparse lstm on fpga. In FPGA, 2017. [9] Trevor Hastie, Robert Tibshirani, and Martin Wainwright. Statistical Learning with Sparsity: The Lasso and Generalizations. CRC Press, 2016. [10] Irina Rish and Genady Grabarnik. Sparse Modeling: Theory, Algorithms, and Applications. CRC Press, 2014. 9 [11] Emmanuel J Candes and Terence Tao. Near-optimal signal recovery from random projections: Universal encoding strategies? IEEE transactions on information theory, 52(12):5406–5425, 2006. [12] Radu Berinde, Anna C Gilbert, Piotr Indyk, Howard Karloff, and Martin J Strauss. Combining geometry and combinatorics: A unified approach to sparse signal recovery. In Communication, Control, and Computing, 2008 46th Annual Allerton Conference on, pages 798–805. IEEE, 2008. [13] David P. Woodruff. Sketching as a tool for numerical linear algebra. Foundations and Trends in Theoretical Computer Science, 10(1–2):1–157, 2014. ISSN 1551-305X. doi: 10.1561/ 0400000060. URL http://dx.doi.org/10.1561/0400000060. [14] Petros Drineas and Michael W. Mahoney. Randnla: Randomized numerical linear algebra. CACM, 59(6):80–90, May 2016. ISSN 0001-0782. doi: 10.1145/2842602. URL http: //doi.acm.org/10.1145/2842602. [15] Roman Vershynin. Introduction to the non-asymptotic analysis of random matrices. arXiv preprint arXiv:1011.3027, 2010. [16] Daniel D Lee and H Sebastian Seung. Learning the parts of objects by non-negative matrix factorization. Nature, 401(6755):788–791, 1999. [17] Patrik O Hoyer. Non-negative matrix factorization with sparseness constraints. Journal of machine learning research, 5(Nov):1457–1469, 2004. [18] David Donoho and Victoria Stodden. When does non-negative matrix factorization give a correct decomposition into parts? In Advances in neural information processing systems, pages 1141–1148, 2004. [19] Daniel M Kane and Jelani Nelson. Sparser johnson-lindenstrauss transforms. Journal of the ACM (JACM), 61(1):4, 2014. [20] Wei Xu, Xin Liu, and Yihong Gong. Document clustering based on non-negative matrix factorization. In Proceedings of the 26th annual international ACM SIGIR conference on Research and development in informaion retrieval, pages 267–273. ACM, 2003. [21] Stan Z Li, Xin Wen Hou, Hong Jiang Zhang, and Qian Sheng Cheng. Learning spatially localized, parts-based representation. In Computer Vision and Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE Computer Society Conference on, volume 1, pages I–I. IEEE, 2001. [22] Animashree Anandkumar, Rong Ge, Daniel J Hsu, Sham M Kakade, and Matus Telgarsky. Tensor decompositions for learning latent variable models. Journal of Machine Learning Research, 15(1):2773–2832, 2014. [23] David L Donoho. Compressed sensing. IEEE Transactions on information theory, 52(4): 1289–1306, 2006. [24] Emmanuel J Candes. The restricted isometry property and its implications for compressed sensing. Comptes Rendus Mathematique, 346(9-10):589–592, 2008. [25] Anna Gilbert and Piotr Indyk. Sparse recovery using sparse matrices. Proceedings of the IEEE, 98(6):937–947, 2010. [26] Radu Berinde, Piotr Indyk, and Milan Ruzic. Practical near-optimal sparse recovery in the l1 norm. In Communication, Control, and Computing, 2008 46th Annual Allerton Conference on, pages 198–205. IEEE, 2008. [27] Piotr Indyk and Milan Ruzic. Near-optimal sparse recovery in the l1 norm. In Foundations of Computer Science, 2008. FOCS’08. IEEE 49th Annual IEEE Symposium on, pages 199–207. IEEE, 2008. [28] Julien Mairal, Francis Bach, Jean Ponce, and Guillermo Sapiro. Online learning for matrix factorization and sparse coding. Journal of Machine Learning Research, 11(Jan):19–60, 2010. [29] Naiyang Guan, Dacheng Tao, Zhigang Luo, and Bo Yuan. Online nonnegative matrix factorization with robust stochastic approximation. IEEE Transactions on Neural Networks and Learning Systems, 23(7):1087–1099, 2012. 10 [30] Fei Wang, Chenhao Tan, Ping Li, and Arnd Christian König. Efficient document clustering via online nonnegative matrix factorizations. In Proceedings of the 2011 SIAM International Conference on Data Mining, pages 908–919. SIAM, 2011. [31] Fei Wang and Ping Li. Efficient nonnegative matrix factorization with random projections. In Proceedings of the 2010 SIAM International Conference on Data Mining, pages 281–292. SIAM, 2010. [32] Yining Wang, Hsiao-Yu Tung, Alexander J Smola, and Anima Anandkumar. Fast and guaranteed tensor decomposition via sketching. In Advances in Neural Information Processing Systems, pages 991–999, 2015. [33] Zhao Song, David Woodruff, and Huan Zhang. Sublinear time orthogonal tensor decomposition. In Advances in Neural Information Processing Systems, pages 793–801, 2016. [34] Casey Battaglino, Grey Ballard, and Tamara G Kolda. A practical randomized cp tensor decomposition. arXiv preprint arXiv:1701.06600, 2017. [35] Evangelos Papalexakis, Christos Faloutsos, and Nicholas Sidiropoulos. Parcube: Sparse parallelizable tensor decompositions. Machine Learning and Knowledge Discovery in Databases, pages 521–536, 2012. [36] Rosa I Arriaga and Santosh Vempala. An algorithmic theory of learning: Robust concepts and random projection. In Foundations of Computer Science, 1999. 40th Annual Symposium on, pages 616–623. IEEE, 1999. [37] Maria-Florina Balcan, Avrim Blum, and Santosh Vempala. Kernels as features: On kernels, margins, and low-dimensional mappings. Machine Learning, 65(1):79–94, 2006. [38] Qinfeng Shi, Chunhua Shen, Rhys Hill, and Anton Hengel. Is margin preserved after random projection? In Proceedings of the 29th International Conference on Machine Learning (ICML12), pages 591–598, 2012. [39] Lijun Zhang, Mehrdad Mahdavi, Rong Jin, Tianbao Yang, and Shenghuo Zhu. Random projections for classification: A recovery approach. IEEE Transactions on Information Theory, 60(11):7300–7316, 2014. [40] Scott Shaobing Chen, David L Donoho, and Michael A Saunders. Atomic decomposition by basis pursuit. SIAM review, 43(1):129–159, 2001. [41] Shlomo Hoory, Nathan Linial, and Avi Wigderson. Expander graphs and their applications. Bulletin of the American Mathematical Society, 43(4):439–561, 2006. [42] Daniel A Spielman, Huan Wang, and John Wright. Exact recovery of sparsely-used dictionaries. In COLT, pages 37–1, 2012. [43] Joseph B Kruskal. Three-way arrays: rank and uniqueness of trilinear decompositions, with application to arithmetic complexity and statistics. Linear algebra and its applications, 18(2): 95–138, 1977. [44] Tamara G Kolda and Brett W Bader. Tensor decompositions and applications. SIAM review, 51 (3):455–500, 2009. [45] Anima Anandkumar, Prateek Jain, Yang Shi, and Uma Naresh Niranjan. Tensor vs. matrix methods: Robust tensor decomposition under block sparse perturbations. In Artificial Intelligence and Statistics, pages 268–276, 2016. [46] Yann LeCun. The mnist database of handwritten digits. http://yann. lecun. com/exdb/mnist/, 1998. [47] Massih Amini, Nicolas Usunier, and Cyril Goutte. Learning from multiple partially observed views-an application to multilingual text categorization. In Advances in neural information processing systems, pages 28–36, 2009. [48] M. Lichman. UCI machine learning repository, 2013. URL http://archive.ics.uci.edu/ ml. [49] Ali H Shoeb and John V Guttag. Application of machine learning to epileptic seizure detection. In Proceedings of the 27th International Conference on Machine Learning (ICML-10), pages 975–982, 2010. [50] Tamara G Kolda and Brett W Bader. Tensor decompositions and applications. SIAM review, 51 (3):455–500, 2009. 11 Figure 4: Visualization of a factor that correlates with the onset of seizures in the patient. The top set of plots shows the temporal mode while the bottom set shows the channel mode. 10× and 20× labels refer to the level of compression. Red dotted lines indicate the actual onset times of seizures. The 10× compression level preserves most of the peaks, but at 20× compression these peaks are lost. The channel dictionary is well-preserved across these levels of compression. [51] Emmanuel J Candes, Justin K Romberg, and Terence Tao. Stable signal recovery from incomplete and inaccurate measurements. Communications on pure and applied mathematics, 59(8): 1207–1223, 2006. [52] Vatsal Sharan and Gregory Valiant. Orthogonalized ALS: A theoretically principled tensor decomposition algorithm for practical use. arXiv preprint arXiv:1703.01804, 2017. [53] Animashree Anandkumar, Rong Ge, and Majid Janzamin. Guaranteed non-orthogonal tensor decomposition via alternating Rank-1 updates. arXiv preprint arXiv:1402.5180, 2014. A A.1 Supplementary Experimental Results Tensor decomposition of EEG data Preprocessing. Each channel is individually whitened with a mean and standard deviation estimated from segments of data known to not contain any periods of seizure. The spectrogram is computed with a Hann window of size 512 (corresponding to two seconds of data). The window overlap is set to 64. In order to capture characteristic sequences across time windows, we transform the spectrogram by concatenating groups of sequential windows, following Shoeb and Guttag [49]. We concatenate groups of size three. Detection of seizures. The original goal of the work by [49] was to train patient-specific classifiers to detect the onset of epileptic seizures. We find that a tensor decomposition of the time series yields a factor that correlates with the onset of seizures, as shown in Fig. 4. This example illustrates the tradeoff between the compression factor and the fidelity of the recovered modes. A.2 NMF experiments on synthetic data We perform experiments on NMF using synthetic data where we can control the sparsity of the true factors to verify how our approach performs if the factors are very sparse. We take n = m and r = 20. We vary n from 1000 to 10000. For M = W H, we set W to be the absolute value of a 12 500 1 Full NMF Compressed NMF Quality of solution Time in seconds 400 300 200 100 0 0 0.98 Full NMF Compressed NMF 0.96 0.94 0.92 2000 4000 6000 8000 N:original dimension 10000 0.9 0 12000 2000 4000 6000 8000 N:original dimension 10000 12000 (a) Time taken for solving NMF in original (b) Quality of solution for solving NMF in space and compressed space original space and compressed space Figure 5: Synthetic experiments on NMF. The total number of non zero entries per row of H is fixed to be k = 20 and rank r = 20. We project down to k log n dimensions. We obtain significant asymptotic speedups with negligible change in accuracy in this case. matrix G ∈ Rn×r such that the entries of G are independent Gaussian random variables. For each row of H, we fix the number of non-zero entries to be k = 20. We project down to the theoretical limit of d = O(k log n). We can see from Fig. 5a and 5b that we can get significant speedups in this setting, at negligible degradation in accuracy. Of course, this setting is highly artificial, but serves as a sanity check that compressed NMF works. B B.1 Additional proofs for Section 4.1: Uniqueness for NMF Proof of Part (a) of Theorem 1 Proof. As in Part (b), we will argue about the row space of the matrix H. By the same argument as in Part (b) ,for any alternative factorization M = W 0 H 0 , the row space of H 0 must equal the row space of M , which equals the row space of H. As the row space of H 0 equals the row space of H, therefore H 0 must lie in the row space of H. Hence our goal we will prove that the rows of H are the sparsest vectors in the row space of H, which implies that for any other factorization M = W 0 H 0 , kHk0 < kH 0 k0 . Lemma 4 shows that the number of columns which are have at least one zero entry in a subset S of the rows of H grows proportionately with the size of S. Lemma 4. For any subset S of the rows of H, define N (S) to be the subset of the columns of H which have a non-zero entry in at least one of the rows in S. Then for every subset S of rows of H, |N (S)| ≥ min{4|S|k/5, n/200} with high probability. Proof. Consider a bipartite graph G with r nodes on the left part U corresponding to the r rows of H, and n nodes on the right part V corresponding to the n columns or indices of each factor. The ith node in U has an edge to k nodes in V corresponding to the non-zero indices of the ith row of H. Note that |N (S)| is the neighborhood of the set of nodes S in G. From Part 1 of Lemma 5, the graph G is a (γ1 r, 4/5) expander with failure probability re−βk /n for γ1 = n/(rke5 ) and a fixed constant β > 0. Lemma 5. Randomly choose a bipartite graph G with n1 vertices on the left part U and n2 vertices on the right part V such that every vertex in U has degree D. Then, 1. For every n1 , n2 , n1 < n2 , G is a (γn1 , 4/5) expander for D ≥ c for some fixed constant c n2 −βD /n2 for a fixed constant β > 0. and γn1 = De 5 except with probability n1 e 2. For every n1 , n2 , n2 < n1 , G is a (γn1 , 4/5) expander for D ≥ c log n1 for some fixed n2 constant c and γn1 = De 5 except with probability 1/n2 . As G is a (γ1 r, 4/5) expander, every set of |S| ≤ γ1 r nodes has at least 4|S|k/5 neighbors. A set of size |S| > γ1 r nodes, must include a subset of size γ1 r which has 4n/(5e5 ) ≥ n/200 neighbours, and hence every set of size |S| > γ1 r has at least n/200 neighbors. Therefore, for every subset of S rows, |N (S)| ≥ min{4|S|k/5, n/200} with failure probability re−βk /n. 13 We now show the second part of the proof—that for any subset S of the rows, every linear combination of all S rows must have |N (S)| − |S| non-zero entries. The following simple Lemma is a restatement of a result from from Spielman et al. [42]. We provide a proof in the appendix for completeness. Define a vector x as fully dense if all its entries are non-zero. Lemma 6. Let Ω ∈ {0, 1}n×n be any binary matrix with at least one nonzero in each column. Let U = Ω Y where each entry of Y is drawn independently from N (0, 1). Then with probability one in the random matrix V , the left nullspace of U does not contain a fully dense vector. Proof. Let Ni be the null space of the first i columns of U , we define N0 = Rn . We will show that with probability one, either Ni does not contain a fully dense vector, or rank(Ni ) = n − i. The proof proceeds by induction. Consider i = 1. Consider any full dense vector x ∈ Rn . As every column of U has at least one non-zero entry, the probability that x is orthogonal to the first column U1 is exactly zero. This is because the non-zero entries of U1 are independent Gaussian random variables, hence the probability that any fixed linear combination is zero is exactly zero. Hence rank(N1 ) = rank(N0 ) − 1 = n − 1 with probability 1. Consider the jth step. By the induction hypothesis, either Nj does not contain any fully dense vector, or rank(Nj ) = n − j. If Nj does not contain any fully dense vector, then we are done as this implies that Nj+1 also does not contain a fully dense vector. Let Nj contain a fully dense vector x. The (j + 1)th column Uj+1 of U has at least one non-zero entry, and the entries are independent of the previous columns. The probability that x is orthogonal to Uj+1 is zero, by the previous argument. Hence with probability one, either Nj+1 does not contain a fully dense vector, or rank(Nj+1 ) = rank(Nj+1 ) − 1 = n − j − 1. This proves the induction argument. Therefore, with probability 1, either rank(Nn ) = 0 or Nn does not contain a fully dense vector. Hence the left null space of U does not contain a fully dense vector. We now complete the proof for the first part of Theorem 1. Consider any set S of the rows of H. Consider any linear combination v ∈ Rn of the set S rows, such that all the combination weights x ∈ R|S| are non-zero. By Lemma 4, |N (S)| ≥ min{4|S|k/5, n/200} with failure probability re−βk /n. We claim that v has more than |N (S)| − |S| non zero entries. We prove by contradiction. Assume that v has at most |N (S)| − |S| non zero entries. Consider the submatrix U of H corresponding to the S rows and N (S) columns. If v has |N (S)| − |S| or fewer non zero entries, then there must be a subset S 0 of the |N (S)| columns of U with |S 0 | = |S|, each of which has at least one non-zero entry, and such that the fully dense vector x lies in the left null space of S 0 . But by Lemma 6, the probability of this happening is zero. Hence v has more than |N (S)| − |S| non zero entries. Note that |N (S)| − |S| ≥ 7k/5. Hence any linear combination of more than one row of H has more than 7k/5 non-zero entries with failure probability re−βk /n. Hence the rows of H are the sparsest vectors in the row space of H with failure probability re−βk /n. B.2 Additional proofs for Part (b) of Theorem 1 Lemma 1. For any subset S of the rows of H̃, define N (S) to be the subset of the columns of H̃ which have a non-zero entry in at least one of the rows in S. Then for every subset S of rows of H̃, |N (S)| ≥ min{16|S|kp/25, d/200} with failure probability re−βk /n. Proof. Recall that in the proof of Lemma 4, we considered a bipartite graph corresponding to the r rows and the n indices. After the projection step, the n indices are projected to d dimensions, and the projection matrix is a (γ2 n, 4/5) expander with γ2 = d/(nke5 ). We can now consider a tripartite graph, by adding a third set W with d nodes. We add an edge from a node i in V to node j in W if P (j, i) = 1. For any subset S of rows of H̃, N (S) are the set of nodes in W which are reachable from the nodes S in U . By Lemma 4, the number of neighbors in V of any set S of nodes in U is of size at least min{4|S|k/5, n/200} with failure probability re−βk /n. As the projection matrix P is a (γ2 n, 4/5) expander with γ2 = d/(npe5 ), every subset of size t in V has at least min{4tp/5, d/200} neighbors in W . By combining this argument with Lemma 4, it follows that for every subset of S rows of H, |N (S)| ≥ min{16|S|kp/25, d/200} with failure probability re−βk /n. Proposition 1. Let v = (v1 , . . . , vn ) ∈ Rn be a vector of n independent N (0, 1) random variables. For any subset S ⊆ {1, . . . , n}, let v(S) ∈ R|S| refer to the subset of v corresponding to the indices in S. Consider t such subsets S1 , . . . , St . Let each set Si defines some linear relation αSTi v(Si ) = 0, for 14 some αSi ∈ R|Si | . Assume that the variable vi appear in the set Si . Then the probability distribution of the set of variables {vt+1 , . . . , vn } conditioned on the linear relations defined by S1 , . . . , St is still continuous and its density function has full support. In particular, any linear combination of the set of variables {vt+1 , . . . , vn } has zero probability of being zero. Proof. We prove by induction. For the base case, note that without any linear constraints, the set of n random variables {v1 , · · · , vn } is continuous and has full support as the random variables vi are independent Gaussian. Consider the jth step, when linear constraints defined by the sets S1 , · · · , Sj have been imposed on the variables. We claim that the distribution of the set of random variables {vj+1 , · · · , vn } is continuous and has full support after imposition of the constraints S1 , · · · , Sj . By the induction hypothesis, the distribution of the set of random variables {vj , · · · , vn } is continuous and has full support after imposition of the constraints S1 , · · · , Sj−1 . Note that the linear constraint Sj can be satisfied for any assignment to the subset of variables {vj+1 , · · · , vn } which appear in the constraint Sj , as vj can be chosen appropriately because by the induction hypothesis it has full support conditioned on the previous constraints S1 , · · · , Sj−1 . Hence the probability distribution of the set of variables {vj+1 , · · · , vn } is still continuous and has full support after adding the constraint Sj . Lemma 3. |N (S)| − |S|p ≥ 6kp/5 for |S| > 1 for d ≥ 400p(r + k). Proof. For 2 ≤ |S| ≤ d/(128kp), |N (S)| − |S|p ≥ (16kp/25)|S| − p|S| = 30kp/25 + kp(16|S| − 30)/25 − p|S|   ≥ 6kp/5 + p k(16|S| − 30) − |S| For |S| ≥ 2 and k ≥ 2, k(16|S| − 30) − |S| ≥ 0, hence |N (S)| − |S|p ≥ 6kp/5 for 2 ≤ |S| ≤ d/(128kp). For |S| > d/(128kp), |N (S)| ≥ d/200. Therefore, |N (S)|−|S|p ≥ d/200−rp ≥ 2kp for d ≥ 400p(r + k). C Guaranteed recovery for tensors in the projected space We can prove a stronger result for symmetric, incoherent tensors and guarantee accurate recovery in the compressed space using the tensor power method. The tensor power method is the tensor analog of the matrix power method for finding eigenvectors. It is equivalent to finding a rank 1 factorization using the Alternating Least Squares (ALS) algorithm. Incoherent tensors are tensors for which the factors have small inner products with other. We define the incoherence µ = maxi6=j {|ATi Aj |}. Our guarantees for tensor decomposition follow from the analysis of the tensor power method by Sharan and Valiant [52]. Proposition 2 shows guarantees for recovering one of the true factors, multiple random initializations can then be used for the tensor power method to recover back all the factors (see Anandkumar et al. [53]). Pr Proposition 2. Consider a n-dimensional rank r tensor T = i=1 wi Ai ⊗ Ai ⊗ Ai . Let cmax = max maxi6=j |ATi Aj | be the incoherence between the true factors and γ = w wmin be the ratio of the −2 largest and smallest weight. Assume γ is a constant and µ ≤ o(r ). Consider a projection matrix P ∈ {0, ±1}n×d where every row has exactly p non-zero entries, chosen uniformly and independently at random and the non-zero entries have uniformly and independently distributed signs. We take d = O(r4 log r) and p = O(r2 log r). Let à = AP and T̃ be the d dimensional projection of T , Pk hence T̃ = i=1 wi Ãi ⊗ Ãi ⊗ Ãi . Then, 1. For the original tensor decomposition problem, if the initialization x0 ∈ Rn is chosen uniformly at random from the unit sphere, then with high probability the tensor power method converges to one of the true factors of A (say the first factor A1 ) in O(r(log r + log log n)) steps, and the estimate A01 satisfies k A1 − A01 k22 ≤ O(r max{µ2 , 1/n2 }). 2. For the projected tensor decomposition problem, if the initialization x0 ∈ Rd is chosen uniformly at random from the unit sphere, then with high probability the tensor power method converges to one of the true factors of T̃ (say the first factor Ã1 ) in O(r(log r + log log d)) steps, and the estimate Ã0 satisfies k Ã1 − Ã01 k22 ≤ O(r max{µ2 , 1/d2 }). 15 Proof. Our proof relies on Theorem 3 of Sharan and Valiant [52] and sparse Johnson Lindenstrauss transforms due to Kane and Nelson [19]. Claim 1 of Proposition 2 is Theorem 3 of Sharan and Valiant [52]. To show Claim 2 we need to ensure that the incoherence parameter in the projected space is small. We use the Johnson Lindenstrauss property of our projection matrix to ensure this. A matrix M is regarded as a Johnson Lindenstrauss matrix if it preserves the norm of a randomly chosen unit vector x up to a factor of (1 ± ), with failure probabilty δ. Px [(1 − ) <k M x k22 < (1 + )] > 1 − δ We use the results of Kane and Nelson [19] who show that with high probability a matrix P ∈ {0, ±1}n×d where every row has p non-zero entries, chosen uniformly and independently at random and the non-zero entries have uniformly and independently distributed signs, preserves pairwise distances to within a factor  for d = O(−2 log(1/δ)) and p = Θ(−1 log(1/δ)). It is easy to verify that inner-products are preserved to within an additive error  if the pairwise distances are preserved to within a factors of (1 ± ). By choosing δ = 1/r3 and doing a union bound over all the r2 pairs of factors, the factors are (µ ± ) incoherent in the projected space with high probability if they were µ incoherent in the original space. Setting  = r−2 log−1 r ensures that µ +  = o(r−2 ). Claim 2 now again follows from Theorem 3 of Sharan and Valiant [52]. D Proof of expander property: Lemma 5 In this section, we provide a proof of our claim that randomly chosen projection matrix is an expander with the desired expansion. This is Part 2 of Lemma 5. Part 1 is used in the proof of uniqueness for NMF (Lemma 4). Lemma 5. Randomly choose a bipartite graph G with n1 vertices on the left part U and n2 vertices on the right part V such that every vertex in U has degree D. Then, 1. For every n1 , n2 , n1 < n2 , G is a (γn1 , 4/5) expander for D ≥ c for some fixed constant c n2 −βD and γn1 = De /n2 for a fixed constant β > 0. 5 except with probability n1 e 2. For every n1 , n2 , n2 < n1 , G is a (γn1 , 4/5) expander for D ≥ c log n1 for some fixed n2 constant c and γn1 = De 5 except with probability 1/n2 . Proof. Consider any subset S ⊂ U with |S| ≤ γn1 . Let P(N (S) ⊆ M ) denote the probability of  D|S| | the event that the neighborhood of S is entirely contained in M ⊂ V . P(N (S) ⊆ M ) ≤ |M . n2 We will upper bound the probability of G not being an expander by upper-bounding the probability of each subset S ⊂ U with |S| ≤ γn1 not expanding. Let P(S̄) denote the probability of the neighborhood of S being entirely contained in a subset M ⊂ V with M < α|S|D. By a union bound, X P(G is not a (γn1 , α) expander) ≤ P(S̄) S⊂U |S|≤γn1 X ≤ X P(N (S) ⊆ M ) S⊂U M ⊂V |S|≤γn1 M =α|S|D = γn1 X X X s=1 S⊂U M ⊂V |S|=s M =α|S|D ≤  α|S|D D|S| n2  γn1   X n1 n2  αDs Ds s αDs n2 s=1 16 By using the relation n k  ≤  ne k k , we get: γn1  X n1 e s  n2 e αDs  αDs Ds s αDs n2 s=1 " #s γn 1 X  n1 e  n2 e αD  αDs D = s αDs n2 s=1 P(G is not a (γn1 , α) expander) ≤ ≤ γn1 X xss s=1 where xs =  n1 e s  n2 e αDs αD  αDs n2 D . xs can be bounded as follows-  n e  αDse1/(1−α) (1−α)D 1 s n2  e  αDγn e1/(1−α) (1−α)D 1 ≤ γ n2  n e1+1/(1−α)  1 ≤ Dα(1−α)D n2  n e6  1 ≤ De−D/25 = x n2 xs = where in the last step we set α = 4/5. Hence we can upper bound the probability of G not being an expander as follows— P(G is not a (γn1 , α) expander) ≤ ∞ X s=1 xs ≤ x 1−x The two parts of Lemma 5 follow by plugging in the respective values for n1 , n2 and D. 17
2cs.AI
1 Energy-Aware Wireless Relay Selection in Load-Coupled OFDMA Cellular Networks Lei You1 , Di Yuan1,2, Nikolaos Pappas1, and Peter Värbrand1 1 Department of Science and Technology, Linköping University, Sweden of Information Technology, Uppsala University, Sweden {lei.you; di.yuan; [email protected]} {[email protected]} A. Network Model We consider a heterogeneous cellular network (HetNet) with macro cells (MCs), user equipments (UEs), and relay cells (RCs). Denote by B = {1, 2, . . . , nB } the set of MCs, T = {1, 2, . . . , nT } the set of UEs, and R = {nT + 1, nT + 2, . . . , nT + nR } the set of RCs. We focus on downlink transmission in this paper. For any UE j ∈ T, the set of j’s candidate serving cells is denoted by Cj . For any RC k ∈ R, denote by Ck the set of k’s candidate MCs for establishing the backhaul link. The relay selection aims at 1) choosing a serving cell out of Cj for all j ∈ T, and 2) finding for each RC k ∈ R an MC out of Ck to establish the backhaul link, so as to minimize the network transmission energy. We assume in-band wireless relay transmission [11], which implies no explicit splitting of available time-frequency resource between the backhaul links and the access links. To avoid the loop interference [7], the backhaul and access links should operate on orthogonal resources, meaning that, within the area of each MC, the time-frequency resource units (RUs) utilized by the two types of links do not overlap. Thus some of the links preserve orthogonality with each other. We refer to Figure 1 for an illustration. Frequency Relay techniques provide coverage extension, alleviate fading effects in wireless channels, and lead to more rapid network roll-out to improve the overall system energy efficiency [1]–[3]. In meeting the fast growing demand of mobile communication and the increase of user density, wireless relaying is viewed as a promising technique for the upcoming 5G [4]. It is shown that wireless backhaul technologies have competitive advantages over the fiber-based solution [5]. In 5G, outdoor relays are likely to be densely deployed in urban areas, which may cause the cost of installing fiber-based relay nodes to reach an unacceptable level. For the indoor scenarios, wireless backhauling may provide better flexibility and cost-efficiency, compared to a fiber-based solution [6]. In addition, though fiber-based backhauling has advantage in capacity, reliability, and robustness for transmission, there are cases in which wired backhauling is impossible (e.g. shortterm links for emergency/disaster relief), hence making the wireless solution to be the only option for such scenarios [5]. There are two types of relaying modes in terms of wireless backhauling [6], [7]. One is called “out-band” mode, in which the backhaul and access links operate on different carriers. The other is “in-band” mode, meaning that there is no explicit splitting in frequency resource between backhaul links and access links [6], [7]. Compared to the former, the latter does not require a pre-defined separation in the frequency domain. Moreover, if relays are required to operate on a single carrier, then there is no possibility to make separation for implementing out-band relay mode, and thus in-band relay would be the only option in this case [7]. Recently, studies [8], [9] investigated energy minimization in orthogonal-frequency-division multiple access (OFDMA) networks, under an interference model proposed in [10]. This model characterizes the coupling relationship among the load of cells, which is defined to be the proportion of consumed time-frequency resource in each cell. The model is therefore named as a “load-coupling” model [10]. However, understanding and analyzing load coupling for relays with wireless backhauling is not straightforward. In this paper, we provide significant extensions of the model to wireless relay II. S YSTEM M ODEL Access Time UE 1 RC Time Backhaul Access Time MC Frequency I. I NTRODUCTION scenarios, following the LTE-advanced standard of wireless relays in [6]. We formulate the energy-aware relay selection problem, named MinE, and prove its computational hardness. Moreover, we derive an optimality condition, based on which a relay selection algorithm is proposed for solving MinE. Numerical results show significant improvement on network energy consumption, compared to the standard strategy of strongest-cell association. Frequency Abstract—We investigate transmission energy minimization via optimizing wireless relay selection in orthogonal-frequencydivision multiple access (OFDMA) networks. We take into account the impact of the load of cells on transmission energy. We prove the NP-hardness of the energy-aware wireless relay selection problem. To tackle the computational complexity, a partial optimality condition is derived for providing insights in respect of designing an effective and efficient algorithm. Numerical results show that the resulting algorithm achieves high energy performance. Frequency arXiv:1610.00982v2 [cs.IT] 21 Jun 2017 2 Department UE 2 Time Figure 1. Illustration of the HetNet model. In this example, there are one MC, one RC, and two UEs. UE 1 and UE 2 are served by the RC and MC, respectively. The RC is doing a wireless backhauling with the MC. The used resource for access links and backhaul links is marked by yellow and blue colors, respectively. In time and frequency, the resource allocated to backhauling has orthogonality to the resource used by the access links. In the remaining parts of this paper, we use the term “orthogonal links” to refer to those links using orthogonal time-frequency resource for transmission. Such links are said 2 to be orthogonal to each other. Below, we discuss the characterization of orthogonality. For the sake of presentation, consider given association of UE access and RC backhauling, and denote by Ri the set of RCs with a wireless backhaul connected to MC i for each i ∈ B. The set of UEs served by any cell (MC or RC) i is represented by Ti . Denote by tuple hi, ji any (backhaul or access) link from i to j. For any access link hi, ji with i ∈ B and j ∈ Ti , denote by Lij = {hi, vi : v ∈ Ri ∪ Ti } the set of links that preserve orthogonality to link hi, ji. For k ∈ R, suppose that it is connected with some MC i with a backhaul link. We define Lkj = {hk, vi : v ∈ Tk } ∪ {hi, ki} to be the set of links having the intra-cell orthogonality to the access link hk, ji with j ∈ Tk . And for the backhaul link hi, ki, we define Lik = {hi, vi : v ∈ Ri ∪ Ti } ∪ {hk, vi : v ∈ Tk } the set Lik . We denote by L the set of all backhaul and access links in the network. in (1) and (2). Let n = nT + nR . The proportions of RU consumption for all potential links in the network are represented by the vector x = [ [x11 , . . . , x|C1 |1 ], . . . , [x1n , . . . , x|Cn |n ] ]. By plugging (2) in (1), we get the function of the proportion of consumed RUs by hi, ji in (3) below. For vector x satisfying the cell-load coupling relation in the system model xij = Fij (x) holds for all hi, ji ∈ L. rij (3) Fij (x) = pij gij P MB log2 (1 + puv guj xuv +σ2 ) B. Load-Coupling Model For any UE j ∈ T, we use a variable aj to indicate the UE’s serving cell, i.e. aj = i if UE j is currently served by cell i. Similarly, for any RC k ∈ R, we use ak = i to indicate that RC k is connected to MC i with a wireless backhaul. For any j, aj ∈ Cj for all j ∈ T ∪ R. The vector a then denotes the association among MCs, RCs and UEs. The energy-aware relay selection problem, a.k.a. MinE, is n X [MinE] min M pa j j x a j j (4a) Let rij be the bit rate demand on the link hi, ji. Denote by γij the signal-to-interference-and-noise ratio (SINR) from i to j. Without loss of generality, we use an (RU) to refer to the minimum unit for resource allocation. The bandwidth per RU is denoted by B. In the denominator in (1), B log2 (1 + γij ) computes the achievable bit rate per RU. We assume that there are M RUs in total, such that MB log2 (1 + γij ) is the total achievable bit rate for UE j. In (1), xij is then defined to be the proportion of RUs used by the transmission link hi, ji, among all RUs in cell i. The P sum of the proportion of allocated RUs be the load of cell in any cell i, i.e., j∈Ti xij , is defined to P i, which is bounded by the full load, i.e. j∈Ti xij 6 1 i ∈ B ∪ R. rij (1) xij = MB log2 (1 + γij ) The SINR on any RU allocated to hi, ji is given by (2). In the nominator, pij is the transmission power of an RU of link hi, ji in cell i. The value of gij is the power gain from i to j. In the denominator of (2), recall that xvu represents the proportion of occupied RU by hv, ui in cell v. The value of xvu is then interpreted as the likelihood that hi, ji receives interference from hv, ui on the RU. Note that hv, ui ∈ L\Lij , which is the set of all links that are not required to be orthogonal to hi, ji. pij gij (2) γij = P 2 hv,ui∈L\Lij pvu gvj xvu + σ By (1) and (2), one can observe that a change on xuv for any link hu, vi may cause a variation after the SINR of some link hi, ji, thus leading to a new value of xij , i.e., the required resource consumption for link hi, ji. Thus, the levels of resource consumption are inherently coupled. This relationship, as characterized by (1) and (2), is called loadcoupling. hv,ui∈L\Lij It can be verified by observing the concavity of function Fij (x) that Fij is a standard interference function (SIF) in respect of x [8], [12]. An SIF has the following property: starting from an arbitrary positive x(0) , if the fixed point of function Fij exists, then it is unique, can be iteratively (k) computed by xij = Fij (x(k−1) ) (k > 1). III. P ROBLEM F ORMULATION x,a,r j=1 s.t. x = F(x, a, r) (4b) raj j = dj j ∈ T X dj k ∈ R ra k k = (4c) (4d) j∈Tk X k∈R:ak =i xa k k + X xik + xij 6 1 i∈B (4e) j∈T:aj =i X xkj 6 1 k∈R (4f) j∈T:aj =k aj ∈ Cj j∈T∪R (4g) formulated in (4). The objective of minimizing the energy on all links is given in (4a). Constraint (4b) ensures that x satisfies the coupling relationship in the system model. Constraint (4c) guarantees that the bit rate demand of any UE j ∈ T is satisfied. Constraint (4d) ensures sufficient bit rate on each backhaul link. Constraint (4e) and (4f) are imposed to limit the proportion of consumed RUs in each cell to be no more than 1, corresponding to the full load constraint for MCs and RCs, respectively. Constraint (4g) is imposed such that the selected cell for a backhaul/access link is within the candidate set. IV. C OMPLEXITY A NALYSIS C. Computation of Transmission Energy Theorem 1. MinE is NP-hard. Recall that xij represents the proportion of consumed RU of link hi, ji. Hence, the number of RUs that are used for transmission by hi, ji is Mxij . On each RU, the transmit power is pij . Then the energy consumption on link hi, ji is Mpij xij . We now focus on how to compute xij in the load-coupling model Proof. We reduce the Maximum Independent Set (MIS) problem to MinE. We construct a specific HetNet scenario. For each UE, there is one potential MC and one potential RC as candidate serving cells. Correspondingly, for any undirected graph instance G with N nodes (N > 2) in the MIS problem, 3 we define N UEs. Thus, for any node in G, we have one UE, one MC and one RC. We use 1, 2, . . . , N to index the nodes in graph G. We use the term “neighboring” to refer to the relationship of any two entities that are associated respectively to two neighboring nodes in G. For any node i in G, we set the gain from MC i to UE i to 1.0, the gain from RC i to UE i to 6.0, and the gain from MC i to RC i to 3.0, respectively. For any two neighbouring nodes i and k (meaning that there is an edge between node i and node k) in graph G, we set the gain from RC i to UE k to a small positive value ǫ. The gain values other than the above three cases are set to be negligible, treated as zero. The noise σ2 is set to 1.0. The values of gain and noise can be scaled without affecting the validity of the proof. The transmit powers of MCs and RCs are set to 1.0 and 0.5, respectively.The bit rate demand for any UE is set to 1.0. Due to space limit, we give a sketch of the line of arguments. For any UE i, if we have it served by RC i, then all the resource in RC i is in use. If any RC k neighboring to UE i is activated, then UE i would receive the interference from RC k, leading to that UE i’s demand cannot be satisfied anymore by the access link from RC i to UE i. Hence in a feasible solution, any pair of two neighboring UEs cannot be simultaneously served by their corresponding RCs. In addition, one can verify that it is always better to serve any UE i with RC i rather than MC i for energy saving. Thus we finish the reduction by concluding that, to solve this constructed problem instance is to maximize the number of activated RCs, subject to that at most one RC of any pair of neighboring RCs can be in use. Hence the conclusion. V. E NERGY M INIMIZATION VIA O PTIMALITY C ONDITION This section aims to seek for an effective strategy to deal with the combinatorial nature of MinE. A partial optimality condition is derived below, based on which we propose the relay selection algorithm. A. Optimality Condition (1) construction that x̂(0) = xt , we have x̂âj j = Fâj j (x̂(0) , â) = (0) / t, Gâj j (x̂(0) , â, t ) = Gâj j (xt , â, t ) = xtâj j = x̂âj j . For j ∈ (1) we have x̂âj j = Fâj j (x̂(0) , â). By the construction that x̂(0) = (1) xt and condition 2), x̂âj j = Fâj j (x̂(0) , â) = Fâj j (xt , â) 6 xtâj j = (0) x̂âj j holds. Therefore, we have x̂(1) 6 x̂(0) = xt . (6) We first consider ê. By the monotonicity of F(x, â) in x, we have the following property. For any k > 0, if x(k) 6 x(k−1) , then F(x(k) , â) 6 F(x(k−1) , â) holds, which would directly lead to x(k+1) 6 x(k) . According to the discussion above, we have x(k+1) 6 x(k) for k = 0. We therefore conclude by mathematical induction that x̂ 6 · · · 6 x̂(1) 6 x̂(0) = xt . Thus, we have n X ê 6 pâj j xtâj j (7) j=1 We then consider ě. For any j ∈ / t , we have xtâj j = t Gâj j (x , â, t ). Since l ⊆ t , we conclude j ∈ / l for any j ∈ / t . Therefore, according to the definition of l , we have âj = ǎj for j ∈ / t . Note that in condition 1), x̌ is the starting point for the fixed-point iterations of the function G(x, ǎ, t ). According to the definition of the function Gij in (5), for any j ∈ / t , we have xtâj j = x̌âj j = x̌ǎj j . Thus we conclude P P t . For any j ∈ t , condition 1) = j/ jj ∈t pǎj j xǎP j/ ∈t pâj j xâ jj P t p x < shows that â j j j∈t pǎj j x̌ǎj j . Therefore, we j∈t âj j obtain n X ě > pâj j xtâj j (8) j=1 We introduce some notations for deriving the optimality condition. Denote by â and ǎ any two associations, such that ∃j âj 6= ǎj . Denote l = {j : âj 6= ǎj , j ∈ T ∪ R}. Denote by x̂ and x̌ the fixed points of the function F under â and ǎ, respectively. Denote by ê the transmission Ptotal n energy with association â, i.e. ê = j=1 pâj j x̂âj j , and by ěPthe total transmission energy with association ǎ, i.e. ě = n j=1 pǎj j x̌ǎj j . Definition 1. We define the following function for any i ∈ Cj , and any j ∈ T ∪ R, where t is a non-empty subset of T ∪ R. Gij (x, a, t ) = Proof. The necessity can be proved straightforwardly by letting t = T ∪ R. For the sufficiency, the basic idea is to prove x̂ 6 xt by using Condition 2), and then combine it with Condition 1) to compute respectively ê and ě. Suppose there exists some set t (l ⊆ t ⊆ T ∪ R) satisfying 1) and 2). We consider the fixed-point iterations x̂(k) = F(x̂(k−1) , â) (k > 0). Let x̂(0) = xt . For j ∈ t , since xtâj j = Gâj j (xt , â, t ) = Fâj j (xt , â), combined with the Fij (x, a) j ∈ t xij otherwise (5) Theorem 2. (Optimality Condition) ê < ě if and only if for some set t (l ⊆ t ⊆ T ∪ R) such that: P P t t 1) j∈t pâj j xâj j < j∈t pǎj j x̌ǎj j where any xâj j with t t j ∈ T ∪ R is an element of x , and x is the fixed point of G(x, â, t ), with x̌ being the starting point. 2) Fâj j (xt , â) 6 x̌ǎj j for any j ∈ / t. Hence the conclusion ê < ě. Given any two associations â and ǎ, Theorem 2 serves as a sufficient and necessary condition for checking whether â leads to a better energy performance than ǎ. When t ⊂ T ∪ R, it is called asynchronous fixed-point iterations [12], which is rather faster if |t | ≪ |T ∪ R| and can be implemented in a distributed manner. B. Algorithm Design We use the function Aj (x) = arg mini∈Cj pij xij to assign each j ∈ T∪R to the cell with lowest energy for transmitting to j. Algorithm 1 below takes an initial association ǎ as the input, and outputs the optimized association â. The pre-defined parameter η indicates the maximum number of loop rounds. The vectors a and x are iteratively updated by functions A and F, respectively. Once a(k) = a(k−1) holds for any round k, meaning that there is no update on vector a(k) , the algorithm terminates and returns the optimized association â. In each round, the set l (k) records the positions of all the different elements between a(k) and ǎ. In Lines 9 and 10, the 4 asynchronous fixed-point iterations are applied with respect to set t , with t ⊇ l (k) . Lines 11 and 12 use the optimality condition to check if the new association a(k) would improve the transmission energy, with numerical tolerances ǫ1 and ǫ2 . Algorithm 1: Relay Selection 1 2 3 4 5 6 7 8 9 10 11 a(0) ← ǎ, â ← ǎ; x(0) ← fixed point of F(x, a(0) ); for k ← 1 to η do a(k) ← A(x(k−1) ); if a(k) = a(k−1) then break; x(k) ← F(x(k−1) , a(k) ); l (k) ← {j : a(k) 6= ǎj , j ∈ T ∪ R}; j choose a set t such that l (k) ⊆ t ; (k) xt P ← fixed point of G(x, Pâ, t ), starting from x ; if j∈t pa(k) j xt (k) < j∈t pǎj j x̌ǎj j + ǫ1 aj j 12 j ∧ Fa(k) j (xt , â) 6 x̌ǎjj + ǫ2 then j 13 14 â ← a(k) return â; VI. N UMERICAL AND S IMULATION R ESULTS For simulation, 7 MCs are deployed at the center of a hexagonal region, each with the distance of 500 meters to its neighbor MC. In each hexagonal region, 2 or 4 RCs as well as 20 UEs are randomly placed. The network operates at 2 GHz. Each RU is set to 180 kHz bandwidth and the bandwidth for each cell is 20 MHz. The noise power spectral density is set to −174 dBm/Hz. We remark that the simulation settings follow the 3GPP standardization document [6], to be consistent with expected 5G network scenarios in terms of bandwidth and network density. Also, the path loss of MCs and RCs follow the standard 3GPP urban macro and micro models [13], respectively. With the simulation setup and based on one thousand instances, the peak rate can achieve 1 Gbps; this is consistent with [6] and the expectation of 5G. The average rate, which is naturally lower than the peak one, depends on user density and resource sharing The shadowing coefficients are generated by the log-normal distribution with 6 dB and 3 dB standard deviation [13], for MCs and RCs, respectively. The maximum transmit power levels for MCs and RCs are set to 800 mW and 50 mW per RU, respectively. Simulations are run over multiple data sets and averaged afterwards. Figure 2. User demand versus energy cost. In Figure 2, there are two network scenarios, in which 2 and 4 RCs are deployed in each hexagonal region, respectively. As references for comparison, each UE (or RC) j is associated with the cell in Cj with the best received power. As expected, the 4-RCs case benefits more on energy performance via relay selection, compared to the 2-RCs case, since that each UE has more options for choosing its serving cell in the former. For these two cases, the improvements by using the proposed algorithm are 34% and 47%, respectively. Furthermore, the improvement becomes larger, with the increase of the user demand, which indicates that an appropriate relay selection is crucial for a network with heavy data traffic. We remark that for the best-received power based relay selection, the network can still also benefit from deploying more RCs on energy cost. In other words, the energy cost can be reduced by deploying more RCs, without optimizing the relay selection. However, one can see from the numerical results that the corresponding gain is far less compared to optimizing the relay selection. VII. C ONCLUSION This paper has provided insights as well as an algorithm for energy-aware relay selection in load-coupled OFDMA cellular networks. The algorithm exhibits good performance for energy saving. ACKNOWLEDGEMENT This work has been supported by the Swedish Research Council and the Linköping-Lund Excellence Center in Information Technology (ELLIIT), Sweden, and the European Union Marie Curie project MESH-WISE (FP7-PEOPLE2012-IAPP: 324515), DECADE (H2020-MSCA-2014-RISE: 645705), and WINDOW (FP7-MSCA-2012-RISE: 318992). The work of D. Yuan has been carried out within European FP7 Marie Curie IOF project 329313. R EFERENCES [1] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. K. Soong, and J. C. Zhang, “What will 5G be?” IEEE Journal on Selected Areas in Communications, vol. 32, no. 6, pp. 1065–1082, 2014. [2] D. S. Michalopoulos, H. A. Suraweera, and R. Schober, “Relay selection for simultaneous information transmission and wireless energy transfer: A tradeoff perspective,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 8, pp. 1578–1594, 2015. [3] Z. Sheng, J. Fan, C. H. Liu, V. C. M. Leung, X. Liu, and K. K. Leung, “Energy-efficient relay selection for cooperative relaying in wireless multimedia networks,” IEEE Transactions on Vehicular Technology, vol. 64, no. 3, pp. 1156–1170, 2015. [4] “5g radio access,” Ericsson, Tech. Rep., 2014. [5] M. Dohler, T. Nakamura, A. Osseiran, J. F. Monserrat, O. Queseth, and P. Marsch, 5G Mobile and Wireless Communications Technology. Cambridge University Press, 2016. [6] “3gpp tr 36.116,” 3GPP, Tech. Rep. V13.0.1, 2016. [7] J. Gora and S. Redana, “In-band and out-band relaying configurations for dual-carrier LTE-advanced system,” in Proceedings of IEEE PIMRC, 2011, pp. 1820–1824. [8] R. L. G. Cavalcante, S. Stanczak, M. Schubert, A. Eisenblaetter, and U. Tuerke, “Toward energy-efficient 5G wireless communications technologies: Tools for decoupling the scaling of networks from the growth of operating power,” IEEE Signal Processing Magazine, vol. 31, no. 6, pp. 24–34, 2014. [9] C. K. Ho, D. Yuan, L. Lei, and S. Sun, “Power and load coupling in cellular networks for energy optimization,” IEEE Transactions on Wireless Communications, vol. 14, no. 1, pp. 509–519, 2015. [10] I. Siomina and D. Yuan, “Analysis of cell load coupling for lte network planning and optimization,” IEEE Transactions on Wireless Communications, vol. 11, no. 6, pp. 2287–2297, 2012. [11] “3gpp tr 36.913,” 3GPP, Tech. Rep. V13.0.0, 2016. [12] R. D. Yates, “A framework for uplink power control in cellular radio systems,” IEEE Journal on Selected Areas in Communications, vol. 13, no. 7, pp. 1341–1347, 1995. [13] “3gpp tr 36.814,” 3GPP, Tech. Rep. V9.0.0, 2010.
7cs.IT
arXiv:1612.03408v1 [math.AC] 11 Dec 2016 COHEN-MACAULAY PROPERTIES UNDER THE AMALGAMATED CONSTRUCTION Y. AZIMI, P. SAHANDI, AND N. SHIRMOHAMMADI A BSTRACT. Let A and B be commutative rings with unity, f : A → B a ring homomorphism and J an ideal of B. Then the subring A ⊲⊳ f J := {(a, f (a) + j)|a ∈ A and j ∈ J} of A × B is called the amalgamation of A with B along J with respect to f . In this paper, we study the property of CohenMacaulay in the sense of ideals which was introduced by Asgharzadeh and Tousi, a general notion of the usual Cohen-Macaulay property (in the Noetherian case), on the ring A ⊲⊳ f J. Among other things, we obtain a generalization of the well-known result that when the Nagata’s idealization is Cohen-Macaulay. 1. I NTRODUCTION The theory of Cohen-Macaulay rings is a major area of study in commutative algebra and algebraic geometry. From the appearance of the notion of Cohen-Macaulayness, this notion admits a rich theory in commutative Noetherian rings. There have been attempts to extend this notion to commutative non-Noetherian rings, since Glaz raised the question that whether there exists a generalization of the notion of Cohen-Macaulayness with certain desirable properties to nonNoetherian rings [13], [14]. In order to provide an answer to the question of Glaz [14, Page 220], recently several notions of Cohen-Macaulayness for non-Noetherian rings and modules were introduced in [15], [16], and [2]. Among those is the Cohen-Macaulay in the sense of A , introduced by Asgharzadeh and Tousi [2], where A is a non-empty subclass of ideals of a commutative ring (the definition will be given later in Section 2). In [7] and [8], D’Anna, Finocchiaro, and Fontana have introduced the following new ring construction. Let A and B be commutative rings with unity, let J be an ideal of B and let f : A → B be a ring homomorphism. The amalgamation of A with B along J with respect to f is the following subring A ⊲⊳ f J := {(a, f (a) + j)|a ∈ A and j ∈ J} of A × B. This construction generalizes the amalgamated duplication of a ring along an ideal (introduced and studied in [6], [10]). Moreover, several classical constructions such as the Nagata’s idealization (cf. [19, page 2], [17, Chapter VI, Section 25]), the A + X B[X ] and the A + X B[[X ]] constructions can be studied as particular cases of this new construction (see [7, Examples 2.5 and 2.6]). Below, we review briefly some known results about the behavior of Cohen-Macaulayness under the amalgamated construction and its particular cases. Let M be an A-module. In 1955, Nagata introduced a ring extension of A called the trivial extension of A by M (or the idealization of M in A), denoted here by A ⋉ M. Now, assume that A is Noetherian local and that M is finitely generated. It is well known that the trivial extension A ⋉ M is Cohen-Macaulay if and only if A is Cohen-Macaulay and M is maximal Cohen-Macaulay, see [1, Corollary 4.14]. 2010 Mathematics Subject Classification. 13A15, 13C14, 13C15. Key words and phrases. Amalgamated algebra, Cohen-Macaulay ring, Koszul grade, Non-Noetherian ring. 1 2 Y. AZIMI, P. SAHANDI, AND N. SHIRMOHAMMADI Let A be a Noetherian local ring and I be an ideal of A. Consider the amalgamated duplication A ⊲⊳ I := {(a, a + i)|a ∈ A and i ∈ I} as in [6], [10]. The properties of being Cohen-Macaulay, generalized Cohen-Macaulay, Gorenstein, quasi-Gorenstein, (Sn ), (Rn ) and normality under the construction of amalgamated duplication were studied further in many research papers such as [6], [9], [3], and [21]. In [9], under the condition that A is Cohen-Macaulay (Noetherian local) and J is a finitely generated A-module, it is observed that A ⊲⊳ f J is a Cohen-Macaulay ring if and only if it is a Cohen-Macaulay A-module if and only if J is a maximal Cohen-Macaulay module. Then, in [22], assuming (A, m) is Noetherian local, J is contained in the Jacobson radical of B such that depthA J < ∞ and that f −1 (q) 6= m, for each q ∈ Spec(B)\V (J), it is shown that A ⊲⊳ f J is CohenMacaulay if and only if A is Cohen-Macaulay and J is a big Cohen-Macaulay A-module (i.e. depthA J = dim A). The next natural step is to seek when the amalgamated algebra A ⊲⊳ f J is Cohen-Macaulay without Noetherian assumption. In this paper, we investigate the property of Cohen-Macaulay in the sense of ideals (resp. maximal ideals, finitely generated ideals) on the amalgamation. More precisely, in Section 2, we recall some essential definitions and results on which we base our approach. In Section 3, we fix our notation and give some elementary results on the behavior of the Koszul grade with respect to amalgamation. In Section 4, we classify some necessary and sufficient conditions for the amalgamated algebra A ⊲⊳ f J to be Cohen-Macaulay in the sense of ideals (resp. maximal ideals, finitely generated ideals) (Theorems 4.1, 4.6 and 4.11). Among the applications of our results are the classification of when the trivial extension A ⋉ M and the amalgamated duplication A ⊲⊳ I are Cohen-Macaulay in the sense of ideals (Corollaries 4.8 and 4.16). 2. P RELIMINARIES To facilitate the reading of the paper, we recall in this section some preliminary definitions and properties to be used later. Let b be a finitely generated ideal of a commutative ring A and M be an A-module. Assume that b is generated by the sequence x = x1 , . . . , xℓ . We denote the Koszul complex related to x by K• (x). The Koszul grade of b on M is defined by K. gradeA (b, M) := inf{i ∈ N ∪ {0}|H i (HomA (K• (x), M)) 6= 0}. It follows from [5, Corollary 1.6.22] and [5, Proposition 1.6.10(d)] that this does not depend on the choice of generating sets of b. Let a be an arbitrary ideal of A. One can then define the Koszul grade of a on M by setting K. gradeA (a, M) := sup{K. gradeA (b, M)|b is a finitely generated subideal of a}. In view of [5, Proposition 9.1.2(f)], this definition coincides with the original one for finitely generated ideals. In particular, when (A, m) is local Noetherian, depthA M was defined by K. gradeA (m, M) in [5, Section 9.1]. The Čech grade of b on M is defined by Č. gradeA (b, M) := inf{i ∈ N ∪ {0}|Hxi (M) 6= 0}. Here Hxi (M) denotes the i-th cohomology of the Čech complex of M related to x. It follows from [16, Proposition 2.1(e)] that Hxi (M) is independent of the choice of sequence of generators for b. One can then define Č. gradeA (a, M) := sup{Č. gradeA (b, M)|b is a finitely generated subideal of a}. By virtue of [16, Proposition 2.7], one has Č. gradeA (a, M) = K. gradeA (a, M). COHEN-MACAULAY 3 Let p a prime ideal of R. By htM p, we mean the Krull dimension of the Rp -module Mp . Also, htM a := inf{htM p|p ∈ SuppA (M) ∩V (a)}. Let A be a non-empty subclass of the class of all ideals of the ring A and M be an A-module. We say that M is Cohen-Macaulay in the sense of A if htM (a) = K. gradeA (a, M) for all ideals a in A , see [2, Definition 3.1]. The classes we are interested in are the class of all maximal ideals, the class of all ideals and the class of all finitely generated ideals. Assume that A is Noetherian. It is well-known that A is Cohen-Macaulay (in the sense of the original definition in the Noetherian setting) if and only if it is Cohen-Macaulay in the sense of ideals (resp. maximal ideals, finitely generated ideals) see [5, Corollary 2.1.4]. 3. T HE KOSZUL GRADE ON AMALGAMATION Let us fix some notation which we shall use frequently throughout the paper: A, B are two commutative rings with unity, f : A → B is a ring homomorphism, and J denotes an ideal of B. So that J is an A-module via the homomorphism f . In the sequel, we consider the contraction and extension with respect to the natural embedding ιA : A → A ⊲⊳ f J defined by ιA (x) = (x, f (x)), for every x ∈ A. In particular, for every ideal a of A, ae means a(A ⊲⊳ f J). This section is devoted to prove some lemmas on the behavior of the Koszul grade on amalgamation. These lemmas provide the key for some crucial arguments later in this paper. In the proof of the next lemma, we use Hi (x, M) to denote the ith Koszul homology of an A-module M with respect to a finite sequence x ⊂ A. Lemma 3.1. Let the notation and hypotheses be as in the beginning of this section. Then (i) for any finitely generated ideal b of A, one has the equality K. gradeA⊲⊳ f J (be , A ⊲⊳ f J) = min{K. gradeA (b, A), K. gradeA (b, J)}. (ii) for any ideal a of A, one has the inequality K. gradeA⊲⊳ f J (ae , A ⊲⊳ f J) ≤ min{K. gradeA (a, A), K. gradeA (a, J)}. Proof. Assume that b is a finitely generated ideal of A and that b is generated by a finite sequence x of length ℓ. Then, using [2, Proposition 2.2(iv)] together with [16, Proposition 2.7], we have K. gradeA⊲⊳ f J (be , A ⊲⊳ f J) = K. gradeA (b, A ⊲⊳ f J) = sup{k ≥ 0|Hℓ−i (x, A ⊲⊳ f J) = 0 for all i < k} = sup{k ≥ 0|Hℓ−i (x, A) ⊕ Hℓ−i(x, J) = 0 for all i < k} = min{K. gradeA (b, A), K. gradeA (b, J)}. For the third equality, one notices that the amalgamation A ⊲⊳ f J, as an A-module, is isomorphic to the direct sum of A ⊕ J using [7, Lemma 2.3(4)]. This proves (1). To obtain (2), assume that a is an ideal of A. Let Σ be the class of all finitely generated subideals of a. It follows from the definition that K. gradeA (a, A ⊲⊳ f J) = sup{K. gradeA (b, A ⊲⊳ f J)|b ∈ Σ} = sup{min{K. gradeA (b, A), K. gradeA (b, J)}|b ∈ Σ} ≤ min{sup{K. gradeA (b, A)|b ∈ Σ}, sup{K. gradeA (b, J)|b ∈ Σ}} = min{K. gradeA (a, A), K. gradeA (a, J)}. 4 Y. AZIMI, P. SAHANDI, AND N. SHIRMOHAMMADI Again, using this in conjunction with [2, Proposition 2.2(iv)], one deduces that K. gradeA⊲⊳ f J (ae , A ⊲⊳ f J) = K. gradeA (a, A ⊲⊳ f J) ≤ min{K. gradeA (a, A), K. gradeA (a, J)}.  Lemma 3.2. Assume that A is Cohen-Macaulay in the sense of (finitely generated) ideals and K. gradeA (a, J) ≥ ht a for every (finitely generated) ideal a of A. Then K. gradeA⊲⊳ f J (ae , A ⊲⊳ f J) = K. gradeA (a, A) ≤ K. gradeA (a, J) for any (finitely generated) ideal a of A. Proof. Assume that a is a (finitely generated) ideal of A and let Σ be the class of all finitely generated subideals of a. Then, as in the proof of Lemma 3.1, again, using [2, Proposition 2.2(iv)], we have K. gradeA⊲⊳ f J (ae , A ⊲⊳ f J) = K. gradeA (a, A ⊲⊳ f J) = sup{K. gradeA (b, A ⊲⊳ f J)|b ∈ Σ} = sup{min{K. gradeA (b, A), K. gradeA (b, J)}|b ∈ Σ} = sup{K. gradeA (b, A)|b ∈ Σ} = K. gradeA (a, A). The forth equality follows from [2, Lemma 3.2] and our assumption. This completes the proof.  The following lemma is a slight modification of [2, Lemma 3.2]. Lemma 3.3. Let a be an ideal of A and M be an A-module. (i) Let A be quasi-local with the maximal ideal m. If K. gradeA (m, M) < ∞, then K. gradeA (m, M) ≤ dim A. (ii) If, for every minimal prime ideal p over a, K. gradeA (pRp , Mp ) < ∞ (e.g. when M is finitely generated), then K. gradeA (a, M) ≤ ht a. Proof. (1) Using [16, Proposition 2.7], it is enough for us to show that Č. gradeA (m, M) ≤ dim A. In order to prove this, assume that dim A < ∞ and let x be a finite sequence of elements in m. It follows from [16, Proposition 2.4] that Č. gradeA (x, M) ≤ dim A. Therefore Č. gradeA (m, M) ≤ dim A. (2) Notice, by [2, Proposition 2.2(iii)], that K. gradeA (a, M) < ∞. Then, by [2, Proposition 2.2(ii) and (iii)], one may assume that A is quasi-local with the maximal ideal m. Now (1) completes the proof.  4. M AIN RESULTS Assume that A is Noetherian local, and that J is contained in the Jacobson radical of B and it is a finitely generated A-module. Recall that a finitely generated module M over A is called a maximal Cohen-Macaulay A-module if depthA M = dim A. Note that, in this circumstance, depthA M equals the common length of the maximal M-regular sequences in the maximal ideal of A. In [22, Corollary 2.5], it is shown that A ⊲⊳ f J is Cohen-Macaulay if and only if A is Cohen-Macaulay and J is a maximal Cohen-Macaulay A-module. Our first main result improves this corollary by removing the Noetherian assumption. The reader should be aware that when we say A ⊲⊳ f J is Cohen-Macaulay in the sense of a non-empty class of ideals, we mean A ⊲⊳ f J is Cohen-Macaulay as a ring. COHEN-MACAULAY 5 Theorem 4.1. Assume that (A, m) is quasi-local such that m is finitely generated. Assume that J is contained in the Jacobson radical of B and it is finitely generated as an A-module. Then A ⊲⊳ f J is Cohen-Macaulay (ring) in the sense of maximal ideals if and only if A is Cohen-Macaulay in the sense of maximal ideals and K. gradeA (m, J) = dim A. Proof. Assume that m is generated by the sequence a = a1 , . . . , an and that J is generated by the sequence b = b1 , . . . , bm . Hence m′ f = m ⊲⊳ f J, the unique maximal ideal of A ⊲⊳ f J [9, Corollary 2.7(3)], is generated by the sequence c = (a1 , f (a1 )), p . . . , (an , f (an )), (0, bp 1 ), . . . , (0, bm ). Notice, f by [9, Corollary 3.2 and Remark 3.3], that one has ιA (a)(A ⊲⊳ J) = m(A ⊲⊳ f J) = m′ f = c(A ⊲⊳ f J). Therefore K. gradeA⊲⊳ f J (m′ f , A ⊲⊳ f J) = Č. gradeA⊲⊳ f J (m′ f , A ⊲⊳ f J) = inf{i|Hci (A ⊲⊳ f J) 6= 0} = inf{i|HιiA (a) (A ⊲⊳ f J) 6= 0} = inf{i|Hai (A ⊲⊳ f J) 6= 0} = inf{i|Hai (A) ⊕ Hai (J) 6= 0} = min{Č. gradeA (m, A), Č. gradeA (m, J)} = min{K. gradeA (m, A), K. gradeA (m, J)}. The first equality obtains by p [16, Proposition 2.7], the third equality follows from [16, Proposition 2.1(e)] in conjunction with ιA (a)(A ⊲⊳ f J) = c(A ⊲⊳ f J), the forth equality deduces from [16, Proposition 2.1(f)], and the fifth equality holds since as an A-module A ⊲⊳ f J ∼ = A ⊕ J [7, Lemma 2.3(4)]. Consequently, the conclusion yields by the equality K. gradeA⊲⊳ f J (m′ f , A ⊲⊳ f J) = min{K. gradeA (m, A), K. gradeA (m, J)} together with dim A ⊲⊳ f J = dim A. This last equality holds true, since A ⊲⊳ f J is integral over A (see [8, Proposition 4.2]).  Corollary 4.2. (See [22, Corollary 2.5]) Assume that A is Noetherian local, and that J is contained in the Jacobson radical of B and it is finitely generated as an A-module. Then A ⊲⊳ f J is CohenMacaulay (ring) if and only if A is Cohen-Macaulay and J is a maximal Cohen-Macaulay Amodule. The key to the next theorem is given by the following elementary lemmas. Their proofs are straightforward; so that we omit them. Recall from [9, Corollary 2.5] that the prime ideals of A ⊲⊳ f J are of the type q f or p′ f , for q varying in Spec(B)\V (J) and p in Spec(A), where p′ f :=p ⊲⊳ f J := {(p, f (p) + j)|p ∈ p, j ∈ J}, q f :={(a, f (a) + j)|a ∈ A, j ∈ J, f (a) + j ∈ q}. Lemma 4.3. Assume that a is an ideal of A, p is a prime ideal of A and that q is a prime ideal of B. Then (i) ae ⊆ p′ f if and only if a ⊆ p. (ii) ae ⊆ q̄ f if and only if f (a) ⊆ q. In the sequel, we use Nil(B) to denote the nil radical of the ring B. Lemma 4.4. Assume that a is an ideal of A, J ⊆ Nil(B) and that p is a prime ideal of A. Then 6 Y. AZIMI, P. SAHANDI, AND N. SHIRMOHAMMADI (i) p ∈ Min(a) if and only if p′ f ∈ Min(ae ). (ii) ht a = ht ae . (iii) Min(pe ) = {p′ f }. In particular ht pe = ht p′ f . Proposition 4.5. Let A be a non-empty class of ideals of A. Assume that ht ae ≥ ht a for each a ∈ A . If A ⊲⊳ f J is Cohen-Macaulay (ring) in the sense of A e := {ae |a ∈ A }, then A is CohenMacaulay in the sense of A and K. gradeA (a, J) ≥ ht a for each a ∈ A . Proof. Assume that a ∈ A . Then, by Lemma 3.1(2), we have K. gradeA (a, A) ≥ K. gradeA⊲⊳ f J (ae , A ⊲⊳ f J) = ht ae ≥ ht a ≥ K. gradeA (a, A). Thus K. gradeA (a, A) = ht a. This means that A is Cohen-Macaulay in the sense of A . Similarly, one obtains K. gradeA (a, J) ≥ ht a.  It is not clear for us whether, in general, the inequality ht ae ≥ ht a holds for each a ∈ A . However, under the assumption J ⊆ Nil(B), for each ideal a, one has the equality ht ae = ht a by Lemma 4.4. The second main result of the paper is the following theorem. Theorem 4.6. Assume that J ⊆ Nil(B). Then A ⊲⊳ f J is Cohen-Macaulay (ring) in the sense of ideals if and only if A is Cohen-Macaulay in the sense of ideals and K. gradeA (a, J) ≥ ht a for every ideal a of A. Proof. One implication follows from Proposition 4.5 and Lemma 4.4(2). Then, to prove the converse, assume that A is Cohen-Macaulay in the sense of ideals and K. gradeA (a, J) ≥ ht a for every ideal a of A. Let a be an ideal of A. First observe, by Lemmas 3.2 and 4.4(2), that K. gradeA⊲⊳ f J (ae , A ⊲⊳ f J) = K. gradeA (a, A) = ht a = ht ae . Now, let I be an arbitrary proper ideal of A ⊲⊳ f J. Then, by [20, Theorem 16 of Chapter 5], there exists a prime ideal P of A ⊲⊳ f J containing I such that K. gradeA⊲⊳ f J (I, A ⊲⊳ f J) = K. gradeA⊲⊳ f J (P, A ⊲⊳ f J). Notice that P = p′ f for some prime ideal p of A by [9, Corollaries 2.5 and 2.7]. Hence, by Lemma 4.4(3), one has ht I ≥ K. gradeA⊲⊳ f J (I, A ⊲⊳ f J) = K. gradeA⊲⊳ f J (p′ f , A ⊲⊳ f J) ≥ K. gradeA⊲⊳ f J (pe , A ⊲⊳ f J) = ht pe = ht p′ f ≥ ht I. Therefore A ⊲⊳ f J is Cohen-Macaulay in the sense of ideals.  The next example shows that, if, in the above theorem, the hypothesis J ⊆ Nil(B) is dropped, then the corresponding statement is no longer always true. COHEN-MACAULAY 7 Example 4.7. Let k be a field and X ,Y are algebraically independent indeterminates over k. Set A := k[[X ]], B := k[[X ,Y ]] and let J := (X ,Y ). Let f : A → B be the inclusion. Note that A is CohenMacaulay and K. gradeA (a, J) = ht a for every ideal a of A. Indeed, if a is a non-zero proper ideal of A, and a is a non-zero element of a, then one has 1 ≤ K. gradeA (aA, J) ≤ K. gradeA (a, J) ≤ htJ a ≤ ht a ≤ 1. The first and second inequalities follow from [5, Proposition 9.1.2(a),(f)], respectively. While the third inequality follows from Lemma 3.3(ii), the others are obvious. However, A ⊲⊳ f J which is isomorphic to k[[X ,Y, Z]]/(Y, Z) ∩ (X −Y ) is not Cohen-Macaulay. Let M be a A-module. Then A ⋉ M denotes the trivial extension of A by M. It should be noted that 0 ⋉ M is an ideal in A ⋉ M and (0 ⋉ M)2 = 0. As in [7, Example 2.8], if B := A ⋉ M, J := 0 ⋉ M, and f : A → B be the natural embedding, then A ⊲⊳ f J ∼ = A ⋉ M. Hence the next result follows from Theorem 4.6. With it, we not only offer an application of Theorem 4.6, but we also provide a generalization of the well-known characterization of when the trivial extension is Cohen-Macaulay in the Noetherian (local) case, see [1, Corollary 4.14]. Corollary 4.8. Let M be an A-module. Then A ⋉ M is Cohen-Macaulay (ring) in the sense of ideals if and only if A is Cohen-Macaulay in the sense of ideals and K. gradeA (a, M) ≥ ht a for every ideal a of A. Assume that A is Noetherian. In [22, Corollary 2.7], the authors showed that A is CohenMacaulay if A ⊲⊳ f J is Cohen-Macaulay provided that f −1 (q) 6= m for each q ∈ Spec(B)\V (J) and each m ∈ Max(A). In the following corollary we improve the conclusion of the mentioned result in the circumstance that J ⊆ Nil(B). Assume that A is Noetherian and M is a finitely generated A-module. It can be seen that ht a ≤ gradeA (a, M)(= K. gradeA (a, M)) for every ideal a of A if and only if Mp is maximal CohenMacaulay for every prime ideal p ∈ SuppA (M). Indeed, assume that Mp is maximal CohenMacaulay for every prime ideal p ∈ SuppA (M), and a is an ideal of R. There is nothing to prove if aM = M, since in this case gradeA (a, M) = ∞. So assume that aM 6= M. Then using [5, Proposition 1.2.10(a)], there is a prime ideal p containing a such that gradeA (a, M) = depth Mp . Hence by assumption one has gradeA (a, M) = depth Mp = dim Rp = ht p ≥ ht a. To prove the converse assume that p ∈ SuppA (M). Then again in view of [5, Proposition 1.2.10(a)], one has dim Rp = ht p ≤ gradeA (p, M) ≤ depth Mp . Thus Mp is maximal Cohen-Macaulay. Corollary 4.9. Assume that A is Noetherian, and that J ⊆ Nil B is finitely generated as an Amodule. Then A ⊲⊳ f J is Cohen-Macaulay if and only if A is Cohen-Macaulay and Jp is maximal Cohen-Macaulay for every prime ideal p ∈ SuppA (J). The next proposition provides other sufficient and necessary condition for A ⊲⊳ f J to be CohenMacaulay in the sense of ideals. Proposition 4.10. With the notation and hypotheses of the beginning of Section 3, one has (i) Let A be a non-empty class of ideals of A. Assume that ht f −1 (q) ≤ ht q for every q ∈ Spec(B)\V (J). If A ⊲⊳ f J is Cohen-Macaulay (ring) in the sense of A e := {ae |a ∈ A }, then A is Cohen-Macaulay in the sense of A and K. gradeA (a, J) ≥ ht a for every a ∈ A . (ii) Assume that ht P ≤ ht P c for every P ∈ Spec(A ⊲⊳ f J), where the contraction P c is given with respect to ιA . If A is Cohen-Macaulay in the sense of ideals and K. gradeA (a, J) ≥ ht a for every ideal a of A, then A ⊲⊳ f J is Cohen-Macaulay (ring) in the sense of ideals. Proof. (1) Assume that A ⊲⊳ f J is Cohen-Macaulay ring in the sense of A e . In order to prove the assertion, by Proposition 4.5, it is enough for us to show that ht ae ≥ ht a for each ideal a ∈ A . To 8 Y. AZIMI, P. SAHANDI, AND N. SHIRMOHAMMADI this end, assume that a ∈ A and that P is a prime ideal of A ⊲⊳ f J containing ae . In view of [9, Corollaries 2.5 and 2.7], one has the following three cases to consider. Case 1. If P = p′ f for some prime ideal p of A such that f −1 (J) * p, then ht P = ht p′ f = dim(A ⊲⊳ f J)p′ f = dim Ap = ht p ≥ ht a, by [9, Proposition 2.9] and Lemma 4.3(1). Case 2. If P = p′ f for some prime ideal p of A such that f −1 (J) ⊆ p, then ht P = ht p′ f = dim(A ⊲⊳ f J)p′ f = dim(Ap ⊲⊳ fp JSp ) = max{dim Ap , dim( fp (Ap ) + JSp )} ≥ dim Ap = ht p ≥ ht a, by [9, Proposition 2.9], [8, Proposition 4.1] and Lemma 4.3(1), where Sp := f (A\p) + J. Case 3. If P = q̄ f for some prime ideal q of B, then ht P = ht q̄ f = dim(A ⊲⊳ f J)q̄ f = dim Bq = ht q ≥ ht f −1 (q) ≥ ht a. The third equality follows by [9, Proposition 2.9], the first inequality holds by assumption, and the second one follows by Lemma 4.3. This completes the proof of the first assertion. (2) Assume that A is Cohen-Macaulay in the sense of ideals and that K. gradeA (a, J) ≥ ht a for every ideal a of A. As indicated by [2, Theorem 3.3], it is enough to show that K. gradeA⊲⊳ f J (P, A ⊲⊳ f J) = ht P for every prime ideal P of A ⊲⊳ f J. Let P be a prime ideal of A ⊲⊳ f J. Then ht P ≤ ht P c = K. gradeA (P c , A) = K. gradeA⊲⊳ f J (P ce , A ⊲⊳ f J) ≤ K. gradeA⊲⊳ f J (P, A ⊲⊳ f J) ≤ ht P. The first inequality holds by assumption, the second inequality is by [5, Proposition 9.1.2(f)], and the last one is by Lemma 3.3(2), and the second equality follows from Lemma 3.2.  We are now in a position to present our third main result. Theorem 4.11. With the notation and hypotheses of the beginning of Section 3, the following statements hold: COHEN-MACAULAY 9 (i) Let A be a non-empty class of ideals of A. Assume that the homomorphism f : A → B satisfies the going-down property. If A ⊲⊳ f J is Cohen-Macaulay (ring) in the sense of A e := {ae |a ∈ A }, then A is Cohen-Macaulay in the sense of A and K. gradeA (a, J) ≥ ht a for every a ∈ A . (ii) Assume that ιA : A → A ⊲⊳ f J is an integral ring extension. If A is Cohen-Macaulay in the sense of ideals and K. gradeA (a, J) ≥ ht a for every ideal a of A, then A ⊲⊳ f J is CohenMacaulay (ring) in the sense of ideals. Proof. It is well-known that ht f −1 (q) ≤ ht q for every q ∈ Spec(B) if the homomorphism f : A → B satisfies the going-down property by [18, Exercise 9.9]. In the light of Proposition 4.10, this proves (1). To prove (2), keeping in mind Proposition 4.10, notice that, for every P ∈ Spec(A ⊲⊳ f J), the inequality ht P ≤ ht P c holds since ιA : A → A ⊲⊳ f J is an integral ring extension [18, Exercise 9.8], where the contraction P c is given with respect to ιA .  Note that Example 4.7 also shows that we can not neglect the integral assumption in part two of the above theorem. Example 4.12. (i) Assume that A is an integral domain with dim A ≤ 1 and that B is an integral domain containing A. Assume that J is an ideal of B which is finitely generated A-module. Hence, as in Example 4.7, one has K. gradeA (a, J) = ht a for every proper ideal a of A. Notice that A is Cohen-Macaulay in the sense of ideals by [2, Page 2305]. Therefore one obtains that A ⊲⊳ f J is Cohen-Macaulay in the sense of ideals by Theorem 4.11. (ii) To construct a concrete example for (1), set A := Q + X R[X ], where Q is the field of rational numbers, R is the field of real numbers and X is an indeterminate over R. √ It is easy to see that A is a one dimensional non integrally closed domain. Put B := A[ 2], which is finitely generated as an A-module. Let J be a finitely generated ideal of B. Consequently, by (1), A ⊲⊳ f J is Cohen-Macaulay in the sense of ideals. (iii) Assume that A is a valuation domain, B an arbitrary integral domain containing A and that J is an ideal of B. Then by [11, Corollary 4] and [12, Theorem 1], the inclusion homomorphism f : A ֒→ B satisfies the going-down property. Also notice, by [2, Proposition 3.12], that A is Cohen-Macaulay in the sense of ideals if and only if dim A ≤ 1. Further, assume that dim A > 1. Then A ⊲⊳ f J can never be Cohen-Macaulay in the sense of ideals by Theorem 4.11. In particular, the composite ring extensions A + X B[X ] and A + X B[[X ]] can never be Cohen-Macaulay in the sense of ideals. Note that if J is finitely generated as an A-module, then ιA : A → A ⊲⊳ f J is an integral ring extension, and that, in this case, K. gradeA (a, J) ≤ ht a for every ideal a of A by Lemma 3.3. Hence we can make the following corollaries right away. Corollary 4.13. Assume that the homomorphism f : A → B satisfies the going-down property and that J is finitely generated as an A-module. Then A ⊲⊳ f J is Cohen-Macaulay (ring) in the sense of ideals if and only if A is Cohen-Macaulay in the sense of ideals and K. gradeA (a, J) = ht a for every ideal a of A. Corollary 4.14. Assume that f : A → B is a monomorphism of integral domains, and A is integrally closed and that B is integral over A. Then A ⊲⊳ f J is Cohen-Macaulay (ring) in the sense of ideals if and only if A is Cohen-Macaulay in the sense of ideals and K. gradeA (a, J) ≥ ht a for every ideal a of A. Proof. By [18, Theorem 9.4], f : A → B satisfies the going-down property. Also, ιA : A → A ⊲⊳ f J is an integral ring extension by assumption and [8, Lemma 3.6].  10 Y. AZIMI, P. SAHANDI, AND N. SHIRMOHAMMADI Corollary 4.15. Assume that f : A → B is a flat and integral homomorphism. Then A ⊲⊳ f J is Cohen-Macaulay (ring) in the sense of ideals if and only if A is Cohen-Macaulay in the sense of ideals and K. gradeA (a, J) ≥ ht a for every ideal a of A. Proof. By [18, Theorem 9.5], f : A → B satisfies the going-down property. Also, ιA : A → A ⊲⊳ f J is an integral ring extension by assumption and [8, Lemma 3.6].  In concluding, we apply Corollary 4.15 on amalgamated duplication. Recall that if f := idA is the identity homomorphism on A, and J is an ideal of A, then A ⊲⊳ J := A ⊲⊳idA J is called the amalgamated duplication of A along J. Assume that (A, m) is Noetherian local. In [6, Discussion 10], assuming that A is Cohen-Macaulay, D’Anna showed that A ⊲⊳ J is Cohen-Macaulay if and only if J is maximal Cohen-Macaulay. Next in [21, Corollary 2.7], the authors improved D’Anna’s result as A ⊲⊳ J is Cohen-Macaulay if and only if A is Cohen-Macaulay and J is maximal CohenMacaulay. Our final corollary generalizes these results. Corollary 4.16. Let J be an ideal of A. Then A ⊲⊳ J is Cohen-Macaulay (ring) in the sense of ideals if and only if A is Cohen-Macaulay in the sense of ideals and K. gradeA (a, J) ≥ ht a for every ideal a of A. Proof. This immediately follows from Corollary 4.15, since f = idA : A → A is flat and integral.  Acknowledgements. The authors is deeply grateful to the referee for a very careful reading of the manuscript and many valuable suggestions. R EFERENCES [1] D. D. Anderson, M. Winders, Idealization of a module, J. Commut. Algebra, 1, (2009), 3–56. [2] M. Asgharzadeh and M. Tousi, On the notion of Cohen-Macaulayness for non-Noetherian rings, J. Algebra, 322, (2009), 2297–2320. [3] A. Bagheri, M. Salimi, E. Tavasoli and S. Yassemi, A construction of quasi-Gorenstein rings, J. Algebra Appl. 11, No. 1, (2012), 1250013, (9 pages). [4] M. P. Brodmann and R. Y. Sharp, Local Cohomology: An Algebraic Introduction with Geometric Applications, Cambridge Studies in Advanced Mathematics, 136, Cambridge University Press, Cambridge, 2013. [5] W. Bruns and J. Herzog, Cohen-Macaulay rings. Rev. ed. Cambridge Studies in Advanced Mathematics 39, Cambridge, Cambridge University Press 1998. [6] M. D’Anna, A construction of Gorenstein rings, J. Algebra, 306, (2006), 507–519. [7] M. D’Anna, C. A. Finocchiaro, and M. Fontana, Amalgamated algebras along an ideal, in: Commutative Algebra and Applications, Proceedings of the Fifth International Fez Conference on Commutative Algebra and Applications, Fez, Morocco, 2008, W. de Gruyter Publisher, Berlin, 2009, pp. 155–172. [8] M. D’Anna, C. A. Finocchiaro, and M. Fontana, Properties of chains of prime ideals in an amalgamated algebra along an ideal, J. Pure Appl. Algebra, 214, (2010), 1633–1641. [9] M. D’Anna, C. A. Finocchiaro, and M. Fontana, New algebraic properties of an amalgamated algebra along an ideal, Commun. Alg. 44, (2016), 1836–1851. [10] M. D’Anna and M. Fontana, An amalgamated duplication of a ring along an ideal: the basic properties, J. Algebra Appl. 6, No.3, (2007), 443–459. [11] D. E. Dobbs, On going-down for simple overrings, Proc. Amer. Math. Soc. 39, (1973), 515–519. [12] D. E. Dobbs and I. J. Papick, On going-down for simple overrings III, Proc. Amer. Math. Soc. 54, (1976), 35–38. [13] S. Glaz, Coherence regularity and homological dimensions of commutative fixed rings, in: Ngô Viêt Trung, Aron Simis, Guiseppe Valla (Eds.), Commutative Algebra, World Scientific, Singapore, 1992, pp. 89–106. [14] S. Glaz, Homological dimensions of localizations of polynomial rings, in: Zero-Dimensional Commutative Rings, Knoxville, TN, 1994, in: Lect. Notes Pure Appl. Math., vol. 171, Marcel Dekker, New York, 1995, pp. 209–222. [15] T. D. Hamilton, Weak Bourbaki unmixed rings: A step towards non-Noetherian Cohen-Macaulayness, Rocky Mountain J. Math. 34, (2004), 963–977. [16] T. D. Hamilton and T. Marley, Non-Noetherian Cohen-Macaulay rings, J. Algebra, 307, (2007), 343–360. [17] J. Huckaba, Commutative Rings with Zero Divisors, M. Dekker, New York, 1988. COHEN-MACAULAY 11 [18] H. Matsumura, Commutative Ring Theory, Cambridge Stud. Adv. Math., vol. 8, Cambridge University Press, 1986. [19] M. Nagata, Local Rings, Interscience, New York, 1962. [20] D. G. Northcott, Finite Free Resolutions, Cambridge Tracts in Math., vol. 71, 1976. [21] P. Sahandi and N. Shirmohammadi, Notes on amalgamated duplication of a ring along an ideal, Bull. Iranian Math. Soc. 41, (2015), 749–757. [22] P. Sahandi, N. Shirmohammadi and S. Sohrabi, Cohen-Macaulay and Gorenstein properties under the amalgamated construction, Commun. Alg. 44, (2016), 1096–1109. D EPARTMENT OF M ATHEMATICS , U NIVERSITY OF TABRIZ , TABRIZ , I RAN . E-mail address: [email protected] D EPARTMENT OF M ATHEMATICS , U NIVERSITY OF TABRIZ , TABRIZ , I RAN . E-mail address: [email protected] D EPARTMENT OF M ATHEMATICS , U NIVERSITY OF TABRIZ , TABRIZ , I RAN . E-mail address: [email protected], [email protected]
0math.AC
Subgraph Counting: Color Coding Beyond Trees Venkatesan T. Chakaravarthy1 , Michael Kapralov2 , Prakash Murali1 , Fabrizio Petrini3 , Xinyu Que3 , Yogish Sabharwal1 , and Baruch Schieber3 arXiv:1602.04478v2 [cs.DC] 2 Apr 2016 1,3 1 IBM Research {vechakra, prakmura, ysabharwal}@in.ibm.com 3 {fpetrin, xque, sbar}@us.ibm.com 2 EPFL 2 [email protected] April 5, 2016 Abstract The problem of counting occurrences of query graphs in a large data graph, known as subgraph counting, is fundamental to several domains such as genomics and social network analysis. Many important special cases (e.g. triangle counting) have received significant attention. Color coding is a very general and powerful algorithmic technique for subgraph counting. Color coding has been shown to be effective in several applications, but scalable implementations are only known for the special case of tree queries (i.e. queries of treewidth one). In this paper we present the first efficient distributed implementation for color coding that goes beyond tree queries: our algorithm applies to any query graph of treewidth 2. Since tree queries can be solved in time linear in the size of the data graph, our contribution is the first step into the realm of colour coding for queries that require superlinear running time in the worst case. This superlinear complexity leads to significant load balancing problems on graphs with heavy tailed degree distributions. Our algorithm structures the computation to work around high degree nodes in the data graph, and achieves very good runtime and scalability on a diverse collection of data and query graph pairs as a result. We also provide theoretical analysis of our algorithmic techniques, showing asymptotic improvements in runtime on random graphs with power law degree distributions, a popular model for real world graphs. 1 Introduction Graphs serve as common abstractions for real world data, making graph mining primitives a critical tool for analyzing real-world networks. Counting the number of occurrences of a query graph in a large data graph (subgraph counting, often referred to as motif counting) is an important problem with applications in a variety of domains such as bioinformatics, social sciences and spam detection (e.g. [8, 10, 23]). Subgraph counting and its variants have received a lot of attention in the literature. Substantial progress has been achieved for the case of small queries such as triangles or 1 Figure 1: Illustration of a match (left) and a colorful match (right) 4-vertex subgraphs: not only have very efficient algorithms been developed (e.g. [15, 20, 27, 31]), but also theoretical explanation of their performance on popular graph models has been obtained (see [?] and references therein). Some of the recent work has addressed larger queries [29, 30, ?, 26, 7], but our understanding here is far from complete. Even for reasonably large graphs (a million edges) and small queries (e.g. 5-cycles), the number of solutions tend to be enormous, running into billions. This explosion in the search space makes the subgraph counting problem very hard even for moderately large queries. Theoretically, the fastest known algorithm for counting occurrences of a k-vertex subgraph in an n-vertex data graph runs in time nωk/3 , where O(nω ) is the time complexity of matrix multiplication (currently ω ≈ 2.38). This improves upon the trivial algorithm with runtime nk , but is prohibitively expensive even for moderate size queries. To address the above issue, Alon et al. [2] proposed the color coding technique. Here, given a k-node query, we assign random colors between 1 and k to the vertices of the data graph, and count the number of occurrences of the query that are colorful, meaning the vertices matched to the query have distinct colors. See Figure 1. The count is scaled up appropriately to get an estimate on the actual number of occurances. The accuracy is then improved by repeating the process over multiple random colorings and taking the average. Restricting the search to colorful matches leads to pruning of the search space and improved efficiency. Using this method, Alon et al. obtained faster algorithms for cetain queries such as paths, cycles, trees and bounded treewidth graphs. The power of color coding as a very general counting technique together with the importance of subgraph counting in various applications (as mentioned above) makes it important to design practically efficient and scalable implementations. In a different work, Alon et al. [1] applied the color coding technique for counting the occurrences of treelets (tree queries) in biological networks. Color coding allowed them to handle tree queries up to size 10 in protein interaction networks, extending beyond the reach of previously known approaches [25, 18, 17]. Recently, Slota and Madduri [28, 30] presented FASCIA, an efficient and scalable distributed implementation of subgraph counting (via color coding), again for the case of treelet queries. However, despite considerable interest in non-tree queries from several application domains (see the experimental section for details), the technque has not been explored for more general settings. In this work we present the first efficient distributed implementation of color coding beyond tree queries. 2 As part of their original color coding solution, Alon et al. [2] presented faster algorithms for certain special classes of queries. They showed that if the query is a tree, then colorful subgraph counting can be solved in time O(2k m), i.e. in time linear in the size of the data graph. They extended the algorithm to show that if the query is close to a tree, specifically has (small) treewidth t, a running time of O(2k nt+1 ) can be achieved. Treewidth [9] is a widely adopted measure of the intrinsic complexity of a graph. Intuitively, it measures how close the topology of a given graph is to being a tree: tree queries have treewidth 1, and a cycle is the simplest example of a treewidth 2 query. The above algorithm, restricted to trees, forms the basis for the previously-mentioned treelet counting implementations [28, 30, 1]. While the runtime of the above algorithm is linear for the case of trees (i.e. acyclic queries), it becomes at least quadratic for query graphs of treewidth 2 and beyond. This phenomenon also manifests itself in practice: on real world graphs with even moderately skewed degree distribution load imbalance is observed and the running time tends to have quadratic dependence on the maximum degree of the graph. Thus, even triangles (the smallest cyclic query) are harder to handle, and have received considerable attention from the research community (as mentioned earlier). The goal of this paper is to study the colorful subgraph counting problem on queries of treewidth 2, taking the first step in the realm of color coding with cyclic queries. The class of queries of treewidth 2 is quite rich. In particular, it contains all trees, cycles, series-parallel graphs and beyond. Figure 8 shows treewidth 2 queries (used in our experimental evaluation) drawn from real-world studies on biological, social and collaboration networks [22, 32, 4]. To the best of our knowledge, the previously-mentioned algorithm [1] is the best known algorithm for treewidth 2 queries, and we use it as our baseline. We rephrase this algorithm within our framework and devise a distributed implementation. The rephrased algorithm becomes a recursive procedure that decomposes the query into simpler path subqueries, which are then solved to get the overall count. We thus refer to our baseline as the Path Splitting algorithm (PS). Our Contributions 1. Building on the PS algorithm, we develop novel strategies that lead to significant performance gains in terms of runtime, scalability, and the size of graphs and queries handled. 2. Our algorithm works by decomposing the query to cycles and leaves, thereby reducing the problem of colorful subgraph counting on treewidth 2 queries to counting (annotated) cycles. 3. The decomposition in terms of cycles enables us to exploit the so-called degree ordering approach (e.g., M IN B UCKET algorithm for triangle enumeration [?]) Specifically, we show how to force the computation process to (mostly) work around high degree vertices, leading to substantial speedups and scalability gains. 4. We present a detailed experimental evaluation of the algorithms on real-world graphs having more than million edges and real-world queries of size up to 10 nodes. The results show that our strategies offer improvements of up to 28x in terms of running time and 3 exhibit improved scalability. 5. Finally, we complement our experimental evalutation by a theoretical analysis of the runtime of our degree ordering approach for cycle queries, on a popular class of random power law graphs (Chung-Lu graphs [14]). Our analysis provides justification for empirically observed performance gains of the approach. Related Work Subgraph counting has received significant attention in the fields of computational biology [25, 18, 17] and social network analysis [21, 13, 27, ?, 20]. We give an overview of prior work on the problem (both theoretical and empirical) as well as techniques for making subgraph counting scalable, and explain how our contributions relate to this prior work. Color Coding and Approximate Subgraph Counting: Color coding was introduced in an influential paper by Alon et al. [2] as a fast algorithm for finding occurrences of a query in a data graph and counting the number of such occurrences. In a different work, Alon et al. [1] explored its applications to approximate subgraph counting (most commonly known as motif counting) in computational biology. They were motivated by the fact that subgraph counting is an important primitive for characterizing biological networks [?]. Color coding allowed Alon et al. to count occurrences of treelets (tree queries) up to size 10 in protein interaction networks, extending beyond the reach of previously known approaches [25, 18, 17]. A scalable distributed implementation of color coding for trees has been reported by Slota and Madduri [29, 30], but no principled solutions beyond tree queries are known. ParSE [33] extends beyond tree queries, by considering query graphs that can partitioned into subtemplates via edge cuts of size 1. However, the only class of query graphs that can be perfectly partitioned using this method is trees; ParSE resorts to brute force enumeration for other cases. Our work provides the first principled approach to implementing color coding in a scalable way beyond trees queries. Further, our analysis of the runtime of our cycle counting subroutine on a random graphs with a power law degree distribution provides a theoretical justification of our algorithmic techniques. While our work and the above-mentioned prior work [1, 29, 30] count non-induced sugraphs, some other prior work [25, 18, 17] addressed the case of counting induced subgraphs. The search space of non-induced subgraphs is larger and furthermore, these counts are more robust with respect to perturbations of the data graph [1]. Degree Based Approaches: Designing scalable subgraph counting algorithms turns out to be hard even for the simple case of triangle counting. A naive approach lets each vertex enumerate pairs of neighbors and check if they are connected. This leads to wasteful computations and also runs into load balancing issues on graphs with heavy tailed degree distributions [31]. The above issue has been addressed using a simple, but efficient solution (referred to as the M IN B UCKET algorithm [15, 31]): each vertex enumerates pairs of neighbors with degree no smaller than its own (with arbitrary tie breaking) and checks they are connected. It is not hard to see that this gives a correct count, and it has been empirically observed that this algorithm does not run into load balancing issues even on heavy tailed graphs [31]. The M IN B UCKET heuristic has also been shown to give polynomial runtime improvement over the naive method when the input is a random graph with a power law degree distribution [?]. A recent work by Jha et al. [20] applies the 4 degree based technique for coutning 4-vertex queires. There are a few prior approaches for arbitrary queries of [7, 3, 26], but algorithms do not use degree information, and are comparable to the baseline algorithm used in our study. To the best of our knowledge, prior to our work there has not been a systematic study of how M IN B UCKET generalizes to larger subgraph counting problems. In this work we generalize the method for counting occurrences of treewidth 2 graphs, perform a thourough experimental evaluation and provide a theoretical runtime analysis of our technique in the random power law graph model. Our paper improves upon prior work along three axes: generality of queries handled, scalability of the proposed solution and theoretical analysis of the main algorithmic primitive on a class of graphs often used to model real world networks. 2 Preliminaries Subgraph counting problem. The subgraph counting problem is defined as follows. The input consists of a query graph Q = (VQ , EQ ) over a set of k nodes and a data graph G = (VG , EG ) over a set of n vertices and m edges. The task is to count the number of (not necessarily induced) subgraphs of G that are isomorphic to Q. Formally, count the number of injective mappings π : VQ → VG such that for any pair of query nodes a, b ∈ VQ , if hq1 , q2 i ∈ EQ , then hπ(q1 ), π(q2 )i ∈ EG . We refer to such mappings π as matches. Color coding and colorful matches. A coloring is a function χ : VG → {1, 2, . . . , k}, where for every vertex u ∈ VG , χ(u) denotes its color. A match π from VQ toSVG is colorful if the vertices of Q are mapped to k distinctly colored vertices in G, i.e. a∈VQ χ(π(a)) = {1, 2, 3, . . . , k}. The main idea is that instead of counting all possible matches of the k vertices of the query graph to the vertices of the data graph, one first colors the vertices of the data graph uniformly at random using k colors, and then searches for colorful matches. Colorful subgraph counting problem. In the colorful subgraph counting problem the task is to count the number of colorful matches of the query Q in VG . Our setting counts the number of colorful matches or mappings from Q to the data vertices. Alternatively, we may want to count the number of colorful subgraphs that are isomorphic to Q. The latter quantity can be obtained by dividing the former by aut(Q), the number of automorphisms of Q. While it is computationally hard to compute aut(Q) for an arbitrary query graph, the quantity can be computed quickly for queries of relatively small size (say about 10 nodes). Given the above discussion, we focus on counting the number of colorful matches. Treewidth. Intuitively, if the query graph Q = (VQ , EQ ) has treewidth t then Q can be decomposed into subgraphs Q1 , Q2 , . . . such that each subgraph Qi is also of treewidth t, and each Qi has no more than t nodes that belong also to other subgraphs. We call such nodes the boundary nodes of Qi . In addition, the total number of distinct boundary nodes in all subgraphs Q1 , Q2 , . . . is at most t + 1. Note that the decomposition can be done recursively as each Qi has treewidth t, until we are left only with subgraphs that have at most t + 1 nodes. This results in a treewidth decomposition tree denoted TQ . A formal definition is givne below. A tree decompsition of a query |Q| is a tree T = (VT , ET ), wherein each node p ∈ VT is 5 associated with a subset of query nodes S(p) ⊆ VQ , called pieces, such that the following properties are true: (i) for every query edge (a, b) ∈ EQ , there exists a piece S(p) (for some p ∈ VT ) that contains both a and b; (ii) for every query node a ∈ VQ , the set of nodes whose pieces contain a induce a connected subtree. Alternatively, the second property states that if a belongs to pieces S(p1 ) and S(p2 ) for some p1 and p2 , then a must also belong to the piece S(p) for any node p found on the (unique) path connecting p1 and p2 in T . The width of the tree decomposition is the maximum cardinality overall pieces minus one, i.e., maxp |S(p)| − 1. The treewidth t of the query is the minimum width over all its tree decompositions. Approximate subgraph counting via color coding. Counting the number of colorful matches turns out to be easier than counting the actual (not necessarily colorful) matches. The price to pay is that the algorithm is randomized. We color the graph randomly and obtain the number of colorful matches, and repeat the process independently at random a few times. Then, an estimate for the number of matches (occurances of the query) can be obtained by taking the average. For a given input graph G and query Q let n(G, Q) denote the number of matches π from Q to G. For a (random) coloring χ of vertices of G let ncolorf ul (G, Q, χ) denote the number of colorful matches of Q to G under coloring χ. It was shown [2, 1] that with proper normalization the colorful count ncolorf ul (G, Q, χ) is an unbiased estimator of the actual count. Specifically, the right normalization factor is k k /k!, i.e. we have (k k /k!) · Eχ [ncolorf ul (G, Q, χ)] = n(G, Q). The variance of the estimator can also be bounded (see [1], section 2.1). Thus, taking the average of ncolorf ul (G, Q, χ) under a few independently chosen colorings χ converges to the right answer, i.e. n(G, Q). Thus, in order to obtain an approximate subgraph counting algorithm it suffices to solve the colorful subgraph counting problem. The rest of the paper is devoted to designing a scalable solution to colorful subgraph counting. 3 Overview The work of Alon et al. [2] yields a natural algorithm for the colorful subgraph counting problem on bounded treewidth query graphs. This algorithm is based on the following intuition. Suppose that we have found a colorful match π for a subgraph Q of the input query graph Q, and we wish to extend it into a colorful match π 0 for Q by additionally fixing the mapping of the nodes outside Q. For this we do not need to know the mapping of the non-boundary nodes of Q, since they do not share edges with nodes outside Q. Instead, it suffices to know the mapping of the boundary nodes (i.e., the nodes that share edges with nodes outside Q) and the set of colors used by π. The mapping of the boundary nodes is needed to ensure that for any edge from a boundary node to outside, the corresponding data vertices share an edge in the data graph; and the set of colors is needed to avoid repeating a color already used by π. Analogously, in the setting of counting, in order to count the number of colorful matches for Q, we do not need a complete listing of colorful matches of Q. Instead, we can group the colorful matches based on the set of colors used and the mappings for the boundary nodes and it suffices to know the count per group. Based on the above intuition, we apply dynamic programming to count the number 6 colorful matches of Q. Let TQ be the tree decomposition of Q with treewith t. The algorithm processes TQ in a bottom-up manner and a creates a hash table (that we call a projection table) for each tree node. The subgraph graph Q associated with a node has at most t boundary nodes and these nodes can be mapped to the data vertices in at most nt ways. In addition, we need to record the colors of the data vertices to which the nodes of Q are mapped. Since we focus  on colorful matches, the set of colors used (that we call “signature”) can be at most kt ≤ 2k (where k is the size of the query graph). For each combination of mappings to the boundary nodes and the signature, we record the number of colorful matches of Q consistent with the combination. The number of entries in the table is at most nt 2k . The projection table for a tree node can be computed from those of its children. We get the total number of colorful matches by performing an aggregation on the projection table of the root node. Working in the realm of motif counting, Slota and Madduri [30] described an efficient distributed implementation of the above algorithm for the case of tree queries and presented an experimental evaluation. Trees have treewidth one hence, the size of projection tables is linear in the number of vertices and the overall computation can be carried out in time linear in the graph size. Our goal is to address a more general class of queries (beyond trees) in a distributed setting and we focus on the case of queries of treewidth 2. Treewidth 2 queries are more challenging since in the worst case, the tables can be of size quadratic in the number vertices and the computation time also gets quadratic. The construcion of our algorithm is motivated by the fact that real life data graphs tend to exhibit variations in the degree distribution. A naive implementation that treats all data vertices in the same manner would result in a lot of entries in the projection tables of the high degree vertices that do not lead to colorful matches for the overall input query. Moreover, in a distributed setting the processors owning such vertices perform more computation leading to load imbalance. Our algorithm is based on a crucial observation that any treewidth 2 query can be recursively decomposed into (annotated) cycles or leaves. The core component of the algorithm is an efficient procedure for handling cycles that employs a strategy based on degree based ordering of vertices. This leads to reduction in wasteful computation, as well as improved load balancing. The procedure is inspired by a similar strategy used in prior work [?] for handling triangles. The overall algorithm uses the above decomposition and the improved procedure for handling cycles. 4 Overall Algorithm In this section we describe the overall structure of our subgraph counting algorithm that proceeds in two steps. In the first step, we decompose the query into cycles and leaves (called blocks) and construct a decomposition tree for the input query Q which is essentially a carefully chosen treewidth decomposition tree; each node of the tree represents a block and encodes a convenient subquery. This step is independent of the data graph and can be viewed as a preprocessing phase for the query. Then in the second step we traverse the tree in a bottom up manner, performing primitive counting operations over the data graph prescribed by the internal nodes and combining the results. The final count is produced 7 by the root of the tree. 4.1 Decomposition Tree For an input query graph Q = (VQ , EQ ), construct the decomposition tree T (Q) by iteratively applying one of two primitive operations: contraction of a leaf edge or a cycle. As these operations are applied the number of nodes in the query Q decreases. At the same time new edges may appear in Q to represent contracted structures, and edges as well as nodes may get annotated with the identity of the contracted structures that they represent. Before defining the tree construction algorithm we need to introduce two definitions. First, we say that a cycle C in Q is contractible if (a) C = (a0 , a1 , . . . , aL−1 ) is induced (i.e. there are no edges between nodes a0 , a1 , . . . , aL−1 except the edges of C) and (b) cycle C has most two boundary nodes (i.e., nodes that share edges with nodes outside of C). Second, a leaf edge is an edge L = (a, b), where b is a leaf node (has degree one); a is called the boundary node of the leaf edge. We use the common term block to refer to leaf edges and contractible cycles. For example, consider the query named Satellite in Fig 2. The cycle (i, j, k) is contractible with a single boundary node i, the cycle (a, b, c, d, e) is contractible with two boundary nodes a and c, and (f, h) is a leaf edge. The cycle (i, f, g) is not contractible since it has three boundary nodes. We construct the decomposition tree T (Q) starting with an empty tree. The tree is built bottom-up starting from the leaf level and hence, the structure may be a forest with multiple roots in the intermediate stages. Each iteration adds a new node and may make some of the existing roots as its children, culminating in a tree. In the construction process we iteratively perform the following operations until Q contains a single node: find a block B (a leaf edge or a contractible cycle) in Q and remove it from Q (while possibly adding an edge to Q), and add a corresponding node to T (Q). We iterate until Q contains a single node. We distinguish 3 cases. Case 1: B is a contractible cycle C with exactly one boundary node a ∈ VQ : Remove the nodes and edges of C from Q, except for node a. Erase any annotation found on a in Q and annotate it with the block name B. Case 2: B is a contractible cycle C with two boundary nodes a, b ∈ VQ : Remove the nodes and edges of C from Q, except for the nodes a and b. Add an edge (a, b) in Q and annotate it with B. Erase any annotation found on a and b in Q. Case 3: B is a leaf edge L = (a, b): Remove b and the edge from Q. Erase any annotation found on node a ∈ Q and annotate it with the block name B. The nodes and edges of B inherit the annotations from Q, as they were before Q was transformed (this ensures that the annotations on the boundary nodes that got erased get captured by the new annotation). Next we add a new node B to the tree T (Q). If any node or edge in B has an annotation B 0 , make B 0 a child of B in T (Q). This completes the construction of T . We show below that the process can find a block in each iteration and terminate successfully on every query of treewidth 2. Assuming termination, it is not difficult to see that the process produces a tree. During contraction, every block B 0 annotates a particular node or an edge of Q, recording the way in which it has been contracted. The annotation gets inherited by 8 Figure 2: Illustration of the decomposition process. the top row shows the sequence of queries considered in the process (the original query is on the left), the bottom row shows the blocks that were contracted in each step. some other block B in a subsequent iteration. The block B becomes the parent of B 0 . The annotation is erased in Q, ensuring that no other block becomes a parent of B 0 . Taking Satellite as the input query Q, Figure 2 provides an illustration process, along with the output decomposition tree. The bottom row shows the blocks being contracted and the top row shows the transformed Q. The first iteration contracts the cycle B1 = (a, b, c, d, e). A new edge (a, c) is added to Q, along with the annotation B1 , and B1 is added to the tree. The second iteration contracts the leaf block B2 = (f, h). Node f is annotated as B2 and the B2 is added to the tree. The third iteration contracts B3 = (a, f, g, c), by adding an edge (f, g) with the annotation B3 . The block is added to the tree and it is made the parent of B1 and B2 . In the fourth iteration, the cycle B4 = (i, j, k) is contracted. Node i gets annotated as B4 and B4 is added to the tree. Finally, the query Q4 is contracted leaving Q empty. We add Q4 as the root of the tree, making it the parent of B3 and B4 . The following lemma guarantees that for any treewidth 2 query Q, the tree construction procedure will always find a block (a leaf edge or a contractible cycle) in each iteration and terminate successfully. The proof relies on prior work on nested ear decompositions of treewidth 2 queries [16]. 9 Lemma 4.1 (i) Any treewidth 2 query Q contains a block; (ii) the transformed query resulting from the contraction process is also a treewidth 2 query. Proof: We first prove part (ii) of the lemma. If the contracted block has one boundary node then no new edges are added to Q, in which case the tree TQ for the updated Q is given by deleting all the nodes not in the updated VQ from the subsets SQ (t). If the contracted block has two boundary nodes a and b then the edge (a, b) is added to Q. In this case we get the tree for the updated Q by replacing each occurrence of the nodes not in the updated VQ by b. Note that the size of each subset is still at most 3, nodes associated with subsets that contain b form a connected component, and for at least one subset SQ (t), {a, b} ⊆ SQ (t). We now prove part (i). First, Root the tree TQ at an arbitrary non-leaf node. This induces an ancestor-descendant relationship on the nodes in VT . Note that if there are two nodes {t, t0 } ⊆ VT , such that SQ (t0 ) ⊆ SQ (t), node t0 can be omitted and all its children connected to t. Thus from now on we assume that no subset SQ (t) is contained (or identical) to another subset. We need the following definition and claim. Definition 4.1 For a node t ∈ VT , let Qt be the subgraph of Q induced by the nodes that are in the union of the subsets associated with the nodes of TQ in the subtree rooted at t. Claim 4.1 For every node t ∈ VT , either Qt contains a block, or Qt is a path whose endpoints are in the subset associated with the parent of t (if such exists). Before proving the claim we show how it implies the lemma. Since the claim holds also for the root of TQ then either Q contains a block or it is a path in which case it also contains a leaf block. Proof of Claim 4.1: We prove the claim by induction. The base of the induction is a leaf node. Consider a leaf node t ∈ VT . There are two possibilities: (i) SQ (t) = {x, y}, and (ii) SQ (t) = {x, y, z}. If SQ (t) = {x, y}, then at least one node, say y, is only connected to x and thus (x, y) is a leaf edge. If SQ (t) = {x, y, z}, then consider the subgraph induced by {x, y, z}. If this subgraph is a triangle then it must be a contractible cycle. The only remaining case is the subgraph induced by {x, y, z} forms a path. Assume that the endpoints of this path are x and z. If one of these endpoints, say z, is not in the subset associated with the parent of t then (y, z) is a leaf edge. Otherwise, let t0 be the parent of t, we have SQ (t) ∩ SQ (t0 ) = {x, z}. For the inductive step consider a non-leaf node t ∈ VT . If Qt0 for any child t0 of t contains a block then we are done. Assume that this is not the case. Consider first the case that t has a single child t0 . By the inductive hypothesis Qt0 is a path whose endpoints x and y are in SQ (t). Let SQ (t) = {x, y, z}. If z is connected to both x and y then the cycle closed by z is a contractible cycle. If z is connected to only one endpoint, say y, then we get a path with endpoints x and z. If either x or z are not in the subset associated with the parent of t, then the missing endpoint is leaf node. If both x and z are in the subset associated with the parent of t then the inductive claim follows. Next, Consider the case that t has several children. If two of the children of t, say t0 and t00 , share endpoints then the cycle formed by Qt0 and Qt00 is contractible. Otherwise, t must have exactly two children, say t0 and t00 , with endpoint {x, y} and {y, z}, forming a path with endpoints x and z. If z is connected also to x then the cycle closed by the edge (x, z) 10 is a contractible cycle. If either x or z are not in the subset associated with the parent of t, then the missing endpoint is a leaf node. If both x and z are in the subset associated with the parent of t then the inductive claim follows. An input query may admit multiple decomposition trees and the choice of the tree influences the performance of our algorithm. In Section 6, we present a heuristic for finding a good decomposition. Each node of the tree represents a block and it will be convenient to view to the node simply as the block represented by it. At this point, it is interesting to consider tree queries studied by Slota and Madduri [30]. Given a tree query, their algorithm fixes a suitable query node as the root and iteratively processes the tree in a bottom-up manner. The algorithm implicitly uses a decomposition tree. However, since trees do not have cycles, the decomposition tree consists of only leaf edge blocks. In contrast, the decomposition trees of treewidth two queries involve the more challenging case of cycles as well. 4.2 Tree Traversal Here, we describe the second step of the algorithm that traverses the decomposition tree in a bottom-up manner and computes the number of colorful matches of the blocks in the data graph. For this purpose, we define the notion of subqueries represented by blocks. A subquery Q of the input query Q refers to any induced subgraph of Q. Consider a block B and let U be the union of nodes found in the block B and its descendant blocks in the tree. The subquery represented by B, denoted SQ(B), refers to the subquery induced by U . For example, Figure 2 shows the subquery represented by the block B4 . The decomposition tree yields a nested hierarchy of subqueries: the root block represents the whole input query and for any block B with the parent B 0 , the subquery SQ(B) is contained within SQ(B 0 ). Let B be a block. A node a ∈ SQ(B) is said to be a boundary node, if a shares an edge with a node outside SQ(B). It is not hard to see that these boundary nodes are the same as the boundary nodes of B (identified during the tree construction process). Thus, SQ(B) can have at most two boundary nodes. Before describing the counting algorithm we extend the notion of colorful matches to subqueries: a colorful match for a subquery Q = (VQ , EQ ) is an injective mapping π : VQ → VG , such that for any edge (a, b) ∈ EQ , (π(a), π(b)) ∈ EG , and the vertices of Q are mapped to distinctly colored vertices of G. The algorithm traverses the tree in a bottom-up manner. For each block B, it outputs a succinct synopsis of the set of colorful matches of the subquery SQ(B), using a projection table and signature (as outlined in Section 3). that we now define precisely. Signature: Let K = {1, 2, . . . , k} denote the set of colors used in the data graph, where k is the size of the input query Q. The term signature refers to any subset α ⊆ K. For a subquery Q and a colorful match π of Q, the signature of π refers to the set of colors of the data vertices used by π and it is denoted sig(π), i.e., sig(π) = ∪a∈Q {χ(π(a))}. Projection Tables: Let Q be subquery with two boundary nodes a and b. For a pair of data vertices u and v and a signature α ⊆ K let cnt(u, v, α|Q) denote the number of colorful matches of Q wherein the boundary nodes a and b are mapped to u and v and the 11 Overall Algorithm 1. Compute a decomposition tree T (Q) for the input query Q. 2. Traverse the tree bottom-up. For each non-root block B: Use the projection tables of the children blocks of B and compute the projection table for B 3. Output the number of colorful mathes of the subquery represented by the root-block. Figure 3: Overall Algorithm signature of π is α: cnt(u, v, α|Q) = |{π ∈ Π : π(a) = u and π(b) = v and sig(π) = α}|, where Π is the set of all the colorful matches of Q. These counts can be conveniently represented in the form a hash table with (u, v, α) forming the key and the count forming the value. We refer to any encoding of the above counts (such as the hash table above) as the projection table of Q. In the worst case, the table may have size quadratic in the input data graph. However, a significant fraction of the triplets will have a count of zero and we maintain only the non-zero counts. The projection table for subqueries having a single boundary node a is defined in a similar manner. For a data vertex u and a signature α ⊆ K, define cnt(u, s|Q) = |{π ∈ Π : π(q) = u and sig(π) = α}|. 4.3 Computing the Counts Given a decomposition tree, the algorithm works based on the fact that the projection table for a block can be computed by joining the projection table of its children blocks. As an illustration of the idea, consider the block B3 having boundary nodes f and g, and the subquery represented by it (Figure 2). For a pair of vertices u and v, and a signature α, the projection count cnt(u, v, α|B3 ) can be computed as follows. The block consists of the path (a, f, g, c), and any match π for the subquery must map these nodes to vertices (x, u, v, y) that form a path in the data graph. The block is annotated by its children blocks B1 with boundary nodes a and c, and B2 with boundary node f . Any pair of matches π1 and π2 for SQ(B1 ) and SQ(B2 ) can be extended as matches for SQ(B3 ), as long as their signatures α1 and α2 are disjoint (since the blocks do not share any node) and are contained within α. Therefore, we can derive the desired count by performing the following aggregation over all quadruples (x, y, α1 , α2 ) satisfying the properties: (x, u, v, y) forms a path in the data graph; α1 , α2 ⊆ α; (α1 ∩ α2 ) is empty. The aggregation is: X X cnt(u, v, α|B3 ) = cnt(x, y, α1 |B1 ) × cnt(u, α2 |B2 ). x,y α1 ,α2 12 We can express the projection counts for any block in the above manner. However, as the number of children increases, the cartesian product involved in the aggregation would be prohibitively expensive. Our procedures efficiently simulate the aggregation by performing a sequence of join operations involving the projection tables of children blocks. Given a decomposition tree, the algorithm traverses the decomposition tree in a bottomup manner, computing the projection tables for all the blocks and culminates in the rootblock representing the whole input query. At this step, instead of producing a projection table, the algorithm simply computes the number of colorful matches. The pseudo-code is shown in Figure 3. 5 Solving Blocks The main step of the algorithm is the construction of the projection tables of a block from its children blocks. In this section we develop efficient procedures for handling cycles. For the sake of highlighting the main ideas, we first focus on the case of cycles found at a leaf level of the decomposition tree (such as the cycle B1 in Figure 2); these cycles do not have other blocks annotating them. General cycles are handled by extending these ideas as discussed later. 5.1 Solving Cycles at the Leaf Level Consider a cycle block C = (a0 , . . . , aL−1 ) of length L without annotations. The cycle may have at most two boundary nodes. We discuss the more interesting case where the number of boundary nodes is exactly two; the other cases are handled in a similar fashion. Let the two boundary nodes of the cycle be ap and aq , for some 0 ≤ p, q ≤ L − 1. We present two procedures for computing the projection table of C: a baseline procedure that uses a path splitting strategy and an efficient procedure guided by a degree based ordering of vertices. + − Path Splitting Algorithm (PS). For two nodes as and at on the cycle, let Ps,t and Ps,t be the paths obtained by traversing the cycle from as to at in the clockwise and counter-clockwise − + directions, respectively, i.e., Ps,t = (as , as⊕1 , . . . , at ) and Ps,t = (as , as 1 , . . . , at ), where ⊕ and refer to addition and subtraction modulo L. + + Let cnt(·, ·, ·|Ps,t ) denote the projection counts for path Ps,t taking as and at as the + boundary nodes. Namely, for a triple (u, v, α), let cnt(u, v, α|Ps,t ) denote the number of + colorful matches for Ps,t wherein π(as ) = u, π(at ) = v and sig(π) = α. A similar notion is − defined for the paths Ps,t . + The procedure splits the cycle into two paths along the boundary nodes, given by Pp,q − ; we refer to these special paths as P + and P − . See Fig 5 (a) for an illustration. and Pp,q The projection table for P + is constructed iteratively, by building the tables for the + paths Pp,j , for each node aj found along the path. This is accomplished by extending + the projection table for the prior path Pp,j 1 via a join with the edges of the data graph. The pseudocode is given in Figure 4 (Procedure 1). We assume that all the counts are initialized to zero. The first iteration is handled by directly reading the edges of the data graph. In the subsequent iterations, we extend every triple (u, v, α) with non-zero count + cnt(u, v, s|Pp,j 1 ), with any edge (v, w), provided the resulting match is colorful. The 13 Procedure 1: Computing Projection Table for P + For each edge (u, v) in the data graph G + cnt(u, v, α|Pp,p⊕1 ) ← 1, where α = {χ(u), χ(v)}. For j = p ⊕ 2, p ⊕ 3, . . . , q + For each triple (u, v, α) with cnt(u, v, α|Pp,j 1 ) 6= 0 For each edge (v, w) in G such that χ(w) 6∈ α do: Let α0 = α ∪ {χ(w)}. + + Increment cnt(u, w, α0 |Pp,j ) by cnt(u, v, α|Pp,j 1 ). Procedure 2: Computing Projection Table for C For each entry (u, v, α1 ) with cnt(u, v, α1 |P + ) 6= 0 For each entry (u, v, α2 ) with cnt(u, v, α2 |P − ) 6= 0 If α1 ∩ α2 = {χ(u), χ(v)} α0 ← α1 ∪ α2 val1 ← cnt(u, v, α1 |P + ); val2 ← cnt(u, v, α2 |P − ) Increment cnt(u, v, α0 |C) by val1 × val2 . Figure 4: PS Algorithm counts for P − are constructed analogously. Finally, the projection table for the cycle C is obtained by joining the counts of P + and P − , as shown in Procedure 2. Here, a pair of triples (u, v, α1 ) and (u, v, α2 ) are joined, if the resulting match is colorful. Discussion of baseline. As discussed below (Section 5.2), the PS procedure can be extended to handle general cycles with annotations, and yields an algorithm for handling treewidth 2 queries. The resultant PS algorithm is equivalent to the original color coding algorithm of Alon et al. [2]. Prior work [30, 1] on colorful subgraph counting utilize the algorithm of Alon et al. as the basis for counting tree queries (treelets). We developed a distributed implementation of the PS algorithm, and use it as the baseline in our experimental study. Known techniques for subgraph counting with large queries (e.g. [7, 26]) employ similar graph traversal techniques, making PS consistent with the state of the art for subgraph counting as well as color coding. We develop an procedure, called Degree Based (DB) algorithm, that outperforms the PS algorithm for practical graphs and queries. It is motivated by the following observations. First, the paths P + and P − may have uneven lengths (for instance, in Figure 5), |P + | = 6 and |P − | = 2) and the processing of the longer path dominates the overall running time. Second, in real-graphs with skewed degree distributions, high degree vertices tend to have more paths passing through them, which populate the projection tables of P + and P − . However, significant fraction of these paths do not find appropriate counterparts in the other table to complete a match, leading to wasteful computations. Third, in a distributed setting, the above phenomenon manifests as higher load on processors owning high degree vertices, leading to load imbalance. It is not difficult to address the first issue alone. The only intricacy is that when the paths are split evenly, the boundary nodes may appear internally on the the paths (see Figure 5 with a split across nodes denoted h and d). This can be handled by recording the mapping for the boundary nodes as part of the projection counts. We implemented the above algorithm as well and noticed that the issue of wasteful computations and load im14 Figure 5: PS and DB Illustrations. balance still persists. And furthermore, performance of the PS algorithm and the modified implementations does not differ significantly on our benchmark graphs and queries. Degree Based Algorithm (DB). The DB algorithm addresses all the three issues by using the strategy of building the paths from high degree vertices. Arrange the data vertices in the increasing order of their degree; if two vertices have the same degree, the tie is broken arbitrarily, say by placing the vertex having the least id first. We say that a vertex u is higher than a vertex v, if u appears after v in the above ordering and this is denoted “u  v”. Consider the input cycle C = (a0 , a1 , . . . , aL−1 ) with boundary nodes ap and aq and let π be a colorful match for C that maps the above nodes to data vertices u0 , u1 , . . . , uL−1 , respectively. Among these data vertices, let uj be the highest vertex. We refer to the corresponding node aj as the highest node of π. The idea is to partition the set of colorful matches into L groups based on their highest node ah and compute the projection table for each group separately. For a pair of data vertices u and v, and a signature α, let cnt(u, v, α|C, hi = h) denote the number of colorful matches of π for C, wherein π(ap ) = u, π(aq ) = v, sig(π) = α and ah is the highest node of π. The projection table for C can be obtained by aggregating the above counts: for any triple (u, v, α), cnt(u, v, α|C) = L−1 X cnt(u, v, α|C, hi = h). (1) h=0 We next describe an efficient procedure for computing the counts cnt(u, v, α|C, hi = h). The concept of high starting matches plays a crucial role in the procedure. Let ad be the node diagonally opposite to ah on the cycle, i.e., d = h ⊕ bL/2c. The procedure splits the + − cycles into two paths Ph,d and Ph,d ; Figure 5 (b) shows the paths for two sample values + + of h. Let aj be a node found on the path Ph,d , A colorful match π for Ph,j is said to be high-starting, if the data vertex π(ah ) is higher than all the other data vertices used by π, 15 + Procedure 1: Compute cnt∗ (u, v, α|Ph,d ) For each edge (u, v) in the data graph G with u  v + cnt∗ (u, v, α|Ph,h⊕1 ) ← 1, where α = {χ(u), χ(v)}. For j = h ⊕ 2, a ⊕ 3, . . . , d + For each triple (u, v, α) with cnt∗ (u, v, α|Ph,j 1 ) 6= 0 For each edge (v, w) in G s.t. u  w and χ(w) 6∈ α: Let α0 = α ∪ {χ(w)}. + + Incr. cnt∗ (u, w, α0 |Ph,j ) by cnt∗ (u, v, α|Ph,j 1 ). Procedure 2: Compute cnt∗ (x, y, α|C, hi = h) for Config. (A) + For each entry (u, v, x, α1 ) with cnt∗ (u, v, x, α1 |Ph,d ) 6= 0 − ∗ For each entry (u, v, y, α2 ) with cnt (u, v, y, α2 |Ph,d ) 6= 0 If α1 ∩ α2 = {χ(u), χ(v)} α0 ← α1 ∪ α2 + val1 ← cnt∗ (u, v, x, α1 |Ph,d ); − ∗ val2 ← cnt (u, v, y, α2 |Ph,d ) Incr. cnt∗ (x, y, α0 |C, hi = h) by val1 × val2 . Figure 6: DB Algorithm + . For a pair of vertices u and v, and a i.e., π(ah )  π(ai ), for all nodes ai on the path Ph,j + ∗ signature α, let cnt (u, v, α|Ph,j ) denote the number of high-starting colorful matches for + the path Ph,j wherein π(ah ) = u, π(aj ) = v and sig(π) = α. We then count the high-starting colorful matches for the two paths, which can be accomplished via edge extensions, as in the PS algorithm. However, the current setting offers a crucial advantage: we can dictate that the starting node ah is the highest node, meaning whenever an entry (u, v, α) gets extended by an edge (v, w), we can impose the condition that u is higher than w in the degree based ordering. Imposing the condition leads to a significant pruning of the tables. The pseudo-code is given in Figure 6 (Procedure 1). While the degree based strategy is more efficient, we need to address an intricacy regarding the projection aspects. In contrast to the PS algorithm, the DB algorithm splits at the highest node and consequently, the boundary nodes p and q may appear inside the paths. Thus, in order to get the projection counts on p and q, we also need to explicitly record the mappings for the boundary nodes. + − The two nodes ap and aq may occur on either Ph,d or Ph,d . Six different configurations are possible, of which two are shown in Figure 5 (b). In Configuration (A), the paths include one boundary each, whereas in the second configuration, the same path includes both the boundary nodes. The other four configurations are symmetric: the boundary nodes may swap the paths in which they occur and in Configuration (B) can also reverse the order in which they occur. We discuss the two configurations shown in the figure; the other configurations are handled in a similar fashion. Consider configuration (A). In order to record the mappings of the boundary node ap , we introduce an additional field in the projection counts. For a triple of data vertices + u, v and x, and a signature α, let cnt∗ (u, v, x, α|Ph,d ) denote the number of high-starting + matches π for Ph,d with π(ah ) = u, π(ad ) = v, π(ap ) = x and sig(π) = α. These counts 16 + Compute Projection Table for Ph,d Let B be the block annotating the edge (ah , ah⊕1 ) + cnt∗ (·, ·, ·|Ph,h⊕1 ) = cnt∗ (·, ·, ·|B) For j = h ⊕ 1, h ⊕ 2, . . . , d Execute NodeJoin(aj ) Execute EdgeJoin(aj ) Execute NodeJoin(ad ) NodeJoin(aj ): If aj is annotated by a block B + For each (u, v, α1 ) with cnt∗ (u, v, α1 |Ph,j ) 6= 0 For each (v, α2 ) with cnt(v, α2 |B) 6= 0 If (α1 ∩ α2 = {χ(v)} α ← α1 ∪ α2 + val1 ← cnt∗ (u, v, α1 |Ph,j ); val2 ← cnt(v, α2 |B) + Incr. cnt∗ (u, v, α|Ph,j ) by val1 × val2 EdgeJoin(aj ) + For each entry cnt∗ (u, v, α1 |Ph,j ) 6= 0 For each entry cnt(v, w, α2 |B) 6= 0 and u  w If (α1 ∩ α2 = {χ(v)} α ← α1 ∪ α2 + val1 ← cnt∗ (u, v, α1 |Ph,j ); val2 ← cnt(v, w, α2 |B) + Incr. cnt∗ (u, w, α|Ph,j⊕1 ) by val1 × val2 Figure 7: DB Procedure for General Cycle Blocks are computed in a manner similar to the base procedure shown in Figure 6 (Procedure 1); however, when the process encounters the boundary node p (namely, the initialization step or j = p), the mapped vertex (v or w, respectively) is recorded in the additional field. The analogous counts for P − can derived in a similar manner. The value of cnt∗ (u, v, α|C, hi = h) is obtained by joining the two; see Procedure (2) in Figure 6. Configuration (B) is handled in a similar fashion, except that we need two additional fields to record the mappings for both the boundary nodes. Namely, we maintain counts having keys of the form (u, v, x, y) representing the mapping of the nodes h, d, q and p to the vertices u, v, x and y. Procedure (2) is also adjusted accordingly. Finally, we can get the projection table cnt(u, v, α|C) via aggregation, as in Equation 1. 5.2 Solving General Blocks In this section, we present procedures for handling generic blocks. We first consider the case of cycle blocks with two boundary nodes. Consider a generic cycle C = (a0 , a1 , . . . , aL−1 ) having two boundary nodes ap and aq , whose nodes and edges may be annotated with other blocks (children of C in the decomposition tree). All these blocks have at most two boundary nodes and these are found on C. For such any block B, the subquery represented by B has the same boundary nodes as that of B. Thus, we can get the projection table for C by joining the projection tables of the 17 subqueries represented by the above blocks, as described below. As before, we consider each possible choice for the highest node ah and split the cycle + − + into two paths Ph,d and Ph,d . The path segment Ph,d also represents a subquery (induced by the union of the nodes found in the path and the blocks annotating path). Thus, we can extend the notion of projection tables for these segments as well. The procedure for + computing the projection table for Ph,d is similar that the one discussed in previous section (Procedure 1 in Figure 6), and works by extending one edge in each step. However, two aspects need to be addressed. Firstly, in contrast to the prior procedure, the edge being extended may be annotated with a block or un-annoated (and correspond to an original edge found in input query Q). In the former case, we perform a join operation with the edges of the data graph (as before), whereas in the latter case the join operation involves the projection table of the block B. For the sake of uniformity, it will be convenient to view the former edges as blocks as well, denoted BG , and associate with them a projection table derived from the graph edges, as follows. For each edge (u, v) ∈ G, set cnt(u, v, α) as 1, for α = {χ(u), χ(v)}; all other entries of the table are set to a count of zero. The second aspect is that the nodes of the cycles may also be annotated, and these get included as part of the sequence of joins being performed. The two aspects are addressed by procedures called NodeJoin and EdgeJoin. The pseudo-code is shown in Figure 7. The procedure starts with an initial table representing the first edge (ah , ah⊕1 ) and performs a sequence of join operation with the blocks annoatating the nodes and edges of the cycle. At this juncture, two intricacies must be highlited. Firstly, the endpoint ah and/or + + ad may be annotated by a block B, which must be joined by either Ph,d or Ph,d , but not + by both (to avoid double counting). For this purpose, we adopt the convention that Ph,d − and Ph,d include only the block annotating ad and ah (if found), respetively. Secondly, for a block with two boundary nodes p and q, the projection table views one of them as the first boundary node and the other as the second (corresponding to the two components of the keys of the form (u, v, α)). Thus, the boundary nodes are ordered and the projection tables need not be symmetric: taking q as the first boundary node and p as the second boundary node would produce a different boundary tables. However, the boundary tables are transpose of each other (cnt(u, v, α) = cnt(v, u, α)). Our algorithm maintains both the tables and uses the appropriate one as dictated by the nodes of the cycle. The pseudo-code reflects the first aspect, but, for the sake of clarity, ignores the second. The projection counts obtained by the above process are joined using a proecure similar to Figure 6, taking into account the configuration in which the boundary nodes occur. These are aggregated over all possible choices of the high node ah . Cycles with a single boundary node are handled in a similar manner by considering + each possible choice for the highest node ah and splitting the cycle into two paths Ph,d and − Ph,d . The setting is simpler with only two configurations possible on how the boundary nodes may appear on the paths: the (single) boundary node may appear in P + or P − . Thus, the prior procedures can be applied here as well. The case of leaf blocks are also handled via join operations. Any leaf block (a, b) is processed by joining the projection table for the blocks annotating the nodes a, the edge (a, b) and the node b (if found). At the end of the traversal process, the root block is solved, which is either a cycle or a 18 singleton node. In the former case, the block is treated as a cycle without boundary nodes. Instead of computing its projection table, we simply count the number of colorful matches, via a procedure similar to that of two-boundary cycles. In the latter case, we consider the projection table of the block annotating the singleton node and output the sum of counts across all entries of the table. The process yields the number of colorful matches of the input query Q. 6 Finding Good Decomposition Trees In each step of the decomposition process, multiple blocks may be available for contraction. Each sequence of choices leads to a unique decomposition tree, and hence, multiple trees are possible for a given query. For example, the query brain1 (Figure 8) admits two decomposition trees: (i) contract the 4-cycle first and then the 6-cycle, and (ii) vice versa. We conducted an experimental study involving a number of real-world data graphs and queries. For each query, we enumerated all the possible decomposition trees and evaluated the execution time on each graph. We observed a maximum difference of 13x in the execution times of two decomposition trees for the same graph-query combination. However, we noted that in most cases the optimal tree is independent of the data graph and is mainly determined by the structure of the query. These observations show that we need a procedure for selecting a good tree, but in this process, we need not analyze the large data graph; rather, it suffices to focus on the structural properties of the small query graph. Our study also showed that the following factors, in the decreasing order of importance, determine the execution time: (i) length of the longest cycle block; (ii) number of boundary nodes; (iii) number of node/edge annotations. Armed with the above observations, we designed a simple heuristic procedure. Enumerate all possible trees for the given query and pick the best using the above factors for comparison. In our experimental setting, barring a few exceptions, the heuristic picked the optimal tree in majority of the cases and a near-optimal tree for the rest. Since the queries are of small size (about 10 nodes), even a sequential implementation of the heuristic takes insignificant amount of running time. 7 Distributed Implementation In this section, we present a brief sketch of the distributed implementation of the two algorithms, highlighting their main aspects. The distributed implementation consists of three layers. The first layer, called the planner, finds a good decomposition tree for the given query a fast sequential implementation the heuristic discussed in Section 6. The second layer, called the plan solver, takes the data graph and the decomposition tree and implements the PS and DB algorithms presented in Section 5. It accomplishes the above task by using efficient join routines supported by the third layer, called engine. The engine has three functionalities. The first is to store the data graph in a distributed manner. This is achieved via a 1D decomposition, wherein the vertices are equally distributed among the processors using block distribution, and each vertex is owned by some processor. The second is to maintain projection tables. These tables are of two types: unary projection 19 Graph Table 1: Real Data Graphs Domain Nodes Edges brightkite condMat astroph enron hepph slashdot epinions orkut roadNetCA brain Geo loc. Collab. Collab. Commn. Citation Soc. net. Soc. net. Soc. net. Road net. Biology 58K 23K 18K 36K 34K 82K 131K 524K 2M 400K 214K 93K 198K 180K 421K 900K 841K 1.3M 2.7M 1.1M Avg Deg 4 4 11 5 12 11 6 3 1.3 3 Max Deg 1135 281 504 1385 848 2554 3558 1634 14 286 tables having single-vertex keys of the form (u, α) associated with blocks having single boundary nodes; binary projection tables having two-vertex keys of the form (u, v, α). The binary tables also have variants involving additional fields for storing the mappings for the boundary vertices. The engine provides a convenient abstraction to the plan solver for all these types of tables. All the tables are maintained as distributed hash tables which use open addressing to resolve collisions. Every entry (u, v, α) is stored on the processor owning v; the degree of v is packed as part of the entry for enforcing the degree constraint in the join operations (of the form u  w in Procedure 1 of Figure 6). Signatures are maintained as bitmaps. The third functionality is to support two types of join operations on the projection tables. The first type of join is used for extending a path segment an edge; this involves a join with either the graph edges or the projection table of the block annotating the edge. In the former case, the extension of an entry with a key (u, v, α) with an edge (v, w) will be performed at the owner of v. The result is an entry with a key (u, w, α0 ); this entry is communicated to the owner of w, where it gets stored. The latter case involves join of two entries with keys (u, v, α1 ) and (v, w, α2 ). Since the first entry is stored at the owner of v and the second, at the owner of w, a communication is performed to bring the two entries to a common processor. The second type of join is used for merging the projection tables of two path segments (for example, Procedure 2 in Figure 6) and it is implemented in a similar way. The two operations are implemented using a standard sort-merge join procedure with signature compatibility checks performed via fast bitwise operations. 8 Experimental Study We present an extensive experimental evaluation of the algorithms presented in the paper. Our experiments include a comparison of the algorithms on execution time, strong and weak scaling studies for our algorithm, and studies to evaluate the quality of our query plan generation heuristic and the efficacy of color coding for treewidth two queries. 20 Figure 8: Real world queries used in our study. Figure 9: Average execution time (seconds). 8.1 Experimental Setup System. The experiments were conducted on an IBM Blue Gene/Q system [12]. Each BG/Q node has 16 cores and 16 GB memory; multiple nodes are connected using a 5D torus interconnect. Our implementation is based on MPI2 with gcc 4.4.6 with the number of ranks varying from 32 to 512. Each MPI rank was mapped to a single core. The number of MPI ranks mapped to a node was adjusted based on the memory requirements of individual experiments. Graphs. The experiments involved nine real world graphs obtained from the SNAP dataset collection and the human brain network from the Open Connectome Project (http: //snap.stanford.edu, http://www.openconnectomeproject.org/). Our benchmark includes representative graphs from different domains in SNAP. The graphs and their characteristics are presented in Table 1. We also used synthetic R-MAT graphs [11], for the purpose of studying the weak scaling behavior of our algorithms. Queries. Our query benchmark consists of the ten real world queries shown in Figure 8. The queries were derived from prior network analysis work spanning diverse domains: dros, ecoli1, ecoli2, brain1, brain2, brain3 - biological networks [22, 19]; glet1, glet2 - graphlets [7]; wiki - collaboration networks [32]; youtube spam networks [24]. Algorithms. We study two algorithms: PS, which serves as the baseline, and our degree based DB algorithm. Recall that PS is equivalent to the dyamic programming based algorithm of Alon et al. [2]. 21 8.2 Graph-Query Characteristics The characteristics of the input graph and query strongly influence the running time of query counting algorithms. To obtain an overall characterization of the phenomenon, we measured the execution time of the DB algorithm on each of the 100 real graph and query combinations using 512 MPI ranks. Figure 9 shows the average running time for each graph across the ten queries and the average running time of each query across the ten graphs. The wide variations in execution time across graphs and queries is indicative of their relative difficulty in practice. For example, although roadNetCA is a larger graph than epinions, the average running time of the former is smaller than the latter by an order of magnitude. We can understand this behaviour by studying the skew in underlying degree distribution. In general, counting colorful occurrences of a query on a graph with high skew (indicated by high maximum degree in Table 1) tends to be computationally expensive. Similarly, the queries also exhibit large variations in running time, ranging from sub-second for youtube, glet1 and glet2 to more than a minute for brain2 and brain3. These variations can be accounted for by studying the differences in the size and the sub-structures of the queries. We observed that queries with longer cycles are more challenging. As an extreme case, a 12-vertex complete binary tree query requires 2 seconds on average, in contrast to the 10-vertex brain3 query which requires nearly 2 minutes on average, exemplifies our observation. 8.3 Performance Comparison of PS and DB Algorithms We study the performance of the PS and DB algorithms on 100 graph-query combinations obtained by selecting a graph from Table 1 and a query from Figure 8. For our DB algorithm, we used plans supplied by the heuristic described in Section 6. In contrast, for the PS algorithm, we enumerated all the possible plans and obtained the optimal plan. Thus, we compare our algorithm to the best possible scenario for the baseline algorithm. We compute the improvement factor (IF ) of DB over PS as the ratio of the execution time of PS to DB. Figure 10 shows IF at 32 and 512 ranks. The combinations where DB outperforms PS (IF > 1) are highlighted in green. The blank entries represent cases where PS (or DB) did not complete execution, due to lack of available memory. At 32 ranks, we can see that DB outperforms PS on 84% of the graph-query combinations with IF being as high as 9.1x (average 2.4x). At 512 ranks, DB outperforms the baseline on 89% of the cases, with IF becoming as high as 28.7x (average 5.0x). We can see that the relative performance of the two algorithms is dependent on the graph-query pair. For instance, the average IF on enron and condmat graphs are 8.4 and 3.1 on 512 ranks, respectively, correlating well with their skew in the degree distribution (see Table 1). Similarly, the improvement factors is higher on complex queries such as brain1 where the average improvement is 13.1x, compared to youtube where the average improvement is only 4.1x. The phenomenon becomes extreme in the case of road networks that have very low skew and exhibit sub-second average running time across queries. Our DB algorithm scales better than PS, as demonstrated by the increase in IF at higher ranks. For different graph-query combinations, we computed the ratio of IF at 512 ranks to that of 32 ranks and found that IF increases by a factor of up to 4.7x (average 1.7x). 22 (a) 32 Ranks (b) 512 Ranks Figure 10: Improvement factor of the DB algorithm over the PS algorithm. 23 DB PS DB PS 1.00 Normalized Time Normalized MaxLoad 1.00 0.75 0.75 0.50 0.50 0.25 0.25 0.00 0.00 brain1 brain2 dros ecoli1 ecoli2 glet1 glet2 wiki youtube brain1 brain2 dros ecoli1 ecoli2 glet1 glet2 (a) Time wiki youtube (b) Max. Load DB PS Normalized AvgLoad 1.00 0.75 0.50 0.25 0.00 brain1 brain2 dros ecoli1 ecoli2 glet1 glet2 Real World Queries wiki youtube (c) Avg. Load Figure 11: Normalized execution time, average load and maximum load on enron graph. To understand this trend further, we compute the load (number of projection function operations) for both algorithms for processing different queries on the enron graph at 512 ranks. For different queries, Figure 11 shows the execution time and the average and maximum load. We can see that DB has lesser average load than PS, since DB avoids wasteful computations. Furthermore, the improvement obtained by DB over PS on execution time correlates well with improvement obtained on the maximum load. For example, on ecoli1 query, even though PS outperforms DB at 32 ranks, the perforamance is reversed at 512 ranks (see Fig 10), because of superior load balancing characteristic of DB. 8.4 Scalability Characteristics of DB Algorithm We studied the scaling of DB across the 100 graph-query combinations. For each combination, we computed the ratio of the execution time at 512 ranks to that of 32 ranks. Figure 12 summarizes the above information by providing the averge of the above speedup for each query across graphs and the same for each graph across queries. As against an 24 Figure 12: Avg. speedup of DB at 512 ranks compared to 32 ranks. ● brain1 brain2 dros ecoli1 ecoli2 ● glet2 glet1 ● wiki ● youtube Ideal ● ● Speedup 8 ● ● 4 ● ● 2 1 brain3 dros ecoli1 glet1 ● wiki ecoli2 ● glet2 youtube 10000 Time (Seconds) 16 brain1 brain2 ● ● ● 32 ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● 32 64 128 256 512 1000 100 10 1 64 128 Ranks 256 512 Ranks Figure 13: Strong and weak scaling ideal speedup of 16x, we see that the algorithms obtains speedups in the range of 7.4x to 15.8x. We studied the strong scaling behavior of our algorithm, using enron as a representative graph. Taking 32 ranks as the baseline, Figure 13 shows the speedup up to 512 ranks for different queries. The algorithm scales well across queries, with an average speedup of 8.2x and maximum speedup of 9.9x at 512 ranks (as against an ideal speedup of 16x). To study weak scaling, we use R-MAT synthetic graphs with parameters A = 0.5, B = 0.1, C = 0.1 and D = 0.3 and edge factor 16, suggested in a Graph 500 benchmark specification (http://www.cc.gatech.edu/˜jriedy/tmp/graph500/). The number of vertices was fixed at 1K per rank and the number of ranks was varied from 32 to 512. We report the execution times each query-rank combination in Figure 13. We see excellent weak scaling behavior with the execution times at 512 ranks remaining close to that of the baseline 32 ranks. 8.5 Evaluation of Plan Generation Heuristic We studied the quality of our plan generation heuristic for the DB algorithm at 512 ranks. For each graph-query combination, we determined the optimal plan via an exhaustive enumeration. We compared the execution time of the heuristic plan to the optimal plan and measured the percentage difference. These results are reported in Figure 14. We can see that in 90% of the case, the heuristic generated the optimal plan, whereas in the remaninig cases, the difference was at most 15%. 25 Figure 14: Error % of the execution time of the plan proposed by the plan heuristic with reference to the optimal plan for each graph-query combination. Figure 15: Coefficient of variation with 50 trials of color coding for each graph-query combination. 8.6 Precision of Color Coding We evaluated the precision of color coding on our benchmark by performing independent trials and computing the empirical variance of the sample (see Section 2). Specifically, for a given graph-query combination we performed a sequence of trials, where in each trial the colorful count ncolorf ul (G, Q, χ) was computed for a fresh random coloring. We performed 10 random trials for each of the 100 graph-query combinations in our test set and evaluated the empirical mean and variance of the number of colorful matches. For each graph-query combination, we computed the coefficient of variation, which is the ratio of the empirical variance to the mean. The results are shown in Figure 15. A value close to 0 indicates the convergence of our estimate to the true mean n(G, Q). We observed that with only three trials, 82% of the graph-query combinations had coefficient of variation at most 0.1; when the number of trials was increased to 10, it increases to 91%. Hence, using 512 ranks, for a majority of the input graph-query combinations in our benchmark, we require less than a minute to count the actual number of matches of the query, with ≈ 10% accuracy. We conclude that our DB algorithm enables fast approximate counting of treewidth 2 queries for data graphs spanning various real domains. 26 9 Cycle queries on random power law graphs In this section we concentrate on cycle queries of constant size and analyze the expected runtime of a variant of the PS and DB procedures on a certain class of random data graphs. We prove a lower bound on the expected runtime of the PS procedure and an upper bound on the expected runtime of the DB procedure. Both bounds are functions of the (expected) degree sequence of the graph. We show that our upper bound on the runtime of the DB procedure is never worse (up to constant factors) than the lower bound on the PS procedure. Moreover, if the random graphs satisfy a natural power law property then we prove that the expected runtime of the DB procedure is polynomially better. Recall that the most complicated blocks in our general decomposition of the query graph are (annotated) cycles. Thus, we postulate that the better performance of our variant of the DB procedure on cycle queries explains the better performance of the DB procedure studied in the main body of the paper on queries of treewidth 2. The class of random graphs considered is a certain variant of the Chung-Lu graphs [14], a popular model for random graphs that captures several properties of real world social networks, as defined precisely below. 9.1 The procedures analyzed Consider a cycle query C of constant size k. Since the query graph is a cycle, the decomposition tree consists of only a root node which represents this cycle with a single boundary node. Recall that procedure PS computes cnt(u, {1, . . . , k}|C), for each node u. For this it first computes cnt(u, v, α1 |P + ) and cnt(u, v, α2 |P − ) for all of nodes v and all signatures. Since k is constant the number of signatures is also constant and thus computing cnt(u, {1, . . . , k}|C) given cnt(u, ·, ·|P + ) and cnt(u, ·, ·|P − ) can be done in linear time. In the PS procedure the computation of cnt(u, ·, ·|P + ) and cnt(u, ·, ·|P − ) is done by iteratively recomputing cnt(u, v, ·|P + ) for all u and v. This recomputation can be viewed as a optimized version of enumerating all paths starting at u, where instead of storing paths explicitly, we only store the two endpoints, the signature, and a count. Our simplified variant of the PS procedure, which is more amenable to analysis, computes cnt(u, ·, ·|P + ) and cnt(u, ·, ·|P − ) by enumerating all possible paths, instead of performing this optimized enumeration. Thus, its complexity is linear in the number of possible paths of lengths 1, . . . , d 12 ke. We will refer to this version of PS procedure as the PS procedure throughout this section to simplify notation. To increase the efficiency of our PS procedure when applied to cycle queries we can break symmetry using the id of the nodes and count only colorful matches where node u has the largest id among all data nodes in the image of π. Consequently, cnt(u, ·, ·|P + ) and cnt(u, ·, ·|P − ) need only to count paths with the property that node u has the largest id among nodes on the path. For an integer q ≥ 3 let Y (q) = |{(u1 , . . . , uq ) is a simple path and id(u1 ) > id(uj ), j ∈ [2..q]}| . It follows that the expected complexity of procedure PS is linear in 27 Pdk/2e q=1 (2) E[Y (q)]. Later, we derive lower bounds on E[Y (q)] for any constant q, and our bounds are monotone increasing in q. Thus, the dominant term in the complexity of procedure PS is provided by our bound on Y (d 21 ke). Procedure DB also computes cnt(u, {1, . . . , k}|C), but does it by computing high-starting colorful matches. Again, to increase the efficiency of procedure DB when applied to cycle queries we can break symmetry and only compute cnt(u, {1, . . . , k}|C, hi = u), namely, colorful matches where node u is the highest in the degree based ordering among all data + nodes in the image of π. It follows that for this we need only to compute cnt∗ (u, ·, ·|Ph,d ) − ∗ and cnt (u, ·, ·|Ph,d ), namely, the number of high-starting colorful matches for the paths + − Ph,d and Ph,d , wherein π(ah ) = u, π(ad ) = v and sig(π) = α, for all possible v and α. Note that similarly to the PS procedure, the recomputation in the DB procedure considered in the main body of the paper can be viewed as a optimized enumeration, where instead of storing paths explicitly, we only store the two endpoints, the signature, and a count. Our simplified variant of the DB procedure, which is more amenable to analysis, computes the counts by enumerating all these paths, instead of performing this optimized enumeration. For an integer q ≥ 3 let X(q) = |{(u1 , . . . , uq ) is a simple path and u1  uj , j ∈ [2..q]}| . (3) Pdk/2e It follows that the expected complexity of procedure DB is linear in q=1 E[X(q)]. Later, we will derive bounds on E[X(q)], and since our bounds will be monotone increasing in q, the dominant term in complexity of procedure DB is provided by our bound on E[X(d 21 ke)]. 9.2 The random data graphs We analyze our algorithm on Chung-Lu graphs whose expected degree sequence has some additional property. Chung-Lu distribution The Chung-Lu distribution on random graphs is defined as follows. First choose a degree sequence d = (d1 , . . . , dn ), where V = [n]. We assume that P √ du ≥ 1 for all u ∈ V . Let m = 21 u∈V du . We assume that m ≥ n and maxu∈V du ≤ n. To generate the graph G = (V, E) we include each edge (u, v) independently with probability P du dv /(2m). Note that the expected degree of every node u ∈ V is v∈[n] du dv /(2m) = du as required. We write deg(u) to denote the actual degree of u in G. We require the degree sequence d = (d1 , . . . , dn ) to be λ-balanced. Balanced degree sequence A degree d = . , dn ) is λ-balanced for some Psequence P(d1a, . .P a+b λ ∈ (0, 1) if for any integers a, b ≥ 1, u du ≤ λ · ( u du )( u dbu ). Intuitively, a degree sequence is balanced if it is not too concentrated on the high degree nodes. For some of the claims we require the sequence to satisfy the stronger truncated power law. 28 Truncated power law distribution A degree sequence d = (d1 , . . . , dn ) satisfies the truncated power law for a constant α ∈ (1, 2) if for each 0 ≤ j ≤ 21 log n, the number of nodes with degree between 2j and 2j+1 is Θ(n/2αj ). We show later that if a sequence satisfies the power law for α then it is λ-balanced for λ = O(nα/2−1 ). 9.3 Main theorem Theorem 9.1 Let G be sampled according to the Chung-Lu distribution on n vertices with an n−δ -balanced degree sequence d, for some constant δ > 0, and let q ≥ 3 be a constant. Then, (1) The expected number of paths (u1 , . . . , uq ) of length q for which id(ui ) is with the highest id is lower bounded by 1 E[Y (q)] ≥ (1 − o(1)) · (2m)−q+3 q !q−2 X d2u . u (2) The expected number of high-starting paths of length q is upper bounded by !q−1 E[X(q)] ≤ C(2m)−q+2 X d2−1/(q−1) u u∈V for some constant C > 1. (3) Based on the above inequalities 1. E[X(q)] = O(E[Y (q)]). 2. If the degree sequence satisfies the truncated power law with parameter α, for any constant α ∈ (1, 2), then E[X(q)] is polynomially smaller than E[Y (q)]. Proof: (1) follows by Lemma 9.5. (2) follows by Lemma 9.6. (3) follows by putting together Lemma 9.7 and Lemma 9.8. P P 2−1/(q−1) P P Remark 9.2 Note that if u d2u ≥ ≥ u du = 2m and u du u du = 2m, since du ≥ 1 by our assumption on the degree sequence. Thus both E[Y (q)] and E[X(q)] are monotone in q. It follows that for any constant k, the dominant terms in the complexity of our PS and DB procedures for query cycles of length k is indeed determined by E[Y (d 12 kee)] and E[X(d 12 kee)], respectively, as claimed in section 9.1. The rest of this section is devoted to proving Lemmas 9.5, 9.6, 9.7 and 9.8. The analysis uses the approach of [5]. It turns out, however, that new ingredients are necessary for handling cycles due to the presence of multiple intermediate nodes. 9.4 Useful facts In this section we state some simple claims and known results that will be useful in the rest of the proof. The following claim specifies the probability that a fixed path exists in a random graph drawn from the Chung-Lu distribution: 29 Claim 9.1 Let G be drawn from the Chung-Lu distribution with degree sequence d. Then for any q ≥ 2 and a vector (u1 , . . . , uq ) ∈ V q of distinct nodes q−1 du1 duq Y d2uj Pr[(u1 , . . . , uq ) is a path in G] = · . 2m 2m j=2 Proof: Since the input graph G is drawn from the Chung-Lu distribution, for each j = 1, . . . , q − 1 we have du du Pr[(uj , uj+1 ) ∈ E] = j j+1 . 2m Since edges are included in E independently, we have Pr[(u1 , . . . , uq ) is a path in G] = q−1 Y j=1 q−1 duj duj+1 du du Y d2uj = 1 q · 2m 2m 2m j=2 We will also use Theorem 9.3 (Chernoff bound) Let X1 , . . . , Xn be independent 0/1 Bernoulli random variP ables. Let X = ni=1 Xi , and let µ := E[X]. Then for any  ∈ (0, 1) 2 µ) Pr[X ≤ (1 − )µ] < e−Ω( and for every λ > 0 Pr[X ≥ (1 + λ)µ] < (e/(1 + λ))(1+λ)µ A simple corollary of the bound is P Corollary 9.4 Let X1 , . . . , Xn be independent 0/1 Bernoulli random variables. Let X = ni=1 Xi , and let µX := E[X]. Let Y1 , . . . , Yn be independent 0/1 Bernoulli random variables. Let Y = P n −cµX , for some constant i=1 Yi , and let µY := E[Y ]. If µY ≤ µX /20, then Pr[Y ≥ X] < 2e c > 0. Proof: We have Pr[Y ≥ X] ≤ Pr[X ≤ (µX + µY )/2] + Pr[Y ≥ (µX + µY )/2]. Since (µX + µY )/2 ≤ (3/4)µX , we have Pr[X ≤ (µX + µY )/2] < e−cµX , for some constant c > 0 by the first bound from Theorem 9.3 invoked with  = 1/4. We also have (µX + µY )/2 ≥ 10µY , so by the second bound from Theorem 9.3 invoked with λ = 9 we get Pr[Y ≥ (µX + µY )/2] < (e/10)10µY ≤ (e/10)µX /2 . Clearly, (e/10)µX /2 = e−cµX for some constant c > 0, as required. Finally, we need the following inequality on the degree sequence d. Claim 9.2 For all t ≥ 1 one has !1/t !(t−1)/t X X X 2−1/t 2 du ≤ du · du . u u u 30 Proof: By Hölder’s inequality with conjugates t and X d2−1/t = u u X we have 2−2/t d1/t u · du u !1/t ≤ X t (d1/t u ) X · u ≤ X 1 (2−2/t)· 1−1/t du !1−1/t u !1/t du !(t−1)/t X · d2u u u 9.5 1 1−1/t Proofs of the lower and upper bounds We start by lower bounding E[Y (q)]. Lemma 9.5 Let G = (V, E), V = [n] be drawn from the Chung-Lu distribution with degree sequence d. Suppose that node id’s are chosen uniformly at random. For any integer q ≥ 3 let Y (q) be defined by (2). Then if d is n−δ -balanced for a constant δ > 0, the following holds for any constant q !q−2 X 1 −q+3 2 E[Y (q)] ≥ (1 − o(1)) · (2m) du . q u Proof: We have E[Y (q)] = X (u1 ,...,uq )∈V ui distinct Pr[(u1 , . . . , uq ) is a path in G] · Pr [id(u1 ) > id(uj ), j ∈ [2..q]] q: (4) By Claim 9.1 one has for any vector (u1 , . . . , uq ) of distinct nodes Pr[(u1 , . . . , uq ) is a path in G] = q−1 Y j=1 q−1 duj duj+1 du1 duq Y d2uj = · . 2m 2m 2m j=2 Furthermore, for any fixed q-tuple of distinct nodes (u1 , . . . , uq ) we have Pr [id(u1 ) > id(uj ), j ∈ [2..q]] = 1 q since id’s are uniformly random by assumption of the lemma. (Note that this implies that Y (q) is lower bounded by a constant times the total number of paths of length q, since q is constant.) 31 Plugging this bound into (4), we get X E[Y (q)] = Pr[(u1 , . . . , uq ) is a path in G] · Pr [id(u1 ) > id(uj ), j ∈ [2..q]] (u1 ,...,uq )∈V q : ui distinct = 1 q X (u1 ,...,uq )∈V q : ui distinct q−1 du1 · duq Y d2uj · 2m 2m j=2 (5)     q−1 Y X d2uj X duq 1X · = du1  ·  q 2m 2m u1 ∈V 1 − q j=2 uj ∈V uq ∈V X (u1 ,...,uq )∈V q : ui not distinct du1 · duq · 2m q−1 Y j=2 d2uj 2m . Clearly,  1 q  q−1 Y X d2uj X duq 1    du1 · · = (2m)3−q · 2m 2m q   X u1 ∈V j=2 uj ∈V uq ∈V !q−2 X d2u (6) u∈V We now show that 1 q X (u1 ,...,uq )∈V q : ui not distinct du1 · duq · 2m q−1 Y j=2  d2uj 1 = o  (2m)3−q · 2m q !q−2  X d2u . (7) u Together with (5) this gives the result. We show that (7) follows from the assumption that the degree sequence d is balanced. Let U = {(u1 , . . . , uq ) ∈ V q : ui not distinct} Wk,` = {(u1 , . . . , uq ) ∈ V q : uk = u` } , for 1 ≤ k < ` ≤ q. Note that U ⊆ ∪1≤k<`≤q Wk,` . Let ~v denote a vector (u1 , . . . , uq ) ∈ V q . To simplify the exposition denote q−1 du · duq Y d2uj · . S(~v ) = 1 2m 2m j=2 We show that for every 1 ≤ k < ` ≤ q, X ~v ∈Wk,` 1 S(~v ) ≤ n−δ (2m)3−q · q !q−2 X d2u . (8) u Since there are constant number of such sets this implies (7). To prove (8) we consider four different cases. 32 Case 1: 2 ≤ k < ` ≤ q − 1. In this case X Y d2uj du1 · duq d4uk · · 2m 4m2 2m (u1 ,...,uq )∈Wk,` j∈[2..q−1]\{k,`}       X duq X d4u Y X d2uj 1 X k  · =  du1  ·  · q 2m 4m2 2m u1 ∈V uq ∈V uk ∈V j∈[2..q−1]\{k,`} uj ∈V         X duq X X d2u X d2u 1 k  k · ≤ n−δ  du1  ·  · · q 2m 2m 2m 1 q S(~v ) = ~v ∈Wk,` X uq ∈V u1 ∈V Y X j∈[2..q−1]\{k,`} uj ∈V 1 = n−δ (2m)3−q · q uk ∈V uk ∈V d2uj 2m !q−2 X d2u u∈V Note that the inequality follows since the degree sequence d is n−δ -bounded. Case 2: k = 1 and ` = q. In this case X S(~v ) = ~v ∈W1,q 1 q X (u1 ,...,uq )∈W1,q  d2u1 · 2m Y j∈[2..q−1] d2uj 2m  Y X d2uj 1  X d2u1  = · q 2m 2m u1 ∈V j∈[2..q−1] uj ∈V     X Y X d2uj X 1 −δ  du1    ≤ n · du1 · q 2m 2m u1 ∈V u1 ∈V j∈[2..q−1] uj ∈V !q−2 X 1 −δ d2u = n (2m)3−q · q u∈V Case 3: k = 1 and ` ∈ [2..q − 1]. In this case X ~v ∈W1,` Y d2uj d3u1 duq · · 2m 2m 2m (u1 ,...,uq )∈W1,` j∈[2..q−1]\{`}     Y X d2uj 1  X d3u1   X duq  = · · q 2m 2m 2m u1 ∈V uq ∈V j∈[2..q−1]\{`} uj ∈V       X duq X d2u Y X d2uj 1 −δ  X 1 · ≤ n du1  ·  · q 2m 2m 2m u1 ∈V uq ∈V u1 ∈V j∈[2..q−1]\{`} uj ∈V !q−2 X 1 −δ = n (2m)3−q · d2u q S(~v ) = 1 q X u∈V 33 Case 4: k ∈ [2..q − 1] and ` = q. This case is symmetric to Case 3. The following lemma provides an upper bound on the expected runtime of the degreebased algorithm for enumerating cycles of length q ≥ 3: Lemma 9.6 Let G = (V, E), V = [n] be drawn from the Chung-Lu distribution with degree sequence d. For any integer q ≥ 3 let X(q) be defined by (3). Then there exists an absolute constant C > 1 such that !q−1 X −q+2 2−1/(q−1) E[X(q)] ≤ C(2m) du . u∈V We have by (3) X Pr[(u1 , . . . , uq ) is a path in G and ∀j ∈ [2..q] deg(u1 ) ≥ deg(uj )] E[X(q)] ≤ Proof: (u1 ,...,uq )∈V q : ui distinct where deg(u) stands for the actual degree of the node u ∈ V in the graph G. Note that while E[deg(u)] = du , there may be deviations due to the sampling process. This fact introduces some complications in the analysis. Similarly to [5], we start by splitting the summation above into two. For a constant φ (to be fixed later to 1/80) let (9) E[X(q)] = S1 + S2 , where X S1 := Pr[(u1 , . . . , uq ) is a path in G and ∀j ∈ [2..q] deg(u1 ) ≥ deg(uj )] (u1 ,...,uq )∈V q :ui distinct, ∀j∈[2..q] du1 >φduj X S2 := Pr[(u1 , . . . , uq ) is a path in G and ∀j ∈ [2..q] deg(u1 ) ≥ deg(uj )]. (u1 ,...,uq )∈V q :ui distinct ∃j∈[2..q] s.t. du1 ≤φduj We now bound the two summations separately. Bounding S1 Claim 9.1 To bound S1 we use the fact that for any q-tuple of distinct u1 , . . . , uq by Pr[(u1 , . . . , uq ) is a path in G and ∀j ∈ [2..q] deg(u1 ) ≥ deg(uj ) ≤ Pr[(u1 , . . . , uq ) is a path in G] = q−1 du1 · duq Y d2uj · . 2m 2m j=2 We thus get S1 ≤ X (u1 ,...,uq )∈V q ∀j∈[2..q] du1 >φduj 34 q−1 du1 · duq Y d2uj · 2m 2m j=2 (10) Since φduj < du1 for all potential paths (u1 , . . . , uq ) in the summation above, we have   1 1− q−1 du1 q−2 q−1 u1 =d > q−1 Y (φduj ) 1 q−1 =φ q−2 q−1 q−1 Y 1 q−1 uj d ≥φ j=2 j=2 q−1 Y 1 duq−1 j . j=2 It follows that du1 · q−1 Y d2uj = du1 · j=2   q−1 1 Y 2− q−1 duj j=2 · q−1 Y 1 q−1 uj d j=2 q−1 1 1 Y 2− q−1 . ≤ duj φ   j=1 Substituting this bound in (10), we get X S1 ≤ (u1 ,...,uq )∈V q ∀j∈[2..q] du1 >φduj 1 ≤ φ ≤ X S2 = duq · (u1 ,...,uq )∈V q 1 (2m)−q+2 φ Bounding S2 q−1 du1 · duq Y d2uj · 2m 2m 1 ≤ φ j=2 q−1 Y X  2−1/(q−1) duj 1 ≤  φ 2m j=1   !q−1 1 X 2− q−1 du . u duq · (u1 ,...,uq )∈V q ∀j∈[2..q] du1 >φduj  X uq ∈V duq  · q−1 Y j=1 q−1 Y 2−1/(q−1) duj 2m X du2−1/(q−1) j 2m j=1 uj ∈V Recall that X Pr [(u1 , . . . , uq ) is a path in G and ∀j ∈ [2..q] deg(u1 ) ≥ deg(uj )] (u1 ,...,uq )∈V q : ∃j∈[2..q] s.t. du1 ≤φduj = X Pr[∀j ∈ [2..q] deg(u1 ) ≥ deg(uj ) | E(u1 , . . . , uq )] · Pr[E(u1 , . . . , uq )], q: (u1 ,...,uq )∈V ∃j∈[2..q] s.t. du1 ≤φduj where we let E(u1 , . . . , uq ) := {(u1 , . . . , uq ) is a path in G}. We omit the argument of E below to simplify notation. Note that we have du1 ≤E[deg(u1 ) | E] ≤ du1 + 1 duj ≤E[deg(uj ) | E] ≤ duj + 2 for all j ∈ [2..q − 1] duq ≤E[deg(uq ) | E] ≤ duq + 1. Furthermore, deg(uj ) is a sum of independent 0/1 Bernoulli random variables even conditional on the event E. Now we would like to apply Corollary 9.4 to random variables deg(u1 ) and deg(uj ) conditional on E, but there is one more issue: these random variables are dependent through the potential edge (u1 , uj ). To avoid this issue, we omit the 0/1 Bernoulli random variable corresponding to this potential edge from both random variables deg(u1 ) and deg(uj ). Let deg(u1 ) and deg(uj ) be the modified random variables. Namely, deg(u1 ) := deg(u1 ) − 1(u1 ,uj )∈E and deg(uj ) := deg(uq ) − 1(u1 ,uj )∈E , 35 where 1(u1 ,uj )∈E is the random variable corresponding to the sampling of the potential edge (u1 , uj ). Note that conditional on E the random variables deg(u1 ) and deg(uj ) are independent, and are both sums of independent Bernoulli 0/1 random variables. Note that du ≥ 1 for every node u ∈ V , and since du1 ≤ φduj , then duj ≥ 1/φ. It follows that E[deg(u1 ) | E] = E[deg(u1 ) − 1(u1 ,uj )∈E | E] ≤ du1 + 1 ≤ φ(duj + 1 ) ≤ 2φduj φ (11) On the other hand since du1 < m, E[deg(uj ) | E] = E[deg(uj ) − 1(u1 ,uj )∈E   du1 1 ≥ duj . | E] ≥ duj 1 − 2m 2 (12) Putting these bounds together with the assumption that φ < 1/80, we get that the preconditions of Corollary 9.4 are satisfied, and hence Pr[deg(u1 ) ≥ deg(uj ) | E] = Pr[deg(u1 ) − 1(u1 ,uj )∈E ≥ deg(uj ) − 1(u1 ,uj )∈E | E] = Pr[deg(u1 ) ≥ deg(uj ) | E] ≤ 2e−Ω(duj ) . (13) This allows us to bound Pr[∀j ∈ [2..q] deg(u1 ) ≥ deg(uj ) | E] as follows. Let j ∗ be the index of the highest expected degree node in {u2 , . . . , uq }, that is, j ∗ := argmaxj∈[2..q] duj . Clearly, Pr[∀j ∈ [2..q] deg(u1 ) ≥ deg(uj ) | E] ≤ Pr[deg(u1 ) ≥ deg(uj ∗ ) | E]. Note that if there exists j ∈ [2..q] such that du1 ≤ φduj , then also du1 ≤ φduj ∗ . Thus, applying (13) with j = j ∗ we get Pr[∀j ∈ [2..q] deg(u1 ) ≥ deg(uj ) | E] ≤ Pr[deg(u1 ) ≥ deg(uj ∗ ) | E] ≤ 2e −Ω(duj ∗ ) . Substituting this bound in the expression for S2 and using the fact that 2e   Q −Ω 1q duj 2 j∈[1..q] e (since duj ∗ ≥ duj for all j ∈ [1..q]), we get S2 ≤ X (2m)−q+1 · du1 e −Ω( 1q du1 ) · duq e −Ω( 1q duq ) (u1 ,...,uq )∈V q : ∃j∈[2..q] s.t. du1 ≤φduj ≤ (2m)−q+1 · X · Y −Ω(duj ∗ ) ≤ −Ω( 1q duj ) d2uj e j∈[2..q−1] du e −Ω( 1q du ) u∈V !2 · X −Ω( 1q du ) d2u e !q−2 . u∈V Recall that the first two moments of the exponential distribution are constants and thus since q is assumed to be constant we get that both X X −Ω( 1q du ) −Ω( 1q du ) du e and d2u e u∈V u∈V  are constants and thus S2 = O (2m)−q+1 = o(S1 ). 36 9.6 Comparing the lower and upper bounds We show that the bound on E[X(q)] is not much worse than our bound on E[Y (q)] for any degree sequence d that is n−δ -balanced. We later show that our bound gives polynomially smaller runtime if the degree sequence d satisfies the truncated power law. Lemma 9.7 For any q ≥ 3 and any n−δ -balanced degree sequence d, for a constant δ > 0, E[X(q)] = O(E[Y (q)]). Proof: We start with the bound from Lemma 9.6:  X E[X(q)] ≤ C(2m)2−q du 1 2− q−1  !q−1 . u∈V By Claim 9.2 with t = q − 1 we have  X du 1 2− q−1 !  X ≤ u ! q−1−1 1 q−1 q−1 X · du u d2u . u Substituting this into the bound above, we get that  E[X(q)] ≤ C(2m) 2−q X du 1 2− q−1  !q−1 u∈V  ≤ C(2m) ! X 2−q  ! q−2 q−1 1 q−1 q−1 · du X u = C(2m)2−q u du  u !q−2 ! X d2u · X d2u !q−2 = C(2m)3−q u X d2u . u The lemma follows by comparing the above bound to the bound on E[Y (q)] provided by Lemma 9.5 (note that the preconditions are satisfied, as d is n−δ -balanced for a constant δ > 0 by assumption of the lemma). We now compare the bounds from Lemma 9.6 and Lemma 9.5 when the graph G is drawn from the Chung-Lu distribution with a degree sequence that satisfies the truncated power law. Lemma 9.8 Let G be a random graph drawn from the Chung-Lu distribution with degree sequence d that satisfies the truncated power law with exponent α, for a constant α ∈ (1, 2). The following bounds hold for any constant q ≥ 3.   1 (1) E[Y (q)] = Ω nα−1+ 2 (2−α)q  1 1  (2a) E[X(q)] = O n 2 + 2 (2−α)(q−1) , for α ∈ (1, 2 − 1 q−1 ). 1 (2b) E[X(q)] = O (n log n), for α ∈ [2 − q−1 , 2). Proof: We first prove the bound on E[Y (q)]. As shown later in Claim 10.1 the condition that the degree sequence d satisfies the truncated power law implies that the degree sequence d is n−δ -balanced for a constant δ > 0, and hence preconditions of Lemma 9.5 are 37 satisfied. To apply the bound of Lemma 9.5 we bound 1 2 X 2 u du . P 1 log2 n  log2 n 2X   X n  2j (2−α)j 1− 12 α = 2 = n · 2 = Θ n · n . 2αj d2u u j=0 j=0 The number of edges in a graph with degree sequence that satisfies the power law with exponent α ∈ (1, 2) satisfies     X X X 1 n 2(1−α)j · n = Θ(n). m= du = Θ  2j · αj  = Θ  2 2 j≥0 j≥0 u∈V Plugging both bounds in the bound of Lemma 9.5 we get     1 1 E[Y (q)] = Ω n−q+3 n(2− 2 α)(q−2) = Ω nα−1+ 2 (2−α)q . To bound E[X(q)] using Lemma 9.6 we need first to bound the following summation. X   1 2− q−1 du 1 1 2 log2 n log2 n     2X X 1 1 n 2− q−1 j 2−α− q−1 j = ·2 2 =n· . 2αj j=0 u∈V (14) j=0 The sum (14) above is dominated either by the first term or by the last term, depending 1 on whether α is less than or greater than 2 − q−1 .   1 Case 1: α ∈ 1, 2 − q−1 . In this case the sum (14) is dominated by the last term and thus bounded by 1 2 n· log2 n X 2   1 2−α− q−1 j       1 1 2− 12 α+ q−1 1+ 12 2−α− q−1 =O n . =O n j=0 Substituting this into the bound provided by Lemma 9.6, using the fact that m = Θ(n) we get       1 1  1 (q−1) 2− 12 α+ q−1 −q+2 E[X(q)] = O n n = O n 2 + 2 (2−α)(q−1) h Case 2: α ∈ 2 − 1 q−1 , 2  . In this case the sum (14) is dominated by the first term which is constant and since we have 21 log n summands the sum (14) is O(n log n). Substituting this into the bound provided by Lemma 9.6, using the fact that m = Θ(n) we get     E[X(q)] = O n−q+2 (n log n)q−1 = O n (log n)q−1 . Applying these bounds we conclude the following 38 Corollary 9.9 If G is a random graph drawn from the Chung-Lu distribution with degree sequence d that satisfies the truncated power law with exponent α, for a constant α ∈ (1, 2), then E[X(q)] = o (E[Y (q)]).   1 Proof: Using the bounds of Lemma 9.8 above. If α ∈ 1, 2 − q−1 the improvement of the degree based algorithm over the id based (naive) algorithm is 1 1 nα−1+ 2 (2−α)q E[Y (q)] ≥ 1 1 = n 2 (α−1) E[X(q)] n 2 + 2 (2−α)(q−1) h  1 If α ∈ 2 − q−1 , 1 the improvement of the degree based algorithm over the id based (naive) algorithm is 1 1 E[Y (q)] nα−1+ 2 (2−α)q = nα−2+ 2 (2−α)q · (log n)1−q ≥ q−1 E[X(q)] n (log n)  Note that if If α ∈ 2 − 10 1 q−1 , 1  then the second term vanishes. Power law and balanced sequences In this section we show that a degree sequence that satisfies the truncated power law is also balanced. Claim 10.1 Any degree sequence d that satisfies the truncated power law with exponent  α, for  any 1 α ∈ (1, 2) that is bounded away from 1 and 2 by constants, is λ-balanced for λ = O n 2 α−1 . Proof: The intuition behind the proof is simple: the bound that needs to be satisfied by a balanced sequence holds because a degree sequence that satisfies the truncated power law √ 1 contains about n 2 (1−α) nodes of degree n (the largest), which means that the edge mass is somewhat spread among these nodes, leading to the result of the lemma. We now give the details. Recall that by definition of the truncated power law, for each j = 0, . . . , 12 log2 n, the number of nodes with degree Θ(2j ) is Θ(n/2αj ). For any integer s ≥ 2, we have 1 2 X dsu = Θ  u log2 n X 2s·j j=0  1  log2 n 2X n  · αj = Θ  2(s−α)·j · n . 2 j=0 Since s ≥ 2 and α is bounded away from 2 by assumption, the summation is dominated by the last term. Namely, 1 2 X u dsu = Θ  log2 n X    2(s−α)·j · n = Θ ns/2 · n1−α/2 j=0 We now show that for for any integers a, b ≥ 1, 39 a+b u du P P P ≤ λ · ( u dau )( u dbu ). We distinguish the following three cases: Case 1: a ≥ 2 and b ≥ 2. In this case the derivation above with q = a and q = b gives X X dbu = Θ(nb/2 · n1−α/2 ). dau = Θ(na/2 · n1−α/2 ) u u It follows that da+b u P au P =Θ ( u du )( u dbu ) n(a+b)/2 · n1−α/2 na/2 · n1−α/2 · nb/2 · n1−α/2   = Θ nα/2−1 , P ! which gives the result. Case 2: a = 1, b ≥ 2. Since α is bounded away from 1 by a constant we have 1 2 X du = u log2 n X 2j · j=0 On the other hand, since b ≥ 2 and a + b ≥ 2, X da+b = Θ(n(a+b)/2 · n1−α/2 ) u n = Θ(n) 2αj X u (15) dbu = Θ(nb/2 · n1−α/2 ) u Putting the estimates above together, we get dua+b P au P ( u du )( u dbu ) P =Θ n(a+b)/2 · n1−α/2 n · nb/2 · n1−α/2 !   = Θ n−1/2 . The result follows since nα/2−1 ≥ n−1/2 by the assumption that α ∈ (1, 2). Note that the case a ≥ 2, b = 1 is symmetric. Case 3: a = 1, b = 1. Then we have X X X dua+b = Θ(n(a+b)/2 · n1−α/2 ) dau = Θ(n) dbu = Θ(n) u u u by the estimates above, and hence dua+b P au P =Θ ( u du )( u dbu ) P n(a+b)/2 · n1−α/2 n·n   = Θ n−α/2 ! The result follows since nα/2−1 ≥ n−α/2 by the assumption that α ∈ (1, 2). 40 References [1] N. Alon, P. Dao, I. Hajirasouliha, F. Hormozdiari, and S. Sahinalp. Biomolecular network motif counting and discovery by color coding. In ISMB, 2008. [2] N. Alon, R. Yuster, and U. Zwick. Color-coding. JACM, 42(4):844–856, 1995. [3] D. Aparicio, P. Ribeiro, and F. da Silva. Parallel subgraph counting for multicore architectures. In ISPA, 2014. [4] K. Baskerville and M. Paczuski. Subgraph ensembles and motif discovery using an alternative heuristic for graph isomorphism. Phys. Rev. E, 74:051903, 2006. [5] J. Berry, L. Fostvedt, D. Nordman, C. Phillips, C. Seshadhri, and A. Wilson. Why do simple algorithms for triangle enumeration work in the real world? In ITCS, 2014. [6] M. Bhuiyan and M. Al Hassan. An iterative MapReduce based frequent subgraph mining algorithm. IEEE Trans. Knowledge Data Eng., 27(3):608–620, 2015. [7] M. Bhuiyan, M. Rahman, M. Rahman, and M. Al Hasan. Guise: Uniform sampling of graphlets for large graph analysis. In ICDM, 2012. [8] E. Bloedorn, N. Rothleder, D. DeBarr, and L. Rosen. Relational Graph Analysis with Real-World Constraints: An Application in IRS Tax Fraud Detection. In AAAI, 2005. [9] H. Bodlaender. Treewidth of graphs. Encyclopedia of Algorithms, 2015. [10] S. Burt. Structural Holes and Good Ideas. The American Journal of Sociology, 110(2):349– 399, 2004. [11] D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-MAT: A Recursive Model for Graph Mining. In SDM, 2004. [12] D. Chen, N. Eisley, P. Heidelberger, R. M. Senger, Y. Sugawara, S. Kumar, V. Salapura, D. Satterfield, B. Steinmacher-Burow, and J. Parker. The IBM Blue Gene/Q Interconnection Fabric. IEEE Micro, 32(1):32–43, March-April 2012. [13] N. Chiba and T. Nishizeki. Arboricity and subgraph listing algorithms. SIAM J. Computing, 14(1):210–223, 1985. [14] F. Chung and L. Lu. The average distances in random graphs with given expected degrees. PNAS, 99(25):15879–15882, 2002. [15] J. Cohen. Graph twiddling in a MapReduce world. Computing in Science and Engineering, 11(4), 2009. [16] D. Eppstein. Parallel recognition of series-parallel graphs. Inf. Comput., 98(1):41–55, 1992. [17] J. Grochow and M. Kellis. Network motif discovery using subgraph enumeration and symmetry-breaking. In RECOMB, 2007. 41 [18] F. Hormozdiari, P. Berenbrink, N. Przulj, and S. Sahinalp. Not all scale-free networks are born equal: The role of the seed graph in ppi network evolution. PLoS Computational Biology, 3(7), 2007. [19] N. Iakovidou, S. Dimitriadis, N. Laskaris, K. Tsichlas, and Y. Manolopoulos. On the discovery of group-consistent graph substructure patterns from brain networks. Journal of Neuroscience Methods, 213(2):2014–213, 2013. [20] M. Jha, C. Seshadhri, and A. Pinar. Path sampling: A fast and provable method for estimating 4-vertex subgraph counts. In WWW, 2015. [21] T. Kolda, A. Pinar, T. Plantenga, C. Seshadhri, and C. Task. Counting triangles in massive graphs with MapReduce. SIAM J. Scientific Computing, 36(5), 2014. [22] M. Middendorf, E. Ziv, and C. Wiggins. Inferring network mechanisms: The Drosophila melanogaster protein interaction network. PNAS, 102(9):3192–3197, 2005. [23] R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. Network motifs: simple building blocks of complex networks. Science, 298(5594):824–827, October 2002. [24] D. O’Callaghan, M. Harrigan, J. Carthy, and P. Cunningham. Network analysis of recurring youtube spam campaigns. CoRR, abs/1201.3783, 2012. [25] N. Przulj, D. Corneil, and I. Jurisica. Modeling interactome: scale-free or geometric? Bioinformatics, 2004. [26] M. Rahman, M. Bhuiyan, and M. Al Hasan. GRAFT: an approximate graphlet counting algorithm for large graph analysis. In CIKM, 2012. [27] T. Schank and D. Wagner. Finding, counting and listing all triangles in large graphs, an experimental study. In WEA, 2005. [28] G. Slota and K. Madduri. Fast approximate subgraph counting and enumeration. In ICPP, pages 210–219, 2013. [29] G. Slota and K. Madduri. Characterizing biological networks using subgraph counting and enumeration. In PPSC, 2014. [30] G. Slota and K. Madduri. Complex network analysis using parallel approximate motif counting. In IPDPS, pages 405–414, 2014. [31] S. Suri and S. Vassilvitskii. Counting triangles and the curse of the last reducer. In WWW, 2011. [32] G. Wu, M. Harrigan, and P. Cunningham. Classifying wikipedia articles using network motif counts and ratios. In WikiSym, 2012. [33] Z. Zhao, M. Khan, V. Kumar, and M. Marathe. Subgraph enumeration in large social contact networks using parallel color coding and streaming. In ICPP, 2010. 42
8cs.DS
Published as a conference paper at ICLR 2018 A BAYESIAN P ERSPECTIVE ON G ENERALIZATION AND S TOCHASTIC G RADIENT D ESCENT Samuel L. Smith∗ & Quoc V. Le Google Brain {slsmith, qvl}@google.com arXiv:1710.06451v3 [cs.LG] 14 Feb 2018 A BSTRACT We consider two questions at the heart of machine learning; how can we predict if a minimum will generalize to the test set, and why does stochastic gradient descent find minima that generalize well? Our work responds to Zhang et al. (2016), who showed deep neural networks can easily memorize randomly labeled training data, despite generalizing well on real labels of the same inputs. We show that the same phenomenon occurs in small linear models. These observations are explained by the Bayesian evidence, which penalizes sharp minima but is invariant to model parameterization. We also demonstrate that, when one holds the learning rate fixed, there is an optimum batch size which maximizes the test set accuracy. We propose that the noise introduced by small mini-batches drives the parameters towards minima whose evidence is large. Interpreting stochastic gradient descent as a stochastic differential equation, we identify the “noise scale” g = ( N B − 1) ≈ N/B, where  is the learning rate, N the training set size and B the batch size. Consequently the optimum batch size is proportional to both the learning rate and the size of the training set, Bopt ∝ N . We verify these predictions empirically. 1 I NTRODUCTION This paper shows Bayesian principles can explain many recent observations in the deep learning literature, while also discovering practical new insights. Zhang et al. (2016) trained deep convolutional networks on ImageNet and CIFAR10, achieving excellent accuracy on both training and test sets. They then took the same input images, but randomized the labels, and found that while their networks were now unable to generalize to the test set, they still memorized the training labels. They claimed these results contradict learning theory, although this claim is disputed (Kawaguchi et al., 2017; Dziugaite & Roy, 2017). Nonetheless, their results beg the question; if our models can assign arbitrary labels to the training set, why do they work so well in practice? Meanwhile Keskar et al. (2016) observed that if we hold the learning rate fixed and increase the batch size, the test accuracy usually falls. This striking result shows improving our estimate of the full-batch gradient can harm performance. Goyal et al. (2017) observed a linear scaling rule between batch size and learning rate in a deep ResNet, while Hoffer et al. (2017) proposed a square root rule on theoretical grounds. Many authors have suggested “broad minima” whose curvature is small may generalize better than “sharp minima” whose curvature is large (Chaudhari et al., 2016; Hochreiter & Schmidhuber, 1997). Indeed, Dziugaite & Roy (2017) argued the results of Zhang et al. (2016) can be understood using “nonvacuous” PAC-Bayes generalization bounds which penalize sharp minima, while Keskar et al. (2016) showed stochastic gradient descent (SGD) finds wider minima as the batch size is reduced. However Dinh et al. (2017) challenged this interpretation, by arguing that the curvature of a minimum can be arbitrarily increased by changing the model parameterization. In this work we show: • The results of Zhang et al. (2016) are not unique to deep learning; we observe the same phenomenon in a small “over-parameterized” linear model. We demonstrate that this phenomenon is straightforwardly understood by evaluating the Bayesian evidence in favor of each model, which penalizes sharp minima but is invariant to the model parameterization. ∗ Work done as a member of the Google Brain Residency Program (g.co/brainresidency) 1 Published as a conference paper at ICLR 2018 • SGD integrates a stochastic differential equation whose “noise scale” g ≈ N/B, where  is the learning rate, N training set size and B batch size. Noise drives SGD away from sharp minima, and therefore there is an optimal batch size which maximizes the test set accuracy. This optimal batch size is proportional to the learning rate and training set size1 . We describe Bayesian model comparison in section 2. In section 3 we replicate the observations of Zhang et al. (2016) in a linear model, and show they are explained by the Bayesian evidence. In section 4 we show there is an optimum batch size which maximizes the test set accuracy, and in section 5 we derive scaling rules between the optimum batch size, learning rate, training set size and momentum coefficient. Throughout this work, “generalization gap” refers to the gap in test accuracy between small and large batch SGD training, not the gap in accuracy between training and test sets. 2 BAYESIAN MODEL COMPARISON Bayesian model comparison was first applied to neural networks in MacKay (1992). We provide a brief tutorial here, since the theory is central to the remainder of the paper. For simplicity we first consider a classification model M with a single parameter ω, training inputs x and training labels y. We can infer a posterior probability distribution over the parameter by applying Bayes theorem, P (y|ω, x; M )P (ω; M ) P (ω|y, x; M ) = (1) P (y|x; M ) Q −H(ω;M ) The , where H(ω; M ) = i P (yi |ω, xi ; M ) = e P likelihood, P (y|ω, x; M ) = − i ln (P (yi |ω, xi ; M )) denotes the cross-entropy of unique categorical labels. We typically p 2 use a Gaussian prior, P (ω; M ) = λ/2πe−λω /2 , and therefore the posterior probability denp sity of the parameter given the training data, P (ω|y, x; M ) ∝ λ/2πe−C(ω;M ) , where C(ω; M ) = H(ω; M ) + λω 2 /2 denotes the L2 regularized cross entropy, or “cost function”, and λ is the regularization coefficient. The value ω0 which minimizes the cost function lies at the maximum of this posterior. To predict an unknown label yt of a new input xt , we should compute the integral, Z P (yt |xt , y, x; M ) = dω P (yt |ω, xt ; M )P (ω|y, x; M ) (2) R dω P (yt |ω, xt ; M )e−C(ω;M ) R = . (3) dω e−C(ω;M ) However these integrals are dominated by the region near ω0 , and since P (yt |ω, xt ; M ) is smooth we usually approximate P (yt |xt , x, y; M ) ≈ P (yt |ω0 , xt ; M ). Having minimized C(ω; M ) to find ω0 , we now wish to compare two different models and select the best one. The probability ratio, P (M1 |y, x) P (y|x; M1 ) P (M1 ) = . (4) P (M2 |y, x) P (y|x; M2 ) P (M2 ) The second factor on the right is the prior ratio, which describes which model is most plausible. To avoid unnecessary subjectivity, we usually set this to 1. Meanwhile the first factor on the right is the evidence ratio, which controls how much the training data changes our prior beliefs. Germain et al. (2016) showed that maximizing the evidence (or “marginal likelihood”) minimizes a PAC-Bayes generalization bound. To compute it, we evaluate the normalizing constant of equation 1, Z P (y|x; M ) = dω P (y|ω, x; M )P (ω; M ) (5) r Z λ = dω e−C(ω;M ) . (6) 2π Notice that the evidence is computed by integrating out the parameters; and consequently it is invariant to the model parameterization. Since this integral is dominated by the region near the minimum ω0 , we can estimate the evidence by Taylor expanding C(ω; M ) ≈ C(ω0 ) + C 00 (ω0 )(ω − ω0 )2 /2, r Z 00 2 λ −C(ω0 ) P (y|x; M ) ≈ e dω e−C (ω0 )(ω−ω0 ) /2 (7) 2π    1 = exp − C(ω0 ) + ln (C 00 (ω0 )/λ) . (8) 2 1 Equivalently, there is an optimal learning rate proportional to the batch size and the training set size. 2 Published as a conference paper at ICLR 2018 Within this “Laplace” approximation, the evidence is controlled by the value of the cost function at the minimum, and by the logarithm of the ratio of the curvature about this minimum compared to the regularization constant. Thus far we have considered models of a single parameter; in realistic p 1/2 models with many parameters P (y|x; M ) ≈ λ 2 e−C(ω0 ) /|∇∇C(ω)|ω0 , where |∇∇C(ω)|ω0 is the determinant of the Hessian, and p denotes the number of model parameters & Raftery, 1995). Q(Kass p The determinant of the Hessian is simply the product of its eigenvalues, ( i=1 λi ), and thus, !) ( p 1X ln(λi /λ) . (9) P (y|x; M ) ≈ exp − C(ω0 ) + 2 i=1 p 1/2 The contribution (λ 2 /|∇∇C(ω)|ω0 ) is often called the “Occam factor”, because it enforces Occam’s razor; when two models describe the data equally well, the simpler model is usually better (Gull, 1988). Minima with low curvature are simple, because the parameters do not have to be finetuned to fit the data. Intuitively, the Occam factor describes the fraction of the prior parameter space consistent with the data. Since this fraction is always less than one, we propose to approximate equation 9 away from local minima by only performing the summation over eigenvalues λi ≥ λ. The evidence can be reframed in the language of information theory, whereby Occam’s factor penalizes the amount of information the model must learn about the parameters to accurately model the training data (Hinton & Van Camp, 1993; Achille & Soatto, 2017; Shwartz-Ziv & Tishby, 2017). In this work, we will compare the evidence against a null model which assumes the labels are entirely random, assigning equal probability to each class. This unusual model has no parameters, and so the evidence is controlled by the likelihood alone, P (y|x; N U LL) = (1/n)N = e−N ln (n) , where n denotes the number of model classes and N the number of training labels. Thus the evidence ratio, P (y|x; M ) = e−E(ω0 ) , P (y|x; N U LL) (10) P Where E(ω0 ) = C(ω0 ) + (1/2) i ln(λi /λ) − N ln(n) is the log evidence ratio in favor of the null model. Clearly, we should only assign any confidence to the predictions of our model if E(ω0 ) < 0. The evidence supports the intuition that broad minima generalize better than sharp minima, but unlike the curvature it does not depend on the model parameterization. Dinh et al. (2017) showed one can increase the Hessian eigenvalues by rescaling the parameters, but they must simultaneously rescale the regularization coefficients, otherwise the model changes. Since Occam’s factor arises from the log ratio, ln (λi /λ), these two effects cancel out2 . It is difficult to evaluate the evidence for deep networks, as we cannot compute the Hessian of millions of parameters. Additionally, neural networks exhibit many equivalent minima, since we can permute the hidden units without changing the model. To compute the evidence we must carefully account for this “degeneracy”. We argue these issues are not a major limitation, since the intuition we build studying the evidence in simple cases will be sufficient to explain the results of both Zhang et al. (2016) and Keskar et al. (2016). 3 BAYES THEOREM AND GENERALIZATION Zhang et al. (2016) showed that deep neural networks generalize well on training inputs with informative labels, and yet the same model can drastically overfit on the same input images when the labels are randomized; perfectly memorizing the training set. To demonstrate that these observations are not unique to deep networks, let’s consider a far simpler model; logistic regression. We form a small balanced training set comprising 800 images from MNIST, of which half have true label “0” and half true label “1”. Our test set is also balanced, comprising 5000 MNIST images of zeros and 5000 MNIST images of ones. There are two tasks. In the first task, the labels of both the training and test sets are randomized. In the second task, the labels are informative, matching the true MNIST labels. Since the images contain 784 pixels, our model has just 784 weights and 1 bias. We show the accuracy of the model predictions on both the training and test sets in figure 1. When trained on the informative labels, the model generalizes well to the test set, so long as it is weakly regularized. However the model also perfectly memorizes the random labels, replicating the observations of Zhang et al. (2016) in deep networks. No significant improvement in model performance 2 Note however that while the evidence itself is invariant to model parameterization, one can find reparameterizations which change the approximate evidence after the Laplace approximation. 3 Published as a conference paper at ICLR 2018 (a) (b) Figure 1: Prediction accuracy and mean training set margin as a function of regularization coefficient, for a logistic regression trained on random (a) and informative (b) labels of the same inputs. The weakly regularized model generalizes well on informative labels but memorizes random labels. is observed as the regularization coefficient increases. For completeness, we also evaluate the mean margin between training examples and the decision boundary. For both random and informative labels, the margin drops significantly as we reduce the regularization coefficient. When weakly regularized, the mean margin is roughly 50% larger for informative labels than for random labels. Now consider figure 2, where we plot the mean cross-entropy of the model predictions, evaluated on both training and test sets, as well as the Bayesian log evidence ratio defined in the previous section. Looking first at the random label experiment in figure 2a, while the cross-entropy on the training set vanishes when the model is weakly regularized, the cross-entropy on the test set explodes. Not only does the model make random predictions, but it is extremely confident in those predictions. As the regularization coefficient is increased the test set cross-entropy falls, settling at ln 2, the crossentropy of assigning equal probability to both classes. Now consider the Bayesian evidence, which we evaluate on the training set. The log evidence ratio is large and positive when the model is weakly regularized, indicating that the model is exponentially less plausible than assigning equal probabilities to each class. As the regularization parameter is increased, the log evidence ratio falls, but it is always positive, indicating that the model can never be expected to generalize well. Now consider figure 2b (informative labels). Once again, the training cross-entropy falls to zero when the model is weakly regularized, while the test cross-entropy is high. Even though the model makes accurate predictions, those predictions are overconfident. As the regularization coefficient increases, the test cross-entropy falls below ln 2, indicating that the model is successfully generalizing to the test set. Now consider the Bayesian evidence. The log evidence ratio is large and positive when the model is weakly regularized, but as the regularization coefficient increases, the (a) (b) Figure 2: The cross-entropy and log evidence ratio, evaluated on random (a) or informative (b) labels. The evidence, evaluated on the training set, is strongly correlated with the test cross-entropy. 4 Published as a conference paper at ICLR 2018 log evidence ratio drops below zero, indicating that the model is exponentially more plausible than assigning equal probabilities to each class. As we further increase the regularization, the log evidence ratio rises to zero while the test cross-entropy rises to ln 2. Test cross-entropy and Bayesian evidence are strongly correlated, with minima at the same regularization strength. Bayesian model comparison has explained our results in a logistic regression. Meanwhile, Krueger et al. (2017) showed the largest Hessian eigenvalue also increased when training on random labels in deep networks, implying the evidence is falling. We conclude that Bayesian model comparison is quantitatively consistent with the results of Zhang et al. (2016) in linear models where we can compute the evidence, and qualitatively consistent with their results in deep networks where we cannot. Dziugaite & Roy (2017) recently demonstrated the results of Zhang et al. (2016) can also be understood by minimising a PAC-Bayes generalization bound which penalizes sharp minima. 4 BAYES THEOREM AND STOCHASTIC GRADIENT DESCENT We showed above that generalization is strongly correlated with the Bayesian evidence, a weighted combination of the depth of a minimum (the cost function) and its breadth (the Occam factor). Consequently Bayesians often add isotropic Gaussian noise to the gradient (Welling & Teh, 2011). In appendix A, we show this drives the parameters towards broad minima whose evidence is large. The noise introduced by small batch training is not isotropic, and its covariance matrix is a function of the parameter values, but empirically Keskar et al. (2016) found it has similar effects, driving the SGD away from sharp minima. This paper therefore proposes Bayesian principles also account for the “generalization gap”, whereby the test set accuracy often falls as the SGD batch size is increased (holding all other hyper-parameters constant). Since the gradient drives the SGD towards deep minima, while noise drives the SGD towards broad minima, we expect the test set performance to show a peak at an optimal batch size, which balances these competing contributions to the evidence. We were unable to observe a generalization gap in linear models (since linear models are convex there are no sharp minima to avoid). Instead we consider a shallow neural network with 800 hidden units and RELU hidden activations, trained on MNIST without regularization. We use SGD with a momentum parameter of 0.9. Unless otherwise stated, we use a constant learning rate of 1.0 which does not depend on the batch size or decay during training. Furthermore, we train on just 1000 images, selected at random from the MNIST training set. This enables us to compare small batch to full batch training. We emphasize that we are not trying to achieve optimal performance, but to study a simple model which shows a generalization gap between small and large batch training. In figure 3, we exhibit the evolution of the test accuracy and test cross-entropy during training. Our small batches are composed of 30 images, randomly sampled from the training set. Looking first at figure 3a, small batch training takes longer to converge, but after a thousand gradient updates a clear generalization gap in model accuracy emerges between small and large training batches. Now consider figure 3b. While the test cross-entropy for small batch training is lower at the end (a) (b) Figure 3: The evolution during training of the test accuracy (a), and the test set cross-entropy (b). Full batches are composed of 1000 images, while small batches comprise 30 images. 5 Published as a conference paper at ICLR 2018 (a) (b) Figure 4: The test accuracy for a range of batch sizes, during training (a) and after 10000 steps (b). (a) (b) Figure 5: a) The test set accuracy as a function of batch size, for a range of learning rates . The performance peak shifts to the right as we increase , but the overall performance falls once  & 3. b) The best observed batch size is proportional to the learning rate across two orders of magnitude. of training; the cross-entropy of both small and large training batches is increasing, indicative of over-fitting. Both models exhibit a minimum test cross-entropy, although after different numbers of gradient updates. Intriguingly, we show in appendix B that the generalization gap between small and large batch training shrinks significantly when we introduce L2 regularization. From now on we focus on the test set accuracy (since this converges as the number of gradient updates increases). In figure 4a, we exhibit training curves for a range of batch sizes between 1 and 1000. We find that the model cannot train when the batch size B / 10. In figure 4b we plot the mean test set accuracy after 10000 training steps. A clear peak emerges, indicating that there is indeed an optimum batch size which maximizes the test accuracy, consistent with Bayesian intuition. The results of Keskar et al. (2016) focused on the decay in test accuracy above this optimum batch size. 5 S TOCHASTIC DIFFERENTIAL EQUATIONS AND THE SCALING RULES We showed above that the test accuracy peaks at an optimal batch size, if one holds the other SGD hyper-parameters constant. We argued that this peak arises from the tradeoff between depth and breadth in the Bayesian evidence. However it is not the batch size itself which controls this tradeoff, but the underlying scale of random fluctuations in the SGD dynamics. We now identify this SGD “noise scale”, and use it to derive three scaling rules which predict how the optimal batch size depends on the learning rate, training set size and momentum coefficient. A gradient update, !! dĈ dC  dC + − , (11) ∆ω = − N dω dω dω 6 Published as a conference paper at ICLR 2018 (a) (b) Figure 6: a) The test accuracy as a function of batch size, for a range of training set sizes. To reduce noise, we average each curve over five experiments. The performance peak shift to the right as we increase the size of the training set. Unsurprisingly, the overall model performance also improves. b) The best observed batch size is proportional to the size of the training set once N & 20000. PN dĈ i where  is the learning rate, N the training set size, dC = i=1 dC dω dω the true gradient, and dω = P B dCi N on a mini-batch. The expected gradient of a single i=1 dω the estimated gradient B D evaluated E 2 dCi dCi dCj 1 dC example, dω = N dω , while dω dω = N1 dC + F (ω)δij . F (ω) is a matrix describing the dω gradient covariances, which are a function of the current parameter values. We adopt the central limit Ĉ theorem and model the gradient error α = ( ddω − dC dω ) with Gaussian random noise (We discuss this approximation briefly in appendix C). It is easy to show that hαi = 0, while hα2 i = N ( N B −1)F (ω). Typically N  B, such that hα2 i ≈ N 2 F (ω)/B. To continue, we interpret equation 11 as the discrete update of a stochastic differential equation (Li et al., 2017; Gardiner, 1985), dC dω =− + η(t), (12) dt dω Where t is a continuous variable, η(t) represents noise, hη(t)i = 0 and hη(t)η(t0 )i = gF (ω)δ(t−t0 ). The constant g controls the scale of random fluctuations in the dynamics. To relate this differential R /N dω R /N  dC equation to the SGD, we compute a gradient update ∆ω = 0 η(t)dt. dt dt = − N dω + 0 Finally, to measure g, we equate the variance in this gradient update to the variance in equation 11,   2 N hα2 i = 2 ( − 1)F (ω)/N N B Z /N Z /N Z /N = h( dt η(t))2 i = dt dt0 hη(t)η(t0 )i = gF (ω)/N. (13) 0 0 0 Rearranging, the SGD noise scale g = ( N B − 1) ≈ N/B. The noise scale falls when the batch size increases, consistent with our earlier observation of an optimal batch size Bopt while holding the other hyper-parameters fixed. Notice that one would equivalently observe an optimal learning rate if one held the batch size constant. A similar analysis of the SGD was recently performed by Mandt et al. (2017), although their treatment only holds near local minima where the covariances F (ω) are stationary. Our analysis holds throughout training, which is necessary since Keskar et al. (2016) found that the beneficial influence of noise was most pronounced at the start of training. When we vary the learning rate or the training set size, we should keep the noise scale fixed, which implies that Bopt ∝ N . In figure 5a, we plot the test accuracy as a function of batch size after (10000/) training steps, for a range of learning rates. Exactly as predicted, the peak moves to the right as  increases. Additionally, the peak test accuracy achieved at a given learning rate does not begin to fall until  ∼ 3, indicating that there is no significant discretization error in integrating the stochastic differential equation below this point. Above this point, the discretization error begins to dominate and the peak test accuracy falls rapidly. In figure 5b, we plot the best observed batch size as a function of learning rate, observing a clear linear trend, Bopt ∝ . The error bars indicate the distance from the best observed batch size to the next batch size sampled in our experiments. 7 Published as a conference paper at ICLR 2018 (a) (b) Figure 7: a) The test set accuracy as a function of batch size for a range of momentum coefficients. As expected, the peak moves to the right as the momentum coefficient increases. b) The best observed batch size for a range of momentum coefficients. The green curve exhibits the scaling rule. This scaling rule allows us to increase the learning rate with no loss in test accuracy and no increase in computational cost, simply by simultaneously increasing the batch size. We can then exploit increased parallelism across multiple GPUs, reducing model training times (Goyal et al., 2017). A similar scaling rule was independently proposed by Jastrzebski et al. (2017) and Chaudhari & Soatto (2017), although neither work identifies the existence of an optimal noise scale. A number of authors have proposed adjusting the batch size adaptively during training (Friedlander & Schmidt, 2012; Byrd et al., 2012; De et al., 2017), while Balles et al. (2016) proposed linearly coupling the learning rate and batch size within this framework. In Smith et al. (2017), we show empirically that decaying the learning rate during training and increasing the batch size during training are equivalent. In figure 6a we exhibit the test set accuracy as a function of batch size, for a range of training set sizes after 10000 steps ( = 1 everywhere). Once again, the peak shifts right as the training set size rises, although the generalization gap becomes less pronounced as the training set size increases. In figure 6b, we plot the best observed batch size as a function of training set size; observing another linear trend, Bopt ∝ N . This scaling rule could be applied to production models, progressively growing the batch size as new training data is collected. We expect production datasets to grow considerably over time, and consequently large batch training is likely to become increasingly common. Finally, in appendix D we extend our analysis to SGD with momentum, identifying the noise scale, N , where m denotes the momentum coefficient. Notice that this reduces to the noise g ≈ B(1−m) scale of conventional SGD as m → 0. When m > 0, we obtain an additional scaling rule Bopt ∝ 1/(1 − m). This scaling rule predicts that the optimal batch size will increase when the momentum coefficient is increased. In figure 7a we plot the test set performance as a function of batch size after 10000 gradient updates ( = 1 everywhere), for a range of momentum coefficients. In figure 7b, we plot the best observed batch size as a function of the momentum coefficient, and fit our results to the scaling rule above; obtaining remarkably good agreement. We propose a simple heuristic for tuning the batch size, learning rate and momentum coefficient in appendix E. 6 C ONCLUSIONS Just like deep neural networks, linear models which generalize well on informative labels can memorize random labels of the same inputs. These observations are explained by the Bayesian evidence, which is composed of the cost function and an “Occam factor”. The Occam factor penalizes sharp minima but it is invariant to changes in model parameterization. Mini-batch noise drives SGD away from sharp minima, and therefore there is an optimum batch size which maximizes the test accuracy. Interpreting SGD as the discretization of a stochastic differential equation, we predict this optimum batch size should scale linearly with both the learning rate and the training set size, Bopt ∝ N . We derive an additional scaling rule, Bopt ∝ 1/(1 − m), between the optimal batch size and the momentum coefficient. We verify these scaling rules empirically and discuss their implications. 8 Published as a conference paper at ICLR 2018 ACKNOWLEDGMENTS We thank Pieter-Jan Kindermans, Prajit Ramachandran, Jascha Sohl-Dickstein, Jon Shlens, Kevin Murphy, Samy Bengio, Yasaman Bahri and Saeed Saremi for helpful comments on the manuscript. R EFERENCES Alessandro Achille and Stefano Soatto. On the emergence of invariance and disentangling in deep representations. arXiv preprint arXiv:1706.01350, 2017. Lukas Balles, Javier Romero, and Philipp Hennig. Coupling adaptive batch sizes with learning rates. arXiv preprint arXiv:1612.05086, 2016. Richard H Byrd, Gillian M Chin, Jorge Nocedal, and Yuchen Wu. Sample size selection in optimization methods for machine learning. Mathematical programming, 134(1):127–155, 2012. Pratik Chaudhari and Stefano Soatto. Stochastic gradient descent performs variational inference, converges to limit cycles for deep networks. arXiv preprint arXiv:1710.11029, 2017. Pratik Chaudhari, Anna Choromanska, Stefano Soatto, and Yann LeCun. Entropy-SGD: Biasing gradient descent into wide valleys. arXiv preprint arXiv:1611.01838, 2016. Soham De, Abhay Yadav, David Jacobs, and Tom Goldstein. Automated inference with adaptive batches. In Artificial Intelligence and Statistics, pp. 1504–1513, 2017. Laurent Dinh, Razvan Pascanu, Samy Bengio, and Yoshua Bengio. Sharp minima can generalize for deep nets. arXiv preprint arXiv:1703.04933, 2017. Gintare Karolina Dziugaite and Daniel M Roy. Computing nonvacuous generalization bounds for deep (stochastic) neural networks with many more parameters than training data. arXiv preprint arXiv:1703.11008, 2017. Michael P Friedlander and Mark Schmidt. Hybrid deterministic-stochastic methods for data fitting. SIAM Journal on Scientific Computing, 34(3):A1380–A1405, 2012. Crispin W Gardiner. Handbook of Stochastic Methods, volume 4. Springer Berlin, 1985. Pascal Germain, Francis Bach, Alexandre Lacoste, and Simon Lacoste-Julien. PAC-bayesian theory meets bayesian inference. In Advances in Neural Information Processing Systems, pp. 1884– 1892, 2016. Priya Goyal, Piotr Dollár, Ross Girshick, Pieter Noordhuis, Lukasz Wesolowski, Aapo Kyrola, Andrew Tulloch, Yangqing Jia, and Kaiming He. Accurate, large minibatch SGD: Training imagenet in 1 hour. arXiv preprint arXiv:1706.02677, 2017. Stephen F Gull. Bayesian inductive inference and maximum entropy. In Maximum-entropy and Bayesian methods in science and engineering, pp. 53–74. Springer, 1988. Geoffrey E Hinton and Drew Van Camp. Keeping the neural networks simple by minimizing the description length of the weights. In Proceedings of the sixth annual conference on Computational learning theory, pp. 5–13. ACM, 1993. Sepp Hochreiter and Jürgen Schmidhuber. Flat minima. Neural Computation, 9(1):1–42, 1997. Elad Hoffer, Itay Hubara, and Daniel Soudry. Train longer, generalize better: closing the generalization gap in large batch training of neural networks. arXiv preprint arXiv:1705.08741, 2017. Stanisław Jastrzebski, Zachary Kenton, Devansh Arpit, Nicolas Ballas, Asja Fischer, Yoshua Bengio, and Amos Storkey. Three factors influencing minima in SGD. arXiv preprint arXiv:1711.04623, 2017. Robert E Kass and Adrian E Raftery. Bayes factors. Journal of the american statistical association, 90(430):773–795, 1995. 9 Published as a conference paper at ICLR 2018 Kenji Kawaguchi, Leslie Pack Kaelbling, and Yoshua Bengio. Generalization in deep learning. arXiv preprint arXiv:1710.05468, 2017. Nitish Shirish Keskar, Dheevatsa Mudigere, Jorge Nocedal, Mikhail Smelyanskiy, and Ping Tak Peter Tang. On large-batch training for deep learning: Generalization gap and sharp minima. arXiv preprint arXiv:1609.04836, 2016. David Krueger, Nicolas Ballas, Stanislaw Jastrzebski, Devansh Arpit, Maxinder S Kanwal, Tegan Maharaj, Emmanuel Bengio, Asja Fischer, and Aaron Courville. Deep nets don’t learn via memorization. ICLR Workshop, 2017. Qianxiao Li, Cheng Tai, and E Weinan. Stochastic modified equations and adaptive stochastic gradient algorithms. In International Conference on Machine Learning, pp. 2101–2110, 2017. David JC MacKay. A practical bayesian framework for backpropagation networks. Neural computation, 4(3):448–472, 1992. Stephan Mandt, Matthew D Hoffman, and David M Blei. Stochastic gradient descent as approximate bayesian inference. arXiv preprint arXiv:1704.04289, 2017. Ravid Shwartz-Ziv and Naftali Tishby. Opening the black box of deep neural networks via information. arXiv preprint arXiv:1703.00810, 2017. Samuel L. Smith, Pieter-Jan Kindermans, and Quoc V. Le. Don’t decay the learning rate, increase the batch size. arXiv preprint arXiv:1711.00489, 2017. Max Welling and Yee W Teh. Bayesian learning via stochastic gradient langevin dynamics. In Proceedings of the 28th International Conference on Machine Learning (ICML-11), pp. 681–688, 2011. Chiyuan Zhang, Samy Bengio, Moritz Hardt, Benjamin Recht, and Oriol Vinyals. Understanding deep learning requires rethinking generalization. arXiv preprint arXiv:1611.03530, 2016. A BAYESIAN POSTERIOR SAMPLING AND L ANGEVIN DYNAMICS Instead of minimizing the cost function, Bayesian usually prefer to sample parameter values from the posterior (MacKay, 1992), P (ω|y, x; M ) ∝ e−C(ω;M ) , (14) where C(ω; M ) is the regularized summed cost function, as shown in section 2 of the main text. It is well known that one can sample this posterior by simulating the overdamped Langevin equation (Gardiner, 1985), which is described by the stochastic differential equation, dω dC =− + η(t), dt dω (15) where t is a continuous variable, and η(t) describes Gaussian noise with mean hη(t)i = 0 and variance hη(t)η(t0 )i = 2T Iδ(t−t0 ). The matrix I denotes the identity, while T is the “temperature”. Notice this Langevin equation is extremely similar to the stochastic differential equation of SGD, discussed in section 5 of the main text. Indeed, if the gradient covariances F (ω) were stationary and proportional to the identity, then the SGD would integrate an overdamped Langevin equation with temperature proportional to the SGD noise scale g. As t → ∞, the probability of sampling any particular parameter vector ω from the Langevin equation, P (ω, t → ∞) ∝ e−C/T . We obtain posterior samples if T = 1. In order to draw posterior samples in practice, we repeatedly integrate the Langevin equation (at temperature T = 1), over a finite step t → t + /N , Z t+ N  dC ∆ω = − + η(t)dt (16) N dω t  dC = − + α, (17) N dω 10 Published as a conference paper at ICLR 2018 where α denotes a Gaussian random variable with mean hαi = 0 and variance hα2 i = 2I/N , which introduces isotropic noise to the gradient update as described in section 4 of the main text. Note that, since C(ω; M ) denotes the summed cost function, we chose to scale our step size by the training set size N . This also matches our treatment of SGD in section 5 of the main text. The larger the step size , the greater the discretization error, but if  is sufficiently small and we iterate equation 17 sufficiently many times, we will obtain valid samples from the posterior. Since the probability of sampling any given parameter vector ω is proportional to the posterior, the probability of sampling a parameter vector belonging to any given local minimum is proportional to the integral of the posterior over the bowl of attraction D which surrounds that minimum. Z P (ω ∈ D, t → ∞) ∝ dω e−C(ω;M ) . (18) D Meanwhile we showed in section 2 of the main text that the evidence in favor of a model is proportional to the integral of the posterior over all parameter space. Z P (y|x; M ) ∝ dω e−C(ω;M ) . (19) As we discussed, this evidence is dominated by the contributions to the integral near local minima. In a convex model, there is only one such minimum; which allows us to accurately estimate the model evidence. Meanwhile, in non-convex models, there are many such minima, and so we can instead define the evidence as a sum over local evidences in favor of each minimum, X P (y|x; M ) = P (y|x, ω ∈ Di ; M ), (20) i where we define the evidence in favor of a minimum as the integral over the local bowl of attraction, Z P (y|x, ω ∈ D; M ) ∝ dω e−C(ω;M ) . (21) D Since the combined bowls of attraction of all the minima perfectly tile the entire parameter space, equations 19 and 20 are equivalent. Meanwhile, equating equations 18 and 21 we find that, when one performs Bayesian posterior sampling, the probability of sampling the parameter vector from a local minimum is proportional to the evidence in favor of that minimum. This demonstrates that bayesian posterior samples are biased in favor of local minima whose evidence is large, which explains why a single posterior sample ωp often achieves lower test error than the cost function minimum ω0 . B T HE EFFECT OF REGULARIZATION ON THE GENERALIZATION GAP In the experiments of section 4 of the main text, the L2 regularization coefficient λ = 0. In figure 8, we plot the evolution of the training curves when λ = 0.1, for both small batch and full batch (a) (b) Figure 8: The mean test accuracy (a) and the mean test cross-entropy (b) of a regularized model during training. While full batch training takes longer to converge, it achieves similar performance at long times. The noise inherent in small batch training causes the performance to fluctuate. 11 Published as a conference paper at ICLR 2018 (a) (b) Figure 9: The gradient distribution of a randomly selected parameter in the softmax layer, when measured over a single training example (a), and when averaged over mini-batches of 30 images (b). training. Excluding the regularization parameter, these experiments are identical to figure 3. To our surprise, regularized full batch training took longer to converge than small batch training. In another surprise, regularization significantly reduced the size of the generalization gap. While large batch regularized training achieves slightly lower test set accuracy than unregularized small batch training, it also achieves lower test cross-entropy. The test cross-entropy of our regularized models does not degrade after many gradient updates, removing the need for early stopping. C T HE G AUSSIAN APPROXIMATION TO THE MINI - BATCH ERROR In section 5 of the main text, we approximated the difference between the full batch gradient and Ĉ the mini-batch gradient estimate, α = ( ddω − dC dω ), by a Gaussian random variable. This enabled us to derive the scaling rules, which we verified empirically. We motivated this assumption by reference to the central limit theorem, which states that the gradient error will tend towards Gaussian noise as {N → ∞, B → ∞, B  N }, so long as the distribution of gradients over individual training examples does not have heavy tails. In practice neither N nor B is infinite, and the gradient distribution may be heavy tailed, especially when gradients are sparse. Nonetheless the central limit theorem tends to be surprisingly robust in practice, and is consequently widely used. It is beyond the scope of this work to perform a thorough study of the gradient noise distribution in deep networks. However as a brief proof of principle, we present the distribution of the gradient immediately after random initialization in figure 9, for the shallow neural network discussed in sections 4 and 5 of the main text. In figure 9a, we present the distribution over the individual training examples, of the gradient of a single matrix element in the softmax output layer, chosen randomly. The distribution is double peaked and clearly not Gaussian. However in figure 7b, we plot the distribution of the gradient of the same matrix element, when averaged over randomly sampled mini-batches of 30 images (without replacement). A single peak emerges, and while the distribution is still slightly skewed, it is clearly already approaching the Gaussian limit. We conclude that the Gaussian approximation is likely to be reasonable for commonly used mini-batch sizes. D D ERIVING THE SCALING RULES FOR SGD WITH MOMENTUM Momentum simulates a generalized Langevin equation (with structured fluctuations), dω dC d2 ω = −λ − + η(t). 2 dt dt dω (22) λ is the “damping coefficient” and η(t) describes Gaussian noise, whose statistics hη(t)i = 0 and hη(t)η(t0 )i = gλF (w)δ(t − t0 ). As before, the coefficient g describes the scale of random fluctuations in the dynamics, and F (ω) describes the gradient covariances between parameters. We include a factor of λ in the noise variance to satisfy the fluctuation-dissipation theorem, which states that 12 Published as a conference paper at ICLR 2018 we can vary the damping coefficient without changing the probability of sampling any particular configuration of parameters in the limit t → ∞, if we proportionally increase the noise variance. To relate this Langevin equation to the usual momentum equations, we first re-express it as two coupled first order differential equations, dp dC = −λp − + η(t), (23) dt dω dω = p. (24) dt Integrating over a single step ∆t/N , ∆t dC ∆p = −(λ∆t/N )p − + η, (25) N dω ∆ω = p∆t/N. (26) Where now hηi = 0 and hη 2 i = g∆tλF (w)/N . We define the accumulation A = p/∆t, η 1 dC + , (27) ∆A = −(λ∆t/N )A − N dω ∆t ∆ω = (∆t)2 A/N. (28) These equations can be compared to the TensorFlow update equations for momentum,   1 dC +α , (29) ∆A = (m − 1)A − N dω ∆ω = A. (30)   Ĉ Where α = ddω − dC denotes the error in the gradient update. As discussed in the main text, dω we can approximate this error as Gaussian noise with statistics hαi = 0 and hα2 i ≈ N 2 F (ω)/B. Equations 27 and 28 match equations 29 and 30 if the step size  = (∆t)2 /N , and the momentum parameter m = (1 − λ∆t/N ). Finally we equate the noise by setting hα2 i/N 2 = hη 2 i/(∆t)2 , and solve for the noise scale g to obtain, (∆t)2 ∆tN = (31) g ≈ Bλ B(1 − m) N = . (32) B(1 − m) As observed in the main text, if we wish to keep the scale of random fluctuations constant, then we should scale the batch size B ∝ N . We also predict an additional scaling relation between the batch size and the momentum parameter, B ∝ 1/(1 − m). Note that one can also interpret ef f = /(1 − m) as the “effective learning rate”. E H OW TO ACHIEVE LARGE BATCH TRAINING Here we propose a simple heuristic for tuning the batch size, learning rate and momentum parameter; in order to maximize both test accuracy and batch size (enabling parallel training across many machines). Note that this is only worthwhile if one expects to retrain a model many times. 1. Set the learning rate to 0.1 and the momentum coefficient to 0.9. Run experiments at a range of batch sizes on a logarithmic scale, and identify the optimal batch size which maximizes the validation set accuracy. If training is not stable, reduce the learning rate, and repeat. 2. Repeatedly increase the batch size by a factor of 3, while scaling the learning rate  ∝ B, until the validation set accuracy starts to fall. Then repeatedly increase the batch size by a factor of 3, while scaling the momentum coefficient (1 − m) ∝ 1/B, until either the validation set accuracy falls or the batch size reaches the limits of your hardware. 3. Having identified the final learning rate and momentum parameter, retune the batch size on a linear scale in the local neighborhood of the current batch size. We believe that this simple procedure will increase the test accuracy, reduce the cost of tuning hyperparameters, and significantly reduce the final number of gradient updates required to train a model. 13
2cs.AI
Approximation of Continuous-Time Infinite-Horizon Optimal Control Problems Arising in Model Predictive Control - Supplementary Notes arXiv:1608.08823v1 [math.OC] 31 Aug 2016 Michael Muehlebach and Raffaello D’Andrea∗ Abstract These notes present preliminary results regarding two different approximations of linear infinitehorizon optimal control problems arising in model predictive control. Input and state trajectories are parametrized with basis functions and a finite dimensional representation of the dynamics is obtained via a Galerkin approach. It is shown that the two approximations provide lower, respectively upper bounds on the optimal cost of the underlying infinite dimensional optimal control problem. These bounds get tighter as the number of basis functions is increased. In addition, conditions guaranteeing convergence to the cost of the underlying problem are provided. 1 Introduction Model predictive control (MPC) takes input and state constraints fully into account and is therefore a promising control strategy with various applications. The standard MPC approach relies on discrete dynamics and a finite prediction horizon, which leads inevitably to issues related to closed-loop stability. In [5], an approximation of the underlying infinite dimensional infinite-horizon optimal control problem has been proposed, which is based on a parametrization of input and state trajectories with basis functions. The infinite prediction horizon is maintained, and therefore closed-loop stability and recursive feasibility arise naturally from the problem formulation. Moreover, it is conjectured that the underlying infinite dimensional optimization problem is well-approximated even with a low basis function complexity. Herein, we compare the approach from [5] to a different finite dimensional approximation. We analyze both with respect to convergence of the optimal costs as the number of basis functions is increased. In particular, the optimal cost of the approximation given in [5] decreases monotonically and approaches the cost of underlying infinite dimensional problem from above. It is shown that the corresponding optimal trajectories are guaranteed to converge and that the second approximation approaches the optimal cost of the infinite dimensional problem from below. In addition, we will establish conditions guaranteeing convergence of both approximations to the cost of the underlying infinite dimensional problem. This report focuses on the technical proofs and complements [4], where the underlying ideas are discussed in detail and a numerical example is provided. ∗ Michael Muehlebach and Raffaello D’Andrea are with the Institute for Dynamic Systems and Control, ETH Zurich. The contact author is Michael Muehlebach, [email protected]. This work was supported by ETH-Grant ETH-48 15-1. 1 2 Problem Formulation We present and analyze two approximations of the following optimal control problem, 1 1 J∞ := inf ||x||22 + ||u||22 2 2 s.t. ẋ(t) = Ax(t) + Bu(t), x(0) = x0 , x(t) ∈ X , u(t) ∈ U, ∀t ∈ [0, ∞), x ∈ L2n , u ∈ L2m , ẋ ∈ L2n , (1) where X and U are closed and convex subsets of Rn and Rm , respectively, containing 0; the space of square integrable functions mapping from [0, ∞) to Rq is denoted by L2q , where q is a positive integer; and the L2q -norm is defined as Z ∞ L2q → R, xT x dt, x → ||x||22 := (2) 0 where dt denotes the Lebesgue measure. We assume that J∞ is finite and that the corresponding minimizers, x and u, are unique. Input and state trajectories will be approximated as a linear combination of basis functions τi ∈ L21 , i = 1, 2, . . . , that is x̃s (t, ηx ) := (In ⊗ τ s (t))T ηx , ũs (t, ηu ) := (Im ⊗ τ s (t))T ηu , (3) where ⊗ denotes the Kronecker product, ηx ∈ Rns and ηu ∈ Rms are the parameter vectors, and τ s (t) := (τ1 (t), τ2 (t), . . . , τs (t)) ∈ Rs . In order to simplify notation we will omit the superscript s in τ s , x̃s , and ũs , and simply write τ , x̃, and ũ whenever the number of basis functions is clear from the context. Similarly, the dependence of x̃ and ũ on ηx and ηu is frequently omitted. Without loss of generality we assume that the basis functions are orthonormal. Note that orthonormal basis functions can be constructed with the Gram-Schmidt procedure, [3, p. 50]. As motivated in [5], the following additional assumptions on the basis functions are made: A1) They are linearly independent. A2) They fulfill τ̇ (t) = M τ (t) for all t ∈ [0, ∞), for some matrix M ∈ Rs×s . The eigenvalues of M have strictly negative realparts. 2.1 Resulting optimization problems In [5], the following finite dimensional approximation of the original problem (1) is introduced, 1 1 Js := inf ||x̃||22 + ||ũ||22 2 Z2 ∞  s.t. (In ⊗ τ ) Ax̃ + B ũ − x̃˙ dt = 0, (4) 0 x̃(0) − x0 = 0, ηx ∈ X s , ηu ∈ U s . Note that the subscript s refers to the number of basis functions used. More precisely, the optimization problem with optimal cost Js corresponds to the case where input and state trajectories are spanned by the first s basis functions. The trajectories x̃ and ũ, which satisfy the equality constraint, fulfill the equations ˙ for all t ∈ [0, ∞) and x̃(0) = x0 , see [5]. This is needed of motion exactly, that is, Ax̃(t) + B ũ(t) = x̃(t) to guarantee that the minimizers of (4) achieve the cost Js on the nominal system. We make the following assumptions on the sets X s and U s1 1 The assumptions are listed for the state constraints X and are analogous for the input constraints U. 2 B0) X s is closed and convex B1) is (X s ) ⊂ X s+1 B2) ηx ∈ X s implies (In ⊗ τ (t))T ηx ∈ X for all t ∈ [0, ∞), where the inclusion is , mapping from Rns to Rn(s+1) is defined by x̃s (t, ηx ) = x̃s+1 (t, is (ηx )), ∀t ∈ [0, ∞), ∀ηx ∈ Rns . (5) Assumption B0) implies that the optimization problem (4) is convex, and that corresponding minimizers exist, provided the existence of feasible trajectories. Assumption B1) is used to show that the cost Js is monotonically decreasing in s, whereas Assumption B2) implies that Js is bounded below by J∞ , see Sec. 3. In the context of MPC, Assumption B2) guarantees recursive feasibility and closed-loop stability, [5]. In addition, the cost Js is achieved on the nominal system, as the resulting input and state trajectories respect input and state constraints and fulfill the dynamics exactly. The following alternative approximation is introduced, 1 1 J˜s := inf ||x̃||22 + ||ũ||22 2 2 Z ∞  (In ⊗ τ ) Ax̃ + B ũ − x̃˙ dt − (In ⊗ τ (0)) (x̃(0) − x0 ) = 0, s.t. (6) 0 ηx ∈ X̃ s , ηu ∈ Ũ s , whose purpose is to provide a monotonically increasing sequence J˜s bounding J∞ from below. To that extent, the following assumptions on the sets X̃ s and Ũ s are made:2 C0) X̃ s is closed and convex. C1) πs (X̃ s+1 ) ⊂ X̃ s . C2) For each x ∈ L2n with x(t) ∈ X for all t ∈ [0, ∞) it holds that π s (x) ∈ X̃ s , where the projections πs and π s are defined as π s :L2n ns Z → R ,x → ∞ (In ⊗ τ s )x dt, (7) 0  πs :Rn(s+1) → Rns , ηx → π s x̃s+1 (·, ηx ) . (8) Assumption C0) ensures that the optimization problem (6) is convex, and that corresponding minimizers exist, provided the existence of feasible trajectories. Assumption C1) is used to demonstrate that J˜s is monotonically increasing, whereas Assumption C2) implies that J˜s is bounded above by J∞ , see Sec. 3. Examples fulfilling Assumptions B0)-B2) and C0)-C2) are provided in [4]. 3 Main results In the following we will analyze the two approximations (4) and (6) and prove the following result: Theorem 3.1 Let N0 be such that JN0 is finite. 1) If Assumptions B0), B1), and B2) hold, then the sequence Js is monotonically decreasing for s ≥ N0 , converges as s → ∞, and is bounded below by J∞ . The corresponding optimizers x̃ and ũ converge strongly in L2n , respectively L2m as s → ∞. 2) If Assumptions C0), C1), and C2) are fulfilled, then J˜s is monotonically increasing for s ≥ 1, converges as s → ∞, and is bounded above by J∞ . 2 The assumptions are again listed for the state constraints X and are analogous for the input constraints U. 3 We start by summarizing the results from [5], stating that the optimal cost of (4) is a monotonically decreasing sequence providing an upper bound on the optimal cost of (1). Proposition 3.2 Let N0 be such that JN0 is finite. If Assumptions B0) and B1) are fulfilled, then the sequence Js is monotonically decreasing for s ≥ N0 and converges as s → ∞. If Assumptions B0) and B2) are fulfilled, Js is bounded below by J∞ . Proof See [5]. The fact that Js converges can be used to demonstrate convergence of the optimizer x̃s and ũs , as well as the corresponding parameters ηxs and ηus . Therefore, the parameter vectors ηxs and ηus are interpreted as square summable sequences, i.e. as elements in `2 .3 Proposition 3.3 Let N0 be such that JN0 is finite and let Assumptions B0) and B1) be fulfilled. Then, the minimizers of (4) converge (strongly) in `2 as s → ∞, and the corresponding trajectories x̃s and ũs converge (strongly) in L2n , respectively L2m . Proof We fix s ≥ N0 and denote the minimizers corresponding to Js by ηxs , ηus , and the minimizers corresponding to Js+1 by ηxs+1 , ηus+1 , which we consider to be elements of `2 . The following observation can be made: The vectors ηx := λis (ηxs ) + (1 − λ)ηxs+1 and ηu := λis (ηus ) + (1 − λ)ηus+1 with λ ∈ [0, 1] are feasibly candidates for the optimization problem (4) over s + 1 basis functions.4 This is because the constraints is (ηx ) ∈ X s+1 , is (ηu ) ∈ U s+1 are satisfied by Assumptions B0) (convexity) and B1). Moreover, as the dynamics are fulfilled exactly it follows for x̃ := (In ⊗ τ )T ηx and ũ := (Im ⊗ τ )T ηu that x̃(t) = λx̃s (t) + (1 − λ)x̃s+1 (t) Z t At eA(t−t̂) B(λũs (t̂) + (1 − λ)ũs+1 (t̂))dt̂ = e x0 + Z0 t eA(t−t̂) B ũ(t̂)dt̂, = eAt x0 + 0 where x̃s := (In ⊗ τ )T ηxs , ũs := (In ⊗ τ )T ηus , x̃s+1 := (In ⊗ τ )T ηxs+1 , and ũs+1 := (In ⊗ τ )T ηus+1 , which concludes that the equality constraint is likewise fulfilled. Since ηxs+1 and ηus+1 are the minimizers corresponding to Js+1 , we have that 1 1 Js+1 ≤ ||x̃||22 + ||ũ||22 , 2 2 (9) for all λ ∈ [0, 1]. The objective function is quadratic, and hence strongly convex with respect to the L2n and L2m -norm, which leads to 1 1 Js+1 ≤ λJs + (1 − λ)Js+1 − λ(1 − λ)||x̃s − x̃s+1 ||22 − λ(1 − λ)||ũs − ũs+1 ||22 , 2 2 (10) for all λ ∈ [0, 1]. We set λ = 1/2 and obtain ||x̃s − x̃s+1 ||22 + ||ũs − ũs+1 ||22 ≤ 4(Js − Js+1 ). (11) According to Prop. 3.2, the sequence Js converges as s → ∞. As a result, it follows that (x̃s , ũs ) ∈ L2n ×L2m is a Cauchy sequence. The space L21 is a Banach space, [7, p. 67] and so is L2n × L2m . Consequently, (x̃s , ũs ) converges strongly as s → ∞, [8, p. 4]. The orthonormality of the basis functions implies by Bessel’s inequality, [3, p. 51] that the parameters ηxs and ηus form a Cauchy sequence in `2 × `2 . The square summable sequences form likewise a Banach space and therefore the parameter vectors ηxs and ηus converge strongly in `2 as s → ∞. The set of square summable sequences is denoted by `2 . Notation is slightly abused, since is is used to denote both the inclusion Rns → Rn(s+1) and Rms → Rm(s+1) , which is defined in analogy to (5). 3 4 4 We establish results for the optimization problem (6), which are similar to the ones given by Prop. 3.2. More precisely, we will show that under Assumptions C0)-C2) the optimal cost of (6) bounds J∞ from below and is monotonically increasing in s. Proposition 3.4 Let Assumptions C0) and C2) be fulfilled. Then J˜s ≤ J∞ holds for all s ≥ 1. Proof We will denote the minimizers of (1) by x and u, which are both square integrable and fulfill ẋ(t) = Ax(t) + Bu(t) for all t ∈ [0, ∞). We define ηx := π s (x) ∈ Rns , ηu := π s (u) ∈ Rms (where notation is slightly abused to denote both the projection from L2n → Rns and the projection from L2m → Rms , defined in analogy to (7), by π s ). From Assumption C2) it follows that ηx ∈ X̃ s and ηu ∈ Ũ s . We will argue that ηx and ηu fulfill the equality constraints in (6). Therefore we rewrite the equality constraint as  A ⊗ Is − In ⊗ M T − In ⊗ (τ (0)τ (0)T ) ηx + (B ⊗ Is )ηu + (In ⊗ τ (0))x0 = 0, (12) where orthonormality of the basis functions, the properties of the Kronecker product, and Assumption A2) is used. We note further that the identity Z ∞ Z ∞ T T τ τ̇ T dt τ̇ τ dt = −τ (0)τ (0) − M= (13) 0 0 T T = −τ (0)τ (0) − M , which follows from integration by parts, simplifies the previous equation to (A ⊗ Is + In ⊗ M )ηx + (B ⊗ Is )ηu + (In ⊗ τ (0))x0 = 0. Moreover, it holds that Z ∞ Z (In ⊗ τ )ẋdt = −(In ⊗ τ (0))x0 − (In ⊗ M ) 0 (14) ∞ (In ⊗ τ )xdt (15) 0 = −(In ⊗ τ (0))x0 − (In ⊗ M )ηx = (A ⊗ Is )ηx + (B ⊗ Is )ηu , (16) (17) where integration by parts (1st step), the definition of the projection π s (2nd step), and the fact that x and u fulfill the (linear) equations of motion exactly (3rd step) has been used. Clearly, (16) and (17) are equivalent to (14) and therefore ηx and ηu are feasible candidates for (6). Bessel’s inequality, [3, p. 51], implies that 1 1 1 1 1 1 |ηx |22 + |ηu |22 = |π s (x)|22 + |π s (u)|22 ≤ ||x||22 + ||u||22 , 2 2 2 2 2 2 (18) where the Euclidean norm is denoted by | · |2 . Therefore ηx and ηu are feasible candidates achieving a cost that is smaller than J∞ , and hence, J˜s ≤ J∞ for all s ≥ s0 . In order to establish that the sequence J˜s is monotonically increasing, we will work with the dual problem. It turns out that the finite dimensional representation of the adjoint equations are fulfilled exactly by (6). We will use this fact to construct feasible candidates for the optimization over s + 1 basis functions. Proposition 3.5 Let Assumptions C0), C1), and C2) be fulfilled. Then J˜s is monotonically increasing and bounded above by J∞ for all s ≥ 1. Proof We first derive the dual of (6). We use Lagrange duality to rewrite (6) as Z ∞  1 T 1 ˜ Js = inf sup x̃ x̃ + ũT ũ + p̃T Ax̃ + B ũ − x̃˙ dt − p̃(0)T (x̃(0) − x0 ), ηx ,ηu ηp 2 2 0 s s ηx ∈ X̃ , ηu ∈ Ũ . 5 (19) From Assumptions C0) and C1) we can infer that J˜s ≤ J∞ for all s ≥ 1 by Prop. 3.4. The fact that 0 ≤ J˜s ≤ J∞ implies further that the infimum in (6) is attained, and that the set of minimizers is nonempty due to Assumption C0) (X̃ s and Ũ s are closed). According to [6, p. 503, Thm. 11.39] strong duality holds, and the infimum and supremum can be interchanged, which yields Z ∞  1 1 T ˜ x̃ x̃ + ũT ũ + p̃T Ax̃ + B ũ − x̃˙ dt − p̃(0)T (x̃(0) − x0 ), Js = sup inf 2 2 ηp ηx ,ηu 0 (20) s s ηx ∈ X̃ , ηu ∈ Ũ . The minimization over ηx and ηu is a convex problem and can be rewritten in terms of convex-conjugate ˙ resulting in functions, [6, p. 473]. To that extent, we apply first integration by parts on the term p̃T x̃, Z ∞  1 1 T ˜ Js = sup inf x̃ x̃ + x̃T AT p̃ + p̃˙ + ũT ũ + ũT B T p̃ dt + p̃(0)T x0 , 2 2 ηp ηx ,ηu 0 (21) s s ηx ∈ X̃ , ηu ∈ Ũ . By defining ṽ(t, ηv ) := (In ⊗ τ (t))T ηv such that Z ∞ ˙ dt = 0, δ λ̃T (ṽ + AT p̃ + p̃) δ λ̃ := (In ⊗ τ )T δηλ , 0 for all δηλ ∈ Rns , which is equivalent to −ṽ := AT p̃ + p̃˙ as shown in [5], the minimization over x̃ can be interpreted as a (extended real-valued) function of ṽ, i.e. Z ∞ Z ∞ 1 T 1 T inf x̃ x̃ − x̃ ṽ dt = − sup x̃T ṽ − x̃T x̃ dt (22) 2 2 ηx ∈X̃ s 0 ηx ∈X̃ s 0 Z ∞ 1 = − sup x̃T ṽ − x̃T x̃ dt =: −Iϕ∗s (ṽ). (23) 2 π s (x̃)∈X̃ s 0 Note that Iϕ∗s maps from L2n to the extended real line and is well-defined. In a similar way, we can regard the minimization over ηu as (extended real-valued) function of p̃, Z ∞ 1 T inf ũ ũ + ũT B T p̃ dt =: −Iψ∗ s (−B T p̃), (24) s s 2 π (ũ)∈Ũ 0 where in this case π s denotes the projection L2m → Rsm defined in analogy to (7) (with a slight abuse of notation). Thus, (21) is reformulated as J˜s = sup −Iϕ∗s (ṽ) − Iψ∗ s (−B T p̃) + p̃(0)T x0 , ηp ∈Rns Z ∞  s.t. (In ⊗ τ ) p̃˙ + AT p̃ + ṽ dt = 0. (25) 0 The functions ṽ and p̃ satisfy the adjoint equations exactly and it holds that limt→∞ p̃(t) = 0 by Assumption A1). Let ηv ∈ Rns and ηp ∈ Rns , with corresponding trajectories ṽ s (t, ηv ) and p̃s (t, ηp ), be maximizers of (25). The set of maximizers is non-empty due to the fact that we optimize over Rns and 0 ≤ J˜s ≤ J∞ holds. The equality constraint implies that the adjoint equation p̃˙s (t) + AT p̃s (t) + ṽ s (t) = 0 is fulfilled for all times t ∈ [0, ∞), see [5], and thus, the adjoint equation is likewise fulfilled by the augmented trajectories ṽ s+1 (t, is (ηv )) and p̃s+1 (t, is (ηp )). Hence, ṽ s+1 (t, is (ηv )) and p̃s+1 (t, is (ηp )) are feasible candidates to the optimization (25) over s + 1 basis functions, and it holds that p̃s+1 (0, is (ηp )) = p̃s (0, ηp ). It remains to 6 establish the relation between Iϕ∗s and Iϕ∗s+1 , as well as Iψ∗ s+1 and Iψ∗ s , which is done via the order reversing property of the convex-conjugation. Therefore the function Iϕ∗s is regarded as the conjugate of ( 1 ||x̃s (t, π s (x))||22 π s (x) ∈ X̃ s , Iϕs (x) := 2 (26) ∞ otherwise. We note that Assumption C1) implies Iϕs+1 (x) ≥ Iϕs (x) for all x ∈ L2n . This is due to the fact that any square integrable function x with π s+1 (x) ∈ X̃ s+1 automatically fulfills π s (x) ∈ X̃ s , since πs (X̃ s+1 ) is contained in X̃ s by Assumption C1), and |π s+1 (x)|22 ≥ |π s (x)|22 holds for all x ∈ L2n . The convexconjugation reverses ordering, which implies Iϕ∗s+1 (v) ≤ Iϕ∗s (v) (27) for all v ∈ L2n , see [1, Prop. 4.4.1, p. 171]. The same reasoning applies to Iψ∗ s , which is the convex-conjugate of ( 1 ||ũs (t, π s (u))||22 π s (u) ∈ Ũ s , (28) Iψs (u) := 2 ∞ otherwise. This leads to the conclusion that −Iϕ∗s (v) − Iψ∗ s (−B T p) ≤ −Iϕ∗s+1 (v) − Iψ∗ s+1 (−B T p), (29) for any v, p ∈ L2n . Hence, we have that ṽ s+1 (t, is (ηv )) and p̃s+1 (t, is (ηp )) are feasible candidates to the optimization problem over s + 1 basis functions with higher corresponding cost and therefore J˜s+1 ≥ J˜s . Next, we would like to establish that lims→∞ J˜s = lims→∞ Js . In order to do so, we need the following assumptions: D0) lim sups→∞ X̃s ⊂ lim inf s→∞ X s D1) The basis functions τi , i = 1, 2, . . . , are dense in C0∞ (in the topology of uniform convergence).5 Proposition 3.6 Let N0 be such that JN0 is finite and let Assumptions B0)-D1) be fulfilled. Then, lims→∞ J˜s = lims→∞ Js holds. Proof By Prop. 3.2 and Prop. 3.3 it follows that Js is monotonically decreasing, lims→∞ Js is finite, and that the corresponding optimizers converge. From Prop. 3.4 and Prop. 3.5, we can infer that J˜s is monotonically increasing and bounded above by J∞ for all s ≥ 1. This implies further that the sequence of minimizers of (6) is bounded in the L2 -sense. Due to the fact that L21 (and likewise L2n × L2m ) is a Hilbert space, there exists a subsequence s(q) such that the corresponding minimizer of (6) converge weakly, i.e. x̃s(q) * x̃, ũs(q) * ũ, [2, p. 163]. We pick anyP δp := (δp1 , . . . , δpn )T , with δpi ∈ C0∞ , i = 1, 2, . . . , n, and δp(0) = 0, and choose a sequence δ p̃k = ki=1 τi δηpi , δηpi ∈ Rn , converging uniformly to δp. According to Assumption D1) such a sequence exists. Hence for any  > 0 we can find an integer N0 large enough, such that |δ p̃k (0)T (x̃s(q) (0) − x0 )| ≤ |x̃s(q) (0) − x0 |2  holds for all k ≥ N0 . We claim that |x̃s(q) (0) − x0 |2 is uniformly bounded. This can be seen by right multiplying the equality constraint of (6) by ηxT , resulting in Z ∞ x̃s(q)T (Ax̃s(q) + B ũs(q) − x̃˙ s(q) )dt − x̃s(q) (0)T (x̃s(q) (0) − x0 ) = 0, (30) 0 5 The set of smooth functions with compact support mapping from [0, ∞) to R is denoted by C0∞ . 7 which can be further simplified to Z ∞ 1 1 2 x̃s(q)T (Ax̃s(q) + B ũs(q) )dt = |x̃s(q) (0) − x0 |22 , |x0 |2 + 2 2 0 (31) using limt→∞ x̃s(q) (t) = 0 (by Assumption A1)) and completing the squares. From the fact that J˜s(q) ≤ J∞ for all q, it follows that x̃s(q) and ũs(q) are bounded in L2n , respectively L2m . As a consequence, |x̃s(q) (0)−x0 |22 is uniformly bounded, as can be verified with the Cauchy-Schwarz inequality, limk→∞ δ p̃k (0)T (x̃s(q) (0) − x0 ) converges uniformly, and the limits over q and k can be interchanged, lim lim δ p̃k (0)T (x̃s(q) (0) − x0 ) = lim lim δ p̃k (0)T (x̃s(q) (0) − x0 ) = 0. q→∞ k→∞ k→∞ q→∞ The equality constraint of (6) reads therefore as Z ∞ Z T s(q) s(q) s(q) ˙ δ p̃k (Ax̃ + B ũ − x̃ )dt = lim lim lim lim k→∞ q→∞ q→∞ k→∞ 0 (32) ∞ δ p̃Tk (Ax̃s(q) + B ũs(q) − x̃˙ s(q) )dt = 0, 0 (33) where both limits agree. We will show that the limit over PN k commutes with the integration. To that extent, we make the following claim: For any function ṽ := i=1 τi ηvi , where ηvi are bounded vectors in Rn and N is a positive integer, it holds that Z ∞ Z ∞ T lim δ p̃k ṽdt = δpT ṽdt. (34) k→∞ 0 0 We will prove the claim below, but assume for now that it holds. As a consequence of Assumption A1), implying that x̃˙ s(q) is a linear combination of the basis functions, the claim results in Z ∞ Z ∞ s(q) ˙ δpT x̃˙ s(q) dt, (35) δ p̃k x̃ dt = lim k→∞ 0 0 for any integer s(q). Using integration by parts (twice) and the fact that x̃s(q) converges weakly leads to Z ∞ Z ∞ T ˙ s(q) δ ṗT x̃s(q) dt (36) lim δp x̃ dt = lim − q→∞ 0 q→∞ 0 Z ∞ δ ṗT x̃dt (37) =− 0 Z ∞ ˙ = δpT x̃dt. (38) 0 Note that δ ṗ has compact support, is bounded (by continuity), and is therefore square integrable in [0, ∞). The claim implies further that (33) simplifies to Z ∞ 0 = lim δpT (Ax̃s(q) + B ũs(q) − x̃˙ s(q) )dt (39) q→∞ 0 Z ∞ ˙ = δpT (Ax̃ + B ũ − x̃)dt. (40) 0 The same argument can be repeated for any δp = (δp1 , . . . δpn ), δpi ∈ C0∞ , i = 1, 2, . . . , n, vanishing at 0, and therefore, as s(q) → ∞, the equality constraint of (6) reads as Z ∞ ˙ 0= δpT (Ax̃ + B ũ − x̃)dt, ∀δp ∈ C0∞ . 0 8 ˙ Due to the fundamental lemma of the calculus of variations, [9, p. 18], this is equivalent to x̃(t) = Ax̃(t) + B ũ(t) for all t ∈ [0, ∞) (almost everywhere). A similar argument based on variations that do not vanish at time 0 ensures limq→∞ x̃s(q) (0) = x0 . As a result, the equality constraint of (6) is equivalent to the one of (4) in the limit as s(q) → ∞. Combined with Assumption D1), it implies that x̃ and ũ are feasible candidates for (4) and therefore limq→∞ J˜s(q) ≥ lims→∞ Js . From Prop. 3.2, Prop. 3.4, and Prop. 3.5 it follows that J˜s is monotonically increasing and bounded by J∞ ≤ Js for all s ≥ N0 , resulting in lim J˜s(q) = lim J˜s = lim Js . q→∞ s→∞ (41) s→∞ PN n It remains to prove the claim. Let ṽ := i=1 τi ηvi where the ηvi s are bounded vectors in R and N is fixed. The matrix M in Assumption A1) is negative definite and therefore it holds that |ṽ(t)|2 ≤ C1 e−βt for all t ≥ T0 for some constants C1 > 0, β > 0 and time T0 > 0. As a result, it follows from Hölder’s inequality, [7, p. 76], that Z ∞ Z ∞ T (δ p̃k − δp) ṽdt ≤ sup |δ p̃k (t) − δp(t)|2 |ṽ|2 dt. (42) 0 t∈[0,∞) 0 The second term can be bounded by invoking Hölder’s inequality once more, Z ∞ Z ∞ Z T0 C1 −βT0 e . |ṽ|2 dt + C1 e−βt dt ≤ T0 ||ṽ||2 + |ṽ|2 dt ≤ β T0 0 0 (43) Hence, the right-hand side of (42) converges to zero due to the uniform convergence of the δ p̃k to δp as k → ∞. This proves the claim. 4 Conclusion We introduced two different approximations to a class of infinite-horizon optimal control problems encountered in MPC. The approximations bound the optimal cost of the underlying problem from above and below, and their optimal costs converge as the number of basis functions tends to infinity. Under favorable circumstances, the resulting input trajectories of the first approximation are found to approximate the optimal input of the underlying infinite dimensional problem arbitrarily accurately, and the corresponding optimal costs converge to the optimal cost of the underlying infinite dimensional problem. The second approximation yields a lower bound on the cost of the underlying optimal control problem, and can therefore be used to quantify the approximation quality of both approximations. Acknowledgment The first author would like to thank Jonas Lührmann for a fruitful discussion regarding the proof of Prop. 3.6. References [1] J. M. Borwein and J. D. Vanderwerff. Convex Functions. Cambridge University Press, 2010. [2] J. B. Conway. A Course in Functional Analysis. Springer, second edition, 1990. [3] R. Courant and D. Hilbert. Methods of Mathematical Physics, volume 1. Interscience Publishers, 1953. 9 [4] M. Muehlebach and R. D’Andrea. Approximation of continuous-time infinite-horizon optimal control problems arising in model predictive control. Proceedings of the IEEE Conference on Decision and Control, 2016. [5] M. Muehlebach and R. D’Andrea. Parametrized infinite-horizon model predictive control for linear time-invariant systems with input and state constraints. Proceedings of the American Control Conference, pages 2669–2674, 2016. [6] R. T. Rockafellar and R. J.-B. Wets. Variational analysis. Springer, 2009. [7] W. Rudin. Real and Complex Analysis. McGraw-Hill, third edition, 1987. [8] W. Rudin. Functional Analysis. McGraw-Hill, second edition, 1991. [9] L. C. Young. Lectures on the Calculus of Variations and Optimal Control Theory. AMS Chelsea Publishing, second edition, 1980. 10
3cs.SY
On LDPC Code Based Massive Random-Access Scheme for the Gaussian Multiple Access Channel Luiza Medova∗† , Anton Glebov‡, Pavel Rybin∗ , and Alexey Frolov‡∗ ∗ Inst. for Information Transmission Problems, Moscow, Russia, [email protected] Inst. of Physics and Mathematics, Moscow, Russia, [email protected] ‡ Skolkovo Institute of Science and Technology, Moscow, Russia, {[email protected], [email protected]} arXiv:1803.08377v1 [cs.IT] 22 Mar 2018 † Moscow Abstract—This paper deals with the problem of massive random access for Gaussian multiple access channel (MAC). We continue to investigate the coding scheme for Gaussian MAC proposed by A. Vem et al in 2017. The proposed scheme consists of four parts: (i) the data transmission is partitioned into time slots; (ii) the data, transmitted in each slot, is split into two parts, the first one set an interleaver of the low-density paritycheck (LDPC) type code and is encoded by spreading sequence or codewords that are designed to be decoded by compressed sensing type decoding; (iii) the another part of transmitted data is encoded by LDPC type code and decoded using a joint message passing decoding algorithm designed for the T-user binary input Gaussian MAC; (iv) users repeat their codeword in multiple slots. In this paper we are concentrated on the third part of considered scheme. We generalized the PEXIT charts to optimize the protograph of LDPC code for Gaussian MAC. The simulation results, obtained at the end of the paper, were analyzed and compared with obtained theoretical bounds and thresholds. Obtained simulation results shows that proposed LDPC code constructions have better performance under joint decoding algorithm over Gaussian MAC than LDPC codes considered by A. Vem et al in 2017, that leads to the better performance of overall transmission system. I. I NTRODUCTION Current wireless networks are designed with the goal of servicing human users. Next generation of wireless networks is facing a new challenge in the form of machine-type communication: billions of new devices (dozens per person) with dramatically different traffic patterns are expected to go live in the next decade. The main challenges are associated with: (a) huge number of autonomous devices connected to one access point, (b) low energy consumption, (c) short data packets. This problem has attracted attention (3GPP and 5G-PPP) under the name of mMTC (massive machine-type communication). There are K ≫ 1 users, of which only T have data to send in each time instant. A base station (BS) sends periodic beacons, announcing frame boundaries, so that the uplink (user-to-BS) communication proceeds in a frame-synchronized fashion. Length of each frame is N , where a typical interesting value is n ≈ 104 − 105 . Each active user has k bits that it intends to transmit during a frame, where a typical value is k ≈ 100 bit. The main goal is to minimize the energy-perbit spent by each of the users. We are interested in grant-free access (5G terminology). That is, active users transmit their data, without any prior communication with the BS (without resource requests). We will focus on the Gaussian multipleaccess channel (GMAC) with equal-power users, i.e. Y = T X Xt + Z, t=1   where Z ∼ N (0, N0 /2) and E |Xi |2 ≤ P . This paper deals with construction of low-complexity random coding schemes for GMAC (indeed we restrict our consideration to the case of binary input GMAC). Let us emphasize the main difference from the classical setting. Classical information theory provided the exact solutions for the case of all-active users, i.e. T = K. Almost all well-known low-complexity coding solutions for the traditional MAC channel (e.g. [1]) implicitly assume some form of coordination between the users. Due to the gigantic number users we assume them to be symmetric, i.e. the users use the same codes and equal powers. Here we continue the line of work started in [2]–[4]. In [2] the bounds on the performance of finitelength codes for GMAC are presented. In [3] Ordentlich and Polyanskiy describe the first low-complexity coding paradigm for GMAC. The improvement (it terms of required Eb /N0 ) was given in [4]. We continue to investigate the coding scheme from [4]. The proposed scheme consists of four parts: • the data transmission is partitioned into time slots; • the data, transmitted in each slot, is split into two parts, the first one (preamble) allows to detect users that were active in the slot. It also set an interleaver of the lowdensity parity-check (LDPC) type code [5], [6] and is encoded by spreading sequence or codewords that are designed to be decoded by compressed sensing type decoding; • the second part of transmitted data is encoded by LDPC type code and decoded using a joint message passing decoding algorithm designed for the T -user binary input GMAC; • users repeat their codeword in multiple slots and use successive interference cancellation. The overall scheme can be called T-fold irregular repetition slotted ALOHA (IRSA, [7], [8]) scheme for GMAC. The main difference of this scheme in comparison to IRSA is as follows: any collisions of order up to T can be resolved with some probability of error introduced by Gaussian noise. In this paper we are concentrated on the third part of considered scheme. Our contribution is as follows. We generalized the protograph extrinsic information transfer charts (EXIT) to optimize the protograph of LDPC code for GMAC. The simulation results, obtained at the end of the paper, were analyzed and compared with obtained theoretical bounds and thresholds. Obtained simulation results shows that proposed LDPC code constructions have better performance under joint decoding algorithm over Gaussian MAC than LDPC codes considered in [4], that leads to the better performance of overall system. II. I TERATIVE JOINT DECODING ALGORITHM By C (t) , t ∈ [T ], we denote the codes used by users (the codes are binary). Recall, that n and R are accordingly the length and the rate of C (t) , k ∈ [T ]. Thus T users send codewords c(1) , c(2) , . . . , c(T ) . After (1) (2) (K) BPSK modulator √ we√have the sequences x , x , . . . , x , x(i) ∈ {− P , + P }n . The channel output (y) is the element-wise sum of the sequences affected by Gaussian noise. The aim of joint multi-user decoder is to recover the all the codewords based on received vector y. The decoder employs a low-complexity iterative belief propagation (BP) decoder that deals with a received soft information presented in LLR (log likelihood ratio) form. The decoding system can be represented as a graph (factor graph), which is shown in Fig. 1. User LDPC codes are presented with use of Tanner graphs with variable and check nodes. At the same time there is a third kind of nodes in the figure – functional nodes (marked with green color). These nodes correspond to the elements of the received sequence y. Following the by now standard methodology of factor graphs, see [9], [10], we can write down the corresponding message passing decoding algorithm. 1) initialize the LLR values of variable nodes for each user code with zero values assuming equal probability for 1 and −1 values; 2) perform IO outer iterations, where each iteration consists of the following steps: a) perform maximum likelihood decoding of functional nodes (i.e. calculate update messages for variable nodes); b) perform II inner iterations of BP decoder for users’ LDPC codes and update LLR values of variable nodes (this is done in parallel); The BP part is standard, i.e. each user utilizes standard BP decoding algorithm (Sum-Product or Min-Sum) to decode an LDPC code. The most interesting part is the decoding of functional nodes. Following the principles of message-passing algorithms, the update rule to compute the message (µ) sent to i-th variable node of k-th user (k = 1, . . . , K, i = 1, . . . , N ) from a functional node Fi is the following: Let mkvc,j denotes the message sent by the variable node v to the check node c along its jth edge of user k: mvc,j = dX v −1 mkcv,i + mksv ; i=1, i6=j where mkcv,i is the message outgoing from the check node :   dY c −1 m vc,i ; mcv,j = 2 tanh−1  tanh 2 i=1, i6=j mksv and is the message outgoing from the state node. It is also necessary to describe the rule for computing messages outgoing from state nodes. Let xki denote the ith transmitted code bit and yi denote the channel output. The outgoing message from the ith variable node of user k to the connected state node is computed as k p(xki = 1) p(xki = 1) , emvs,i = ; k p(xi = −1) p(xki = −1) mkvs,i = log Considering standard function node message-passing rules [9], we compute the message sent to user k ith variable node from the state node: mksv,i = log  P Q p(xki = 1|y) = p(xki = −1|y) (1) (k) p(xji = 1)p(yi |xi , ..., xi (n) = 1, ..., xi )    ∼x(k) j6=k   i log  P Q  (1) (k) (n)  j  p(xi = −1)p(yi |xi , ..., xi = −1, ..., xi ) (k) j6=k ∼xi We can simplify it in the following way: mksv,i =  P Q e 1xj Xj (1) (k) p(yi |xi , ..., xi (n) = 1, ..., xi )   ∼x(k) j6=k    i log  P Q 1 X  , (1) (1) (k) (n) x j  e j p(yi |xi , ..., xi = −1, ..., xi )  (k) j6=k ∼xi ( (j) 1, xi = 1 . (j) 0, xi = −1. The number of computations necessary to obtain the outgoing messages from the node Fi grows exponentially with the number of users, nevertheless, this number of users usually remains small, and we will therefore not be concerned with this fact. where 1xk = III. PEXIT C HARTS Extrinsic Information Transfer (EXIT) charts [11] can be used for the accurate analysis of the behavior of LDPC decoders. But since the usual EXIT analysis cannot be applied to the study of protograph-based [12] LDPC codes we will use a modified EXIT analysis for protograph-based LDPC codes (PEXIT) [13]. This method is similar to the standard EXIT analysis in that it tracks the mutual information between the message edge and the bit value corresponding to the variable node on which the edge is incident, while taking into account LDPC code of 1st user LDPC code of 2nd user check nodes LDPC code of 3rd user . . . . . . variable nodes . . . . . . . . . . . . . . . functional nodes Fig. 1. Joint decoder graph representation for T = 3 the structure of the protograph. In our work we use the notation from [13] to describe EXIT charts for protograph-based LDPC codes. Let IEv denote the extrinsic mutual information between a message at the output of a variable node and the codeword bit associated to the variable node: IEv = IEv (IAv , IEs ) , where IAv is the mutual information between the codeword bits and the check-to-variable messages and IEs is the mutual information between the codeword bits and the stateto-variable messages. Since the PEXIT tracks the mutual information on the edges of the protograph, we define IEv (i, j) as the mutual information between the message sent by the variable node Vj to the check node Ci and the associated codeword bit:   sX [J −1 (IAv (s, j))]2 + [J −1 (IEs (j))]2  IEv (i, j) = J  s6=i where J(σ) is given by [11]: J(σ) = 1  Z∞ 1 1 √ exp − − 2 2 2πσ 2 y − σ2 x σ −∞ !2   log2 (1 + e−y )dy. Similarly, we define IEc , the extrinsic mutual information between a message at the output of a check node and the codeword bit associated to the variable node receiving the message: IEc = IEc (IAc ) , where IAc is the mutual information between one input message and the associated codeword bit and IAc = IEv . Accordingly, the mutual information between the message sent by Ci to Vj and the associated codeword bit is described as:   sX [J −1 (1 − Iac (i, s))]2  . Iec (i, j) = 1 − J  s6=j The mutual information between the variable node Vj and the message passed to the state node is denoted as IEvs (j) and is given by:   s X IEvs (j) = J  [J −1 (Iav (s, j))]2  . s Next we need to compute the mutual information IEs . In order to get an idea about the probability density function of (1) for user j, we generate samples of the outgoing LLRs through (1) based on the samples of the received LLRs from other users whose PDF is approximated with N (µEvs , 2µEvs ), −1 where µEvs = J (I2 Evs ) . To numerically estimate µEs and obtain the required mutual information as IEs = J(µEs ), we refer to [14], where the following three approaches are proposed: • Mean-matched Gaussian approximation : the mean µ is 2 estimated from samples and we set µEvs = µ and σEvs = 2µ. • Mode-matched Gaussian approximation : given a sufficiently large number of N samples generated through (1), the mode m is estimated from samples and we set 2 µEvs = m and σEvs = 2m. • Gaussian mixture approximation: mean values µ1 , ..., µk and the weights a1 , ..., ak are estimated from samples and IEs = a1 J(µ1 ) + ... + ak J(µk ). The rationale for using these approximations was shown in [14]. Furthermore, the authors compared the performance of these approaches. The mode-matched method was found to give the maximum output mutual information and the joint codes designed by using this approximation also yield the lowest decoding bit error probability compared to the other two approaches. Each user calculate IAP P (j), the mutual information between the posteriori probability likelihood ratio evaluated by the variable node Vj and the associated codeword bit.   s X [J −1 (IAv (s, j))]2 + [J −1 (IEs (j))]2  . IAP P (j) = J  s The convergence is declared if each IAP P (j) reaches 1 as the iteration number tends to infinity. IV. N UMERICAL R ESULTS In this section the simulation results, obtained for the cases T=2 and T=4, are represented. Let us at first consider the simulation results for T=2 (Fig. 2). For this case we compare the Frame Error Rate (FER) performance of rate-1/4 LDPC code (364, 91) from [4] obtained by repetition of each code bit of regular (3,6) LDPC code twice, rate-1/4 LDPC code (364, 91) optimized by PEXIT charts method described above and Polyanskiy’s finite block length (FBL) bound for 2 user less than 3 dB. 10 0 V. S PARSE FER 10 -1 10 -2 10 -3 Repeated reg. (3,6) LDPC code PEXIT optimized LDPC code 10 -4 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 E b /N0 , dB Fig. 2. Simulation results for T=2 and LDPC code (364, 91) case. As we can see in Fig. 2 proposed PEXIT-optimized LDPC code construction outperforms LDPC code construction from [4] by about 0.5 dB. In the same time the gap between Polyanskiy’s FBL bound and PEXIT-optimized LDPC code is about 3 dB. But we would like to point out that used here Polyanskiy’s FBL bound is for Gaussian signal and not for Binary Phase-Shift Keying (BPSK) modulation, used for simulation. So, we believe that this gap will be reduced is FBL bound for BPSK modulation is used. Now let us consider simulation results for T=4 (Fig. 3). For this case we obtain another PEXIT-optimized rate-1/4 LDPC code (364, 91) and compare FER performance of same LDPC code from [4] and Polyanskiy’s FBL bound for 4 users. As 10 0 FER 10 -1 10 LDPC CODES In this section we answer a very natural question: how to increase the order of collision, that can be decoded in a slot. E.g. consider the case from the previous section. Let the slot length n′ = 364. We want to increase T up to 8. Here we face with two problems: • The performance of LDPC joint decoder rapidly becomes bad with grows of T . We were not able to find (364, 91) LDPC codes, that work well for T = 8. • The number of computations necessary to obtain the outgoing messages from the functional node grows exponentially with the number of users T . We address both these problems in a scheme, which is proposed below (see Fig. 4). The idea is to use sparse spreading signatures [15] for LDPC codes, such that the degree of functional node is reduced from T to dc . The slot length is now n′ , n′ 6= n. Users C1 C2 CT … 2 … 1 … n n dc dc … … 1 2 K … n dc … … n’ Resources Tn n′ = dc Fig. 4. Sparse spreading of LDPC codes -2 10 -3 Repeated reg. (3,6) LDPC code PEXIT optimized LDPC code 10 -4 SPREADING OF 2 3 4 5 6 7 8 9 10 E b /N0 , dB Fig. 3. Simulation results for T=4 and LDPC code (364, 91) we can see in Fig. 3 proposed PEXIT-optimized LDPC code construction outperforms LDPC code construction from [4] by more than 3 dB. And again the gap between Polyanskiy’s FBL bound and PEXIT-optimized LDPC code is a little bit In Fig. 5 we present the simulation results. As we were not able to find (364, 91) LDPC codes, that work well for T = 8 we consider 2 times shorter LDPC codes and compare 2 strategies: • split the slot into 2 parts and send 4 users in each part; • use sparse spreading; We see, that our approach is much better and works practically the same in comparison to the case of 2 times longer LDPC codes and 2 times smaller number of users (see the previous section). VI. C ONCLUSION We generalized the protograph extrinsic information transfer charts (EXIT) to optimize the protograph of LDPC code for GMAC. The simulation results, obtained at the end of the paper, were analyzed and compared with obtained theoretical bounds and thresholds. Obtained simulation results shows that 10 0 FER 10 -1 10 -2 10 -3 T=8, 2 parts split slot, LDPC code (180, 45) T=8, slot spreading, LDPC code (180, 45) T=4, LDPC code (364, 91) 10 -4 3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8 E b /N0 , dB Fig. 5. Simulation results for spreading proposed LDPC code constructions have better performance under joint decoding algorithm over Gaussian MAC than LDPC codes considered by A. Vem et al in 2017, that leads to the better performance of overall system. ACKNOWLEDGMENT We want to thank Y. Polyanskiy for fruitful discussions. R EFERENCES [1] B. Rimoldi and R. Urbanke, “A rate-splitting approach to the gaussian multiple-access channel,” IEEE Transactions on Information Theory, vol. 42, no. 2, pp. 364–375, 1996. [2] Y. Polyanskiy, “A perspective on massive random-access,” in Information Theory (ISIT), 2017 IEEE International Symposium on. IEEE, 2017, pp. 2523–2527. [3] O. Ordentlich and Y. Polyanskiy, “Low complexity schemes for the random access gaussian channel,” in 2017 IEEE International Symposium on Information Theory (ISIT), June 2017, pp. 2528–2532. [4] A. Vem, K. R. Narayanan, J. Cheng, and J.-F. Chamberland, “A userindependent serial interference cancellation based coding scheme for the unsourced random access gaussian channel,” in Proc. IEEE Information Theory Workshop (ITW), 2017, pp. 1–5. [5] R. G. Gallager, Low-Density Parity-Check Codes, 1963. [6] R. Tanner, “A recursive approach to low complexity codes,” IEEE Transactions on information theory, vol. 27, no. 5, pp. 533–547, 1981. [7] G. Liva, “Graph-based analysis and optimization of contention resolution diversity slotted aloha,” IEEE Transactions on Communications, vol. 59, no. 2, pp. 477–487, February 2011. [8] K. R. Narayanan and H. D. Pfister, “Iterative collision resolution for slotted aloha: An optimal uncoordinated transmission policy,” in 2012 7th International Symposium on Turbo Codes and Iterative Information Processing (ISTC), Aug 2012, pp. 136–139. [9] T. Richardson and R. Urbanke, Modern coding theory. Cambridge university press, 2008. [10] F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, “Factor graphs and the sum-product algorithm,” IEEE Transactions on information theory, vol. 47, no. 2, pp. 498–519, 2001. [11] S. ten Brink, “Convergence behavior of iteratively decoded parallel concatenated codes,” IEEE Transactions on Communications, vol. 49, no. 10, pp. 1727–1737, Oct 2001. [12] J. Thorpe, “Low-Density Parity-Check (LDPC) Codes Constructed from Protographs,” Interplanetary Network Progress Report, vol. 154, pp. 1– 7, Aug. 2003. [13] G. Liva and M. Chiani, “Protograph ldpc codes design based on exit analysis,” in IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference, Nov 2007, pp. 3250–3254. [14] I. Shahid and P. Yahampath, “Distributed joint source-channel code design for gmac using irregular ldpc codes,” EURASIP Journal on Wireless Communications and Networking, vol. 2014, no. 1, p. 3, Jan 2014. [Online]. Available: https://doi.org/10.1186/1687-1499-2014-3 [15] R. Hoshyar, F. P. Wathan, and R. Tafazolli, “Novel low-density signature for synchronous cdma systems over awgn channel,” IEEE Transactions on Signal Processing, vol. 56, no. 4, pp. 1616–1626, April 2008.
7cs.IT
Proceedings of Machine Learning Research vol 75:1–22, 2018 Minimax Distribution Estimation in Wasserstein Distance Shashank Singh SSS 1@ CS . CMU . EDU Barnabás Póczos BAPOCZOS @ CS . CMU . EDU arXiv:1802.08855v1 [math.ST] 24 Feb 2018 Machine Learning Department, Carnegie Mellon University, Pittsburgh, PA 15213, USA Abstract The Wasserstein metric is an important measure of distance between probability distributions, with several applications in machine learning, statistics, probability theory, and data analysis. In this paper, we upper and lower bound minimax rates for the problem of estimating a probability distribution under Wasserstein loss, in terms of metric properties, such as covering and packing numbers, of the underlying sample space. Keywords: Wasserstein Distance; Density Estimation; Minimax Theory; Covering Number; Packing Number 1. Introduction The Wasserstein metric is an important measure of distance between probability distributions, based on the cost of transforming either distribution into the other through mass transport, under a metric on the sample space. Originating in the optimal transport literature,1 the Wasserstein metric has, owing to its intuitive and general nature, been utilized in such diverse areas as probability theory and statistics, economics, image processing, text mining, robust optimization, and physics (Villani, 2008; Fournier and Guillin, 2015; Esfahani and Kuhn, 2015; Gao and Kleywegt, 2016). In the analysis of image data, the Wasserstein metric has been used for various tasks such as texture classification and face recognition (Sandler and Lindenbaum, 2011), reflectance interpolation, color transfer, and geometry processing (Solomon et al., 2015), image retrieval (Rubner et al., 2000), and image segmentation (Ni et al., 2009), and, in the analysis of text data, for tasks such as document classification (Kusner et al., 2015) and machine translation (Zhang et al., 2016). In contrast to a number of other popular notions of distance2 between probability distributions, such as Lp distances or Kullback-Leibler and other f -divergences (Morimoto, 1963; Csiszár, 1964; Ali and Silvey, 1966), which require distributions to be absolutely continuous with respect to each other or to a base measure, Wasserstein distance is well-defined between any pair of probability distributions over a sample space equipped with a metric.3 As a particularly important consequence, Wasserstein distances between discrete (e.g., empirical) distributions and continuous distributions are well-defined and informative (i.e., often finite). Partly for this reason, Wasserstein distances have been widely used in probability theory to prove central limit and related approximation theorems (Rüschendorf, 1985; Johnson et al., 2005; 1. The Wasserstein metric has been variously attributed to Monge, Kantorovich, Rubinstein, Gini, Mallows, and others; see Chapter 3 of Villani (2008) for detailed history. 2. We use the term distance to refer both to proper metrics as well as to similar notions, such as information divergences, that fail to satisfy symmetry or the triangle inequality. 3. For this reason, we use “distribution estimation” in this paper, rather than the more popular “density estimation”. c 2018 S. Singh & B. Póczos. D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Chatterjee et al., 2008; Rio et al., 2009, 2011; Chen et al., 2010; Reitzner et al., 2013). Within machine learning and statistics, this same property has inspired a class of so-called minimum Wasserstein distance estimates (del Barrio et al., 1999, 2003; Bassetti et al., 2006; Bernton et al., 2017) of distributions, ranging from exponential distributions (Baı́llo et al., 2016) to more exotic models such as restricted Boltzmann machines (RBMs) (Montavon et al., 2016) and generative adversarial networks (GANs) (Arjovsky et al., 2017). k-means clustering (and, similarly, k-medians clustering) also fall in this class of estimators, where the hypothesis class is taken to be discrete distributions supported on at most k points; more flexible multi-level clustering algorithms can also be expressed in this way, using a more elaborate hypothesis class (Ho et al., 2017). PCA can also be expressed and generalized to manifolds using Wasserstein distance minimization (Boissard et al., 2015). In principle, these estimators are equivalent to empirical risk minimization, taking advantage of the fact that Wasserstein distances between the empirical distribution and distributions in the relevant hypothesis class are well-defined and finite. Moreover, these estimates often perform well in practice because they are free of both tuning parameters and strong distributional assumptions. In this paper, we study, in a minimax sense, the problem of estimating a distribution using Wasserstein distance as a loss function. We make minimal assumptions, and some examples of the varied metric spaces to which our results apply are given in Section 7. Specifically, we assume that the sample space is a totally bounded metric space, but make no assumptions at all on the distribution. We then prove bounds on the minimax convergence rates of distribution estimation, utilizing covering numbers of the sample space for upper bounds and packing numbers for lower bounds. It may at first be surprising that positive results can be obtained under such mild assumptions; this highlights that the Wasserstein metric is quite a weak metric (see our Lemma 8 and the subsequent remark for some detailed discussion of this). Moreover, our results imply that, without further assumptions on the population distribution, the empirical distribution is often minimax rate-optimal. O RGANIZATION The remainder of this paper is organized as follows. Section 2 provides notation required to formally state both the problem of interest and our results, while Section 3 reviews previous work studying convergence of distributions in Wasserstein distance. Section 4 provides several lemmas on which the proofs of our main results rely; all lemmas are proven in Appendix A. Sections 5 and 6 respectively contain our main upper and lower bound results, along with their proofs. Finally, in Section 7, we apply our upper and lower bounds to identify minimax convergence rates in a number of concrete examples. Section 8 concludes with a summary of our contributions and suggested avenues for future work. 2. Notation and Problem Setting For any integer n ∈ N, [n] = {1, 2, ..., n} denotes the set of the first n positive integers. For sequences {an }n∈N and {bn }n∈N of non-negative real numbers, an . bn and, equivalently bn & an , are used to indicate the existence of a constant C > 0 such that lim supn→∞ abnn ≤ C. an ≍ bn indicates an . bn and an & bn simultaneously. 2 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE 2.1. Problem Setting For the remainder of this paper, fix a metric space (Ω, ρ), over which Σ denotes the Borel σ-algebra, and let P denote the family of all Borel probability distributions on Ω. The main object of study in this paper is the Wasserstein distance on P, defined as follows: Definition 1 (r-Wasserstein Distance) Given two Borel probability distributions P and Q over Ω and r ∈ [1, ∞), the r-Wasserstein distance Wr (P, Q) ∈ [0, ∞] between P and Q is defined by !1/r Wr (P, Q) := inf E µ∈Π(P,Q) (X,Y )∼µ [ρr (X, Y )] , where Π(P, Q) denotes all couplings between X ∼ P and Y ∼ Q; that is,  Π(P, Q) := µ : Σ2 → [0, 1] for all A ∈ Σ, µ(A × Ω) = P (A) and µ(Ω × A) = Q(A) , is the set of joint probability measures over Ω × Ω with marginals P and Q. Wr is a proper metric over P; namely, it is symmetric in its arguments and satisfies the triangle inequality. Intuitively, Wr (P, Q) quantifies the r-weighted total cost of transforming mass distributed according to P to be distributed according to Q, where the cost of moving a unit mass from x ∈ Ω to y ∈ Ω is ρ(x, y). Note that Wr (P, Q) is sometimes defined in terms of equivalent (e.g., dual) formulations (especially for r = 1); however, they will not be necessary in this paper. We now give a formal statement of the problem studied in this paper: Formal Problem Statement: Suppose (Ω, ρ) is a metric space. Suppose P is an unknown IID Borel probability distribution on Ω, from which we observe n IID samples X1 , ..., Xn ∼ P . We are interested in studying the minimax rates at which P can be estimated from X1 , ..., Xn , in terms of the (r th power of the) r-Wasserstein loss. Specifically, we are interested in upper and lower bounding the quantity  i h Wrr P, Pb , inf sup E Pb P ∈P X ,...,XnIID ∼ P 1 where the infimum is taken over all estimators Pb of P (i.e., all functions Pb : Ωn → P of the data). 2.2. Definitions for Stating our Results Here, we give notation and definitions needed to state our theoretical results in Sections 5 and 6 and intermediate lemmas in Section 4. Ω Let 2Ω denote the power set of Ω. Let S ⊆ 22 denote the family of all Borel partitions of Ω: ( ) [ S := S ⊆ Σ : Ω ⊆ S and ∀S, T ∈ S, S ∩ T = ∅ . S∈S We first define some metric notions that will later be useful for bounding Wasserstein distances: Definition 2 (Diameter and Separation of a Set, Resolution of a Partition) For any set S ⊆ Ω, the diameter Diam(S) of S is defined by Diam(S) := supx,y∈S ρ(x, y), and the separation Sep(S) of S is defined by Sep(S) := inf x6=y∈S ρ(x, y). If S ∈ S is a partition of Ω, then the resolution Res(S) of S is defined by Res(S) := supS∈S Diam(S). 3 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Definition 3 (Refinement of a Partition, Nested Partitions) Suppose S, T ∈ S are partitions of Ω. T is said to be a refinement of S if, for every T ∈ T , there exists S ∈ S with T ⊆ S. A sequence {Sk }k∈[K] of partitions is called nested if, for each k ∈ [K]\{K}, Sk+1 is a refinement of Sk , We now define the covering and packing number of a metric space, which are classic and widely used measures of the size or complexity of a metric space (Dudley, 1967; Haussler, 1995; Zhou, 2002; Zhang, 2002). Our main convergence results will be stated in terms of these quantities, as well as the packing radius, which acts, approximately, as the inverse of the packing number. Definition 4 (Covering Number, Packing Number, and Packing Radius of a Metric Space) The covering number N : (0, ∞) → N of (Ω, ρ) is defined for all ε by N (ε) := min {|S| : S ∈ S and Res(S) ≤ ε} . The packing number M : (0, ∞) → N of (Ω, ρ) is defined for all ε by M (ε) := max {|S| : S ⊆ Ω and Sep(S) ≥ ε} . Finally, the packing radius R : N → [0, ∞] is defined for all n ∈ N by R(n) := sup{Sep(S) : S ⊆ Ω and |S| ≥ n}. Sometimes, we use the covering or packing number of a metric space, say (Θ, τ ), other than (Ω, ρ); in such cases, we write N (Θ; τ ; ε) or M (Θ; τ ; ε) rather than N (ε) or M (ε), respectively. For specific ε > 0, we will also refer to N (Θ; τ ; ε) as the ε-covering number of (Θ, τ ). Remark 5 The covering and packing numbers of a metric space are closely related. In particular, for any ε > 0, we always have M (ε) ≤ N (ε) ≤ M (ε/2). (1) The packing number and packing radius also have a close approximate inverse relationship. In particular, for any ε > 0, we always have R(M (ε)) ≥ ε. (2) However, we may have R(M (ε)) > ε, and it need not, in general, be the case that, for all n ∈ N, M (R(n)) ≥ n or, for all n ∈ N, M (R(n)) ≤ n. Remark 6 We defined the covering number slightly differently from usual (using partitions rather than covers). However, the given definition is equivalentSto the usual definition, since (a) any partition is itself a cover (i.e., a set C ⊆ 2Ω such that Ω ⊆ C∈C C), and (b), for any countable cover C := {C1 , C2 , ...} ⊆ 2Ω ,Sthere exists a partition S ∈ S with |S| ≤ |C| and each Si ⊆ Ci , defined recursively by Si := Ci \ i−1 j=1 Si . S is often called the disjointification of C. 4 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE 3. Related Work A long line of work (Dudley, 1969; Ajtai et al., 1984; Dereich et al., 2013; Boissard et al., 2014; Fournier and Guillin, 2015; Weed and Bach, 2017) has studied distribution estimation in Wasserstein distance, with all the above papers focusing on analyzing convergence of the empirical distribution to the population distribution in Wasserstein distance. In terms of upper bounds, the most general and tight upper bounds are those of Weed and Bach (2017), who provide results in general metric spaces, in terms of the covering numbers of those spaces. Their main results are expressed in terms of a particular notion of dimension, which they call the Wasserstein dimension s because it allows them to derive convergence rates of order n−1/s (matching the n−1/D rate achieved on the unit cube [0, 1]D ). Our general upper bounds as a function of covering number are somewhat easier to apply than those of Weed and Bach (2017), and we use these in Section 7 to derive convergence rates even in high-dimensional cases (where D → ∞ as n → ∞) or infinite dimensional cases. To the best of our knowledge, there has been no work on deriving minimax lower bounds for distribution estimation under Wasserstein loss. As noted above, most previous works have focused on studying convergence rate of the empirical distribution to the true distribution in Wasserstein distance. For this rate, several lower bounds have been established, matching known upper bounds in many quite general cases. However, many distribution estimators besides the empirical distribution can be considered. For example, it is tempting (especially given the infinite dimensionality of the distribution to be estimated) to try to reduce variance by techniques such as smoothing or importance sampling (Bucklew, 2013). However, our lower bound results, given in Section 6, imply that the empirical distribution is already minimax optimal, up to constant factors, in many cases. 4. Preliminary Lemmas We begin by providing a few basic lemmas; these lemmas are not fundamentally novel, but they will be used in the subsequent proofs of our main upper and lower bounds, and also help provide intuition for the behavior of the Wasserstein metric and its connections to other metrics between probability distributions. Our first lemma relates Wasserstein distance to the notion of resolution of a partition. Lemma 7 Suppose S ∈ S is a countable Borel partition of Ω. Let P and Q be Borel probability measures such that, for every S ∈ S, P (S) = Q(S). Then, for any r ≥ 1, Wr (P, Q) ≤ Res(S). Our next lemma gives simple lower and upper bounds on the Wasserstein distance between distributions supported on a countable subset X ⊆ Ω, in terms of Diam(X ) and Sep(X ). Since our main results will utilize coverings and packings to approximate Ω by finite sets, this lemma will provide a first step towards approximating (in Wasserstein distance) distributions on Ω by distributions on these finite sets. Indeed, the lower bound in Inequality (3) will suffice to prove our lower bounds, although a tighter upper bound, based on the upper bound in (3), will be necessary to obtain tight upper bounds. Lemma 8 Suppose (Ω, ρ) is a metric space, and suppose P and Q are Borel probability distributions on Ω with countable support; i.e., there exists a countable set X ⊆ Ω with P (X ) = Q(X ) = 1. Then, for any r ≥ 1, X X |P ({x}) − Q({x})| . (3) |P ({x}) − Q({x})| ≤ Wrr (P, Q) ≤ (Diam(X ))r (Sep(X ))r x∈X x∈X 5 D ISTRIBUTION E STIMATION Remark 9 Recall that the term P IN WASSERSTEIN D ISTANCE |P ({x}) − Q({x})| in Inequality (3) is the L1 distance X kp − qk1 := |p(x) − q(x)| x∈X x∈X between the densities p and q of P and Q with respect to the counting measure on X , and that this same quantity is twice the total variation distance T V (P, Q) := sup |P (A) − Q(A)| . A⊆Ω Hence, Lemma 8 can be equivalently written as Sep(Ω) (kp − qk1 )1/r ≤ Wr (P, Q) ≤ Diam(Ω) (kp − qk1 )1/r and as Sep(Ω) (2T V (P, Q))1/r ≤ Wr (P, Q) ≤ Diam(Ω) (2T V (P, Q))1/r , bounding the r-Wasserstein distance in terms of the L1 and total variation distance. As noted in Example 1, equality holds in (3) precisely when ρ is the unit discrete metric given by ρ(x, y) = 1{x6=y} for all x, y ∈ Ω. On metric spaces that are discrete (i.e., when Sep(Ω) > 0), the Wasserstein metric is (topologically) at least as strong as the total variation metric (and the L1 metric, when it is well-defined), in that convergence in Wasserstein metric implies convergence in total variation (and L1 , respectively). On the other hand, on bounded metric spaces, the converse is true. In either of these cases, rates of convergence may differ between metrics, although, in metric spaces that are both discrete and bounded (e.g., any finite space), we have Wr ≍ T V 1/r . While Lemma 8 gave a simple upper bound on the Wasserstein distance, the factor of Diam(Ω) turns out to be too large to obtain tight rates for a number of cases of interest (such as the Ddimensional unit cube Ω = [0, 1]D , discussed in Example 2). The following lemma gives a tighter upper bound, based on a hierarchy of nested partitions of Ω; this allows us to obtain tighter bounds (than Diam(Ω)) on the distance that mass must be transported between P and Q. Note that, when K = 1, Lemma 10 reduces to a trivial combination of Lemmas 7 and 8; indeed, these lemmas are the starting point for proving Lemma 10 by induction on K. Note that the idea of such a “multi-resolution” upper bound has been utilized extensively before, and numerous versions have been proven before (see, e.g., Fact 6 of Do Ba et al. (2011), Lemma 6 of Fournier and Guillin (2015), or Proposition 1 of Weed and Bach (2017)). However, most of these versions have been specific to Euclidean space; to the best of our knowledge, only Proposition 1 of Weed and Bach (2017) applies to general metric spaces. Lemma 10 Let K be a positive integer. Suppose {Sk }k∈[K] is a nested sequence of countable Borel partitions of (Ω, ρ), with S0 = Ω. Then, for any r ≥ 1 and Borel probability measures P and Q on Ω,   K X X Wrr (P, Q) ≤ (Res(SK ))r + |P (S) − Q(S)| . (Res(Sk−1 ))r  (4) S∈Sk k=1 6 D ISTRIBUTION E STIMATION WASSERSTEIN D ISTANCE IN Lemma 10 requires a sequence of partitions of Ω that is not only multi-resolution but also nested. While the ε-covering number implies the existence of small partitions with small resolution, these partitions need not be nested as ε becomes small. For this reason, we now give a technical lemma that, given any sequence of partitions, constructs a nested sequence of partitions of the same cardinality, with only a small increase in resolution. Lemma 11 Suppose S and T are partitions of (Ω, ρ), and suppose S is countable. Then, there exists a partition S ′ of (Ω, ρ) such that: a) |S ′ | ≤ |S|. b) Res(S ′ ) ≤ Res(S) + 2 Res(T ). c) T is a refinement of S ′ 5. Upper Bounds In this section, we utilize the covering number bounds from the previous section to develop error bounds for density estimation using the empirical distribution under Wasserstein loss. 5.1. Expectation Bounds Here, we use Lemmas 10 and 11 to prove bounds on the expected Wasserstein distance between the empirical and true distributions. We begin with a simple technical lemma bounding the expected L1 deviation of a multinomial random variable from its mean. Lemma 12 Suppose (X1 , ..., XK ) ∼ Multinomial(n, p1 , ..., pK ). Let Z := kX − pk1 = Then, E [Z/n] ≤ p K X k=1 |Xk − pk | . 21K/n. Theorem 13 Let (Ω, ρ) be a metric space on which P is a Borel probability measure. Let Pb denote IID the empirical distribution of n IID samples X1 , ..., Xn ∼ P , give by n 1X Pb(S) := 1{Xi ∈S} , n i=1 ∀S ∈ Σ. Then, for any sequence {εk }k∈[K] ∈ (0, ∞)K with ε0 = Diam(Ω),  r r K K i X X p 21 r r  2j−k εj  N (εk ). E Wr (P, Pb) ≤ εK + n h k=1 7 j=k−1 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Proof By recursively applying Lemma 11, there exists a sequence {Sk }k∈[K] of partitions of (Ω, ρ) satisfying the following conditions: 1. for each k ∈ [K], |Sk | = N (εk ). 2. for each k ∈ [K], Res(Sk ) ≤ K X 2j−k εj . j=k 3. {Sk }k∈[K] is nested. Note that, for any k ∈ [K], the vector nPb(S) (indexed by S ∈ Sk ) follows an n-multinomial distribution over |Sk | categories, with means given by P (S); i.e., (nPb(S1 ), ..., nPb(Sk )) ∼ Multinomial(n, P (S1 ), ..., P (Sk )). Thus, by Lemma 12, for each k ∈ [K],   r r X 21|S | 21N (εk ) k P (S) − Pb(S)  ≤ = . E n n S∈Sk Thus, by Lemma 10,  r r E [Wr (P, Q)] ≤ E εK + ≤ εrK + K X k=1 K X k=1   K X j=k r  2j−k εj   X S∈Sk  |P (S) − Q(S)|  r   K X X  2j−k εj  E  |P (S) − Q(S)| S∈Sk j=k  r r K K X X p 21  N (εk ) 2j−k εj  ≤ εrK + n k=1 j=k 6. Lower Bounds In this section, we prove minimax lower bounds (over the family P of all densities on the metric space (Ω, ρ)) for density estimation in Wasserstein distance (that is, the quantity  i h (5) Wrr P, Pb , inf sup E Pb P ∈P X1 ,...,Xn IID ∼ P where the infimum is over all estimators Pb of P (i.e., all functions Pb : Ωn → P)). Our bounds are in terms of the packing radius R of (Ω, ρ). 8 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Theorem 14 Suppose P ∈ P is an unknown Borel probability measure on (Ω, ρ), and suppose we IID observe n IID samples X1 , ..., Xn ∼ P . Then, there exists a universal constant CHJW > 0 such that r h i k−1 r r Wr (P, Pb) ≥ CHJW sup R (k) inf sup . E n Pb P ∈P X ,...,X IID k∈[n] ∼ P 1 n Proof Our proof is based on a reduction to a minimax lower bound for estimating the mean parameter vector of a multinomial distribution in L1 norm. Specifically, we will use Corollary 4 of Han et al. (2015), which implies the existence of a universal constant CHJW > 0 (independent of n) such that, for any k ≤ n, r k−1 , p(X1 , ..., Xn ) − pk1 ] ≥ CHJW inf sup E [kb n pb p∈∆k X1 ,...,Xn where ∆k :=    p ∈ [0, 1]k : k X j=1   pj = 1  denotes the standard (k − 1)-dimensional probability simplex, X1 , ..., Xn ∈ [k] are distributed IID according to a multinomial distribution with parameter vector p ∈ ∆k , and the infimum is taken over all estimators pb of p (i.e., all functions pb : [k]n → ∆k ). For some k ≤ n, let PD denote the class of discrete distributions over an R(k)-packing D of (Ω, ρ) with |D| = k. Then, Corollary 4 of Han et al. (2015) implies that r i h |D| − 1 kPb (X1 , ..., Xn ) − P k1 ≥ CHJW , inf sup E n Pb p∈PD X1 ,...,Xn where the infimum is taken over all estimators Pb of P (i.e., all functions Pb : Ωn → P). Recalling Lemma 8 (which implies (Sep(D))r kPb − P k1 ≤ Wrr (P, Pb)), we have i h h i inf sup E Wrr (Pb, P ) ≥ (Sep(D))r inf sup E kPb − P k1 Pb P ∈P Pb P ∈P i h ≥ (Sep(D))r inf sup E kPb − P k1 Pb P ∈PD r |D| − 1 r ≥ CHJW (Sep(D)) n r k−1 ≥ CHJW Rr (k) . n The theorem follows by taking the supremum over k ≤ n on both sides. 9 (6) D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE 7. Example Applications We conclude by exploring applications of our results for several metric spaces (Ω, ρ). In each of the following examples, P is an unknown Borel probability measure over the specified Ω, from which we observe n IID samples. For upper bounds, Pb denotes the empirical distribution of these samples. Example 1 (Finite Space) Consider the case where Ω is a finite set, over which ρ is the discrete metric given, for some δ > 0, by ρ(x, y) = δ1{x=y} , x, y ∈ Ω. for all Then, for any ε ∈ (0, δ), the covering number is N (ε) = |Ω|. Thus, setting K = 1 and sending ε1 → 0 in Theorem 13 gives r h i 21|Ω| r r b . E Wr (P, P ) ≤ δ n On the other hand, for any k ≤ |Ω|, R(k) = δ, while, for k > |Ω|, R(k) = 0. Thus, setting k = |Ω| in Theorem 14 gives r h i |Ω| − 1 r r b . Wr (P, P ) ≥ CHJW δ inf sup E n Pb P ∈P X ,...,X IID ∼ P 1 n Example 2 (Unit Cube, Euclidean Metric) Consider the case where Ω = [0, 1]D is the unit cube and ρ is the Euclidean metric. Suppose P is a Borel probability measure on (Ω, ρ), and let Pb denote the empirical distribution of n IID samples from P . Setting εk := 2−2k and recalling that N (ε) ≤ (2D)D ε−D , one can show that Theorem 13 gives r K h i 21(2D)D X k(D−2r) r −2Kr r+1 b 2 W (P, P ) ≤ 2 + 2 E r n k=1 If D = 2r, then this gives E and setting K ≍ 1 4r h i Wrr (P, Pb ) −2Kr ≤2 r+1 +2 r 21(2D)D K, n h i log n gives the rate E Wrr (P, Pb) . n−1/2 log n. Otherwise, if D 6= 2r, then h i r 21(2D)D 2K(D−2r) − 1 n 2D−2r − 1 i h For 2r > D, sending K → ∞ gives a rate of E Wrr (P, Pb) . n−1/2 . For 2r < D, setting i h r 1 K ≍ 2D log n gives a rate of E Wrr (P, Pb) . n− D . To summarize E Wrr (P, Pb) −2Kr ≤2 D+1 +2  −1/2 i  n r n−1/2 log n E Wr (P, Pb) .  −r/D n h 10 if 2r > D if 2r = D if 2r < D D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE (reproducing results of Fournier and Guillin (2015)). On the √ other hand, it is easy to check that the packing radius R satisfies R(n) ≥ n−1/D and R(2) ≥ D. Thus, applying Theorem 14 with k = n and k = 2, we have o h i n inf sup E Wrr (Pb, P ) ≥ CHJW max (n + 1)−r/D , D r/2 n−1/2 . Pb P ∈P Combining these upper and lower bounds gives that the minimax rate for density estimation over P in the loss Wrr is h i  n−1/2 if 2r > D r b inf sup E Wr (P , P ) ≍ n−r/D if 2r < D Pb P ∈P (except for the case 2r = D, when our upper and lower bounds are separated by a factor of log n). Moreover, this rate is achieved by using the empirical distribution to estimate P . We now consider a high dimensional problem, where the size of Ω can grow with n. Example 3 (Binary Hypercube, Hamming Metric) Suppose Ω = {0, 1}D is the P D-dimensional binary hypercube, and suppose ρ is the Hamming metric given by ρδ (x, y) = δ D j=1 1{xi 6=yi } . Then, the covering number can easily be upper bounded for ε ∈ [D] by N (ε) ≤ 2D−ε . Thus, setting K = 1 and sending ε1 → 0 in Theorem 13 gives r h i 21 r r D . E Wr (P, Pb ) ≤ D 2 n The famous Varshamov-Gilbert bound (see, e.g., Lemma  25.12 of Rigollet (2015)) can be interpreted as the statement that, for any γ ∈ (0, 1/2), R ⌊eγ D ⌋ ≥ 21 − γ Dδ. Thus, setting p 2 k = ⌊eγ D ⌋ (so that k ≤ n as long as γ ≤ (1/D) log n) in Theorem 14 and applying the Varshamov-Gilbert bound gives s   r h i 1 ⌊eγ 2 D ⌋ − 1 − γ Dδ . Wrr (P, Pb) ≥ CHJW sup inf sup E   q 2 n Pb P ∈P X ,...,X IID log n 1 ∼ P 1 n γ∈ 0,min 2 , D To summarize, in the high-dimensional case where D, n → ∞, consistent estimation is possible if D log D ∈ o(log n) and only if D ∈ o(log n). Finally, we consider distributions over an infinite dimensional space of smooth functions. Example 4 (Hölder Ball, L∞ Metric) Suppose that, for some α ∈ (0, 1],  Ω := f [0, 1]D → [−1, 1] ∀x, y ∈ [0, 1]D , |f (x) − f (y)| ≤ kx − ykα2 is the class of unit α-Hölder functions on the unit cube and ρ is the L∞ -metric given by ρ(f, g) = sup |f (x) − g(x)|, x∈[0,1]D 11 for all f, g ∈ Ω. D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE  The covering and packing numbers of (Ω, ρ) are well-known to be of order exp ε−D/α (DeVore and Lorentz, 1993); specifically, there exist positive constants 0 < c1 < c2 such that, for all ε ∈ (0, 1),     c1 exp ε−D/α ≤ N (ε) ≤ M (ε) ≤ c2 exp ε−D/α . It also follows from Inequality (2) that, for all k ∈ N, R(k) ≥  1 log(k/c1 ) α D . Since Diam(Ω) = 2, setting K = 1 and ε1 = in Theorem 13 gives E  h D 2D log n − αr log log n i Wrr (P, Pb ) .  1 log n  αr  αr D D . On the other hand, setting k = n in Theorem 14 gives inf sup Pb P ∈P X 1  αr h i 1 D 1 r Wr (P, Pb ) ≥ , E 2 log(n/c1 ) IID ,...,X ∼ P n −αr showing that distribution estimation over (P, Wrr ) has the extremely slow minimax rate (log n) D . Although we considered only α ∈ (0, 1] (due to the notational complexity of defining higher-order Hölder spaces), analogous rates hold for all α > 0. Also, since our rates depend only on covering and packing numbers of Ω, identical rates can be derived for related Sobolev and Besov classes. One might wonder why we are interested studying Wasserstein convergence of distributions over spaces of smooth functions, as in Example 4. Our main motivation comes from the fact that, historically, smooth function spaces have been widely used for modeling images and other complex naturalistic signals (Mallat, 1999; Peyré, 2011). Far more recently, empirical breakthroughs have been made in generative modeling, particularly of images, based on the principle of minimizing Wasserstein distance between the empirical distribution and a large class of models encoded by a deep neural network (Montavon et al., 2016; Arjovsky et al., 2017; Gulrajani et al., 2017). However, little is known about the theoretical properties of these methods; while there has been some work studying the optimization landscape of such models (Nagarajan and Kolter, 2017), we know of no work exploring their statistical properties. Given the extremely slow minimax convergence rate we derived above, it must be the case that the class of distributions encoded by such models is far smaller or sparser than P. An important avenue for further work is thus to explicitly identify stronger assumptions that can be made on distributions over interesting classes of signals, such as images, to bridge the gap between empirical performance and our theoretical understanding. 12 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE 8. Conclusion In this paper, we derived upper and lower bounds for distribution estimation under Wasserstein loss. Our upper bounds generalize prior results and are tighter in certain cases, while our lower bounds are, to the best of our knowledge, the first minimax lower bounds for this problem. We also provided several simple examples for which our upper and lower bounds agree. 8.1. Future Work We studied only minimax rates over the entire class P of all distributions on the metric space (Ω, ρ). It would be useful to understand how minimax rates improve when additional assumptions, such as smoothness or finite-moment assumptions are made (see Fournier and Guillin (2015) for somewhat improved upper bounds under finite-moment assumptions when (Ω, ρ) is Euclidean space). Given the rather slow convergence rates we found over P in many cases, studying minimax rates under assumptions may help to explain the relatively favorable empirical performance of popular distribution estimators based on empirical risk minimization in Wasserstein loss. Moreover, while rates over all of P are of interest only for very weak metrics such as the Wasserstein distance (as stronger metrics may be infinite or undefined), studying minimax rates under additional assumptions will allow for a better understanding of the Wasserstein metric in relation to other commonly used metrics. Acknowledgments This work was partly supported by a NSF Graduate Research Fellowship DGE-1252522 to S.S. and by NSF IIS-1563887, Darpa D3M program, and AFRL grants to B.P.. References Miklós Ajtai, János Komlós, and Gábor Tusnády. On optimal matchings. Combinatorica, 4(4): 259–264, 1984. Syed Mumtaz Ali and Samuel D Silvey. A general class of coefficients of divergence of one distribution from another. Journal of the Royal Statistical Society. Series B (Methodological), pages 131–142, 1966. Martin Arjovsky, Soumith Chintala, and Léon Bottou. arXiv:1701.07875, 2017. Wasserstein GAN. arXiv preprint Amparo Baı́llo, Javier Cárcamo, and Konstantin V Getman. The estimation of Wasserstein and Zolotarev distances to the class of exponential variables. arXiv preprint arXiv:1603.06806, 2016. Federico Bassetti, Antonella Bodini, and Eugenio Regazzini. On minimum Kantorovich distance estimators. Statistics & probability letters, 76(12):1298–1302, 2006. Espen Bernton, Pierre E Jacob, Mathieu Gerber, and Christian P Robert. Inference in generative models using the Wasserstein distance. arXiv preprint arXiv:1701.05146, 2017. Emmanuel Boissard, Thibaut Le Gouic, et al. On the mean speed of convergence of empirical and occupation measures in Wasserstein distance. In Annales de l’Institut Henri Poincaré, Probabilités et Statistiques, volume 50, pages 539–563. Institut Henri Poincaré, 2014. 13 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Emmanuel Boissard, Thibaut Le Gouic, Jean-Michel Loubes, et al. Distributions template estimate with wasserstein metrics. Bernoulli, 21(2):740–759, 2015. James Bucklew. Introduction to rare event simulation. Springer Science & Business Media, 2013. Sourav Chatterjee et al. A new method of normal approximation. The Annals of Probability, 36(4): 1584–1610, 2008. Louis HY Chen, Larry Goldstein, and Qi-Man Shao. Normal approximation by Steins method. Springer Science & Business Media, 2010. Imre Csiszár. Eine informationstheoretische ungleichung und ihre anwendung auf beweis der ergodizitaet von markoffschen ketten. Magyer Tud. Akad. Mat. Kutato Int. Koezl., 8:85–108, 1964. Eustasio del Barrio, Evarist Giné, and Carlos Matrán. Central limit theorems for the Wasserstein distance between the empirical and the true distributions. Annals of Probability, pages 1009– 1071, 1999. Eustasio del Barrio, Evarist Giné, Carlos Matrán, et al. Correction: Central limit theorems for the Wasserstein distance between the empirical and the true distributions. The Annals of Probability, 31(2):1142–1143, 2003. Steffen Dereich, Michael Scheutzow, Reik Schottstedt, et al. Constructive quantization: Approximation by empirical measures. In Annales de l’Institut Henri Poincaré, Probabilités et Statistiques, volume 49, pages 1183–1203. Institut Henri Poincaré, 2013. Ronald A DeVore and George G Lorentz. Constructive approximation, volume 303. Springer Science & Business Media, 1993. Luc Devroye. The equivalence of weak, strong and complete convergence in L1 for kernel density estimates. The Annals of Statistics, pages 896–904, 1983. Khanh Do Ba, Huy L Nguyen, Huy N Nguyen, and Ronitt Rubinfeld. Sublinear time algorithms for earth movers distance. Theory of Computing Systems, 48(2):428–442, 2011. Joseph L Doob. Measure theory, volume 143. Springer Science & Business Media, 2012. Richard M Dudley. The sizes of compact subsets of hilbert space and continuity of gaussian processes. Journal of Functional Analysis, 1(3):290–330, 1967. RM Dudley. The speed of mean Glivenko-Cantelli convergence. The Annals of Mathematical Statistics, 40(1):40–50, 1969. Peyman Mohajerin Esfahani and Daniel Kuhn. Data-driven distributionally robust optimization using the wasserstein metric: Performance guarantees and tractable reformulations. arXiv preprint arXiv:1505.05116, 2015. Nicolas Fournier and Arnaud Guillin. On the rate of convergence in Wasserstein distance of the empirical measure. Probability Theory and Related Fields, 162(3-4):707–738, 2015. 14 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Rui Gao and Anton J Kleywegt. Distributionally robust stochastic optimization with wasserstein distance. arXiv preprint arXiv:1604.02199, 2016. Ishaan Gulrajani, Faruk Ahmed, Martin Arjovsky, Vincent Dumoulin, and Aaron C Courville. Improved training of wasserstein gans. In Advances in Neural Information Processing Systems, pages 5769–5779, 2017. Yanjun Han, Jiantao Jiao, and Tsachy Weissman. Minimax estimation of discrete distributions under ℓ1 loss. IEEE Transactions on Information Theory, 61(11):6343–6354, 2015. David Haussler. Sphere packing numbers for subsets of the boolean n-cube with bounded vapnikchervonenkis dimension. Journal of Combinatorial Theory, Series A, 69(2):217–232, 1995. Nhat Ho, XuanLong Nguyen, Mikhail Yurochkin, Hung Hai Bui, Viet Huynh, and Dinh Phung. Multilevel clustering via wasserstein means. arXiv preprint arXiv:1706.03883, 2017. Oliver Johnson, Richard Samworth, et al. Central limit theorem and convergence to stable laws in mallows distance. Bernoulli, 11(5):829–845, 2005. Matt Kusner, Yu Sun, Nicholas Kolkin, and Kilian Weinberger. From word embeddings to document distances. In International Conference on Machine Learning, pages 957–966, 2015. Stéphane Mallat. A wavelet tour of signal processing. Academic press, 1999. Grégoire Montavon, Klaus-Robert Müller, and Marco Cuturi. Wasserstein training of restricted Boltzmann machines. In Advances in Neural Information Processing Systems, pages 3718–3726, 2016. Tetsuzo Morimoto. Markov processes and the H-theorem. Journal of the Physical Society of Japan, 18(3):328–331, 1963. Vaishnavh Nagarajan and J Zico Kolter. Gradient descent GAN optimization is locally stable. arXiv preprint arXiv:1706.04156, 2017. Kangyu Ni, Xavier Bresson, Tony Chan, and Selim Esedoglu. Local histogram based segmentation using the wasserstein distance. International journal of computer vision, 84(1):97–111, 2009. Gabriel Peyré. The numerical tours of signal processing. Computing in Science & Engineering, 13 (4):94–97, 2011. Matthias Reitzner, Matthias Schulte, et al. Central limit theorems for u-statistics of poisson point processes. The Annals of Probability, 41(6):3879–3909, 2013. Phillippe Rigollet. High-dimensional statistics. Lecture notes for course 18S997, 2015. Emmanuel Rio et al. Upper bounds for minimal distances in the central limit theorem. In Annales de l’Institut Henri Poincaré, Probabilités et Statistiques, volume 45, pages 802–817. Institut Henri Poincaré, 2009. Emmanuel Rio et al. Asymptotic constants for minimal distance in the central limit theorem. Electronic Communications in Probability, 16:96–103, 2011. 15 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Yossi Rubner, Carlo Tomasi, and Leonidas J Guibas. The earth mover’s distance as a metric for image retrieval. International journal of computer vision, 40(2):99–121, 2000. Ludger Rüschendorf. The wasserstein distance and approximation theorems. Probability Theory and Related Fields, 70(1):117–129, 1985. Roman Sandler and Michael Lindenbaum. Nonnegative matrix factorization with earth mover’s distance metric for image analysis. IEEE Transactions on Pattern Analysis and Machine Intelligence, 33(8):1590–1602, 2011. Justin Solomon, Fernando De Goes, Gabriel Peyré, Marco Cuturi, Adrian Butscher, Andy Nguyen, Tao Du, and Leonidas Guibas. Convolutional wasserstein distances: Efficient optimal transportation on geometric domains. ACM Transactions on Graphics (TOG), 34(4):66, 2015. Cédric Villani. Optimal transport: old and new, volume 338. Springer Science & Business Media, 2008. Jonathan Weed and Francis Bach. Sharp asymptotic and finite-sample rates of convergence of empirical measures in Wasserstein distance. arXiv preprint arXiv:1707.00087, 2017. Meng Zhang, Yang Liu, Huan-Bo Luan, Maosong Sun, Tatsuya Izuha, and Jie Hao. Building earth mover’s distance on bilingual word embeddings for machine translation. In AAAI, pages 2870– 2876, 2016. Tong Zhang. Covering number bounds of certain regularized linear function classes. Journal of Machine Learning Research, 2(Mar):527–550, 2002. Ding-Xuan Zhou. The covering number in learning theory. Journal of Complexity, 18(3):739–767, 2002. 16 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Appendix A. Proofs of Lemmas Lemma 7 Suppose S ∈ S is a countable Borel partition of Ω. Let P and Q be Borel probability measures such that, for every S ∈ S, P (S) = Q(S). Then, for any r ≥ 1, Wr (P, Q) ≤ Res(S). Proof This fact is intuitively obvious; clearly, there exists a transportation map µ from P to Q that moves mass only within each S ∈ S and therefore without moving any mass further than δ. For completeness, we give a formal construction. Let µ : Σ2 → [0, 1] denote the coupling that is conditionally independent given any set S ∈ S with P (S) = Q(S) > 0 (that is, for any A, B ∈ Σ, µ(A×B ∩S ×S)P (S) = P (A∩S)Q(B ∩S)).4 It S is easy to verify that µ ∈ C(P, Q). Since S is a countable partition and µ is only supported on S∈S S × S, Wr (P, Q) ≤ Z Ω×Ω XZ = S∈S XZ ≤ S∈S =δ 1/r ρ (x, y) dµ(x, y) r X S∈S !1/r r ρ (x, y) dµ(x, y) S×S !1/r r δ dµ(x, y) S×S !1/r µ(S × S) =δ X P (S)Q(S) P (S) S∈S !1/r =δ X !1/r Q(S) S∈S = δ. Lemma 8 Suppose (Ω, ρ) is a metric space, and suppose P and Q are Borel probability distributions on Ω with countable support; i.e., there exists a countable set X ⊆ Ω with P (X ) = Q(X ) = 1. Then, for any r ≥ 1, X X |P ({x}) − Q({x})| . |P ({x}) − Q({x})| ≤ Wrr (P, Q) ≤ (Diam(X ))r (Sep(X ))r x∈X x∈X P Proof The term x∈X |P ({x}) − Q({x})| = T V (P, Q) is precisely the (unweighted) amount of mass that must be transported to transform between P and Q. Hence, the result is intuitively fairly obvious; all mass moved has a cost of at least Sep(Ω) and at most Diam(Ω). However, for completeness, we give a more formal proof below. To prove the lower bound, suppose µ ∈ Π(P, Q) is any coupling between P and Q. For x ∈ X , µ({x} × {x}) + µ({x} × (Ω\{x})) = µ({x} × Ω) = P ({x}) and, similarly, µ({x} × {x}) + µ((Ω\{x}) × {x}) = µ(Ω × {x}) = Q({x}). 4. The existence of such a measure can be verified by the Hahn-Kolmogorov theorem, similarly to that of the usual product measure (see, e.g., Section IV.4 of Doob (2012)). 17 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Since P ({x}), Q({x}) ∈ [0, 1], it follows that µ({x} × (Ω\{x})) + µ(µ((Ω\{x}) × {x})) ≥ |P ({x} − Q({x})| . Therefore, since ρ(x, y) = 0 whenever x = y and ρ(x, y) ≥ Sep(Ω) whenever x 6= y, Z Z ρr (x, y) dµ(x, y) ρr (x, y) dµ(x, y) = X ×X Ω×Ω Z XZ r ρr (x, y) dµ(x, y) ρ (x, y) dµ(x, y) + = x∈X {x}×(Ω\{x}) ≥ (Sep(Ω))r r ≥ (Sep(Ω)) X x∈X X x∈X (Ω\{x})×{x} µ({x} × (Ω\{x})) + µ((Ω\{x}) × {x}) |P ({x}) − Q({x})| . Taking the infimum over µ on both sides gives X |P ({x}) − Q({x})| ≤ Wrr (P, Q). (Sep(Ω))r x∈X To prove the upper bound, since ρ is upper bounded by Diam(Ω), it suffices to construct a coupling µ that only moves mass into or out of each given point, but not both; that is, for each x ∈ X , min{µ({x} × (Ω\{x})), µ((Ω\{x}) × {x})} = 0. One way of doing this is as follows. Fix an ordering x1 , x2 , ... of the elements of X . For each i ∈ N, define i i X X Xi := (P (xℓ ) − Q(xℓ ))+ and Yi := (Q(xℓ ) − P (xℓ ))+ , ℓ=1 ℓ=1 and further define ji := min{j ∈ N : Xi ≤ Yj } and ki := min{k ∈ N : Xj ≥ Yi }. Then, for each i ∈ N, move Xi mass from {x1 , ..., xi } to {y1 , ..., yji } and move Yi mass from {y1 , ..., yi } to {x1 , ..., xki }. As i → ∞, by construction of Xi and Yi , the total mass moved in this way is X |P (x) − Q(x)| . µ((X × X )\{(x, x) : x ∈ X }) = lim Xi + Yi = i→∞ x∈X Lemma 10 Let K be a positive integer. Suppose {Sk }k∈[K] is a sequence of nested countable Borel partitions of (Ω, ρ), with S0 = Ω. Then, for any r ≥ 1 and any Borel probability distributions P and Q on Ω,   K X X (Res(Sk−1 ))r  Wrr (P, Q) ≤ (Res(SK ))r + |P (S) − Q(S)| . S∈Sk k=1 18 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Proof Our proof follows the same ideas as and slightly generalizes of the proof of Proposition 1 in Weed and Bach (2017). Intuitively, to prove Lemma 10 it suffices to find a transportation map such that For each k ∈ [K], recursively define Pk := P − k−1 X µk and j=0 Qk := Q − k−1 X νk , j=0 where, for each k ∈ [K], µk and νk are Borel measures on Ω defined for any E ∈ Σ by µk (E) := X (Pk (S) − Qk (S))+ Pk (E ∩ S) Pk (S) X (Qk (S) − Pk (S))+ Qk (E ∩ S) . Qk (S) S∈Sk :Pk (S)>0 and νk (E) := S∈Sk :Qk (S)>0 P By construction of µk and νk , each µk and νk is a non-negative measure and K k=1 µk ≤ P and PK k=1 νk ≤ Q. Furthermore, for each k ∈ [K − 1], for each S ∈ Sk , µk+1 (S) = νk+1 (S), and X |P (S) − Q(S)| . µk (Ω) = νk (Ω) ≤ S∈Sk Consequently, although µ and ν are not probability measures, we can slightly generalize the definition of Wasserstein distance by writing Wrr (µk , νk ) := µ(Ω) τ ∈Π  inf ν µk , k µk (Ω) νk (Ω)  [ρr (X, Y )] E (X,Y )∼µ (or Wrr (µk , νk ) = 0 if µk = νk = 0). In particular, this is convenient because we one can easily show that, by construction of the sequences {Pk }k∈[K] and {Qk }k∈[K] , Wrr (P, Q) ≤ Wrr (PK , QK ) + For each k ∈ [K], Lemma 8 implies that X Wrr (µk , νk ) ≤ (Diam(S))r S∈Sk−1 ≤ (Res(Sk−1 )) r = (Res(Sk−1 )) r X K X Wrr (µk , νk ) . k=1 X T ∈Sk :T ⊆S |P (T ) − Q(T )| X S∈Sk−1 T ∈Sk :T ⊆S X T ∈Sk |P (T ) − Q(T )| . Furthermore, for each S ∈ SK , PK = QK , Lemma 7 gives that Wrr (PK , QK ) ≤ (Res(SK ))r 19 |P (T ) − Q(T )| (7) D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Plugging these last two inequalities into Inequality (7) gives the desired result: Wrr (P, Q) r ≤ (Res(SK )) + K X (Res(Sk−1 ))r X S∈Sk k=1 |P (S) − Q(S)| . Lemma 11 Suppose S and T are partitions of (Ω, ρ), and suppose S is countable. Then, there exists a partition S ′ of (Ω, ρ) such that: a) |S ′ | ≤ |S|. b) Res(S ′ ) ≤ Res(S) + 2 Res(T ). c) T is a refinement of S ′ . Proof Enumerate the elements of S as S1 , S2 , .... Define S0′ := ∅, and then, for each i ∈ {1, 2, ...}, recursively define -   i−1 [ [ T  Sj′  , Si′ :=  j=1 T ∈T :T ∩Si 6=∅ and set S ′ = {S1′ , S2′ , ...}. Clearly, |S ′ | ≤ |S| (equality need not hold, as we may have some Si′ = ∅). By the triangle inequality, each   [ Diam(Si′ ) ≤ Diam  T  ≤ δS + 2δT . T ∈T :T ∩Si 6=∅ Finally, since T is a partition and we can write -  i−1 [ [ T  Si′ =  j=1 T ∈T T ∈T :T ∩Si 6=∅ T is a refinement of S ′ . [ :T ∩Sj′ 6=∅  T , Before proving Lemma 12, we recall a simple concentration inequality bounding the L1 deviation of a multinomial random variable from its mean: Lemma 15 (Lemma 3 P of Devroye (1983)) Suppose (X1 p , ..., XK ) ∼ Multinomial(n, p1 , ..., pK ). 20K/n, for all ε ∈ [ε0 , 1), Let Z := kX − pk1 = K |X − p |. Then, for ε := 0 k k k=1  P [Z > nε] ≤ 3 exp −nε2 /25 . Lemma 12 now follows as an easy corollary. 20 D ISTRIBUTION E STIMATION IN WASSERSTEIN D ISTANCE Lemma 12 Consider the setting of Lemma 15. Then,   p Z ≤ 21K/n. E n Proof Since, almost surely, Z < n, by Lemma 15, Z ∞ P [Z > nε] dε [Z/n] = E 0 Z 1  ≤ ε0 + 3 exp −nε2 /25 dε Z ε0 1−ε0   exp −n (ε + ε0 )2 /25 dε 0 Z  1   p 3 2 ≤ ε0 + 3 exp −nε0 exp −nε2 /25 dε ≤ ε0 + exp −nε20 ≤ 21K/n. 2 0 = ε0 + 3 21 D ISTRIBUTION E STIMATION IN 22 WASSERSTEIN D ISTANCE
7cs.IT
Fitting Jump Models arXiv:1711.09220v1 [cs.LG] 25 Nov 2017 A. Bemporad† , V. Breschi† , D. Piga‡ , and S. Boyd§ † IMT School for Advanced Studies Lucca, Piazza San Francesco 19, 55100 Lucca, Italy. Email: {alberto.bemporad,valentina.breschi}@imtlucca.it ‡ Dalle Molle Institute for Artificial Intelligence Research - USI/SUPSI, Galleria 2, Via Cantonale 2c, CH-6928 Manno, Switzerland. Email: [email protected] § Department of Electrical Engineering, Stanford University, Stanford CA 94305, USA. Email: [email protected] November 28, 2017 Abstract We describe a new framework for fitting jump models to a sequence of data. The key idea is to alternate between minimizing a loss function to fit multiple model parameters, and minimizing a discrete loss function to determine which set of model parameters is active at each data point. The framework is quite general and encompasses popular classes of models, such as hidden Markov models and piecewise affine models. The shape of the chosen loss functions to minimize determine the shape of the resulting jump model. 1 Introduction In many regression and classification problems the training dataset is formed by input and output observations with time stamps. However, when fitting the function that maps input data to output data, most algorithms used in supervised learning do not take the temporal order of the data into account. For example, in linear regression problems solved by least squares minθ kAθ − bk22 each row of A and b is associated with a data-point, but clearly the solution θ? is the same no matter how the rows of A and b are ordered. In systems identification of dynamical models, temporal information is often used only to construct the input samples (or regressors) and outputs, but then it is neglected. For example, in estimating autoregressive models with exogenous inputs (ARX), the regressor is a finite collection of current and past signal observations, but the order of the regressor/output pairs is irrelevant when least squares are used. Similarly, in logistic regression and support vector machines the order of the data points does not change the result. In training forward neural networks using stochastic gradient descent, the samples may be picked up randomly (and 1 more than once) by the solution algorithm, and again their original temporal ordering is neglected. On the other hand, there are many applications in which relevant information is contained not only in the data but also in their temporal order. In particular, if the time each data-point was collected is taken into account, one can detect changes in the type of regime the data were produced. Examples range from video segmentation [19, 9] to speech recognition [23, 24], asset-price models in finance [25, 14], human action classification [22, 21], and many others. All these examples are characterized by the need of fitting multiple models and understanding when switches from one model to another occur. Piecewise affine (PWA) models attempt at fitting multiple affine models to a data set, where each model is active based on the location of the input sample in a polyhedral partition of the input space [12, 8]. However, as for ARX models, the order of the data is not relevant in computing the model parameters and the polyhedral partition. In some cases, mode transitions are captured by finite state machines, for example in hybrid dynamical models with logical states, where the current mode and the next logical state are generated deterministically by Boolean functions [4, 7]. Hidden Markov models (HMMs) treat instead the mode as a stochastic discrete variable, whose temporal dynamics is described by a Markov chain [23]. Natural extensions of hidden Markov models consider the cases in which each mode is associated with a linear function of the input [13, 10, 20]. Hidden Markov models are usually trained using the Baum-Welch algorithm [1], a forward-backward version of the more general Expectation Maximization (EM) algorithm [11]. In this paper we consider rather general jump models to fit a temporal sequence of data that takes the ordering of the data into account. The proposed fitting algorithm alternates two steps: estimate the parameters of multiple models and estimate the temporal sequence of model activation, until convergence. The model fitting step can be carried out exactly when it reduces to a convex optimization problem, which is often the case. The mode-sequence step is always carried out optimally using dynamic programming. Our jump modeling framework is quite general. The structure of the model depends on the shape of the function that is minimized to obtain the model parameters, the way the model jumps depends on the function that is minimized to get the sequence of model activation. When we impose no constraints or penalty on the model sequence, our method reduces to automatically splitting the dataset in K clusters and fitting one model per cluster, which is a generalization of K-means [16, Algorithm 14.1]. Hidden Markov models (HMMs) are a special case of jump models, as we will show in the paper. Indeed, jump models have broader descriptive capabilities than HMMs, for example the sequence of discrete states may not be necessarily generated by a Markov chain and could be a deterministic function. Moreover, as stated above, jump models can have rather arbitrary model shapes. After introducing jump models in Section 2 and giving a statistical interpretation of the loss function in Section 3, we provide algorithms for fitting jump models to data and to estimate output values and hidden modes from available 2 input samples in Section 4, emphasizing differences and analogies with HMMs. Finally, in Section 5 we show four examples of application of our approach for regression and classification, using both synthetic and experimental data sets. The code implementing the algorithms described in the paper is available at http://cse.lab.imtlucca.it/~bemporad/jump_models/. 1.1 Setting and goal We are given a training sequence of data pairs (xt , yt ), t = 1, . . . , T , with xt ∈ X , yt ∈ Y. We refer to t as the time or period, xt as the regressor or input, and yt as the outcome or output at time t. The training sequence is used to build a regression model that provides a prediction ŷt of yt given the available inputs x1 , . . . , xt , and possibly past outputs y1 , . . . , yt−1 . We are specifically interested in models where ŷt is not simply a static function of xt , but rather we want to exploit the additional information embedded in the temporal ordering of the data. As we will detail later, our regression model is implicitly defined by the minimization of a fitting loss J that depends on x1 , . . . , xt , y1 , . . . , yt−1 , yt and other variables and parameters. The chosen shape for J determines the structure of the corresponding regression model. Given a production data sequence (x̃1 , ỹ1 ), . . ., thought to be generated by a similar process that produced the training data, the quality of the regression model over a time period t = 1, . . . , T̃ will be judged by the average true loss true L T̃ 1 X true ` (ŷt , ỹt ) = T̃ t=1 (1) where `true : Y × Y → R penalizes the mismatch between ŷt and ỹt , with `(y, y) = 0 for all y ∈ Y. 2 2.1 Regression models Single model A simple form of deriving a regression model is to introduce a model parameter θ ∈ Rd , a loss function ` : X × Y × Rd → R ∪ {+∞}, and a regularizer r : Rd → R ∪ {+∞} defining the fitting objective J(X, Y, θ) = T X `(xt , yt , θ) + r(θ) (2a) t=1 where X = (x1 , . . . , xT ), Y = (y1 , . . . , yT ). For a given training data set (X, Y ), let θ? = arg minθ J(X, Y, θ) (2b) be the optimal model parameter. By fixing θ = θ? we get the following regression model ŷt = arg minyt J(X, Y, θ? ) = arg minyt `(xt , yt , θ? ) =: ϕ(xt ) 3 (2c) where we have exploited the separability of the loss J and set ϕ : X → Y as the regression model, with ties in the arg min broken arbitrarily. Model (2) can be enriched by adding output information sets Yt ⊆ Y that augment the information that is available about yt , ŷt = arg miny∈Yt `(x, y, θ? ) (3) where Yt = Y if no extra information on yt is given. For example, if we know a priori that yt ≥ 0 we can set Yt equal to the nonnegative orthant. 2.2 K-models Let us add more flexibility and introduce multiple model parameters θs ∈ Rd , s = 1, . . . , K, and a latent mode variable st that determines the model parameter θst that is active at step t. Fitting a K-model on the training data set (X, Y ), entails choosing the K models by minimizing J(X, Y, Θ, S) = T X `(xt , yt , θst ) + t=1 K X r(θi ) (4) i=1 with respect to Θ = (θ1 , . . . , θK ) and S = (s1 , . . . , sT ). The optimal parameters ? define the K-model θ1? , . . . , θK (ŷt , ŝt ) = arg minyt ,st `(xt , yt , θs?t ). (5) For example, the loss function `(xt , yt , θst ) = kyt − θs0 t xt k22 (6) corresponds to K possible linear models ŷt = θs0 t xt . By setting r(θ) = 0, `(xt , yt , θst ) = kyt − θst k22 + kxt − θst k22 (7) and yt = xt , model (5)–(7) is the standard K-means model [16], where θs are the centroids of the clusters. In this case, ŝt denotes the index of the centroid θŝ?t which is closest to xt , and ŷt = θŝ?t is the best estimate of xt based on the regression model defined by (7). More generally, 0 `(xt , yt , θst ) = kyt − θy,s [ x1t ] k22 + ρkxt − θx,st k22 t (8) with θst = (θy,st , θx,st ) and ρ > 0, defines a piecewise affine (PWA) model over ? ? the piecewise linear partition generated by the Voronoi diagram of (θx,1 , . . . , θx,K ), i.e., the regression model is ? ŝt = arg mins kxt − θx,s k22 , ? ŷt = (θy,ŝ )0 [ x1t ] . t The hyper-parameter ρ in (8) trades off between fitting the output yt and clustering the inputs (x1 , . . . , xt ) based on Euclidean distance. 4 A more general PWA model can be defined by considering a piecewise linear separation function ϑ : X → R [5, 8] 0 ϑ(x) = max{θx,s [ x1 ]} (9) s and setting `(xt , yt , θst ) = 0 kyt − θy,s t [ x1t ] k22 + ρ K X 2 max {0, (θx,j − θx,st )0 [ x1t ] + 1} . (10) j=1 j6=st In this case it is immediate to verify that the regression model is ŝt = arg maxs {(θx?t ,s )0 [ x1 ]}, 2.3 ? ŷt = (θy,ŝ )0 [ x1t ] . t (11) Jump model The models introduced above do not take into account the temporal order in which the samples (xt , yt ) are generated. To this end, we add a mode sequence loss L in the fitting objective (4) J(X, Y, Θ, S) = T X `(xt , yt , θst ) + t=1 K X r(θk ) + L(S), (12) k=1 where S = (s0 , s1 , . . . , sT ) is the mode sequence. We define L : KT +1 → R ∪ {+∞} in (12) as L(S) = Linit (s0 ) + T X Lmode (st ) + t=1 T X Ltrans (st , st−1 ) (13a) t=1 where K = {1, . . . , K}, Linit : K → R ∪ {+∞} is the initial mode cost, Lmode : K → R ∪ {+∞} is the mode cost, and Ltrans : K2 → R ∪ {+∞} is the mode transition cost. We discuss possible choices for L in Sections 2.3.1 and 3. With a little abuse of notation, we write J(X, Y, Θ, S) = `(X, Y, Θ, S) + r(Θ) + L(S) where `(X, Y, Θ, S) = T X `(xt , yt , θst ), t=1 r(Θ) = K X r(θk ). (13b) (13c) k=1 As with any model, the choice of the fitting objective (13) should trade off between fitting the given data and prior assumptions we have about the models and the mode sequence. In particular, the mode sequence loss L in (13a) takes into account the temporal structure of the mode sequence, for example that the mode might change (i.e., st 6= st−1 ) rarely. 5 A jump model can be used for several tasks beyond inferring the values ŷt . In anomaly identification, we are interested in determining times t for which the jump model does not fit the data point yt well. In model change detection we interested in identifying times t for which ŝt 6= ŝt−1 . In control systems jump models can be used to approximate nonlinear/discontinuous dynamics and design model-based control policies, state estimators, and fault-detection algorithms. 2.3.1 Mode loss functions We discuss a few options for choosing the mode loss functions Linit , Lmode , Ltrans defining the mode sequence loss L in (13a). As mentioned above, the case L(S) = 0 leads to a K-model. By choosing Ltrans (i, j) = λ for all i 6= j, Lmode (i) = Ltrans (i, i) = 0, one penalizes mode transitions equally by λ ≥ 0, where λ → ∞ leads to regression of a single model on the data (that is, st ≡ s0 ), while λ → 0 leads again to a K-model. Note that choosing the same constant λ for all transitions makes the fitting problem exhibit multiple solutions, as indexes i, j can be arbitrarily permuted. The mode loss Lmode can be used to break such symmetries. For example, smaller values for st will be preferred by making Lmode (i) < Lmode (j) for i < j. The shape of the increasing finite sequence {Lmode (i)}K i=1 can be used to reduce the number of possible modes: larger increasing values of Lmode (i) will discourage the use of an increasing number of modes. The initial mode cost Linit summarizes prior knowledge about the initial mode s0 . For example, Linit (s0 ) ≡ 0 if no prior information on s0 is available. On the contrary, if the initial mode s0 is known and say equal to j, then Linit (s0 ) = 0 for s0 = j and +∞ otherwise. Next Section 3 suggests criteria for choosing L in case statistical assumptions about the underlying process that generates st are available. Alternative criteria are discussed in Section 4.4 for choosing L directly from the training data. 3 Statistical interpretations Let Y = (y1 , . . . , yT ), X = (x1 , . . . , xT ), S = (s0 , . . . , sT ), Θ = (θ1 , . . . , θK ). We provide a statistical interpretation of the loss functions for the special case in which the following modeling assumptions are satisfied: A1. The mode sequence S, the model parameters Θ and the input data X are statistically independent, i.e., p(S|X, Θ) = p(S), p(Θ|S, X) = p(Θ) A2. The conditional likelihood of Y is given by p(Y |X, S, Θ) = T Y p(yt |X, S, Θ) = t=1 T Y t=1 6 p(yt |xt , θst ) where p(yt |xt , θst ) is the likelihood of the outcome yt given xt and θst ; A3. The priors on the model parameters θ1 , . . . , θK are all equal to p(θ), i.e., p(θ1 ) = · · · = p(θK ) = p(θ) and the model parameters are statistically independent, i.e., p(Θ) = K Y p(θk ) k=1 A4. The probability of being in mode st given s0 , . . . , st−1 is p(st |st − 1) = πst ,st−1 (Markov property); A5. The initial mode s0 has probability p(s0 ) = πs0 . Proposition 1 Let Assumptions A1-A5 be satisfied and define `(xt , yt , θst ) r(θk ) Ltrans (st , st−1 ) init L (s0 ) mode L (st ) = − log p(yt |xt , θst ) (14a) = − log p(θk ) (14b) = − log πst ,st−1 (14c) = − log πs0 (14d) = (14e) 0. Then minimizing J(X, Y, Θ, S) as defined in (12)–(14) with respect to Θ and S is equivalent to maximizing the joint likelihood p(Y, S, Θ|X). Proof. Because of the Markov property (Assumption A4), the likelihood of the mode sequence S is T Y p(S) = p(s0 ) p(st |st−1 ). (15) t=1 From (15) and Assumptions A1-A3, we have: p(Y, S, Θ|X) = p(Θ|X)p(Y, S|X, Θ) = p(Θ|X)p(S|X, Θ)p(Y |S, X, Θ) = p(Θ)p(S)p(Y |S, X, Θ) = K Y k=1 p(θk )p(s0 ) T Y p(st |st−1 )p(yt |xt , θst ) t=1 whose logarithm is log p(Y, S, Θ|X) = K X T T X X log p(θk )+log p(s0 )+ log p(st |st−1 )+ log p(yt |xt , θst ). t=1 k=1 t=1 (16) By defining the loss functions `, r, Ltrans , Linit , and Lmode as in (14), the minimization of the fitting objective J(X, Y, Θ, S) as in (12)–(13) with respect 7 to Θ and S is equivalent to maximizing the logarithm of the joint likelihood p(Y, S, Θ|X), and therefore p(Y, S, Θ|X).  It is also possible to give an inverse result, namely a statistical interpretation of minimizing a given generic J(X, Y, Θ, S) defined as in (13). Define the following probabilities p(yt |xt , θst ) = e−`(xt ,yt ,θst ) ν(θst , xt ) p(Θ|X) = p(Θ) = Z (17a) e−r(Θ) (17b) e−r(Θ) dΘ Rd×K −L̄(S,Θ,X) p(S|Θ, X) e X = e−L̄(S̄,Θ,X) (17c) S̄∈K T +1 where Z ν(θst , xt ) = e−`(xt ,y,θst ) dy (18a) Y L̄(S, Θ, X) = L(S) − T X log ν(θst , xt ). (18b) t=1 Under the assumption that the outputs yt are independent given (S, X, Θ), we QT have that p(Y |S, X, Θ) = t=1 p(yt |xt , θst ). Furthermore, since p(Y, S, Θ|X) = p(Y |S, X, Θ)p(S|X, Θ)p(Θ|X) we get arg max log p(Y, S, Θ|X) = arg min J(X, Y, Θ, S). (19) PK Note that the standard quadratic regularization r(Θ) = k=1 r(θk ), with r(θk ) = kθ k2 q − k 22 1 2 , which amounts to assuming ρkθk k2 , leads to p(θk ) = ce 2σθ , where σθ = 2ρ θk ∼ N (0, σθ2 I). Similarly, the quadratic penalty on the prediction error `(xt , yt , θst ) = ckyt − θs0 t xt k22 (20) q 1 . leads to assuming that yt ∼ N (θs0 t xt , σy2 I), where σy = 2c The special cases highlighted in Section 2.3.1 also have a statistical interpretation. Let us assume for simplicity that ν(θst , xt ) = T1 in (18a), so that we can replace L̄(S, Θ, X) = L(S) in (18b) without changing the optimizer of J(X, Y, Θ, S) in (19), and also assume that Linit (s) = Lmode (s). When Ltrans = 0 we can set p(S|Θ, X) = p(S) = T Y t=0 8 mode e−L PK k=1 (st ) e−Lmode (k) Algorithm 1 Jump model fitting Input: Training data set X = (x1 , . . . , xT ), Y = (y1 , . . . , yT ), number K of models, initial mode sequence S 0 = {s00 , . . . , s0T }. 1. iterate for k = 1, . . . 1.1. Θk ← arg minΘ `(X, Y, Θ, S k−1 ) + r(Θ); k k 1.2. S ← arg minS `(X, Y, Θ , S) + L(S); (model fitting) (mode sequence fitting) 2. until S k = S k−1 . Output: Estimated model parameters Θ? = Θk and mode sequence S ? = S k . in (17c). The case L(S) = 0 corresponds to assuming that the modes st are i.i.d. 1 (independently and identically distributed) with uniform probability K for all t = 0, . . . , T . The case Ltrans = 0, Linit (s) = Lmode (s) = s corresponds to assuming the (e−1) −s modes st i.i.d. with probability distribution p(s) = 1−e . −K e mode trans Regarding the case L = 0 and L (i, j) = λ for i 6= j and 0 for i = j, QT by assuming p(S|Θ, X) = p(S) = p(s0 ) t=1 p(st |st−1 ) we get ( e−λ if st 6= st−1 1 −λ 1+(K−1)e p(s0 ) = , p(st |st−1 ) = 1 K if st = st−1 . 1+(K−1)e−λ 4 Algorithms We provide now algorithms for fitting a jump model to a given data set and to infer predictions ŷt , ŝt from it. 4.1 Model fitting Given a training sequence X = (x1 , . . . , xT ) of inputs and Y = (y1 , . . . , yT ) of outputs, for fitting a jump K-model we need to attempt minimizing the cost J(X, Y, Θ, S) with respect to Θ and S. A simple algorithm to solve this problem is Algorithm 1, a coordinate descent algorithm that alternates minimization with respect to Θ and S. If ` and r are convex functions, Step 1.1 can be solved globally (up to the desired precision) by standard convex programming [6]. Step 1.2 can be solved by standard discrete dynamic programming (DP) [2]. The latter is achieved by computing the following matrices M ∈ RK×(T +1) of 9 costs and U ∈ K × RT of indexes M (s, T ) = Lmode (s) + `(xT , yT , θs ) (21a) trans Us,t = arg minj {M (j, t + 1) + L mode M (s, t) = L init M (s, 0) = L (j, s)}, t = 1, . . . , T − 1 trans (s) + `(xt , yt , θs ) + M (Us,t , t + 1) + L (s) + min{M (j, 1) + L trans j (Us,t , s) (j, s)} (21b) (21c) (21d) backwards in time, and then reconstructing the minimum cost sequence S forward in time by setting s0 = arg minj M (j, 0) (21e) st = Ust−1 ,t , t = 1, . . . , T. (21f) Note that if the time order of operations in (21) is reversed, the DP iterations (21) become Viterbi algorithm [23, p. 264]: M (s, 0) = Linit (s) (22a) trans Us,t = arg minj {M (j, t − 1) + L mode M (s, t) = L (j, s)}, t = 1, . . . , T trans (s) + `(xt , yt , θs ) + M (Us,t , t − 1) + L (Us,t , s) (22b) (22c) followed by the backwards iterations sT = arg minj M (j, T ) (22d) st = Ust+1 ,t , t = 0, . . . , T − 1. (22e) Since at each iteration the cost J(X, Y, Θ, S) is non-increasing and the number of sequences S is finite, Algorithm 1 always terminates in a finite number of steps, assuming that in case of multiple optima one selects the optimizers in Steps 1.1 and 1.2 according to some predefined criterion. However, there is no guarantee that the solution found is the global one, as it depends on the initial guess S 0 . To improve the quality of the solution, we may run Algorithm 1 N times from different random initial sequences S 0 and select the best result. Our experience is that a small N , say N = 5, is usually enough. During the execution of Algorithm 1 it may happen that a mode s does not appear in the sequence S k−1 . In this case, the fitting loss `(X, Y, Θ, S k−1 ) does not depend on θs , and the latter will be determined in Step 1.1 based only on the regularizer r(Θ). In case L(S) = 0, the ordering of the training data becomes irrelevant and Algorithm 1 reduces to fitting K models to the data set. If in addition ` and r are specified as in (7) and Y = X, Algorithm 1 is the standard K-means algorithm, where the starting sequence S 0 is the initial clustering of the data points (x1 , . . . , xT ), Step 1.1 computes the collection Θk of cluster centroids at iteration k, and Step 1.2 reassigns data points to clusters by updating their labels skt . 10 When again L(S) = 0 and the mode loss in (10) is used for getting a PWA model, the cost function minimized in Step 1.1 of Algorithm 1 is separable with respect to θy,s , θx,s . Then the minimization with respect to θx,s produces the PWL separation function ϑ in (9) [8], while Step 1.2 looks for the optimal latent variables st that best trade off between assigning the corresponding data point 0 0 xt to the polyhedron {x ∈ X : θx,s [ x ] ≥ θx,j [ x1 ] , ∀j 6= st , j ∈ K} and matching t 1 xt 0 the predicted output yt ≈ θy,st [ 1 ]. Finally, we remark that Algorithm 1 is also applicable to the more general case in which the mode loss L also depends on Θ, by simply replacing Steps 1.1 and 1.2 with Θk ← arg minΘ `(X, Y, Θ, S k−1 ) + r(Θ) + L(S k−1 , Θ) k k k S ← arg minS `(X, Y, Θ , S) + L(S, Θ ). (23a) (23b) This would cover the case in which L contains parameters to be estimated. 4.2 Inference 4.2.1 One-step ahead prediction Assume that the model parameters Θ? have been estimated and that new production data X̃t = (x̃1 , . . . , x̃t ) and outputs Ỹt−1 = (ỹ1 , . . . , ỹt−1 ) are given. Because of the structure of the mode loss function L defined in (13a), the estimates ŷt and ŝ0 , . . . , ŝt do not depend on future inputs x̃j and modes ŝj for j > t. The same fitting objective (12) can be used to estimate ŷt and Ŝt = (ŝ0 , . . . , ŝt ), (ŷt , Ŝt ) = arg minyt ,St Jt (X̃t , Ỹt−1 , yt , Θ? , St ) s.t. yt ∈ Yt (24) where Yt ⊆ Y is a possible additional output information set and Jt (X̃t , Ỹt−1 , yt , Θ? , St ) = `(x̃t , yt , θs?t ) + t−1 X `(x̃j , ỹj , θs?j ) + Linit (s0 ) j=1 + t X Lmode (sj ) + j=1 t X Ltrans (sj , sj−1 ). (25) j=1 Algorithm 2 attempts at solving problem (24). Step 1 is solved again by the DP iterations (21) over the time span [0, t], with the only difference that in (21a) we set the terminal penalty equal to M (s, t) = Lmode (s) + miny {`(xt , y, θs )}, since the last output yt is determined later at Step 2. Note that open-loop prediction, that is the task of predicting ŷt without acquiring Ỹt−1 , can be simply obtained by replacing Ỹt−1 = (ỹ1 , . . . , ỹt−1 ) with Ŷt−1 = (ŷ1 , . . . , ŷt−1 ). Arbitrary combinations of one-step ahead and open-loop predictions are possible to handle the more general case of intermittent output data availability. 11 Algorithm 2 Inference Input: Model set Θ? , production data set X̃t = (x̃1 , . . . , x̃t ), past outputs Ỹt−1 = (ỹ1 , . . . , ỹt−1 ). 1. Ŝt ← arg minSt   L(St ) +  t−1 X j=1   `(x̃j , ỹj , θs?j ) + min `(x̃t , y, θs?t ) ; y∈Yt  2. ytk ← arg miny∈Yt `(x̃t , y, θŝ?t ); Output: Estimated output ŷt and mode sequence Ŝt . 4.2.2 Recursive inference When Ltrans = 0 problem (24) becomes completely separable and simplifies to (ŷt , ŝt ) = arg miny,s `(x̃t , y, θs? ) + Lmode (s) s.t. y ∈ Yt . (26) For example, in the case of K-means (7) (L(s) = 0), the estimate obtained by (26) is ŝt = arg mins kx̃t − θs? k22 , ŷt = θŝt that is ŷt is the centroid of the cluster which x̃t is closest to. When the mode transition loss function Ltrans 6= 0, the simplification in (26) does not hold anymore. Nonetheless, an incremental version of (24), producing exactly the same results, can be still derived in the following form (ŷt , ŝt ) = arg miny,s `(x̃t , y, θs ) + Lt (s) s.t. y ∈ Yt (27a) where Lt : K → R is the arrival cost recursively defined as  Lt (st ) = Lmode (st ) + min `(x̃t−1 , ỹt−1 , θst−1 ) + Lt−1 (st−1 ) st−1 +L L0 (s0 ) trans init = L (st , st−1 ) , (s0 ). t = 1, 2, . . . (27b) (27c) Clearly, while producing exactly the same results, the formulation in (27) is much more efficient than Algorithm 2 as the number of computations does not increase with t. 4.2.3 Smoothing The same approach described in Section 4.2.1 can be generalized to other inference tasks than one-step ahead or open-loop prediction, such as smoothing. Assume ỹk is only known at steps k ∈ Tt ⊆ {1, . . . , t}. Steps 1–2 are replaced 12 by Ŝt yj n P L(St ) + j∈Tt `(x̃j , ỹj , θs?j ) o P + j∈T¯t minyj ∈Yj `(x̃j , yj , θs?j ) ← arg miny∈Yj `(x̃j , y, θŝ?j ), ∀j ∈ T̄t ← arg minSt where T̄t = {1, . . . , t} \ Tt . 4.2.4 Pure mode estimation In case we are interested in estimating only the latent mode ŝt given x̃1 , . . . , x̃t , ỹ1 , . . . , ỹt−1 and also ỹt , we can keep using (27) by simply changing (27a) to ŝt = arg mins `(x̃t , ỹt , θs ) + Lt (s). (28) This allows reconstructing the mode sequence ŝ1 , . . . , ŝT̃ recursively from the available data set, which may be useful for example to detect changes in the relation between the input x̃t and the output ỹt . 4.3 Relation with Hidden Markov Models Jump models have several common features with hidden Markov models (HMMs) [23]. First, both models consider the presence of discrete latent states st . While HMMs assume that the sequence S of such states satisfy the Markov property p(st |st−1 , . . . , s0 ) = p(st |st−1 ) in jump models the particular form chosen in (13a) for the mode sequence loss L makes estimating ŝt incrementally as in (27) possible. Second, in HMMs the observed outputs are such that p(yt |xt , . . . , x1 , yt−1 , . . . , y1 , st , . . . , s0 ) = p(yt |xt , st ). Similarly, in jump models ŷt is a unique function of a given pair (xt , st ), as (27a) becomes ŷt = arg miny∈Yt `(xt , y, θst ). Indeed, an HMM is a special case of a jump model. Consider the case in which the output observation yt is discrete, that is Y = {1, . . . , L}. An HMM is characterized by the set of discrete probabilities p(st+1 = i|st = j) = πi,j , i, j ∈ K p(s0 ) = πs0 p(yt = v|st = j) = βj,v , v ∈ Y. (29a) (29b) (29c) Let us set xt = 1, θs = s, and define the loss function ` as `(x, y, θs ) = − log(βθs ,y ). 13 (30) Similarly to (14), by also setting r(θ) = 0, Ltrans (st , st−1 ) = − log πst ,st−1 , Linit (s0 ) = − log πs0 , and Lmode (s) = 0, the jump model defined by the inference rule (24)–(25) returns the mode sequence Ŝt that best matches the observed sequence Ỹt of outputs and that sets the output ŷt equal to the value v ∈ Y that maximizes the probability βŝt ,v . An extension to HMMs with continuous observation densities can be obtained by properly redefining the loss function ` in (30). In case the probabilities βs,y are not given, but rather must be estimated from a training data set, we can set instead θs = [βs,1 . . . βs,L ]0 along with the loss function ` `(y, θs ) = − log(e0y θs ) (31) where ey is the yth column of the identity matrix of size L. If the initial probability distribution πs0 and the state transition probabilities πi,j are unknown, they can be estimated by minimizing J(X, Y, Θ, S) in (12) with Ltrans (st , st−1 ) and Linit (s0 ) as in (14c) and (14d), respectively. This implies that the unknown model parameter Θ should also include πs0 and πi,j , leading to the general case of having the mode sequence loss L also dependent on Θ as in (23). The well-known Expectation-Maximization (EM) algorithm [11] determines the parameters of an HMM by maximizing the log-likelihood X LHMM (Θ|X, Y ) = log p(Y |X, Θ) = log p(Y, S|X, Θ) (32) S∈KT +1 with respect to Θ. Instead, as shown by Proposition 1, our approach maximizes log p(Y, S, Θ|X) with respect to Θ and S. The case of HMMs in which the observations y are a mode-dependent linear function of x rather than discrete has been dealt with for example in [13], under the assumption that such a linear relation between input and output samples is perturbed by Gaussian noise. This is a special case of our jump model framework, obtained by setting ` as in (20), Ltrans as in (14c), Linit as in (14d), Lmode (s) = 0, and r(θ) = 0. The training algorithm described in [13], however, completely relies on the probabilistic assumptions made about the normal distribution of output noise and the Markovian nature of mode transitions. In conclusion, jump models are more descriptive than HMMs. The sequence of modes may not be generated by a Markov chain, such as in the case of PWA models (10) and (11), where the mode st is a deterministic function of xt . In addition, the loss and mode loss functions can have rather arbitrary shapes. For example, we may choose `(x, y, θs ) as the Huber function of y − θs0 x for robust regression, which is still a convex loss. 4.4 Selecting the mode sequence loss from data Selecting the right mode sequence loss L may not be obvious and require several attempts that involve fitting and cross-validation. A simple approach to choose L directly from the training data is to update the mode loss function L after 14 executing Algorithm 1 based on the best sequence S ? found so far, and run Algorithm 1 again, executing the algorithm N times in total. Assuming Lmode = 0, we update Ltrans , Linit from one run of Algorithm 1 to another by setting #{t ∈ {1, . . . , T } : s?t−1 = j} T #{t ∈ {1, . . . , T } : s?t = i, s?t−1 = j} µij ← T   µij trans L (i, j) ← −τi log , i, j = 1, . . . , K µj #{t ∈ {0, . . . , T } : s?t = j} µ0j ← T Linit (j) ← −τ0 log µ0j µj ← (33a) (33b) (33c) (33d) (33e) where # denotes the cardinality (number of elements) of a set, S ? = (s?0 , . . . , s?T ), and we set PK trans (i, j) j=1 L   , i = 1, . . . , K τi ← P µij K j=1 log µj PK init j=1 L0 (j) τ0 ← PK  0 j=1 log µj to preserve the relative weight of L with respect to the loss ` and regularization r. Choosing L as in (33) is motivated by the statistical interpretation (14c)–(14d) and used routinely for estimating state probabilities in HMMs [23]. Clearly, (33) are well defined only if µij , µj , µ0j > 0 forall i, j = 1, . . . , K. If the latter condition is not satisfied, one may consider adding the following Laplace smoothing µj ← µij ← µ0j ← 1 + #{t ∈ {1, . . . , T } : s?t−1 = j} T +K 1 + #{t ∈ {1, . . . , T } : s?t = i, s?t−1 = j} T + K2 1 + #{t ∈ {0, . . . , T } : s?t = j} T +K (34a) (34b) (34c) when estimating µj , µij and µ0j . Estimating L as in (33) is especially useful for improving the quality of inference, both when using (25) or (27). 5 Examples We test the algorithms proposed in the previous sections on various problems of regression and classification using jump models. As the DP computation in 15 Step 1.2 of Algorithm 1 also provides the optimal cost V k , J(X, Y, Θk , S k ), when running the tests we replace the termination criterion in Step 2 with V k−1 − V k ≤ V (35) where V is a small tolerance. All tests were run on a MacBook Pro 3 GHz-Intel i7 in MATLAB R2016b. The test code is available for download at http://cse.lab.imtlucca.it/ ~bemporad/jump_models/. 5.1 Jump linear model regression We consider a dataset of T = 10000 training data and T̃ = 10000 production data generated by the following jump linear model with K = 3 modes yt = θst xt + ζt with yt ∈ R, xt ∈ R20 , ζt ∼ N (0, σy2 ). The coefficients of the parameter vectors θi are randomly selected from the normal distribution N (0, 1). The true mode st has probability π = 5% of being different from st−1 , starting from s0 = 1. As loss functions we consider `(xt , yt , θst ) = r(θk ) = Ltrans (st , st−1 ) kyt − θs0 t xt k22 10−5 kθk k22  −τ log(1 − (K − 1)π) if st = st−1 = −τ log π if st = 6 st−1 Linit (s0 ) = 0 Lmode (st ) = 0 where τ is treated as a hyper-parameter to be tuned. The tolerance V = 10−8 is used in (35) as a stopping criterion for Algorithm 1, which is executed N = 5 times from different random initial guesses. Each execution is limited to kmax = 1000 iterations. We run Algorithm 1 on the training data for different magnitudes σy of output noise and values of the hyper-parameter τ . The resulting model coefficients Θ? are then used in Algorithm 2 for recursive inference on the production data. For assessing the quality of inference we use the true loss L̃true = T̃ 1X kŷ − ỹk22 . T̃ i=1 In addition, assuming the latent modes s̃t are available only for validation purposes, we consider the following mode-mismatch figure T̃ `true = s 100 X δŝt ,s̃t T̃ t=1 16 (36) 8.5 20 8 19 18 7.5 17 % mode mismatch 7 fit 6.5 6 5.5 16 15 14 13 5 12 4.5 4 10 -6 11 10 -4 10 -2 10 10 -6 10 0 10 -4 10 -2 10 0 Figure 1: Jump linear model fit and validation: true loss L̃true (left) and mode (right), optimal theoretical value τ ? = 2σy2 (dashed line) mismatch `true s where δi,j is the Kronecker delta function. The results are summarized in Figure 5.1. By recalling (20) and (14c), in order to minimize − log p(yt |xt , θ)−log πst ,st−1 one should set `(xt , yt , θst ) = 2σ1 2 and Ltrans (st , st−1 ) = − log πst ,st−1 , or equivy alently `(xt , yt , θst ) = 1, Ltrans (st , st−1 ) = −τ ? log πst ,st−1 with τ ? = 2σy2 . Figure 5.1 also reports the value of τ ? (dashed line) corresponding to different values of σy . As expected, the best value for τ obtained by cross validation, corresponding to the minimum of the plotted curves, corresponds to the theoretical one τ ∗ that would be obtained if σy were known. For large values of τ the percentage of mode mismatch becomes close to K−1 K ≈ 66% (not shown in the figure), that is the value one gets when the mode ŝt is assigned randomly. The average CPU time for executing Algorithm 1 is 342 ms, for Algorithm 2 is 0.89 µs per data point. 5.2 Jump binary classification We consider T = 10000 training data and T̃ = 10000 production data generated by the following jump linear model with K = 3 modes yt = sign(θst xt + ζt ) 17 with   θ1 θ2 −1  1.1812   −0.7585    −1.1096 θ3 =   −0.8456   −0.5727   −0.5587 0.1784 −1 −0.5587 0.1784 −0.1969 0.5864 0.8759 −0.2428 0.1668  −1 0.8003   −1.5094   0.8759   −0.2428   0.6037   1.7813  1.7737 and yt ∈ {−1, 1}, xt ∈ R8 , ζt ∼ N (0, σy2 ), σy = 0.1. The true mode st changes every 500 samples during the generation of the data, covering all modes. We want to train a binary classifier defined by the following losses `(xt , yt , θst ) = max(1 − yt θs0 t xt , 0) r(θk ) = 10−5 kθk k22 (st , st−1 ) = τ (1 − δi,j ) = 0 = 0. trans L L init (s0 ) mode L (st ) Figure 5.2 shows the results obtained for different values of the hyper-parameter τ . We consider the mismatch between the true labels yt and the estimated labels yt? = sign((θs∗?t )0 xt ) returned by Algorithm 1 on the training data, and also between the true labels ỹt and the labels ŷt = sign((θŝ∗t )0 x̃t ) returned by Algorithm 2 on the production data. In addition, we consider the detection of model changes, comparing the true modes st , s̃t and their corresponding estimates s∗t , ŝt . Good values for τ are in the range 1 ÷ 10, for which model changes are correctly detected on both training and production data. The CPU time for executing Algorithm 1 ranges between 4.24 and 80.76 s, with Step 1 computed using the QP solver of GUROBI 7.02 [15]. Algorithm 2 takes an average of 0.57 µs per data point for inference. 5.3 Markov jump linear dynamical system We consider the Markov jump linear dynamical system with K = 4 modes xt+1 = Ast xt + Bst ut + ζt where xt , ζt ∈ R8 , ut ∈ R2 , ζtj ∼ N (0, σy ) for all j = 1, . . . , 8, the matrix pairs (Ai , Bi ) are random stable systems for all i = 1, . . . , K. The modes st are randomly generated according to an (unknown) transition probability matrix Π ∈ R4×4 . The goal is to estimate the system matrices (Ai , Bi ), i = 1, . . . , K, and the transition probability Π from T = 50000 data pairs (xt , ut ) available for training, and validate the results on T̃ = 50000 new samples. Algorithm 1 is executed N = 5 times on the training data with loss function kxt+1 − Ast xt − Bst ut k22 , uniform mode transition loss Ltrans (i, j) = τ , and zero 18 90 50 45 training inference training inference 80 40 70 % mode mismatch % label mismatch 35 30 25 20 60 50 40 30 15 20 10 10 5 0 10 -2 10 -1 10 0 10 1 0 10 -2 10 2 10 -1 10 0 10 1 10 2 Figure 2: Jump binary classifier: percentage of misclassified labels (left) and mode mismatch (right) on training and production data losses Linit , Lmode . Note that, since the output sample yt = xt+1 is multidimensional, we cannot train a model for each component of y independently, as they are linked by the common mode st . After training and before performing inference via (27), the transition probability matrix Π̂ is reconstructed using (33) on the estimated mode sequence S ? returned by Algorithm 1. The results are reported in Figure 3. The coefficients of the models (Ai , Bi ) are estimated with an error of 10−8 (σy = 0), 10−3 (σy = 0.01), and 10−2 (σy = .05), respectively, while the transition probability matrix with error kΠ − Π̂k2 of 0.01 for all values of σy = 0. The average CPU time for executing Algorithm 1 is 68 ms (corresponding to about 15 iterations), while Algorithm 2 takes of 0.57 µs per data point on average for inference. 5.4 Experimental example: PWA dynamical model We consider the problem of modeling the dynamics of a placement process of electronic components in a pick-and-place machine described in [17]. The process consists of a mounting head carrying the electronic component which is placed on a printed circuit board, and then released. This process is characterized by two main operating modes, the free and the impact mode. In free mode the machine carries the electronic component in an unconstrained environment, i.e., without being in contact with the circuit board. In impact mode the 19 mounting head moves in contact with the circuit board. Because of its switching behaviour, this process has been used as a benchmark to assess the performance of several identification algorithms for hybrid dynamical systems [3, 18, 20]. A data record over an interval of 15 s is gathered from an experimental bench (see [17] for details), with a sampling frequency of 2 kHz. We denote by u the voltage applied to the motor driving the mounting head and by y the vertical position of the mounting head. The data record is split in two disjoint subsets: a training set with T = 24000 samples, which consist of the observations gathered in the first 12 s of the experiments, and a test set with T̃ = 6000 samples, which consist of the observations gathered in the last 3 s. We want to fit a PWA model (9)–(10) with K = 2 discrete modes. Each 0 0 regression model is given by yt = θy,s [ x1t ], where xt = [yt−1 yt−2 ut−1 ut−2 ] . t A piecewise linear separation function ϑ defined in (9) is used to describe the partition of X = R4 . Algorithm 1 is executed N = 5 times on the first 22000 samples of the training set with loss function `(xt , yt , θst ) as in (10) and mode sequence loss L = 0. The remaining 2000 samples are used to tune the hyper-parameter ρ, whose best value is ρ = 1.23 · 10−5 . The average CPU time for executing Algorithm 1 for a fixed value of ρ is 200 ms. Figure 4 shows the outputs ỹt collected from the production dataset, the open-loop prediction ŷt of the output reconstructed by feeding the same inputs ũt to the estimated PWA model, and modes   thersequence of estimated ŝt . The resulting best fit rate BFR = 100 1 − PT̃ Pt=1 T̃ t=1 kỹt −ŷt k2 kỹt −ȳk2 % is equal to 81%, where ȳ denotes the average of the outputs ỹ1 , . . . , ỹT̃ . It is interesting to note that the reconstructed mode correctly captures the two different operating conditions of the process (mode 1 = free mode, mode 2 = impact mode). 6 Conclusions We have presented a new framework for fitting a jump model to a temporal sequence of data. A main strength of the approach is its versatility in describing a large class of parametric models, as the shape of the model and the way it jumps depends on the shape of the loss functions used for fitting the model parameters and for inference. Another strength of the approach is its numerical efficiency, due to using a simple coordinate-descent optimization algorithm for fitting model parameters and a recursive formulation for inferring outputs and latent modes. Future research will address an incremental version of the fitting algorithm, so to update models and infer output/mode pairs when data are streaming on-line. 20 50 9 45 8 40 35 % mode mismatch fit 7 6 5 30 25 20 15 4 10 3 10 -2 10 -1 10 0 10 1 5 10 -2 10 2 10 -1 10 0 10 1 10 2 Figure 3: Markov jump linear dynamical system: true loss L̃true (left) and mode (right). mismatch `true s References [1] L.E. Baum, T. Petrie, G. Soules, and N. Weiss. A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. The Annals of Mathematical Statistics, 41(1):164–171, 1970. [2] R. Bellman. Dynamic Programming. Princeton University Press, Princeton, NJ, USA, 1957. [3] A. Bemporad, A. Garulli, S. Paoletti, and A. Vicino. A bounded-error approach to piecewise affine system identification. IEEE Transactions on Automatic Control, 50(10):1567–1580, 2005. [4] A. Bemporad and N. Giorgetti. Logic-based methods for optimal control of hybrid systems. IEEE Transaction on Automatic Control, 51(6):963–976, 2006. [5] K.P. Bennett and O.L. Mangasarian. Multicategory discrimination via linear programming. Optimization Methods and Software, 3:27–39, 1994. [6] S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, New York, NY, USA, 2004. http://www.stanford.edu/~boyd/ cvxbook.html. 21 25 output 20 15 10 5 0 0 0.5 1 0 0.5 1 1.5 2 2.5 3 1.5 2 2.5 3 mode 2 1 time (seconds) Figure 4: Pick-and-place machine: simulated and actual output (top) and estimated mode sequence (bottom). 22 [7] V. Breschi, A. Bemporad, and D. Piga. Identification of hybrid and linear parameter varying models via recursive piecewise affine regression and discrimination. In European Control Conference, pages 2632–2637, Aalborg, Denmark, 2016. [8] V. Breschi, D. Piga, and A. Bemporad. Piecewise affine regression via recursive multiple least squares and multicategory discrimination. Automatica, 73:155–162, November 2016. [9] A.B. Chan and N. Vasconcelos. Modeling, clustering, and segmenting video with mixtures of dynamic textures. IEEE transactions on pattern analysis and machine intelligence, 30(5):909–926, 2008. [10] O. L. V. Costa, M. D. Fragoso, and R. P. Marques. Discrete-time Markov jump linear systems. Springer Science & Business Media, 2006. [11] A.P. Dempster, N.M. Laird, and D.B. Rubin. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B., 39(1):1–38, 1977. [12] G. Ferrari-Trecate, M. Muselli, D. Liberati, and M. Morari. A clustering technique for the identification of piecewise affine systems. Automatica, 39(2):205–217, 2003. [13] M. Fridman. Hidden Markov model regression. Technical report, Institute of Mathematics, University of Minnesota, Minneapolis, MN, 1994. [14] M. Guidolin. Markov switching models in empirical finance. In Missing Data Methods: Time-Series Methods and Applications, pages 1–86. Emerald Group Publishing Limited, 2011. [15] Gurobi Optimization, Inc. Gurobi Optimizer Reference Manual, 2017. [16] T. Hastie, R. Tibshirani, and J. Friedman. The elements of statistical learning. Springer, New York, 2nd edition, 2009. [17] A.L. Juloski, W.P.M.H. Heemels, and G. Ferrari-Trecate. Data-based hybrid modelling of the component placement process in pick-and-place machines. Control Engineering Practice, 12(10):1241–1252, 2004. [18] A.L. Juloski, W.P.M.H. Heemels, G. Ferrari-Trecate, R.Vidal, S. Paoletti, and J.H.G. Niessen. Comparison of four procedures for the identification of hybrid systems. Lecture Notes in Computer Science, 3414:354–369, 2005. [19] S.M. Oh, J.M Rehg, T. Balch, and F. Dellaert. Learning and inferring motion patterns using parametric segmental switching linear dynamic systems. International Journal of Computer Vision, 77(1):103–124, 2008. [20] H. Ohlsson and L. Ljung. Identification of switched linear regression models using sum-of-norms regularization. Automatica, 49(4):1045–1050, 2013. 23 [21] N. Ozay, Mario M. Sznaier, and C. Lagoa. Model (in)validation of switched arx systems with unknown switches and its application to activity monitoring. In 49th IEEE Conference on Decision and Control, pages 7624–7630, Atlanta, GA, 2010. [22] V. Pavlovic, J.M. Rehg, and J. MacCormick. Learning switching linear models of human motion. In Advances in neural information processing systems, pages 981–987, 2001. [23] L.R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257–286, 1989. [24] B. Schuller, M. Wöllmer, T. Moosmayr, G. Ruske, and G. Rigoll. Switching linear dynamic models for noise robust in-car speech recognition. Pattern Recognition, pages 244–253, 2008. [25] A. Timmermann. Markov Switching Models in Finance, volume 4. John Wiley & Sons, Ltd, 2015. 24
3cs.SY
Global Pose Estimation with an Attention-based Recurrent Network arXiv:1802.06857v1 [cs.CV] 19 Feb 2018 Emilio Parisotto∗,1,2 , Devendra Singh Chaplot∗,1,2 , Jian Zhang1 , Ruslan Salakhutdinov1,2 ∗ Equal Contribution. 1 Apple Inc., 1 Infinite Loop, Cupertino, CA 95014, USA. 2 Carnegie Mellon University, 5000 Forbes Ave, Pittsburgh, PA 15213, USA. {eparisot,dchaplot}@cs.cmu.edu {jianz,rsalakhutdinov}@apple.com Abstract The ability for an agent to localize itself within an environment is crucial for many real-world applications. For unknown environments, Simultaneous Localization and Mapping (SLAM) enables incremental and concurrent building of and localizing within a map. We present a new, differentiable architecture, Neural Graph Optimizer, progressing towards a complete neural network solution for SLAM by designing a system composed of a local pose estimation model, a novel pose selection module, and a novel graph optimization process. The entire architecture is trained in an end-to-end fashion, enabling the network to automatically learn domain-specific features relevant to the visual odometry and avoid the involved process of feature engineering. We demonstrate the effectiveness of our system on a simulated 2D maze and the 3D ViZ-Doom environment. Figure 1. Components of the proposed model along with sample input, output and ground truth. The Local Pose Estimation model predicts the relative pose change between consecutive observations and Neural Graph Optimization model jointly optimizes the predictions of the Local Pose Estimation model to predict global pose changes. The local pose estimates, global pose estimates, and ground truth trajectory are shown in green, orange and blue, respectively. 1. Introduction The ability for an agent to localize itself within an environment is a crucial prerequisite for many real-world applications, such as household robots [42], autonomous drones [14], augmented and virtual reality applications, and video game AI [36]. In most cases, the main challenge for an agent localizing itself is that, the agent is not provided with a map of the environment and therefore the agent must simultaneously map the environment and localize itself within the incomplete map it has produced. A wide variety of algorithms to solve this Simultaneous Localization and Mapping (SLAM) task have been developed over a long history [42, 4], with modern methods achieving impressive accuracy and real-time performance [33, 25, 34, 12]. These methods still have several shortcomings, owing mainly to the hand-engineered features, dense matching, and heuristics used in the design of these algorithms. For example, most methods are brittle in certain scenarios, such as varying lighting conditions (e.g. changing time of day), differ- ent weather conditions or seasons [40], repetitive structures, textureless objects, extremely large viewpoint changes, dynamic elements within the environment, and faulty sensor calibration [4]. Because these situations are common in real-world scenarios, robust applications of those systems are difficult. In this paper, we develop a method which can be made more robust to the common situations where previous SLAM algorithms typically degrade. To do this, we formulate a novel neural network architecture called “Neural Graph Optimizer”. Neural Graph Optimizer consists of differentiable analogues of the common types of subsystems used in modern SLAM algorithms, such as a local pose estimation model, a pose selection module (key frame selection, essential graph), and a graph optimization process. Because each component in the system is differentiable, the entire architecture can be trained in an end-to-end fashion, 1 enabling the network to learn invariances to the types of scenarios observed during training. To demonstrate the ability of our method to learn pose estimation, we use trajectories sampled from several simulated environments. The first environment is a 2D maze where the agent has a single-pixel row-scan as input. We then scale the model up to 3D mazes based on the ViZDoom environment [21], where the agent receives an image of the first-person view of the world as input. ods focus on dense recontruction of the scene, for instance [47] builds dense globally consistent surfel-based maps of room scale environments explored using an RGB-D camera, without pose graph optimisation, while KinectFusion [35] obtains depth measurements directly using active sensors and fuse them over time to recover high-quality surface maps. These approaches still suffer from strict calibration and synchronization requirements, and the data association modules require extensive parameter tuning in order to work correctly for a given scenario. In light of the limitations of feature-based and direct approaches, deep networks are proposed to learn suitable feature representations that are robust against motion blur, occlusions, dynamic scenes, illumination, texture, and viewpoint changes. They have been successfully applied to several related multiview vision problems, including learning optical flow [11], depth [28], homography between frame pairs [9], and localization [5] and re-localization problems. Recent work includes re-formulating the localization problem as a classification task [46], a regression task [22, 44], end-to-end trainable filtering [18], and differentiable RANSAC [3]. More specifically, PlaNet [46] formulates localization as a classification problem, predicting the corresponding tile from a set of tiles subdividing Earth surface for a given image, thus providing the approximate position from which a photo was taken. PoseNet [22] formulates 6-DoF pose estimation as a regression problem. One drawback of the PoseNet approach is its relative inaccuracy, compared to state-of-the-art SIFT methods. Similarly, [30] fine-tunes a pretrained classification network to estimate the relative pose between two cameras. To improve its performance, [44] added Long-Short Term Memory (LSTM) units to the fully-connected layers output, to perform structured dimensionality reduction, choosing the most useful feature correlations for the task of pose estimation. From a different angle, DSAC [3] proposes a differentiable RANSAC so that a matching function that optimizes pose quality can be learned. These approaches are not robust to repeated structure or similar looking scenes, as they ignore the sequential and graphical nature of the problem. Addressing this limitation, work in [6] fused additional sequential inertial measurement with visual odometry. SemanticFusion [29] combines convolutional neural networks (CNNs) and a dense ElasticFusion [47]. However, classic feature-based methods still outperform CNN-based methods published to date in terms of accuracies. Recently, there has been an increasing interest in combining navigation and plannning in an end-to-end deep reinforcement learning (DRL) framework. The efforts to date can be divided into two categories depending on the presence of external memory in the architecture or not. Targetdriven visual navigation takes a visual observation and an image of the target [50] or range findings [41] as input, and 2. Related Work SLAM is a process in which an agent needs to localize itself in an unknown environment and build a map of this environment at the same time, with uncertainties in both its motions and observations. SLAM has evolved from filter-based to graph-based (optimization-based) approaches. Some EKF-based systems have demonstrated state-of-the-art performance, such as the Multi-State Constraint Kalman Filter [33], the VIN [23], and the system of Hesch et al. [19]. Those methods, even though efficient, heavily depend on linearization and Gaussian assumptions, and thus under-perform their optimization-based counterparts, such as OK-VIS [27], ORB-SLAM [34], and LSDSLAM [12]. Graph-based SLAM typically includes two main components: the front-end and the back-end. The front-end extracts relevant information (e.g. salient features) from the sensor data and associates each measurement to a specific map feature, while the back-end performs graph optimization on a graph of abstracted data produced by the front-end. Graph-based SLAM can be categorized either as featurebased or direct methods depending on the type of frontend. Feature-based methods rely on local features (e.g. SIFT, SURF, FAST, ORB, etc.) for pose estimation. For example, ORB-SLAM [34] performs data association and camera relocalization with ORB features and DBoW2 [16]. RANSAC [13] is commonly used for geometric verification and outlier rejection, and there are also prioritized feature matching approaches [39]. However, hand-engineered feature detector and descriptors are not robust to motion blur, illumination changes, or strong viewpoint changes, any of which can cause localization to fail. To avoid some of the aforementioned drawbacks of feature-based approaches, direct methods, such as LSDSLAM [12], utilize extensive photometric information from the images to determine the pose, by minimizing the photometric error between corresponding pixels. This approach is in contrast to feature-based methods, which minimize the reprojection error. However, such methods are usually not applicable to wide baseline settings [4] during large viewpoint changes. Recent work in [14] [15] combines feature and direct methods by minimizing the photometric error of features lying on intensity corners and edges. Some meth2 plans goal seeking actions in a 3D indoor simulated environment as the output. In simulated environments, [31] uses stacked LSTM in a goal-driven RL problem with auxilary tasks of depth prediction and loop-closure classification, while [48] added successor features to ease transfer from previously mastered navigation tasks to new ones. Work in [1] augmented DRL with Faster-RCNN for object detection and SLAM (ORBSLAM2) for pose estimation; observing images and depth from VizDoom, they built semantic maps with 3D reconstruction and bounding boxes as input to a RL policy. To deal with the limited memory of standard recurrent architures (such as LSTM) more structured external memories have been developed to take the spatial relations of memories into account. [17] assumes known ego-motion and constructs a metric egocentric multi-scale belief map (top-down-view latent representation of free space) of the world with a 2D spatial memory, upon which RL plans a sequence of actions towards goals in the environment with a value iteration network. Neural Map in [36] is a writable structured 2D external memory map for an agent to learn to navigate within 2D and 3D maze environments. These works all assume precise egomotion and thus perfect localization, a prerequisite that can rarely be met in real-world scenarios. Relaxing this assumption and resembling traditional occupancy grid SLAM, Neural SLAM [49] uses an occupancy-grid-like memory map, assuming only an initial pose is provided, and updates the pose beliefs and grid map using end-to-end DRL. One of key ingredient for the success of graph-based SLAM is the back-end optimization. The back-end builds the pose graph, in which two pose nodes share an edge if an odometry measurement is available between them, while a landmark and a robot-pose node share an edge if the landmark was observed from the corresponding robot pose. In pose graph optimization, the variables to be estimated are poses sampled along the trajectory of the robot, and each factor imposes a constraint on a pair of poses. Modern SLAM solvers exploit the sparse nature of the underlying factor graph and apply iterative linearization and optimization methods (e.g. nonlinear least squares via the Gauss-Newton or Levenberg-Marquardt algorithm). Several such solvers achieve excellent performance, for example, g2o [25], TSAM [8], Ceres, iSAM [20], SLAM++ [38], and recently [2] for optimization with semantic data association. The SLAM back-end offers a natural defense against data association and perceptual aliasing errors from the front-end, where similarly looking scenes, corresponding to distinct locations in the environment, would deceive place recognition. However, they depend heavily on linearization of the sensing and motion models, and require good initial guesses. Current systems can be easily induced to fail when either the motion of the robot or the environ- ment are too challenging (e.g. fast robot dynamics or highly dynamic environments) [4]. In this work we formulate a complete end-to-end trainable solution to the graph-based SLAM problem. We present a novel architecture that combines a CNN-based local front-end and an attention-based differentiable backend. We learn effective features automatically and perform implicit loop closure by designing an additional differentiable Neural Graph Optimizer to perform global optimization over entire pose trajectories and correct errors accumulated by the local estimation model. 3. Method The Neural Graph Optimizer architecture is split into distinct differentiable components. Similar to many of the previous methods, we split the process into local adjustments between temporally adjacent frames combined with a global optimization procedure which distributes error over the entire observed trajectory. As will be shown in the experiments, the global graph optimization procedure is critical to removing drift (the accumulation of small errors over long trajectories). The graph optimization procedure does this by learning to do loop closures, recognizing when the agent has revisted the same location, and enforcing a constraint that those poses should be nearly equal. The local model is crucial for providing a good starting point for the global optimization. It does this by estimating relative transformations between two temporally adjacent frames. By accumulating transformations from the start of the trajectory to the end, we can use this model to get the initial pose estimate within the global frame. The complete model architecture is shown in Fig. 2. We will describe relative poses as ∆P = (∆p1 , . . . , ∆pT ) with the first pose set as the origin, i.e. ∆p1 is the transformation from origin to pose 1, ∆p2 is the transformation from pose 1 to pose 2, and so on. These relative poses can be transformed into a global frame of reference by accumulating the relative pose changes along the trajectory, i.e. p1 = ∆p1 I, p2 = ∆p2 ∆p1 I, and so on. These global poses will be refered to as P = (p1 , . . . , pT ). There exists a differential function r2g = g2r−1 such that P = r2g(∆P ) and ∆P = g2r(P ). Each component is described in more detail in the next sections. 3.1. Local Pose Estimation Network The Local Pose Estimation network learns to predict the relative pose change between two consecutive frames. From two consecutive observations, where each observation is, for example, an RGB frame, this component predicts the xcoordinate, y-coordinate, and orientation (∆x, ∆y and ∆θ) of the second frame with respect to the first frame. It can also optionally take in side information, such as the action taken by the agent between the two frames. The architecture 3 Figure 2. The architecture of the proposed model, showing the Local Pose Estimation, the Pose Aggregation, and the Neural Graph Optimization modules. In addition to the pose features being aggregated into meta-pose features by the temporal convolution, we also compose all the local pose transformations that were predicted by the Local Pose Estimation model. This composition gives us an initial global pose estimate for each of the meta-poses. The combined meta-features and meta-poses are then passed onto the Neural Graph Optimization layer for the final global pose adjustments, as shown in Fig. 2. of the Local Pose Estimation network is shown in Fig. 3. Both frames are stacked and passed through a series of convolutional layers. The output of the convolutional layers is flattened and passed to two fully-connected layers that predict the translational and rotational pose change respectively. Some of the recent work showed that optical flow is useful in predicting frame-to-frame ego-motion [7]. The architecture of the Local Pose Estimation network is inspired by the architecture of Flownet [11] which predicts the optical flow between two frames. The convolutional layers in the Local Pose Estimation network are identical to the convolutional layers in Flownet. Prior work on visual odometry and visual inertial odometry has also used the convolutional layer architecture of Flownet [6, 45]. 3.3. Neural Graph Optimization The final component of our system is the “Neural Graph Optimizer”. This submodule aggregates information over the entire pose trajectory with the goal of redistributing error to minimize drift. The Neural Graph Optimizer model is a neural analogue of the global optimization procedures commonly used in traditional state-of-the-art SLAM packages, such the g2o framework [25]. We define the Neural Graph Optimizer as a recurrent network submodule which takes as input sequential pose features and outputs a refined estimate of these poses. In more detail, the Neural Graph Optimizer takes as input some initial T relative pose estimates (i.e. the aggregated output of the local pose estimation network) ∆P(0) =   (0) (0) ∆p1 , . . . , ∆pT and produces two outputs for each pose:   (1) (1) ∇P(1) = ∇p1 , . . . , ∇pT , and   (1) (1) β (1) = β1 , . . . , βT . 3.2. Pose Aggregation The next step of the architecture is a Pose Aggregation network which takes in a large number of low-level poses and pose features (up to 2000 for 2D, 1000 for 3D VizDoom environment) and reduces them into a smaller number of more temporally distant “meta-poses” and “meta-pose features” (around 250 for 2D, 125 for 3D VizDoom). These resulting meta-poses and meta-pose features are then passed to the Neural Graph Optimization procedure. For pose feature aggregation, we utilize a deep temporal convolutional network with several alternating layers of (kernel size 3, stride 1, padding 1) dimension-preserving convolutions and (kernel size 2, stride 2, padding 0) dimension-reducing max pooling (where each max pooling operation halves the sequence size). The number of times we halve the sequence length is a hyperparameter. Instead of temporal convolutions, we could have utilized recurrent networks, but we decided to focus on convolutions for computational and memory-efficiency reasons. New pose estimates are then constructed by performing an iterative update: (1) (0) (1) (1) ∆pi = ∆pi + βi ∇pi . The Neural Graph Optimizer procedure can then be rerun (1) (1) on the new pose estimates ∆P(1) = (∆p1 , . . . , ∆pT ) 4 Figure 3. The architecture of the Local Pose Estimation network. The architecture of the convolutional layers is adapted from the architecture of the Flownet [11]. (2) (2) to produce ∆P(2) = (∆p1 , . . . , ∆pT ), and so on. The process is repeated until some pre-specified number of iterations M has taken place. We then transform the refined relative pose estimates into the final global output: P(M ) = r2g(∆P(M ) ). The specific architecture of the Neural Graph Optimizer is based on two priors that are intuitively useful for pose optimization. The first prior is the notion that poses that are temporally adjacent should have similar outputs, while the second prior is that visually similar but temporally disparate poses should also have similar outputs since this provides a hint that a place has been revisited, thereby potentially enabling a loop closure-like correction of drift. We express these priors by using two architectural systems in the Neural Graph Optimizer. The first is a Transformer-like [43] attention phase where information is propagated over the entire sequence, and the second is a convolutional phase where local temporal information is aggregated. 3.3.1 where the superscripts (i − 1) were omitted for clarity of notation. This produces a sequence of attention (i−1) (i−1) vectors (a1 , . . . , aT ), which are passed along with (i−1) (i−1) (f1 , . . . , fT ) to the next “Optimization” phase. 3.3.2 The optimization phase aggregates local temporal information by passing the pose features through several temporal convolutions and is responsible for producing the iterative (i) (i) (i) (i) adjustments: {∇p1 , . . . , ∇pT } and {β1 , . . . , βT }. The optimization phase proceeds as follows: First, the attention and feature vectors are concatenated into a new sequence of features: " # " #! (i−1) to produce the current iteration’s adjustments (∇P(i) and β (i) ) as well as the feature layer for the next iteration of the process (F(i) ). For our experiments, we use 9 layers of convolutions with filter size 3 and ReLU activations. While temporal convolutions have a limited receptive field which provides a hard upper limit on how far they can transmit information across time, we found that in practice they worked better than using a bidirectional LSTMs. 3.3.3 Ctu = hqt , fu i, Ctu αtu = PT , v=1 Ctv αtu . These features are then passed through several layers of 1D convolutions hl and activations σl :  (i)  #! !! " # " F (i−1) (i−1) f f 1 T ∇P(i)  = σL hL ... h1 ... (i−1) (i−1) ... a a (i) 1 T β Suppose there is a meta-pose sequence of T steps, processed by the pose aggregation network into an initial set (0) (0) of features at each time step: F(0) = (f1 , . . . , fT ). The attention phase computes, for each pose, a soft-attention operation over the entire trajectory. This attention operation allows each pose to query information over long time spans. The attention phase takes as input the pose fea(i−1) (i−1) ture sequence (f1 , . . . , fT ) and produces for each (i−1) (i−1) time step a query vector: (q1 , . . . , qT ) using a fully(i−1) connected layer. Then, for each query vector qt , a softattention operation is carried out to produce an attention (i−1) vector at as follows: T X (i−1) f1 fT (i−1) , . . . , (i−1) a1 aT Attention Phase at = Optimization Induced Attention Graph We now provide some intuition on why the attention phase enables higher performance than only using the optimization phase, or running all pose features through bidirectional LSTMs. We can see that during the attention phase, some similarity graph C is constructed such that each element Ctu is the inner product between the query vector qt fu , v=1 5 300 300 250 250 200 200 150 groundtruth predicted (opt) predicted (unopt) 100 150 100 50 50 0 −100 0 100 200 300 300 250 250 100 150 100 200 300 100 200 300 groundtruth predicted (opt) predicted (unopt) 50 0 0 0 RMSE 17.80 10.21 3.16 100 200 groundtruth predicted (opt) predicted (unopt) 150 50 Results on the 2D Environment Model Only Local Estimation Global Estimation - 1 Attend-Opt iteration Global Estimation - 5 Attend-Opt iterations 0 300 200 Figure 4. Left: A screenshot of the 2D environment based on Box2D. Right: A bird’s eye view of the 3D environment based on the Doom game engine. groundtruth predicted (opt) predicted (unopt) 0 100 200 300 0 Figure 5. Images visually demonstrating the effect on pose estimates of adding the Neural Graph Optimizer module on top of the local pose estimation model in the 2D environment. We can see that the global optimization procedure greatly reduces drift. These figures were generated with the 5 iteration Neural Graph Optimization model. Table 1. Results for different Neural Graph Optimizer architectures and hyperparameters, in terms of test set Global RMSE. We can see that the addition of the global optimization procedure reduces the loss by more than 80% as compared to solely using the local pose model. rays uniformly in front of itself with an effective field of view of 300◦ . The observation of the agent includes the RGB values as well as the depth of the points where these rays hit a wall. An example of the 2D environment is shown in Fig. 4. Each cell in the maze has a random color. The agent can take one of three discrete actions at every time step: move-forward, turn-left, or turn-right. These actions result in translational acceleration if the action is moveforward or angular acceleration if the action is turn-left or turn-right. Data is collected by visiting four different corners on the maze using Dijkstra’s algorithm [10]. and the pose feature vector fu . Therefore C represents a similarity matrix between the queries and pose features, and those with very similar features will thus have high information bandwidth through the attention operator because the attention weight αtu will be near 1 for highly similar query and pose features, and near 0 otherwise. The attention operation is thus inducing a connectivity graph between poses with highly similar features. This therefore resembles a soft, differentiable analogue of the pose graph constructed in SLAM algorithms such as ORB-SLAM [34]. For this environment, the training data is generated by worker threads in parallel with the model training and each training datapoint is used only once. A test set is fixed and common for all experiments. Each epoch of training consists of 200, 000 datapoints. The error metric is Root Mean Squared Error (RMSE) in pose estimation. 4. Experiments We use two simulation environments for our experiments, a 2D environment based on Box2D and a 3D environment based on the Doom game engine. To train the system, we pretrained the local pose estimation model and then trained the global optimizer with the local pose model held fixed. This was mainly due to the large sequence lengths we were required to process (on the order of 1000 time steps). This limited the amount of sequences we could process due to the large memory requirements. Training the system in stages enabled us to preprocess the sequence images into a far more memory-efficient compressed representation. To improve upon the results produced by the local pose estimation model, we train a Neural Graph Optimizer on the pose outputs of a pretrained Local Pose Estimation model. For the 2D environment, as shown in Table 1, we observed over 80% improvement in the correction of drift compared to using only the local pose estimation model, as measured by the root mean squared error loss. We can see that increasing the number of iterations (applying the attention operator and then the temporal aggregation operator) improved results from 1 to 5 iterations. We show some sample trajectories in Fig. 5 before and after the Neural Graph Optimizer procedure. 4.1. 2D Environment For the 2D Environment, random maze designs are generated using Prim’s algorithm [37], and the environment is created using Box2D (box2d.org). The agent projects 241 6 Results on the 3D Doom Environment Seen % Err. Trans. % Err. Rot. Only Local Estimation 1.65 0.117 Global Estimation - 1 Attend-Opt iteration 1.42 0.071 Global Estimation - 5 Attend-Opt iterations 1.25 0.057 DeepVO [45] 1.78 0.079 Model Unseen % Err. Trans. % Err. Rot. 1.62 0.122 1.16 0.071 1.04 0.056 2.39 0.091 Table 2. Results for different Neural Graph Optimizer architectures and hyperparameters, in terms of % translation and rotation error on maps either seen or unseen during training time. We can see that the addition of the global optimization procedure reduces error significantly compared to using only the local pose model. In addition, increasing the number of attention iterations provides an increase in performance. Translational RMSE Ratio during training 4.2. 3D Environment Rot RMSE Ratio ( ∘ /m∘ Trans RMSE Ratio (%) 1.5 For the 3D Environment, random maze designs are generated using the Kruskal’s algorithm [24], and the environment is created using the ViZDoom API [21]. The agent observes the environment in a first-person view with a fieldof-view of 108◦ . An example of the 3D environment design is shown in Fig. 4. Similr to the 2D environment, the pose predictions are 3-dimensional tuples (x, y, angle) and the agent can take one of three discrete actions at every time step: move-forward, turn-left, or turn-right, which results in translational or angular acceleration. For collecting data in this environment, a navigation network [26] is trained to maximize the distance travelled by the agent using the Asynchronous Advantage Actor-Critic algorithm [32]. The data is collected by using the policy learned by the navigation network. Like the 2D environment, the training data is generated by worker threads in parallel with the model training, and each training datapoint is used only once. We additionally sample two test sets, one containing 39 trajectories sampled from maze geometries that were seen during training and one containing 39 trajectories sampled from novel maze geometries that the agent had not encountered during training. 4.2.1 Rotational RMSE Ratio during training 0.12 1.6 1.4 1.3 1.2 1.1 1.0 0 2000 4000 6000 Epoch 8000 10000 12000 0.11 0.10 local een global een local un een global un een 0.09 0.08 0.07 0.06 0.05 0 2000 4000 6000 Epoch 8000 10000 12000 Figure 6. Training curves for Doom over 13, 000 updates for the 5 iteration Attend-Opt model. We show the performance on both seen and unseen test sets as training progress. The dotted line represents the estimate provided by using only the local model. We can see there is a large reduction in error when making use of the global optimizer. The baseline DeepVO [45] is one of the state-of-the-art methods using deep neural nets for monocular visual odometry. It stacks 2 consecutive frames and passes them through 9 convolutional layers followed by 2 LSTM layers to estimate the pose changes. As compared to the proposed Local Pose Estimation model which observes only the last 2 frames at the time, the DeepVO model can potentially utilize information from all the prior frames using the LSTM layer. However, the DeepVO model does not correct its previous predictions as it observes new information. The Neural Graph Optimizer has the ability to correct its predictions using the Attention operation and consequently leads to improved performance. Results Results are shown in Table 2. Here we report % Error in Translation and Rotation for seen/unseen mazes, where the accumulated drift error is divided by the entire distance traveled in each trajectory. Observe that the local model is significantly improved by using global optimization and performance of the global model improves as we increase the number of Attend-Opt iterations from 1 to 5. The global model outperforms the DeepVO [45] baseline on both the test sets. Additionally, we can clearly see that the model itself does not overfit to the training environments it experienced, and gets similar or even lower error on unseen test mazes. Learning curves are shown in Fig 6. We can see that performance plateaus decrease significantly early on and then progress is much slower after around 2000 updates. 4.2.2 Analysis We next plot the total rotational and translational errors as a function of number of steps in the trajectory in Figures 7 (for unseen mazes) and 8 (for seen mazes). The global model reduces the slope of the rate of increase of both translational and rotation errors as compared to the local estimates. Figures 9 and 10 display the ratio of the translational (left) and rotational (right) drift error over distance traveled. We can see from these plots that the trend is negative, meaning that drift accumulates much slower than the distance being traveled. This indicates that the model is likely to generalize well to arbitrarily long trajectories. Additionally, in all plots, we can see a clear ordering of the performance of 7 Figure 9. Ratio of the Translational (Left) and Rotational (Right) RMSE to the distance travelled as a function of number of images in the trajectory in unseeen mazes. Figure 7. Translational (Left) and Rotational (Right) RMSE as a function of number of images in the trajectory in unseen mazes. Figure 8. Translational (Left) and Rotational (Right) RMSE as a function of number of images in the trajectory in seen mazes. Figure 10. Ratio of the Translational (Left) and Rotational (Right) RMSE to the distance travelled as a function of number of images in the trajectory in seen mazes. the models, where the local model performs worst, one iteration of Attend-Opt increases model performance significantly, and increasing the number of Attend-Opt iterations to 5 further increases model performance. The plots in Figures 7 and 8 as well as the numbers in Table 2 show that the improvement in rotational errors due to the neural optimization is higher than the improvement in translation errors. Fig 11 shows sample trajectories with estimates of both global and local pose estimates. As seen in the figure, the neural graph optimizer considerably improves the rotation estimates, consequently leading to significant improvements in the drift reduction. 14 groundtruth predicted (opt) predicted (unopt) 12 groundtruth predicted (opt) predicted (unopt) 8 10 6 8 4 6 2 4 0 2 −2 0 −2 −17.5 −15.0 −12.5 −10.0 −7.5 10 −2.5 0.0 2.5 −4 −2.5 0.0 2.5 5.0 7.5 10.0 20.0 groundtruth predicted (opt) predicted (unopt) 8 5. Conclusion −5.0 12.5 15.0 groundtruth predicted (opt) predicted (unopt) 17.5 15.0 12.5 6 10.0 4 In this paper, we designed a novel attention-based architecture to perform an end-to-end trainable global pose estimation. Compared to the previous work on using deep networks to do pose estimation, our method uses an attention operation to re-estimate its trajectory at each time step and therefore enables iterative refinement of the quality of its estimates as more data is available. We demonstrate the benefit of the model on two simulators, the first is a topdown 2D maze world and the second is a 3D random maze environment running the Doom engine. Our results show that our method has an increased performance compared to models which used only temporally local information. The proposed method can be further extended to a complete end-to-end graph-based SLAM system by adding a relocalization module which uses pose features to relocalize in a known map [5]. It can also be extended to an Active SLAM system where the agent also decides the actions, in order to map the environment as fast as possible. 7.5 5.0 2 2.5 0.0 0 −4 −2 0 2 4 6 8 10 −5 0 5 10 15 Figure 11. Images visually demonstrating the effect on pose estimates of adding the Neural Graph Optimizer module on top of the local pose estimation model in the 3D environment. We can see that the global optimization procedure greatly reduces drift. These figures were generated with the 5 iteration Neural Graph Optimization model. The agent always starts at the origin (0, 0). Acknowledgments We thank Tim Barfoot and Russ Webb for helpful comments and discussions. We would also like to thank Barry Theobald and Megan Maher for helpful feedback on the manuscript. 8 References [16] D. Gálvez-López and J. D. Tardos. Bags of binary words for fast place recognition in image sequences. IEEE Transactions on Robotics, 28(5):1188–1197, 2012. [17] S. Gupta, J. Davidson, S. Levine, R. Sukthankar, and J. Malik. Cognitive mapping and planning for visual navigation. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 2616–2625, 2017. [18] T. Haarnoja, A. Ajay, S. Levine, and P. Abbeel. Backprop kf: Learning discriminative deterministic state estimators. In Advances in Neural Information Processing Systems, pages 4376–4384, 2016. [19] J. A. Hesch, D. G. Kottas, S. L. Bowman, and S. I. Roumeliotis. Camera-imu-based localization: Observability analysis and consistency improvement. The International Journal of Robotics Research, 33(1):182–201, 2014. [20] M. Kaess, H. Johannsson, R. Roberts, V. Ila, J. J. Leonard, and F. Dellaert. isam2: Incremental smoothing and mapping using the bayes tree. The International Journal of Robotics Research, 31(2):216–235, 2012. [21] M. Kempka, M. Wydmuch, G. Runc, J. Toczek, and W. Jaśkowski. Vizdoom: A doom-based ai research platform for visual reinforcement learning. In Computational Intelligence and Games (CIG), 2016 IEEE Conference on, pages 1–8. IEEE, 2016. [22] A. Kendall, M. Grimes, and R. Cipolla. Posenet: A convolutional network for real-time 6-dof camera relocalization. In Proceedings of the IEEE international conference on computer vision, pages 2938–2946, 2015. [23] D. G. Kottas, J. A. Hesch, S. L. Bowman, and S. I. Roumeliotis. On the consistency of vision-aided inertial navigation. In Experimental Robotics, pages 303–317. Springer, 2013. [24] J. B. Kruskal. On the shortest spanning subtree of a graph and the traveling salesman problem. Proceedings of the American Mathematical society, 7(1):48–50, 1956. [25] R. Kümmerle, G. Grisetti, H. Strasdat, K. Konolige, and W. Burgard. g 2 o: A general framework for graph optimization. In Robotics and Automation (ICRA), 2011 IEEE International Conference on, pages 3607–3613. IEEE, 2011. [26] G. Lample and D. S. Chaplot. Playing fps games with deep reinforcement learning. In AAAI, pages 2140–2146, 2017. [27] S. Leutenegger, S. Lynen, M. Bosse, R. Siegwart, and P. Furgale. Keyframe-based visual–inertial odometry using nonlinear optimization. The International Journal of Robotics Research, 34(3):314–334, 2015. [28] F. Liu, C. Shen, and G. Lin. Deep convolutional neural fields for depth estimation from a single image. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 5162–5170, 2015. [29] J. McCormac, A. Handa, A. Davison, and S. Leutenegger. Semanticfusion: Dense 3d semantic mapping with convolutional neural networks. In Robotics and Automation (ICRA), 2017 IEEE International Conference on, pages 4628–4635. IEEE, 2017. [30] I. Melekhov, J. Ylioinas, J. Kannala, and E. Rahtu. Relative camera pose estimation using convolutional neural networks. In International Conference on Advanced Concepts for Intelligent Vision Systems, pages 675–687. Springer, 2017. [1] S. Bhatti, A. Desmaison, O. Miksik, N. Nardelli, N. Siddharth, and P. H. Torr. Playing doom with slamaugmented deep reinforcement learning. arXiv preprint arXiv:1612.00380, 2016. [2] S. L. Bowman, N. Atanasov, K. Daniilidis, and G. J. Pappas. Probabilistic data association for semantic slam. In Robotics and Automation (ICRA), 2017 IEEE International Conference on, pages 1722–1729. IEEE, 2017. [3] E. Brachmann, A. Krull, S. Nowozin, J. Shotton, F. Michel, S. Gumhold, and C. Rother. Dsac-differentiable ransac for camera localization. In IEEE Conference on Computer Vision and Pattern Recognition (CVPR), volume 3, 2017. [4] C. Cadena, L. Carlone, H. Carrillo, Y. Latif, D. Scaramuzza, J. Neira, I. Reid, and J. J. Leonard. Past, present, and future of simultaneous localization and mapping: Toward the robust-perception age. IEEE Transactions on Robotics, 32(6):1309–1332, 2016. [5] D. S. Chaplot, E. Parisotto, and R. Salakhutdinov. Active neural localization. In International Conference on Learning Representations (ICLR), 2018. [6] R. Clark, S. Wang, H. Wen, A. Markham, and N. Trigoni. Vinet: Visual-inertial odometry as a sequence-to-sequence learning problem. In AAAI, pages 3995–4001, 2017. [7] G. Costante, M. Mancini, P. Valigi, and T. A. Ciarfuglia. Exploring representation learning with cnns for frame-to-frame ego-motion estimation. IEEE robotics and automation letters, 1(1):18–25, 2016. [8] F. Dellaert. Factor graphs and gtsam: A hands-on introduction. Technical report, Georgia Institute of Technology, 2012. [9] D. DeTone, T. Malisiewicz, and A. Rabinovich. Deep image homography estimation. arXiv preprint arXiv:1606.03798, 2016. [10] E. W. Dijkstra. A note on two problems in connexion with graphs. Numerische mathematik, 1(1):269–271, 1959. [11] A. Dosovitskiy, P. Fischer, E. Ilg, P. Hausser, C. Hazirbas, V. Golkov, P. van der Smagt, D. Cremers, and T. Brox. Flownet: Learning optical flow with convolutional networks. In Proceedings of the IEEE International Conference on Computer Vision, pages 2758–2766, 2015. [12] J. Engel, T. Schöps, and D. Cremers. Lsd-slam: Large-scale direct monocular slam. In European Conference on Computer Vision, pages 834–849. Springer, 2014. [13] M. A. Fischler and R. C. Bolles. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography. In Readings in computer vision, pages 726–740. Elsevier, 1987. [14] C. Forster, M. Pizzoli, and D. Scaramuzza. Svo: Fast semidirect monocular visual odometry. In Robotics and Automation (ICRA), 2014 IEEE International Conference on, pages 15–22. IEEE, 2014. [15] C. Forster, Z. Zhang, M. Gassner, M. Werlberger, and D. Scaramuzza. Svo: Semidirect visual odometry for monocular and multicamera systems. IEEE Transactions on Robotics, 33(2):249–265, 2017. 9 [31] P. Mirowski, R. Pascanu, F. Viola, H. Soyer, A. Ballard, A. Banino, M. Denil, R. Goroshin, L. Sifre, K. Kavukcuoglu, et al. Learning to navigate in complex environments. arXiv preprint arXiv:1611.03673, 2016. [32] V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. Lillicrap, T. Harley, D. Silver, and K. Kavukcuoglu. Asynchronous methods for deep reinforcement learning. In International Conference on Machine Learning, pages 1928–1937, 2016. [33] A. I. Mourikis and S. I. Roumeliotis. A multi-state constraint kalman filter for vision-aided inertial navigation. In Robotics and automation, 2007 IEEE international conference on, pages 3565–3572. IEEE, 2007. [34] R. Mur-Artal, J. M. M. Montiel, and J. D. Tardos. Orb-slam: a versatile and accurate monocular slam system. IEEE Transactions on Robotics, 31(5):1147–1163, 2015. [35] R. A. Newcombe, S. Izadi, O. Hilliges, D. Molyneaux, D. Kim, A. J. Davison, P. Kohi, J. Shotton, S. Hodges, and A. Fitzgibbon. Kinectfusion: Real-time dense surface mapping and tracking. In Mixed and augmented reality (ISMAR), 2011 10th IEEE international symposium on, pages 127– 136. IEEE, 2011. [36] E. Parisotto and R. Salakhutdinov. Neural map: Structured memory for deep reinforcement learning. arXiv preprint arXiv:1702.08360, 2017. [37] R. C. Prim. Shortest connection networks and some generalizations. Bell Labs Technical Journal, 36(6):1389–1401, 1957. [38] R. F. Salas-Moreno, R. A. Newcombe, H. Strasdat, P. H. Kelly, and A. J. Davison. Slam++: Simultaneous localisation and mapping at the level of objects. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 1352–1359, 2013. [39] T. Sattler, B. Leibe, and L. Kobbelt. Efficient & effective prioritized matching for large-scale image-based localization. IEEE transactions on pattern analysis and machine intelligence, 2016. [40] T. Sattler, W. Maddern, A. Torii, J. Sivic, T. Pajdla, M. Pollefeys, and M. Okutomi. Benchmarking 6dof urban visual localization in changing conditions. arXiv preprint arXiv:1707.09092, 2017. [41] L. Tai, G. Paolo, and M. Liu. Virtual-to-real deep reinforcement learning: Continuous control of mobile robots for mapless navigation. In Intelligent Robots and Systems (IROS), 2017 IEEE/RSJ International Conference on, pages 31–36. IEEE, 2017. [42] S. Thrun, W. Burgard, and D. Fox. Probabilistic robotics. MIT press, 2005. [43] A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, Ł. Kaiser, and I. Polosukhin. Attention is all you need. In Advances in Neural Information Processing Systems, pages 6000–6010, 2017. [44] F. Walch, C. Hazirbas, L. Leal-Taixé, T. Sattler, S. Hilsenbeck, and D. Cremers. Image-based localization with spatial lstms. CoRR, abs/1611.07890, 2016. [45] S. Wang, R. Clark, H. Wen, and N. Trigoni. Deepvo: Towards end-to-end visual odometry with deep recurrent [46] [47] [48] [49] [50] 10 convolutional neural networks. In Robotics and Automation (ICRA), 2017 IEEE International Conference on, pages 2043–2050. IEEE, 2017. T. Weyand, I. Kostrikov, and J. Philbin. Planet-photo geolocation with convolutional neural networks. In European Conference on Computer Vision, pages 37–55. Springer, 2016. T. Whelan, R. F. Salas-Moreno, B. Glocker, A. J. Davison, and S. Leutenegger. Elasticfusion: Real-time dense slam and light source estimation. The International Journal of Robotics Research, 35(14):1697–1716, 2016. J. Zhang, J. T. Springenberg, J. Boedecker, and W. Burgard. Deep reinforcement learning with successor features for navigation across similar environments. arXiv preprint arXiv:1612.05533, 2016. J. Zhang, L. Tai, J. Boedecker, W. Burgard, and M. Liu. Neural SLAM. CoRR, abs/1706.09520, 2017. Y. Zhu, R. Mottaghi, E. Kolve, J. J. Lim, A. Gupta, L. FeiFei, and A. Farhadi. Target-driven visual navigation in indoor scenes using deep reinforcement learning. In Robotics and Automation (ICRA), 2017 IEEE International Conference on, pages 3357–3364. IEEE, 2017.
1cs.CV
ANGLE CONSTRAINED PATH TO CLUSTER MULTIPLE MANIFOLDS Amir Babaeian University of California, San Diego Abstract. In this paper, we propose a method to cluster multiple intersected manifolds. The algorithm chooses several landmark nodes randomly and then checks whether there is an angle-constrained path between each landmark node and every other node in the neighborhood graph. When the points lie on different manifolds with intersection they should not be connected using a smooth path, thus the angle constraint is used to prevent connecting points from one cluster to another one. The resulting algorithm is implemented as a simple variation of Dijkstra’s algorithm used in Isomap. However, Isomap was specifically designed for dimensionality reduction in the single-manifold setting, and in particular, cannot handle intersections. Our method is simpler than the previous proposals in the literature and performs comparably to the best methods, both on simulated and some real datasets. 1 Introduction Since last decade, the amount of collected data is increasing exponentially. Data mining techniques represent each data sample with an extracted very high-dimensional fea-ture vector. However, the intrinsic dimension of these features is much smaller that the dimension of ambient space. Precisely, the features are sampled from the surface of a low-dimensional manifold embedded in the ambient space [7, 19]. The most wellknown manifold learning algorithms such as Locally Linear Embedding (LLE) [16], Laplacian Eigenmap (LE) [2], and Isomap [18]. All these methods assume that the data is coming from a single manifold. However, this assumption is not correct in many application such as video segmentation [5], where the data is sampled from multiple intersected manifolds. However, clustering the data points into several intersected man-ifolds is itself a challenging problem. In this work, we consider the problem of clustering data points sampled from the vicinity of multiple intersected manifolds embedded in ambient space. Here, we focus on a nonparametric approach based on the assumption that the manifolds are smooth. See Fig. 1. Related works in the area are based on different assumptions. Most methods are designed for the cases where the surfaces do not intersect [15, 14, 6], while others work only when the surfaces that intersect have different intrinsic dimension or density [8, 12]. The method of [1] is only able to separate intersecting curves. Methods that pur-posefully aim at resolving intersections are fewer. [17] implement some variant of K-means where the centers are surfaces. [11] propose to minimize a (combinatorial) en-ergy that includes local orientation information, using a tabu search. The state-of-the-art (a) (b) Fig. 1. Simulated data illustrating the problem of multi-manifold clustering; (a) A sample 3D data containing three intersected manifolds; (b) three clustered manifolds as the output of the proposed method. methods work based on local principal component analysis (PCA). An early proposal was the elaborate multi-scale spectral method of [13], while the clustering routine of [9], developed in the context of semi-supervised learning, inspired by the works of [20] and [10]. Here, we propose a markedly different approach based on connecting points to landmarks via angle-constrained paths. It can be seen as a constrained variant of Isomap [18]. Isomap was specifically designed for dimensionality reduction in the single-manifold setting, and in particular, cannot handle intersections. The angle con-straint on paths is there to prevent connecting points from one cluster to points from a different, intersecting cluster. The resulting algorithm is implemented as a simple varia-tion of Dijkstra’s algorithm. The experimental results, conducted on both synthetic and real real data sets, confirm that our method performs comparably to the state-of-the-art methods. The rest of the paper is organized as follows. In Section 2, we describe in detail the problem of multi-manifold clustering followed by discussing the methods of [17] and [20], as well as the subspace clustering method of [4], which will serve as bench-marks in our experiments. In Section 3 we motivate and describe our proposed method. In Section 4, we present some numerical experiments on synthetic and real data sets. Finally, in Section 5, we draw our conclusion. 2 Multi-Manifold Clustering D We observe points x1, . . . , xN in a Euclidean space R , with D ≥ 2, that are assumed D to be sampled from the vicinity of embedded submanifolds S1, . . . , SK ⇢ R . The surfaces are assumed to be compact and smooth — defined here as having bounded maximum pointwise curvature and a boundary (if any) satisfying the same property — and may be of possibly different intrinsic dimensions. The points are independent and identically drawn from a mixture distribution supported in the neighborhood of the surfaces. A simple model assumes KX k x i = s i + z i, s i ⇠ =1 ⇡kµSk kzik ⌧, (1) where µS denotes the uniform distribution over S. (s ⇠ µ means Pthat the random point s has distribution µ.) The mixture weights satisfy ⇡i ≥ 0 and k ⇡k = 1, and zi is a uniform noise bounded by ⌧ . Let Ik index the points si that were sampled from surface Sk, meaning Ik = {i : si ⇠ µSk }. Note that I1, . . . , IK forms a partition of the data. (This implicitly assumes there are no outliers, which we take to be the case in this pa-per.) The goal of multi-manifold clustering is to recover this partition up to permutation of {1, . . . , K}. We note that the term ’submanifold’ is unduly restrictive for us since we allow the underlying surfaces to self-intersect. Our method works essentially as well on such surfaces as on sub-manifolds. See 2. (a) (b) Fig. 2. Simulated data illustrating our method working well in a case where the underlying sur-faces self-intersect. Left: data. Right: output from our method. We also note that, when the underlying surfaces are allowed to intersect, some sort of smoothness assumption seems necessary in a nonparametric setting like ours, for otherwise the clustering objective is ambiguous — think of a T-intersection. Authors in [17] suggest an algorithm that mimics K-means algorithm by replacing centroid points with centroid sub-manifolds. The method starts like Isomap by build-ing a neighborhood graph and computes the shortest path distances within the graph. In [20], dissimilarity is used to factor the Euclidean distance and the discrepancy between the local orientation of the data. The surfaces are assumed to be of same dimen-sion d known to the user. We chose the subspace clustering method of [4] among a few other methods that perform well in this context.In [4], people proposed a spectral method for subspace clustering based on the affinity of underlying manifolds. 3 Approach Our algorithm is quite distinct from all the other methods for multi-manifold clustering we are aware of, although it starts by building a q-nearest neighbor graph like many others. The idea is very simple and amounts to clustering together points that are connected by an angle-constrained path in the neighborhood graph. For an angle ✓ 2 [0, ⇡], 1 m −−−−− ! −−−−−tt! we say that a path (xi , . . . , xi ) is ✓-constrained if (x i − xi , x i xi ) ✓ for all t = 2, . . . , m − 1. The rationale is the following. Take two surfaces S1 and S2 intersecting at a strictly positive angle. Then for ‘most’ pairs of data points xi1 2 S1 and xi2 2 S2, a path in the graph going from xi1 to xi2 has at least one large angle between two successive edges, on the order of the incidence angle between the surfaces; while for ‘most’ pairs of data points xi1 , xi2 2 S1, there is a path with all angles between successive edges relatively small. To speedup the implementation, we select M landmarks (with M slightly larger than K) at random among the data points and only identify what data points are con-nected to what landmark via a ✓-constrained path in the graph. M and ✓ are parameters of the algorithm. Let ⇠`i = 1 if point i and landmark ` are connected that way, and ⇠`i = 0 if not. We use ⇠ i := (⇠`i : ` = 1, . . . , M) as feature vectors that we group together and cluster using hierarchical clustering with complete linkage. \ t1 t +1 3.1 Computational Complexity Building a symmetric q-nearest neighbor graph using cover trees [3] takes order O(qN log N), where the implicit constant depends exponentially on the intrinsic dimensions of the surfaces and linearly on the ambient dimension D. The angle-constrained pathfinder routine is a simple variant of Dijkstra’s algorithm, whose implementation by Fibonacci heaps runs in O(qN log N) . Hence, calling this routine once for each landmark costs O(qM N log N). Grouping the feature vectors O(F M N) and then clustering them by 2 complete linkage costs O(F log F ), where F is the (data-dependent) number of distinct feature vectors ⇠i, often of the order of K in our experiments. Algorithm 1 Path-Based Clustering (PBC) Input: data (xi); parameters q, K, M,✓ Build q-nearest neighbor graph Choose M landmarks are random for i = 1 to n do For each landmark xˆ`, identify which points xi it is connected to via a ✓constrained path in the graph, and set ⇠`i = 1 if so, and ⇠`i = 0 otherwise. end for Group and then apply hierarchical clustering to the feature vectors ⇠1, . . . , ⇠n to find K clus-ters, where ⇠i := (⇠`i : ` = 1, . . . , M). (a) (b) (c) (d) (e) (f) (g) (h) Fig. 3. Result of our method on 8 synthetic datasets. 4 Experiments In this section, we compare the performance of our methods with those described in 2 on various synthetic and real data sets. 4.1 Synthetic Data The synthetic datasets we generated are similar to those appearing in the literature. They are Three Planes (TP), Two Spirals (TSI), Five Segments (FS), Dollar-Sign, Plane and Roll (DSPR), Roll and Plane (RP), Cone and Plane (CP), Two Spheres (TSH), Rose Curve and Circle (RCC). Figure 3 shows the result of our method on eight synthetic datasets, with good performance in all cases. The misclustering rates for our method, and the other three methods, are presented in Table 1, where we see that our method achieves a performance at least comparable to the best of the other three methods on each dataset. Spectral Curvature Clustering (SCC) works well on linear manifolds (as expected) while it fails when there is curvature. See Fig. 4(a). KManifolds fails in the more complicated examples. We found that this algorithm is very slow since it has to compute the shortest path between all the points, so that we could not apply it to some of the largest datasets. We mention that it assumes that clusters intersect, and otherwise does not work properly. Fig. 4(b) and Fig. 4(c) shows two cases where K-Manifolds fails. Our method and Spectral Multi-Manifolds Clustering (SMMC) perform compa-rably on most datasets, but SMMC fails in the Rose Curve and Circle example shown in 4(d). We note that K-Manifold, SCC and SMMC all require that all surfaces are of same dimension, which is a parameter of these methods, why our method does not need knowledge of the intrinsic dimensions of the surfaces and can operate even when these are different. Table 1. Clustering accuracy on synthetic data. DATA SET K-MANIFOLDS TP 95.1% TSI 95.2% FS 59.1% DSPR 46.1% RP 53.5% CP TS RCC 62.9% SCC SMMC PBC 98.8% 99.3% 93.0% 54.8% 99.6% 98.2% 94.9% 99.6% 98.1% - 99.4% 97.5% - 95.6% 94.6% - 99.3% 94.9% - 95.5% 97.9% - 64.7% 99.4% 4.2 Real Data We applied our method on the COIL-20 dataset which includes 1440 gray-scale images of the size 128 ⇥ 128 pixels from 20 objects. Each object contains 72 images taken from different view points. We first projected the data set onto the top 10 principal (a) (b) (c) (d) Fig. 4. (a) An example where SCC fails; (b-c) examples where K-Manifolds fails; (d) An example where SMMC fails. components, then applied our path-based clustering algorithm. We tested our method on the three very similar objects 3, 6 and 19. The algorithm is 99% accurate (misclusters are only 2 images out of 216) bringing a significant improvement over the state-of-the-art result of 70% reported in [20]. Lastly, we evaluated our method on the whole dataset obtaining an 83.6% accuracy, improving on the 70.7% accuracy reported in [20]. Since in this case we have 20 different classes, we increased the number of landmarks to 100 to make sure we have sampled at least a few landmarks from each class. In 5, we show the results of our algorithm and those of SCC and SMMC on first 5 objects in a 3D plot where the points are represented by their first 3 principal components. As it can be seen other 3 methods fail to cluster multiple manifold with intersection whereas Path-Based Clustering seems much closer to the ground truth. 4.3 Clustering of Human Motion Sequences In this section, we test our algorithm on a sequence of video frames including differ-ent activities performed by a subject. [21, 22, 24, 23] studied unsupervised tracking of human bodies in the presence of temporal changes. We use a different model to track 4 mixed actions from subject 86, trial number 9 of the CMU MoCap dataset. The data Real Clusters (a) SMMC (c) SCC (b) PBC (d) Fig. 5. Output of three different methods on the first 5 objects of COIL-20. Points are represented by their 3 top principal components. consists in a temporal sequence of 62-dimensional representation of the human body via markers in R3. One motion sequence of 4794 frames and corresponding result of path-based multi-manifold clustering are given in Figure 6. Four activities are labeled from 1 to 4. When the subject switches from one action to another one the labels are ambiguous. 5 Conclusion In this paper, we proposed a novel method to cluster multiple intersected manifolds that perform well in practice and is consistent in the large-sample limit. The variant we introduced is the best on numerical experiments. For now, the variant we introduced here is the best on numerical experiments. 4 3 2 1 1000 200 0 3 000 4000 1000 200 0 3 000 4000 4 3 2 1 Fig. 6. Result of human activity segmentation using Path-Based Clustering. There are 4 activities: walking (1), looking (2), sitting (3) and standing (4). Top: a sample of the sequence. Middle: ground truth. Bottom: output of our algorithm. Acknowledgments This work was partially supported by a grant from the National Science Foundation DMS- 09-15160. References 1. E. Arias-Castro, G. Chen, and G. Lerman. Spectral clustering based on local linear approxi-mations. Electron. J. Statist., 5:1537–1587, 2011. 2. Mikhail Belkin and Partha Niyogi. Laplacian eigenmaps for dimensionality reduction and data representation. Neural computation, 15(6):1373–1396, 2003. 3. Alina Beygelzimer, Sham Kakade, and John Langford. Cover trees for nearest neighbor. In ICML ’06: Proceedings of the 23rd international conference on Machine learning, pages 97–104, New York, NY, USA, 2006. ACM. 4. G. Chen and G. Lerman. Spectral curvature clustering (SCC). IJCV, 81(3):317–330, 2009. 5. Ehsan Elhamifar and Rene´ Vidal. Sparse subspace clustering. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pages 2790–2797. IEEE, 2009. 6. Ehsan Elhamifar and Rene Vidal. Sparse manifold clustering and embedding. In J. Shawe-Taylor, R.S. Zemel, P. Bartlett, F.C.N. Pereira, and K.Q. Weinberger, editors, Advances in Neural Information Processing Systems 24, pages 55–63. 2011. 7. Ehsan Elhamifar and Rene Vidal. Sparse subspace clustering: Algorithm, theory, and ap-plications. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 35(11):2765– 2781, 2013. 8. Aristides Gionis, Alexander Hinneburg, Spiros Papadimitriou, and Panayiotis Tsaparas. Di-mension induced clustering. In KDD ’05: Proceedings of the eleventh ACM SIGKDD inter-national conference on Knowledge discovery in data mining, pages 51–60, New York, NY, USA, 2005. ACM. 9. A.B. Goldberg, X. Zhu, A. Singh, Z. Xu, and R. Nowak. Multi-manifold semisupervised learning. In AISTATS, pages 169–176, 2009. 10. Dian Gong, Xuemei Zhao, and Gerard´ Medioni. Robust multiple manifolds structure learn-ing. In Proc. 29th Intl. Conf. on Machine Learning (ICML), 2012. 11. Qiyong Guo, Hongyu Li, Wenbin Chen, I-Fan Shen, and Jussi Parkkinen. Manifold cluster-ing via energy minimization. In ICMLA ’07: Proceedings of the Sixth International Confer-ence on Machine Learning and Applications, pages 375–380, Washington, DC, USA, 2007. IEEE Computer Society. 12. G. Haro, G. Randall, and G. Sapiro. Stratification learning: Detecting mixed density and di-mensionality in high dimensional point clouds. Advances in Neural Information Processing Systems, 19:553, 2007. 13. D. Kushnir, M. Galun, and A. Brandt. Fast multiscale clustering and manifold identification. Pattern Recogn., 39(10):1876–1891, 2006. 14. A.Y. Ng, M.I. Jordan, and Y. Weiss. On spectral clustering: Analysis and an algorithm. Advances in neural information processing systems, 2:849–856, 2002. 15. M. Polito and P. Perona. Grouping and dimensionality reduction by locally linear embedding. Advances in Neural Information Processing Systems, 14:1255–1262, 2001. 16. S. Roweis and L. Saul. Nonlinear dimensionality reduction by locally linear embedding. Science, 290(5500):2323–2326, 2000. 17. R. Souvenir and R. Pless. Manifold clustering. In Computer Vision, 2005. ICCV 2005. Tenth IEEE International Conference on, volume 1, pages 648–653 Vol. 1, 2005. 18. J. B. Tenenbaum, V. de Silva, and J. C. Langford. A global geometric framework for nonlin-ear dimensionality reduction. Science, 290(5500):2319–2323, 2000. 19. Rene´ Vidal and Paolo Favaro. Low rank subspace clustering (lrsc). Pattern Recognition Letters, 43:47–61, 2014. 20. Y. Wang, Y. Jiang, Y. Wu, and Z.H. Zhou. Spectral clustering on multiple manifolds. Neural Networks, IEEE Transactions on, 22(7):1149–1161, 2011. 21. Bardia Yousefi, Julien Fleuret, Seyed Alireza Ghaffari, Simon Frechet,´ Felix´ Labrie Larrivee,´ Marcelo Sung Ma Jo, Matthieu Klein, Xavier Maldague, and Raymon Watts. Unsupervised automatic tracking of thermal changes in human body. Advanced Infrared Technology & Applications, page 152, 2015. 22. Bardia Yousefi and Chu Kiong Loo. Comparative study on interaction of form and motion processing streams by applying two different classifiers in mechanism for recognition of biological movement. The Scientific World Journal, 2014, 2014. 23. Bardia Yousefi and Chu Kiong Loo. Slow feature action prototypes effect assessment in mechanism for recognition of biological movement ventral stream. International Journal of Bio-Inspired Computation, 8(6):410–424, 2016. 24. Bardia Yousefi, Chu Kiong Loo, and Ali Memariani. Biological inspired human action recognition. In Robotic Intelligence In Informationally Structured Space (RiiSS), 2013 IEEE Workshop on, pages 58–65. IEEE, 2013.
1cs.CV
arXiv:1604.01168v2 [math.CO] 12 Nov 2016 An Estimation of the Size of Non-Compact Suffix Trees Bálint Vásárhelyi∗ Abstract A suffix tree is a data structure used mainly for pattern matching. It is known that the space complexity of simple suffix trees is quadratic in the length of the string. By a slight modification of the simple suffix trees one gets the compact suffix trees, which have linear space complexity. The motivation of this paper is the question whether the space complexity of simple suffix trees is quadratic not only in the worst case, but also in expectation. 1 Introduction A suffix tree is a powerful data structure which is used for a large number of combinatorial problems involving strings. Suffix tree is a structure for compact storage of the suffixes of a given string. The compact suffix tree is a modified version of the suffix tree, and it can be stored in linear space of the length of the string, while the non-compact suffix tree is quadratic (see [11, 14, 18, 19]). The notion of suffix trees was first introduced by Weiner [19], though he used the name compacted bi-tree. Grossi and Italiano mention that in the scientific literature, suffix trees have been rediscovered many times, sometimes under different names, like compacted bi-tree, prefix tree, PAT tree, position tree, repetition finder, subword tree etc. [10] . Linear time and space algorithms for creating the compact suffix tree were given soon by Weiner [19], McCreight [14], Ukkonen [18], Chen and Sciferas [4] and others. The statistical behaviour of suffix trees has been also studied. Most of the studies consider improved versions. ∗ Szegedi Tudományegyetem, TTIK, Szeged, 6720, Hungary. E-mail: [email protected] 1 The average size of compact suffix trees was examined by Blumer, Ehrenfeucht and Haussler [3]. They proved that the average number of nodes in the compact suffix tree is asymptotically the sum of an oscillating function and a small linear function. An important question is the height of suffix trees, which was answered by Devroye, Szpankowski and Rais [6], who proved that the expected height is logarithmic in the length of the string. The application of suffix trees is very wide. We mention but only a few examples. Apostolico et al. [2] mention that these structures are used in text searching, indexing, statistics, compression. In computational biology, several algorithms are based on suffix trees. Just to refer a few of them, we mention the works of Höhl et al. [12], Adebiyi et al. [1] and Kaderali et al. [13] Suffix trees are also used for detecting plagiarism [2], in cryptography [15, 16], in data compression [7, 8, 16] or in pattern recognition [17]. For the interested readers further details on suffix trees, their history and their applications can be found in [2], in [10] and in [11], which sources we also used for the overview of the history of suffix trees. It is well-known that the non-compact suffix tree can be quadratic in space as we referred before. In our paper we are setting a lower bound on the average size, which is also quadratic. 2 Preliminaries Before we turn to our results, let us define a few necessary notions. Definition 1. An alphabet Σ is a set of different characters. The size of an alphabet is the size of this set, which we denote by σ(Σ), or more simply σ. A string S is over the alphabet Σ if each character of S is in Σ. ⋄ Definition 2. Let S be a string. S[i] is its ith character, while S[i, j] is a substring of S, from S[i] to S[j], if j ≥ i, else S[i, j] is the empty string. Usually n(S) (or n if there is no danger of confusion) denotes the length of the string. ⋄ Definition 3. The suffix tree of S is a rooted directed tree with n leaves, where n is the length of S. Its structure is the following: Each edge e has a label ℓ(e), and the edges from a node v have different labels (thus, the suffix tree of a string is unique). If we concatenate the edge labels along a path P, we get the path label L(P). 2 We denote the path from the root to the leaf j by P(j). The edge labels are such that L(j) = L(P(j)) is S[j, n] and a $ sign at the end. The definition becomes more clear if we check the example on Figure 1 and Algorithm 4. ⋄ b c b c c a $ a b 6 $ b c c b b c c $ b c $ b 5 $ 4 Growth of the string 3 2 $ 1 Figure 1: Suffix tree of string aabccb A naive algorithm for constructing the suffix tree is the following: Algorithm 4. Let S be a string of length n. Let j = 1 and T be a tree of one vertex r (the root of the suffix tree). Step 1: Consider X = S[j, n] + $. Set i = 0, and v = r. Step 2: If there is an edge vu labelled X[i + 1], then set v = u and i = i + 1. Step 3: Repeat Step 2 while it is possible. Step 4: If there is no such an edge, add a path of n − j − i + 2 edges from v, with labels corresponding to S[j + i, n] + $, consecutively on the edges. At the end of the path, number the leaf with j. Step 5: Set j = j + 1, and if j ≤ n, go to Step 1. ⋄ Notice that in Algorithm 4 a leaf always remain a leaf, as $ (the last edge label before a leaf) is not a character in S. 3 Definition 5. The compact suffix tree is a modified version of the suffix tree. We get it from the suffix tree by compressing its long branches. ⋄ The structure of the compact suffix tree is basically similar to that of the suffix tree, but an edge label can be longer than one character, and each internal node (i.e. not leaf) must have at least two children. For an example see Figure 2. b c b$ 5 ccb$ cb$ 4 a bccb$ $ 3 6 abccb$ 2 1 Figure 2: Compact tree of string aabccb With a regard to suffix trees, we can define further notions for strings. Definition 6. Let S be a string, and T be its (non-compact) suffix tree. A natural direction of T is that all edges are directed from the root towards the leaves. If there is a directed path from u to v, then v is a descendant of u and u is an ancestor of v. We say that the growth of S (denoted by γ(S)) is one less than the shortest distance of leaf 1 from an internal node v which has at least two children (including leaf 1), that is, we count the internal nodes on the path different from v. If leaf j is a descendant of v, then the common prefix of S[j, n] and S[1, n] is the longest among all j’s. ⋄ If we consider the string S = aabccb, the growth of S is 5, as it can be seen on Figure 1. An important notion is the following one. Definition 7. Let Ω(n, k, σ) be the number of strings of length n with growth k over an alphabet of size σ. ⋄ Observe that the connection between the growth and the number of nodes in a suffix tree is the following: Observation 8. If we construct the suffix tree of S by using Algorithm 4, we get that the sum of the growths of S[n − 1, n], S[n − 2, n], . . . , S[1, n] is a lower bound to the number 4 of nodes in the final suffix tree. In fact, there are only two more internal nodes, the root vertex, the only node on the path to leaf n, and we have the leaves. In the proofs we will need the notion of period and of aperiodic strings. Definition 9. Let S be a string of length n. We say that S is periodic with period d, if there is a d|n for which S[i] = S[i + d] for all i ≤ n − d. Otherwise, S is aperiodic. The minimal period of S is the smallest d with the property above. ⋄ Definition 10. µ(j, σ) is the number of j-length aperiodic strings over an alphabet of size σ. ⋄ A few examples for the number of aperiodic strings are given in Table 1. σ 2 3 4 5 µ(1, σ) µ(2, σ) µ(3, σ) µ(4, σ) µ(5, σ) µ(6, σ) µ(7, σ) µ(8, σ) 2 6 12 30 54 126 240 504 3 6 24 72 240 696 2184 648 4 12 60 240 1020 4020 16380 65280 5 20 120 600 3120 15480 78120 390000 Table 1: Number of aperiodic strings for small alphabets. σ is the size of the alphabet, and µ(j, σ) is the number of aperiodic strings of length j 3 Main results Our main results are formulated in the following theorems. Theorem 11. On an alphabet of size σ for all n ≥ 2k, Ω(n, k, σ) ≤ φ(k, σ) for some function φ. Theorem 12. There is a c > 0 and an n0 such that for any n > n0 the following is true. Let S ′ be a string of length n − 1, and S be a string obtained from S ′ by adding a character to its beginning chosen uniformly random from the alphabet. Then the expected growth of S is at least c · n. Theorem 13. There is a d > 0 that for any n > n0 (where n0 is the same as in Theorem 12) the following holds. On an alphabet of size σ the simple suffix tree of a random string S of length n has at least d · n2 nodes in expectation. 5 4 Proofs Proof. (Theorem 13) Considering Observation 8 we have that the expected size of the simple suffix tree of a random string S is at least E n X (γ(S[n − m, n])) ≥ m=1 n X (1) E(γ(S[n − m, n])). m=1 If m ≤ n0 , Theorem 12 is obvious. If m > n0 , we can divide the sum into two parts: n X E(γ(S[n − m, n])) = m=1 n0 X E(γ(S[n − m, n])) + n X E(γ(S[n − m, n])). (2) m=n0 +1 m=1 The first part of the sum is a constant, while the second part can be estimated with Theorem 12: n n X X E(γ(S[n − m, n])) ≥ cn = d · n2 . (3) m=n0 +1 m=n0 +1 This proves Theorem 13. First, we show a few lemmas about the number of aperiodic strings. Lemma 14 can be found in [9] or in [5], but we give a short proof also here. Lemma 14. For all j > 0 integer and for all alphabet of size σ the number of aperiodic strings is X µ(d, σ). (4) µ(j, σ) = σ j − d|j d6=j Proof. µ(1, σ) = σ is trivial. There are σ j strings of length j. Suppose that a string is periodic with minimal period d. This implies that its first d characters form an aperiodic string of length d, and there are µ(d, σ) such strings. This finishes the proof. Specially, if p is prime, then µ(p, σ) = σ p − σ. t Corollary 15. If p is prime and t ∈ N, then µ (pt , σ) = σ p − σ p size σ. 6 t−1 for all alphabet of t Proof. We count the aperiodic strings of length pt . There are σ p strings. Consider the minimal period of the string, i.e. the period which is aperiodic. If we exclude all minimal periods of length k, we exclude µ(k, σ) strings. This yields the following equality: X  t µ pt , σ = σ p − µ (ps , σ) . (5) 1≤s<t With a few transformations and using Lemma 14, we have that (5) is equal to X X X  t t t−1 µ (ps , σ) − µ (ps , σ) , (6) σ p −µ pt−1 , σ − µ (ps , σ) = σ p −σ p + 1≤s<t−1 1≤s<t−1 1≤s<t−1 which is t σp − σp t−1 (7) . Lemma 16. For all j > 1 and for all alphabet of size σ , µ(j, σ) ≤ σ j − σ. Proof. From Lemma 14 we have µ(j, σ) = σ j − P µ(d, σ). Considering µ(d, σ) ≥ 0 and d|j d6=j µ(1, σ) = σ, we get the claim of the lemma. Lemma 17. For all j ≥ 1, and for all alphabet of size σ µ(j, σ) ≥ σ(σ − 1)j−1 . (8) Proof. We prove by induction. For j = 1 the claim is obvious, as µ(1, σ) = σ. Suppose we know the claim for j − 1. Consider σ(σ − 1)j−2 aperiodic strings of length j − 1. Now, for any of these strings there is at most one character by appending that to the end of the string we receive a periodic string of length j. Therefore we can append at least σ − 1 characters to get an aperiodic string, which gives the desired result. Observation 18. Observe that if the growth of S is k, then there is a j such that S[1, n − k] = S[j + 1, j + n − k]. For example, if the string is abcdef abcdab (n = 12), one can check that the growth is 8 (the new branch in the suffix tree which ends in leaf 1 starts after abcd), and with j = 6 we have S[1, 4] = S[7, 10] = abcd. The reverse of this observation is that if there is a j < n such that S[1, n − k] = S[j + 1, j + n − k], then the growth is at most k, as S[j + 1, n] and S[1, n] shares a common prefix of length n − k, thus, the paths to the leaves j + 1 and n share n − k internal nodes, and at most k new internal nodes are created. 7 Proof. (Theorem 11) For proving the theorem we count the number of strings with growth k for n ≥ 2k. First, we fix j, and then count the number of possible strings where the growth occurs such that S[1, n − k] = S[j + 1, j + n − k] for that fixed j. Note that by this way, we only have an upper bound for this number, as we might found an ℓ such that S[1, n − k + 1] = S[ℓ + 1, ℓ + n − k + 1]. We know that j ≤ k, otherwise S[j + 1, j + n − k] does not exist. If j = k, then we know S[1, n − k] = S[k + 1, n]. S[1, k] must be aperiodic. Suppose the opposite and let S[1, k] = p . . . p, where p is the minimal period, and its length is d. Then S[k + 1, n] = p . . . p. Obviously, in this case S[1, n − d] = S[d + 1, n], which by Observation 18 means that the growth would be at most d. See also Figure 3. Therefore this case gives us at most µ(k) strings of growth k. p p 1 p p p p n k Figure 3: Proof of Theorem 11, case j = k If j < k, then we have S[1, n − k] = S[j + 1, j + n − k]. First, we note that S[1, j] must be aperiodic. Suppose the opposite and let S[1, j] = p . . . p, where p is the minimal period, and its length is d. Then S[j + 1, 2j] = S[2j + 1, 3j] = . . . = p . . . p, (9)         k k · j = S j + 1, j + · j = p . . . p. S 1, j j (10) which means that This implies that S[1, j + n − k] = p . . . pp′ , where p′ is a prefix of p. However, S[1, j + n − k − d] = S[d, j + n − k] is true, and using Observation 18, we have that γ(S) ≤ n − (j + n − k) + d = k − j + d < k, which is a contradiction. Further, S[j + n − k + 1] must not be the same as S[k + 1], which means that this character can be chosen σ − 1 ways. Therefore this case gives us at most µ(j)(σ − 1)σ k−j−1 strings of growth k for each j. By summing up for each j, we have 8 p p p p p p j 1 p p p′ j+n−k k n Figure 4: Proof of Theorem 11, case j < k φ(k, σ) = k−1 X µ(j, σ)(σ − 1)σ k−j−1 + µ(k, σ) (11) j=1 This completes the proof. Proof. (Theorem 12) According to Lemma 16, µ(j, σ) ≤ σ j − σ (if j > 1). In the proof of Theorem 11 at (11) we saw for k ≥ 1 and n ≥ 2k − 1 that φ(k, σ) = µ(k, σ) + k−1 X µ(j, σ)(σ − 1)σ k−j−1. (12) j=1 We can bound the right hand side of (12) from above as it follows: µ(k, σ)+ k−1 X µ(j, σ)(σ−1)σ k−j−1 = µ(k, σ)+µ(1, σ)(σ−1)σ k−2 + j=1 k−1 X µ(j, σ)(σ−1)σ k−j−1, j=2 (13) which is by Lemma 16 at most k σ −σ + σ(σ −1)σ k−2 + k−1 X j (σ −σ)(σ −1)σ k−j−1 j=2 k k ≤ σ +σ + k−1 X σ j σσ k−j−1 ≤ kσ k . (14) j=2 Thus, φ(k, σ) ≤ kσ k , which means m X k=1 φ(k, σ) ≤ m X kσ k ≤ (m + 1)σ m+1 . (15) k=1 The left hand side of 15 is an upper bound for the strings of growth at most m.   Let m = n2 . n As σ n ≫ n2 σ 2 , this implies that in most cases the suffix tree of S has at least nodes than the suffix tree of S[1, n − 1]. Thus, a lower bound on the expectation of the growth of S is 9 n 2 more  1 n n  n n n  n 2 + 2 σ σ + 1 , σ − σn 2 2 2     n 1 n+2 n n n(n + 2) 2 σ σ + − = cn, σn 2 2 4 E (γ(S)) ≥ which is (16) (17) with some c, if n is large enough. With this, we have finished the proof and gave a quadratic lower bound on the average size of suffix trees. References [1] E.F. Adebiyi, T. Jiang, and M. Kaufmann. An efficient algorithm for finding short approximate non-tandem repeats. Bioinformatics, 17:5S–12S, 2001. [2] A. Apostolico, M. Crochemore, M. Farach-Colton, Z. Galil, and S. Muthukrishnan. 40 years of suffix trees. Communications of the ACM, 59:66–73, 2016. [3] A. Blumer, A. Ehrenfeucht, and D. Haussler. Average sizes of suffix trees and DAWGs. Discrete Applied Mathematics, 24:37–45, 1989. [4] M.T. Chen and J. Sciferas. Efficient and elegant subword tree construction. In Combinatorial algorithms on words, pages 97–107. Springer-Verlag, 1985. [5] J.D. Cook. Counting primitve bit strings. http://www.johndcook.com/blog/2014/12/23/counting-primitive-bit-strings/, 2014. [Online; accessed 02-May-2016]. [6] L. Devroye, W. Szpankowski, and B. Rais. A note on the height of suffix trees. SIAM Journal on Computing, 21:48–53, 1993. [7] E. R. Fiala and D. H. Greene. Data compression with finite windows. Communications of the ACM, 32:490–505, 1989. [8] C. Fraser, A. Wendt, and E.W. Myers. Analyzing and compressing assembly code. In Proceedings SIGPLAN Symposium on Compiler Construction, pages 117–121, 1984. [9] E.N. Gilbert and J. Riordan. Symmetry types of periodic sequences. Illinois Journal of Mathematics, 5:657–665, 1961. 10 [10] R. Grossi and G.F. Italiano. Suffix trees and their applications in string algorithms. In Proceedings of the 1st South American Workshop on String Processing, pages 57–76, 1993. [11] D. Gusfield. Algorithms on Strings, Trees and Sequences. Cambridge University Press, 1997. [12] M. Höhl, S. Kurtz, and E. Ohlebusch. Efficient multiple genome alignment. Bioinformatics, 18:312S–320S, 2002. [13] L. Kaderali and A. Schliep. Selecting signature oligonucleotides to identify organisms using DNA arrays. Bioinformatics, 18:1340–1348, 2002. [14] E. M. McCreight. A space-economical suffix tree construction algorithm. Journal of the ACM, 23:262–272, 1976. [15] L. O’Connor and T. Snider. Suffix trees and string complexity. In Advances in Cryptology: Proceedings of EUROCRYPT, LNCS 658, pages 138–152. SpringerVerlag, 1992. [16] M. Rodeh. A fast test for unique decipherability based on suffix trees,. IEEE Transactions on Information Theory, 28(4):648–651, 1982. [17] S.L. Tanimoto. A method for detecting structure in polygons. Pattern Recognition, 13:389–494, 1981. [18] E. Ukkonen. On-line construction of suffix trees. Algorithmica, 14:249–260, 1995. [19] P. Weiner. Linear pattern matching algorithms. In Proceedings of the 14th IEEE Symposium on Switching and Automata Theory, pages 1–11, 1973. 11
8cs.DS
Decision-level multi-method fusion of spatially scattered data from nondestructive inspection of ferromagnetic parts René Heideklanga, Parisa Shokouhib a BAM Federal Institute for Materials Research and Testing, Unter den Eichen 87, 12205 Berlin, Germany [email protected] phone: ≈49 30 8104-1838 (secretariat of Division 8.5“ b Department of Civil and Environmental Engineering, The Pennsylvania State University, 215 Sackett Bldg., University Park, PA 16802 [email protected] phone: ≈1 (814“ 863-0678 Corresponding author: René Heideklang Sensor 1 Sensor 2 Spatial Density Agreement Detection Crack This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License: http://creativecommons.org/licenses/by-nc-nd/4.0/ Abstract This article deals with the fusion of flaw detections from multi-sensor nondestructive materials testing. Because each testing method makes use of different physical effects for defect localization, a multimethod approach is promising to effectively distinguish the many false alarms from actual material defects. To this end, we propose a new fusion technique for scattered two- or three-dimensional location data. Using a density-based approach, the proposed method is able to explicitly address the localization uncertainties such as registration errors. We provide guidelines on how to set all key parameters and demonstrate the technique s robustness. Finally, we apply our fusion approach to experimental data and demonstrate its ability to find small defects by substantially reducing false alarms under conditions where no single-sensor method is adequate. Keywords: multi-sensor data fusion; density estimation; scattered data; defect detection; nondestructive testing; registration error; 1 Introduction Industrial nondestructive testing (NDT“ refers to the inspection of materials, parts or structures concerning their condition without compromising their integrity. NDT experts employ different sensors depending on the material and the expected types of defects. Near-surface cracks represent one class of flaws that are commonly encountered in critical machine parts under dynamic loading such as turbine blades and bearings. Repeating cycles of dynamic stress promote the growth of invisible micro cracks into larger defects that compromise the safety and shorten the service life of the component. As such, early detection of cracking is critical to the safe operation and serviceability of flawed machinery. Among the NDT methods that qualify for the task of near-surface crack detection, special attention is paid to those that allow automatic data acquisition and provide accurate, objective and reproducible results. Common candidate methods are ultrasonic testing (UT“, eddy current testing (ET“, magnetic flux leakage (MFL“ testing, and thermal testing (TT“. However, single-method inspection is often ambiguous. This is because each method reacts to changes in specific physical properties of the tested material in the presence of a defect. But, harmless material or geometrical characteristics may also produce similar and often indistinguishable changes in the recorded signals. For instance, MFL is affected by surface roughness and inhomogeneous magnetic properties, and TT s high sensitivity to negligible manufacturing and handling marks and imperfections results in a multitude of false positive indications. These non-defect indications are referred to as structural noise, because unlike measurement noise, they are deterministic across repeated measurements. However, structural noise does vary across different inspection techniques, whereas actual flaws are characterized by multi-sensor agreement. This concept lies at the heart of NDT data fusion. On other words, multi-sensor inspection differentiates flaw indications from structural noise, thus providing more reliable assessment. Sensor fusion can be performed at various levels of signal abstraction [1], each with specific drawbacks and advantages. In particular, decision-level fusion deals with the higher level aggregation of data after individual detection. That is, each signal is first processed individually, and then fed into the fusion algorithm. We argue that decision-level fusion has several advantages over signal-level fusion for NDT inspection. First, unlike signal-level fusion, it does not require obtaining individual signal values at the very same locations by interpolation. Although a spatial association step is still necessary to prepare individual detections for fusion, decision-level fusion can work on the un-interpolated original data. As we will demonstrate here, this approach allows for explicit handling of localization uncertainty, for instance due to registration errors. This is in contrast to signal-level fusion, where accurate registration is crucial [2, 3] because errors can hardly be compensated. Another advantage of high-level fusion for defect detection is the two stage process: the measurements are sifted once for flaws as in traditional single-sensor inspection, and a second time after fusion. This process promises to effectively eliminate many of the false alarms that result from structural noise. A further major benefit is the strategy s modularity. The individual data collection and processing can be carried out independently by the respective experts to tailor the detection process specifically to each inspection method. One practical benefit of the modularity offered by decision-level fusion is that it allows combining individual results, even if fusion was not envisioned in the original testing plan. This also facilitates independence from the type of data source, making it possible to aggregate heterogeneous modalities ranging from manual inspection data to the output of fully automated scanning systems. Consequently, different sources of information can be effortlessly exchanged and the fusion strategy is readily adapted to unknown future changes of input sources. Although there are recent studies in NDT proposing decision-level fusion, e.g. by weighted averaging [4], hypothesis testing [5], and Bayesian or Dempster-Shafer theory [6, 7], all of these works still rely on image registration and interpolation to perform fusion at common grid points. In fact, we are not aware of any data fusion publication in the field of NDT dealing with scattered decision-level fusion, i.e. using the original measurement locations, despite the aforementioned advantages. We propose a new fusion strategy that combines spatially scattered detection locations to improve the detection performance compared to single-source methods. In this paper, we will address the problem of nondestructive surface inspection, although the methodology is quite generic and can be easily extended to the three-dimensional case of volume inspection. Our approach is detailed in section 2 where the general idea is introduced using a simple example. Subsequently, we formalize the problem, describe our method and provide practical techniques for automatic parameter estimation. The developed approach is then applied to experimental multi-sensor NDT measurements by three different inspection methods. Finally, we quantitatively demonstrate the enhanced performance of multi-sensor crack detection using our technique over single-sensor inspection. 2 Methodology Per-sensor detection is done after individual pre-processing, using simple rules such as thresholding. The result of individual defect localization is a set of detections  =  ,  , also termed hits, scattered across the specimen's surface, each exhibiting a certain signal to noise ratio (SNR“. For example, consider Figure 1 for an outcome of individual surface inspection using two NDT methods. In cases a to d, each dot marks a hit according to some detection rule per sensor. Among the hits, there are also false alarms, for instance indicating changes in material properties unrelated to a defect (structural noise“. Such false alarms are illustrated by cases b and c in Figure 1. Using single-sensor inspection, these false alarms cannot be distinguished from indications produced by actual defects such as those shown in a. A multisensor data set, on the other hand, is able to reveal a as a real defect by assessing the agreement among different detection methods. Here, agreement is expressed in terms of joint spatial density of hits, taking into account all sensors. Our rationale is that the joint hit density is higher over real defects than in other areas, provided sufficient SNR for at least two sensors. On the contrary, a clear conflict occurs where only one sensor generates hits, and thus the joint density is not significantly increased relative to the individual sensor density. This concept is depicted at the bottom of Figure 1, where for each sensor the spatial density of hits across the specimen surface is symbolized. Only in case a both sensors agree in increased spatial density, whereas in cases b and c the sensors do not agree. Although there is also agreement in case d as well, the joint density is not significant enough, indicating the low likelihood of defect presence. This example demonstrates the potential of the joint spatial density as a measure for multi-sensor detection. a) b) c) d) Sensor 1 Sensor 2 spatial density likelihood of true defect true defect sensor agreement false alarm sensor conflict false alarm sensor conflict true non-defect sensor agreement Figure 1: Schematic representation of the principle of the approach. The detection outcome of two different NDT methods are represented by circles and crosses, for four cases a“-d“. For each case, the corresponding spatial densitiy per sensor is plotted below. The likelihood of observing a true defect (gray area“ depends on both sensors yielding significant hit densities. We propose evaluating the local hit density as a measure for multi-sensor data fusion at decision level. The first step is detection per individual sensors. The initial detection rules must focus on sensitivity rather than specificity, thus ensuring that all (unknown“ real defect indications are retained for the final detection by fusion. At the same time, we would still want to discard as many false alarms as possible. For example, most of the typical signal intensities are near zero. Therefore, a simple thresholding operation significantly reduces the number of potential defect indications per sensor, and thus simplifies the subsequent data fusion efforts. Since the detection method is independent from the proposed fusion approach, the most suitable detection criterion for each sensor can be used. Moreover, the locations returned by the NDT sensors have to be related, if they are not defined with respect to the same coordinate system. Rather than measuring at the very same locations on the specimen, it is often more practical to mathematically register the individual local coordinate systems after the measurements were carried out. Therefore, for each sensor pair, we find corresponding locations in the sensor data and fit a coordinate transformation model that minimizes the distance between each pair of corresponding locations. Note that, in contrast to fusion at the signal level, this transformation is not used here to interpolate the sensor data values. Rather, for decision-level fusion, the transformations allow to express the locations of the individual detections in any of the sensors coordinate systems. We note that although each NDT method usually uses gridded measurement positions, the mapped hit locations after registration are not jointly gridded in the common coordinate system, but appear scattered instead. One central challenge in the decision-level fusion of non-gridded locations is the uncertainty in localization. Two main factors contribute to this uncertainty. First, each sensor s localization ability is limited by the physical resolution as well as the spatial sampling rate. Second, the coordinate transformations computed during spatial registration are inaccurate to some degree, because the manually set point pairs do not perfectly match or the data do not fit the transformation model well enough. To be robust, a fusion approach must adequately cope with the inherent uncertainties about hit positions and must associate nearby points for the purpose of density quantification. This loose concept of proximity must therefore be mathematically formalized. To this end, various non-parametric techniques have been developed such as Mean shift [8], DBSCAN [9], OPTICS [10], Spectral clustering [11], and Kernel density estimation (KDE“ [12, 13]. We have selected the framework of kernel density estimation for this study. This choice was motivated by considering that our data space typically has only two or three spatial dimensions, independent from the number of sensors. Therefore, the density can be directly modeled without being affected by the curse of dimensionality. Furthermore, it allows us to evaluate the density at arbitrary positions, not only at the hits. Next, we will formally introduce our method using ideas from KDE. 2.1 Kernel density estimation (KDE) KDE is a nonparametric statistical method to estimate a probability density function samples from a set of . The result is a continuous function, computed from a weighted sum of kernel functions  with an associated bandwidth ℎ, each centered over one of the samples:  = ∑   ∑   =   . Some functions qualifying as a kernel    are the uniform, triangle, Gaussian or − , with Epanechnikov kernel functions. The bandwidth ℎ controls the size of the neighborhood in which each sample influences the density. The choice of the bandwidth is critical for the overall performance of the algorithm. If the bandwidth is chosen too wide, KDE results in an overly smoothed density, thus losing important details of the distribution. On the other hand, if it is chosen too narrow, the estimate adapts too much to the specific realization of the sample set, thus missing the global features of the density. This problem has been well-studied, and several solutions have been proposed [14]. We will describe how to automatically compute a suitable bandwidth for our problem in section 2.3. The general formulation given above for KDE includes the normalization constant ∑   , ensuring that the density integrates to one. We proceed with a simpler unnormalized version of KDE by dropping the normalization constant. Furthermore, since the density estimate is a weighted sum with one term per data point, we can partition the data set and aggregate the total density function which include only the samples from each partition :  =    =      ∈ !   −  from the sub-densities  , " denotes a subset of all points such that partitions do not overlap and the union of all partitions covers the complete data set. This re-arrangement is taken up in the following section to group detections by each sensor. KDE can be extended to vector-valued samples. To this end, let #$ denote the ith vector-valued (bold face“ sample, and let % denote the vector-valued location where to evaluate the density. Multivariate KDE is computed from multivariate kernel functions and an associated bandwidth matrix &, which describes the scale and the orientation of the kernels. A special kind of multivariate kernel is the product kernel, defined by ' # = ∏  ! ) +, where one univariate kernel for each dimension  is evaluated. The ℎ are the #* ! entries of the diagonal bandwidth matrix, i.e. product kernels are not arbitrarily oriented in the data space. We use product kernels in our approach, which is described next. 2.2 Scattered decision-level fusion In this section, we develop a new fusion method for our NDT problem based on concepts from KDE. Here, the role of the vector-valued data sample #$ is taken by the two-dimensional hit location  as detected by a single sensor , during surface inspection. The fused density for defect detection is computed as: - = . / -  /∈0/1 ,…/3 4 =  : ∈>/ / -5 − ;< =/ - max /∈0/1 ,…/3 4 −  / - (1“ (2“ C C D A1 − ) + E F1 − A E G , ℎ ℎ ; ? = @ D 0, |C | ≤ ℎ JK LC L ≤ ℎ NOPN (3“ In Equation (1“, - is the estimated density evaluated at arbitrary location - = Q , Q  on the specimen surface. This density is computed from the sum of all per-sensor densities regards detections  =  ,   ∈ R, that were found by sensor ,. / -, each of which only A key element of our method is to explicitly penalize situations in which only a single sensor makes the major contribution to the sum of densities: for each evaluation point -, we subtract the maximum single- sensor KDE at this location. This step realizes the quantification of agreement among sensors, because a large fused score now requires at least two sensors with high individual densities. Thus, is expected to behave similarly to the function indicated by the shaded area in Figure 1. Note that in the case of only two sensors, subtracting the maximum is equal to the minimum fusion rule, which is a fuzzy AND-operator, and is in fact the operation used to generate the shaded area in the figure. However, as more than two sensors are involved, requiring that all sensors indicate a defect seems too strict. Therefore, ignoring the maximum contribution can be viewed as a much milder version of the AND fusion rule. To compute the per-sensor densities / -, the point of interest - is mapped to the local coordinate system through the coordinate transform =/ , where the distance between - and each detection is computed as shown in Equation (2“. This measure of proximity is converted to a measure of density by the per-sensor kernel function ;< . Although in principle, the use of any kernel type is valid, we suggest using a compactly supported kernel function like the Epanechnikov product kernel as defined in Equation (3“. The compact support has the advantage of limiting the spatial influence area of each detection, which is expressed by the kernel bandwidth parameters ; = ℎ , ℎ , and thus facilitates faster computation than e.g. the non-vanishing Gaussian kernel. We further adapt the kernel function ; so that instead of integrating to unity, its maximum is normalized to one. The rationale behind this choice is discussed in view of automatic bandwidth selection in the following section. In addition, note that instead of transforming the individual detection locations  to the coordinate system of -, we follow the converse approach to map the density evaluation locations - to each sensor s system. This simplifies density estimation, because in each local system, the respective kernels are axis-aligned, as will be explained in the next section. This facilitates using a multivariate product kernel, in contrast to general kernels with non-diagonal bandwidth matrix. Figure 2 visualizes the role of the coordinate transformation =S in our method. To further adjust the quantification of density, we scale the kernel functions according to the weight : per detection. These weights control the influence of each detection on the final KDE. We set each weight proportional to the detection s signal to noise ratio, so that clear indications have more impact on the final density than insignificant ones. Also, the weights offer additional flexibility to regulate the fusion result with regards to specific sensors or different inspection areas. In total, our fusion approach includes three mechanisms to ensure robustness against false alarms: quantification of density, subtraction of the maximum single-sensor contribution, and decision weighting according to significance. VW a) VWX U; b)  U; p global coordinate system sensor‘s local system sensor‘s local system global coordinate system Figure 2: Coordinate transformation during the computation of the fused density. The two black coordinate systems in a“ and b“ are related through the coordinate transform =S . a“ Coordinate system in which the fused density will be evaluated at gridded points -. The coordinate systems of the individual sensors, where the detections  are defined, are not axis-aligned with the global system. In particular, the kernels  would require non-diagonal bandwidth matrices. b“ Coordinate system of one of the sensors, given by its measurement grid. For single-sensor density estimation, kernels  are axis-aligned to the sensor s system, thus facilitating product kernels. The single-sensor density is then evaluated at the transformed points =/ -. 2.3 Automatic bandwidth estimation We can use our background knowledge about the nature of our data to deduce the minimum required values for the bandwidth. Intuitively, the density estimator should always be able to smoothly interpolate between neighboring data points. For NDT data, the smallest possible distance between any two detections of the same sensor is given by the known spatial sampling intervals. For a measurement grid per sensor ,, the two spatial sampling distances are denoted by Δ/ , Δ/ in the sensor s coordinate system. To ensure that neighboring line scans crossing the same defect do not form disconnected density peaks, the kernel functions should at least stretch across one pixel in the sensor image. However, to avoid merging two unrelated indications, the kernels should not be made much larger1. Therefore, we propose to use product kernels with minimum bandwidth parameters of ;S = ℎ , ℎ  = Δ/ , Δ/  for each sensor. It is natural to use product kernels for gridded individual measurements, because the bandwidths directly correspond to the physical pixel dimensions. Note that, in conventional KDE, broader kernels are necessarily flatter to maintain unit integral. We, in contrast, fix the kernel s peak value to one, independently from its spatial extent. By following this procedure, each sensor contributes equally to the joint density, regardless of its spatial localization characteristics. Figure 3 illustrates this concept. The aforementioned kernel size is a minimal setting. In practice, the most significant factor contributing to the localization uncertainty may not be the spatial sampling, but inevitable registration errors. The kernel sizes should be set large enough to smooth out these unwanted variations and to associate poorly registered indications. As a general approach, we propose the following kernel size ;S = ℎ , ℎ  = max0Δ/ , CY4, maxZΔ/ , CY[, where CY denotes an estimate of the localization uncertainty, for instance the mean registration error. However, note that in this approach, the advantage of having spatially accurate sensors may be lost. Also, with increasing kernel size, closely situated defects become harder to separate. Therefore, our density-based approach will substantially benefit from high-quality registration by facilitating small kernel sizes. 1 ℎ/ 1 ℎ/D 1 ℎ/\ Figure 3: Kernel functions with automatically computed bandwidths, for three sensors with different spatial sampling distances, e.g. in mm. For clarity, only one spatial dimension is shown per sensor. Registration errors also influence the kernel widths, but this is ignored in the depiction for clarity. Moreover, if data weights were regarded, the kernel amplitudes would be scaled. 1 In fact, some NDT methods might have coarse spatial localization ability due to physical limitations, regardless of the spatial sampling rate. Those sensors are characterized by spatially slowly varying signals. Because in such cases, the smallest possible distance between any two detections is larger than one pixel, it is sensible to increase the kernel size. 3 Application to experimental data To demonstrate the fusion technique s performance under realistic conditions, a test specimen containing 15 surface flaws was inspected using three different NDT methods. In this section, we describe the specimen, the individual data collection and processing as well as the application of our fusion algorithm. Finally, we quantitatively evaluate the effect of various conditions on the fusion result, and compare fused detection against single-sensor detection. 3.1 Specimen The ring-shaped test specimen is a bearing shell [15, pp. 173-175] made of surface-hardened steel. As illustrated in Figure 4, it has an outer diameter of 215 mm and is 73 mm long in its axial direction. Cracks are simulated by 15 machined grooves that are regularly spaced across the surface. These grooves were created by electrical discharge machining and vary in depth from 11 to 354 µm, as detailed in Table 1. Grooves have constant lengths of 1 mm and their openings vary between 25 µm and 51 µm. The specimen s surface is uncoated and its roughness is very low, thus enabling high-quality near-contact measurement. Figure 4: Schematic view of the ring specimen, not to scale. Top: outer proportions of the ring. Bottom: unrolled outer surface. Short vertical lines indicate the positions of the 15 grooves. Groove 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Depth / µm 354 224 170 105 82 61 57 53 43 40 39 27 29 20 11 Table 1: Groove depths. Labels correspond to those shown in Figure 4. 3.2 Individual measurements and processing For crack detection, thee different inspection techniques were used that are well-suited for the automated nondestructive evaluation of cracks in ferromagnetic metals. The first method is called eddy current testing (ET“. An excitation coil is run over the specimen surface. Using this coil, an alternating current induces circular eddy currents in the specimen s near-surface region. These currents are blocked by the presence of defects, thus affecting the impedance of the probe coil, which is the measured signal. The second method employed here is the laser-induced active thermography testing (TT“. A high-power laser is run across the specimen to locally heat up the surface. In defect-free regions, the heat flow is able to dissipate, whereas defects cause localized heat accumulation. An infrared camera monitors the heat flow decay and generates a digital image sequence for processing. The third method is magnetic flux leakage testing (MFL“. The specimen is exposed locally to a static magnetic field, which spreads inside the ferromagnetic material. At near-surface defects, the field is forced to leak out of the specimen into the air, although air has lower magnetic permeability than the specimen. This leakage can be detected by magnetic field sensors, such as giant magneto resistance (GMR“ sensors. The following three inspections were performed sequentially during the course of about one year. ET was carried out at an excitation frequency of 500 kHz. An automated scanning device rotates the specimen under the fixed probe. Signal processing is based only on the imaginary part of the measured impedance. The obtained one-dimensional signals are preprocessed by high-pass filtering for trend correction, and by low-pass filtering to improve SNR. An image is formed by stacking the line scans in axial direction of the ring. The MFL data were collected using the same scanner as for ET, and a GMR sensor array developed at BAM [16]. Using these gradiometers, the normal component of the magnetic stray field was measured while the specimen was locally magnetized. Preprocessing comprised trend correction by high-pass filtering per line scan, and an adaptive 2D wiener filter2 for noise suppression. The image was then Sobelfiltered to highlight the steep flanks that are generated by the gradiometers over the grooves. Thermography testing was performed by rotating the specimen under a 40 W powered laser while recording with an infrared camera. The movie frames were then composed to form an image of the specimen surface. This image is processed by 2D background subtraction using median filtering, and noise was suppressed by an adaptive 2D wiener filter. We note that the presented signal acquisition is tailored to the known groove orientation. In a realistic setting, we would have to perform a second scan for ET and MFL testing to detect any circumferentially oriented defects as well. We further emphasize that for our specific ring specimen, the GMR sensors yield far superior results compared to ET and TT, and would suffice by themselves for surface crack detection. However, such performance is not guaranteed for other materials or in case of suboptimal surface conditions, so that a multi-method approach is still in demand. To take advantage of as many independent sources of information as possible during fusion, we intentionally lowered the quality of the MFL image before preprocessing and detection. This was done by separating the true defect indications from the 2 We used MATLAB s function wiener2. See http://de.mathworks.com/help/images/ref/wiener2.html background signal variations using the shift-invariant wavelet transform [17], and by reconstructing the signal with a factor of 0.1 for the noise-free component. Although this does not simulate a lower-quality MFL measurement in a physically realistic way, the approach allows making use of the acquired GMR signals as a third source of information. We justify this alteration in favor of demonstrating the capabilities of our fusion technique in other settings where individual inspection is in fact not reliable enough. Therefore, for the rest of the article, we consider only this modified version of the MFL data. To convey an impression of the signals, we show an exemplary portion of each preprocessed inspection image in Figure 5. The displayed part of the specimen surface is a 10 mm by 6.5 mm region around groove nr. 13 which is quite shallow, and thus generates relatively weak indications. The figure demonstrates the different signal patterns among sensors, concerning both the groove and the background variations. Also, the different pixel sizes are evident. A related plot is shown in Figure 6, where one-dimensional line scans crossing the groove reveal more clearly the individual sensor responses. The different spatial sampling positions are demonstrated by the line markers. Table 2 offers a quantitative comparison of the individual data sets. After individual preprocessing, the same detection routine was used for all three images to extract hit locations and confidences, which will later be fused at the decision level. To this end, we convert the signal intensities to confidence values and apply a threshold to extract only significant indications. Confidence values are computed by estimating the distribution function of background signal intensities from a defect-free area. This estimate serves as the null distribution "]^__   in the significance test. For each image pixel s intensity , the probability "]^__  ≥  is computed as the confidence. Pixels are considered significant here, if their confidence exceeds 99 %. Additionally, only those hits that are local maxima with regard to their neighboring pixels along the horizontal axis (thus crossing the grooves“ are retained. This constraint further filters many false alarms while making the detection results invariant to different peak widths. After registration to a common coordinate system based on manually defined location correspondences in the data, the final set of hits from all sensors is plotted in Figure 7. Obviously, the false alarms considerably outnumber the actual groove detections. This is due to our sensitive detection rules, intending that no actual defect is missed during individual processing. Of course, in a single-sensor inspection task, a much more stringent detection criterion is appropriate to limit the number of false alarms. However, this possibly leads to worse sensitivity to small material flaws. In contrast, our data fusion approach is supposed to discard most false hits while maintaining high sensitivity to small defects. We will now briefly compare the individual sensor results. In contrast to ET and TT, the MFL hits cluster spatially. This is because the background variations in this data set are not homogeneous, possibly due to inhomogeneities in the internal magnetic field. MFL data are missing in the strip between the two groove rows. Interestingly, in Figure 7, spatial defect-like patterns are formed, although the specimen is not expected to contain any flaws other than the known grooves. For example, see the vertical lines from TT (e.g. indicated by the right arrow“, or the diagonally oriented lines from ET indicated by the left arrow. As previously discussed, using individual inspection, it is not easy to classify these obvious indications as structural indications or flaws. In spite of their regular structure, we label these patterns as non-defect indications during the following evaluation, if our multi-sensor data set is not able to give a reliable confirmation. On the other hand, there are a few off-groove locations where different sensors behave consistently. These regions could in fact represent unknown but real defects, and will therefore be excluded from the following evaluation. Note that detections within disregarded areas are not shown in this figure. Moreover, the confidence associated with each detection is not shown, because all hits exceed the chosen threshold of 99 % as explained before. Figure 5: Preprocessed sensor intensity images, zoomed to a region around the groove nr. 13. Higher intensities correspond to indications. Top: ET, Middle: MFL, Bottom: TT. The vertical black line marks the location of the groove. Each image is shown in the respective sensor s coordinate system, thus explaining the different axis labels. Figure 6: Preprocessed line scan per inspection method around groove nr. 13. The signals are shifted so that each peak value is located at = 0. Note the different y scales. Table 2: Quantitative properties of the individual data sets ET MFL TT 0.029 0.029 0.469 0.200 0.200 0.126 indication, in mm 2 69Δ 0.6 20Δ Avg. nr. of hits per pixel 0.0023 0.0031 Δ in mm Δ in mm Width of a typical 0.5 Δa 0.0068 Figure 7: Hit locations per sensor in a common coordinate system similar to that in Figure 4. Axes are not to scale. The tips of the triangle markers indicate the groove positions. The arrows indicate crack-shaped false positives from ET (left arrow“ and TT (right arrow“. A colored version of this figure appears in the article online. 3.3 Fusion and final detection To compute the kernel density per sensor, we used Alexander Ihler s KDE Toolbox for MATLAB [18]. The fused density, according to Equations (1“-(3“, is a continuous function that must be evaluated at discrete locations. In fact, to circumvent the discrete sampling, a multivariate mode-seeking algorithm could be used for detection. However, for simplicity, we set up a discrete evaluation grid that is designed fine enough to not miss any mode of the density. Modes are then traced similarly to per-sensor detection by finding local density maxima along parallel lines on the specimen surface. Figure 8 displays the principle of the detection. Finding local maxima along one-dimensional lines is straightforward due to the density s smoothness, and also makes the detection results more stable across different kernel sizes. Figure 8: Final detection by evaluating the fused continuous density function at gridded points (circles“ and finding local maxima (filled circles“ among them. These detections approximate the true density modes (dashed lines“. The final detections after fusion are presented in Figure 9. Most of the single-sensor false alarms from Figure 7 were discarded by our fusion method by recognizing the sensor conflicts. Yet, there are a considerable number of remaining false hits. These spurious detections originate from single-sensor hits that overlap purely by chance. Nevertheless, all grooves but the shallowest one, nr. 15, clearly stand out against the false alarms considering the fused density measure, which is represented by the marker colors in Figure 9. Because higher values of the fused measure correspond to increased defect likelihood, a threshold can be applied to produce a binary decision. In the following, the detection performance will be quantitatively assessed under various conditions. Figure 9: Result of decision level fusion. Darker markers correspond to increased detection confidence. The colors range from zero (white“ to the fused intensity at the shallow defect nr. 14 or higher (black“. Axes are not to scale. 3.4 Evaluation In the following sub-sections, our fusion method is quantitatively evaluated with regard to the presented specimen. This evaluation focuses on detectability, meaning the ability to distinguish between grooves and background in the fusion result. Consequently, the ability to accurately localize a defect after fusion is not a part of this evaluation. The evaluation is realized by manually labeling detections near the known groove locations as on-groove , and others as off-groove . Specifically, for each method to be evaluated and for each groove, we define a polygon, inside which hit locations are labeled as on-groove . In the same way, several regions on the specimen surface are marked to be excluded from the evaluation. These are areas near the border of the specimen, indications that result from experimental modification of the specimen surface, off-groove areas where real unplanned defects exist (which would otherwise be counted as false alarms“, and a margin around each groove polygon. Excluding this margin is necessary, because the defect indications might exceed the actual defect region on the specimen, as is seen in Figure 5. Hits in this margin usually have reduced intensity compared to the center of the flaw. Therefore, if they were included in the on-groove class, these intensities might not exceed the detection threshold and thus the groove would often seem to be detected incompletely. On the other hand, if they were counted as off-groove, the number of false alarms would be spuriously increased, because the intensities are often still larger than the background signal. Not only are all of these disregarded regions removed from evaluation after fusion, but already the hits in these regions are excluded from the density estimation, so that they don t affect the density in the surrounding regions. Furthermore, to evaluate detection performance per flaw depth, after fusion each groove is assessed individually while ignoring all others. We note that there are several issues concerning the comparability of different detection methods using this evaluation approach. The fundamental issue is that detection, and therefore evaluation, is not carried out per (hit“ region, but per point. This approach complicates evaluation, because different detection methods (e.g. single sensor detection and fused detection“ yield different numbers of hits at different locations. This heterogeneity is compensated here by tailoring the ground truth to each investigated detection method, using the described polygons. Yet, results are never fully comparable, because each is evaluated on a slightly different basis. Nevertheless, the evaluation was designed to be as fair and expressive as possible. Detection performance is measured by area under the precision-recall curve. This method is similar to the well-known area under the Receiver Operating Characteristic (ROC“ curve, but we compute precision prec = #true hits/#all hits instead of false alarm rate FAR = #false hits/max possible number of false hits and plot it against the true positive rate TPR = #true hits/#max possible number of true hits. Precision is suited for class-imbalanced problems. This is clearly the case here, because the groove regions are much smaller than the background region. Consequently, bcd is always small, even if there are many times more false alarms than true hits. In contrast, QeNf relates hits to hits, rather than hits to non-hits. Furthermore, we do not compute the area under the whole curve, but only for the curve region where recall = true positive rate = #heCN ℎihP⁄max possible number of true hits > 0.5. We denote this measure by AUC-PR-0.5. This focuses our evaluation on thresholds that are low enough to ensure that at least half of a groove is detected. Furthermore, a single false alarm hit with higher intensity than the groove suffices to force the curve down to zero precision for small true positive rates, i.e. high thresholds, and therefore dominates the whole AUC measure. This is another reason for ignoring the left half of the diagram in the computation of AUC-PR-0.5. Using this evaluation framework, we investigate the performance of our fusion approach in the following. 3.4.1 Influence of kernel size In section 2.3, we presented an automatic method to set up the kernel bandwidth parameters. In this section, we quantitatively compare the influence of different kernel sizes on detection performance in our data set. For our inspections, the localization uncertainty due to registration errors3 is up to CY = 0.2 mm. We take this value as the basis for the range of suitable kernel sizes. Specifically, the following kernel sizes are investigated: ;S = ℎ , ℎ  = max0Δ/ , JCY4, maxZΔ/ , JCY[ with J ∈ 00, 0.5, 1, 2, 5,104. See Table 2 for the specific values of Δ/ . For J = 1, we obtain the setting proposed in section 2.3. For J = 0, the kernel sizes are computed only from the sampling distances of each sensor, disregarding the registration errors. For high values of J, the effect of over-smoothing should be observable. For all investigated settings, the 3 As measured by the following: One location on the specimen surface corresponds to point A in the coordinate system C1, and to point B in the coordinate system C2. The Euclidean distance between point A mapped to C2 and point B is a registration error. From the distribution of these errors a suitable summary statistic is generated. density was evaluated at the same locations. These locations are defined by a super-sampled measurement grid of one of the individual sensors. Figure 10 compares the results. The detection performance appears to be stable across a broad range of kernel sizes. Perfect detection (AUC-PR-0.5=0.5“ is possible for almost all defects. However, at the shallowest groove nr. 15, SNR in the individual sensors is not sufficient to yield multi-sensor hits. In contrast, the second-shallowest groove nr. 14 is detectable, although performance depends on the kernel size. The SNR at this region is relatively low, so that larger kernels increasingly produce false indications in the fused image. However, the smallest investigated kernel size is also not suited. For this groove, the optimal kernel size indeed matches the registration error (J = 1“. The deeper grooves, indicated by lower indices, are readily distinguished from the large number of per-sensor false hits. Only for J = 0, the kernels apparently are too narrow to associate the individual hits that indicate a groove. This is due to our relatively large registration error, which this setting does not account for. Interestingly, no over-smoothing effect due to large values of J can be observed here. This could be attributed to the other implemented mechanisms for false alarm rejection, such as the SNR-based weights : and the subtraction of the maximum individual sub-KDE. At very large sizes J = 10, there are two outlier flaws in the evaluation. The seemingly poor performance is due to a spatial shift of the fused indications, thus exceeding groove region that was pre-defined for the evaluation. We suggest using J = 1, that is setting the kernel sizes for sensor S to ;S = ℎ , ℎ  = max0Δ/ , CY4, maxZΔ/ , CY[, if information about localization uncertainty CY is available. Figure 10: Evaluation of different kernel sizes for each groove, measured by AUC-PR-0.5. Larger is better, maximum possible score is 0.5. Grooves with higher indices are shallower and thus harder to detect. 3.4.2 Influence of weights In the previous experiment, the individual sensors detections were weighted by factors : to take into account the local SNR. To this end, SNR is computed from a null distribution of background signal intensities, similarly to what was described in section 3.2. But in instead of forming probabilities, we compute a z-score : =  − |̂ ]^__ ⁄~Y]^__ from the respective signal intensity under the null distribution using robust estimates of |] S€ and ~] S€ . This linear transform normalizes the intensities among different sensors while preserving the intensity information. In this section, we repeat the experiment of section 3.4.1, but without weighting the individual hits by setting all weights : = 1. Therefore, the fused density is only influenced by the proximity of the individual hits. This setting represents inspection results for which no measure of confidence is available. See Figure 11 for the resulting detection performance, based on unweighted hits. In comparison to the weighted results shown in Figure 10, detection performance is generally worse. In particular, groove nr 14 is barely detectable with this approach. However, for larger kernel sizes at J = 5, optimal detection results are still possible for most defects. We explain this by the observation that 5CY equals the groove length for our specimen. Therefore, all hits from a groove contribute to the fused intensity, whereas for smaller kernel sizes, different parts of the grooves are unrelated. This is clearly seen at J = 0, where performance is the poorest, in agreement with the previous experiment. Note that the general trend of improved performance for larger kernels can partly be explained by a bias in the evaluation regime: Larger kernels lead to smoother densities that form fewer local maxima ( peaks “. Therefore, the number of potential false alarms after fusion decreases, which benefits precision. We conclude that, if possible, the weighted approach should be favored over the unweighted method. If weighting is not possible, kernel sizes should not be made too small to fully exploit the density information. We further suggest setting the kernel size smaller than or equal to the expected flaw length. Figure 11: Evaluation of different kernel sizes, for unweighted hits. 3.4.3 Influence of individual sensors The choice which sensors to fuse may have an impact on the detection capability. In particular, we are interested in the contribution that each individual source has on the fusion result. Therefore, we compute fused densities while excluding one of the three inspections, and compare these results to fusion using all three data sets. Based on the results of the previous two experiments, we choose a weighted KDE technique with kernel sizes set according to J = 0.5 which proved to perform well. The same evaluation locations were used as in section 3.4.1. We would like to remind the reader that our fusion approach involves suppressing single-sensor detections, i.e. areas in which the joint density is generated by only a single sensor. Therefore, if one sensor misses a defect due to poor SNR, both other sensors must yield hits to indicate this defect in the fusion result. In our experiment, the exclusion of one of these sensors will lead to strongly decreased performance. As Figure 12 shows, the full set of inspections is necessary to achieve the best detection performance here. Each two-sensor subset of inspection methods shows slightly different effects. Apparently, the thermographic data mainly help in detecting the shallow grooves 10-14. However, the same inspection seems to have missed the flaws 2, 3, 8 and 9, because the information from both MFL and ET is crucial for detection here. Among the deeper grooves, nrs. 1, 4, 5, 6 and 7 are perfectly found using any twosensor configuration, thus indicating that they are clearly represented in all three measurements. For the shallower set of grooves, the inclusion of the ET inspection seems to bring slightly smaller gains than including the MFL or TT inspection. In particular, the second shallowest groove, nr. 14, is readily detected using a combination of only MFL and TT. This is especially interesting in light of the following experiment, where single-sensor performance is contrasted with fusion performance. Figure 12: AUC-PR-0.5 values for fusion using different sub-sets of inspections. 3.4.4 Comparison against single-sensor detection Here we quantify the gain of fusion over single-sensor inspection. Again, we choose a weighted KDE technique with kernel sizes set to half the registration error (J = 0.5“. Unlike the previous experiments, which were all conducted in the same spatial coordinate system, here each single sensor has its own system. Since we compare each individual sensor against the fusion result, it is natural to evaluate the density from each of these individual comparisons in the respective single sensor s coordinate system. We super-sample each measurement grid to avoid missing density peaks. Note that in all three comparisons, the same density function is evaluated, albeit at different locations. To simplify the evaluation, we report only a single fusion result by selecting the worst outcome per groove among the three results. For fair comparison of single-sensor inspection against fusion, only the pixels that represent a local intensity maximum ( peak “ define the set of evaluated single-sensor locations. In particular, these points are not chosen according to their intensity. This set of hits is further filtered by the regions that should be ignored throughout the evaluation (see section 3.3“. A performance curve is formed by varying a threshold over this distribution of intensity peak values and counting precision and recall for each threshold value. In contrast, for the assessment decision-level fusion, the per-sensor detections are first judged according to their confidence, as described in section 3.2. From these hits, our fused density is then computed, which is in turn subjected to local maximum detection. The density values at these peak positions are then used to form the ROC curve for the fusion method. At this point, we emphasize that the results presented in this article are not representative for the general performance of each individual inspection method. It is possible that better individual results than shown here may be obtained by optimizing e.g. the specimen preparation, the sensors or the processing routines. Rather, in the following our focus is to demonstrate that our technique is able to perform well in the face of imperfect sources of information. Moreover, the single-sensor results are not fully comparable, because the inspected area of the specimen differs between sensors. Instead, each single-sensor inspection should only be compared against the fusion result. We report AUC-PR-0.5 values in Figure 13. According to our evaluation, the presented fusion technique achieves perfect detection results of AUC-PR-0.5 = 0.5 for the first 12 flaws and outperforms singlesource detection for grooves not deeper than 61 µm (groove nr. 6“. Interestingly, although the performance index drops below 0.05 for each individual testing technique from groove nr. 10 onwards, high performance above 0.4 is still possible using our fusion approach. This means that most actual defect indications along a flaw generate indications in the fused image that dominate the many off-groove false alarms, which can therefore be suppressed. In contrast, although the individual groove indications may surmount the measurement noise, they are not significantly different from the many off-groove indications, thus impairing precision. The last and shallowest groove (11 µm“ is not reflected in the fused density image, because only the MFL sensor is able to generate hits here. However, at the two shallow defects nr. 13 and 14, fusion performance is still above 0.28. Because we report the worst out of three density evaluations here and also the ground truths differ between experiments, this value is lower than the result presented in the previous section, where already a two-sensor combination provided perfect detection. In contrast, no individual sensor is able to indicate these shallow grooves at acceptable levels of precision. Figure 13: Per-groove performance comparison (bars“ of single sensor inspection versus the fusion approach. The maximum possible score is 0.5 (left vertical axis“. Here, fused actually denotes the worst per groove out of the three density evaluations (see section 3.4.3“. The set of grooves is divided into two sub-figures for clarity. Groove depth is indicated by the plotted line corresponding to the right vertical axis. Note the different axis scales for groove depth in the two subplots. 4 Discussion Our experiments demonstrate that our density-based approach is well-suited to incorporate indications from heterogeneous sensors. The number of false alarms can be strongly reduced relative to singlesensor inspection while retaining most of the defects. Regarding our evaluation index, for all grooves but the shallowest one, the fusion method performs as well as or better than single-sensor detection. The performance gain is most pronounced for the shallower defects, which usually generate less significant indications. We note that the principle to quantify agreement among sensors requires that all sensors yield redundant information about the object of interest, e.g. near-surface cracks in our case. That is, in NDT, all sensors must respond to the same flaw type in the same size range. If, in contrast, one of the sensors reports a defect that is not detectable by the other methods, it will be discarded as a false alarm by our technique, since it is not designed to fuse complementary information. Another point concerns the relationship between fusion performance and spatial uncertainty. Specifically, the fusion performance is expected to improve with registration accuracy. This is because kernels can be made narrower for smaller registration errors, and therefore the likelihood of a non-defect-related indication due to spurious multi-sensor agreement is reduced. In any case, the actual registration error must be quantified to set the kernel size accordingly. Moreover, the fusion technique strongly benefits from realistic estimates of the local signal to noise ratios, which enter the fused density through weights. For the final detection after fusion, a threshold could be chosen to retain only the significant density peaks. Thus, only few parameters (localization uncertainty, density threshold“ fully describe the methodology and are usually readily determined. Furthermore, if one is unsure about a fused indication, the original individual detections can always be reconsidered to collect additional evidence for or against the presence of a defect. After all, the density-based approach spatially associates neighboring hits and thus may serve as the basis for multi-sensor detection after feature extraction. For example, our density measure identifies narrow regions of increased defect likelihood. These regions can further be assessed by extracting features from each individual sensor in this region, which could be combined by some classification algorithm to reach a final conclusion. Concerning the number of sensors, we suggest using at least three different sources of information, as presented here. However, further investigations show that improved performance over single-sensor inspection is possible already for two sensors. Note that the more fusion inputs are provided, the higher the likelihood of the purely coincidental agreement between at least two sensors. Therefore, our proposal to subtract the largest contribution from the sum of individual densities will have to be extended if even more sensors are included. We would also like to point out the limitations of the current study. Whereas the eroded grooves facilitate detection assessment for well-defined defect depths, their linear shapes do not resemble natural defects. Also, whereas the orientation of our flaws is well-defined, natural defects often vary in orientation. Therefore, directionally sensitive measurements, such as ET using a differential probe and MFL using gradiometers, must be carried out multiple times in different directions. However, because this issue is only relevant for per-sensor detection prior to fusion, it is not further elaborated here. 5 Conclusion / Outlook We developed a density-based method for the fusion of spatially scattered data and applied it to sensor signals from the nondestructive testing of a bearing shell. This high-level fusion approach has the advantage of being independent from the processes that generate the scattered points. Three different mechanisms are implemented to increase robustness against false alarms. Practical suggestions on how to determine the parameters, especially the kernel size, are given. We quantitatively evaluated our technique using a defect detection experiment. The results demonstrate that single-sensor inspections of the specimen are outperformed by the proposed technique, especially for defects that are too shallow to be reliably indicated otherwise. Moreover, the proposed method is quite generic, as it receives spatial locations from single-source detection routines and returns areas of multi-sensor agreement. Therefore, it may be applied for detection tasks in other domains, such as medical image fusion. Acknowledgements We acknowledge the help of our colleagues in divisions 8.4 and 8.7 for kindly providing the measurements and for their support: M. Pelkner, R. Stegemann, T. Erthner, R. Pohl, M. Kreutzbruck, M. Ziegler, D. Mikolai and C. Maierhofer. [1] R.C. Luo, M.G. Kay, A tutorial on multisensor integration and fusion, in: Proceedings of the 16th Annual Conference of IEEE Industrial Electronics Society, 1990. IECON '90, 1990, pp. 707-722. [2] B. Zitová, J. Flusser, Image registration methods: a survey, Image and Vision Computing, 21 (2003“ 977-1000. [3] L.G. Brown, A Survey of Image Registration Techniques, ACM Comput. Surv., 24 (1992“ 325 376. [4] S. De, K. Gupta, R. Joe Stanley, R. Zoughi, K. Doering, D. Van Aken, G. Steffes, M. O'Keefe, D. Palmer, A Comprehensive Structural Analysis Process for Failure Assessment in Aircraft Lap-Joint Mimics Using Intramodal Fusion of Eddy Current Data, Research in Nondestructive Evaluation, 23 (2012“ 146170. [5] N. Brierley, T. Tippetts, P. Cawley, Data fusion for automated non-destructive inspection, Proceedings of the Royal Society A: Mathematical, Physical and Engineering Science, 470 (2014“. [6] M. Friedrich, G. Dobie, C.C. Chan, S.G. Pierce, W. Galbraith, S. Marshall, G. Hayward, Miniature Mobile Sensor Platforms for Condition Monitoring of Structures, IEEE Sensors Journal, 9 (2009“ 14391448. [7] J. Moysan, A. Durocher, C. Gueudré, G. Corneloup, Improvement of the non-destructive evaluation of plasma facing components by data combination of infrared thermal images, NDT & E International, 40 (2007“ 478-485. [8] K. Fukunaga, L. Hostetler, The estimation of the gradient of a density function, with applications in pattern recognition, IEEE Transactions on Information Theory, 21 (1975“ 32-40. [9] M. Ester, H.-p. Kriegel, J. S, X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, in: Proc. 2nd int. Conf. on Knowledge Discovery and Data Mining (KDD '96“, AAAI Press, Portland, Oregon, 1996, pp. 226 231. [10] M. Ankerst, M.M. Breunig, H.-P. Kriegel, J. Sander, OPTICS: Ordering Points to Identify the Clustering Structure, in: Proceedings of the 1999 ACM SIGMOD International Conference on Management of Data, ACM, New York, NY, USA, 1999, pp. 49 60. [11] Y. Weiss, Segmentation using eigenvectors: a unifying view, in: The Proceedings of the Seventh IEEE International Conference on Computer Vision, 1999, 1999, pp. 975-982. [12] E. Parzen, On Estimation of a Probability Density Function and Mode, The Annals of Mathematical Statistics, 33 (1962“ 1065-1076. [13] M. Rosenblatt, Remarks on Some Nonparametric Estimates of a Density Function, The Annals of Mathematical Statistics, 27 (1956“ 832-837. [14] N.-B. Heidenreich, A. Schindler, S. Sperlich, Bandwidth selection for kernel density estimation: a review of fully automatic selectors, AStA Advances in Statistical Analysis, 97 (2013“ 403-433. [15] M. Pelkner, Entwicklung, Untersuchung und Anwendung von GMR-Sensorarrays für die Zerstörungsfreie Prüfung von ferromagnetischen Bauteilen, Universität des Saarlandes, 2014, pp. 215. [16] M. Pelkner, V. Reimund, T. Erthner, N. Panke, M. Kreutzbruck, Automated inspection of surface breaking cracks using GMR sensor arrays, in: 40th Annual Review of Progress in Quantitative Nondestructive Evaluation, AIP Publishing, 2014, pp. 1393-1399. [17] R.R. Coifman, D.L. Donoho, Translation-invariant de-noising, Springer, 1995. [18] A. Ihler, M. Mandel, Kernel Density Estimation Toolbox for MATLAB (R13“, 2003, http://www.ics.uci.edu/~ihler/code/kde.html.
5cs.CE
1 Performance Analysis of NOMA in Training Based Multiuser MIMO Systems arXiv:1711.01813v1 [cs.IT] 6 Nov 2017 Hei Victor Cheng, Emil Björnson, and Erik G. Larsson Department of Electrical Engineering (ISY), Linköping University, Sweden Email: {hei.cheng, emil.bjornson, erik.g.larsson}@liu.se Abstract—This paper considers the use of NOMA in multiuser MIMO systems in practical scenarios where CSI is acquired through pilot signaling. A new NOMA scheme that uses shared pilots is proposed. Achievable rate analysis is carried out for different pilot signaling schemes including both uplink and downlink pilots. The achievable rate performance of the proposed NOMA scheme with shared pilot within each group is compared with the traditional orthogonal access scheme with orthogonal pilots. Our proposed scheme is a generalization of the orthogonal scheme, and can be reduced to the orthogonal scheme when appropriate power allocation parameters are chosen. Numerical results show that when downlink CSI is available at the users, our proposed NOMA scheme outperforms orthogonal schemes. However with more groups of users present in the cell, it is preferable to use multi-user beamforming in stead of NOMA. I. I NTRODUCTION Non-orthogonal-multiple-access (NOMA) is a new multiple-access concept proposed for next generation wireless networks [2]. The key idea behind NOMA is the use of superposition coding [3], and associated interference cancellation techniques, to serve multiple terminals in the same time-frequency slot. This is classified as NOMA in the power domain. NOMA provides the ability to increase capacity, especially when the number of users exceeds the dimension of the channel coherence interval, or the number of spatial dimensions (antennas) available for multiplexing is limited. The technology is currently attracting much attention [4]–[7]. In the standardization of 3GPP-LTE-Advanced networks, a NOMA technique for the downlink (DL), called multiuser superposition transmission (MUST), was recently proposed [8]. Concurrently, multiuser MIMO is becoming a cornerstone technology in emerging standards for wireless access. The idea is to use multiple, phase-coherently operating antennas at the base station to simultaneously serve many terminals and separate them in the spatial domain. The basic multiuser MIMO concepts and the associated information theory go back a long time [9]–[11]. The most useful form of multiuser MIMO is massive MIMO, which emerged more recently [12], [13]. In massive MIMO, the base stations use hundreds of antennas to serve tens of terminals – harnessing a large spatial This work was supported by the Swedish Research Council (VR), the Linköping University Center for Industrial Information Technology (CENIIT), and the ELLIIT. Part of this work has been presented at IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2017 [1], however there is an error in the Fig. 2 which is corrected in this paper. multiplexing gain for high area throughputs, as well as a large array gain for improved coverage. The question addressed in this paper is under what circumstances the use of NOMA can provide gains in multiuser MIMO systems. While this question per se is not new, no existing study to the authors’ knowledge addressed it under realistic assumptions on the availability of channel state information (CSI). Specifically, previous work either assumed perfect CSI [5], [14] or only statistical CSI [15]. In contrast, we consider the use of training (pilot transmission) to acquire estimated CSI, and we derive rigorous capacity bounds for NOMA-based access under these practical conditions. Training-based NOMA schemes have been considered in [16], but only for singleantenna systems and hence only downlink pilots are sent to the users for estimating their effective channel gains. Moreoever, in multi-user MIMO the effective channels depend on the beamforming, which complicates the analysis. Beamforming with imperfect CSI also creates extra interference to the users, which has not been investigated in the literature. In contrast, in this work pilots are transmitted on the uplink (UL), facilitating the base station to estimate all channels. By virtue of reciprocity and time-division-duplex (TDD) operation, the so-obtained estimates constitute legitimate estimates of the downlink channel as well and can be used for coherent beamforming. However, since the terminals do not know their effective channels, we consider also the possibility of sending (beamformed) pilots in the DL. The assumptions made on availability of CSI are critical in the analysis of wireless access performance: Perfect CSI (or even high-quality CSI) is unobtainable in environments with mobility, and performance analyses conducted under perfectCSI assumptions often yield significantly overoptimistic results. Conversely, the reliance on only statistical CSI precludes the full exploitation of spatial multiplexing gains, rendering any performance results overpessimistic. The quality of the channel estimates that can ultimately be obtained is dictated by the length of the channel coherence interval (CI) (product of the coherence time and the coherence bandwidth): the higher mobility, the less room for pilots, the lower-quality CSI – and vice versa. Since the coherence time is proportional to the wavelength, the use of higher carrier-frequencies accentuates this problem. In high mobility and at high frequencies, the channel coherence may become very short and eventually one is forced to use non-coherent communication techniques [17]. The specific technical contributions of this paper are: ‚ We propose a training scheme to obtain CSI and utilize 2 ‚ ‚ the NOMA concept in a DL multiuser MIMO system. The derivation of new, rigorous, semi-closed form lower bounds on the DL capacity in multiuser MIMO with NOMA, with and without DL pilots. A numerical demonstration that NOMA can give gains in multiuser MIMO with estimated CSI under appropriate conditions, and a discussion of relevant application scenarios, most importantly that of rate-splitting and multicasting. II. S YSTEM M ODEL We consider a single-cell massive MIMO system with M antennas at the base station (BS) and K (even number) singleantenna users. Among these users, K{2 of them are located in the cell center, while the other K{2 users are at the cell edge. TDD operation is assumed and therefore the BS acquires downlink channel estimates through uplink pilot signaling, by exploiting channel reciprocity. These estimates are used to perform downlink multiuser beamforming. These operations have to be done within the same CI, where the channels are approximately constant. Therefore the more symbols spent on uplink training, the fewer symbols are available for data. We consider non-line-of-sight communication and model the small-scale fading for each user as independent Rayleigh fading. We denote the small-scale fading realizations for the users at the cell center as gk „ CN p0, IM q, k “ 1, . . . , K{2. (1) βgk The corresponding large-scale fading parameters are ą 0, k “ 1, . . . , K{2 for the b users in the cell center; the actual channel realization is then βgk gk . Similarly, the small-scale fading realizations for the users at the cell edge are denoted as hk „ CN p0, IM q, k “ 1, . . . , K{2. (2) The corresponding large-scale fading parameters are βhk ą 0, k “ 1, . . . , K{2 b for the users at the cell edge. The actual channel is then βgk gk . The large-scale fading is widely different between the two sets of users: βgk " βhk . Note that this is the scenario of interest to us, but the formulas will actually be valid for any values of βgk and βhk . The names ”cell edge” and ”cell center” are just descriptive, but should not be interpreted literally. The BS is assumed to know the deterministic parameters βgk and βhk . However the small-scale fading realizations are unknown a priori and changing independently from one CI to another CI. To estimate the small-scale fading realizations at the BS, in traditional TDD multiuser MIMO, orthogonal uplink pilots are transmitted from the users in the cell. However, the number of available orthogonal pilot sequences is limited by the size of the CI and this effectively limits the number of users that can be scheduled simultaneously. In this study, we are interested in the case when K is greater than the number of available pilot sequences. To facilitate discussion and analysis, we assume that there are only K{2 orthogonal pilot sequences available. With this assumption, we compare two schemes that make use of the K{2 pilot sequences differently. A. Orthogonal Access Scheme The first scheme is the traditional orthogonal access scheme [18] that schedules K{2 users in a fraction η of time-frequency resources, and then serve the others in the remaining fraction 1 ´ η of the resources. To minimize near-far effects, we schedule the K{2 users at the cell center in the first fraction η, followed by the other K{2 users at the cell edge in the remaining 1 ´ η of the resources. From now on we call this Scheme-O. B. Proposed NOMA Scheme The second scheme is a generalization of an existing scheme in the NOMA literature [19], which creates K{2 groups, each with one user at the cell edge and one at the cell center. In [19], the beamformers are selected based on the channel of the cell center user, but NOMA with superposition coding is applied within each group so that the cell edge user can get a separate data signal. The beamformers can be selected to mitigate the inter-group interference. For example, in [19], zero-forcing beamforming is applied to cancel inter-group interference. However, this existing scheme can only provide the user at the cell edge with a small data rate. This is so because the beams are directed to the stronger user in the group, thus the weaker user will not have any beamforming gain and this results in low received power and no interference suppression. Moreover, the existing work is based on the impractical assumption of perfect CSI. In [20] a two-stage beamformer is proposed where the outer stage aims to cancel the inter-group interference and the inner stage beamformer is optimized to enhance the rate performance for the users within the group. However this approach needs perfect CSI at the BS which is hard to obtain in practice and therefore we do not consider it here. We propose a generalization of the NOMA scheme from [19] and devise a way to estimate the channels in practice. To resolve the pilot-shortage problem, we propose to reuse the same pilot for multiple terminals in the same cell. In particular, the BS allocates the same pilot to the two terminals in a group, where one is in the cell center and one is at the cell edge.1 Since the two users are using the same pilot and have the same small-scale fading statistics, we will later see that the BS cannot distinguish their channel responses. However, the BS can estimate a linear combination of the channels to both terminals from the pilot transmission. This estimate provides a useful description of the combined channel, particularly, if power control is used to even out the pilot signal strengths of the two terminals. In our proposed scheme, the BS beamforms a combination of the data symbols intended for the two terminals using the estimated channels. We make use of the NOMA concept for which the symbols intended for different users are super-imposed using super-position coding. The cell edge user performs the decoding by treating inter-user interference as noise, while the cell center user decodes the other user’s data first and performs interference cancellation before decoding its own data. Since the beamformers are based 1 This scheme can be extended to more than two users, and we will briefly discuss about this in Section V. 3 eplacements UL Pilots UL Pilots DL Data: DL Pilots All Users UL Pilots DL DL Data: Cell Center Users UL Pilots Pilots DL Pilots DL Pilots One CI DL Data: All Users DL Data: Cell Edge Users Another CI Fig. 1. Frame structure in the considered training based multiuser MIMO systems. Upper figure: frame structure for the proposed Scheme-N, where all users are scheduled by sharing pilots. Bottom figure: common frame structure for Scheme-O, where users are scheduled in different CIs. user (2,g) eplacements user (1,g) user (2,g) user (1,g) user (2,h) user (1,h) (a) user (1,h) user (2,h) (b) Fig. 2. The training and the beamforming stages for Scheme-N. (a) the transmissions during the uplink training stage where two users with the same index share the same orthogonal pilot. (b) the beamforming transmission for the data where the same beam is formed for every two users. on the channels of all users, the proposed scheme can deliver good data rates to everyone. From now on we call this generalized NOMA scheme Scheme-N. Fig. 1 shows the frame structure for the two schemes, Scheme-O and Scheme-N, and Fig. 2 shows the training and beamforming operations for Scheme-N. III. U PLINK C HANNEL E STIMATION In this section we consider the uplink channel estimation for the two schemes that we are comparing. The channel estimation is different from in conventional systems since the number of users scheduled in one slot and the pilot orthogonality are different. We denote the pilot matrix by Φ P CK{2ˆK{2 that contains the K{2 orthogonal pilot sequences in its rows, i.e. ΦΦH “ IK{2 . For Scheme-O, the K{2 users at the cell center are schedO P CMˆK{2 uled first, and the received uplink pilot signal Yuc is ? O Yuc “ pu GDg Φ ` Nuc , (3) b b K{2 where Dg is a diagonal matrix with βg1 , . . . , βg on its diagonal. Then the K{2 users at the cell edge are scheduled O in a subsequent CI and the received uplink pilot signal Yue P MˆK{2 C is ? O (4) Yue “ pu HDh Φ ` Nue , b a K{2 where Dh is a diagonal matrix with βh1 , . . . , βh on its diagonal. For Scheme-N, the received uplink pilot signal YuN P CMˆK{2 is ? ? YuN “ pu GDg Ag Φ ` pu HDh Ah Φ ` Nu , (5) where Ab and Ah are diagonal matrices with g b b a K{2 K{2 and α1g , . . . , αg α1h , . . . , αh on the diagonal respectively. Nuc , Nue and Nu represent the additive noise during pilot transmission with independent and identically distributed (i.i.d.) CN p0, 1q entries. αkh ď 1 and αkg ď 1 are the positive power control parameters applied to the pilot to (potentially) even out the channel estimation quality between the users in the same group. Without loss of generality, the k th user at the cell center is paired with the k th user at the cell edge to form the k th group in Scheme-N, and they are using the same pilot sequence. From now on we call the cell edge user in the k th group “user pk, hq” and the cell center user in the k th group “user pk, gq”. A. MMSE Channel Estimation for Scheme-O In this subsection, we consider the channel estimation for Scheme-O. The estimates will be used in the next section for performance analysis. The BS first processes the received pilots signals by multiplying with ΦH from the right. The processed pilot signal in (3) becomes b O H O ȳuc,k “ rYuc Φ sk “ pu βgk gk ` n̄uc,k , k “ 1, . . . , K{2, (6) where n̄uc,k “ rNuc ΦH sk „ CN p0, IM q, for the users at the cell center, and where r¨sk denotes the kth column of a matrix . The processed pilot signal in (4) becomes b O O H ȳue,k “ rYue Φ sk “ pu βhk hk ` n̄ue,k , k “ 1, . . . , K{2, (7) where n̄ue,k “ rNue ΦH sk „ CN p0, IM q, for the users at the cell edge. Based on the processed received pilots, the BS then performs channel estimation. We consider MMSE channel estimation here. Using classical results from [21], we obtain the MMSE channel estimate of gk is b pu βgk ȳuc,k , k “ 1, . . . , K{2 (8) ĝk “ pu βgk ` 1 for users at the cell center and the MMSE estimate of hk is b pu βhk ĥk “ ȳue,k , k “ 1, . . . , K{2 (9) pu βhk ` 1 for users at the cell edge. B. MMSE Channel Estimation for Scheme-N Similar to the case of Scheme-O, the BS first processes the received pilot signal by multiplying with ΦH from the right in (5) and obtains the processed received signals b N “ rYuN ΦH sk “ pu αkg βgk gk ȳu,k b (10) ` pu αkh βhk hk ` n̄u,k , k “ 1, . . . , K{2, 4 where n̄u,k “ rNu ΦH sk „ CN p0, IM q. Then the MMSE channel estimate of gk for a user in the cell center is b pu αkg βgk ĝk “ ȳ N , k “ 1, . . . , K{2. pu αkg βgk ` pu αkh βhk ` 1 u,k (11) The MMSE channel estimate of hk for a user at the cell edge is b pu αkh βhk ĥk “ ȳ N , k “ 1, . . . , K{2. (12) pu αkg βgk ` pu αkh βhk ` 1 u,k We observe that ĝk and ĥk are parallel, thus the BS cannot distinguish between the channel “direction” of users that share the same pilot. This effect is a consequence of pilot contamination. Pilot contamination is a major issue in massive MIMO system, since it makes it hard for the BS from performing coherent beamforming only towards one of the users that share a pilot [12]. In contrast, if the same data is multicasted to multiple users, it is desirable to jointly beamform towards all of them. Pilot contamination is then useful to reduce the pilot overhead [22]. In this paper, we will show how to exploit NOMA to send different data to the users that share a pilot. One alternative way to utilize the uplink pilots is to estimate the linear combination b b wk “ αkg βgk gk ` αkh βhk hk of the channels. The MMSE estimate of wk for group k is ? ? pu αkg βgk ` pu αkh βhk N ȳ , ŵk “ pu αkg βgk ` pu αkh βhk ` 1 u,k k “ 1, . . . , K{2. (13) Note that ŵk is also parallel with ĝk and ĥk . The choice of channel estimate does not matter because in either case the channel estimates are linearly scaled versions of the processed pilot signal. Hence the beamforming directions suggested by the estimates are the same by using any one of the estimators. Since we need to normalize the beamformer to satisfy the power constraint, the scaling disappears after normalization and therefore does not affect the rate. C. Interference-Limited Scenarios We can obtain a special case by assuming there is no noise during the uplink training, or equivalently that the uplink power pu goes to infinity. This yields as an upper bound on the performance of all the schemes. It is also a good approximation of the interference-limited scenario with high SNR, but large inter-user interference. For Scheme-O, noise-free channel estimation implies that the channels are perfectly known at the BS, due to the fact that all users use orthogonal pilots in the uplink training, i.e., ĝk “ gk , k “ 1, . . . , K{2, (14) ĥk “ hk , k “ 1, . . . , K{2. (15) and In contrast, for Scheme-N, the channel estimate at the BS will still be a linear combination of the channels because of the use of the same pilot in each group. The noise-free estimate of wk becomes ŵk “ b b αkh βhk hk ` αkg βgk gk “ wk , k “ 1, . . . , K{2. (16) IV. P ERFORMANCE A NALYSIS In this section, we analyze the ergodic achievable rates of Scheme-O and Scheme-N under imperfect channel estimation. In wireless systems with fast fading channels, channel codes span many realizations of the fading process. Therefore the ergodic achievable rate is an appropriate metric to characterize the performance of coded systems in fast fading environment. It is commonly adopted in the multiuser MIMO literature, especially when the number of antennas is large. We make use of the UL channel estimates from Section III for downlink beamforming, by assuming perfect reciprocity between UL and DL. The channel estimation errors are taken into account in the ergodic achievable rate expressions. We separate the analysis into three parts, namely the cases with and without instantaneous DL CSI, and the case with estimated DL channel gains. The case with instantaneous downlink CSI is unobtainable in practice, and used only as a benchmark. that ˘ the effective ergodic rate have a prelog penalty ` Note K for the case without DL pilots, where T is the size 1 ´ 2T of the CI. This penalty accounts for the loss from spending K 2T of every CI to estimate the ˘ For the case with DL ` channels. pilots, the pre-log penalty is 1 ´ K T . A. Downlink Signal Model Denote by pd the DL transmission power normalized by the noise variance. For Scheme-O, the received signal for user k in the cell center is b (17) yc,k “ pd βgk gkT xg ` nc,k , k “ 1, . . . , K{2, and the received signal for user k at the cell edge is ye,k “ b pd βhk hTk xh ` ne,k , k “ 1, . . . , K{2, (18) where xg (xh ) is the signal vector containing data for the cell center users (cell edge users), and nc,k (ne,k ) is the normalized i.i.d. zero mean unit variance complex Gaussian noise at the k th user at the cell center (edge). Before transmission, each data symbol is multiplied with a beamforming vector as xg “ K{2 ÿ bk K{2 ÿ ak k“1 b O s γk,g k,g (19) for the users in the cell center and xh “ k“1 b O s γk,h k,h (20) for the users at cell edge. In the above equations γk,h (γk,g ) represents the non-negative power control coefficients for user 5 k at the cell edge (cell center), and sk,h (sk,g ) is the data symbol intended for user k at the cell edge (cell center) which is zero mean and unit variance. The combined signal vectors xh and xg need to satisfy the power constraint ErxH h xh s ď 1 and ErxH g xg s ď 1. In this work we focus on maximum ratio transmission (MRT) which is simple to implement and performs close to optimality in low SNR scenarios, ĝ ˚ bk “ a k Er||ĝk ||2 s for the cell center users and ĥ˚k ak “ b Er||ĥk ||2 s for the cell edge users. With the normalized beamforming řK{2 O vectors, the power constraint becomes k“1 γk,g ď 1 and řK{2 O γ ď 1. k“1 k,h For Scheme-N, the received downlink signal for users in the cell center is yk,g “ K{2 b ÿ ? gkT ai γi,h si,h pd βgk i“1 K{2 b ÿ ? ` pd βgk gkT bi γi,g si,g ` nk , k “ 1, . . . , K{2. i“1 (21) Similarly, the received downlink signal for users at the cell edge can be written as yk,h “ K{2 b ÿ ? pd βhk hTk ai γi,h si,h i“1 K{2 b ÿ ? ` pd βhk hTk bi γi,g si,g ` nk , k “ 1, . . . , K{2. i“1 (22) In Scheme-N, where the BS knows only the linear combination of the channels for the users in the same NOMA group, it regards the estimate as the true channel for both users pk, gq and pk, hq since that is the best estimate available. The combined symbols from both terminals in the same group ? are weighted with the power control coefficients γk,h and ? γk,g . The transmitted symbol in the k th NOMA group is ? ? hence ř ` γk,g sk,g . Therefore the power constraint ř γk,h sk,h is k γk,h ` k γk,g ď 1. In this case we have the MRT beamforming vector with normalization ŵk˚ ak “ bk “ a . Er}ŵk }2 s (23) B. Performance With Perfect CSI at the Users In this subsection, we compute the ergodic achievable rate for the two schemes under the assumption that the DL pilots make perfect DL CSI available at the users. This assumes that DL pilots are sent in each CI and users perform channel estimation to obtain their own channel gain coefficients and the cross-channel gains between different users. The achievable rate is obtained by averaging over all sources of randomness in the channel and noise. For Scheme-O, every user decodes its own data symbol by treating interference as noise. Since perfect CSI is available, an ergodic achievable rate of user k with beamforming vector a1 , . . . , aK and b1 , . . . , bK can be computed using [13, Section 2.3.5] ¸ff « ˜ ˙ ˆ k O T 2 p β γ |g b | K d k g k,g k O ř O T 2 ηE log2 1 ` Rc,k “ 1´ T |gk bj | ` 1 pd βgk j γj,g (24) for the users in the cell center and « ˜ ¸ff ˆ ˙ k O T 2 p β γ |h a | K d k h k,h k O ř O T 2 Re,k “ 1´ p1´ηqE log2 1 ` T |hk aj | ` 1 pd βhk j γj,h (25) for the users at the cell edge. The ergodic achievable rates are measured in b/s/Hz, and they can be achieved by using Gaussian signaling and codewords that span over all channel realizations. The pre-log factors account for the loss in achievable rate due to the fact that each user is only scheduled for a fraction of the CIs, in time or frequency. For Scheme-N, recall that we name the k th user at the cell edge as pk, hq and the k th user at the cell center as pk, gq. The instantaneous SINR of sk,h of user pk, gq is pd βgk γk,h |gkT ak |2 ř pd βg j‰k γj,h |gkT aj |2 ` pd βgk j γj,g |gkT bj |2 ` 1 (26) and similarly the instantaneous SINR of sk,h at user pk, hq can be written as SINRk,g “ ř k pd βhk γk,h |hTk ak |2 ř . T k T 2 2 j‰k γj,h |hk aj | ` pd βh j γj,g |hk bj | ` 1 (27) The condition that user pk, gq can decode the data intended for user pk, hq is that the ergodic achievable rate of sk,h at user pk, gq is no less than the ergodic achievable rate of sk,h at user pk, hq, which is explicitly SINRk,h “ pd βhk ř Erlog2 p1 ` SINRk,g qs ě Erlog2 p1 ` SINRk,h qs. (28) When this condition does not hold, we need to lower the data rate to user pk, hq such that it can be decoded at user pk, gq. This can be done by choosing NP Rk,h “ min pErlog2 p1 ` SINRk,g qs, Erlog2 p1 ` SINRk,h qsq . (29) Since Erlog2 p1 ` SINRk,h qs is an achievable rate for user pk, hq, from an information-theoretic perspective any rate that is lower than that is also achievable. Therefore by transmitting NP with the chosen Rk,h both users are able to decode the data. In practice, for (28) to hold we just need to properly control the pilot powers such that (28) holds. Then user pk, gq gathers all received signals over all channel realizations (coherence intervals) and decodes the data for user pk, hq. Notice that the 6 SIC is done after the whole codeword is decoded, and not performed in every CI. Therefore it is not a problem if the instantaneous SINR is lower at user pk, gq, as long as (28) is satisfied in the long term. In the typical scenarios of βhk ! βgk , there is a wide range of possible choices of power control parameters on the pilots available to satisfy (28). With any choice of power control satisfying (28) we transmit with the super-position coding scheme such that user pk, hq decodes the signal sk,h from yk,h by treating the signal from user pk, gq as noise. Then user pk, gq performs successive interference cancellation such that it first decodes sk,h from yk,g and then subtracts b ? pd βgk gkT ak γk,h sk,h from yk,g and decodes sk,g afterwards. With the superposition coding scheme, the achievable rate of user pk, gq is given in (30) and the achievable rate of user pk, hq is given in (31) on top of next page. It is worth noticing that when αkg “ γk,g “ 0 @k and k N O αh “ 1, one can obtain Rk,h “ Re,k with η “ 1. Similarly k when αh “ γk,h “ 0 , @k and αkg “ 1, one can obtain N O Rk,g “ Rc,k with η “ 0. By using time-sharing between these two extremes, we obtain all the ergodic achievable rates that Scheme-O can attain. This shows that Scheme-N is more general than the traditional scheme with orthogonal access. C. Performance Without Downlink CSI In this section we investigate the case when instantaneous DL CSI is not available, however we assume the channel statistics are known by all parties. This corresponds to the case when no DL pilots are sent and serves as a lower bound on the performance of all the schemes with estimated DL channels. In this case users utilize the long term statistics as the channel gain and decode the signals, that is, they take the statistical average of the effective gain as an estimate of that gain. Then the achievable rate is obtained by gathering all the symbols over different channel realizations and decoding the signal. Assume the BS uses the estimated CSI for beamforming to all terminals. Since we are considering MRT beamforming, ak and bk are scaled versions of the channel estimate ŵk N which is a scaled version of the processed pilots ȳu,k . Then N˚ the beamforming vector is ak “ bk “ ck ȳu,k where the normalizing constant ck that meets the power constraint can be calculated as 1 1 . (32) “b ck “ b N }2 s Er}ȳu,k ppu αkh βhk ` pu αkg βgk ` 1qM Therefore the received signal at user pk, gq is b N ˚? yk,g “ ck βgk gkT ȳu,k pd γk,h sk,h b N ˚? pd γk,g sk,g ` Ik,g ` nk,g , ` ck βgk gkT ȳu,k where Ik,g “ b ÿ N ˚? βgk pd γj,h sj,h cj gkT ȳu,j j‰k b ÿ N ˚? pd γj,g sj,g cj gkT ȳu,j ` βhk j‰k (33) (34) is the interference from other groups of users. Similarly, the received signal at user pk, gq is b N ˚? pd γk,h sk,h yk,h “ ck βhk hTk ȳu,k b (35) N ˚? ` ck βhk hTk ȳu,k pd γk,g sk,g ` Ik,h ` nk,h , where Ik,h “ b ÿ N ˚? βhk pd γj,h sj,h cj hTk ȳu,j j‰k b ÿ N ˚? ` βhk cj hTk ȳu,j pd γj,g sj,g (36) j‰k is the interference from other groups of users. Now we make use of the channel statistics to write the received signal at terminal pk, hq as  „ b N ˚? (37) pd γk,h sk,h ` zk,h yk,h “ E ck βhk hTk ȳu,k where we have introduced the following effective noise term „ b ˙ ˆ b N ˚? N ˚? zk,h “ ck βhk hTk ȳu,k pd γk,h ´ E ck βhk hTk ȳu,k pd γk,h b N ˚? sk,h ` ck βhk hTk ȳu,k pd γk,g sk,g ` Ik,h ` nk,h . (38) It can be easily verified that zk,h is uncorrelated with the signal term in (37). Therefore (37) can be regarded as an equivalent scalar channel with deterministic known gain and additive uncorrelated noise. Using the fact that additive Gaussian noise is the worst case uncorrelated noise [13, Section 2.3.2], the following rate is achievable for user pk, hq: Proposition 1. The following ergodic rate is achievable for user pk, hq with Scheme-N: ˆ ˙ ˆ ˙ K pd λk,h βhk γk,h M N ip Rk,h “ 1´ , log2 1 ` 2T pd λk,h βhk γk,g M ` pd βhk ` 1 (39) where λk,h is defined as λk,h “ pu αkh βhk . pu αkh βhk ` pu αkg βgk ` 1 (40) Proof. The proof is given in Appendix A. We define λk,g “ pu αkg βgk pu αkh βhk ` pu αkg βgk ` 1 (41) to quantify the channel estimation quality for the following discussion. Under the condition αkh βhk ď αkg βgk , the effective SINR of the signal sk,h at user pk, gq is greater than the effective SINR of the signal sk,h at user pk, hq, i.e., pd λk,g βgk γk,h M pd λk,h βhk γk,h M . ď pd λk,g βgk γk,g M ` pd βgk ` 1 pd λk,h βhk γk,g M ` pd βhk ` 1 (42) Therefore we can use NOMA where user pk, gq decodes data from user pk, hq and then subtracts it from the received signal yk,g . From the sufficient condition αkh βhk ď αkg βgk we see that it is better to let the user with larger large-scale fading coefficient 7 NP Rk,g ˜ ¸ff ˙ « ˆ pd βgk γk,h |gkT ak |2 K ř ř E log2 1 ` “ 1´ T pd βgk j‰k γj,h |gkT aj |2 ` pd βgk j‰k γj,g |gkT bj |2 ` 1 NP Rk,h ¸ff ˜ ˆ ˙ « K pd βhk γk,h |hTk ak |2 ř ř “ 1´ E log2 1 ` T pd βhk j‰k γj,h |hTk aj |2 ` pd βhk j γj,g |hTk bj |2 ` 1 perform successive interference cancellation as the condition is easier to satisfy. We have the new received signal ı ” b N˚ ? pd γk,h sk,h ȳk,g “ yk,g ´ E ck βgk gkT ȳu,k ı? ” b N˚ pd γk,g sk,g “ E ck βgk gkT ȳu,k ´ b ” b ı¯ ? N˚ N˚ ` ck βgk gkT ȳu,k pd γk,h sk,h ´ E ck βgk gkT ȳu,k ” b ı¯ ? ´ b N˚ N˚ pd γk,g sk,g ´ E ck βgk gkT ȳu,k ` c βgk gkT ȳu,k ` Ik,g ` nk,g . (43) We can similarly write the effective noise as ” b ı¯ ? ´ b N˚ N˚ pd γk,h sk,h ´ E ck βgk gkT ȳu,k zk,g “ ck βgk gkT ȳu,k ” b ı¯ ? ´ b N˚ N˚ pd γk,g sk,g ´ E ck βgk gkT ȳu,k ` c βgk gkT ȳu,k ` Ik,g ` nk,g . (44) Proposition 2. The following ergodic rate is achievable for user pk, gq with Scheme-N: ˜ ¸ ´ λk,g βgk γk,g M τ ¯ N ip Rk,g “ 1 ´ log2 1 ` . (45) 2T pd βgk ` 1 Proof. The proof is given in Appendix B. From the ergodic rate expressions, we can observe that the signal terms are proportional to M , which is the array gain from coherent beamforming. Moreover, we observe that the total interference from other groups of users is a constant that only depends the user’s own large-scale fading, but not on the number of antennas or channel estimation quality. Therefore the only parameters that affect the rate are the power control parameters and the uplink channel estimation quality. Adding more groups of users in Scheme-N will only change the amount of power that is allocated to each group, but not the total interference. Each user at the cell edge is affected by coherent interference from the signal intended for the cell center user in its group. However, for the users in the cell center, coherent interference disappears in the successive interference cancellation and the only effect of the pilot contamination is the degraded channel estimation quality. Using similar calculations, we obtain the ergodic achievable rate expressions for Scheme-O. For users in the cell center, we have ˜ ¸ ˙ ˆ k O λO K k,g βg γk,g M Oip η log2 1 ` , Rc,k “ 1 ´ 2T pd βgk ` 1 (46) k “ 1, . . . , K{2 where λO k,g “ pu βgk . pu βgk ` 1 (30) (31) (47) For users at the cell edge, we have ¸ ˜ ˆ ˙ O λO K k,h γk,h M Oip , Re,k “ 1 ´ p1 ´ ηq log2 1 ` 2T pd βhk ` 1 (48) k “ 1, . . . , K{2 where λO k,h “ pu βhk . pu βhk ` 1 (49) As in the case with perfect CSI at the users, when we set αkh “ γk,h “ 0, @k and αkg “ 1 in Scheme-N we get the achievable rate of the users in the cell center in Scheme-O with η “ 1. Setting αkh “ γk,h “ 0, @k and αkh “ 1 we get the achievable rate of the users at the cell edge in Scheme-O with η “ 0. By using time-sharing between these two extremes, we obtain all the ergodic achievable rates that Scheme-O can attain. D. Performance With Estimated Downlink CSI DL CSI does not come for free. In practice some form of estimation of the beamformed channel gain is usually needed. In this subsection, we investigate the performance of the two schemes when we send DL (beamformed) pilots [23] for the channel estimation. For Scheme-O every user receives its own orthogonal pilot. For Scheme-N, since we are using the same beamformer for the pair of users in every group k, only one downlink pilot is needed for every pair of users. In this case the users estimate their effective channel gain and perform a form of “equalization” using the estimated channel gain (see below for the details). We denote the channel gain at user pk, hq as fk,h fi hTk ak . Then the received pilot at each of these users is b (50) ydpk,h “ fk,h pd βhk ` ndpk,h , k “ 1, . . . , K{2. Assuming LMMSE estimation [21] at the user, we obtain the estimate fˆk,h “ Erfk,h s b ˙ b βhk pd Varrfk,h s ˆ ydpk,h ´ βhk pd Erfk,h s , ` k βh pd Varrfk,h s ` 1 (51) of the channel gain where a Erfk,h s “ M λk,h , (52) Varrfk,h s “ 1. 8 The estimation quality will improve with M as the mean of the channel gain is increasing with M while the variance is constant. Similarly, denote the channel gain at user pk, gq as fk,g fi gkT bk . The received pilot at each of these user is b (53) ydpk,g “ fk,g pd βgk ` ndpk,g , k “ 1, . . . , K{2. Applying LMMSE estimation yields the estimate fˆk,g “ Erfk,g s b b ¯ (54) βgk pd Varrfk,g s ´ ydpk,g ´ βgk pd Erfk,g s , ` k βg pd Varrfk,g s ` 1 where Erfk,g s “ a M λk,g , Varrfk,g s “ 1. A. User Pairing In this paper we are investigating the effects of imperfect CSI obtained through uplink training. The channels are not known a priori; the only information available at the BS regarding the channel strength is the large scale fading coefficients of the users. As a result the user pairing has to be done based on the large-scale fading coefficients tβk u. This can also be observed from the achievable rate expressions. This is the same condition that has been discussed in [24]. However the differences are that first, in our case there is a beamforming gain of order M which effectively increases the SNR and second, the existence of self-interference caused by channel estimation errors. A detailed analysis would be interesting, but has to be left for future work. (55) With these estimates of the channel gains, we first divide the received signal at user pk, hq by the channel estimate. This can be seen as a form of equalization, and ideally the ratio fk,g is one. Then we use the same method as above to obtain fˆk,g the achievable rate of user pk, hq in (56) on top of next page. Similarly for user pk, gq, an achievable rate is given in (57) on top of next page. For Scheme-O, similar techniques can be applied to obtain the achievable rate for the users in the cell center given in (58) on top of next page. The corresponding achievable rate for the users at the cell edge is given in (59) on top of next page. As in the case with perfect CSI at the users, when we set αkh “ γk,h “ 0, @k and αkg “ 1 we get the achievable rate of the users at the cell center in Scheme-O with η “ 1. Setting αkh “ γk,h “ 0, @k and αkh “ 1 we get the achievable rate of the users at the cell edge in Scheme-O with η “ 0. By using time sharing between these two extremes, we obtain all the ergodic achievable rates that Scheme-O can attain. Table I summarizes all the ergodic rate expressions we have obtained, they are all listed in Table I with reference to the equation numbers. Comparing the achievable rates of the different schemes under different CSI assumptions, we observe that the main difference among them is that imperfect CSI at the users is causing self-interference. Without any downlink pilots, this self-interference is proportional to the received power (pd β), which fundamentally limits the achievable rate of the user. Therefore we can conclude that neither increasing the DL power nor putting the user closer to the BS would help much. This would not create a large SINR difference at the user, and thus we expect that Scheme-N would not provide much gain. However with DL pilots, the self-interference can be reduced substantially if we increase the DL SNR. This creates a larger SINR difference at the users and thus we expect that SchemeN would provide higher gains. V. P RACTICAL I SSUES AND E XTENSIONS In this section we discuss various issues when implementing the proposed Scheme-N in practical systems and some possible extensions. Due to space limitations, these issues are discussed briefly and in-depth investigations are left for future work. B. More than Two Users Per Group The proposed Scheme-N can be extended to include more than two users per group. Suppose there are L users in each group k and each user is labeled as user pk, 1q to user pk, Lq. In the channel estimation phase they are assigned the same pilot. The BS estimates a linear combination of the channels from all L users in the group. Then the BS uses this for MRT beamforming. Without loss of generality, assume they have large-scale fading coefficients ordered as β1k ď β2k ď . . . ď βLk . The required condition such that NOMA can be applied is that user pk, iq can decode all messages intended for user pk, jq for all j ď i. The condition can be written as Erlog2 p1 ` SINRk,i qs ě Erlog2 p1 ` SINRk,j qs @ i ě j, (60) where SINRk,i is the effective SINR of user pk, iq which has different forms according to the availability of CSI. This condition can be met by controlling the pilot power of the users. Detailed analysis of this extension is out of scope and has to be left for future work due to the limit of space. C. Users with Multiple Antennas In the case when users are equipped with more than one antenna, adding more antennas can be viewed as adding users at the same distance. Thus the same analysis and results can be applied by putting the different antennas of the same user in different groups in Scheme-N. This argument does not consider the possibility of receive beamforming at the users as it requires accurate channel estimation at the users. Since the scenario we considered is when the pilot resources are scarce, the consideration of receive beamforming at the user side is out of scope. D. Power Control Power control in any communication systems is crucial. We have considered both power control in the UL for the pilots and in the DL for the data. They are optimized according to the requirement of the users. In Section VII we will look at the rate region and a particular operating point on the Pareto boundary of the rate region which is obtained by performing power control on both UL pilots and DL data. However these are 9 N dp Rk,h ¨ ˙ ˆ ˚ K log2 ˚ “ 1´ ˝1 ` T N dp Rk,g Odp Rc,k O Re,k ˛ ˇ ” ıˇ2 ˇ ˇ f pd βhk γk,h ˇE fˆk,h ˇ ‹ k,h „ˇ „ˇ ˇ2  ˇ2  ‹ ˇ ” ı ıˇ2 ” ˇI ˇ ˇ ˇ ‚ ˇ ˇ f f pd βhk γk,h Var fˆk,h ` pd βhk γk,g ˇE fˆk,h ˇ ` E ˇ fˆk,h ˇ ` E ˇ fˆ1 ˇ k,h ¨ ˙ ˆ ˚ K log2 ˚ “ 1´ ˝1 ` T k,h k,h k,h ˛ ˇ ” ıˇ ˇ fk,g ˇ2 ˇE fˆ ˇ ‹ k,g „ˇ „ˇ ˇ2  ˇ2  ‹ ” ı ˇ ˇ ‚ ˇI ˇ f pd βgk Var fˆk,g ` E ˇ fˆk,g ˇ ` E ˇ fˆ1 ˇ pd βgk γk,g k,g k,g (57) k,g ˛ ˇ „ ˇ2 O ˇ ˇ f k,g ˇE O ˇ ‹ ˚ ˆ ˙ ˇ fˆk,g ˇ ‹ ˚ K ˚ ff « ff « “ 1´ η log2 ˚1 ` ˇ ˇ2 ˇ2 ‹ ˇ „  T ˇ ˇ ‹ ˇ IO ˇ fO ˝ ˇ ` E ˇ O1 ˇ ‚ pd βgk Var fˆk,g ` E ˇˇ fˆk,g O O ˇ ˆ ˇ fk,g ˇ k,g k,g ¨ (56) O pd βgk γk,g ˛ ˇ „ ˇ2 O ˇ ˇ f k,h ˇ O ˇ ‹ ˚ ˆ ˙ pd βhk γk,h O ˇE fˆk,h ˇ ‹ ˚ K ‹ « ff « ff “ 1´ p1 ´ ηq log2 ˚ 1 ` ˇ ˇ ˇ ˇ „  ˚ 2 2 T O O ˇ ˇ Ik,h ˇ 1 ˇ ‹ ‚ ˝ fk,h k pd βh Var fˆO ` E ˇˇ fˆO ˇˇ ` E ˇˇ fˆO ˇˇ k,h k,h k,h ¨ done by a grid search over different power control coefficients. More efficient algorithms for this purpose would be useful but have to be left for future work. VI. OTHER A PPLICATIONS A. Application in Multicasting A specific application of the techniques in Scheme-N is to multiresolution multicasting [20]. In multiresoultion multicasting, signals of different resolutions are multicasted to multiple users requesting the same data. Users with low SINR decode only the low resolution signal treating the high resolution signal as noise, while users with high received SINR decode both the low and high resolution signals. It is natural to apply NOMA here since the low resolution signal is wanted by all users in the cell. In this setup we only need to use one uplink pilot for channel training and the same beamforming vector is applied to all users in the cell. This can be viewed as a special case of Scheme-N where the data intended for all users pk, hq are the same and data intended for all users pk, gq are the same. B. Rate-Splitting for Improving Sum Degree of Freedom Recently a rate-splitting approach was proposed to improve the sum degree of freedom in broadcast channels [25] which is an approach that was first used for interference channels and then called the the Han-Kobayashi scheme [26]. In the rate-splitting scheme, one selected user’s message is split into a common part and a private part where the common part can be decoded by all users. The common part is super-imposed on the private part and sent with a different beamformer. All NOMA schemes can be viewed as a special case of the (58) (59) rate-splitting approach where there is no private part for the user pk, hq and all message to user pk, hq is contained in the common part. Our proposed Scheme-N can be adapted for the rate-splitting scheme to handle the problem of pilot shortage by decomposing the message of user pk, hq into two parts and the analysis can be carried out using similar techniques. VII. N UMERICAL R ESULTS In this section we compare the performance of the two schemes in different settings. The comparison is done by comparing the complete achievable rate regions. The achievable rate region is obtained by considering a grid of pilot power control and data power control coefficients to obtain the rate pairs for each set of power control parameters, and then take the convex hull of all the rate pairs. This assumes the use of time-sharing between different sets of power control parameters. This gives an approximate rate region which is a lower bound on the actual rate region. A. Small-Scale Antenna Systems The first setup that we are looking into is the case with a small number of antennas at the BS. In the simulations we choose M “ 10, K “ 2, βh “ 1, βg “ 100, pu “ pd “ 1. Since we compare schemes that use the same number of pilots, we omit the pre-log penalty caused by the use of pilots for acquiring CSI. For the case without downlink CSI it has fewer pilots than the other cases. Fig. 3 shows the performance with noise free uplink estimation and perfect CSI at the users. This case represents an upper bound on the performance for practically realizable schemes. From this figure we observe that with perfect CSI available, 10 TABLE I S UMMARY OF A CHIEVABLE R ATE R ESULTS Schemes (users) Scheme-O (cell center) Scheme-O (cell edge) Scheme-N (cell center) Scheme-N (cell edge) Estimated CSIT, Perfect CSIR (24) (25) (30) (31) Estimated CSIT, no CSIR (46) (48) (45) (39) 12 3.5 Scheme−N Scheme−O Scheme−N Scheme−O Orthogonal UL pilots 3 Rate of User 2 (b/s/Hz) Rate of User (k,g) (b/s/Hz) 10 8 6 4 2.5 2 1.5 1 2 0 0.5 0 0.5 1 1.5 2 2.5 Rate of User (k,h) (b/s/Hz) 3 3.5 4 Fig. 3. Achievable rate region with noise free uplink channel estimation and perfect CSI at the users. M “ 10, K “ 2 βh “ 1, βg “ 100, pu “ pd “ 1. 10 Scheme−N Scheme−O 9 8 Rate of User (k,g) (b/s/Hz) Estimated CSIT, CSIR (58) (59) (57) (56) 7 6 5 4 3 2 1 0 0 0.5 1 1.5 2 Rate of User (k,h) (b/s/Hz) 2.5 3 Fig. 4. Achievable rate region with noisy uplink channel estimation and perfect CSI at the users. M “ 10, K “ 2, βh “ 1, βg “ 100, pu “ pd “ 1. the performance gained by using NOMA is quite significant. For example, when the rate of user pk, hq is 2.5 b/s/Hz, the rate of user pk, gq can be increased by almost 2 b/s/Hz. Fig. 4 shows the performance with noisy uplink estimation and perfect CSI at the users. Comparing with Fig. 3 we observe that the uplink channel estimation errors do not lower the performance much for the user in the cell center. However the rate of the user at the cell edge loses more than 20%, due to the poor quality of the uplink channel estimate. Never the less, the gain from using NOMA is still large. 0 0 0.5 1 Rate of User 1 (b/s/Hz) 1.5 2 Fig. 5. Achievable rate region with noisy uplink channel estimation and no CSI at the users. M “ 10, K “ 2, βh “ 1, βg “ 100, pu “ pd “ 1. Fig. 5 shows the achievable rate region with noisy uplink estimation and no CSI at the users. Comparing to Fig. 4 we see that CSI at the users is critical as Scheme-N and Scheme-O are overlapping. Without CSI, Scheme-N is performing the same as Scheme-O which means there is no gain from using NOMA. We also plot the performance with orthogonal UL pilots for all K users as reference. In Scheme-N we send K{2 uplink pilots, while with the ‘Orthogonal UL Pilots’ scheme we send K uplink pilots. In this comparison all schemes do not require downlink pilots. This shows that without taking the penalty of using more pilots, it is better to use orthogonal pilots when DL CSI is not available. When the number of pilot symbols is limited and sending K orthogonal pilots is not possible, we can only compare Scheme-O and Scheme-N. There are still some gains from using NOMA with other sets of parameters (when M is of the order of thousands) than the one considered in this figure, but they are marginal and applying NOMA may not be worth it since it increases the complexity and delays at the user. Fig. 6 shows the achievable rate region with noisy uplink estimation and estimated channel gains at the users, which is the most practical scenario. Comparing to Fig. 5 we see that with the estimated channel gains, we see some gains from using NOMA. We also plot the performance with orthogonal UL pilots for all K users as reference. In Scheme-N we send K{2 uplink pilots and K{2 downlink pilots, while with the ‘Orthogonal UL Pilots’ scheme we send K uplink pilots and no downlink pilots. Comparing the rate regions we see that our proposed Scheme-N outperforms both traditional schemes. 11 9 18 Scheme−N Scheme−O Orthogonal UL Pilots Sum Ergodic Achievable Rate (b/s/Hz) 8 Rate of User (k,g) (b/s/Hz) 7 6 5 4 3 2 1 0 14 12 10 8 6 0 0.2 0.4 0.6 0.8 1 1.2 1.4 Rate of User (k,h) (b/s/Hz) 1.6 1.8 11 Scheme−N Scheme−O Orthogonal UL Pilots Sum Ergodic Achievable Rate (b/s/Hz) 9 8 7 6 5 4 3 10 20 30 40 50 60 70 80 Number of Antennas at the BS (M) 90 5 10 15 20 25 30 Path Loss Difference (dB) 35 40 2 Fig. 6. Achievable rate region with noisy uplink channel estimation and estimated CSI at the users. M “ 10, K “ 2, βh “ 1, βg “ 100, pu “ pd “ 1. 10 Scheme−N Scheme−O Orthogonal UL Pilots 16 100 Fig. 7. Sum rate with noisy uplink channel estimation and estimated channel gains at the users for different number of antennas at the BS (M). K “ 2, βh1 “ 1, βg1 “ 100, pu “ pd “ 1. The rate of the user pk, hq is constrained to be the rate it would get when using Scheme-O with η “ 0.5. B. Constrained Sum Rate Comparison In this subsection we compare a specific operating point on the achievable rate region. We choose the point such that users at the cell edge get the same rate as in Scheme-O with η “ 0.5. This means that users at the cell edge do not lose any rate by using NOMA. We compare the sum rate of the whole cell under this constraint and vary the number of antennas, large-scale fading parameters. In all plots we choose K “ 2 with 1 user at the cell edge and 1 user in the cell center. For Scheme-O, 1 user is scheduled in one slot, thus full power is O O “ 1. For Scheme-N, we vary the used with γ1,g “ 1 and γ1,h power between the two users to find the optimal constrained sum rate. In Fig. 7 we compare the constrained sum rate with different Fig. 8. Sum rate with noisy uplink channel estimation and estimated channel gains at the users with path loss differences (large-scale fading of user pk, hq is fixed while large-scale fading of user pk, gq is varying). M “ 100, K “ 2, βh1 “ 1, pu “ pd “ 1. The rate of the user pk, hq is constrained to be the rate it would get when using Scheme-O with η “ 0.5. numbers of antennas M at the BS with βh1 “ 1, βg1 “ 100, and pu “ pd “ 1. From the plot we see that the sum rate difference between Scheme-O and Scheme-N is increasing when M increases. This contradicts the common notion that NOMA is only useful when the number of antennas at the BS is less than the total number of antennas at the users [5]. The reason for this is that CSI at the users is very important in NOMA, and when M is small, the estimation quality is not good enough, resulting in a lower rate. When M increases, the estimation quality at the users increases (due to the array gain that increases the SNR with M in the DL estimation) and hence the gain from NOMA is more significant. We also observe that the performance gap between Scheme-O and the ‘Orthogonal UL Pilots’ decreases with M and eventually Scheme-O performs worse than the latter. This is due to the channel hardening effect. The more antennas at the BS, the less fluctuation in the norm of the channel vector (normalized by the number of antennas): the norm of the realization of the channel vector is almost equal to its statistical mean. In Fig. 8 we compare the constrained sum rate with different large-scale fading coefficients between the paired users, with M “ 100, pu “ pd “ 1, βh1 is fixed to be 1 while βg1 varies. From the plot we see that the sum rate difference between Scheme-O and Scheme-N is increasing with the large-scale fading difference. This is expected and matches the results for single antenna NOMA systems [2]. When the large-scale fading difference is small, the orthogonal UL pilots scheme gives the best performance because both users have low SNR and therefore DL estimates are of poor quality. This verifies the importance of user pairing in NOMA. C. Effect of Number of Users or Number of Antennas at the User In this subsection, we look into the effect of increasing the number of users in the cell, or equivalently, the number of 12 VIII. C ONCLUSION 26 Scheme-N Scheme-O Orthogonal UL Pilots Sum Ergodic Achievable Rate (b/s/Hz) 24 In this work we analyzed the performance of NOMA in multiuser MIMO under practical scenarios where the CSI was obtained through pilot signaling. The performance analysis was done for a conventional orthogonal scheme and a NOMA scheme under this setup. Extensive simulations were done using the derived achievable rate expressions. From the simulation results we draw the following conclusions: 22 20 18 16 14 12 10 8 2 3 4 5 6 7 8 9 10 Number of Users in the Cell (K) Fig. 9. Sum rate with noisy uplink channel estimation and estimated channel gains at the users with different number of users K. M “ 100, βh “ 1, βg “ 100 and pu “ pd “ 1. The rate of the user pk, hq is constrained to be the rate it would get when using Scheme-O with η “ 0.5. antennas at the users. We compare the same operating point as in the previous subsection. In the simulation we have the same number of users at the cell edge and in the cell center. The users at the cell edge have the same large-scale fading βhk “ βh , k “ 1, . . . , K{2 and the users at the cell center have the same large-scale fading βgk “ βg , k “ 1, . . . , K{2. For Scheme-O, all users that are scheduled in one slot have the same large-scale fading, thus equal power allocation with O O γk,g “ 2{K, k “ 1, . . . , K{2 and γk,h “ 2{K, k “ 1, . . . , K{2 is optimal in terms of achievable sum rate. For Scheme-N, we allocate equal power to each group which is also optimal for the sum rate due to the symmetry in the K{2 groups. The length of the coherence interval T is chosen to be 200 which is corresponding to a typical fast fading scenario. In Fig. 9, we compare the constrained sum rates with different numbers of users, with M “ 100, pu “ pd “ 1, βh “ 1, and βg “ 100. From the figure we see that SchemeN outperforms the other schemes only when there is one group of users. As soon as there are more than one group, Scheme-N and Scheme-O are the same (Scheme-O is a special case of Scheme-N) and they are both worse than the ‘Orthogonal UL Pilots’ scheme. This is because the inter-group interference lowers the SINR difference between the cell center user and the cell edge user, and thus NOMA does not provide any gain. This shows that the SINR difference is the key factor for NOMA to outperform the orthogonal scheme, but not the SNR difference. Moreover, from Fig. 9 we also observe that when we have more users in the cell, it is better to user multiuser beamforming instead of NOMA. That is because the inter-group interference levels are the same for all schemes and that is the major factor that lowers the SINR. In this case, increasing the beamforming gain is more effective than removing the intra-group interferences. 1) NOMA works well only when high quality CSI is available at the user and there is no inter-group interference; 2) When there is more than one group, it is preferable to use multiuser beamforming instead of NOMA. In this case, we need a higher beamforming gain to enhance the SINR; 3) The gain of NOMA increases with the path loss difference between the users in the same NOMA group. When the difference is small, multiuser beamforming is preferable. The above conclusions hold when the BS precoding is restricted to MR. For other more advanced precoding methods, most importantly zero-forcing, the observations may change because accurate channel estimates are required by these methods. Some initial simulations have shown that the proposed shared-pilot scheme only provides little gain with zeroforcing precoding. More exploration is needed to find out the strategy of applying NOMA in training based systems with zero-forcing type precoding and it is left for future work. Moreover, from our simulation results we see that CSI at the user is critical for the NOMA scheme. Instead of sending DL pilots, blind channel estimation methods designed for NOMA can help to reduce pilot overhead and therefore is worthy of exploration. A PPENDIX A P ROOF OF P ROPOSITION 1 Using results from [13, Section 2.3.2], we have the capacity lower bound: N ip Rk,h ˇ2 ˛ ˇ ” b ı ˇ ˇ k hT ȳ N ˚ ?p γ β E c ˇ d k,h ˇ ‹ k h k u,k ˚ “ log2 ˝1 ` ‚. (61) Varpzk,h q ¨ The numerator can be calculated as ˇ „ b ˇ2  ˇ ˇ ˇE ck β k hTk ȳ N ˚ ?pd γk,h ˇ “ pd λk,h βhk γk,h M, u,k h ˇ ˇ (62) 13 and the denominator can be calculated as „ˆ b N ˚? pd γk,h Varrzk,h s “ Var ck βhk hTk ȳu,k „ b ˙ T N ˚? k ´ E ck βh hk ȳu,k pd γk,h sk,h  b N ˚? ` ck βhk hTk ȳu,k pd γk,g sk,g ` Ik,h ` nk,h  „ b N˚ ` VarrIk,h s ` Varrnk,h s “ Var ck βhk hTk ȳu,k ˇ „ b ˇ2  ˇ ˇ N˚ ? ` ˇˇE ck βhk hTk ȳu,k pd γk,g ˇˇ “ pd βhk ` 1 ` pd λh,k βhk γk,g M. P ROOF (63) A PPENDIX B OF P ROPOSITION 2 Using the results from [13, Section 2.3.2], we have the capacity lower bound: ¨ ˇ2 ˛ ˇ ” b ı ˇ ˇ N˚ ? ck βgk gkT ȳu,k pd γk,g ˇ ˇE ‹ ˚ N ip Rk,g “ log2 ˝1 ` ‚. (64) Varpzk,g q The numerator can be calculated as ˇ2 ˇ ” b ı ˇ ˇ N˚ ? pd γk,h ˇ “ pd λk,g βgk γk,g M, ˇE ck βgk gkT ȳu,k (65) and the denominator can be calculated as „ˆ b N ˚? Varrzk,g s “ Var ck βgk gkT ȳu,k pd γk,h ” b ı˙ N ˚? ´ E ck βgk gkT ȳu,k pd γk,h sk,h ˆ b N ˚? pd γk,g ` ck βgk gkT ȳu,k  ” b ı˙ T N ˚? k ´ E ck βg gk ȳu,k pd γk,g sk,g ` Ik,g ` nk,g ı ” b N˚ ` VarrIk,g s ` Varrnk,g s “ Var ck βgk gkT ȳu,k “ pd βgk ` 1. (66) R EFERENCES [1] H. V. Cheng, E. Björnson, and E. G. Larsson, “NOMA in multiuser MIMO systems with imperfect CSI,” in 2017 IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC). [2] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future radio access,” in 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), June 2013, pp. 1–5. [3] T. Cover, “Broadcast channels,” IEEE Transactions on Information Theory, vol. 18, no. 1, pp. 2–14, Jan 1972. [4] L. Dai, B. Wang, Y. Yuan, S. Han, C. l. I, and Z. Wang, “Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends,” IEEE Communications Magazine, vol. 53, no. 9, pp. 74–81, September 2015. [5] Z. Ding, F. Adachi, and H. V. Poor, “The application of MIMO to non-orthogonal multiple access,” IEEE Transactions on Wireless Communications, vol. 15, no. 1, pp. 537–552, Jan 2016. [6] Z. Ding, Y. Liu, J. Choi, Q. Sun, M. Elkashlan, C. L. I, and H. V. Poor, “Application of non-orthogonal multiple access in LTE and 5G networks,” IEEE Communications Magazine, vol. 55, no. 2, pp. 185– 191, February 2017. [7] V. W. Wong, R. Schober, D. W. K. Ng, and L. Wang, Key Technologies for 5G Wireless Systems. Cambridge, U. K.: Cambridge University Press, 2017. [8] 3GPP TD RP-150496, “Study on downlink multiuser superposition transmission.” [9] S. C. Swales, M. A. Beach, D. J. Edwards, and J. P. McGeehan, “The performance enhancement of multibeam adaptive base-station antennas for cellular land mobile radio systems,” vol. 39, no. 1, pp. 56–67, 1990. [10] S. Anderson, M. Millnert, M. Viberg, and B. Wahlberg, “An adaptive array for mobile communication systems,” vol. 40, no. 1, pp. 230–236, 1991. [11] G. Caire and S. Shamai, “On the achievable throughput of a multiantenna Gaussian broadcast channel,” IEEE Transactions on Information Theory, vol. 49, no. 7, pp. 1691–1706, July 2003. [12] T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” IEEE Transactions on Wireless Communications, vol. 9, no. 11, pp. 3590–3600, November 2010. [13] T. Marzetta, E. G. Larsson, H. Yang, and H. Ngo, Fundamentals of Massive MIMO. Cambridge, U.K.: Cambridge University Press, 2016. [14] Z. Ding, Z. Yang, P. Fan, and H. V. Poor, “On the performance of non-orthogonal multiple access in 5G systems with randomly deployed users,” IEEE Signal Processing Letters, vol. 21, no. 12, pp. 1501–1505, Dec 2014. [15] Q. Sun, S. Han, C. L. I, and Z. Pan, “On the ergodic capacity of MIMO NOMA systems,” IEEE Wireless Communications Letters, vol. 4, no. 4, pp. 405–408, Aug 2015. [16] Z. Yang, Z. Ding, P. Fan, and G. K. Karagiannidis, “On the performance of non-orthogonal multiple access systems with partial channel information,” IEEE Transactions on Communications, vol. 64, no. 2, pp. 654–667, Feb 2016. [17] L. Jing, E. D. Carvalho, P. Popovski, and A. O. Martinez, “Design and performance analysis of noncoherent detection systems with massive receiver arrays,” IEEE Transactions on Signal Processing, vol. 64, no. 19, pp. 5000–5010, Oct 2016. [18] D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge, U. K.: Cambridge University Press, 2005. [19] B. Kim, S. Lim, H. Kim, S. Suh, J. Kwun, S. Choi, C. Lee, S. Lee, and D. Hong, “Non-orthogonal multiple access in a downlink multiuser beamforming system,” in IEEE Military Communications Conference, Nov 2013, pp. 1278–1283. [20] J. Choi, “Minimum power multicast beamforming with superposition coding for multiresolution broadcast and application to NOMA systems,” IEEE Transactions on Communications, vol. 63, no. 3, pp. 791–800, March 2015. [21] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Theory. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1993. [22] H. Yang, T. L. Marzetta, and A. Ashikhmin, “Multicast performance of large-scale antenna systems,” in 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC), June 2013, pp. 604–608. [23] H. Q. Ngo and E. G. Larsson, “No downlink pilots are needed in TDD massive MIMO,” IEEE Transactions on Wireless Communications, vol. 16, no. 5, pp. 2921–2935, 2017. [24] Z. Ding, P. Fan, and H. V. Poor, “Impact of user pairing on 5G nonorthogonal multiple-access downlink transmissions,” IEEE Transactions on Vehicular Technology, vol. 65, no. 8, pp. 6010–6023, Aug 2016. [25] S. Yang, M. Kobayashi, D. Gesbert, and X. Yi, “Degrees of freedom of time correlated MISO broadcast channel with delayed CSIT,” IEEE Transactions on Information Theory, vol. 59, no. 1, pp. 315–328, Jan 2013. [26] A. E. Gamal and Y. H. Kim, Network Information Theory. Cambridge, U. K.: Cambridge University Press, 2012.
7cs.IT
AMINO ACID INTERACTION NETWORK PREDICTION USING MULTI-OBJECTIVE OPTIMIZATION Md. Shiplu Hawlader1 and Saifuddin Md. Tareeq2 1 Department of Computer Science & Engineering, University of Asia Pacific, Dhaka, Bangladesh [email protected] 2 Department of Computer Science & Engineering, University of Dhaka, Dhaka, Bangladesh [email protected] ABSTRACT Protein can be represented by amino acid interaction network. This network is a graph whose vertices are the proteins amino acids and whose edges are the interactions between them. This interaction network is the first step of proteins three-dimensional structure prediction. In this paper we present a multi-objective evolutionary algorithm for interaction prediction and ant colony probabilistic optimization algorithm is used to confirm the interaction. KEYWORDS Protein Structure, Interaction Network, Multi-objective Optimization, Genetic Algorithm, Ant Colony Optimization 1. INTRODUCTION Proteins are biological macromolecules performing a vast array of cellular functions within living organisms. The roles played by proteins are complex and varied from cell to cell and protein to protein. The best known role of proteins in a cell is performed as enzymes, which catalyze chemical reaction and increase speed several orders of magnitude, with a remarkable specificity. And the speed of multiple chemical reactions is essential to the organism survival like DNA replication, DNA repair and transcription. Proteins are storage house of a cell and transports small molecules or ions, control the passages of molecules through the cell membranes, and so forth. Hormone, another kind of protein, transmits information and allow the regulation of complex cellular processes. Genome sequencing projects generate an ever increasing number of protein sequences. For example, the Human Genome Project has identified over 30,000 genes [1] which may encode about 100,000 proteins. One of the first tasks when annotating a new genome is to assign functions to the proteins produced by the genes. To fully understand the biological functions of proteins, the knowledge of their structure is essential. Proteins are amino acids chain bonded together in peptide bonds, and naturally adopt a native compact three-dimensional form. The process of forming three-dimensional structure of a protein is called protein folding and this is not fully understood yet in System Biologoy. The process is a result of interaction between amino acids which form chemical bond to make protein structure. In this paper, we proposed a new algorithm to predict a interaction network of amino acids using two new emerging optimization techniques, multi-objective optimization based on evolutionary clustering and ant colony optimization. 2. AMINO ACID INTERACTION NETWORK Amino acids are the building blocks of proteins. Protein a sequences of amino acids linked by peptide bond. Each amino acid has the same fundamental structure, differing only in the sidechain, designated the R-group. The carbon atom to which the amino group, carboxyl group, and side chain (R-group) are attached is the alpha carbon (Cα). The alpha carbon is the common reference point for coordinates of an amino acid structure. Among the 20 amino acids some are acidic, some are basic, some are polar, some non-polar. To make a protein, these amino acids are joined together in a polypeptide chain through the formation of a peptide bond. The structure, function and general properties of a protein are all determined by the sequence of amino acids that makes up the primary sequence. The primary structure of a protein is the linear sequence of its amino acid structural units and it is a part of whole protein structure. The two torsion angles of the polypeptide chain, also called Ramachandran angles, describe the rotations of the polypeptide backbone around the bonds between N – Cα (called Phi angle, φ) and Cα – C (called Psi angle, ψ). Torsion angle is one of the most important parameter of protein structure and controls the protein folding. For each type of the secondary structure elements there is a characteristic range of torsion angle values, which can clearly be seen on the Ramachnadran plot [2]. Figure 1: SSE-IN of 1DTP protein. Green edges are to be predicted by ant colony algorithm Another important property of protein is hydrophobicity. Proteins tertiary structure’s core are hydrophobic and the amino acids inside core part do not interact much as like their counterpart hydrophilic, those made the outer side of the protein structure. Many systems, both natural and artificial, can be represented by networks, that is by site or vertices connected by link or edges. Protein also be represented as a network of amino acid whose edges are the interactions or the protein functions between amino acids. The 3D structure of a protein is determined by the coordinates of its atoms. This information is available in Protein Data Bank (PDB) [3], which regroups all experimentally solved protein structures. Using the coordinates of two atoms, one can compute the distance between them. We define the distance between two amino acids as the distance between their Cα atoms. Considering the Cα atom as a center of the amino acid is an approximation, but it works well enough for our purposes. Let us denote by N the number of amino acids in the protein. A contact map matrix is an N X N, 0 - 1 matrix, whose element (i, j) is 1 if there is a contact between amino acids i and j and 0 otherwise. It provides useful information about the protein. For example, the secondary structure elements can be identified using this matrix. Indeed, α - helices spread along the main diagonal, while β - sheets appear as bands parallel or perpendicular to the main diagonal [4]. There are different ways to define the contact between two amino acids. In [5], the notion is based on spacial proximity, so that the contact map can consider non–covalent interactions. Gaci et al. in [5] says that two amino acids are in contact iff the distance between them is below a given threshold. A commonly used threshold is 7 Å. Consider a contact map graph with N vertices (each vertex corresponds to an amino acid) and the contact map matrix as incidence matrix. It is called contact map graph. The contact map graph is an abstract description of the protein structure taking into account only the interactions between the amino acids. Now let us consider the sub-graph induced by the set of amino acids participating in SSE, where SSE is secondary structure element of protein like alpha helix, beta sheet etc. We call this graph SSE interaction network (SSE - IN). The reason of ignoring the amino acids not participating in SSE is simple. Evolution tends to preserve the structural core of proteins composed from SSE. In the other hand, the loops (regions between SSE) are not so important to the structure and hence, are subject to more mutations. That is why homologous proteins tend to have relatively preserved structural cores and variable loop regions. Thus, the structure determining interactions are those between amino acids belonging to the same SSE on local level and between different SSEs on global level. In [6] and [7] the authors rely on similar models of amino acid interaction networks to study some of their properties, in particular concerning the role played by certain nodes or comparing the graph to general interaction networks models. Thanks to this point of view the protein folding problem can be tackled by graph theory approaches. Gaci et al. in [8], has described the topological properties of a network and compared them with some All alpha and beta to prove that a protein can be treat as a network of amino acids. According to the diameter value, average mean degree and clustering coefficient shown in the experiment in [8], we can say a protein is a network of amino acids. 3. PREDICT AMINO ACID INTERACTION NETWORK We can define the problem as prediction of a graph G consist of N vertices V and E edges. If two amino acids interact with each other in protein we mention it as an edge (u, v) ∈ E, u ∈ V, v ∈ V of the graph. A SSE-IN is a highly dense sub-graph GSEE-IN with edge set ESEE-IN. Probability of the edge (u, v) ∈ ESEE-INA, u ∈ VSSE-INA, v ∈ VSSE-INA is very high and probability of the edge (u, v) ∉ ESEE-INA, u ∈ VSSE-INA, v ɛ VSSE-INA is very low where VSSE-INA and VSSE-INB are respectively the vertex set of SSE-IN A and SSE-IN B. SCOP and CATH are the two databases generally accepted as the two main authorities in the world of fold classification. According to SCOP there are 1393 different folds. To predict the network we have to solve three problems, as i) find a associate SCOP protein family from the given protein sequence ii) predict a network of amino acid secondary structure element (SSE) from the known SCOP protein family and iii) Predict interactions between amino acids in the network, including internal edges of SSE-IN and external edges. We are going to avoid the description the first problem, because it can be solve using a good sequence alignment algorithm like BLAST as discussed in [8]. In this paper we are going to solve the second and third problem individually with multi-objective optimization using genetic algorithm and ant colony optimization respectively. Gaci et al. in [9], described a solution to the prediction of amino acid interaction network. He used a genetic algorithm with single objective as the distance between to amino acid in protein atom. But it is very difficult to define real world problems like amino acid interaction problem in terms of a single objective. A multi-objective optimization problem deals with more than one objective functions that are to be minimized or maximized. These objectives can be conflicting, subject to certain constraints and often lead to choosing the best trade-off among them. As we have described before, the interaction between amino acids in protein depends not only distance between two amino acids but also the torsion angles and hydrophobic property of the amino acid. So to get more accurate interaction network of amino acid we have to consider it is as a multi-objective problem rather than single objective. 4. ALGORITHM As we have mentioned before, we can solve the amino acid interaction network prediction problem as well as the protein folding problem using two new and emerging algorithms. The multi-objective optimization algorithm will predict structural motifs of a protein and will give a network or graph of secondary structural element (SSE) of the protein. On the other hand, the ant colony optimization (ACO) algorithm will find the interactions between amino acids including the intra-SSE-IN and inter-SSE-IN interactions. In our algorithm we have considered a folded protein in the PDB as an unknown sequence if it has no SCOP v1.73 family classification. According to [8], we can associate the most compatible and best fit structural family based on topological criteria like average diameter, average mean distance etc. 4.1. Prediction of SSE interaction network using Multi-objective Optimization There are several ways to solve multi-objective optimization problem. In this research we have decided to use Genetic Algorithm (GA) as multi-objective optimization. The GA has to predict the adjacency matrix of unknown sequence when it is represented by chromosome. In this paper we proposed a evolutionary clustering algorithm to predict the SSE-IN, which is a modified algorithm of the second version of strength pareto evolutionary algorithm (SPEA2) in [10]. SPEA2 preserve better solutions than NSGA-II [11] and its diversity mechanism is better than the others, this is the reason to choose SPEA2 to implement the evolutionary clustering algorithm. Figure 2: Network of 7 nodes clustered into 1,2,3,4 and 5,6,7 and their genetic representation As proposed in [12], we are using a local-based adjacency representation. In this representation an individual of the population consist of N genes g1,...,gN, where N is the number of nodes. Each gene can hold allele value in the range 1,...,N. Genes and alleles represents nodes in the graph G = (V,E) modelling a network N. A value j assigned in i-th gene interpreted as a link between node i and j and in clustering node i and j will be in the same cluster as in Figure 2. In decoding step all the components are identified and nodes participating in the same component are assigned to the same cluster. Alogorith1Multiobjective genetic algorithm to predict SSE interaction algorithm 1: Input: A protein sequence , T = total time steps, NE = Archive size, NP =Population size 2: Output : A predicted incident matrix M and clustering for each network N i of N 3: Use BLAST to find a associate protein family of the given sequence from PDB 4: Generate initial cluster CR 1 = {C 11 , . . . , C k1}of the network N 1 with number of vertex equal to number of SSE of the associate protein family for t = 2 to T do 5: 6: Create initial population of random individual P0 and set E0 = 0 , i = 0 7: Loop 8: Decode each individual of Pi ⋃E i 9: 11: Evaluate each individual of Pi ⋃E i to find rank and density value using equation 1 and 2 Assign fitness value to each individual, as the sum of rank and inverse of density value Copy all no dominating solution to E i+1 12: if | E i+1 | > NE then 10: 13: truncate | E i+1 | - NE solutions according to topological property 14: Else 15: 16: copy best NE - | E i+1 | dominated solution according to their fitness value and topological property end if 17: if stopping criteria does not satisfies then 18: 19: return non-dominated solution in | E i+1 | else 20: Select some individual form— E i+1 for mating pool as parents using binary tournament with replacement 21: Apply crossover and mutation operators to the mating pool to the mating pool to create Np offspring solution and copy to Pi+1 i := i+1 22: 23: end if 24: end loop 25: 26: From the returned solution in E take the best cluster according to the highest modularity value end for It takes a dynamic network N = N1, N2, ... NT, the sequence of graphs G = G1,G2, ... ,GT and the number of timestamps T as input and gives a clustering of each network Ni of N as output. In the amino acid interaction network, total number of gene is the number SSE in the associate protein family found from the first step and each SSE represents one gene or allele notably considering its size that is the number of amino acids which compose it, of the population. We represent a protein as an array of alleles. The position of an allele corresponds to the SSE position it represents in the sequence. At the same time, an incident matrix is associates for each genome. For the first time-stamp of first input network there is no temporal relation with the previous network. The only objective function is snapshot quality or snapshot score. Thus we can apply any static clustering algorithm or trivial genetic algorithm to find the initial cluster. In this algorithm we used genetic algorithm to find the best cluster by maximizing the only objective function. As it is single objective algorithm we can find the single best cluster from this step. As a first step in each time-stamp from 2nd time-stamp to T, it creates a population of random individuals. Each individual is a vector of length equal to number of nodes in the graph Gt. Genetic variant operators will be applied on this population for a fixed number of pass. Each individual of the population and archive is decoded into component graph. As each individual gene is working as an adjacency list, if a node in x of graph is reachable from y by maintaining the edges in the individual, then x and y is in same cluster of component. Give each individual chromosome of the population and chromosome in archive a rank value. Smaller the rank value better it is as fitness value. Each non-dominated individual gets the rank 0. After removing the 0 ranked individuals, give the rank 1 to the next non-dominated individuals and so on. After giving each individuals a rank value, sort the individuals according to the ascending rank. r(x) = ∑xp y s( y) (1) There could be many individuals of in same area of solution space or objective space. If we take all these solution into account, we could loss diversity in the population. To remain the population diverse, we are using distance of k-th nearest neighbour. The fitness value of each individual is the sum of its non-dominated rank and the inverse of the distance of k-th nearest neighbours distance. More the distance between solutions, better the fitness functions value. m(x) = (σ x +1) −1 k (2) where σxk is the distance between individual x and its k-th nearest neighbour. To calculate the distance between chromosome, we have to take account the three objectives, atomic distance of amino acids, torsion angles and hydrophobicity. After evaluating fitness values of each of the population and archive, the best individuals are selected as a new population. From the total individuals of population and archive population size individuals are selected as new population. From the rank 0 to the highest rank, all the individuals are added if number of population of this rank is not exceeding the current population size. If it is exceeding, then some individuals are truncated according to the value of each individuals. Table 1: Example of uniform crossover Parent 1 4 3 2 2 6 5 6 Parent 2 3 3 1 5 4 7 6 Mask 0 1 1 0 0 1 1 Offspring 4 3 1 2 6 7 6 After selecting the new population, a mating pool is created of pool size from the new population to apply the genetic variation operators. To choose the mating pool, binary tournament with replacement has been used in this algorithm. According to binary tournament, two individuals are randomly selected from the new population and the better fitness valued individual is chosen for the mating pool. 4.1.1. Genetic Variation Operators Genetic operators are used to create offspring from parent or mating pool. As other genetic algorithms, in this algorithm two widely used genetic variation operators have been used. These are crossover and mutation. Crossover is the operator which is used to create offspring from two parents. The offspring bear the genes of each parent. As a genetic variation operator there is very high probability to crossover occurs other than mutation. In this algorithm we are using uniform crossover. A random bit vector of length of number of the node in the current graph is created. If i-th bit is 0 then the value of the i-th gene comes from the first parent otherwise it comes from the i-th gene of second parent. As each of the parents holding true adjacency information, the offspring will also hold it. One of the most widely used variation operator in genetic algorithm, which perform the operation in a single individual is mutation. Though the probability of mutation is normally very low, but it is the best way to make small variation in the individual. To mutate and create a offspring, some position of the of the individuals are chosen randomly and changed to other values. But the value should be one of its neighbours in the current graph. A topological operator is used to exclude incompatible population generated by the algorithm. We compute the diameter, the characteristic path length and the mean degree to evaluate the average topological properties of the family for the particular SSE number. 4.1. Ant Colony Optimization (ACO) to Predict Interactions After predicting the SSE-IN network we have to identify the interactions involve between the amino acids in the folded protein. We have used an ant colony optimization (ACO) approach to select and predict the edges which link different SSE's, considering about the correction of the matrix of motifs previously predicted. We have built a two steps algorithm as the hierarchical structure of the SSE-IN. • In interaction, consider each pair of SSE's separately. This is the local step. We use an ant colony algorithm to identify the suitable interactions between amino acids belonging to these SSE's. • A global ant colony algorithm is run to predict the interaction between amino acids from different SSE-IN. 4.2.1. Parameters for Interaction Network Prediction To predict the interactions, firstly we have to know how many edges to be add in the network and which nodes we should consider in interactions. To find and evaluate these parameters, we incorporated the template proteins from the associate family. We select some template proteins from the associate family whose SSE number is same as the sequence to predict the edge rate of the sequence and represent them as chromosome or array of alleles as in the multi-objective genetic algorithm. Thus, we build a comparative model to compute the edge ratio, which is used to fold the sequence SSE-IN. We calculate the average chromosome from all the template proteins in associate protein family. Here we used the distance between two chromosomes as discussed in the previous section to compare the sequence with the average chromosome. We add up the distance allele by allele to obtain a distance between the sequence and the average family chromosome. After that, we calculate the cumulated size by adding up the chromosome cell values. If the distance is less than 20% of the sequence cumulated size and the average family chromosome then the sequence is closer to the template protein. Then we compute the average edge rate in the closer protein to add the initial edges in the disconnected network of the sequence. If we can't find a sequence closer to the template one, we add the sequence with the average family chromosome and start again the same procedure. We do the same procedure to find the designation of the vertices, which vertices should interact with each other as they also use comparative model. To define, which edges link two SSE's, we consider the following problem. Let X = x1, x2, ... xn and Y = y1, y2, ... ym be two SSEs in interaction. We want to add e edges among the n x m possible combinations. For i ∈ [1, n] and j ∈ [1, m] the probability to interact the amino acid xi with yj, is correlated with the occurrence matrix of the predicted edges ratios, represented by Q(xi, yj) and we can assume sij ~ Q(xi, yj). To add approximately e edges, we need n m ∑∑S i =1 j =1 ij =e (3) and S ij = eQ( xi , y j ) n m ∑p=1 ∑p=1 Q( x p , yq ) 4.2.2. Ant Colony Algorithm The prediction of interaction network consists of two approaches, local and global algorithm. (4) 4.2.2.1. Local Algorithm The local algorithm is used to predict the suitable shortcut edges between pair of SSEs in the network. Thus, we differentiate each pair of SSEs which have connection and build a graph where each vertex of the first SSE is connected to each vertex of the other SSE. The connection or the edges are weighted (Sij). Then we used an ant colony approach consists of an ant number equals to the number of vertices in two SSE. The ant system has to reinforce the suitable edges between the SSEs. We use these edges in the global algorithm which is described in the next section. The local ant colony algorithm first creates n ants which is total number of vertices in the two SSEs related in the search. For an ant to be positioned we choose a random vertex of to SSE involved and place it. All the n ants are positioned this way and two ants can share same vertex. An ant in vertex i will choose the vertex j with probability pij, defined as follows: p ij = τ ij α . s ij β ∑ α β τ . s ij ij k ∈V ( i ) (5) The weight sij also called heuristic vector, calculated before. If the vertices i and j are in the same SSE, then the edge between these two vertices has weight equal to the average weight of the shortcut edges: 1 S = nm n m ∑∑ i =1 j =1 s ij (6) After each move of an ant we update the pheromone value on the inter-SSE edges using the formula, τ ij = (1 − ρ )τ ij + n ij ∆ τ (7) where sij is the number of ants that moved on the edge (i, j) and ∆τ is the quantity of pheromone dropped by each ant. As far as the edges belonging to the same SSE are concerned, we keep the pheromone rate on them equals to the average pheromone rate on the inter-SSE edges 1 τ = nm n m ∑ ∑τ i =1 j =1 ij (8) Ants are move inside an SSE randomly, described above, on the other hand if they decide to change the SSE they are guided by the edge weight and the weight is guided by the pheromone value. The algorithm stops after a predefined number of iteration or the maximum pheromone rate is e time bigger than the average pheromone rate on the edge. After the execution of the algorithm we keep the edges whose pheromone quantity exceeds a threshold λmin. Algorithm 2 Local algorithm to find Inter-SSE edges 1: Input: The predicted network from the multiobjective genetic algorithm 2: Output: Predicted inter-SSE edges 3: Create n ants, where n is the total number of nodes in process 4: while stopping criteria does not meet do 5: for all ant α do 6: moveAnt(α) 7: end for 8: updatePheromone() 9: end while 10: selectEdges(λmin) Algorithm 3 Global algorithm to predict edges into SSEs 1: 2: Input: The network with predicted edges Es from local algorithm and Ep, number edges to predict Output: The network with total Ep edges 3: buildSSEIN(Es) 4: create n ants 5: while stopping criteria does not meet do 6: for all ant a do 7: moveAnt(α) 8: end for 9: updatePheromone() 10: end while 11: selectEdges(Ep) 4.2.2.2. Global Algorithm After the local algorithm execution, we get the SSE-IN composed of these specific inter-SSE edges. The global algorithm will keep the number of edges exactly Ep, which was predicted before. As the local one, the global algorithm uses the ant colony approach with the number of vertices equal to the SSE-IN vertex number. The ants movements contribute to emerge the specific shortcut who’s only a number Ep is kept. We rank the shortcut edges as a function of the pheromone quantity to extract the Ep final shortcuts. Finally, we measure the resulting SSEINs by topological metrics to accept it or not. We compute the diameter, the characteristic path length and the mean degree to evaluate the average topological properties of the family for a particular SSE number. Then, after we have built the sequence SSE-IN, we compare its topological properties with the template ones. We allow an error up to 20% to accept the built sequence SSE-IN. If the built SSE-IN is not compatible, it is rejected. We compare the predicted value, denoted Ep, with the real value, denoted ER AC = 1 − | ER − E p | Ep (9) where AC is the accuracy of the prediction. 5. PERFORMANCE ANALYSIS In this paper we have discussed two algorithms to predict the interaction network of amino acid. We are going to analysis each algorithm independently. 5.1. Analysis of Genetic Algorithm as Multi-objective Optimization In order to test the performance of proposed multi-objective genetic algorithm, we randomly pick three chromosomes from the final population and we compare their associated matrices to the sequence SSE-IN adjacency matrix. To evaluate the difference between two matrices, we use an error rate defined as the number of wrong elements divided by the size of the matrix. The dataset we use is composed of 698 proteins belonging to the All alpha class and 413 proteins belonging to the All beta class. A structural family has been associated to this dataset as in [8]. All alpha class has an average error rate of 14.6% and for the All beta class it is 13.1% and the maximum error rate shown in the experiment is 22.9%. Though, the error rate depends on other criteria like the three objectives described before but according to the result we can firmly assert that the error rate is depends on the number of initial population, more the number of initial population less the error rate. With sufficient number of individuals in the initial population we can ensure the genetic diversity as well as the improved SSE-IN prediction. When the number of initial population is at least 15, the error rate is always less than 10%. As compared to the work in [8] we can claim better and improved error rate in this part of SSEIN prediction algorithm. 5.2. Analysis of Ant Colony Optimization We have experimented and tested this part of our proposed method according to the associated family protein because the probability of adding edge is determined by the family occurrence matrix. We have used the same dataset of sequences whose family has been deduced. For each protein, we have done 150 simulations and when the topological properties are become compatible to the template properties of the protein we accepted the built SSE-IN. The results are shown in Table 2. The score is the percentage of correctly predicted shortcut edges between the sequence SSE-IN and the SSE-IN we have reconstructed [8]. In most cases, the number of edges to add were accurate according to the Figure 3. From this we can percept that, global interaction scores depends on the local algorithm lead for each pair of SSEs in contact. The plot, in Figure 3 confirms this tendency, if the local algorithm select at least 80% of the correct shortcut edges, the global intersection score stays better than the 80% and evolve around 85% for the All alpha class and 73% for the All beta class. Figure 3: Precision in number of edges to be added in All Alpha (left) and All Beta (right). After the discussion we can say that, though for the big protein of size more than 250 amino acids the average score decreases, but in an average the score remains for the global algorithm around 80%. 5.3. Algorithm Complexity Our proposed algorithm is independent of specific time bound. Both the optimization algorithm used as multi-objective genetic algorithm and ant colony algorithm, is iteration based. We can stop the algorithm at any time. Though the result of the algorithm depends on the number of iteration but if we give sufficient amount of iteration it provides good result. In compare to other state of art algorithms, those uses exponential complexity algorithm, our is linear in terms of time and memory. 6. CONCLUSIONS We have proposed an computational solution to an biological problem. We have described how we can formulate a biological problem like folding protein into optimization and graph theory problem. The formulation consists of finding the interactions between secondary structure element (SSE) network and interaction between amino acids of the protein. The first problem was solving by an multi-objective genetic algorithm and the second one solve by ant colony optimization approach. As discussed before, we have given theoretical and statically proof that our proposed algorithm gives more accurate result in terms of accuracy and score to predict the amino acid interaction Table 2: Folding a SSE-In by ant colony approach. The algorithm parameter values are : α = 25, β = 12, ρ = 0.7, ∆τ = 4000, e = 2, λmin = 0.8. SCOP Family Number of Proteins Protein Size Class All Alpha All Beta Score Average Deviation 46688 17 27-46 83.973 3.277 47472 10 98-125 73.973 12.635 46457 25 129-135 76.125 7.849 48112 11 194-200 69.234 14.008 48507 18 203-214 66.826 5.504 46457 16 241-281 63.281 17.025 48507 20 387-422 62.072 9.304 50629 6 54-66 79.635 2.892 50813 11 90-111 74.006 4.428 48725 24 120-124 80.881 7.775 50629 13 124-128 76.379 9.361 50875 14 133-224 77.959 10.67 network. Though it can be furnished further with improved data structure and parallel algorithms. REFERENCES [1] E. Pennisi. A low number wins the genesweep pool. In Science, volume 300, page 1484, 2003. [2] K Madhusudan Reddy, Sunkara V Manorama, and A Ramachandra Reddy. Bandgap studies on anatase titanium dioxide nanoparticles. Materials Chemistry and Physics, 78(1):239–245, 2003. [3] Helen M Berman, John Westbrook, Zukang Feng, Gary Gilliland, TN Bhat, Helge Weissig, Ilya N Shindyalov, and Philip E Bourne. The protein data bank. Nucleic acids research, 28(1):235– 242, 2000. [4] Amit Ghosh, KV Brinda, and Saraswathi Vishveshwara. Dynamics of lysozyme structure network: probing the process of unfolding. Biophysical journal, 92(7):2523–2535, 2007. [5] Omar Gaci and Stefan Balev. The small-world model for amino acid interaction networks. In Advanced Information Networking and Applications Workshops, 2009. WAINA’09. International Conference on, pages 902–907. IEEE, 2009. [6] Usha K Muppirala and Zhijun Li. A simple approach for protein structure discrimination based on the network pattern of conserved hydrophobic residues. Protein Engineering Design and Selection, 19(6):265–275, 2006. [7] KV Brinda and Saraswathi Vishveshwara. A network representation of protein structures: implications for protein stability. Biophysical journal, 89(6):4159–4170, 2005. [8] Gaci, Omar. Building a topological inference exploiting qualitative criteria. Evolutionary Bioinformatics, 2010. [9] Gaci, Omar. How to fold amino acid interaction networks by computational intelligence methods. In BioInformatics and BioEngineering (BIBE), 2010 IEEE International Conference on, pages 150 – 155, 2010. [10] Marco Laumanns Eckart Zitzler and Lothar Thiele. SPEA2: Improving the Strength Pareto Evolutionary Algorithm. Zurich, Switzerland, 2001. [11] Deb K, Agrawal S, Pratap A, and Meyarivan T. A fast elitist non-dominated sorting genetic algorithm for multi-objective optimization: Nsga-ii. In Proc. of 6th international conference on parallel problem solving on nature, Paris,France, September 2000. Springer. [12] Y.J. Park and M.S. Song. A genetic algorithm for clustering problems. In Proc. of 3rd Annual Conference on Genetic Algorithm, pages 2–9, 1989. Authors Md. Shiplu Hawlader, born 1987 in Dhaka, Bangladesh, graduated from the Faculty of Engineering of University of Dhaka in 2011 at the Computer Science and Engineering department. After the graduation he completed his M.Sc.degree at the same department. He is a lecturer of Department of Computer Science and Engineering, University of Asia Pacific. Saifuddin Md. Tareeq, Dr., graduated from Department of Computer Science and Engineering, University of Dhaka and working as Associate Professor at the same Department.
9cs.NE
Tagger: Deep Unsupervised Perceptual Grouping arXiv:1606.06724v2 [cs.CV] 28 Nov 2016 Klaus Greff* , Antti Rasmus, Mathias Berglund, Tele Hotloo Hao, Jürgen Schmidhuber* , Harri Valpola The Curious AI Company {antti,mathias,hotloo,harri}@cai.fi * IDSIA {klaus,juergen}@idsia.ch Abstract We present a framework for efficient perceptual inference that explicitly reasons about the segmentation of its inputs and features. Rather than being trained for any specific segmentation, our framework learns the grouping process in an unsupervised manner or alongside any supervised task. We enable a neural network to group the representations of different objects in an iterative manner through a differentiable mechanism. We achieve very fast convergence by allowing the system to amortize the joint iterative inference of the groupings and their representations. In contrast to many other recently proposed methods for addressing multi-object scenes, our system does not assume the inputs to be images and can therefore directly handle other modalities. We evaluate our method on multi-digit classification of very cluttered images that require texture segmentation. Remarkably our method achieves improved classification performance over convolutional networks despite being fully connected, by making use of the grouping mechanism. Furthermore, we observe that our system greatly improves upon the semi-supervised result of a baseline Ladder network on our dataset. These results are evidence that grouping is a powerful tool that can help to improve sample efficiency. 1 Introduction Humans naturally perceive the world as being structured into different objects, their properties and relation to each other. This phenomenon which we refer to as perceptual grouping is also known as amodal perception in psychology. It occurs effortlessly and includes a segmentation of the visual input, such as that shown in in Figure 1. This grouping also applies analogously to other modalities, for example in solving the cocktail party problem (audio) or when separating the sensation of a grasped object from the sensation of fingers touching each other (tactile). Even more abstract features such as object class, color, position, and velocity are naturally grouped together with the inputs to form coherent objects. This rich structure is crucial for many real-world tasks such manipulating objects or driving a car, where awareness of different objects and their features is required. In this paper, we introduce a framework for learning efficient iterative inference of such perceptual grouping which we call iTerative Amortized Grouping (TAG). This framework entails a mechanism for iteratively splitting the inputs and internal representations into several different groups. We make no assumptions about the structure of this segmentation and rather train the model end-to-end to discover which Figure 1: An example of perare the relevant features and how to perform the splitting. ceptual grouping for vision. 30th Conference on Neural Information Processing Systems (NIPS 2016), Barcelona, Spain. By using an auxiliary denoising task we focus directly on amortizing the posterior inference of the object features and their grouping. Because our framework does not make any assumptions about the structure of the data, it is completely domain agnostic and applicable to any type of data. The TAG framework works completely unsupervised, but can also be combined with supervised learning for classification or segmentation. Another class of recently proposed mechanisms for addressing complex structured inputs is attention [31, 2, 9]. These methods simplify the problem of perception by learning to restrict processing to a part of the input. In contrast, TAG simply structures the input without directing the focus or discarding irrelevant information. These two systems are not mutually exclusive and could complement each other: the group structure can help in deciding what exactly to focus on, which in turn may help simplify the task at hand. We apply our framework to two artificial datasets: a simple binary one with multiple shapes and one with overlapping textured MNIST digits on a textured background. We find that our method learns intuitively appealing groupings that support denoising and classification. Our results for the 2-digit classification are significantly better than a strong ConvNet baseline despite the use of a fully connected network. The improvements for semi-supervised learning with 1,000 labels are even greater, suggesting that grouping can help learning by increasing the sample efficiency. 2 Iterative Amortized Grouping (TAG) Grouping. Our goal is to enable neural networks to split inputs and internal representations into coherent groups that can be processed separately. We hypothesize that processing the whole input in one clump is often difficult due to unwanted interference. However, if we allow the network to separately process groups, it can make use of invariant distributed features without the risk of ambiguities. We thus define a group to be a collection of inputs and internal representations that are processed together (largely) independently of the other groups. The “correct” grouping is often dynamic, ambiguous and task dependent. For example, when driving along a road, it is useful to group all the buildings together. To find a specific house, however, it is important to separate the buildings, and to enter one, they need to be subdivided even further. Rather than treating segmentation as a separate task, we provided a mechanism for grouping as a tool for our system. We make no assumptions about the correspondence between objects and groups. If the network can process several objects in one group without unwanted interference, then the network is free to do so. Processing of the input is split into K different groups, but it is left up to the network to learn how to best use this ability in a given problem, such as classification. To make the task of instance segmentation easy, we keep the groups symmetric in the sense that each group is processed by the same underlying model. We introduce latent binary variables gk,j to encode if input element xj is assigned to group k.1 Amortized Iterative Inference. We want our model to reason not only about the group assignments but also about the representation of each group. This amounts to inference over two sets of variables: the latent group assignments and the individual group representations; A formulation very similar to mixture models for which exact inference is typically intractable. For these models it is a common approach to approximate the inference in an iterative manner by alternating between (re-)estimation of these two sets (e.g., EM-like methods [8]). The intuition is that given the grouping, inferring the object features becomes easy, and vice versa. We employ a similar strategy by allowing our network to iteratively refine its estimates of the group assignments as well as the object representations. If the model can improve the estimates in each step, then it will converge to a final solution. Rather than deriving and then running an inference algorithm, we train a parametric mapping to arrive at the end result of inference as efficiently as possible [13]. This is known as amortized inference [34], and it is used, for instance, in variational autoencoders where the encoder learns to amortize the posterior inference required by the generative model represented by the decoder. Here we instead apply the framework of denoising autoencoders [10, 18, 37] which are trained to reconstruct original 1 More formally, we introduce discrete random variables Gj for each input element indexed by j. As a shorthand for p(Gj = k) we write p(gk,j ) and denote the discrete-valued vector of elements gk,j by gk . 2 δz0 z δz1 z L(m0) m1 L(m1) m2 1 q1(x) 2 δz2 L(m2) q2 (x) z m3 δz i-1 zi L(mi-1) 3 m i-1 z m0 0 mi z i-1 PARAM ETRIC MAPPIN G PARAMETRIC MAPPING PARAM ETRIC MAPPIN G PARAM ETRIC MAPPIN G q3 (x) x̃ q1 (x|g) x x iteration 1 iteration 2 q1(x) x̃ iteration 3 Figure 2: Illustration of the TAG framework used for training. Left: The system learns by denoising its input over iterations using several groups to distribute the representation. Each group, represented by several panels of the same color, maintains its own estimate of reconstructions z i of the input, and corresponding masks mi , which encode the parts of the input that this group is responsible for representing. These estimates are updated over iterations by the same network, that is, each group and iteration share the weights of the network and only the inputs to the network differ. In the case of images, z contains pixel-values. Right: In each iteration z i−1 and mi−1 from the previous iteration, are used to compute a likelihood term L(mi−1 ) and modeling error δz i−1 . These four quantities are fed to the parametric mapping to produce z i and mi for the next iteration. During learning, all inputs to the network are derived from the corrupted input as shown here. The unsupervised task for the network is to learn to denoise, i.e. output an estimate q(x) of the original clean input. See Section 2.1 for more details. inputs x from corrupted versions x̃. This encourages the network to implement useful amortized posterior inference without ever having to specify or even know the underlying generative model whose inference is implicitly learned. This situation is analogous to normal supervised deep learning, which can also be viewed as amortized inference [6]. Rather than specifying all the hidden variables that are related to the inputs and labels and then deriving and running an inference algorithm, a supervised deep model is trained to arrive at an approximation q(class | input) of the true posterior p(class | input) without the user specifying or typically even knowing the underlying generative model. This works as long as the network is provided with the input information and mechanisms required for an an efficient approximation of posterior inference. 2.1 Definition of the TAG mechanism A high-level illustration of the TAG framework is presented in Figure 2: We train a network with a learnable grouping mechanism to iteratively denoise corrupted inputs x̃. The output at each iteration is an approximation qi (x) of the true probability p(x | x̃), which is refined over iterations indexed by i. As the cost function for training the network, we use the negative log likelihood X C(x) = − log qi (x), (1) i where the summation is over iterations i. From here on we mostly omit i from the equations for readability. Since this cost function does not require any class labels or intended grouping information, training can be completely unsupervised, though additional terms for supervised tasks can be added too. Group representation. Internally, the network maintains K versions of its representations indexed by k. This can also be thought of as running K separate copies of the same network, where each network only sees a subset of the inputs and outputs zk = q(x|gk ) (the expected value of the input for that group), and mk = q(gk ) (the group assignment probabilities). Each zk and mk has the same dimensionality as the input, and they are updated over iterations. Each group k makes its own prediction about the original input based on zk . In the binary case we use 3 q(xj | gk,j ) = sigmoid(zk,j ), and in the continuous case we take zk,j to represent the mean of a Gaussian distribution with variance v. We assumed the variance of the Gaussian distribution to be constant over iterations and groups but learned it from the data. It would be easy to add a more accurate estimate of the variance. The final prediction of the network is defined as: X X q(xj ) = q(gk,j )q(xj | gk,j ) = mk,j q(xj | gk,j ). k (2) k The group assignment probabilities q(gk,j ) = mk are forced to be non-negative and sum up to one over k: X mk,j ≥ 0, mk,j = 1. (3) k Inputs. In contrast to a normal denoising autoencoder that receives the corrupted x̃, we feed in estimates mik and zki from the previous iteration and two additional quantities: L(mik ) and δzki . They are functions of the estimates and the corrupted x̃ and carry information about how the estimates could be improved. A parametric mapping (here a neural network) then produces the new estimates mi+1 and zki+1 . The initial values for m0k are randomized, and zk0 is set to the data mean for all k. k Because zk are continuous variables, their likelihood is a function over all possible values of zk , and not all of this information can be easily represented. Typically, the relevant information is found close to the current estimate zk ; therefore we use δzk , which is proportional to the gradient of the negative log likelihood. Essentially, it represents the remaining modeling error: " # X ∂ δzk,j = mk,j (x̃j − zk,j ) ∝ − log( q(x̃j | zh,j , gh,j )) . (4) ∂zk,j h The derivation of the analogous term in the binary case is presented in Appendix A.5. Since we are using denoising as a training objective, the network can only be allowed to take inputs through the corrupted x̃ during learning. Therefore, we need to look at the likelihood p(x̃ | z: , g: ) of the corrupted input when trying to determine how the estimates could be improved. Since gk,j are discrete variables unlike zk,j , we treat them slightly differently: For gk,j it is feasible to express the complete likelihood table assuming other values constant. We denote this function by L(mk,j ) ∝ q(x̃j | z:,j , g:,j ) . (5) Note that we normalize L(mk,j ) over k such that it sums up to one for each value of j. This amounts to providing each group information about how likely each input element belongs to them rather than some other group. In other words, this is equivalent to likelihood ratio rather than the raw likelihood. Intuitively, the term L(mk ) describes how well each group reconstructs the individual input elements relative to the other groups. Parametric mapping. The final component needed in the TAG framework is the parametric model, which does all the heavy lifting of inference. This model has a dual task: first, to denoise the estimate zk of what each group says about the input, and second, to update the group assignment probabilities mk of each input element. The information about the remaining modeling error is based on the corrupted input x̃; thus, the parametric network has to denoise this and in effect implement posterior inference for the estimated quantities. The mapping function is the same for each group k and for each iteration. In other words, we share weights and in effect have only a single function approximator that we reuse. The denoising task encourages the network to iteratively group its inputs into coherent groups that can be modeled efficiently. The trained network can be useful for a real-world denoising application, but typically, the idea is to encourage the network to learn interesting internal representations. Therefore, it is not q(x) but rather mk , zk and the internal representations of the parametric mapping that we are typically concerned with. 4 Data: x, K, T, σ, v, Wh , Wu , Θ Result: z T , mT , C begin Initialization: x̃ ← x + N (0, σ 2 I); m0 ← softmax(N (0, I)); z 0 ← E[x]; end for i = 0 . . . T − 1 do for k = 1 . . . K do z̃k ← N (x̃; zki , (v + σ 2 )I); δzki ← (x̃ − zki )mik z̃k ; L(mik ) ← Pz̃kz̃h ; h  hik ← f (Wh zki , mik , δzki , L(mik ) ); uik ← Ladder(hik , Θ); i [zki+1 , mi+1 k ] ← Wu uk ; end mi+1 ← softmax(mi+1 ); PK qi+1 (x) ← k=1 N (x; zki+1 , vI)mi+1 ; end PT C ← − i=1 log qi (x); Figure 3: An example of how Tagger would use a 3-layer-deep Ladder Network as its parametric mapping to perform its iteration i + 1. Note the optional class prediction output ygi for classification tasks. Algorithm 1: Pseudocode for running Tagger on a sin- See supplementary material for details. gle real-valued example x. For details and a binaryinput version please refer to supplementary material. P Summary. By using the negative log likelihood C(x) = − i log qi (x) as a cost function, we train our system to compute an approximation qi (x) of the true denoising posterior p(x|x̃) at each iteration i. An overview of the whole system is given in Figure 2. For each input element xj we introduce K latent binary variables gk,j that take a value of 1 if this element is generated by group k. This way inference is split into K groups, and we can write the approximate posterior in vector notation as follows: X X qi (x) = qi (x|gk )qi (gk ) = N (x; zki , vI)mik , (6) k k where we model the group reconstruction qi (x|gk ) as a Gaussian with mean zki and variance v, and the group assignment posterior qi (gk ) as a categorical distribution mk . The trainable part of the TAG framework is given by a parametric mapping that operates independently on each group k and is used to compute both zki and mik (which is afterwards normalized using an elementwise softmax over the groups). This parametric mapping is usually implemented by a neural network and the whole system is trained end-to-end using standard backpropagation through time. The input to the network for the next iteration consists of the vectors zki and mik along with two additional quantities: The remaining modelling error δzki and the group assignment likelihood ratio L(mik ) which carry information about how the estimates can be improved: δzki ∝ ∂C(x̃) ∂zki qi (x̃|gk ) L(mik ) ∝ P h qi (x̃|gh ) and Note that they are derived from the corrupted input x̃, to make sure we don’t leak information about the clean input x into the system. 2.2 The Tagger: Combining TAG and Ladder Network We chose the Ladder network [22] as the parametric mapping because its structure reflects the computations required for posterior inference in hierarchical latent variable models. This means that the network should be well equipped to handle the hierarchical structure one might expect to find in many domains. We call this Ladder network wrapped in the TAG framework Tagger. This is illustrated in Figure 3 and the corresponding pseudocode can be found in Algorithm 1. 5 We mostly used the specifications of the Ladder network as described by Rasmus et al. [22], but there are some minor modifications we made to fit it to the TAG framework. We found that the model becomes more stable during iterations when we added a sigmoid function to the gating variable v [22, Equation 2] used in all the decoder layers with continuous outputs. None of the noise sources or denoising costs were in use (i.e., λl = 0 for all l in Eq. 3 of Ref. [22]), but Ladder’s classification cost (Cc in Ref. [22]) was added to the Tagger’s cost (Equation 1) for the semi-supervised tasks. All four inputs (zki , mik , δzki , and L(mik )) were concatenated and projected to a hidden representation that served as the input layer of the Ladder Network. Subsequently, the values for the next iteration were simply read from the reconstruction (x̂ in Ref. [22]) and projected linearly into zki+1 and via softmax to mi+1 to enforce the conditions in Equation 3. For the binary case, we used a logistic k sigmoid activation for zki+1 . 3 Experiments and results We explore the properties and evaluate the performance of Tagger both in fully unsupervised settings and in semi-supervised tasks in two datasets2 . Although both datasets consist of images and grouping is intuitively similar to image segmentation, there is no prior in the Tagger model for images: our results (unlike the ConvNet baseline) generalize even if we permute all the pixels . Shapes. We use the simple Shapes dataset [24] to examine the basic properties of our system. It consists of 60,000 (train) + 10,000 (test) binary images of size 20x20. Each image contains three randomly chosen shapes (4, 5, or ) composed together at random positions with possible overlap. Textured MNIST. We generated a two-object supervised dataset (TextureMNIST2) by sequentially stacking two textured 28x28 MNIST-digits, shifted two pixels left and up, and right and down, respectively, on top of a background texture. The textures for the digits and background are different randomly shifted samples from a bank of 20 sinusoidal textures with different frequencies and orientations. Some examples from this dataset are presented in the column of Figure 5. We use a 50k training set, 10k validation set, and 10k test set to report the results. The dataset is assumed to be difficult due to the heavy overlap of the objects in addition to the clutter due to the textures. We also use a textured single-digit version (TextureMNIST1) without a shift to isolate the impact of texturing from multiple objects. 3.1 Training and evaluation We train Tagger in an unsupervised manner by only showing the network the raw input example x, not ground truth masks or any class labels, using 4 groups and 3 iterations. We average the cost over iterations and use ADAM [17] for optimization. On the Shapes dataset we trained for 100 epochs with a bit-flip probability of 0.2, and on the TextureMNIST dataset for 200 epochs with a corruption-noise standard deviation of 0.2. The models reported in this paper took approximately 3 and 11 hours in wall clock time on a single Nvidia Titan X GPU for Shapes and TextureMNIST2 datasets respectively. To understand how model size, length of the iterative inference, and the number of groups affect the modeling performance, we evaluate the trained models using two metrics: First, the denoising cost on the validation set, and second we evaluate the segmentation into objects using the adjusted mutual information (AMI) score [38] and ignore the background and overlap regions in the Shapes dataset (consistent with Greff et al. [12]). Evaluations of the AMI score and classification results in semi-supervised tasks were performed using uncorrupted input. The system has no restrictions regarding the number of groups and iterations used for training and evaluation. The results improved in terms of both denoising cost and AMI score when iterating further, so we used 5 iterations for testing. Even if the system was trained with 4 groups and 3 shapes per training example, we could test the evaluation with, for example, 2 groups and 3 shapes, or 4 groups and 4 shapes. 6 Denoising cost AMI Iter 1 0.094 0.58 Iter 2 0.068 0.73 Iter 3 0.063 0.77 Iter 4 0.063 0.79 Iter 5 0.063 0.79 Denoising cost* AMI* 0.100 0.70 0.069 0.90 0.057 0.95 0.054 0.96 0.054 0.97 RC [12] Tagger Tagger* AMI 0.61 ± 0.005 0.79 ± 0.034 0.97 ± 0.009 (b) Method comparison (a) Convergence of Tagger over iterative inference Table 1: Table (a) shows how quickly the algorithm evaluation converges over inference iterations with the Shapes dataset. Table (b) compares segmentation quality to previous work on the Shapes dataset. The AMI score is defined in the range from 0 (guessing) to 1 (perfect match). The results with a star (*) are using LayerNorm [1] instead of BatchNorm. 3.2 Unsupervised Perceptual Grouping Table 1 shows the median performance of Tagger on the Shapes dataset over 20 seeds. Tagger is able to achieve very fast convergences, as shown in Table 1a. Through iterations, the network improves its denoising performances by grouping different objects into different groups. Comparing to Greff et al. [12], Tagger performs significantly better in terms of AMI score (see Table 1b). Figure 4 and Figure 5 qualitatively show the learned unsupervised groupings for the Shapes and textured MNIST datasets. Tagger uses its TAG mechanism slightly differently for the two datasets. For Shapes, zg represents filled-in objects and masks mg show which part of the object is actually visible. For textured MNIST, zg represents the textures and masks mg texture segments. In the case of the same digit or two identical shapes, Tagger can segment them into separate groups, and hence, it performs instance segmentation. We used 4 groups for training even though there are only 3 objects in the Shapes dataset and 3 segments in the TexturedMNIST2 dataset. The excess group is left empty by the trained system but its presence seems to speed up the learning process. The hand-picked examples A-C in Figure 4 illustrate the robustness of the system when the number of objects changes in the evaluation dataset or when evaluation is performed using fewer groups. Example E is particularly interesting; E1 shows how the normal evaluation looks like but E2 demonstrates how we can remove the topmost digit from the scene and let the system fill in digit below and the background. We do this by setting the corresponding group assignment probabilities mg to a large negative number just before the final softmax over groups in the last iteration. To solve the textured two-digit MNIST task, the system has to combine texture cues with high-level shape information. The system first infers the background texture and mask which are finalized on the first iteration. Then the second iteration typically fixes the texture used for topmost digit, while subsequent iterations clarify the occluded digit and its texture. This demonstrates the need for iterative inference of the grouping. 3.3 Classification We investigate the role of grouping for the task of classification. We evaluate the Tagger against four baseline models on the textured MNIST task. As our first baseline we use a fully connected network (FC) with ReLU activations and batch normalization after each layer. Our second baseline is a ConvNet (Conv) based on Model C from Springenberg et al. [33], which has close to state-of-the-art results on CIFAR-10. We removed dropout, added batch normalization after each layer and replaced the final pooling by a fully connected layer to improve its performance for the task. Furthermore, we compare with a fully connected Ladder [22] (FC Ladder) network. All models use a softmax output and are trained with 50,000 samples to minimize the categorical cross entropy error. In case there are two different digits in the image (most examples in the TextureMNIST2 dataset), the target is p = 0.5 for both classes. We evaluate the models based on classification errors. For the two-digit case, we score the network based on the two highest predicted classes (top 2). 2 The datasets and a Theano [36] reference implementation of Tagger are available at http://github.com/ CuriousAI/tagger 7 i=1 i=2 i=3 i=4 i=5 C m3 B z3 A m2 0: 60 z2 0: 85 m1 1: 00 z1 1: 00 m0 1: 00 z0 1: 00 1: 00 reconst: i=0 original reconst: Figure 4: Results for Shapes dataset. Left column: 7 examples from the test set along with their resulting groupings in descending AMI score order and 3 hand-picked examples (A, B, and C) to demonstrate generalization. A: Testing 2-group model on 3 object data. B: Testing a 4-group model trained with 3-object data on 4 objects. C: Testing 4-group model trained with 3-object data on 2 objects. Right column: Illustration of the inference process over iterations for four color-coded groups; mg and zg . 8 i=1 i=2 i=3 i=4 i=5 0: 95 reconst: i=0 E2 m3 E1 Pred: : no class z3 D m2 Pred: : 2 0: 85 z2 0: 86 m1 0: 87 Pred: : no class z1 0: 89 m0 0: 90 Pred: : 0 z0 0: 92 Class original reconst: Figure 5: Results for the TextureMNIST2 dataset. Left column: 7 examples from the test set along with their resulting groupings in descending AMI score order and 3 hand-picked examples (D, E1, E2). D: An example from the TextureMNIST1 dataset. E1-2: A hand-picked example from TextureMNIST2. E1 demonstrates typical inference, and E2 demonstrates how the system is able to estimate the input when a certain group (topmost digit 4) is removed. Right column: Illustration of the inference process over iterations for four color-coded groups; mg and zg . 9 For Tagger, we first train the system in an unsupervised phase for 150 epochs and then add two fresh randomly initialized layers on top and continue training the entire system end to end using the sum of unsupervised and supervised cost terms for 50 epochs. Furthermore, the topmost layer has a per-group softmax activation that includes an added ’no class’ neuron for groups that do not contain any digit. The final classification is then performed by summing the softmax output over all groups for the true 10 classes and renormalizing this sum to add up to one. The final results are summarized in Table 2. As shown in this table, Tagger performs significantly better than all the fully connected baseline models on both variants, but the improvement is more pronounced for the two-digit case. This result is expected because for cases with multi-object overlap, grouping becomes more important. It, moreover, confirms the hypothesis that grouping can help classification and is particularly beneficial for complex inputs. Remarkably, Tagger, despite being fully connected, is on par with the convolutional baseline for the TexturedMNIST1 dataset and even outperforms it in the two-digit case. We hypothesize that one reason for this result is that grouping allows for the construction of efficient invariant features already in the low layers without losing information about the assignment of features to objects. Convolutional networks solve this problem to some degree by grouping features locally through the use of receptive fields, but that strategy is expensive and can break down in cases of heavy overlap. 3.4 Semi-Supervised Learning Training TAG does not rely on labels and is therefore directly usable in a semi-supervised context. For semi-supervised learning, the Ladder [22] is arguably one of the strongest baselines with SOTA results on 1,000 MNIST and 60,000 permutation invariant MNIST classification. We follow the common practice of using 1,000 labeled samples and 49,000 unlabeled samples for training Tagger and the Ladder baselines. For completeness, we also report results of the convolutional (ConvNet) and fully-connected (FC) baselines trained fully supervised on only 1,000 samples. From the results in Table 2, it is obvious that all the fully supervised methods fail on this task with 1,000 labels. The best result of approximately 52 % error for the single-digit case is achieved by ConvNet, which still performs only at chance level for two-digit classification. The best baseline result is achieved by the FC Ladder, which reaches 30.5 % error for one digit but 68.5 % for TextureMNIST2. For both datasets, Tagger achieves by far the lowest error rates: 10.5 % and 24.9 %, respectively. Again, this difference is amplified for the two-digit case, where the Tagger with 1,000 labels even outperforms the Ladder baseline with all 50k labels. This result matches our intuition that grouping can often segment out objects even of an unknown class and thus help select the relevant features for learning. This is particularly important in semi-supervised learning where the inability to self-classify unlabeled samples can easily mean that the network fails to learn from them at all. To put these results in context, we performed informal tests with five human subjects. The task turned out to be quite difficult and the subjects needed to have regular breaks to be able to maintain focus. The subjects improved significantly over training for a few days but there were also significant individual differences. The best performing subjects scored around 10 % error for TextureMNIST1 and 30 % error for TextureMNIST2. For the latter task, the test subject took over 30 seconds per sample. 4 Related work Attention models have recently become very popular, and similar to perceptual grouping they help in dealing with complex structured inputs. These approaches are not, however, mutually exclusive and can benefit from each other. Overt attention models [31, 9] control a window (fovea) to focus on relevant parts of the inputs. Two of their limitations are that they are mostly tailored to the visual domain and are usually only suited to objects that are roughly the same shape as the window. But their ability to limit the field of view can help to reduce the complexity of the target problem and thus also help segmentation. Soft attention mechanisms [29, 7, 43] on the other hand use some form of top-down feedback to suppress inputs that are irrelevant for a given task. These mechanisms have recently gained popularity, first in machine translation [2] and then for many other problems such as 10 Dataset TextureMNIST1 Method FC MLP FC Ladder FC Tagger (ours) ConvNet Error 50k Error 1k 31.1 ± 2.2 7.2 ± 0.1 4.0 ± 0.3 3.9 ± 0.3 89.0 ± 0.2 30.5 ± 0.5 10.5 ± 0.9 52.4 ± 5.3 Model details 2000-2000-2000 / 1000-1000 3000-2000-1000-500-250 3000-2000-1000-500-250 based on Model C [33] FC MLP 55.2 ± 1.0 79.4 ± 0.3 2000-2000-2000 / 1000-1000 FC Ladder 41.1 ± 0.2 68.5 ± 0.2 3000-2000-1000-500-250 FC Tagger (ours) 7.9 ± 0.3 24.9 ± 1.8 3000-2000-1000-500-250 ConvNet 12.6 ± 0.4 79.1 ± 0.8 based on Model C [33] Table 2: Test-set classification errors for textured one-digit MNIST (chance level: 90 %) and top-2 error on the textured two-digit MNIST dataset (chance level: 80 %). We report mean and sample standard deviation over 5 runs. FC = Fully Connected TextureMNIST2 image caption generation [42]. Because they re-weigh all the inputs based on their relevance, they could benefit from a perceptual grouping process that can refine the precise boundaries of attention. Our work is primarily built upon a line of research based on the concept that the brain uses synchronization of neuronal firing to bind object representations together. This view was introduced by von der Malsburg [40] and has inspired many early works on oscillations in neural networks (see the survey [39] for a summary). Simulating the oscillations explicitly is costly and does not mesh well with modern neural network architectures (but see [20]). Rather, complex values have been used to model oscillating activations using the phase as soft tags for synchronization [21, 23]. In our model, we further abstract them by using discretized synchronization slots (our groups). It is most similar to the models of Wersing et al. [41], Hyvärinen & Perkiö [16] and Greff et al. [12]. However, our work is the first to combine this with denoising autoencoders in an end-to-end trainable fashion. Another closely related line of research [26, 25] has focused on multi-causal modeling of the inputs. Many of the works in that area [19, 35, 32, 15] build upon Restricted Boltzmann Machines. Each input is modeled as a mixture model with a separate latent variable for each object. Because exact inference is intractable, these models approximate the posterior with some form of expectation maximization [8] or sampling procedure. Our assumptions are very similar to these approaches, but we allow the model to learn the amortized inference directly (more in line with Goodfellow et al. [11]). Since recurrent neural networks (RNNs) are general purpose computers, they can in principle implement arbitrary computable types of temporary variable binding [28, 29], unsupervised segmentation [27], and internal [29] and external attention [31]. For example, an RNN with fast weights [29] can rapidly associate or bind the patterns to which the RNN currently attends. Similar approaches even allow for metalearning [30], that is, learning a learning algorithm. Hochreiter et al. [14], for example, learned fast online learning algorithms for the class of all quadratic functions of two variables. Unsupervised segmentation could therefore in principle be learned by any RNN as a by-product of data compression or any other given task. The recurrent architecture most similar to the Tagger is the Neural Abstraction Pyramid (NAP; [3]) – a convolutional neural network augmented with lateral connections which help resolve local ambiguities and feedback connections that allow incorporation of high-level information. In early pioneering work the NAP was trained for iterative image binarization [5] and iterative image denoising [4], much akin to the setup we use. Being recurrent, the NAP layers too, could in principle learn a perceptual grouping as a byproduct. That does not, however, imply that every RNN will, through learning, easily discover and implement this tool. The main improvement that our framework adds is an explicit mechanism for the network to split the input into multiple representations and thus quickly and efficiently learn a grouping mechanism. We believe this special case of computation to be important enough for many real-world tasks to justify this added complexity. 11 5 Future Work So far we’ve assumed the groups to represent independent objects or events. However, this assumption is unrealistic in many cases. Assuming only conditional independence would be considerably more reasonable, and could be implemented by allowing all groups to share the same top-layer of their Ladder network. The TAG framework assumes just one level of (global) groups, which does not reflect the hierarchical structure of the world. Therefore, another important future extension is to rather use a hierarchy of local groupings, by using our model as a component of a bigger system. This could be achieved by collapsing the groups of a Tagger network by summing them together at some hidden layer. That way this abstract representation could serve as input for another tagger with new groupings at this higher level. We hypothesize that a hierarchical Tagger could also represent relations between objects, because they are simply the couplings that remain from the assumption of independent objects. Movement is a strong segmentation cue and a simple temporal extensions of the TAG framework could be to allow information to flow forward in time between higher layers, not just via the inputs. Iteration would then occur in time alongside the changing inputs. We believe that these extensions will make it possible to scale the approach to video. 6 Conclusion In this paper, we have argued that the ability to group input elements and internal representations is a powerful tool that can improve a system’s ability to handle complex multi-object inputs. We have introduced the TAG framework, which enables a network to directly learn the grouping and the corresponding amortized iterative inference in a unsupervised manner. The resulting iterative inference is very efficient and converges within five iterations. We have demonstrated the benefits of this mechanism for a heavily cluttered classification task, in which our fully connected Tagger even significantly outperformed a state-of-the-art convolutional network. More impressively, we have shown that our mechanism can greatly improve semi-supervised learning, exceeding conventional Ladder networks by a large margin. Our method makes minimal assumptions about the data and can be applied to any modality. With TAG, we have barely scratched the surface of a comprehensive integrated grouping mechanism, but we already see significant advantages. We believe grouping to be crucial to human perception and are convinced that it will help to scale neural networks to even more complex tasks in the future. Acknowledgments The authors wish to acknowledge useful discussions with Theofanis Karaletsos, Jaakko Särelä, Tapani Raiko, and Søren Kaae Sønderby. And further acknowledge Rinu Boney, Timo Haanpää and the rest of the Curious AI Company team for their support, computational infrastructure, and human testing. This research was supported by the EU project “INPUT” (H2020-ICT-2015 grant no. 687795). References [1] Ba, J. L., Kiros, J. R., and Hinton, G. E. Layer normalization. arXiv:1607.06450 [cs, stat], July 2016. [2] Bahdanau, D., Cho, K., and Bengio, Y. Neural machine translation by jointly learning to align and translate. arXiv preprint arXiv:1409.0473, 2014. [3] Behnke, Sven. Hebbian learning and competition in the neural abstraction pyramid. In Neural Networks, 1999. IJCNN’99. International Joint Conference on, volume 2, pp. 1356–1361. IEEE, 1999. [4] Behnke, Sven. Learning iterative image reconstruction in the neural abstraction pyramid. International Journal of Computational Intelligence and Applications, 1(04):427–438, 2001. [5] Behnke, Sven. Learning Iterative Binarization using Hierarchical Recurrent Networks. cell, 2:2i, 2003. [6] Bengio, Yoshua, Laufer, Eric, Alain, Guillaume, and Yosinski, Jason. Deep Generative Stochastic Networks Trainable by Backprop. pp. 226–234, 2014. [7] Deco, G. Biased competition mechanisms for visual attention in a multimodular neurodynamical system. In Emergent Neural Computational Architectures Based on Neuroscience, pp. 114–126. Springer, 2001. [8] Dempster, A. P., Laird, N. M., and Rubin, D. B. Maximum likelihood from incomplete data via the EM algorithm. Journal of the royal statistical society., pp. 1–38, 1977. 12 [9] Eslami, S. M., Heess, N., Weber, T., Tassa, Y., Kavukcuoglu, Y., and Hinton, G. E. Attend, infer, repeat: Fast scene understanding with generative models. preprint arXiv:1603.08575, 2016. [10] Gallinari, P., LeCun, Y., Thiria, S., and Fogelman-Soulie, F. Mémoires associatives distribuées: Une comparaison (distributed associative memories: A comparison). In Cesta-Afcet, 1987. [11] Goodfellow, I. J., Bulatov, Y., Ibarz, J., Arnoud, S., and Shet, V. Multi-digit number recognition from street view imagery using deep convolutional neural networks. arXiv preprint arXiv:1312.6082, 2013. [12] Greff, K., Srivastava, R. K., and Schmidhuber, J. Binding via reconstruction clustering. arXiv:1511.06418 [cs], November 2015. [13] Gregor, K. and LeCun, Y. Learning fast approximations of sparse coding. In Proceedings of the 27th International Conference on Machine Learning (ICML-10), pp. 399–406, 2010. [14] Hochreiter, S., Younger, A. S., and Conwell, P. R. Learning to learn using gradient descent. In Proc. International Conference on Artificial Neural Networks, pp. 87–94. Springer, 2001. [15] Huang, J. and Murphy, K. Efficient inference in occlusion-aware generative models of images. arXiv preprint arXiv:1511.06362, 2015. [16] Hyvärinen, A. and Perkiö, J. Learning to segment any random vector. In The 2006 IEEE International Joint Conference on Neural Network Proceedings, pp. 4167–4172. IEEE, 2006. [17] Kingma, D. and Ba, J. Adam: A method for stochastic optimization. CBLS, 2015. [18] Le Cun, Y. Modèles Connexionnistes de L’apprentissage. PhD thesis, Paris 6, 1987. [19] Le Roux, N., Heess, N., Shotton, J., and Winn, J. Learning a generative model of images by factoring appearance and shape. Neural Computation, 23(3):593–650, 2011. [20] Meier, M., Haschke, R., and Ritter, H. J. Perceptual grouping through competition in coupled oscillator networks. Neurocomputing, 141:76–83, 2014. [21] Rao, R. A., Cecchi, G., Peck, C. C., and Kozloski, J. R. Unsupervised segmentation with dynamical units. Neural Networks, IEEE Transactions on, 19(1):168–182, 2008. [22] Rasmus, A., Berglund, M., Honkala, M., Valpola, H., and Raiko, T. Semi-supervised learning with ladder networks. In NIPS, pp. 3532–3540, 2015. [23] Reichert, D. P. and Serre, T. Neuronal synchrony in complex-valued deep networks. arXiv:1312.6115 [cs, q-bio, stat], December 2013. [24] Reichert, D. P., Series, P, and Storkey, A. J. A hierarchical generative model of recurrent object-based attention in the visual cortex. In ICANN, pp. 18–25. Springer, 2011. [25] Ross, D. A. and Zemel, R. S. Learning parts-based representations of data. The Journal of Machine Learning Research, 7:2369–2397, 2006. [26] Saund, E. A multiple cause mixture model for unsupervised learning. Neural Computation, 7(1):51–71, 1995. [27] Schmidhuber, J. Learning complex, extended sequences using the principle of history compression. Neural Computation, 4(2):234–242, 1992. [28] Schmidhuber, J. Learning to control fast-weight memories: An alternative to dynamic recurrent networks. Neural Computation, 4(1):131–139, 1992. [29] Schmidhuber, J. Reducing the ratio between learning complexity and number of time varying variables in fully recurrent nets. In ICANN’93, pp. 460–463. Springer, 1993. [30] Schmidhuber, J. A ‘self-referential’ weight matrix. In ICANN’93, pp. 446–450. Springer, 1993. [31] Schmidhuber, J. and Huber, R. Learning to generate artificial fovea trajectories for target detection. International Journal of Neural Systems, 2(01n02):125–134, 1991. [32] Sohn, K., Zhou, G., Lee, C., and Lee, H. Learning and selecting features jointly with point-wise gated Boltzmann machines. In Proceedings of The 30th International Conference on Machine Learning, pp. 217–225, 2013. [33] Springenberg, J. T., Dosovitskiy, A., Brox, T., and Riedmiller, M. Striving for simplicity: The all convolutional net. arXiv preprint arXiv:1412.6806, 2014. [34] Srikumar, V., Kundu, G., and Roth, D. On amortizing inference cost for structured prediction. In EMNLPCoNLL ’12, pp. 1114–1124, Stroudsburg, PA, USA, 2012. Association for Computational Linguistics. [35] Tang, Y., Salakhutdinov, R., and Hinton, G. Robust boltzmann machines for recognition and denoising. In Computer Vision and Pattern Recognition (CVPR), 2012 IEEE Conference on, pp. 2264–2271. IEEE, 2012. [36] Team, The Theano Development. Theano: A Python framework for fast computation of mathematical expressions. arXiv:1605.02688 [cs], May 2016. [37] Vincent, P., Larochelle, H., Bengio, Y., and Manzagol, P. A. Extracting and composing robust features with denoising autoencoders. In ICML, pp. 1096–1103. ACM, 2008. [38] Vinh, N. X., Epps, J., and Bailey, J. Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance. JMLR, 11:2837–2854, 2010. [39] von der Malsburg, C. Binding in models of perception and brain function. Current opinion in neurobiology, 5(4):520–526, 1995. 13 [40] von der Malsburg, Christoph. The Correlation Theory of Brain Function. Departmental technical report, MPI, 1981. [41] Wersing, H., Steil, J. J., and Ritter, H. A competitive-layer model for feature binding and sensory segmentation. Neural Computation, 13(2):357–387, 2001. [42] Xu, K., Ba, J., Kiros, R., Courville, A., Salakhutdinov, R., Zemel, R., and Bengio, Y. Show, attend and tell: Neural image caption generation with visual attention. arXiv preprint arXiv:1502.03044, 2015. [43] Yli-Krekola, A., Särelä, J., and Valpola, H. Selective attention improves learning. In Artificial Neural Networks–ICANN 2009, pp. 285–294. Springer, 2009. 14 A Supplementary Material A.1 Notation Symbol Space N K H i j k N N N N {1, . . . , N } {1, . . . , K} x x̃ zk mk δzk L(mk ) C(x) RN RN RN RN RN RN R v Wh Wu Θ R RH×4N R2N ×H f () g() softmax() Gj gk,j g p(x | x̃) q(x) q(xj | gk,j ) A.2 Description input dimensionality total number of groups input and output dimension of the parametric mapping iteration index input element index group index input vector with elements xj corrupted input the predicted mean of input for group k probabilities for each input to be assigned to group k modeling error for group k group assignment likelihood ratio the training loss for input x variance of the input estimate. Only used in the continuous case Projection weights from tagger inputs to ladder inputs h Projection weights from ladder output to z and m Contains all parameters of the ladder rectified linear activation function logistic sigmoid activation function elementwise softmax over the groups Latent random variable that encodes which group xj belongs to. Shorthand for Gj = k. Mostly used for p(gk,j ) = p(Gj = k). a vector of all gj . posterior of the data given the corrupted data learnt approximation of p(x | x̃) Shorthand for q(xj | Gj = k) Input In its basic form (without supervision) Tagger receives as input only a datapoint x. It corresponds to either a binary vector or a real-valued vector and is then corrupted with either bitflip or Gaussian noise. The training objective is the removal of this noise. Bitflip Noise In the case of binary inputs we use bitflip noise for corruption: x̃ = x ⊕ B(β), where ⊕ denotes componentwise XOR, and B(β) is Bernoulli distributed noise with probability β. In our experiments on the Shapes dataset we use β = 0.2. Gaussian Noise If the inputs are real-valued, we corrupt it using Gaussian noise: x̃ = x + N (0, σ 2 ), where σ is the standard deviation of the input noise. We used σinput = 0.2. 15 δz0 z δz1 z L(m0) m1 L(m1) m2 1 q1(x) 2 δz2 L(m2) q2 (x) z m3 δz i-1 zi L(mi-1) 3 m i-1 z m0 0 mi z i-1 PARAM ETRIC MAPPIN G PARAMETRIC MAPPING PARAM ETRIC MAPPIN G PARAM ETRIC MAPPIN G q3 (x) x̃ q1 (x|g) x x iteration 1 iteration 2 q1(x) x̃ iteration 3 Figure 6: Illustration of the TAG framework used for training. Left: The system learns by denoising its input over iterations using several groups to distribute the representation. Each group, represented by several panels of the same color, maintains its own estimate of reconstructions z i of the input, and corresponding masks mi , which encode the parts of the input that this group is responsible for representing. These estimates are updated over iterations by the same network, that is, each group and iteration share the weights of the network and only the inputs to the network differ. In the case of images, z contains pixel-values. Right: In each iteration z i−1 and mi−1 from the previous iteration, are used to compute a likelihood term L(mi−1 ) and modeling error δz i−1 . These four quantities are fed to the parametric mapping to produce z i and mi for the next iteration. During learning, all inputs to the network are derived from the corrupted input as shown here. The unsupervised task for the network is to learn to denoise, i.e. output an estimate q(x) of the original clean input. A.3 Group Assignments Within the TAG framework the group assignment is represented by the K vectors mk which contain one entry for each input element or pixel. These entries mk,j = q(gk,j ) of mk represent the discreet probability distribution over K groups for each input xj . They therefore sum up to one: K X mk,j = 1 for all j = 1 . . . N (7) k=1 Initialization Similar to expectation maximization, the group assignment is initialized randomly, but such that Equation 7 holds. So we first sample an auxiliary m0k,j from a standard Gaussian distribution and then normalize it using a softmax: m0k,j ∼ N (0, 1) e mk,j = PK (8) m0k,j h=1 0 emh,j (9) (10) A.4 Predicted Inputs Tagger maintains an input reconstruction zk for each group k. Binary Case In the binary case we use a sigmoid activation function on zk and interpret it directly as the probability sigmoid(zk ) = q(x = 1|gk ). 16 (11) We can use it to compute z̃k = q(x̃|gk ) which will be used for the modeling error (Section A.5) and the group likelihood: X q(x̃ = 1|gk ) = q(x̃|x, gk )q(x|gk ) (12) x = X q(x̃|x)q(x|gk ) (13) (x(1 − β) + (1 − x)β) q(x|gk ) (14) (x(1 − 2β) + β) zk (15) = β(1 − zk ) + (1 − β)zk = zk (1 − 2β) + β (16) (17) z̃k = x̃(zk (1 − 2β) + β) + (1 − x̃)(1 − zk (1 − 2β) − β) (18) x = X x = X x Therefore we have: Continuous Case For the continuous case we interpret zk as the means of an isotropic Gaussian with learned variance v: (x−zk )2 1 e 2v q(x|gk ) = N (x; zk , vI) = √ (19) 2πv Using the additivity of Gaussian distributions we directly get: z̃k = q(x̃|gk ) = N (x̃; zk , (v + σ 2 )I) (20) Initialization For simplicity we initialize all zk to the expectation of the data for all k. In our experiments these values are 0.5 for the TextureMNIST datasets and 0.26 for the Shapes dataset. A.5 Modeling Error As explained in Section 2.1, δz carries information about the remaining modeling error. During training as a denoiser, we can only allow information about the corrupted x̃ as inputs but not about the original clean x. Therefore, we use the derivative of the cost on the corrupted input as helpful information for the parametric mapping. Since we work with the input elements individually we skip the index j in the following: δz k ∝ −∂C(x̃)/∂zk . (21) More precisely for a single iteration (omitting the index i) we have:: ∂C(x̃) δzk = − (22) ∂zk ! X ∂ = log q(x̃|gh )q(gh ) (23) ∂zk h P ∂ h q(x̃|zh )q(gh ) 1 =P (24) ∂zk h q(x̃|zh )q(gh ) 1 ∂ z̃k =P mk (25) z̃ m h h h ∂zk (26) Continuous Case For the continuous case this gives us: 1 ∂ z̃k δzk = P mk (27) z̃ m h h h ∂zk 1 x̃ − zk =P z̃ m (28) 2+v k k z̃ m σ h h h ∝ (x̃ − zk )mk z̃k (29) Note that since the network will multiply its inputs with weights, we can always omit any constant multipliers. 17 Binary Case Let us denote the corruption bit-flip probability by β and define ξk := q(x̃ = 1|gk ) = (1 − 2β)zg + β . Then we get: z̃k = x̃ξk + (1 − x̃)(1 − ξk ) and thus: ∂ z̃k 1 mk h z̃h mh ∂zk (x̃(1 − 2β) − (1 − x̃)(1 − 2β))mk = P h (x̃ξh + (1 − x̃)(1 − ξh ))mh δzk = P (30) (31) which simplifies for x̃ = 1 as mk (1 − 2β)mk ≈ −P = P h ξh mh h ξh mh and for x̃ = 0 as = (1 − 2β)mk m mk P Pk ≈ =P 1 − h ξh mh 1 − h ξh mh h ξh m h − 1 Putting it back together: mk h ξh mh − 1 + x̃ δzk = P A.6 Ladder Modifications We mostly used the specifications of the Ladder network as described by Rasmus et al. [22], but there are some minor modifications we made to fit it to the TAG framework. We found that the model becomes more stable during iterations when we added a sigmoid function to the gating variable v [22, Equation 2] used in all the decoder layers with continuous outputs. None of the noise sources or denoising costs were in use (i.e., λl = 0 for all l in Eq. 3 of Ref. [22]), but Ladder’s classification cost (Cc in Ref. [22]) was added to the Tagger’s cost for the semi-supervised tasks. All four inputs (zki , mik , δzki , and L(mik )) were concatenated and projected to a hidden representation that served as the input layer of the Ladder Network. Subsequently, the values for the next iteration were simply read from the reconstruction (x̂ in Ref. [22]) and projected linearly into zki+1 and via softmax to mi+1 to enforce the conditions in Equation 7. For the binary case, we used a logistic k sigmoid activation for zki+1 . 18 A.7 Pseudocode In this section we put it all together and provide the pseudocode for running Tagger both on binary (Algorithm 3) and real-valued inputs (Algorithm 2). The provided code shows the steps needed to run for T iterations on a single example x using G groups. Here we use three activation functions: f (x) = max(x, 0) is the rectified linear function, g(x) = 1+e1−x is the logistic sigmoid, and softmax(x)g = xg PGe xh is a softmax operation over the groups. All three include a batch-normalization operation, h=1 e which we omitted for clarity. Only the forward pass for a single example is shown, but derivatives of the cost C wrt. parameters v, Wh , Wu and Θ are computed using regular backpropagation through time. For training we use ADAM with a batch-size of 100. Data: x, K, T, σ, v, Wh , Wu Θ Result: z T , mT , C begin Initialization: x̃ ← x + N (0, σ 2 I); m0 ← softmax(N (0, I)); z 0 ← E[x]; end for i = 0 . . . T − 1 do for k = 1 . . . K do z̃k ← N (x̃; zki , (v + σ 2 )I); δzki ← (x̃ − zki )mik z̃k ; L(mik ) ← Pz̃kz̃h ; h  hk ← f (Wh zki , mik , δzki , L(mik ) ); [zki+1 , mi+1 k ] ← Wu Ladder(hk , Θ); end mi+1 ← softmax(mi+1 ); PK qi+1 (x) ← k=1 N (x; zki+1 , vI)mi+1 ; end PT C ← − i=1 log qi (x); Algorithm 2: Pseudocode for running Tagger on a single real-valued example x. Data: x, K, T, β, Wh , Wu , Θ Result: z T , mT , C begin Initialization: x̃ ← x ⊕ B(β); m0 ← softmax(N (0, I)); z 0 ← E[x]; end for i = 0 . . . T − 1 do for k = 1 . . . K do ξk ← z i (1 − 2β) + β; mik ; ξh mih −1+x̃ x̃ξ +(1−x̃)(1−ξ k k) i L(m ) ← P x̃ξh +(1−x̃)(1−ξ ; h) h i  i i hk ← f (Wh zk , mk , δzk , L(mik ) ); [zki+1 , mi+1 k ] ← Wu Ladder(hk , Θ); δzki ← P h end mi+1 ← softmax(mi+1 ); PK qi+1 (x) ← k=1 N (x; zki+1 , vI)mi+1 ; end PT C ← − i=1 log qi (x); Algorithm 3: Pseudocode for running Tagger on a single binary example x. 19
9cs.NE
JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 1, ISSUE 1, MAY 2010 72 An approach to find dynamic slice for C++ Program Santosh Kumar Pani and Priya Arundhati Abstract—Object-oriented programming has been considered a most promising method in program development and maintenance. An important feature of object-oriented programs (OOPs) is their reusability which can be achieved through the inheritance of classes or reusable components.Dynamic program slicing is an effective technique for narrowing the errors to the relevant parts of a program when debugging. Given a slicing criterion, the dynamic slice contains only those statements that actually affect the variables in the slicing criterion. This paper proposes a method to dynamically slice object-oriented (00) programs based on dependence analysis. It uses the Control Dependency Graph for object program and other static information to reduce the information to be traced during program execution. In this paper we present a method to find the dynamic Slice of object oriented programs where we are finding the slices for object and in case of function overloading. Index Terms— Program Slicing, Dynamic Slicing, Control dependency Graph. ——————————  —————————— 1 INTRODUCTION Program slicing is an effective technique for narrowing the focus of attention to the relevant parts of a program. The slice of a program consists of those statements and predicates that may directly or indirectly affect the variables computed at a given program point [1]. The program point s and the variable set V, denoted by <s, V>, is called a slicing criterion. The basic idea of program slicing is to remove irrelevant statements from source codes while preserving the semantics of the program such that at the specified point the variable produces the same value as its original program. Program slicing has been widely used in many software activities, such as software analyzing, understanding, debugging, testing, maintenance, and so on [2, 3, 4]. Slicing algorithm can be classed according to whether they only use static information (static slicing) or dynamic execution information for a specific program input (dynamic slicing). This paper focuses on the dynamic slicing methods for finding the slices for class,object and in case of function overloading. 2 REVIEW OF RELATED WORKS Agrawal proposes a dynamic slicing method by marking nodes or edges on a static program dependence graph during execution [5]. The result is not precise, because some dependencies might not hold in dynamic execution. Agrawal also proposes a precise method based on the dynamic dependence graph (DDG) [5], and Zhao applies it to slice object-oriented programs [6]. The shortcoming is that the size of the DDG is unbound. Korel [8], Song [7] and Tibor [9] propose forward dynamic slicing methods and Song also proposes method to slice OOPs using dynamic object relationship diagram (DORD). In these methods, they compute the dynamic slices for each statement immediately after this statement is executed. After the last statement is executed, the dynamic slices of all statements executed have been obtained. However, only some special statements in loops need to compute dynamic slices. In this paper we represent the object oriented program in control dependence Graph (CDG). 3 BASIC CONCEPT & DEFINITION Slicing object oriented program is quite difficult as it comprises of many features like Class, Object, Polymorphism, inheritance etc. In this paper we are trying to finding the slices for object and in case of function overloading. In object oriented programming language it is possible to define more then one function that share a common name this feature is called function overloading.Hence our aim is to find the Slice where the function is overloaded.In that case the Slicer should know that which version of the function to call.For this,the Slicer uses the following information about the function Call. 1. The type of the argument. 2. The no.of argument. 3. The name of the function. After getting these information from the calling node the unquiue function will be called and the slice of the function will be found out in normal method. The following Data Structures are used for this purpose. ———————————————— Santosh Kumar Pani is with the School of Computer Engineering, KIIT University, Bhubaneswar. Priya Arundhati is with the Department of CSE, Nalanda Institute of Technology, Bhubaneswar. 1. Control Dependence Graph: The control depen- dence graph (CDG) G of an object oriented program P is a graph G=(N,E),where each node nεN represents a statement of the program P. For any © 2010 JCSE http://sites.google.com/site/jcseuk/ 73 2. 3. 4. 5. 6. 7. pair of nodes x and y,(x,y)εE if node x is control dependent on node y. Def(dvar) : If dvar is a variable in a program P.A node u of CDG Gp is said to be a Def(dvar) node if u is definition statement that defines the variable dvar. Use(dvar) : If dvar is a variable in a program P.A node u of CDG Gp is said to be a Use(dvar) node if he statement u uses the value of the variable dvar. Defvarset(u):Let u be a node in the CFG Gp of a program P.The set DefVarSet(u)={dvar:dvar is a data variable in the program P,and u is a Def(dvar) node Usevarset(u):Let u be a node in the CFG Gp of program P. The set UseVarSet(u)={dvar:dvar is a data variable in the program P,and u is a Use(dvar) node}. ActiveControlSlice(s): Let s be a test node(predicate statement) in, the CDG Gp of a program P and UseVarSet(s)={var1,var2,…..vark}. Before execution of the program P, ActiveControlSlice(s) = Ø.After each execution of the node s in the actual run of the program, ActiveControlSlice(s)={s}UActiveDataSlice(var1)…UActiveDat aSlice(vark) U ActiveControlSlice(t), where t is most recently executed successor node of s in Gp.If s is a loop control node and the present execution of the node s corresponds to exit from loop,then ActiveControlSlice(s)= Ø ActiveDataSlice(var):Let dvar be a data variable in the object oriented program P. Before execution of the program P ,ActiveDataSlice(obj.var)=Ø.Let u be a Def(obj.var) node, and UseVarSet(u)={var1,var2,..vark).After each execution of the node u in the actual run of the program, ActiveDataSlice(obj.var)={s}U ActiveDataSlice(var1) U………UActiveDataSlice(dvark) U ActiveControlSlice(t), where t is most recently executed successor node of s in Gp. /*For each data member of an object a separate slice will be mainted in a shared memory which is only accessable to the member function called on that object.*/ 8. DyanSlice(obj):-Let obj be an object of the class in the proram P. Before execution of program P, DyanSlice(obj)=ф. Let the object contains the data member mem1.mem2,…memn then DyanSlice(obj)=DyanSlice(obj.mem1) U DyanSlice(obj.mem2)U…..U DyanSlice(obj.memn) 9. DyanSlice(s,var):-Let s be a node of the CDG of a program P,& var be a variable in the set i.e. var(DefVarSet(s) U UseVarSet(s) Before executionof the program P DyanSlice(s,var)=фAfter each ex- ecution of the node s in an actual run DyanSlice(s,var)=Active Data Slice(var) U Active Control Slice(t) 10. Active Call Slice:-Let Gp represents the CDG of the multiprocedure program P. Before execution of the program P Active Call Slice=ф. Let Uactive be an active Call node then Active Call Slice={Uactive} U Active Call Slice U Active Control Slice(t). 11. Call Slice Stack:-This stack is maintained to keep track of the Active Call slice during the actual run of the program. 12. Formal(x,var),Actual(x,var)): Let p1 be a procedure of a program p having multiple procedures, and x be a calling node to the procedures, and x be a calling node to the procedure p1.Let f be a formal parameter of procedure P1 and its corresponding actual parameter at the calling node to the procedure P1 and its corresponding actual parameter at the calling node x be a. We define Formal(x,a)=f and Actual(x,f)=a. 4 AN ALGORITHM FOR FINDING DYNAMIC SLICE FOR OBJECT ORIENTED PROGRAMS IN CASE OF FUNCTION OVERLOADING. Step 1: Start Step2: At first Control Dependence Graph G of object oriented program P is statically constructed . Step 3: Before each execution of the program do step 4 to step 7. Step 4: For each node u of G do step 5 to step 6. Step 5 : If u is a test node, then ActiveControlSlice(u) = Ø. Step 6: For each variable var εDefVarSet(u) U UseVarSet(u) do DyanSlice(u,var) = Ø. Step 7: CallSliceStack=NULL. ActiveCallSlice= Ø. Step 7a. For each data variable dvar of the program do ActiveDataSlice(var)= Ø. Step 7b. If var is a data member of an corresponding class of an object to then do ActiveDataSlice(obj.var) = Ø for each member declared with in the class of an object Step 8: Run the program P with the given set of input values and repeat steps 9 to 19 until the program terminates. Step 9: Before execution of each call node u do step 10 and step 11 Step 10a. Let u be a call node to a procedure Q, update CallSliceStack and ActiveCallSlice. //In case of function having same name the signature of the function is foundout as each function have unquiue signature ,hence the slicer will know that which version of the function to call.// Step 10b. For each actual parameter var in the procedure 74 call Q do ActiveDataSlice (Formal(u,var)) = ActiveDataSlice(var) U ActiveCallSlice. //Here when a member finction of an class is called with an object then the actual parameter of the function is individually copied to the formal parameter of the member function.// Step 11:Update ActiveReturnSlice before execution of the return node. Step 12: After execution of each node u of the program P do step 13 to step 18. Step 13:If u is a Def(var) node and not a call node then Update ActiveDataSlice(var). //var can be a data variable or data member of an object then Update ActiveDataSlice(var) will be done accordingly // Step 14: If u is a call node to a procedure Q then for every formal reference parameter var in the procedure Q do ActiveDataSlice(Actual(u,var))= ActiveDataSlice(var). Step 15: If u is a Def(var) node then ActiveDataSlice(var)=ActiveReturnSlice. Step16a. For every variable var if declared as automatic local in the procedure Q do ActiveDataSlice= Ø. //For local static variable and global variable the ActiveDataSlice remains unchanged Step16b. Update CallSliceStack and ActiveCallSlice and Set ActiveReturnSlice= Ø . Step 17: For every variable var ε DefVarSet(u) U UseVarSet(u) Update DyanSlice(u,var). Step 18: If u is a test node, then update ActivecontrolSlice(u). Step 19:Exit 22.b=tp1.b+tp2.b; } test add(test tp3,int s) { 23.a=tp3.a +s; 24.b=tp3.b +s; } }; void main() { test T1,T2,T3,T4; int p,q; 1.Cout<<”Enter the value of p”; 2.Cin>>p; 3.Cout<<”Enter the value of q”; 4.Cin>>q; 5.T1.get(p,q); 6.T1.display(); 7.Cout<<”Enter the value of p”; 8.Cin>>p; 9.Cout<<”Enter the value of q”; 10.Cin>>q; 11.T2.get(p,q) 12.T2.display() 13.T3.add(t1,t2); 14.T3.display(); 15.T4.add(T3,5); 16.T4.display(); } Control Dependency Graph 5 SAMPLE PROGRAM AND WORKING OF THE ALGORITHM Sample Program The following object oriented Program where only the concept of class and object are used is discussed to iilustrate our proposed Algorithm. Class test { int a; int b; public: void get(int x,int y) { 17.a=x; 18.b=y; } Void display() { 19.Cout<<a; 20.Cout<<b; } Test add (test tp1,test tp2) { 21.a=tp1.a+tp2.a; Working of the Algorithm After Execution of node-2 ADS(p)={2} DyanSlice(2,p)={2} After Execution of node-4 ADS(q)={4} 75 DyanSlice(4,q)={4} After Execution of node-5 Here one of the object of test class is T1.get() is a member function of the test class.The formal parameter of get() is x & y as well as these are the local variable to get().The actual parameter is p & q. So,ADS(x)=ADS(p) U Active Call Slice ={2} U {5}={2,5} ADS(y)=ADS(q) U Active Call Slice ={4} U{5}={4,5} Again T1 is calling the get() so here a & b are T1’s variable ADS(T1.a)=ADS(x)U{15}={2,5} U{15}={2,5,17} DyanSlice(15,T1.a)={2,5,17} ADS(T1.b)=ADS(y)U{16}={4,5,18} DyanSlice(16,T1.b)={4,5,18} After Execution of node-6 Now T1 is calling display() So,DyanSlice(17,T1.a)=ADS(T1.a)={2,5,17} DyanSlice(18,T1.b)=ADS(T1.b)={4,5,18} DyanSlice(T1)=DyanSlice(T1.a) U DyanSlice(T1.b) ={2,5,17} U {4,5,18} ={2,4,5,17,18} After Execution of node-8 ADS(p)={8} DyanSlice(8,p)={8} After Execution of node-10 ADS(q)={10} DyanSlice(10,q)={10} After Execution of node-11 ADS(x)=ADS(p) U Active Call Slice ={8} U{11}={8,11} ADS(y)=ADS(q) U Active Call Slice ={10}U{11}={10,11} ADS(T2.a)=ADS(x) U 17 ={8,11,17} DyanSlice(17,T2.a)={8,11,17} ADS(T2.b)=ADS(y) U 18 ={10,11} U 18={10,11,18} After Execution of node-12 DyanSlice(19,T2.a)=ADS(T2.a)={8,11,17} DyanSlice(20,T2.b)=ADS(T2.b)={10,11,18} DyanSlice(T2)=DyanSlice(T2.a) U DyanSlice(T2.b) ={8,11,17} U {10,11,118} ={8,10,11,17,18} After Execution of node-13 Here T3 is calling the add() where the formal parameter are tp1 & tp2 but here the object T1 & T2 are passed as the actual parameter.and there are two version of add()function.Now the Slicer will decide which function to call by checking the signature of the function.when this node will be executed the control will go to the first add()function where the argument are the objects. So,ADS(tp1.a)=ADS(T1.a) U Active Call Slice ={2,,5,17} U {13} ={2,5,17,13} ADS(tp1.b)= ADS(T1.b) U Active Call Slice ={4,5,18} U 13 ={4,5,18,13} ADS(tp1)=ADS(tp1.a) U ADS(tp1.b)={ 2,5,17,13} {4,5,18,13}={ 2,5,17,13,4,5,18,13} ADS(tp2.a)=ADS(T2.a) U Active Call Slice ={8,11,17} U {13} ={8,11,17,13} ADS(tp2.b)= ADS(T2.b) U Active Call Slice ={10,11,18} U 13 ={10,11,18,13} ADS(tp2)=ADS(tp2.a) U ADS(tp2.b)={ 8,11,17,13} {10,11,18,13}={ 8,10,11,13,17,18} ADS(T3.a)=ADS(tp1.a) U ADS(tp2.a) U {21} ={2,,5,13,17} U {8,11,17,13} U{21} ={2,5,8,11,13,17,21} ADS(T3.b)= ADS(tp1.b) U ADS(tp2.b) U{20} ={4,5,13,18} U {10,11,13,18} U{22} ={4,5,10,11,13,18,22,} DyanSlice(13,T3.a)=ADS(T3.a)={2,5,8,11,13,17,21,} DyanSlice(13,T3.b)=ADS(T3.b)={4,5,10,11,13,18,22} After Execution of node-14 DyanSlice(19,T3.a)=ADS(T3.a)={ 2,5,8,11,13,17,21} DyanSlice(18,T3.b)=ADS(T3.b)={ 4,5,10,11,13,18,22} DyanSlice(T3)=DS(T3.a) U DS(T3.b) = {2,5,8,11,13,17,21} {4,5,10,11,13,18,22}={2,4,5,8,10,11,13,17,18,21,22} After Execution of node-15 ADS(tp3.a)=ADS(T3.a) U Active Call Slice ={2,5,8,11,13,17,21} U 15 ={2,5,8,11,13,15,17,21} ADS(tp3.b)=ADS(T3.b) U Active Call Slice ={4,5,10,11,13,18,22,} U15 ={4,5,10,11,13,15,18,22,} ADS(T4.a)=ADS(tp3.a) U Active Call Slice ={2,5,8,11,13,15,17,21} U{23} ={2,5,8,11,13,15,17,21,23} ADS(T4.b)=ADS(tp3.b) U Active Call Slice ={4,5,10,11,13,15,18,22,} U {24} ={4,5,10,11,13,15,18,22,24} After Execution of node-16 DyanSlice(16,T4.a)=ADS(T4.a) ={2,5,8,11,13,15,17,21,23} DyanSlice(16,T4.b)=ADS(T4.b) ={4,5,10,11,13,15,18,22,24} DyanSlice(T4)= DyanSlice(T4.a) U DyanSlice(T4.b) ={2,5,8,11,13,15,17,21,23} {4,5,10,11,13,15,18,22,24} ={2,4,5,8,10,11,13,17,18,21,22,15,23,24} 6 U U U U ANALYSIS OF THE ALGORITHM The improved InterSlice Algorithm also uses a collection of control dependence graphs as the intermediate program representation & computes precise dynamic slice. The space complexity of the improved Interslice algorithm is also O(n2)The time complexity of this algorithm is linear as no extra data structures are required for this enhancement .This algorithm does not require to store the past execution histo- 76 ry. 7 CONCLUSION In this paper of the dynamic Slicing of Object Oriented Programs is discussed. The Object Oriented Programs has various features like Class, Object, Dynamic Binding, Polymorphism, Inheritance etc. In this proposed Algorithm only the Class, Object and function overloading are discussed. Finding the Slices for Inheritance, Dynamic binding and other features are the future work of this Research REFERENCES [1] M. Weiser, Program Slicing, IEEE Trans. Software Engineering, 1984, 16(5): 498-509. [2] H. Agrawal, et al. Debugging with Dynamic Slicing and Backtracking. Software – Practice and Experience, 1993, 23(6): 589616 [3] B. Korel. Application of Dynamic Slicing in Program Debugging. Third International Workshop on Automated Debugging, 1997: 59-74 [4] F. Tip. A Survey of Program Slicing Techniques, J. Programming Languages, 1995, 3(3): 121-189 [5] H. Agrawal, J. Horgan. Dynamic Program Slicing. Proceedings of the ACM SIGPLAN’90 Conference on Programming Language Design and Implementation, 1990: 246-256 [6] J. Zhao, Dynamic Slicing of Object-Oriented Programs. Technical-Report SE-98-119, Information Processing Society of Japan, May 1998: 17-23 [7] Y. Song, D. Huynh, Forward Dynamic Object-Oriented Program Slicing, Application-Specific Systems and Software Engineering and Technology (ASSET '99), IEEE CS Press, 1999: 230 – 237 [8] B. Korel, S. Yalamanchili. Forward Derivation of Dynamic Slices. Proceedings of the International Symposium on Software Testing and Analysis, 1994, pp. 66-79. [9] G, Tibor, et al. An Efficient Relevant Slicing Method for Debugging, Software Engineering Notes, Software Engineering ― ― ESEC/FSE’99 Springer ACM SIGSFT, 1999: 303-321 [10] G.B. Mund, R. Mall, S. Sarkar,2002a. An efficient dynamic program slicing technique. Information and Software Technology 44(2),123-132.
6cs.PL
Noname manuscript No. (will be inserted by the editor) Estimating Distances via Received Signal Strength and Connectivity in Wireless Sensor Networks arXiv:1801.09350v1 [eess.SP] 29 Jan 2018 Qing Miao, Baoqi Huang∗ and Bing Jia Received: date / Accepted: date Abstract Distance estimation is vital for localization and many other applications in wireless sensor networks (WSNs). Particularly, it is desirable to implement distance estimation as well as localization without using specific hardware in low-cost WSNs. As such, both the received signal strength (RSS) based approach and the connectivity based approach have gained much attention. The RSS based approach is suitable for estimating short distances, whereas the connectivity based approach obtains relatively good performance for estimating long distances. Considering the complementary features of these two approaches, we propose a fusion method based on the maximum-likelihood estimator (MLE) to estimate the distance between any pair of neighboring nodes in a WSN through efficiently fusing the information from the RSS and local connectivity. Additionally, the method is reported under the practical log-normal shadowing model, and the associated Cramer-Rao lower bound (CRLB) is also derived for performance analysis. Both simulations and experiments based on practical measurements are carried out, and demonstrate that the proposed method outperforms any single approach and approaches to the CRLB as well. Keywords Distance Estimation, Maximum-Likelihood Estimator, Error Distributions, Cramer-Rao lower bound 1 INTRODUCTION Wireless sensor networks (WSNs), composed of hundreds or thousands of small and inexpensive nodes with constrained computing power, limited memories, and short battery lifetime, can be used to monitor and collect data in a region of interests. Accurate and low-cost node localization is imInner Mongolia University, Hohhot, 010021, China, E-mail: [email protected], [email protected] [email protected] and ji- portant for various applications in WSNs, and thus, great efforts have been devoted to developing various localization algorithms, categorized into distance based algorithms and connectivity-based algorithms [1]. The distance-based localization algorithms rely on distance estimates and are able to achieve relatively good localization accuracy, whereas the connectivity-based localization algorithms generally achieve coarse-grained localization accuracy since only local connectivity information (the numbers of the common and noncommon one-hop neighbors) is employed for distance estimation. Besides, distance estimation is also useful for sensor network management, such as topology control [2,3] and boundary detection [4, 5]. In reality, distance estimation can be realized by using information such as RSS, time of arrival (TOA) and time difference of arrival (TDOA) [1]. The RSS approach (using RSS measurements) does not require any dedicated hardware, but is able to provide coarse-grained distance estimates; in contrast, the TOA and TDOA methods can provide distance estimates with high accuracy at the cost of extra hardware, but it is unaffordable to equip each sensor with a dedicated measurement device in a large-scale WSN due to the costs in both hardware and energy. Therefore, it is of great importance to enhance the accuracy of low-cost distance measurement approaches, and many efforts have been imposed in the literature. Due to its intrinsic simplicity and independence of dedicated hardware, the RSS-based distance methods have gained much attraction [6–9]. But, both simulations and theoretical analysis indicate that the performance of the RSS-based methods is relatively poor, and degrades with the increasing actual distances [6, 7, 10]. Hence, it is necessary to advance the RSS-based methods by adopting various techniques [11, 12]. Apart from RSS measurements, local connectivity information of each node is also independent of extra device, and can be employed to estimate distances from itself to other 2 neighboring nodes [10, 13, 14]. However, Unlike the RSSbased methods that return ideal estimates for short distances, the connectivity-based methods obtain relatively good performance for estimating long distances. Therefore, the complementary features of these two types of distance estimation methods motivate us to design a fusion method which is able to sufficiently exploit the advantages of both types of methods. In this paper, the maximum-likelihood estimator (MLE) is utilized to efficiently fuse the information from the RSS measurement and local connectivity, so as to provide good performance regardless the actual sizes of distances to be estimated. The strengths of the proposed fusion method lie in the following aspects. Firstly, it is well known that the MLE is asymptotically optimal, indicating that the proposed method is able to obtain superior performance. Secondly, the practical log-normal (shadowing) model is adopted to characterize the probabilistic distributions of the errors respectively induced by the RSS-based method and the connectivitybased method, so as to ensure the applicability of the proposed method. Thirdly, the Cramer-Rao lower bound (CRLB) associated with the proposed method is also formulated and can be used to evaluate the optimality of the proposed method. Finally, both experiments based on measurements in a real environment and simulations are carried out to thoroughly validate the effectiveness of the proposed method. However, even if the proposed method outperforms the other two available methods and approaches to the CRLB in most time, it still suffers from a few limitations: it is computationally expensive due to the complicated cost function involved; as the connectivity-based method, the performance also relies on the sensor density. This study not only contributes to improving sensor localization in low-cost WSNs, but also paves the way for advancing many other researches and applications relying on inter-node distances. The remainder of the paper is organized as follows. Section 2 briefly reviews related works in the literature. Section 3 introduces the WSN model and both the RSS-based and connectivity-based distance estimation methods. Section 4 presents the models of both the RSS-based and connectivitybased methods, and proposes the fusion method based on the MLE and formulates the corresponding CRLB. Section 5 reports the performance of the proposed method through both simulations and experiments. Finally, section 6 concludes the paper and sheds lights on future works. Qing Miao, Baoqi Huang∗ and Bing Jia ceiver as long as after the model depicting the relationship between power losses and distances is available. In [6], an estimator was designed based on the MLE and the log-normal model, but the theoretical analysis indicated that the estimator is inefficient in the sense that the error variance increases exponentially with powers. However, the practice in [7, 9] reveal that the RSS-based distance estimation is unreliable. Additionally, the distance estimation is even complicated in indoor environments since the factors, like furniture, hand grip and human bodies, affect the distance estimation [8]. Hence, in [11] a dynamic calibration method was proposed to update the log-normal model parameters which fluctuate with environmental changes, and in [12], an averaging method based on multichannel RSS measurements was presented to mitigate the variability of RSS measurements. Therefore, it can be concluded that it is still challenging to apply the RSS-based methods. The connectivity-based methods infer distances from local connectivity information among different nodes in WSNs [10, 15, 16]. The neighborhood intersection distance estimation scheme (NIDES) presented in [15] heuristically relates the distance, e.g. from node A to node B, to an easily observed ratio, i.e. the number of their common immediate neighbors to the number of immediate neighbors of A, and then performs distance estimation at node A according to this ratio and other a priori known information. NIDES assumes a unit disk model, namely that the communication coverage of each node is a perfect disk, and all nodes are uniformly and randomly deployed in the WSN. Its enhanced version presented in [16] adapted the ratio by taking into account the number of immediate neighbors of node B, and heuristically stated that NIDES could be applied under arbitrary communication models. In [10], a novel method is presented based on the MLE under a generic channel model, including the unit disk model and the more realistic lognormal model, and its error characteristics were analyzed in light of the CRLB. However, the performance of the connectivitybased method obtains obvious errors when estimating short distances. In summary, both of the above methods are restricted in practical applications, but fortunately, are complementary to each other, which motivates us to combine them to obtain better performance. As such, this paper presents a fusion method to estimate distances by making use of RSS measurements and local connectivity under the practical lognormal model. 2 RELATED WORKS 3 PRELIMINARIES In this section, we shall briefly review the studies on distance estimation in low-cost WSNs, which can be categorized into RSS-based methods and connectivity-based methods. The RSS-based methods infer distances from power losses incurred by signals travelling between transmitter and re- This section first briefly introduces the static WSN model which is considered in this paper, and then elaborates the RSS-based and connectivity-based methods, respectively. Throughout this paper, we shall use the following mathematical no- Estimating Distances via Received Signal Strength and Connectivity in Wireless Sensor Networks 3 tation: p(·) denotes the probability density function of an event, and E(·) denotes the statistical expectation. 3.1 The WSN Model In a static WSN, nodes are often assumed to be randomly and uniformly distributed on account of the random nature of network deployment, e.g. nodes being dropped from a flying plane. Since a homogeneous Poisson process provides an accurate model for the uniform distribution of nodes as the network size approaches infinity, we define the static WSN to be deployed over an infinite plane according to the homogeneous Poisson process of intensity λ. Fig. 1 The communication coverage of two nodes under the unit disk model. 3.2 The RSS-based Method The RSS-based method estimates the distance between any pair of nodes using the received signal power, i.e. RSS. When a signal is propagated between transmitter and receiver, the power loss or attenuation is unavoidable, and generally rises with increasing the separation between transmitter and receiver. Moreover, as is commonly made in both theoretical studies (e.g. [17–19]) and experimental studies (e.g. [20, 21]), the power loss can be formulated by using the lognormal model, namely PR (d)(dBm) = PR (d0 )(dBm) − 10α log10 d + Z, d0 (1) where PR (d)(dBm) is the received signal power at d in dBm, PR (d0 )(dBm) is the mean received signal power at a reference distance d0 in dBm, α is the path loss exponent, and Z is a random variable representing the shadowing effect, 2 normally distributed with mean zero and variance σdB . Based on the log-normal model in (1), it is straightforward to infer the distance d from the received signal power PR (d) by using any parameter estimator. For instance, dˆR is defined to be the distance estimate between two nodes via an associated RSS measurement, and can be formulated as follows (see [22] for more details) dˆR = 10 PR (d0 )(dBm)−PR (d)(dBm) 10α d0 . (2) 3.3 The Connectivity-based Method The connectivity-based method estimates the distance between any pair of neighboring nodes on the basis of their local connectivity information. In this subsection, we present this method under both the simple unit disk model and the generic channel model. Specifically, the unit disk model assumes an ideal communication coverage for each node, i.e. a perfect disk with the radius of r, whereas the generic channel model, including the log-normal model, takes into consideration the random noises (e.g. the shadowing effect) in the communication channels, so as to characterize the communication coverage in a more practical way. 3.3.1 The Unit Disk Model Case Given a static WSN, suppose two nodes A and B with coordinates (xA , yA ), (xB , yB ) and separation d (d ≤ r) and the disks with the common radius r represent their individual communication coverage under the unit disk model, as shown in Fig. 1. Because of d ≤ r, the two disks intersect and create three disjoint regions. Regarding r as constant, define S = πr2 and f (d) to be the area of the middle region in Figure 1, where r   d d2 2S − d r2 − . arccos (3) f (d) = π 2r 4 It is obvious that the nodes residing in the middle region are common immediate neighbors of A and B, the nodes residing in the left (or right) one are non-common immediate neighbors of A (or B). Define three random variables M , P , and Q to be the numbers of the three categories of neighbors; according to the assumption of the Poisson point process, they are mutually independent and Poisson with means λf (d), λ(S − f (d)) and λ(S − f (d)), as pointed out in [23]. However, the actual values of M , P , and Q can be easily obtained after A and B exchange their neighborhood information. On the basis of the observations of M , P and Q and the method of MLE, the distance estimate of d, denoted dˆc , can be summarized as follows (see [10] for details) ( f −1 (S), if M = P = Q = 0; ˆ dc = (4) −1 f (ρ̂S), otherwise 4 Qing Miao, Baoqi Huang∗ and Bing Jia 2M 2M+P +Q . where ρ̂ = 3.3.2 The Generic Channel Model Case In the generic channel model [10], the randomness on the RSS can be characterized by a function g(d), denoting the probability that a directional communication link exists from transmitter to receiver with distance d. In particular, in the log-normal model, we can have g(d) = 2 exp − 2σz2 dB ∞ Z k log √ dz 2πσdB d r (5) where k = 10α/ log 10; r denotes a pseudo transmission range which depends on the antenna gains, the wavelength of the propagating signal, the transmission power and the communication threshold for RSS. Let M , P , and Q continuously denote the numbers of common and non-common immediate neighbors associated with two nodes. we can compute their expectations as follows E(M + P ) = E(M + Q) = Z ∞Z ∞ p λ ×g( (x − xB )2 + (y − yB )2 )dxdy, −∞ (6) 4 The Proposed Fusion Method In this section, we introduce the new distance estimation method based on the aforementioned RSS-based method and connectivity-based method. To do so, it is necessary to understand the statistical distributions of the RSS-based and connectivity-based distance estimates, respectively. As such, a thorough theoretical analysis is carried out to investigate both of the distance estimation methods. After that, the MLE method can be instantly applied to estimate the distance, and particularly, the Newton-Raphson method is adopted to solve the corresponding likelihood function. Besides, the CRLB associated with the proposed fusion distance estimation method is formulated to further observe its performance. 4.1 Statistical Analysis of Distance Estimates −∞ E(M ) =λ Z ∞ −∞ Z ∞ −∞ p g( (x − xA )2 + (y − yA )2 ) (7) p × g( (x − xB )2 + (y − yB )2 )dxdy. Then, by generalizing S and f (d) to specify the expectations of M , P and Q under the generic channel model instead of the areas defined under the unit disk model, we can have the following formulas Z ∞Z ∞ p S= g( (x − xB )2 + (y − yB )2 )dxdy, (8) −∞ f (d) = However, since the closed-form formulae for f (d) and its inverse are hard or even impossible to obtain, we thus substitute its inverse by using an approximate piecewise linear function, namely that a linear regression model is established to predict d for each affine segment. Z −∞ ∞ −∞ Z ∞ −∞ p g( (x − xA )2 + (y − yA )2 ) (9) p × g( (x − xB )2 + (y − yB )2 )dxdy. Moreover, by using (5) and (9), we can derive the formula for f (d) under the log-normal model. Similar to 3.3.1, the distance estimate can be calculated based on the inverse of f (d); that is,  if M = P = Q = 0;   0, dˆc = f −1 (ρ̂S), if f (dth ) ≤ ρ̂ ≤ f (0); (10)   dth , if ρ̂S < f (dth ) where ρ̂ = 2M/(2M + P + Q), and dth denotes the longest distance between two neighboring nodes. In what follows, the RSS-based and connectivity-based distance estimation methods shall be analyzed by formulating their statistical distributions, which paves the way for clarifying the proposed distance estimation method. 4.1.1 The RSS-based Case In light of the RSS-based distance estimation method presented in Subsection 3.2, it follows from Equation (1) that d can be formulated as follows d = 10 PR (d0 )(dBm)−PR (d)(dBm) 10α Z × 10 10α . (11) By replacing the RSS-based distance estimate dˆR in (2), we can have Z d = dˆR × 10 10α . (12) Then, define ǫR to be the multiplicative error of the RSSbased distance estimate, namely dˆR = d × ǫR , (13) and Z ǫR = 10− 10α . (14) Since ǫR is dependent on the normal variable Z, their probability density functions, denoted by pǫR (·) and pZ (·) respectively, satisfy the following equation pǫR (x) = pZ (zǫR (x)) × |zǫ′ R (x)|, (15) Estimating Distances via Received Signal Strength and Connectivity in Wireless Sensor Networks where zǫR (x) = −10α × log10 x. (16) Then, we can obtain the probability density function of ǫR as follows   1 log210 x 1 exp − , (17) pǫR (x) = √ 2 2σR x ln 10 2πσR where 2 σR = 2 σdB (10α)2 . Since the relationship of ǫR and dˆR is expressed as (13) and the above method, the probability density function of the RSS-based distance estimation, denoted by pdˆR (·), satisfies the following equation ! log210 xd 1 1 exp − . (18) pdˆR (x) = √ 2 2σ x ln 10 2πσR R 4.1.2 The Connectivity-based Case In Subsection 3.3, we have introduced the connectivity-based distance estimation method and a piecewise linear function to approximate the function f (d). Similarly, we can approximate f (d) by f (d) ≈ kd + b, (19) where k and b are constant. Thus according to (10), the connectivity-based distance estimate dˆc satisfies ρ̂S = k dˆc + b, (20) where ρ̂ = 2M/(2M + P + Q) is a random variable. Then, define ǫc to be the error of the connectivity-based distance estimate, namely ǫc = dˆc − d, (21) and ǫc = 1 (ρ̂S − f (d)). k (22) Then, we are interested in the distribution of the error base on the formula of ǫc . Because of the variable M , P and Q are mutually independent Poisson random variables with means λf (d), λ(S − f (d)), λ(S − f (d)), respectively, and the additivity property of the independent Poisson random variables. The distribution of 2M +P +Q can be formulated as 2M + P + Q ∼ P (2λS). (23) In [24], it has proofed that the Poisson random variable with the mean λ larger than five can approximately equal to a normal distribution with the mean and variance are equal to λ. The Poisson random variables 2M and 2M + P + Q with means 2λf (d) and 2λS satisfy above condition, thence the 5 Poisson random variables can approximately be presented as follows 2M ∼ N (2λf (d), 2λf (d)), (24) 2M + P + Q ∼ N (2λS, 2λS). (25) Next, in order to analyse the distribution of the ρ̂ = 2M/(2M + P + Q), we consider the ratio of two independent normal random variables. In [25], it has proofed that the two independent normal variables X and Y with means and variances (µx , σx2 ) and (µy , σy2 ), respectively. The random variable Z = X/Y could be approximated to the normal distribution with the mean and variance µx , µz = µy  2  2  2 ! (26) σx σy µx 2 . + σz = µy µx µy By (24), (25) and (26), we can have the statistical distribution of ρ̂ satisfies that    f (d) f 2 (d) 1 1 ρ̂ ∼ N . (27) , + S S2 2λf (d) 2λS According to the formal in (22), we can obtain the error distribution of the connectivity-based distance estimation when S and f (d) are constant ǫc ∼ N (0, σc2 ), 2 (28)   1 1 where σc2 = f k(d) 2 2λf (d) + 2λS . Therefore, the probability density function of the error ǫc , denoted by pǫc (·), satisfies the following equation   x2 1 exp − 2 , (29) pǫc (x) = √ 2σc 2πσc and then, the probability density function, denoted by pdˆc (·), satisfies the following equation   (x − d)2 1 exp − pdˆc (x) = √ . (30) 2σc2 2πσc 4.2 The Proposed Distance Estimation Method Given the error distributions of the RSS-based and connectivitybased distance estimates, the MLE can be applied to fuse the distance estimates by the above two methods. Since the distance estimates dˆR and dˆc rely on different sources of information, we assume that dˆR and dˆc are independent from each other and express the likelihood function as follows L(d) = pdˆR (x1 ) × pdˆc (x2 ) log2 x1 (x2 − d)2 1 exp − 102 d − = 2πσR σc 2σR 2σc2 ! 1 . x1 ln 10 6 Qing Miao, Baoqi Huang∗ and Bing Jia (31) Then, the natural logarithm of the likelihood function is ln L = − ln(2πσR σc x1 ln 10) − log210 xd1 2 2σR 2 − (x2 − d) . 2σc2 (32) In order to obtain the maximum value of ln L, the NewtonRaphson method is adopted to derive the root of the first derivative of ln L, denoted by ˆ = F (d) x1 d̂ ˆ 2 − d) ˆ d(x + . 2 2 σR ln 10 σc log10 (33) ˆ be the derivative function of F (d), ˆ and To do so, let F ′ (d) the specific steps of successively finding better approximaˆ include tions to the root of the function F (d) 1. Select an initial guess d0 , where dˆ0 = (x1 + x2 )/2; 2. Calculate the values of the function F (dk ) and derivative F ′ (dk ); 3. Update dˆk+1 by using the iterative equation dˆk+1 = ˆ dˆk − FF′((ddˆk )) ; k 4. Repeat Step 2 and 3 until |dˆk+1 − dˆk | < ξ, where ξ is a sufficiently small positive number. 4.3 CRLB The CRLB expresses a lower bound on the variance of any unbiased estimator [26, 27] and is equal to the inverse of the corresponding Fisher Information Matrix (FIM). In this subsection, the CRLB regarding the proposed distance estimation problem, namely estimating the distance d from M , P , Q and the noisy RSS measurement, is formulated under the log-normal model. Specifically, with the unknown parameters d and λ, the associated FIM, denoted FIM(d, λ), is formulated as ! 1 + S−f2 (d) ) + dκ2 −f ′ (d) λf ′ (d)2 ( f (d) , FIM(d, λ) = 2S−f (d) −f ′ (d) λ (34)  2 . The detailed derivation of (34) can where κ = σdB10α ln 10 be found in Appendix A. As was proved in [10], f (d) is a first order differentiable function, such that the CRLB for d by using any unbiased estimator, denoted CRLB(d), can be formulated as follows −1  κ 2λS 2 (f ′ (d))2 + . CRLB(d) = f (d)(2S − f (d))(S − f (d)) d2 (35) With the CRLB, the comparison will be made in the experimental analyses section to verify the effectiveness of the proposed method. 5 EXPERIMENTAL ANALYSES In this section, we aim to investigate the accuracy of the proposed distance estimation method, and further analyse the influences of different factors through both simulative and practical measurements. 5.1 Simulative Analyses In the numerical simulations, the root-mean-square error (RMSE), which equals to the square root of the squared biases plus variances of the errors in distance estimates, is evaluated in Matlab to measure the accuracy of the proposed method. Moreover, the CRLB and the RMSE produced by the RSSbased method and the connectivity-based method are also calculated in the simulations. The simulative parameters in relation to the WSNs and wireless channels are described below. 1. The mean value of RSS measurements at the reference distance, i.e. PR (d0 ), is −37.47dBm; 2. The minimum acceptable RSS value is −100dBm; 3. Each WSN is deployed in a square region, the side length of which varies with different configurations of α and σdB ; 4. The sensors are deployed under the random and uniform distribution of mean λ; 5. The RMSE in each case is evaluated after simulating 10000 distance estimates; 6. µ is the expected number of immediate neighbors of a sensor, namely µ = E(M + P ) = E(M + Q), and will take different values given various configurations of σdB and α. For better presentation, the connectivity index µ will be used in the following discussions instead of the sensor density λ. To analyze the error characteristics of the proposed method, the influences of different factors, including the expected number of immediate neighbors of a sensor, the variance of shadowing effect and the path loss exponent, are investigated in what follows. Firstly, the effect of the expected number of immediate neighbors of a sensor (i.e. µ) on the RMSE is considered. Given σdB = 4 and α = 4, Fig. 2 depicts the RMSE with µ varying from 10 to 40. As can be seen, we can observe that – given two nearby sensors, the performance of the proposed method approaches to that of the RSS-based distance estimate, and is superior to that of the connectivitybased method; on the contrary, given two sensors far away from each other, the performance of the proposed method is close to that of the connectivity-based method and is much better than the RSS-based method; that is to say, the proposed method always outperforms the other two methods; Estimating Distances via Received Signal Strength and Connectivity in Wireless Sensor Networks Secondly, the influence of the noise level on the RMSE is investigated. As shown in Fig. 3, the RMSE and CRLB are plotted given µ = 20, α = 4 and σdB is number varying from 4 to 8, and it can be concluded that 14 12 Finally, the effect of the path loss exponent is studied. As illustrated in Fig. 4, the RMSE and CRLB are plotted given µ = 20, σdB = 4 and α varying from 3 to 6. It can be seen that 3 20 17 2 19 5 7 8 22 4 4 2 36 37 18 16 35 39 21 6 23 6 0 – with σdB increasing, the performance of the RSS-based methods deteriorates, which is on account of the increasing noises in RSS measurements, whereas the proposed method and the connectivity-based method incur slight changes, which is also consistent with the CRLB; – the overall performance of the proposed method is also better than the other two methods. 1 10 Y Coordinate (m) – the RMSE of the proposed method is slightly higher than the CRLB when two sensors are not far way from each other, and can even be smaller than the CRLB due to the fact that the boundary information (i.e. the upper bound on the distance estimate) is introduced. 7 34 38 40 33 15 27 8 10 28 9 11 −2 −5 25 26 12 0 41 24 14 43 29 13 30 5 X Coordinate (m) 31 32 42 44 10 Fig. 5 The layout of the sensors in [28] To sum up, the proposed method is able to achieve more accurate distance estimates than both the RSS-based method and the connectivity-based method under various simulative and practical environments, which confirms the effectiveness of the proposed method. 6 CONCLUSIONS – with α increasing, both the RMSE of these three methods and the CRLB decrease, which is because the communication range decreases; – the proposed method always outperforms the other two methods and approaches to the CRLB. 5.2 Implementing the Method in Practice To better demonstrate its superiority, the proposed method is implemented using practical RSS measurements and deployment information provided in [28]. Specifically, a WSN consisting of 44 sensors was deployed in a real environment as shown in Fig. 5, and the RSS measurements between any two sensors were reported. On the basis of their RSS measurements, the proposed method can be run to produce practical distance estimates. According to [28], define α = 2.3, σdB = 3.92, PR (d0 ) = −37.47 dBm, and the minimum value of the RSS measurements is −55 dBm. To avoid boundary effects as much as possible, we consider the four sensors near the center of the deployment region, i.e. sensors 15, 23, 24 and 25. The distance estimates among these four sensors are calculated by RSS-based, connectivity-based and proposed methods, respectively, and are listed in Tab. 1. As can be seen, the errors of the proposed method are always less than the corresponding errors obtained by the other two methods. In this paper, we fused the RSS measurements and local connectivity between two neighboring nodes and implemented the low-cost and accurate distance estimation method. The advantages of the proposed method lie in the following aspects. Firstly, the practical log-normal model was applied to deduce the error characteristics of the RSS-based method and the connectivity-based method, which enables us to fuse two sources of information based the MLE. Secondly, both simulations and experiments were conducted, and it was shown that the proposed method outperforms its counterparts and approaches to the CRLB in most cases. Regarding future works, we would like to apply the proposed method with the existing low-cost localization algorithms (e.g. DV-Hop) so as to improve the localization performance of WSNs without using extra devices. References 1. Mao, G., Fidan, B., & Anderson, B. D. (2007). Wireless sensor network localization techniques. Computer networks, 51(10), 25292553. 2. Li, L., Halpern, J. Y., Bahl, P., Wang, Y. M., & Wattenhofer, R. (2005). A cone-based distributed topology-control algorithm for wireless multi-hop networks. IEEE/ACM Transactions on Networking (TON), 13(1), 147-159. 3. Siripongwutikorn, P., & Thipakorn, B. (2008). Mobility-aware topology control in mobile ad hoc networks. Computer Communications, 31(14), 3521-3532. 4. Sitanayah, L., Datta, A., & Cardell-Oliver, R. (2010). Heuristic algorithm for finding boundary cycles in location-free low density wireless sensor networks. Computer Networks, 54(10), 1630-1645. 8 Qing Miao, Baoqi Huang∗ and Bing Jia 20 20 Connectivity RSS Proposed CRLB 18 16 16 14 RMSE(m) RMSE(m) 14 12 10 8 12 10 8 6 6 4 4 2 2 0 Connectivity RSS Proposed CRLB 18 0 20 40 60 0 80 0 20 40 d(m) (a) RMSE (µ = 10) 20 Connectivity RSS Proposed CRLB 18 16 Connectivity RSS Proposed CRLB 18 16 14 RMSE(m) 14 RMSE(m) 80 (b) RMSE (µ = 20) 20 12 10 8 12 10 8 6 6 4 4 2 2 0 60 d(m) 0 20 40 60 0 80 0 20 d(m) 40 60 80 d(m) (c) RMSE (µ = 30) (d) RMSE (µ = 40) Fig. 2 The RMSE and CRLB given α = 4, σdB = 4 and µ = 10, 20, 30, 40. Table 1 The errors by different distance estimation methods Sensor pair The proposed method The RSS-based method The connectivity-based method True distance (15, 23) 0.603 0.974 0.615 2.286 (15, 24) 0.520 1.168 0.530 2.656 5. Huang, B., Wu, W., & Zhang, T. (2013, October). An improved connectivity-based boundary detection algorithm in wireless sensor networks. In Local Computer Networks (LCN), 2013 IEEE 38th Conference on (pp. 332-335). IEEE. 6. Chitte, S. D., & Dasgupta, S. (2008, October). Distance estimation from received signal strength under log-normal shadowing: Bias and variance. In Signal Processing, 2008. ICSP 2008. 9th International Conference on (pp. 256-259). IEEE. 7. Benkic, K., Malajner, M., Planinsic, P., & Cucej, Z. (2008, June). Using RSSI value for distance estimation in wireless sensor networks based on ZigBee. In Systems, signals and image processing, 2008. IWSSIP 2008. 15th international conference on (pp. 303306). IEEE. 8. Della Rosa, F., Pelosi, M., & Nurmi, J. (2012). Human-induced effects on rss ranging measurements for cooperative positioning. International Journal of Navigation and Observation, 2012. 9. Heurtefeux, K., & Valois, F. (2012, March). Is RSSI a good choice for localization in wireless sensor network?. In Advanced Information Networking and Applications (AINA), 2012 IEEE 26th International Conference on (pp. 732-739). IEEE. 10. Huang, B., Yu, C., Anderson, B., & Mao, G. (2014). Estimating distances via connectivity in wireless sensor networks. Wireless Communications and Mobile Computing, 14(5), 541-556. (15, 25) 0.202 0.442 0.778 1.649 (23, 24) 0.776 1.419 0.828 2.781 (23, 25) 0.963 1.654 1.257 2.891 (24, 25) 0.313 0.745 0.905 1.371 11. Botta, M., & Simek, M. (2013). Adaptive distance estimation based on RSSI in 802.15. 4 network. Radioengineering, 22(4), 1162-1168. 12. Zanella, A., & Bardella, A. (2014). RSS-based ranging by multichannel RSS averaging. IEEE Wireless Communications Letters, 3(1), 10-13. 13. Nagpal, R., Shrobe, H., & Bachrach, J. (2003). Organizing a global coordinate system from local information on an ad hoc sensor network. In Information processing in sensor networks (pp. 553553). Springer Berlin/Heidelberg. 14. Shang, Y., Ruml, W., Zhang, Y., & Fromherz, M. P. (2003, June). Localization from mere connectivity. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing (pp. 201-212). ACM. 15. Buschmann, C., Pfisterer, D., & Fischer, S. (2006, September). Estimating distances using neighborhood intersection. In Emerging Technologies and Factory Automation, 2006. ETFA’06. IEEE Conference on (pp. 314-321). IEEE. 16. Buschmann, C., Hellbrck, H., Fischer, S., Kr?ller, A., & Fekete, S. P. (2007, January). Radio propagation-aware distance estimation based on neighborhood comparison. In EWSN (pp. 325-340). 17. Li, X. (2007). Collaborative localization with received-signal strength in wireless sensor networks. IEEE Transactions on Vehic- Estimating Distances via Received Signal Strength and Connectivity in Wireless Sensor Networks 25 9 35 Connectivity RSS Proposed CRLB 20 Connectivity RSS Proposed CRLB 30 RMSE(m) RMSE(m) 25 15 10 20 15 10 5 5 0 0 20 40 60 80 0 0 20 d(m) (a) RMSE (σdB = 5) 60 80 (b) RMSE (σdB = 6) 40 45 Connectivity RSS Proposed CRLB 35 30 RMSE(m) 40 d(m) Connectivity RSS Proposed CRLB 40 35 30 25 25 20 20 15 15 10 10 5 0 5 0 20 40 60 80 0 0 20 40 60 80 d(m) (c) RMSE (σdB = 7) (d) RMSE (σdB = 8) Fig. 3 The RMSE and CRLB given α = 4, µ = 20 and σdB = 5, 6, 7, 8. ular Technology, 56(6), 3807-3817. 18. Ouyang, R. W., Wong, A. K. S., & Lea, C. T. (2010). Received signal strength-based wireless localization via semidefinite programming: Noncooperative and cooperative schemes. IEEE Transactions on Vehicular Technology, 59(3), 1307-1318. 19. So, H. C., & Lin, L. (2011). Linear least squares approach for accurate received signal strength based source localization. IEEE Transactions on Signal Processing, 59(8), 4035-4040. 20. Patwari, N., Hero, A. O., Perkins, M., Correal, N. S., & O’dea, R. J. (2003). Relative location estimation in wireless sensor networks. IEEE Transactions on signal processing, 51(8), 2137-2148. 21. Cheng, Y. Y., & Lin, Y. Y. (2009). A new received signal strength based location estimation scheme for wireless sensor network. IEEE Transactions on Consumer Electronics, 55(3). 22. Botta, M., & Simek, M. (2013). Adaptive distance estimation based on RSSI in 802.15. 4 network. Radioengineering, 22(4), 1162-1168. 23. Franceschetti, M., & Meester, R. (2008). Random networks for communication: from statistical physics to information systems (Vol. 24). Cambridge University Press. 24. Griffin, T. F. (1992). Distribution of the ratio of two poisson random variables (Doctoral dissertation). 25. Dłaz-Francs, E., & Rubio, F. J. (2013). On the existence of a normal approximation to the distribution of the ratio of two independent normal random variables. Statistical Papers, 1-15. 26. Salman, N., Maheshwari, H. K., Kemp, A. H., & Ghogho, M. (2011, June). Effects of anchor placement on mean-CRB for localization. In Ad hoc networking workshop (Med-Hoc-Net), 2011 The 10th IFIP annual mediterranean (pp. 115-118). IEEE. 27. Ling, Y., Alexander, S., & Lau, R. (2012, March). On quantification of anchor placement. In INFOCOM, 2012 Proceedings IEEE (pp. 2192-2200). IEEE. 28. Patwari, N. Wireless sensor network localization measurement repository, 2006. A The Derivation of the CRLB The probability density functions of M , P , Q and the RSS can be formulated as follows (λf (d))x1 exp(−λf (d)), x1 ! (λ(S − f (d)))x2 pP (x2 ) = exp(−λ(S − f (d))), x2 ! (λ(S − f (d)))x3 exp(−λ(S − f (d))), pQ (x3 ) = x3 !   1 (x4 − PR (d0 ) + 10α log10 d)2 pPR (x4 ) = √ exp − , 2 2σdB 2πσdB pM (x1 ) = where PR is a random variable representing RSS in dBm, and is normally distributed with the mean PR (d0 )−10α log10 d 2 and variance σdB . 10 Qing Miao, Baoqi Huang∗ and Bing Jia 80 20 Connectivity RSS Proposed CRLB 70 60 Connectivity RSS Proposed CRLB 18 16 RMSE(m) RMSE(m) 14 50 40 30 12 10 8 6 20 4 10 0 2 0 50 100 150 200 0 250 0 20 40 d(m) (a) RMSE (α = 3) 4 Connectivity RSS Proposed CRLB 7 3 5 4 3 2.5 2 1.5 2 1 1 0.5 0 10 Connectivity RSS Proposed CRLB 3.5 RMSE(m) 6 RMSE(m) 80 (b) RMSE (α = 4) 8 0 60 d(m) 20 30 40 d(m) (c) RMSE (α = 5) 0 0 5 10 15 20 25 d(m) (d) RMSE (α = 6) Fig. 4 The RMSE and CRLB given σdB = 4, µ = 20 and α = 3, 4, 5, 6. According to the probability density functions, it is straightforward to formulate the likelihood function as L(d, λ) = pM (x1 ) × pP (x2 ) × pQ (x3 ) × pPR (x4 ) ∂ ln L x1 f ′ (d) (x2 + x3 )f ′ (d) = − + λf ′ (d) ∂d f (d) S − f (d) (f (d))x1 (S − f (d))x2 +x3 1 = λx1 +x2 +x3 √ x4 − PR (d0 ) + 10α log10 d) 10α x1 !x2 !x3 ! 2πσdB − , 2   σdB d ln 10 (x4 − PR (d0 ) + 10 log10 d)2 . ∂ ln L x1 + x2 + x3 × exp −λ(2S − f (d)) − 2 2σdB = − (2S − f (d)), ∂λ λ And the natural logarithm of the likelihood function can be expressed as follows  (f (d))x1 (S − f (d))x2 +x23 √ x1 (f ′ (d))2 κ (x2 + x3 )(f ′ (d))2 ∂ ln L = − − 2 − x1 !x2 !x3 ! 2πσdB 2 2 2 ∂d f (d) (S − f (d)) d (x4 − PR (d0 ) + 10α log10 d)2 . − λ(2S − f (d)) − (x − 10α P (d ) + 10α log d) 4 R 0 10 2 2σdB + , 2 σdB d2 ln 10 ln L(d, λ) = (x1 + x2 + x3 ) ln λ + ln  Therefore, the FIM is defined as   2   2  ln(L) E ∂ ∂dln2 L E ∂ ∂λ∂d .  2 FIM(d, λ) = −   ∂ 2 ln(L)  ln(L) E ∂λ∂d E ∂ ∂λ 2 x1 + x2 + x3 ∂ 2 ln L =− , ∂λ2 λ2 ∂ 2 ln L =f ′ (d). ∂λ∂d Since f (d) approximates a linear function, the partial derivative can be formulated as Because M , P , Q and PR are independent random variables with means λf (d), λ(S − f (d)), λ(S − f (d)) and Estimating Distances via Received Signal Strength and Connectivity in Wireless Sensor Networks PR (d0 ) − 10α log10 d , respectively, we can have   2   κ 1 ∂ ln L 2 ′ 2 E − 2, = −λf (d) + 2 ∂d f (d) S − f (d) d  2  ∂ ln L 2S − f (d) E =− , ∂λ2 λ  2  ∂ ln L E = f ′ (d), ∂λ∂d  2 where κ = σdB10α . ln 10 Then, the FIM can be expressed as follows   ! 1 + S−f2 (d) + dκ2 −f ′ (d) λf ′ (d)2 f (d) , FIM(d, λ) = 2S−f (d) −f ′ (d) λ and thus, we can have −1  κ 2λS 2 (f ′ (d))2 + . CRLB(d) = f (d)(2S − f (d))(S − f (d)) d2 11
3cs.SY
Analysis of the Pólya-Gamma block Gibbs sampler for Bayesian logistic linear mixed models arXiv:1708.00100v2 [math.ST] 17 Nov 2017 Xin Wang∗ and Vivekananda Roy† Department of Statistics, Iowa State University, Ames, IA November, 2017 Abstract In this article, we construct a two-block Gibbs sampler using Polson et al.’s (2013) data augmentation technique with Pólya-Gamma latent variables for Bayesian logistic linear mixed models under proper priors. Furthermore, we prove the uniform ergodicity of this Gibbs sampler, which guarantees the existence of the central limit theorems for MCMC based estimators. key words: Data augmentation, Markov Chain, Logit link, Pólya-Gamma distribution, Uniform ergodicity 1 Introduction Consider the logistic linear mixed model set-up (Charles E. McCulloch and Neuhaus, 2008; McCulloch, 2003). Let (Y1 , Y2 , . . . , YN ) denote the vector of Binomial(ni , pi ) random variables, xi and zi be the p × 1 and q × 1 known covariates and random effect design vectors respectively associated with the ith observation for i = 1, . . . , N . Let β ∈ Rp be the unknown vector of regression coefficients and u ∈ Rq be the random effects vector. Assume that pi = F (xTi β + ziT u), where F is the standard logistic distribution function, that is F (t) ≡ et /(1 + et ) for t ∈ R. Suppose we have r random effects with u = (uT1 , . . . , uTr )T , where uj is a qj × 1 vector with qj > 0, q1 + · · · + qr = q, ind and uj ∼ N (0, Iqj 1/τj ), where τj ∈ R+ = (0, ∞) is the precision parameter associated with uj for j = 1, . . . , r. The joint distribution of u is N 0, D(τ )−1 , where D(τ ) = ⊕rj=1 τj Iqj , τ = (τ1 , . . . , τr ) and ⊕ denotes the direct sum. The data model for the logistic linear mixed model is ∗ † Yi |β, u ind Binomial(ni , pi ) for i = 1, . . . , N with pi = uj |τj ind F (xTi β + ziT u) for i = 1, . . . , N,   1 N 0, Iqj , j = 1, . . . , r. τj ∼ ∼ Email: [email protected] Email: [email protected] 1 (1) Let y = (y1 , y2 , . . . , yN )T be the observed Binomial response variables. The likelihood function for (β, τ ) is L (β, τ |y) = Z N Y Rq i=1 ! h iyi    exp xTi β + ziT u ni −1   u; 0, D(τ ) φ du, q yi 1 + exp xTi β + ziT u ni (2) where φq (s; a, B) is the probability density function of the q-dimensional normal distribution with mean vector a and covariance matrix B evaluated at s. In Bayesian framework, let π (β) and π (τ ) be the prior densities for β and τ respectively. Assume that β and τ are apriori independent. The joint posterior density of (β, τ ) is π (β, τ |y) = 1 L (β, τ |y) π (β) π (τ ) , c0 (y) (3) where c0 (y) is the marginal density of y with c0 (y) = Rr Rp L (β, τ |y) π (β) π (τ ) dβdτ . + The posterior density (3) is intractable for any choice of the prior distributions of β and τ . Generally, Markov chain Monte Carlo (MCMC) algorithms are used for exploring these posterior densities. Even in the absence of random effects, for generalized linear models, MCMC algorithms are needed to summarize the associated posterior densities. For probit regression models, Albert and Chib (1993) proposed a widely used data augmentation (DA) algorithm to sample from the corresponding posterior distributions. Roy and Hobert (2007) and Chakraborty and Khare (2017) proved the geometric ergodicity of this DA algorithm for Bayesian probit regression model under improper and proper priors respectively. Wang and Roy (2017) recently extended the convergence rate analysis of the block Gibbs samplers based on this DA technique for Bayesian probit linear mixed models under both proper and improper priors. For logistic regression models, there have been several attempts for producing a DA algorithm similar to Albert and Chib’s (1993) algorithm for the probit regression model (see e.g. Holmes and Held (2006) and Frühwirth-Schnatter and Frühwirth (2010)). Unfortunately, these algorithms are far more complex than Albert and Chib’s (1993) algorithm. Only recently, Polson et al. (2013) produced such a DA algorithm for logistic regression models using Pólya-Gamma latent variables. Choi and Hobert (2013) proved uniform ergodicity of the Pólya-Gamma DA Markov chain under normal priors on the regression parameters. Choi and Román (2017) showed that the Markov operator based on Polson et al.’s (2013) DA algorithm for one-way logistic ANOVA model is traceclass, which implies that the associated Markov Chain is geometrically ergodic. Both Choi and Hobert (2013) and Choi and Román (2017) considered the special case when the data are binary, that is ni = 1 for all i. However, there is no result in the literature about convergence analysis of any Gibbs samplers for Bayesian logistic linear mixed models. In this article, we construct a two-block Gibbs sampler for Bayesian logistic linear mixed models with normal priors on regression parameters and truncated Gamma priors on precision parameters. We further establish uniform ergodicity of this Gibbs sampler. The article is organized as follows. In section 2, we construct the two-block Gibbs sampler for the Bayesian logistic linear mixed model under proper priors. In section 3, R 2 R we prove the uniform ergodicity of the underlying Markov chain. Finally, we have some discussions in section 4. 2 Two-block Gibbs sampler In Polson et al. (2013), a logistic linear mixed model example is introduced. In their example, normal distribution is used as the prior for regression coefficients and Gamma distribution is used as the prior for precision parameters. We assume the following priors: β ∼ Np (Q−1 µ0 , Q−1 ) for some p × p positive definite matrix Q and µ0 ∈ Rp , ind τj ∼ truncated Gamma(aj , bj , τ0 ), j = 1, . . . , r, where bj > 0 for j = 1, . . . , r. The density function of truncated Gamma(aj , bj , τ0 ) is a −1 f (τj |aj , bj , τ0 ) = [c (τ0 , aj , bj )]−1 τj j exp (−bj τj ) I(τj ≥ τ0 ), (4) where c (τ0 , aj , bj ) = τ∞ τ aj −1 exp (−bj τ ) dτ and τ0 > 0 is a known constant. 0 By Theorem 1 in Polson et al. (2013), R h  exp xTi β + ziT u iyi 1 + exp xTi β + ziT u  i h  ni = 2−ni exp κi xTi β + ziT u × Z ∞ 0  exp −ωi  xTi β + ziT u 2  /2 p (ωi ) dωi , (5) where p (ωi ) is the probability density function of the random variable ωi ∼ PG (ni , 0) and κi = yi − ni /2 for i = 1, . . . , N . Here, PG(ni , 0) denotes the Pólya-Gamma distribution with parameters ni and 0 with density f (x|ni , 0) = ∞ Γ(n + ni ) (2n + ni ) − (2n+ni )2 2ni −1 X 8x √ e (−1)n , x > 0. Γ(ni ) n=0 Γ(n + 1) 2πx3 Let ω = (ω1 , . . . , ωN ) and the joint (posterior) density of β, u, ω and τ be π (β, u, ω, τ |y) ∝  N Y i=1      exp κi xTi β + ziT u − ωi xTi β + ziT u  × φq u; 0, D(τ )−1 φp β; Q−1 µ0 , Q−1 r Y j=1 a −1 −bj τj τj j e 2  /2 p (ωi ) I(τj ≥ τ0 ). (6) From (2), (3) and (5), it follows that Rq RN π(β, u, ω, τ |y)dωdu = π(β, τ |y), which + is our target posterior density. Using draws from all full conditional distribution distributions of (6), we can run a Gibbs sampler with stationary density (6). It is known that by combining and simultaneously drawing multiple parameters, the convergence of the Gibbs sampler can be improved (Liu et al., 1994), although the “blocking” to be computationally efficient, the corresponding joint conditional distributions need to be R R  tractable. Here we construct a two-block Gibbs sample for (6). Let η = β T , uT 3 T , κ = (κ1 , . . . , κn ) and M = (X, Z) with ith row mTi and Ω be the n × n diagonal matrix with ith diagonal element ωi . Standard calculations show that the conditional density of η is     1 T 1 T T T T T π (η|ω, τ , y) ∝ exp − η M ΩM η + η M κ exp − η A (τ ) η + η l , 2 2  where l = µT0 , 01×q where Σ = T , and A (τ ) = Q ⊕ D(τ ). That is,  η|ω, τ , y ∼ N Σ−1 µ, Σ−1 X T ΩX + Q X T ΩZ Z T ΩX Z T ΩZ + D(τ ) !  (7) = M T ΩM + A (τ ) , µ = M T κ + l. Similarly, the conditional density of (ω, τ ) is π (ω, τ |β, u, y) ∝ × N Y i=1 r Y   exp −ωi xTi β + ziT u a +qj /2−1 τj j j=1 h 2  /2 p (ωi )   i exp − uTj uj /2 + bj τj I(τj ≥ τ0 ). So, given β, u, y, we have that ω and τ are conditionally independent with ind   ωi |η, y ∼ P G ni , |mTi η| , i = 1, . . . , N, uTj uj qj τj |η, y ∼ truncated Gamma aj + , bj + , τ0 , j = 1, . . . , r. 2 2 ind ! Remark 1. As in Wang and Roy (2017), we assume that the prior distribution for τj is a truncated Gamma distribution. However, while implementing the block Gibbs sampler in practice, a number slightly larger than the machine precision zero can be treated as τ0 , practically avoiding the need to use any rejection sampling algorithms to draw from the truncated conditional distribution of τ . Thus, one single iteration of the block Gibbs sampler {η (m) , ω (m) , τ (m) }∞ m=0 has the following two steps: Algorithm: The (m + 1)st iteration for the two-block Gibbs sampler 1: (m+1) Draw τj  (m+1) ind   ∼ P G ni , |mTi η (m) | for i = 1, . . . , N . j = 1, . . . , r, and independently draw ωi 2:  from truncated Gamma aj + qj /2, bj + uTj uj /2, τ0 with u = u(m) for     Draw η (m+1) from (7), η (m+1) ∼ Np+q Σ(m)−1 M T κ + l , Σ(m)−1 , where (m+1) Σ(m) = M T Ω(m+1) M +A(τ (m+1) ) and the diagonal elements of Ω(m+1) are ωi i = 1, . . . , N . , Polson et al. (2013) developed an efficient method for sampling from PG distribution, which is the only nonstandard distribution involved in the above Gibbs sampler. 4 3 Uniform ergodicity of the two-block Gibbs sampler In this section, we prove the uniform ergodicity of the two-block Gibbs sampler {η (m) , ω (m) , τ (m) }∞ m=0 , which has the same rate of convergence as the η-marginal Markov (Roberts chain {η (m) }∞ and Rosenthal, 2001). Below we analyze the Ψ ≡ {η (m) }∞ m=0 m=0 chain. Let η ′ be the current state and η be the next state, then the Markov transition density (Mtd) of Ψ is ′ k(η|η ) = Z Rr+ Z RN + π(η|ω, τ , y)π(ω, τ |η ′ , y)dωdτ , (8) where π(·|·, y)’s are the conditional densities from section 2. Routine calculations show that k(η|η ′ ) is reversible and thus invariant with respect to the marginal density of η R R denoted as π(η|y) ≡ Rr RN π(η, ω, τ |y)dωdτ , where π(η, ω, τ |y) is defined in (6). + + Since k(η|η ′ ) is strictly positive, the Markov chain Ψ is Harris ergodic (Hobert, 2011). Let B denote the Borel σ-algebra of Rp+q and K(·, ·) be the Markov transition function corresponding to the Mtd k(·, ·) in (8), that is, for any set A ∈ B, η ′ ∈ Rp+q and any j = 0, 1, . . . , ′ K(η , A) = Pr(η (j+1) ∈ A|η (j) ′ =η)= Z k(η|η ′ )dη. (9) A Then the m-step Markov transition function is K m (η ′ , A) = Pr(η (m+j) ∈ A|η (j) = η ′ ). Let Π(·|y) be the probability measure with density π(η|y). The Markov chain Ψ is geometrically ergodic if there exists a constant 0 < t < 1 and a function G : Rp+q 7→ R+ such that for any η ∈ Rp+q , ||K m (η, ·) − Π(·|y)|| := sup |K m (η, A) − Π(A|y)| ≤ G(η)tm . (10) A∈B If G(η) is bounded above, then the corresponding Markov chain is uniformly ergodic. The following theorem establishes uniform ergodicity of the Markov chain Ψ by constructing a minorization condition. Theorem 1. Assume that aj + qj /2 ≥ 1 and bj > 0 for all j, then the Markov chain Ψ is uniformly ergodic. Proof. We show that there exists a δ > 0 and a density function h : Rp+q → [0, ∞) such that, for all η ′ , η ∈ Rp+q , k(η|η ′ ) ≥ δh(η). (11) By Roberts and Rosenthal (2004)[Theorem 8], (11) implies that the Markov chain Ψ is uniformly ergodic. Furthermore, under (11), (10) holds with G = 1 and t = 1 − δ. For τj ≥ τ0 , j = 1, . . . , q, Σ ≥ M T ΩM + A (τ0 ), that is Σ − (M T ΩM + A (τ0 )) is positive semidefinite. So |Σ| ≥ M T ΩM + A (τ0 ) = |A (τ0 )| M̃ T ΩM̃ + I ≥ 5 −1  |A (τ0 )| , where M̃ = M A (τ0 )−1/2 . And µT Σ−1 µ ≤ µT M T ΩM + A (τ0 ) µT A (τ0 ) −1 µ. Then, π(η|ω, τ , y) = (2π) − p+q 2 ≥ (2π)− p+q 2 = (2π)− p+q 2 µ ≤ T   1 |Σ| exp − η − Σ−1 µ Σ η − Σ−1 µ 2    1 1 T −1 1/2 T T |A (τ0 )| exp − η Ση − 2η µ − µ A (τ0 ) µ 2 2   1 1 1 T 1/2 −1 T T T |A (τ0 )| exp − β Qβ − u D(τ )u + η µ − µ A (τ0 ) µ 2 2 2   1 2 N 2  1X . ωi mTi η × exp − 2 i=1 # " Therefore, π(η|ω, τ , y)π(ω, τ |η ′ , y) ≥ (2π) × × r Y i=1 1/2 |A (τ0 )| 1 1 1 exp − β T Qβ − uT D(τ )u + η T µ − µT A (τ0 )−1 µ 2 2 2 1    a +qj /2−1  τj j ′ c τ0 , aj + qj /2, bj + u′T j uj /2 j=1 N Y − p+q 2   mTi η ′ coshni     exp  − 2 mTi η ′ 2  + mTi η 2 h  2   i ′ exp − bj + u′T j uj /2 τj I(τj ≥ τ0 ) ωi  p (ωi ) .  According to Polson et al. (2013) and Choi and Hobert (2013), Z R+    mTi η ′  exp −  ≥ cosh  mTi η ′ 2 +  2 mTi η −ni 2 + mTi η 2 2 implying ni  cosh  −ni ≥2  mTi η ′  2  exp   mTi η 2 Z R+ 2   ≥ 2 cosh     exp − −ni   q  2 2 −ni mTi η ′ + mTi η   ωi  p (ωi ) dωi = cosh   mTi η ′  2 mTi η ′ 2  + mTi η 2  2 T  mi η −ni  ≥2 exp  4 6 2    cosh  mTi η −ni  2 ,    mTi η  −ni −ni   cosh ωi  p (ωi ) dωi ≥ 2 −ni + 1   2 −ni −ni /4 =2 e  ni  T 2 exp − mi η . 4  So we have, Z RN + π(η|ω, τ , y)π(ω, τ |η ′ , y)dω ≥ (2π)− 1 1 |A (τ0 )|1/2 exp − β T Qβ + η T µ − µT A (τ0 )−1 µ 2 2   1 T T exp − η M ΛM η 4 n × 2−n e− 4 × r Y  p+q 2   a +qj /2−1  ′ −1 j [c τ0 , aj + qj /2, bj + u′T j uj /2 ] τj j=1 PN where n = Thus, k(η|η ′ ) = i=1 ni Z Rr+ Z RN + h   i ′ T exp − bj + u′T j uj /2 + uj uj /2 τj I(τj ≥ τ0 ), and Λ is the N × N diagonal matrix with ith diagonal element ni . π(η|ω, τ , y)π(ω, τ |η ′ , y)dωdτ n 1 1 1 |A (τ0 )|1/2 exp − β T Qβ + η T µ − µT A (τ0 )−1 µ × 2−n e− 4 exp − η T M T ΛM η 2 2 4 Z ∞ r h   i Y 1 a +q /2−1   × τj j j exp − bj + u′T u′j /2 + uTj uj /2 τj dτj . j ′T ′ τ0 j=1 c τ0 , aj + qj /2, bj + uj uj /2 ≥ (2π)−   p+q 2   Now consider 1   ′ c τ0 , aj + qj /2, bj + u′T j uj /2 aj +qj /2  ′ bj + u′T j uj /2 Z ∞ τ0 = a +q /2 ′ /2 + uT u /2 j j bj + u′T u j j j j a +qj /2−1 τj j h   i ′ T exp − bj + u′T j uj /2 + uj uj /2 τj dτj R∞ xaj +qj /2−1 exp (−x) dx, T ′ (bj +u′T j uj /2+uj uj /2)τ0 R∞ · aj +qj /2−1 exp (−x) dx (bj +u′T u′ /2)τ0 x j j aj +qj /2−1 exp (−t) dt, f (x) = ∞ aj +qj /2−1 exp (−t) dt For x ≥ 0, define, f1 (x) = (∞ 2 (bj +x)τ0 t b +x+uT /2)τ0 t j uj   j and g (x) = f1 (x) − exp −τ0 uTj uj /2 f2 (x). Since aj + qj /2 − 1 ≥ 0 by assumption, ′ it can h be shown ithat g (x) ≤ 0. And g (x) ≥ limx→∞ g (x) = 0. Thus f1 (x) /f2 (x) ≥ T T ′T ′ ′ exp −τ0 uTj uj /2 . Also (bj + u′T j uj /2)/(bj + uj uj /2 + uj uj /2) ≥ bj /(bj + uj uj /2), So R κ(η|η ′ ) ≥ (2π)− p+q 2 −n − n 4 ×2 e R 1 1 |A (τ0 )|1/2 exp − β T Qβ + η T µ − µT A (τ0 )−1 µ 2 2  r Y bj 1 T T exp − η M ΛM η × 4 bj + uTj uj /2 j=1   7 !aj +qj /2    exp −τ0 uTj uj /2 . Let c1 (M , y) = × 1 1 exp − β T Qβ + η T µ − η T M T ΛM η 2 4 Rp+q  Z r Y bj bj + uTj uj /2 j=1 p+q 2 ≤ (2π) !aj +qj /2 −1/2 |A (τ0 )|    exp −τ0 uTj uj /2 dη n 1 T exp µ A (τ0 ) µ 2n e 4 < ∞. 2   So there exists a density function h (η) and δ > 0 such that, k(η|η ′ ) = Z Rr+ Z Rn + π(η|ω, τ , y)π(ω, τ |η ′ , y)dωdτ ≥ δh (η) , where 1 1 1 h (η) = exp − β T Qβ + η T µ − η T M T ΛM η c1 (M , y) 2 4 ×  r h Y iaj +qj /2 bj /(bj + uTj uj /2) j=1 and δ = (2π)− p+q 2    exp −τ0 uTj uj /2 , n 1 |A (τ0 )|1/2 2−n e− 4 · exp − µT A (τ0 )−1 µ c1 (M , y) . 2   Hence the Markov chain is uniformly ergodic. Remark 2. Since Theorem 1 does not put any conditions on y, X, Z, N , p and q, it is applicable in high dimensional situations where p (or q) can be much larger than N . Remark 3. Following the proof of Theorem 1, the uniform ergodicity result in Choi and Hobert (2013) can be extended to binomial data. i h Remark 4. Since 1/(x+1) ≥ exp (−x), we have bj /(bj +uTj uj /2) ≥ exp −uTj uj /(2bj ) . Using this inequality, we have −n − n 4 δ≥2 e 1/2 |A (τ0 )| |Σ1 | −1/2 1 1 exp − µT A (τ0 )−1 µ + µT Σ−1 1 µ , 2 2   i h where Σ1 = 12 M T ΛM + Q ⊕ ⊕rj=1 {τ0 + (aj + qj )/(2bj )}Iqj . This in turn, gives a computable upper bound to the total variation distance to the stationary in (10). 4 Discussion We prove uniform ergodicity of the two-block Gibbs sampler for Bayesian logistic linear mixed models, which guarantees the existence of central limit theorem for MCMC 8 estimators under a finite second moment condition (Jones, 2004). Thus, our result has important practical implications as it allows for obtaining valid asymptotic standard errors for the posterior estimates (Flegal and Jones, 2010). Convergence rates analysis of Gibbs samplers for Bayesian logistic linear mixed models with improper priors is a potential future project. References Albert, J. H. and Chib, S. (1993). Bayesian analysis of binary and polychotomous response data. Journal of the American statistical Association, 88(422):669–679. Chakraborty, S. and Khare, K. (2017). Convergence properties of Gibbs samplers for Bayesian probit regression with proper priors. Electronic Journal of Statistics, 11:177– 210. Charles E. McCulloch, S. R. S. and Neuhaus, J. M. (2008). Generalized, linear, and mixed models. Wiley, 2nd ed edition. Choi, H. M. and Hobert, J. P. (2013). The Pólya-Gamma Gibbs sampler for Bayesian logistic regression is uniformly ergodic. Electronic Journal of Statistics, 7:2054–2064. Choi, H. M. and Román, J. C. (2017). Analysis of Pólya-Gamma Gibbs sampler for Bayesian logistic analysis of variance. Electronic Journal of Statistics, 11(1):326–337. Flegal, J. M. and Jones, G. L. (2010). Batch means and spectral variance estimators in Markov chain Monte Carlo. The Annals of Statistics, 38(2):1034–1070. Frühwirth-Schnatter, S. and Frühwirth, R. (2010). Data augmentation and MCMC for binary and multinomial logit models. In Statistical Modelling and Regression Structures, pages 111–132. Springer. Hobert, J. P. (2011). The data augmentation algorithm: Theory and methodology. In Brooks, S., Gelman, A., Jones, G., and Meng, X.-L., editors, Handbook of Markov Chain Monte Carlo. Chapman & Hall/CRC Press. Holmes, C. C. and Held, L. (2006). Bayesian auxiliary variable models for binary and multinomial regression. Bayesian analysis, 1(1):145–168. Jones, G. L. (2004). On the markov chain central limit theorem. Probability surveys, 1:299âĂŞ–320. Liu, J. S., Wong, W. H., and Kong, A. (1994). Covariance structure of the Gibbs sampler with applications to the comparisons of estimators and augmentation schemes. Biometrika, pages 27–40. McCulloch, C. E. (2003). Generalized linear mixed models. NSF-CBMS regional conference series in probability and statistics, 7:i–84. 9 Polson, N. G., Scott, J. G., and Windle, J. (2013). Bayesian inference for logistic models using Pólya-Gamma latent variables. Journal of the American statistical Association, 108(504):1339–1349. Roberts, G. O. and Rosenthal, J. S. (2001). Markov chains and de-initializing processes. Scandinavian Journal of Statistics, 28:489–504. Roberts, G. O. and Rosenthal, J. S. (2004). General state space markov chains and MCMC algorithms. Probability Surveys, 1:20–71. Roy, V. and Hobert, J. P. (2007). Convergence rates and asymptotic standard errors for Markov chain Monte Carlo algorithms for Bayesian probit regression. Journal of the Royal Statistical Society: Series B, 69(4):607–623. Wang, X. and Roy, V. (2017). Convergence analysis of block Gibbs samplers for Bayesian probit linear mixed models. arXiv preprint arXiv:1706.01846. 10
10math.ST
Zero-Shot Learning to Manage a Large Number of Place-Specific Compressive Change Classifiers arXiv:1709.05397v1 [cs.CV] 15 Sep 2017 Tanaka Kanji Abstract— With recent progress in large-scale map maintenance and long-term map learning, the task of change detection on a large-scale map from a visual image captured by a mobile robot has become a problem of increasing criticality. Previous approaches for change detection are typically based on image differencing and require the memorization of a prohibitively large number of mapped images in the above context. In contrast, this study follows the recent, efficient paradigm of change-classifier-learning and specifically employs a collection of place-specific change classifiers. Our changeclassifier-learning algorithm is based on zero-shot learning (ZSL) and represents a place-specific change classifier by its training examples mined from an external knowledge base (EKB). The proposed algorithm exhibits several advantages. First, we are required to memorize only training examples (rather than the classifier itself), which can be further compressed in the form of bag-of-words (BoW). Secondly, we can incorporate the most recent map into the classifiers by straightforwardly adding or deleting a few training examples that correspond to these classifiers. Thirdly, we can share the BoW vocabulary with other related task scenarios (e.g., BoWbased self-localization), wherein the vocabulary is generally designed as a rich, continuously growing, and domain-adaptive knowledge base. In our contribution, the proposed algorithm is applied and evaluated on a practical long-term cross-season change detection system that consists of a large number of place-specific object-level change classifiers. I. I NTRODUCTION This paper considers the problem of scalable change detection using a novel, compact representation of an environment map (Fig. 1). With recent progress in large-scale map maintenance [2] and long-term map learning [3], the task of change detection on a large-scale map, from a visual image captured by a mobile robot, has become a problem of increasing criticality [4]. We aim to enhance the scalability from the novel perspective of map compactness while maintaining the effectiveness of the change detection system. In general, change detection has the goal of detecting changes between a robot’s view image and a previously constructed map. A major challenge in change detection is to effectively address appearance variations of the change objects. As the variations are inherently place-specific [5] and attributed to various factors (e.g., objects, viewpoint, background, illumination conditions, occlusions), it is challenging to obtain a general-purpose change model. Till the present, the most fundamental scheme reported for addressing this challenge is to directly compare each view image against Our work has been supported in part by JSPS KAKENHI Grant-in-Aid for Young Scientists (B) 23700229, for Scientific Research (C) 26330297, and for Scientific Research (C) 17K00361. The authors are with Graduate School of Engineering, University of Fukui, Japan. [email protected] Fig. 1. Scalable change detection for long-term map maintenance. (a) Experimental environment. The trajectories of the four datasets “2012/01/22,” “2012/03/31,” “2012/08/04,” and “2012/11/17” used in our experiments are visualized in green, purple, blue, and light-blue curves and overlaid on the bird’s-eye-view imagery obtained from NCLT dataset [1]. (b) Examples of changes. For each panel, the left and right figures are a query image and its corresponding reference (i.e., mapped) image, respectively. the corresponding reference (i.e., mapped) image using handcrafted features [6] or deep-learning techniques [7]. However, this fundamental scheme requires explicit memorization of every possible mapped image and exhaustive many-to-many image comparisons, which severely limits the scalability in time and space. Our approach is inspired by the recent success in the community of change-classifier-learning [8]–[11]. Instead of memorizing the large collection of mapped images, the change-classifier-learning approach simply learns an essential change classifier that is often significantly compact and nonetheless exhibits generalization capability. In [8], Gueguen et al. presented a change detection method for overhead imagery wherein they train a support vector machine (SVM) with linear kernel with L1-regularization and L2-loss as a semi-supervised scene-specific change classifier from manually labeled positive examples (i.e., changes) and plenty of available negative examples (i.e., no-changes). Moreover, it is preferable to use only a single change classifier; however, it is challenging for a single classifier to capture the place-specific variations of changes [5] or to flexibly incorporate the latest local changes in the map [12]. Therefore, we opt to use multiple place-specific change classifiers, each of which is responsible for each specific place region and the place-specific change classifiers can be flexibly and locally updated, added, or deleted at a marginal fixed cost. Each classifier receives local feature-descriptors (e.g., ORB descriptors) as input and evaluates their likelihood of change. However, it is not straightforward to apply the typical framework of change-classifier-learning to our application domain of autonomous robotics, wherein we are not provided examples with labels (i.e., change/no-change). Instead, the mapper-robot itself should collect examples in an unsupervised manner. In this study, we address the above issue from the viewpoint of zero-shot learning (ZSL) [13]. ZSL is a domainadaptation technique in the field of machine learning and was originally proposed as a strategy to obtain classifiers for arbitrary, novel categories when no labeled example is available. In particular, we are inspired by mining-based ZSL [14], wherein training examples for novel unseen categories (in the target domain) are collected by mining an external knowledge base (EKB) such as a search engine. To realize our ZSL-based change-classification framework, it is necessary to address the following questions: (1) How does one train classifiers? (2) How does one represent examples? (3) How does one prepare an EKB? The key concepts required for answering these questions are as follows: 1) We train classifiers with the latest examples when necessary to incorporate the latest changes in the map; 2) We use bag-of-words (BoW) as a compact and discriminative representation of examples; 3) We employ a visual word vocabulary as the EKB, which are inspired by the use of BoW as a compressed form of place-specific classifier in our previous study [15]. The above concepts exhibit several advantages: (1) We only have to memorize training examples rather than the classifier themselves because typical classifier-learning algorithms such as SVM [16] and nearest neighbor (NN) [17] allow us to reproduce a classifier, given the same training examples [15]. (2) We can incorporate the latest changes into the classifiers by simply adding or deleting a few training examples that correspond to these classifiers, while the training-time overhead per place can be reasonably low by using efficient training algorithms such as NN and SVM. (3) We can represent each training example in a significantly compact form of a visual word [15], implying that the training example is approximated by its nearest neighbor exemplar feature from a visual word vocabulary. (4) We can share the vocabulary with other related task-scenarios including BoW-based self-localization, SLAM, lifelong learning, and open-set recognition, wherein the vocabulary is generally designed as a rich, continuously growing, and domain-adaptive knowledge base. In experiments, the proposed framework is evaluated in a cross-season change detection setting using the publicly available NCLT dataset [1]. A. Relation to Other Works A majority of the present state-of-the-art change detection systems are based on image differencing or pairwise image comparison [5]. In [18], a scene alignment method for image differencing is proposed based on ground surface reconstruction, texture projection, image rendering, and registration refinement. In [4], a deep deconvolutional network for pixelwise change detection was trained and used for comparing query and reference image patches. Some recent studies use change-classifier-learning to realize more efficient and compact change detection [8]– [11]. Our algorithm is inspired by these classifier-learning approaches and advances a step further from the perspective of unsupervised ZSL. The work in [8] can be considered as one of the most relevant works to our study. In their work, change detection in overhead imagery is addressed. A BoW model with tree-of-shape features is employed to achieve more effective accuracy-efficiency tradeoff. Based on these features, linear canonical correlation analysis is employed to learn a subspace to encode the notion of change between images. To reduce the cost of label acquisition by human photo-interpreters, a semi-supervised SVM framework is introduced. In contrast, we address unsupervised settings, wherein examples have to be labeled automatically by the robot itself rather than by human labelers. Our study focuses on a monocular camera as the sole input device. This is a significantly challenging setting compared with other change detection settings, which assume a more richer information source, including 3D model [19], stereo or image sequence [6], 3D data [20], multi-spectral overhead imagery [21], and object model [22]. In the area of field robotics, there is substantial work on change detection systems for patrolling [23], agriculture [24], tunnel inspection [25], and damage detection [8]. We consider that our extension would also contribute to these applications from the novel perspective of map compactness. This work is a part of our study on compact map model for scalable change detection and long-term map maintenance [15], [26]–[29]. In previous studies, two scenarios have been considered. One is the “global localization” scenario [28], wherein the change detection system is required to work under global viewpoint uncertainty. As this scenario requires access to the entire large-size maps in memory, individual images were used in their compressed form of bag-of-words [26]. In contrast, the current study focuses on the alternative “pose-tracking” scenario, wherein the system can assume that the robot’s viewpoint is tracked over time. A similar setting is addressed in our recent study in [27] with a key variation being that classifiers are not compressed. As the pose-tracking scenario requires access to only a marginal portion of the submaps that correspond to the robot’s surroundings, we are allowed to use mapped images in a lesscompact form of the decompressed classifiers. Nevertheless, it is necessary to maintain the other classifiers compressed. Hence, the efficiency of compression/decompression is another critical topic, as also discussed in this paper. II. A PPROACH Our goal is to enhance the compactness of map representation for scalable change detection. As mentioned, this rules out typical image-differencing approaches that require memorization of a number of high-resolution mapped images proportional to the map size. Therefore, we decide to use the change-classifier approach. More specifically, we employ multiple place-specific change classifiers to capture the place-specific nature of changes and to enable flexible and local update of the change model. The key concept is to represent each classifier by their training examples and compress each training example to a visual word; this enables a significantly compact and domain-adaptive change model. Based on the above consideration, we use a set of placespecific change classifiers and represent each by a BoW. Following literature [30], a BoW is represented as an unordered collection of visual words, or visual features vector quantized by a codebook of exemplar features called vocabulary. In our approach, an i-th classifier is represented by positive (i.e., change) and negative (i.e., no-change) sets of visual words, {+,−} Si+ and Si− , respectively. Each visual word w ∈ Si is represented in the form: a r w = hw , w i. (1) wa is a B-bit code called appearance word and is an identifier for its nearest neighbor local-feature-descriptor in the vocabulary. We employ ORB feature descriptor [31] as local-feature-descriptor because it is a rapid binary keypoint descriptor that has been applied to numerous realtime computer-vision and robotic-mapping problems [32]. The number of ORB descriptors per image is set to 2000. We denote the appearance-word vocabulary as V (i.e., B = log2 |V |). wr is called pose word and represents the spatial location of the feature keypoint descriptor with respect to the object region; it incurs a small constant space cost B′ =log2 |A| (bits) where |A| is the area [pixels] of the object region. Consequently, the total space-cost (bits) of our BoW-based model approximately sums up to ## " " C= ∑ ∑ ∑ x∈X r∈Rx log2 |V | + B′ , (2) w∈Wr where X is the set of place regions, Rx is the object regions (described in II-A) in the x-th place, and Wr are the visual words belonging to the object r. Apparently, it is necessary to minimize the sizes of X, Rx , Wr and V without compromising change-classification accuracy. Joint minimization of these is generally intractable, and in this study, we straightforwardly consider each minimization problem separately. Minimizing Rx , Wr and V are the tasks of change-aware object proposal, feature extraction, and vocabulary design. We have also addressed the issue of vocabulary design and the use of BoW as a compressed form of classifiers in an alternative context of visual robot localization in [15]. Minimizing P is called unsupervised place-definition and workspace-partitioning discovery. We have addressed this problem in our previous studies in the Fig. 2. Pipeline of classifier-compression/-decompression task. Red: positive examples. Blue: negative examples. 1e+06 100000 10000 1000 0 50 100 150 200 250 300 Fig. 3. Effect of map compression. Vertical axis: Total space cost (bits) for all the place-specific change classifiers. Horizontal axis: Frame ID. Black and red curves exhibit space costs for compressed and non-compressed (or decompressed) maps. Each k-th curve corresponds to the k-th object cluster, and the intervals between the (k − 1)-th and k-th curves equals the space cost of the k-th object cluster. context of place recognition [33] and change recognition [27]. In this study, we straightforwardly partition the entire sequence of mapped images in the workspace into equallength subsequences, each of which corresponds to each place class. Our algorithm consists of two distinct phases: training and classification. The training procedure runs through the following steps: (t1) Train classifiers. (t2) Represent classifiers by their positive/negative examples. (t3) Approximate the examples by BoWs. (t4) Memorize the examples in the form of BoW. The classification procedure runs through the following steps: (c1) Lookup the vocabulary to determine examples that correspond to the specified reference image. (c2) Reproduce classifiers from the examples. (c3) Classify query features using the reproduced classifiers. (c4) Delete classifiers. Note that steps (c2) and (c4) function as decompression and compression of classifiers, respectively (Fig. 2). The time overhead of the compression task is more or less negligible, while that of the decompression task is marginal albeit noticeable. Therefore, it is necessary to perform task scheduling of decompression task adequately. In this study, we follow a straightforward strategy: When the robot approaches or enters a new submap’s region, decompress the classifiers of its surrounding submaps. Figure 3 demonstrates our strategy. In the figure, the frame IDs ranging from 137 to 237 correspond to the classifiers for the robot’s surroundings. As illustrated, the space cost of the Fig. 4. Overview of scene recognition. compressed classifiers is significantly lower than that of noncompressed or decompressed classifiers, which demonstrates the effectiveness of our approach. A. Classifier-learning The place-specific change model aims to detect changes at the level of object. It consists of a set of object-level classifiers, each of which aims to learn the appearance of a known object (i.e., no-change object) in the reference image of a specific place and then, to classify an unseen query feature as either change or no-change with respect to the learned object. To this end, object segmentation both at training and at classification tasks significantly influences the performance of the object-level change detection. The training phase begins with the extraction of a collection of object proposals from the specified reference image (Fig. 4b left). We use BING object-proposal algorithm [34] to achieve this because it is highly efficient to provide object proposals with category-independent image windows. Then, the proposed object-regions are further grouped into clusters of spatially-near regions, termed object clusters (Fig. 4b right). We use a criterion in this clustering wherein any two object regions belong to the same cluster if their bounding boxes overlap each other. Then, an additional “background” object cluster, which treats the entire image region as the object region, is added. Then, a change classifier is trained for each object cluster. We will implement and evaluate two types of classifiers: nearest neighbor, or SVM, and four types of SVM kernel: linear, sigmoid, polynomial, or RBF. The above methods of object proposal and classifier-learning are detailed below. The BING algorithm generally produces a large number of object proposals (e.g., 2×103 proposals per image). The proposals generally contain numerous false positives. Evaluating all the proposals is computationally intractable. Therefore, we decide to select a marginal portion of the object proposals. From the viewpoint of effectiveness of our BoW model, we evaluate spatial density of visual words N/A, where A and N are the area of the object proposal’s bounding box and the number of visual words inside the bounding box, respectively. Then, we select 400 object proposals with highest density. Subsequently, near-duplicate object regions that overlap significantly with object regions with higher density are eliminated. We consider two object regions i and j to be in the near-duplicate condition if their overlap ratio Ai j / min(Ai , A j ) exceeds a threshold of 0.5; here, Ai , A j and Ai j are the areas [pixels] of the objects i and j and their overlap region. The change classifier addresses one-sided classification problem, wherein only negative examples (i.e., no-change) are provided during the training stage. In order to obtain a sufficiently large number of positive examples, we consider the task that we call change mining [27], the aim of which is to mine features of potential change objects from a large feature collection of the EKB. In this study, we consider three strategies for change mining: “uniform,” “farthest,” and “nearest.” The “uniform” strategy uniformly samples positive examples from the EKB, while the “farthest” and “nearest” strategies sample positive examples that are respectively the farthest and nearest in Hamming distance from the specified negative examples. For all the strategies, each example in the EKB that is nearer than 10 bit from its nearest neighbor negative is considered inappropriate as a positive example and eliminated from the candidates of positive examples prior to the change mining. To enable efficient training, the number of training examples is truncated to a maximum number 400. B. Change Classification The change classification process aims to rank local feature-descriptors in query images in the order of likelihood of changes. It consists of two distinct steps: (1) image registration and (2) change ranking. Both the steps are detailed below. The image registration step, which aims to align query and reference images into the same coordinate frame (Fig. 4c), is a necessary pre-processing step for a substantial majority of change detection tasks [5]. Note that image alignment from monocular image-pairs is significantly ill-posed, particularly when we are provided only BoW representations of the images. We have tested three strategies for feature matching— ORB keypoint matching with and without post-verifications using RANSAC [35] and using vector field consensus (VFC) [36]—and observed that these two post-verification strategies (i.e., RANSAC and VFC) are not adequately stable in our scenario of highly-complex scenes. Therefore, we use ORB keypoint matching as a method for image alignment. In this study, we follow a fundamental procedure for image registration [18], which assumes a linear transformation from reference- to query-image coordinate (Fig. 4c), although a key difference is that we are given the BoW representation instead of raw feature descriptors. Note that the transformation algorithm requires pairs of feature keypoints matched between query and reference images. In order to filter out outlier matches to the maximum, an image region commonly visible in both images is estimated in the form of bounding box (Fig. 4a). More formally, keypoints of matched visual words M are sorted in ascending order of x- or y-coordinates, and we define ⌊δ |M|⌋-th and ⌈(1 − δ )|M|⌉-th elements (δ = 0.1) in the sorted lists as the x- and y-locations of the boundary of the visible regions. Two types of additional spatial cues are obtained as a byproduct of the image registration. The first one is global spatial-information for visibility analysis (Fig. 4a), wherein local features outside the commonly visible region are not considered as change-object candidates. The second is local spatial-information by which each object region (i.e., bounding box) in the reference image is first transformed to the query image’s coordinate (Fig. 4c); following this, the query image’s local features outside the transformed bounding box (Fig. 4d) are not considered as matching candidates of the specific object in the reference image. Taking into account the transformation errors, we expand the transformed bounding box by ∆L [pixel], wherein the margin ∆L is currently set to 10% of the image width. The change-ranking step aims to rank query features by the likelihood of change, given the learned place-specific objectlevel change classifiers. First, each query feature is assigned to the spatially-near object cluster in the corresponding reference image (Fig. 4d). We assign each query feature to an object cluster if its keypoint is located within one of the object cluster’s bounding box. Then, each query feature is input to the assigned object cluster’s change classifier, and the classifier outputs the probability pr of the query feature not originating from the learned object cluster r. We employ Platt scaling [37] with five-fold cross-validation to convert an output value of the SVM classifier to the probability estimate or use a Gaussian [1 − exp(−d 2 /σd2 )] to convert an output distance of the nearest neighbor classifier d into a probability value. Given the output probability value pc from each object cluster c, the probability of the query feature of interest being changed is computed by p = min pc . c (3) In order to render the set of top-ranked features more diverse, we introduce the idea of non-maximal suppression and penalize features that are considered similar to a higherranked feature. In our view, two features are similar if they belong to the same object cluster. Based on the concept, we extract object clusters from a specified query image and group query features into clusters in a similar manner as in the reference images; then, features in each cluster are ranked in descending order of the probability p. Then, the entire set of query features is re-ranked in the ascending order of augmented score r + (1 − p), where r(∈ [1,C]) is the abovementioned intra-cluster rank, C is the size of the largest cluster, and p(∈ [0, 1]) is the original probability-estimate. Note that all query features do not always belong to object clusters, and there may be isolated query features that do not belong to any object cluster. We empirically determined that such isolated features are generally less-reliable. Therefore, we assign them a worst intra-cluster rank r = C + 1. Fig. 5. Examples of scene recognition. Left panel: ORB keypoints (red dots) and commonly visible regions estimated between query and reference images (purple boxes). Middle and right panels: Object regions and object clusters extracted from both images, using different colors for different regions and clusters. III. E XPERIMENTS We evaluated various change detection strategies using NCLT dataset [1]. NCLT dataset is a long-term autonomy dataset for robotics research collected on the University of Michigan’s North Campus. The dataset consists of omnidirectional imagery, 3D lidar, planar lidar, GPS, and odometry, and we use the monocular images from the front-directed camera (“camera #5”) for our change detection tasks. Fig. 5 shows some examples of scene recognition. During the vehicle’s travel through both indoor and outdoor environments (Fig. 1a), it encounters various types of changes, which originate from the movement of individuals, parking of cars, furniture, building construction, opening/closing of doors, and placement/removal of posters (Fig. 1b). There are also nuisance changes that originate 0.8 success ratio 0.7 0.6 0.5 0.4 0.3 object non-object w/o suppression 0.2 0.1 0.125 Fig. 6. 0.25 0.5 1 top-X (%) 2 4 Change detection performance. from illumination alterations, viewpoint-dependent changes of objects’ appearances and occlusions, weather variations, and falling leaves and snow. A critical and significant challenge in a substantial majority of change detection tasks is to discriminate changes of interest from nuisances. This renders our change detection task significantly more demanding. We use four datasets “2012/1/22,” “2012/3/31,” “2012/8/4,” and “2012/11/7” that correspond to four sessions of vehicle navigation. These datasets consist of 5095, 3994, 4877, and 5118 images of size 1232 × 1616. We manually created 7571 pairs of corresponding query and reference images, which correspond to “revisiting” or “loop-closing” situations [28], using the global viewpoint information. While 548 of the pairs are change image-pairs, 6714 pairs are no-change image-pairs; the remaining 309 pairs are not independent of the 548 change pairs and are not used in the experiments. We categorized small changes (e.g., 10×10 [pixels]) that typically originated from distant objects, into no-change because it is challenging to detect such small changes by visual change detection algorithm. As a result, such small objects are likely to cause pseudo false-positive detection by change detection algorithms. We use specific combinations of query and reference image sets: (query, reference) = (2012/1/22, 2012/3/31), (2012/3/31, 2012/8/4), (2012/8/4, 2012/11/7), or (2012/11/7, 2012/1/22). The vocabulary is sized 1 M (i.e., 20-bit visual words) by default, and its exemplar features are randomly sampled from the reference set’s visual features. Change objects in the 548 change image pairs are manually annotated in the form of bounding boxes. The average time-overhead for compression and decompression per classifier was 0.3 s and time-overhead per place was 3.0 s using a non-optimized implementation of SVM from SVM light [38] on a laptop PC (Intel Core i5-4200 2.5 GHz). This implies that the compression/decompression can function in real-time when the robot moves at the speed of 1 m/s and the workspace is divided into 3-m-length places. The total travel distance was 22,181 m. We consider a straightforward change detection task scenario: Given a collection of 100 query images acquired by a robot, identify the image that is the changed one and the locations of the change features within that image. The size of an image collection is set to 100, and it consists of a change image and 99 random no-change images. We created 548 collections based on the above 548 change image pairs, for each of which 99 no-change images are randomly sampled from the 6714 no-change pairs, and the collections are commonly used as dataset by each change detection algorithm. We consider various strategies of change mining, classifiers, and image registration. For the change mining, we implemented three methods: “uniform,” “farthest,” and “nearest,” which are described in II-A. For the classifier, we implemented the SVM classifier with four kernels—linear, sigmoid, polynomial, and RBF—and the nearest neighbor classifier with Hamming distance metric. For the image registration, we aim to verify the efficacy of the visibility analysis strategy presented in II-B and implemented the common visible region in the form of bounding box (“horizontal-vertical”) as well as two additional methods for visibility analysis. One of these two is a method that omits y-direction boundaries, which is motivated by an observation that y-direction spatial information is generally unreliable (“horizontal”). The other is a method that completely omits the bounding-box information, which corresponds to not using the visibility analysis strategy (“none”). By default, we use SVM with RBF kernel as the classifier, uniform sampling with 10-bit distance threshold as the change mining strategy, and the 20-bit vocabulary. Figures 6, 7, 8, 9 and 10 exhibit the performance results. We evaluated the various methods over the independent 548 image collections. Each image collection consists of 100 pairing of query and reference images, and each query image contains 2000 features to score. We assess whether the change detection task on an image collection is successful or not and compute the success ratio over all the image collections. For the assessment, all the 100×2, 000=200, 000 features are sorted in the ascending order of the augmented score (described in II-B), and if a ground-truth change feature is ranked within the top-X (%) with respect to the sorted list, the change detection is considered as success; otherwise, it is considered as failure. We performed the evaluation for various X values: 0.1%, 0.25%, 0.5%, 1%, 2.5%, and 5%, which respectively correspond to the top 200, 500, 1000, 2000, 5000, and 10000 ranked query features. Figure 6 illustrates results of evaluating the fundamental effects of the proposed strategies—object-level change detection (II-A) and non-maximal suppression (II-B). We developed a comparison method termed “non-object,” which employs a single image-level classifier rather than the objectlevel classifier. The image-level classifier is implemented as a single object-level classifier that treats the entire image as the object region. We also developed another comparison method termed “non-suppression,” which does not employ the non-maximal suppression technique. In the figure, “object” indicates the proposed method (classifier: SVM w/ RBF kernel, vocabulary size 20 bit), and “non-object” and “nonsuppression” indicate the two comparison methods. It can be observed that the proposed “object” method evidently outperforms the other two, and it is verified the object-level change classifiers are substantially more powerful than the comparison feature-level methods. Figure 7 illustrates the result of comparing classifiers 0.8 0.7 0.7 0.6 0.6 success ratio success ratio 0.8 0.5 0.4 SVM w/ RBF SVM w/ linear SVM w/ polynomial SVM w/ sigmoid nearest neighbor 0.3 0.2 0.4 0.3 horizontal-vertical horizontal none 0.2 0.1 0.1 0.125 Fig. 7. 0.25 0.5 1 top-X (%) 2 4 0.125 Influence of classifiers and kernels. Fig. 9. 0.25 0.5 1 top-X (%) 2 4 Influence of visibility-analysis strategies. 0.8 0.8 0.7 success ratio 0.7 success ratio 0.5 0.6 0.5 0.4 0.2 Fig. 8. 0.25 0.5 1 top-X (%) 2 0.4 20-bit 16-bit 14-bit 12-bit 10-bit 0.2 0.1 0.1 0.125 0.5 0.3 uniform (10-bit) uniform (20-bit) uniform (30-bit) farthest (10-bit) nearest (10-bit) 0.3 0.6 4 Influence of change-mining strategies. and kernels. We evaluated different classifiers and kernels (nearest neighbor, SVM with linear, sigmoid, polynomial, and RBF kernels). It can be seen that SVM with RBF kernel outperforms the other classifiers and kernels. Figure 8 shows a result of comparing different change mining strategies. We evaluated different change mining strategies (uniform with 10-bit, 20-bit, and 30-bit distance threshold, farthest, and nearest). It can be seen that uniform sampling with 10-bit distance threshold outperforms the other methods. The reason might be that the uniform sampling strategy tends to produce a more diverse set of positive examples than other strategies, and thus the resulted classifier exhibits adequate generalization capability. Figure 9 illustrates the result of evaluating the visibility analysis strategies. We evaluated different visibility analysis strategies (horizontal-vertical, horizontal, and none). It can be observed that the horizontal-vertical strategy outperforms the other two strategies when the parameter X is sufficiently marginal. Figure 11 illustrates examples of successful and failed change detection. Here, we used the abovementioned default settings. As illustrated, changes originating from moving objects such as cars and pedestrians are generally easy to detect owing to the fact that their visual appearances are significantly discriminative from other background objects such as roads and trees. However, the detection of moving objects is rendered a substantially challenging task when a similar moving object appears in the corresponding reference image also (Fig. 11 failure examples). Although spatial information (e.g., location and size) of such similar objects are generally dissimilar to that of the query object, they are ordinarily accepted as matching candidates of the query object because the search region is expanded to overcome coordinate transformation error (as explained in II-B). Other challenging cases include change objects such as boxes and tables (Fig. 11 failure examples) whose visual appearance 0.125 0.25 Fig. 10. 0.5 1 top-X (%) 2 4 Influence of vocabulary size. are significantly similar to background objects such as floors and walls. IV. C ONCLUSIONS We presented a change detection framework that realizes map compactness while maintaining detection efficiency. Rather than memorizing pre-trained classifiers, our ZSLbased approach has to memorize only the compact indexes to their training examples that are mined from EKB. Experimental results on place-specific object-level change classifiers have demonstrated high potential. The proposed algorithm is efficient and very simple to implement. It should therefore be convenient to integrate it into existing frameworks of change detection (e.g., change detection in 3D, stereo images) to enhance their compactness. R EFERENCES [1] N. Carlevaris-Bianco, A. K. Ushani, and R. M. Eustice, “University of michigan north campus long-term vision and lidar dataset,” The Int. Journal of Robotics Research, vol. 35, no. 9, pp. 1023–1035, 2016. [2] F. Pomerleau, P. Krüsi, F. Colas, P. Furgale, and R. Siegwart, “Longterm 3d map maintenance in dynamic environments,” in Proc. IEEE ICRA, 2014. [3] M. Fehr, M. Dymczyk, S. Lynen, and R. Siegwart, “Reshaping our model of the world over time,” in Proc. IEEE ICRA, 2016. [4] P. F. Alcantarilla, S. Stent, G. Ros, R. Arroyo, and R. Gherardi, “Streetview change detection with deconvolutional networks.” in Robotics: Science and Systems, 2016. [5] R. J. Radke, S. Andra, O. Al-Kofahi, and B. Roysam, “Image change detection algorithms: a systematic survey,” IEEE Trans. image processing, vol. 14, no. 3, pp. 294–307, 2005. [6] J. Košecka, “Detecting changes in images of street scenes,” in Proc. ACCV, 2012, pp. 590–601. [7] S. Stent, R. Gherardi, B. Stenger, and R. Cipolla, “Detecting change for multi-view, long-term surface inspection.” in BMVC, 2015. [8] L. Gueguen and R. Hamid, “Large-scale damage detection using satellite imagery,” in Proc. IEEE Conf. CVPR, 2015, pp. 1321–1328. [9] A. A. Nielsen, “The regularized iteratively reweighted mad method for change detection in multi-and hyperspectral data,” IEEE Trans. Image processing, vol. 16, no. 2, pp. 463–478, 2007. [10] F. Bovolo, L. Bruzzone, and M. Marconcini, “A novel approach to unsupervised change detection based on a semisupervised svm and a similarity measure,” IEEE Trans. Geoscience and Remote Sensing, vol. 46, no. 7, pp. 2070–2082, 2008. Fig. 11. Change detection examples. [11] L. Bruzzone and D. F. Prieto, “Automatic analysis of the difference image for unsupervised change detection,” IEEE Trans. Geoscience and Remote sensing, vol. 38, no. 3, pp. 1171–1182, 2000. [12] B. Yamauchi and P. Langley, “Place learning in dynamic real-world environments,” Proc. RoboLearn, vol. 96, pp. 123–129, 1996. [13] E. Gavves, T. Mensink, T. Tommasi, C. G. Snoek, and T. Tuytelaars, “Active transfer learning with zero-shot priors: Reusing past datasets for future tasks,” in Proc. IEEE ICCV, 2015, pp. 2731–2739. [14] C. H. Lampert, H. Nickisch, and S. Harmeling, “Attribute-based classification for zero-shot visual object categorization,” IEEE Trans. PAMI, vol. 36, no. 3, pp. 453–465, 2014. [15] K. Tanaka, “Cross-season place recognition using NBNN scene descriptor,” in Proc. IEEE/RSJ Int. Conf. IROS. [16] C. Cortes and V. Vapnik, “Support vector machine,” Machine learning, vol. 20, no. 3, pp. 273–297, 1995. [17] T. Cover and P. Hart, “Nearest neighbor pattern classification,” IEEE Trans. information theory, vol. 13, no. 1, pp. 21–27, 1967. [18] D. W. van de Wouw, G. Dubbelman, and P. H. de With, “Hierarchical 2.5-d scene alignment for change detection with large viewpoint differences,” IEEE Robotics and Automation Letters, vol. 1, no. 1, pp. 361–368, 2016. [19] A. Taneja, L. Ballan, and M. Pollefeys, “Geometric change detection in urban environments using images,” IEEE Trans. PAMI, vol. 37, no. 11, pp. 2193–2206, 2015. [20] J. P. Underwood, D. Gillsjö, T. Bailey, and V. Vlaskine, “Explicit 3d change detection using ray-tracing in spherical coordinates,” in Proc. IEEE ICRA, 2013, pp. 4735–4741. [21] W. Li, X. Li, Y. Wu, and Z. Hu, “A novel framework for urban change detection using vhr satellite images,” in Proc. ICPR, 2006. [22] S. Ren, K. He, R. Girshick, and J. Sun, “Faster r-cnn: Towards realtime object detection with region proposal networks,” IEEE Trans. PAMI, vol. 39, no. 6, pp. 1137–1149, 2017. [23] H. Andreasson, M. Magnusson, and A. Lilienthal, “Has somethong changed here? autonomous difference detection for security patrol robots,” in Proc. IEEE/RSJ Int. Conf. IROS, 2007, pp. 3429–3435. [24] P. Ross, A. English, D. Ball, B. Upcroft, G. Wyeth, and P. Corke, “Novelty-based visual obstacle detection in agriculture,” in Proc. IEEE ICRA, 2014, pp. 1699–1705. [25] S. Stent, R. Gherardi, B. Stenger, K. Soga, and R. Cipolla, “An imagebased system for change detection on tunnel linings.” in MVA, 2013. [26] T. Murase, K. Tanaka, and A. Takayama, “Change detection with global viewpoint localization,” in IAPR Asian Conf. Pattern Recognition, 2017. [27] X. Fei and K. Tanaka, “Unsupervised place discovery for placespecific change classifier,” CoRR, vol. abs/1706.02054, 2017. [Online]. Available: http://arxiv.org/abs/1706.02054 [28] K. Tanaka, Y. Kimuro, N. Okada, and E. Kondo, “Global localization with detection of changes in non-stationary environments,” in Proc. IEEE ICRA, vol. 2, 2004, pp. 1487–1492. [29] M. Ando, Y. Chokushi, K. Tanaka, and K. Yanagihara, “Leveraging image-based prior in cross-season place recognition,” in Proc. IEEE ICRA, 2015, pp. 5455–5461. [30] J. Yang, Y.-G. Jiang, A. G. Hauptmann, and C.-W. Ngo, “Evaluating [31] [32] [33] [34] [35] [36] [37] [38] bag-of-visual-words representations in scene classification,” in Proc. Int. W. multimedia information retrieval. ACM, 2007, pp. 197–206. E. Rublee, V. Rabaud, K. Konolige, and G. Bradski, “Orb: An efficient alternative to sift or surf,” in IEEE ICCV, 2011, pp. 2564–2571. R. Mur-Artal, J. M. M. Montiel, and J. D. Tardos, “Orb-slam: a versatile and accurate monocular slam system,” IEEE Tran. Robotics, vol. 31, no. 5, pp. 1147–1163, 2015. X. Fei, K. Tanaka, K. Inamoto, and G. Hao, “Unsupervised place discovery for visual place classification,” in IAPR Int. Conf. Machine Vision Applications, 2017, pp. 109–112. M.-M. Cheng, Z. Zhang, W.-Y. Lin, and P. Torr, “Bing: Binarized normed gradients for objectness estimation at 300fps,” in Proc. IEEE Conf. CVPR, 2014, pp. 3286–3293. R. Raguram, O. Chum, M. Pollefeys, J. Matas, and J.-M. Frahm, “Usac: a universal framework for random sample consensus,” IEEE Trans. PAMI, vol. 35, no. 8, pp. 2022–2038, 2013. J. Ma, J. Zhao, J. Tian, A. L. Yuille, and Z. Tu, “Robust point matching via vector field consensus,” IEEE Trans. Image Processing, vol. 23, no. 4, pp. 1706–1721, 2014. C. Elkan and K. Noto, “Learning classifiers from only positive and unlabeled data,” in Proc. ACM SIGKDD Int. Conf. Knowledge discovery and data mining, 2008, pp. 213–220. T. Joachims, “Svmlight: Support vector machine,” SVM-Light Support Vector Machine http://svmlight. joachims. org/, University of Dortmund, vol. 19, no. 4, 1999.
1cs.CV
arXiv:1603.06002v1 [cs.DS] 18 Mar 2016 A Message Passing Algorithm for the Problem of Path Packing in Graphs Patrick Eschenfeldt and David Gamarnik March 22, 2016 Abstract We consider the problem of packing node-disjoint directed paths in a directed graph. We consider a variant of this problem where each path starts within a fixed subset of root nodes, subject to a given bound on the length of paths. This problem is motivated by the socalled kidney exchange problem, but has potential other applications and is interesting in its own right. We propose a new algorithm for this problem based on the message passing/belief propagation technique. A priori this problem does not have an associated graphical model, so in order to apply a belief propagation algorithm we provide a novel representation of the problem as a graphical model. Standard belief propagation on this model has poor scaling behavior, so we provide an efficient implementation that significantly decreases the complexity. We provide numerical results comparing the performance of our algorithm on both artificially created graphs and real world networks to several alternative algorithms, including algorithms based on integer programming (IP) techniques. These comparisons show that our algorithm scales better to large instances than IP-based algorithms and often finds better solutions than a simple algorithm that greedily selects the longest path from each root node. In some cases it also finds better solutions than the ones found by IP-based algorithms even when the latter are allowed to run significantly longer than our algorithm. 1 Introduction. In this paper we consider the problem of packing node-disjoint directed paths into a directed graph, with each path starting within a designated subset of “root” nodes. For a given maximum path length, our objective is to include as many nodes as possible in paths. This 1 problem is motivated by the kidney exchange problem (KEP) studied in [2], in which donors and recipients must be matched together to maximize the number of donations. In some situations these donations are performed in chains starting from a lone donor, and logistical concerns encourage limiting the length of chains. This problem also has other potential applications such as coordinating chained transactions, and is an interesting and hard combinatorial optimization problem in general. We present a new algorithm for this problem based on the message passing/belief propagation technique (BP for short). This algorithm depends on a new representation of the problem that allows us to create a graphical model which embeds the optimization problem. After describing this representation we will show that a direct application of standard BP results in poor scaling, so we provide an efficient implementation that provides significant scaling advantages. Letting n be the number of nodes in the graph, K be the maximum path length, and ∆ be the maximum degree, the efficient implementation can perform a full iteration of the algorithm in O (n∆K) computations, while  a direct implementation of belief propagation requires O n2 ∆6 K 2 . We compare our algorithm to several alternatives and show that it consistently scales well and often finds better solutions than other fast algorithms. In particular, we compare our efficiently implemented BP to a simple greedy algorithm, called Greedy from now on for simplicity, and an existing Integer Programming (IP) algorithm used in [2] which we call KEP. The Greedy algorithm which we consider makes greedy selections only between constructed paths and not during the construction of individual paths, as at every root node it searches exhaustively for the longest path which can be added to the solution starting from that node. We also use our new representation of the problem to derive a secondary novel algorithm based on IP, which we call Parent-Child-Depth (PCD). Comparisons are made on a variety of randomly created graphs as well as on several real world networks. Our random graphs are generated with each edge existing independently with probability c/n for various values of c. We find that for n = 1000 and n = 10000 with a path length bound of 5 nodes, with 10% to 25% of nodes designated as root nodes, and c between 2 and 5, our message passing algorithm consistently finds more nodes than Greedy while running in comparable time. In many cases BP and Greedy run significantly faster than the IP algorithms, which are cut off after a time limit if they have not yet found the optimal solution, and in several of these cases BP also finds solutions with more nodes than any other algorithm. We find that BP also performs well relative to alternative algorithms when the path length bound is increased to 10 or 15 nodes. In the regime where paths as long as 15 nodes are allowed, PCD often finds the optimal solution in reasonable time while 2 KEP almost never does. We also provide numerical results for real world networks, with sizes ranging from 5518 nodes to 260982 nodes. In all but the smallest network the IP algorithms produce no useful results, and in most graphs BP finds better solutions on average with respect to a random choice of root nodes than Greedy, while running in comparable time. Our approach to this problem is motivated by previous work applying message passing techniques to the problem of prize-collecting Steiner trees (PCST) done by Bayati, et. al. [4] (also used by Bailly, et. al. [3]). In particular, the PCST problem does not have a natural representation as a graphical model so the authors in [4] design a new representation of the problem that leads to a graphical model and then show how to implement BP on that model. This paper uses a similar approach for the path packing problem. In another relevant paper, Altarelli, et. al. [1] apply message passing techniques to edge-disjoint paths. They directly derive a message passing algorithm for general graphs from an iterative cost calculation scheme valid for trees and apply it to locally tree-like graphs and find that their algorithm performs better in terms of paths found than various alternatives. Unlike this work, in our model paths may end at any non-root node (as we do not consider a lone root node to constitute a path in itself, every path must include at least one edge and thus one non-root node). Another example of applying a message passing approach while making major modifications to standard methods is [5]. The authors introduce a new type of graphical model, called a memory factor network, along with a message passing style algorithm to perform inference on such a model. Designing the message passing algorithm to match the structure of the problem provides efficiency advantages over variants of belief propagation and also provides convergence guarantees. The remainder of this paper is organized as follows: In section 2 we describe the problem formulation, in section 3 we detail the core of our message passing algorithm, in section 4 we detail our method for efficiently implementing this algorithm, in section 5 we discuss how to translate the result of the message passing into a solution to the original problem, in section 6 we discuss alternative algorithms, and in section 7 we provide numerical results comparing our algorithm to these alternatives. 2 Problem setup. The problem description consists of a directed graph G with node set [n] = {1, 2, . . . , n}, an edge set E, and a positive integer K. Let E ′ be 3 the undirected version of the edge set of G. We assume that G contains no isolated nodes, so for every i ∈ [n] there exists some j ∈ [n] such that (i, j) ∈ E ′ . The nodes [n] are partitioned into subsets U and V , and the edges are elements of U × V and V × V only. In particular, no edges start in V and end in U . We define a directed simple path in a directed graph as a sequence of distinct nodes {i1 , i2 , . . . , ik } such that (il , il+1 ) ∈ E for all l = 1, . . . , k − 1. All paths considered in this paper will be directed simple paths. For a path P = {i1 , . . . , ik } we define the length of P , denoted |P |, to be the number of nodes in the path, namely k. Our goal is to find a collection P = {P1 , . . . , Pk } of node-disjoint paths with each path Pj starting with a node in U and each having length at most K. Specifically, we define X v(P) = |P | P ∈P to be the count of the nodes in a collection of paths. Let Π be the set of feasible collections P. Then our problem is max v(P). P∈Π (1) We now introduce a formalization for the problem (1) that is conducive to message passing. We will use special symbols ∗ and • to represent certain relationships to be described below. We will also introduce the notation ∂i to represent the set of nodes adjacent to the node i in the undirected version of the graph G. That is, ∂i is the set of nodes j ∈ [n] such that (i, j) ∈ E or (j, i) ∈ E. We also let ∂ X i = ∂ i ∩ X and let ∂i \ j stand for the more formally correct ∂i \ {j}. For each node i ∈ [n], we introduce variables (di , pi , ci ) where di ∈ [K] ∪ {∗}, pi ∈ ∂i ∪ {∗, •}, ci ∈ ∂ V i ∪ {∗, •}. These variables intend to represent the depth of the node (di ), its parent (pi ), and its child (ci ) in a given solution. The special value ∗ indicates that the node does not participate in a path, in which case we will have di = pi = ci = ∗. The special value • indicates that the node is at one end of a path. Thus if pi = • this means node i does not have a parent and thus starts a path, whereas if ci = • node i does not have a child and thus ends a path. Note that if ci is a node it must be a node in V because nodes in U must either act as the root of a path or not participate in a path. To formulate the optimization problem, we need to define a feasible set and an objective function. We begin with the feasible set. We first define a function that acts as an indicator for the consistency of the variables (di , pi , ci ) at a single node i. For i ∈ [n], di ∈ [K] ∪ {∗}, 4 pi ∈ ∂i ∪ {∗, •}, ci ∈ ∂ V i ∪ {∗, •}, let fi (di , pi , ci ) = 1{di = ci = pi = ∗} △ + 1{pi = •, ci 6∈ {∗, •}, di = 1, i ∈ U } + 1{pi 6∈ {∗, •}, ci 6∈ {∗, pi }, di 6∈ {∗, 1}, i ∈ V }. (2) (3) (4) Term (2) is the case in which node i does not participate, term (3) is the case in which node i is the root of a path, and term (4) is all cases where node i participates in a path but is not the root. Note that these three cases are mutually exclusive, so fi is an indicator function. It is equal to zero if the variables at node i are not consistent with any global configuration (d, p, c) = (dj , pj , cj )j∈[n] representing a set of valid paths for the graph G, and equal to one otherwise. For each pair of nodes i and j that are adjacent in the undirected version of G, we define a function gij (di , pi , ci , dj , pj , cj ) of the variables (di , pi , ci , dj , pj , cj ) for the nodes i and j which is an indicator that these variables are consistent with each other and the existence or nonexistence of the edges (i, j) and (j, i). Namely, they correspond to a locally valid configuration, so if, e.g., node i reports that its parent is node j, then the edge (j, i) exists, node j reports that its child is node i, and we have di = dj + 1. Formally, for i ∈ [n], j ∈ ∂i, di ∈ [K] ∪ {∗}, pi ∈ ∂i ∪ {∗, •}, ci ∈ ∂ V i ∪ {∗, •}, dj ∈ [K] ∪ {∗}, pj ∈ ∂j ∪ {∗, •}, cj ∈ ∂ V j ∪ {∗, •}, let △ gij (di , pi , ci , dj , pj , cj ) = 1{pi = j, cj = i, pj 6= i, ci 6= j, (j, i) ∈ E, di = dj + 1} + 1{pj = i, ci = j, pi 6= j, cj 6= i, (i, j) ∈ E, dj = di + 1} + 1{pi 6= j, cj 6= i, pj 6= i, ci 6= j}. (5) (6) (7) Lines (5) and (6) capture the cases where j is the parent of i and i is the parent of j, respectively, and enforce the relationships that must occur in those cases. Line (7) captures all cases where there is no direct connection between nodes i and j. All three cases are mutually disjoint, so gij is an indicator function. In summary, gij is equal to one if parent/child relationships agree, the edges (i, j) and (j, i) are used only in the appropriate directions, and depth relationships are consistent. Finally we define a indicator function for variable consistency at both the node and edge level, which we define for each i ∈ [n], j ∈ ∂i as △ hij (di , pi , ci , dj , pj , cj ) = gij (di , pi , ci , dj , pj , cj )fi (di , pi , ci )fj (dj , pj , cj ). (8) With this definition of hij , we can define the set △ M = (d, p, c) : hij (di , pi , ci , dj , pj , cj ) = 1 ∀ i ∈ [n], j ∈ ∂i (9) 5 which will serve as the feasible set for our optimization. Note that each collection P ∈ Π of node disjoint paths is associated with a unique assignment of variables {(di , pi , ci )}i∈[n] , which we will denote by (d(P), p(P), c(P)). In fact the converse is also true: Proposition 1. For every (d, p, c) ∈ M there exists a unique P ∈ Π such that (d, p, c) = (d(P), p(P), c(P)). Proof. Given a set of variables (d, p, c) ∈ M , recall that for every i ∈ [n] we have fi (di , pi , ci ) = 1 and for every j ∈ ∂i we have gij (di , pi , ci , dj , pj , cj ) = 1. We will construct a feasible set of node-disjoint paths by the following procedure. Find the set of nodes i such that di = 1, which we denote R. If R is empty then for every i ∈ U we must be in case (2) because case (3) is excluded. Thus di = pi = ci = ∗. For i ∈ V , by (2) and (4) we either have di = ∗ or di > 1. But by (5) di = 2 only if dj = 1 for some j ∈ ∂i. This implies that di 6= 2 for any i ∈ V . Repeating this argument implies di 6= l for any l ∈ [K], so we conclude di = ∗. Then (2) implies pi = ci = ∗. Thus for every node i ∈ [n] we have di = pi = ci = ∗, so we let P = ∅ because di (∅) = pi (∅) = ci (∅) = ∗ for all i ∈ [n]. Otherwise, if R is nonempty, we will construct one path for each i ∈ R. Consider some i1 ∈ [n] such that di1 = 1. By (3) we must have i1 ∈ U , so it will be valid to start a path at i1 . Again by (3) we know ci1 6= ∗, •, so ci1 = i2 for some i2 ∈ ∂ V i. By (6) with i = ii and j = i2 we have di2 = di1 + 1 = 2, (i1 , i2 ) ∈ E, pi2 = i1 and ci2 6= i1 . Thus it is valid to start our path with the node sequence {i1 , i2 }. If ci2 = • then we end this path and add P = {i1 , i2 } to P. If ci2 6= • then by di2 = 2 and (4) we have ci2 = i3 for some i3 ∈ ∂ V i2 . By (6) with i = i2 and j = i3 we have di3 = 3, (i2 , i3 ) ∈ E, pi3 = i2 , and ci3 6= i2 . Thus it is valid to start our path with the node sequence {i1 , i2 , i3 }. If ci3 = • we end this path and add it to P. Otherwise we iterate, because (4) implies ci3 = i4 for some i4 ∈ ∂ V i3 . In the generic step, we are considering cil−1 = il for some il ∈ ∂ V il−1 and we have dil−1 = l − 1. Then (6) for i = il−1 and j = il implies dil = l, (il−1 , il ) ∈ E, pil = il−1 and cil 6= il−1 . If cil = • we terminate the path and add P = {i1 , i2 , . . . , il } to P. Otherwise there exists some il+1 ∈ ∂ V il such that cil = il+1 so we iterate. This process is guaranteed to terminate because dil = l and dil ≤ K. Once we have added the path starting at node i1 we repeat the process for each node i with di = 1. To see that (d(P), p(P), c(P)) = (d, p, c) after this process, first consider a node j which does not participate in any path in P. We have dj (P) = pj (P) = cj (P) = ∗ so we want to show dj = pj = cj = ∗. Because every node i with di = 1 starts a path in the above procedure, we must have dj 6= 1. Suppose dj = l for some l ∈ {2, . . . , K}. Then 6 (4) implies pj 6= {∗, •} so there exists some i ∈ ∂j such that pj = i and (6) implies di = l − 1. If i participates in a path in P then our above procedure would also include j. If i does not participate then we have found a non-participating node with depth l − 1. Thus if there are were any non-participating j with dj ∈ [K] there would be a nonparticipating j with dj = 1, but we have already shown there is no such j. We conclude that dj = ∗ for all non-participating dj . Then (2) implies pj = cj = ∗, as desired. Next consider a node il which participates in a path in P at depth l. If l = 1 then il starts a path and has no parent and (by the above procedure) has child cil . Thus we have dil (P) = 1, pil (P) = •, and cil (P) = cil . The only nodes il that start paths are those with dil = 1 and (3) implies pil = •, so we have (dil (P), pil (P), cil (P)) = (dil , pil , cil ), as desired. If l > 1 then il has dl = l, parent il−1 = pil (as noted during the procedure above) and either ends the path or has a child il+1 = cil . By the procedure the path ends only if cil = •, so we have cil (P) = • = cil . Thus we have (dil (P), pil (P), cil (P)) = (dil , pil , cil ), as desired. If the path continues it continues to il+1 = cil so cil (P) = cil , and again we have (dil (P), pil (P), cil (P)) = (dil , pil , cil ), as desired. Because we have a bijection between feasible collections of nodedisjoint paths in G and the set M , we can treat M as the feasible region for our optimization problem. To define our objective, we define the function ( 0 di = pi = ci = ∗ △ η(di , pi , ci ) = (10) 1 otw which assigns value 0 to the case where the node i does not participate in a path and value 1 to all other cases. We further define the function △ X η(di , pi , ci ) (11) H(d, p, c) = i∈[n] that sums the value of each node across the entire graph. Note that when applied to a valid (d, p, c), i.e. an element of the feasible set M , H simply counts the number of nodes of the graph which participate in some path. Thus we can reformulate the optimization problem (1) as max (d,p,c)∈M 3 H(d, p, c). (12) Algorithm. Belief propagation algorithms are used to estimate either the marginal distributions of variables or the solution to the maximum a posteriori 7 (MAP) problem in graphical models. We will use the framework corresponding to the latter option. The MAP solution for a probability distribution is the most likely joint assignment of all the variables in the distribution. To utilize this approach, we transform the optimization problem (12) into a problem of finding a MAP assignment for a probability distribution. To achieve this transformation we introduce a corresponding undirected graphical model. A maximum likelihood assignment of all variables in this distribution will be an optimal solution to (12). To create our undirected graphical model, we introduce node potentials ( e−β di = pi = ci = ∗ φi (di , pi , ci ) = (13) 1 otw where β > 0 is a system parameter to be chosen. We use hij as defined in (8) as our edge potentials. Together these define the probability distribution P Y Y hij (di , pi , ci , dj , pj , cj ). φi (di , pi , ci ) P(d, p, c) ∝ (i,j)∈E ′ i∈[n] This probability distribution assigns zero probability to any global configuration (d, p, c) which does not correspond to an element of M , and among positive probability configurations it assigns higher probability to those which include more nodes. We can now solve our original optimization problem by solving the MAP problem on this undirected graphical model. Note that we may have multiple solutions. The core component of the algorithm is the set of messages, which we define for each ordered pair (j, i) with j ∈ [n] and i ∈ ∂j, representing the message from node j to node i. Thus each undirected edge (i, j) ∈ E ′ is associated with two sets of messages, representing the information sent from i to j and from j to i, respectively. The message from j to i is denoted bj→i (di , pi , ci ) for all values of di , pi , and ci in the previously specified ranges di ∈ [K] ∪ {∗}, pi ∈ ∂i ∪ {∗, •}, ci ∈ ∂ V i ∪ {∗, •}. Our approach to this problem will be to implement parallel belief propagation in the standard Min-Sum form (which can be derived from the Max-Product form by taking the negative log of all messages; see, e.g., [6] or [8]), with messages sent according to the update rule  − log φj (dj , pj , cj ) bj→i (di , pi , ci ) = min (dj ,pj ,cj ) − log hij (di , pi , ci , dj , pj , cj )  X bk→j (dj , pj , cj ) . + k∈∂j\i 8 (14) We use the convention − log(0) = ∞. In other words, if hij = 0 for some configuration then that configuration will not be included in the minimization. Otherwise the log(hij ) term contributes log(1) = 0. Because our graphical model potentially has cycles, we must compute these messages iteratively from some starting values, which we set to be bj→i (di , pi , ci ) = 1 for all j ∈ [n], i ∈ ∂j and all values of di , pi , ci , with the goal of finding a fixed point solution. From the messages we can compute the max-marginals at each node as ! X p̄i (di , pi , ci ) = exp log φi (di , pi , ci ) − bk→i (di , pi , ci ). (15) k∈∂i These max-marginals are, according to the Belief Propagation approach, intended to approximate the probability of a maximum-probability configuration of the whole system given the arguments di , pi , ci are fixed. As such, they can be used in reconstructing the maximum global configuration. The non-uniqueness of solutions to (12) complicates this, however, which we discuss below in section 5. The update rule (14) and max-marginal equation (15) characterize the entirety of our algorithm. For some a priori maximum number of iterations T and initial messages b0j→i (di , pi , ci ) = 1 for all j ∈ [n], i ∈ ∂j and all values of di , pi , ci we compute bt from bt−1 according to (14) for t ∈ [T ]. If the messages reach a fixed point, i.e. bt = bt+1 for some t < T , we halt iterations at that point. Furthermore, for any 0 < t ≤ T we can use bt and (15) to compute estimates of the max-marginals for any node in any configuration at that step of the algorithm.   P In this form, the number of messages is O K i∈[n] ∆3i where ∆i = |∂i| is the degree of node i in the undirected graph. Indeed, for each node i ∈ [n] there are ∆i incoming messages, and for each message there are K choices of di and O ∆2i choices of (pi , ci ) that define messages. For ∆ = maxi∈[n] ∆i the number of messages is  O n∆3 K . (16)  O n2 ∆6 K 2 . (17) At each iteration of the algorithm a message from j to i must be updated by computing a minimization over all O K∆2j choices of the variables (dj , pj , cj ). The argument of the minimization includes a sum over the neighbors of j, which can be performed once for each j ∈ [n] for a total computational costO (n) per iteration. a  P Thus P full iteration of all messages requires O nK 2 i∈[n] ∆3i j∈∂i ∆2j computations. For ∆ = maxi∈[n] ∆i , the number of computations is 9 Rather than implementing this scheme directly we will instead introduce a more efficient representation of the messages, which is described in the next section. 4 Efficient representation. In this section we introduce a more efficient representation of the message passing algorithm described above. This representation will re quire only O (nK∆) messages compared to O nK∆3 for the original description (14), and will require O (nK∆) computations to be per formed per iteration compared to O n2 K 2 ∆6 computations for the original representation. Before defining the messages for the new representation, we now introduce an intermediate set of messages and rewrite (14) as two steps, with bj→i (di , pi , ci ) = min dj ,pj ,cj s.t. hij (di ,pi ,ci ,dj ,pj ,cj )=1 ψj→i (dj , pj , cj ), ψj→i (dj , pj , cj ) = − log φj (dj , pj , cj ) + X bk→j (dj , pj , cj ). (18) (19) k∈∂j\i If the set over which we are minimizing in (18) is empty we define the minimum to be ∞. The messages bj→i (di , pi , ci ) evolve exactly as they do in (14). We will define a collection of messages in terms of ψ and b, intended as an efficient representation of the message passing algorithm, which we call the A-H form. After defining the messages we will provide the rules by which these messages are updated. We will also obtain algorithmic complexity bounds for our representation, which are summarized in Theorem 1. Then we will demonstrate in Theorem 2 the equivalence of the A-H form algorithm to the original description (14) by showing that iterating the A-H form allows us to compute the maxmarginals (15) as if we had done the iterations in the original form (14). This theorem will be proved in two parts, with Lemma 1 establishing a way to write all original messages bj→i (di , pi , ci ) in terms of A-H form messages and Lemma 2 establishing how to update the A-H form messages. 4.1 Message definitions. The messages to be defined fall into three categories based on the type of the node which sends the message, and the type of the node which receives it. We first define messages sent from a non-root node j ∈ V to another non-root node i ∈ V . Next we will describe messages sent 10 from a non-root node j ∈ V to a root node u ∈ U , and finally we describe messages sent from a root node u ∈ U to a non-root node i∈V. For (i, j) ∈ E ′ , we define ( ∞ (i, j) 6∈ E △ δi→j = 0 (i, j) ∈ E. Fix (i, j) ∈ E ′ such that i, j ∈ V . • For 3 ≤ d ≤ K, let △ Adj→i = δi→j + min ψj→i (d, i, cj ) cj 6=∗,i X bk→j (d, i, cj ). = δi→j + min cj 6=∗,i (20) (21) k∈∂j\i Note that − log φj (d, i, cj ) = 0 for cj 6= ∗, so ψj→i (d, i, cj ) = P k∈∂j\i bk→j (d, i, cj ). • For 2 ≤ d ≤ K − 1, let △ d Bj→i = δj→i + min ψj→i (d, pj , i) pj 6=∗,i,• X bk→j (d, pj , i). = δj→i + min pj 6=∗,i,• k∈∂j\i • For 2 ≤ d ≤ K, let △ d Fj→i = min ψj→i (d, pj , cj ) pj 6=∗,i,• cj 6=∗,i pj 6=cj X = min pj 6=∗,i,• cj 6=∗,i k∈∂j\i pj 6=cj (22) bk→j (d, pj , cj ). • Let △ Gj→i = ψj→i (∗, ∗, ∗) X bk→j (∗, ∗, ∗). =β+ (23) k∈∂j\i • Let   △ d . Hj→i = min Gj→i , min Fj→i 2≤d≤K Fix (j, u) ∈ E ′ such that j ∈ V and u ∈ U . 11 (24) • Let △ Aj→u = min ψj→u (2, u, cj ) cj 6=u,∗ X bk→j (2, u, cj ). = min cj 6=u,∗ k∈∂j\u • For 2 ≤ d ≤ K, let △ d = Fj→u = min ψj→u (d, pj , cj ) pj 6=∗,u,• cj 6=∗,u pj 6=cj X min pj 6=∗,u,• cj 6=∗,u k∈∂j\u pj 6=cj bk→j (d, pj , cj ). • Let △ Gj→u = ψj→u (∗, ∗, ∗) X bk→j (∗, ∗, ∗). =β+ k∈∂j\u • Let   △ d . Hj→u = min Gj→u , min Fj→u 2≤d≤K Fix (u, i) ∈ E ′ such that u ∈ U and i ∈ V . • Let △ Bu→i = ψu→i (1, •, i) X bk→u (1, •, i). = k∈∂u\i • Let △ min ψu→i (1, •, cu ) X bk→u (1, •, cu ). = min Fu→i = cu 6=i,∗,• cu 6=i,∗,• k∈∂u\i • Let △ Gu→i = ψu→i (∗, ∗, ∗) X bk→u (∗, ∗, ∗). =β+ k∈∂u\i 12 • Let △ Hu→i = min {Gu→i , Fu→i } Note that when i ∈ U or j ∈ U there are different numbers of messages in each direction. To refer to the set of messages from one node to another we define for (i, j) ∈ E ′   K−1 3 K 2 2 K  i, j ∈ V j→i , . . . , Fj→i , Gj→i , Hj→i  Aj→i , . . . , Aj→i , Bj→i , . . . , Bj→i , F  2 K Xj→i = j ∈ V, i ∈ U Aj→i , Fj→i , . . . , Fj→i , Gj→i , Hj→i   (Bj→i , Fj→i , Gj→i , Hj→i ) j ∈ U, i ∈ V. (25) Note that in all cases the number of messages from i to j is O (K). 4.2 Update rules and the complexity of the A-H form. The iteration update rules for these new messages are listed in Tables 1-3. The derivation of these update rules from the definitions of the messages is given in the proof of Theorem 2. These update rules allow us to provide complexity bounds for the system: Theorem 1. The A-H form has a total of O (n∆K) messages per iteration. Each iteration requires a total of O (n∆K) computations to update the entire system. Remark. Recall from (16) that the original form (14) has a total of  O n∆3 K messages, while by Theorem 1 the A-H form has O (n∆K) total messages. To perform aniteration of the system, the original form (14) requires O n2 ∆6 K 2 computations by (17), while the A-H form requires only O (n∆K). Proof of Theorem 1. For each undirected edge, the A-H form has O (K) messages, so the total number of messages is O (|E ′ |K) = O (n∆K), as desired. In performing an iteration of the A-H form we proceed node-bynode. As we will show below, at a node j we will perform  j)  P O (K∆ total computations. This implies that we require O K j∈[n] ∆j = O (n∆K) total computations for a full iteration of the A-H form, as claimed. We now provide more detail on the computations required per node j. We consider the case j ∈ V ; if j ∈ U the analysis is similar. We will also focus our attention on the most complex message to compute, 13 Adj→i = δi→j + X Hk→j k∈∂j\i AK j→i = δi→j + X    d+1 + min 0, min Ak→j − Hk→j k∈∂ V j\i Hk→j k∈∂j\i 2 Bj→i = δj→i + X Hk→j + min (Bw→j − Hw→j ) X Hk→j + min w∈∂ U j k∈∂j\i d Bj→i = δj→i + k∈∂ V j\i k∈∂j\i 2 Fj→i = X = w∈∂ U j X Hk→j + min X Hk→j + min l∈∂ V j\i k∈∂j\i K Fj→i = k∈∂j\i Gj→i = β +  Hk→j + min (Bw→j − Hw→j ) + min 0, min k∈∂j\i d Fj→i   d−1 − Hk→j Bk→j X l∈∂ V j\i   d−1 Bl→j  − Hl→j + min 0, K−1 − Hl→j Bl→j k∈∂ V j\i min A3k→j k∈∂ V j\{i,l}  − Hk→j Ad+1 k→j  Hk→j Hj→i = min Gj→i , min 2≤d≤K d Fj→i  Table 1: Messages from j ∈ V to i ∈ V , for (i, j) ∈ E ′ and 3 ≤ d ≤ K − 1 14  − Hk→j k∈∂j\i    Aj→u = X  Hk→j + min 0, min k∈∂j\u 2 Fj→u = X Hk→j + X Hk→j X Hk→j k∈∂j\u d Fj→u = k∈∂j\u K Fj→u = k∈∂j\u Gj→u = β + X k∈∂ V j A3k→j − Hk→j   min (Bw→j − Hw→j ) + min 0, min w∈∂ U j\u k∈∂ V j A3k→j − Hk→j      d+1 d−1 + min Bl→j − Hl→j + min 0, min Ak→j − Hk→j l∈∂ V j k∈∂ V j\l   K−1 − Hl→j + min Bl→j l∈∂ V j Hk→j k∈∂j\u   Hj→u = min Gj→u , min 2≤d≤K d Fj→u  Table 2: Messages from j ∈ V to u ∈ U , for (u, j) ∈ E ′ and 3 ≤ d ≤ K − 1 Bu→i = X Hk→u k∈∂u\i Fu→i = X Hk→u + min (Ak→u − Hk→u ) k∈∂u\i Gu→i = β + X k∈∂u\i Hk→u k∈∂u\i Hu→i = min (Gu→i , Fu→i ) Table 3: Messages from u ∈ U to i ∈ V , for (u, i) ∈ E ′ 15 d which is Fj→i for 3 ≤ d ≤ K − 1. We will require O (∆j ) computations to compute this for all i ∈ ∂j and thus O (K∆j ) computations for all messages sent from j because there are O (K) messages from j → i for each i ∈ ∂j. d To compute Fj→i it is necessary to compute two values: X Hk→j , k∈∂j\i and   d−1 Bl→j − Hl→j + min 0, min l∈∂ V j\i min k∈∂ V j\{i,l}  Ad+1 k→j − Hk→j  . (26) Rather than compute these directly for each i, we first compute X Hk→j , (27) k∈∂j select the three neighbors l ∈ ∂ V j with the smallest values of d−1 Bl→j − Hl→j , (28) and select the three neighbors l ∈ ∂ V j with the smallest values of Ad+1 l→j − Hl→j . (29) We also record the values of (28) and (29) for the nodes we record. Once we have these quantities, for eachP i ∈ ∂j we can compute d Fj→i in O (1) computations. To compute k∈∂j\i Hk→j we simply subtract Hi→j from (27). To compute (26) we pick l and k according to the minimum values we have recorded, subject to the constraints that l 6= i, k 6= i, and l 6= k. These constraints are the reason we record three minimizing values, as the first two choices for either l or k may be eliminated by matching i or the other choice. For a given d i ∈ ∂j we compute Fj→i in O (1) computations so computing all the d F messages sent out from j requires O (∆j ) computations. All of the other messages are computed using similar patterns and there are O (K) of them so a total of O (K∆j ) total computations are required to compute all the messages sent out from j. 4.3 Initialization and termination. The equations in Tables 1-3 collectively define update rules for our 0 algorithm. To initialize the system we set Xj→i = 1 for all (i, j) ∈ E ′ , 0 by which we mean we set each element of Xj→i to 1. Given some a priori bound T on the number of iterations, we then compute X t from X t−1 for t ∈ [T ] according to the update rules in Tables 1-3. If the messages reach a fixed point with X t = X t+1 for some t < T we halt the algorithm. 16 4.4 Validity of the A-H Form. Identities relating original form messages bj→i (di , pi , ci ) to A-H form messages for various choices of di , pi , and ci are given in Tables 4-6. It can be checked that for any choice of (di , pi , ci ) that does not appear in a table we have bj→i (di , pi , ci ) = ∞ by (18) because no choice of (dj , pj , cj ) can satisfy hij (di , pi , ci , dj , pj , cj ) = 1. The validity of these identities given the definitions of the A-H form variables is proved in Lemma 1 below. To use the original form (14) to find solutions to (12) we need to compute the max-marginals (15) for different values of (di , pi , ci ) from the messages bk→j (dj , pj , cj ). Specifically, we need to find the choices of (di , pi , ci ) that maximize p̄i (di , pi , ci ). Thus to show that we can iterate the A-H form to find the same approximate solutions we would find by iterating the original form (14) we prove that the max-marginal can be computed from the A-H form. In particular, we define Definition 1. For node i ∈ [n], let ρi be any real function of AH variables {Xj→i }j∈∂i defined by substituting for bk→j (dj , pj , cj ) in (15) according to the identities represented by Tables 4-6. We prove the following: Theorem 2. For all (j, i) ∈ E ′ , let the original form be initialized with b0j→i (di , pi , ci ) = 1 for all (di , pi , ci ) and let the A-H form be initialized 0 with Xj→i = 1. Then for each i ∈ [n], di ∈ [K] ∪ {∗}, pi ∈ ∂i ∪ {∗, •}, V ci ∈ ∂ i ∪ {∗, •} and for 0 < t ≤ T ,  t }j∈∂i p̄i (di , pi , ci ) = ρi {Xj→i when both sides are computed with appropriate messages btj→i and t Xj→i updated t times according to (14) and Tables 1-3, respectively. We will use two lemmas to prove this theorem: Lemma 1. The identities described in Tables 4-6 hold. Proof. Fix i, j ∈ V . We focus on two representative messages, namely Adj→i for 3 ≤ d ≤ K − 1 and Hj→i . In the first example we will prove the fifth identity of Table 4 and in the second will prove the sixth. The other identities described in Table 4 and all identities described in Tables 5-6 are proved similarly so we omit the details. We will first show that the fifth identity of Table 4 holds. Namely, for 3 ≤ d ≤ K − 1 and p ∈ ∂ V i \ j we will show bj→i (d, p, j) = Ad+1 j→i . 17 (30) di ∗ 2 2 3≤d≤K −1 3≤d≤K −1 3≤d≤K −1 K K pi ∗ p ∈ ∂U i p ∈ ∂U i j p ∈ ∂V i \ j p ∈ ∂V i \ j j p ∈ ∂V i \ j ci ∗ j  V c ∈ ∂ i \ j  ∪ {•} c ∈ ∂ V i \ j ∪ {•} j  V c ∈ ∂ i \ j ∪ {•} • • bj→i (di , pi , ci ) Hj→i A3j→i Hj→i d−1 Bj→i Ad+1 j→i Hj→i K−1 Bj→i Hj→i Table 4: Classes of bj→i messages for i, j ∈ V . du ∗ 1 1 pu ∗ • • cu ∗ j  c ∈ ∂V u \ j bj→u (du , pu , cu ) Hj→u Aj→u Hj→u Table 5: Classes of bj→u messages for j ∈ V , u ∈ U . di ∗ 2 2 3≤d≤K −1 K pi ∗ u p ∈ ∂U i \ u p ∈ ∂V i p ∈ ∂V i ci ∗ c ∈ ∂ V i∪ {•} c ∈ ∂V i ∪  {•} c ∈ ∂ V i \ j ∪ {•} • bu→i (di , pi , ci ) Hj→i Bu→i Hu→i Hu→i Hu→i Table 6: Classes of bu→i messages for u ∈ U , i ∈ V . 18 Plugging di = d, pi = p, and ci = j into (18) gives us bj→i (d, p, j) = min dj ,pj ,cj s.t. hij (d,p,j,dj ,pj ,cj )=1 ψj→i (dj , pj , cj ) (31) Suppose (i, j) 6∈ E. Then hij (d, p, j, dj , pj , cj ) = 0 for any choice of dj , pj , cj and thus bj→i (d, p, j) = ∞. By (20) we have Ad+1 j→i = ∞, so d+1 bj→i (d, p, c) = Aj→i , as desired. Now suppose (i, j) ∈ E. We now use hij (d, p, j, dj , pj , cj ) = 1 to infer information about dj , pj , cj . From (6) we must have dj = d + 1, pj = i, and cj 6= i. Then (4) further implies cj 6= ∗. Substituting these facts into (31) shows bj→i (d, p, j) = min ψj→i (d + 1, i, cj ). cj 6=∗,i Observe that because δi→j = 0 the right hand is the definition of Ad+1 j→i as given in (20), so we conclude bj→i (d, p, j) = Ad+1 j→i , as desired. Now we will show the sixth identity of Table 4 holds. Namely, for 3 ≤ d ≤ K − 1, p ∈ ∂ V i \ j, and c ∈ (∂ V i \ j) ∪ {•}, we will show bj→i (d, p, c) = Hj→i . Plugging di = d, pi = p, and ci = c into (18) gives us bj→i (d, p, c) = min dj ,pj ,cj s.t. hij (d,p,c,dj ,pj ,cj )=1 ψj→i (dj , pj , cj ). We now want to break the minimization into cases based on how we satisfy hij (d, p, c, dj , pj , cj ) = 1. First observe that p 6= j and c 6= j implies we must be in case (7), which implies pj 6= i and cj 6= i. Then there are two possible cases for how to satisfy fj (dj , pj , cj ) = 1. First we can choose (2) and let dj = pj = cj = ∗. Otherwise we are in (4) so we have dj = d′ for some 2 ≤ d ≤ K, pj 6∈ {∗, •} and cj 6∈ {∗, pj }. Combining these cases implies           ′ ψ (d , p , c ) . bj→i (d, p, c) = min ψj→i (∗, ∗, ∗), min min j→i j j   2≤d′ ≤K pj 6=∗,i,•     c = 6 ∗,i j   pj 6=cj Observe that the right hand side contains the definitions of Gj→i from d′ (23) and Fj→i from (22), so we have   d′ = Hj→i , (32) bj→i (d, p, c) = min Gj→i , min F j→i ′ 2≤d ≤K 19 as desired, where the last step is applying the definition of Hj→i from (24). Lemma 2. The relations in Tables 1-3 for updating A-H form messages are valid. Proof. We will show how to derive one representative update equation, namely    X , (33) Ad+1 − H Hk→j +min 0, min Adj→i = δi→j + k→j k→j k∈∂ V j\i k∈∂j\i for 3 ≤ d ≤ K −1, which is the first equation of Table 1. The remainder of Table 1 is derived via similar methods, as are the relations in Tables 2 and 3. Recall (21): X bk→j (d, i, cj ). Adj→i = δi→j + min cj 6=∗,i k∈∂j\i We can split this minimization into two cases, namely cj = • and cj ∈ ∂j \ i, which allows us to write   X bk→j (d, i, •), Adj→i = δi→j + min  k∈∂j\i    X bl→j (d, i, k) min bk→j (d, i, k) +  k∈∂j\i l∈∂j\{i,k} We now replace each instance of bk→j with the appropriate value according to the identities in Tables 4 and 6. First note that for k ∈ ∂ U j \ i we have bk→j (d, i, k) = ∞ because d ≥ 3 and k ∈ U implies hjk (d, i, k, dk , pk , ck ) = 0 since gjk (d, i, k, dk , pk , ck ) = 1 if and only if dk = d + 1 and if dk = d + 1 > 1 then fk (dk , pk , ck ) = 0. Thus minimizing over k ∈ ∂j \ i is equivalent to minimizing over k ∈ ∂ V j \ i so we can write   X bk→j (d, i, •), Adj→i = δi→j + min  k∈∂j\i    X bl→j (d, i, k) . min bk→j (d, i, k) +  k∈∂ V j\i l∈∂j\{i,k} We now replace these particular messages via bk→j (d, i, k) = Ad+1 k→j from (30) (which is the fifth line of Table 4) and bl→j (d, i, k) = Hl→j 20 and bk→j (d, i, •) = Hk→j from (32) (which is the sixth line of Table 4), so we have      X X  H Hk→j , min Ad+1 + Adj→i = δi→j + min l→j k→j   k∈∂j\i l∈∂j\{i,k} k∈∂j\i     X , Hk→j + min 0, min Ad+1 = δi→j + k→j − Hk→j k∈∂j\i k∈∂j\i where the second line simply extracts the sum from the minimization. This equation now matches (33). We are now prepared to prove Theorem 2. Proof of Theorem 2. Tables 4-6 directly provide the functions ρi required to compute max-marginals. This substitution is valid after any number of iterations because it is valid from the original definitions of the A-H form variables by Lemma 1 and Lemma 2 proves the A-H variables are iterated by rules that follow directly from the iteration rules for the original form variables. 5 Constructing solutions. Because we have no guarantee that messages will converge, or that if they converge they will converge to an optimal solution, we elect to compute a feasible solution at every iteration of the algorithm and return the best solution found over all iterations. In particular we run our algorithm for a fixed number of iterations unless we converge to a fixed point before this limit. Finding all these solutions comes at an additional computational cost, but it gives consistently better solutions than simply using the result at the end of the iterations. To initialize our solution construction algorithm, let A = V be the set of non-root nodes which we have not yet assigned to a path. Nodes will be removed from this set as we determine their role in our constructed solution. For each node u ∈ U , we will construct a (possibly empty) path Pu , and our full solution will be the collection of these paths. The first step is to compute the max-marginals for the possible choices at node u, which are either “do not participate in a path” (in which case Pu = ∅) or “start a path by choosing a child from among available neighbors of u”. We want to maximize the maxmarginal among these choices. Since our variables are in Min-Sum form we actually compute the negative log of the max-marginals and choose the minimizing configuration. To choose a configuration at the 21 node u, we use the functions ρi from Definition 1 to compute X − log p̄u (∗, ∗, ∗) = Hk→u + β (34) k∈∂u − log p̄u (1, •, j) = X Hk→u + Aj→u − Hj→u , j ∈ ∂ V u ∩ A. (35) k∈∂u and find the minimum value. If the minimum is (34), we let Pu = ∅ and proceed to the next root node. If the minimum is (35) for some neighbor j, we initialize our new path as Pu = {u, j} and remove j from the set of available nodes by setting A = A \ {j}. Note that (35) considers only neighbors which are also elements of A insuring that Pu does not include any nodes used in a previous path. Further note that we must have (u, j) ∈ E so this is a valid start to a path because j ∈ ∂ V u and E contains no edges in V × U . We next proceed to the node j to determine whether Pu should be extended or added to the solution as is. This process is essentially the same as that for u, involving choosing the optimal value of the max-marginal at j, but we are now constrained to configurations with parent u. This means that we are choosing whether to end the path at j or continue to one of j’s neighbors in V , so we compute X − log p̄j (2, u, •) = Hk→j + Bu→j − Hu→j (36) k∈∂j − log p̄j (2, u, i) = X Hk→j + Bu→j − Hu→j + A3i→j − Hi→j , i ∈ ∂V j ∩ A k∈∂j (37) and choose the minimum. If the minimum is (36) the path is terminated so we add Pu to our solution as is and proceed to the next root node. Otherwise the minimum is achieved by a particular choice i, so we set Pu = {u, j, i}, remove i from the set of available nodes by setting A = A \ {i}, and proceed to determine whether Pu should be extended or added to the solution as is. Note again that i ∈ A guarantees we have not previously selected i to participate in any other path. To confirm that (j, i) ∈ E, note that the first line of Table 1 implies A3i→j = ∞ if (j, i) 6∈ E, in which case (37) is infinite for that choice of i. Such an i cannot be the chosen minimum value because (36) is always finite as can be seen from the last two lines of Table 1 and the first line of Table 6. Thus if we choose i to continue the path we must have (j, i) ∈ E which guarantees this is a valid choice. After the first two nodes of a path the process becomes more generic, so let us suppose we have some Pu such that |Pu | = d ≥ 3 and the last two nodes of the path Pu are are p and j. We still need 22 to determine whether to extend the path Pu or add it to the solution as is. If d = K then we know that we cannot extend the path, so we add it to the solution and move on to the next root node. Otherwise, we compute X d−1 − log p̄j (d, p, •) = Hk→j + Bp→j − Hp→j (38) k∈∂j − log p̄j (d, p, i) = X d−1 Hk→j + Bp→j − Hp→j + Ad+1 i→j − Hi→j , i ∈ ∂V j ∩ A k∈∂j (39) and choose the minimum. If the minimum is (38) we leave Pu as is, add it to the solution and move on to the next root node. If the minimum is (39) for some i, then we append i to the end of Pu and remove i from A. We now have a path of length d + 1 and can repeat the above procedure until we terminate the path. As above, we restrict our attention to nodes in A to insure no node is assigned to multiple paths. Furthermore, for i ∈ ∂ V j ∩ A if (j, i) 6∈ E then Ad+1 i→j = ∞ but (38) is always finite because Hk→j is finite for any pair of nodes k and d−1 j and Bp→j is finite because we are guaranteed to have (p, j) ∈ E by the fact that these are the last two nodes of the partially constructed path Pu . Thus if we choose to continue the path we do so along an edge with the correct direction to a node that is not participating in another already constructed path, and so the end result of this process is a feasible collection of node-disjoint directed paths. Notice, however, that the result depends on the order in which we process roots, so in practice we often repeat the procedure several times with different orders and choose the best solution among those we find. 6 Alternative algorithms. Our numerical results in section 7 below will compare our efficient BP algorithm to three alternatives: a Greedy algorithm, an IP based algorithm for KEP from [2], and a novel IP based algorithm. We now describe these algorithms. We propose the Greedy algorithm as a simple to implement approximation algorithm with good scaling behavior. It is greedy in the sense of adding paths to the solution one at a time and adding the longest possible path at each step, but when adding a path the search for the longest path is exhaustive. Given an arbitrary ordering of root notes, the Greedy algorithm proceeds as follows. Let A = V be the set of non-root nodes that have not yet been added to a path. From a root node u ∈ U , all possible directed paths with length at most K 23 consisting of u and a collection of nodes in A are explored and the longest such path is chosen, with ties being broken arbitrarily. The longest possible path is found by recursively looking for the longest path from each neighbor, keeping track of the depth bound to insure a path longer than K is not chosen. The chosen path is then added to the solution and its nodes are removed from A. If the path consists only of the node u it is discarded. The algorithm now proceeds to the next root node in the given order. This algorithm is guaranteed to generate a feasible collection of directed paths, but the size of that collection is highly dependent on the order in which we consider root nodes, so we repeat the process for a large number of different orderings of the root nodes, choosing the best solution. For the numerical results to follow we often used about 200 randomly generated orders. In most cases, the number of orderings is chosen so the running time of the Greedy algorithm is roughly equal to the message passing algorithm (which also includes a similar randomization step, as noted in section 5). The KEP algorithm from [2] is based on a Traveling Salesman IP formulation approach to the kidney exchange problem and can find bounded length cycles as well as paths, which may be bounded or unbounded in length. For our comparisons we enforce our path length bound K and disallow all cycles. Finally we have implemented a simple IP formulation of the problem based on the same description we used in the development of the message passing algorithm. We call this the Parent-Child-Depth (PCD) formulation. We let △ ∂ + i = {j ∈ ∂i : (i, j) ∈ E} and △ ∂ − i = {j ∈ ∂i : (j, i) ∈ E}. 24 The formulation is as follows: X xi maximize (40) i∈[n] s.t. xi = X pji + p•i ∀i ∈ [n] (41) ∀i ∈ [n] (42) ∀i ∈ [n] (43) ∀i ∈ [n] (44) ∀i ∈ [n] (45) ∀i ∈ [n] ∀i ∈ V (46) (47) ∀(j, i) ∈ E ∀(j, i) ∈ E (48) (49) ∀i ∈ [n], j ∈ ∂ − i ∩ ∂ + i ∀i ∈ [n] (50) (51) ∀i ∈ [n], j ∈ ∂ − i (52) j∈∂ − i X cij ≤ xi j∈∂ + i p•i ≤ X cij j∈∂ + i di = d•i + X dji j∈∂ − i 0 ≤ di ≤ K d•i = p•i p•i = 0 pji = cji dji = pji (dj + 1) pji + cij ≤ 1 xi , p•i ∈ {0, 1}, pji ∈ {0, 1}, di , d•i ∈ Z dji ∈ Z + cij ∈ {0, 1} ∀i ∈ [n], j ∈ ∂ i (53) Proposition 2. There is a bijection between feasible solutions to the IP problem (40)-(53) and the set M defined in (9) and an optimal solution to the IP problem maximizes the objective function H(d, p, c) defined in (11). Remark. This proposition states that the IP problem (40)-(53) is in fact the same problem we deal with elsewhere in this paper. Before providing a formal proof, we provide some intuition for the formulation. The variable xi acts as an indicator for whether the node i participates in a path, with the various pji and p•i indicators representing each possible choice of parent for node i (including the possibility of starting a path). Similarly the cij variables represent the possible choices of child for the node i. The integer variable di represents the depth of i in the path. This depth variable is decomposed into variables dji and d•i which will be equal to di if the parent of i is j or i starts a path, respectively, and zero otherwise. Thus at most one of d•i and the dji will be nonzero, representing the actual choice of parent implied by the values of p•i and the pji . The various constraints serve to guarantee that this interpretation of these variables is accurate and all feasibility constraints for the feasible set M . 25 More specifically, constraint (41) insures that a node participates if and only if it has a parent or starts a path. The remaining constraints insure that each node has at most one parent and one child, and that all variables agree locally with each other. Note (43), which requires a root to have a child (so each path contains at least one edge). The depth bound is enforced by requiring di ≤ K and insuring that di accurately represents the depth of i. Note in particular (49), which insures that depth increases from parent to child. This constraint is quadratic. Proof of Proposition 2. Given (d′ , p′ , c′ ) ∈ M , we can construct IP variables (x, d, p, c) node-by-node. For each i ∈ [n] there are three possible cases, represented by (2)-(4) because fi (d′i , p′i , c′i ) = 1 is guaranteed by (d′ , p′ , c′ ) ∈ M : • If d′i = p′i = c′i = ∗, then the node i does not participate in a path, so we let xi = p•i = di• = 0, for j ∈ ∂ − i we let pji = dji = 0, and for j ∈ ∂ + i we let cij = 0. • If p′i = •, then the node i starts a path, so we let xi = p•i = 1, di = d•i = 1, and for each j ∈ ∂ − i we let pij = dij = 0. By (3) we know i has a child c′i ∈ ∂ + i, so we can let cic′i = 1 and for j ∈ ∂ + i \ c′i we let cij = 0. Note that we must also have d′i = 1, so we have di = d′i . • If p′i 6∈ {∗, •} then the node i has a parent p′i ∈ ∂ − i, so we let xi = pp′i i = 1 and let p•i = 0 and for j ∈ ∂ − i \ p′i let pji = 0. By (4) we have 2 ≤ d′i ≤ K, so we let di = dp′i i = d′i and let d•i = 0 and for j ∈ ∂ − i \ p′i let dji = 0. If c′i = • we let cij = 0 for all j ∈ ∂ + i because i has no child. Otherwise we let cic′i = 1 and for all j ∈ ∂ + i \ c′i let cij = 0. With variables constructed in this way it is straightforward to check that all of the constraints are satisfied, so we omit the details. Now suppose we have a feasible set of IP variables (x, d, p, c). We will construct (d′ , p′ , c′ ) as described in Section 2 and show that it is an element of the set M . We proceed node-by-node. For i ∈ [n]: • If xi = 0, let d′i = p′i = c′i = ∗. • If xi = 1 and p•i = 1, let d′i = 1, p′i = •. By (43) there is some j ∈ ∂ + i such that cij = 1. Let c′i = j. • If xi = 1 and p•i = 0, by (41) there exists some j ∈ ∂ − i such that pji = 1. Let p′i = j, and let d′i = di . If cik = 0 for all k ∈ ∂ + i, let c′i = •. Otherwise (42) implies there is exactly one k ∈ ∂ + i such that cik = 1, so we let c′i = k. We will now show (d′ , p′ , c′ ) ∈ M . For i ∈ [n] the three cases above correspond exactly to the cases (2)-(4) to guarantee fi (d′i , p′i , c′i ) = 1. Note in particular that (47) 26 guarantees i ∈ U for any i with p′i = •. If p′i 6∈ {∗, •} then we have i ∈ V because p′i = j if and only if pji = 1 for some j ∈ ∂ − i but by assumption ∂ − i = ∅ for i ∈ U . For i ∈ [n], j ∈ ∂i, we have three cases. If p′i = j then we know pji = 1 and j ∈ ∂ − i, so (48) implies cji = 1 and thus c′j = 1. (50) guarantees p′j 6= i and c′i 6= j. j ∈ ∂ − i guarantees (j, i) ∈ E and (49) guarantees d′i = d′j + 1. The case p′j = i is similar. If p′i 6= j and p′j 6= i (48) guarantees c′i 6= j and c′j 6= i. Thus we are always in one of the cases (5)-(7), so gij (d′i , p′i , c′i , d′j , p′j , c′j ) = 1. Thus we conclude (d′ , p′ , c′ ) ∈ M , so we have established a bijection between the feasible set of the IP and the set M . To see that the optimization is the same, we need only note that ′ ′ ′ xi = 1 if and only if p′i 6= ∗. Thus byP(10) we have P xi = ηi′(pi′, ci′, di ) for all i ∈ [n] and so by (11) we have i∈[n] xi = i∈[n] η(di , pi , ci ) = H(d, p, c). In other words, both are simply measuring the number of nodes that participate in a path. Note that this formulation is polynomial in n, both in the number of variables and in the number of constraints, and is therefore simple to implement. As we will see below, for a number of instances, with n = 1000 and K = 15, PCD produces optimal solutions in more than 50% of tested graphs (see Table 9), while KEP does not find optimal solutions in the same allowed time. 7 Numerical results. We compare the performance of our algorithm, which we call BP, to the three alternative algorithms described in section 6. Note that the two IP-based algorithms (KEP and PCD) allow us to solve the problem to optimality given sufficient time, whereas the Greedy and BP algorithms have no optimality guarantees. When running the BP algorithm we use the value β = 0.01 for the parameter defined in (13). Informal testing of different values of β indicated that this value had, in some cases, a small advantage of about 1% in the size of solutions over larger β values while smaller β values resulted in significantly worse solutions. When this advantage was not present the value of β had no noticeable effect on the solution size. For all cases except the three largest real networks we use 200 orders of root nodes for the Greedy algorithm and 5 orders of root nodes for each iteration of BP. For the largest graphs these are decreased to 50 and 2, respectively. In all instances BP is run for a maximum of T = 50 iterations, terminating earlier only if it has converged to a fixed point or exceeded a preset time limit. In most cases BP did not 27 Root% 10 10 10 20 20 20 25 25 25 c 2 3 4 2 3 4 2 3 4 Nodes in solution KEP Greedy BP 384.9 364.4 376.6 460.8 446.4 457.8 426.4 480.4 469.2 641.6 554.6 603.4 813.6 685.9 746.3 721.8 763.1 769.0 700.7 600.3 654.5 893.7 726.6 787.0 818.7 801.3 834.9 Running Time KEP Greedy 3.0 0.6 16.2 0.9 63.5 0.9 3.3 0.9 63.5 1.3 63.3 1.8 2.9 1.0 56.4 1.7 63.9 2.3 (s) BP 2.2 4.5 4.0 2.6 3.8 2.1 2.4 3.9 2.5 Table 7: Random graphs on n = 1000 nodes with maximum path length K = 5 and edge probability c/n. 100 samples were run for each row, with β = 0.01 for BP. Dark shaded KEP results are cases where KEP was optimal in at least 99% of samples. BP results are labeled by finding more nodes than Greedy and finding the most nodes of any method . consistently converge, though it did converge somewhat more often for smaller graphs with n = 1000 and for longer allowed paths with K = 15. We have not seen a significant correlation between instances where BP converges and those where it finds significantly better solutions, but convergence does improve running time simply by allowing the algorithm to terminate earlier. 7.1 Random graph comparisons. We report our results on random graphs constructed as follows. We let each ordered pair of nodes in V × V and U × V have an edge independently with probability p. We set p = c/n and vary c. Thus for every pair (i, j) ∈ U ∪ V × V the directed edge (i, j) is present with probability c/n and absent with probability 1 − c/n. Table 1 shows results for some varieties of random graphs. The column “Root%” indicates the percentage of nodes which are in the set U , namely |U |/n. The column “c” indicates the value of the parameter c for the graphs tested. The remaining columns summarize the results of testing the algorithms on 100 random graphs, first showing the average number of nodes in the returned solution and then showing the average running time in seconds. For the IP based algorithms a time limit of 60 seconds was implemented by the IP solver and if the optimal solution was not found within that time the best feasible solution 28 identified by the solver was used. While in many cases KEP returned a nontrivial feasible solution, if PCD did not find the optimal solution it almost always returned the trivial feasible solution zero. For the cases represented in Table 7 PCD never returned a nontrivial feasible solution so we omit PCD from the table. It does, however, appear in other cases below and performs well in some ranges outside those that appear in tables, as will be discussed later. Testing over a wide range of parameter values we find that in many instances one or both of the IP algorithms runs to termination in time comparable to BP or Greedy. In these cases Greedy and BP both generally return suboptimal solutions, with both algorithms having ranges of parameters where they enjoy a small advantage over the other. This advantage ranges from Greedy finding about 5% more nodes than BP to BP finding around 10% more nodes than Greedy. Table 7 shows results for random graphs with 1000 nodes and a variety of percentages of root nodes. The algorithms were run with path length bound K = 5 and edge probability c/n for c = 2, 3, 4. For c = 2 KEP is optimal in every sample and has a running time comparable to BP. BP finds feasible solutions with 93%-98% of the nodes of the optimal solution, whereas the Greedy solutions have 85%-95%. As we increase c, KEP finds fewer optimal solutions, though it is still optimal in all but 1 of our 100 samples when 10% of the nodes of the graph are roots for c = 3. In most cases BP finds more nodes than Greedy does while falling short of even the suboptimal KEP solutions, but for c = 4 with 20% and 25% root nodes, BP performs the best among the compared algorithms, finding the most nodes in time comparable to Greedy and significantly shorter than KEP. While we do not show full results here, we can provide some sense of the behavior of the algorithms for graphs just outside the regimes in Table 7. If the root percentage is decreased below 10% KEP is generally optimal and both BP and Greedy often find this optimal solution, likely because the scarcity of roots leads to less interaction between paths in feasible solutions. If the root percentage is increased above 25% BP still finds more nodes than Greedy but significantly fewer than KEP, which generally finds optimal solutions. Though PCD did not find nontrivial solutions for the cases in Table 7, it is often optimal for these cases with many roots. If the root percentage is kept in the 10%-25% range but c is decreased to 1, both KEP and PCD are always optimal, with Greedy missing a small percentage of nodes and BP slightly behind Greedy. If c is increased above 4, both Greedy and BP find significantly (10%-20%) more nodes than KEP, which is never optimal, and Greedy usually has a small (1%-3%) advantage over BP. In this regime PCD finds no nontrivial solutions. Table 8 shows tests over some of the same parameters as Table 7 on larger graphs, with 10,000 nodes. For these larger graphs the time 29 c 2 3 4 Nodes in solution KEP Greedy BP 6426.0 5371.5 5973.7 6792.8 6640.2 7332.5 7199.9 7413.1 7492.0 Running Time KEP Greedy 150.3 39.3 1229.4 60.0 1250.4 87.3 (s) BP 42.6 65.8 48.6 Table 8: Random graphs on n = 10000 nodes with 20% root nodes, maximum path length K = 5, and edge probability c/n. 100 samples were run for each row, with β = 0.01 for BP. Dark shaded KEP results were optimal in all samples. BP results are labeled by finding more nodes than Greedy and finding the most nodes of any method . limit for KEP and PCD is increased to 20 minutes, and again PCD is omitted because it never finds nontrivial solutions within the time limit. Most general trends remain the same, with KEP always finding optimal solutions within the time limit for c = 2 but BP performing better for c = 3 and c = 4. Specifically, BP now has an advantage over KEP for c = 3. Another factor to note is that BP has a significant advantage over Greedy in running time in the c = 4 case, which we can credit to the fact that BP converged in all samples for that case, running an average of 19 iterations as compared to 50 for the other cases. In Table 9 we provide summary results for problems with longer allowed paths; that is with K = 10 and K = 15. Here KEP is almost never optimal, though it does often provide a feasible solution with more nodes than BP or Greedy, albeit at the cost of running to the cutoff time rather than terminating in a few seconds. In all cases for this regime BP finds more solutions than Greedy while running in comparable time, and in two of these cases it also on average finds more nodes than any other tested algorithm. In some cases the solution size advantage over Greedy is significant, with BP solutions more than 10% larger than Greedy solutions. Note that PCD performs rather well for K = 15, often finding the optimal solution, though the average size of the solution is reduced by the fact that PCD rarely returns a nontrivial feasible solution, generally either returning the optimal solution or an empty solution. PCD found the optimal solution in at least 50% of samples for all the K = 15 cases, while KEP only found any for c = 2, for which it was optimal in only 6% of cases. Thus there is an advantage to PCD over KEP for all K = 15 cases as it much more regularly finds the optimal solution. When it does find the optimal solution it is also relatively fast, with an average runtime of 23 seconds for cases across all 4 values of c in which PCD found the optimal solution. BP and 30 K 10 10 10 10 15 15 15 15 c 2 3 4 5 2 3 4 5 KEP 656.1 784.3 830.2 841.2 686.3 868.0 921.0 938.0 Nodes in solution PCD Greedy 418.3 571.3 9.0 715.9 0 796.5 0 845.5 709.9 584.9 779.7 728.6 760.2 806.6 693.8 855.0 BP 671.7 758.2 812.6 852.6 684.7 789.7 835.6 869.6 Running Time (s) KEP PCD Greedy 63.0 59.9 1.4 67.8 60.2 1.8 69.1 60.2 2.3 72.6 60.2 2.8 63.1 10.0 1.3 68.4 34.1 2.0 69.3 40.1 2.7 72.2 47.4 3.2 BP 3.7 3.3 2.6 2.7 3.6 3.7 3.0 3.1 Table 9: Random graphs on n = 1000 nodes with 15% root nodes, maximum path length K, and edge probability c/n. 100 samples were run for each row, with β = 0.01 for BP. Shaded PCD results were optimal in 96% of samples, and in the other K = 15 cases PCD was optimal in at least 50% of samples. BP results are labeled by finding more nodes than Greedy and finding the most nodes of any method . Greedy both remain significantly faster, and BP does on average find better solutions than either PCD or Greedy. For similar graphs just outside the regime presented in Table 9 we have a couple situations. As in the case of a shorter path bound, decreasing c to 1 makes KEP and PCD optimal in all cases, with Greedy missing a small percentage of nodes and BP slightly behind Greedy. Increasing c above 5 leads to Greedy and BP having essentially identical performance, both generally better than KEP and PCD. PCD still finds optimal solutions in a reasonable percentage of K = 15 cases, however. If the path length bound is kept as long as 15 or increased up to 25, PCD performs very well over a wide variety of c values and root percentages from 15% to 30%, generally finding the optimal solution. In many of these cases KEP also finds an optimal solution but does not terminate and confirm that the solution is optimal so PCD has a significant advantage in running time in those cases. BP and Greedy are suboptimal in these high-K cases, both finding 80%-90% of the nodes in the optimal solution. 7.2 Computational results for real world networks. We compared the performance of KEP, PCD, Greedy, and BP algorithms on several real world networks taken from the Stanford Large Network Dataset collection [7]. We chose directed graphs and randomly selected a subset of nodes to act as roots (discarding directed 31 edges pointing in to roots and discarding isolated nodes). We present performance comparisons for five networks, which are as follows: • Epinions: this network is drawn from the website Epinions.com and represents “trust” relationships between users, in which each user can indicate whether they trust the opinions of each other user. Thus an edge from i to j indicates that user i trusts user j. • Gnutella: a snapshot of the Gnutella peer-to-peer file sharing network, with nodes representing hosts and edges representing the connections between those hosts. • Slashdot: users of the technology news site Slashdot were allowed to tag other users as friends or foes; our network has users as nodes and tags as directed edges, drawn from a snapshot in 2008. • Wiki-vote: A record of votes on administration positions for Wikipedia, in which administrators vote on the promotion of other potential administrators. Nodes are wikipedia users and a directed edge from node i to node j represents that user i voted on user j. • Amazon: product co-purchasing on Amazon.com, based on the “customers who bought this item also bought feature”. A directed edge from product i to product j indicates that j appears on the page for i as a frequently co-purchased item. The data is a snapshot from March 2003. The results of our tests on the full graphs are summarized in Table 10. The “Nodes” column indicates the size of the given graph, which is given as an average over the five tests because the selection of root nodes results in a different number of nodes becoming isolated and being dropped in each test. The column “∆” is the average degree of the graph, which is also averaged across the choices of root nodes for each trial. Remaining columns show the number of nodes in the average solution and the running time in minutes for each algorithm. With the exception of the graph Gnutella, KEP in all cases crashed rather than running to the stopping time and so provided no solution, which we indicate by “-”. We believe these crashes resulted from KEP exceeding the available memory. They also caused the running times for KEP to be erratic, with the algorithm crashing before the time limit in most cases. The extreme running time for Amazon, the largest graph, can be explained by the external software we used failing to adhere to the requested time limits before crashing. In all cases PCD failed to return a nontrivial solution, so it is omitted from the table. For all graphs except Slashdot, BP enjoys an advantage in solution size over Greedy, finding 4%-15% more nodes while running only slightly longer on average. On Slashdot Greedy has an advantage in both solution size and running time. We also note that even on the graph Gnutella, 32 Graph Epinions Gnutella Slashdot Wiki-vote Amazon Graph Epinions Gnutella Slashdot Wiki-vote Amazon Nodes 68507 5518 74893 6439 260982 Nodes 68507 5518 74893 6439 260982 ∆ 6.0 3.0 9.7 12.9 3.8 Nodes in solution KEP Greedy BP 21,219.4 24,347.4 1,889.6 1,610.8 1,708.2 36,770.8 31,266.8 2,045.0 2,173.0 174,035.8 180,902.6 ∆ 6.0 3.0 9.7 12.9 3.8 Running Time (min) KEP Greedy BP 56.5 9.8 17.9 150.3 0.2 0.4 58.9 5.1 20.5 75.5 0.8 1.5 1,042.8 182.0 259.9 Table 10: Real world networks with 20% root nodes (randomly selected) and maximum path length K = 5. We use β = 0.01 for BP. ∆ is the average degree of the sampled graph. 5 samples were run for each graph, with − representing graphs for which KEP crashed without returning any solution. Shaded cells represent the best solutions, with lighter shading for the case when BP provides a better solution than Greedy. 33 the one case where KEP returned feasible solutions, BP has a huge advantage in running time for a solution with 90% of the nodes of that returned by KEP. References [1] F. Altarelli, A. Braunstein, L. Dall’Asta, C. De Bacco, and S. Franz. The edge-disjoint path problem on random graphs by message-passing. ArXiv e-prints, March 2015. [2] Ross Anderson, Itai Ashlagi, David Gamarnik, and Alvin E. Roth. Finding long chains in kidney exchange using the traveling salesman problem. Proceedings of the National Academy of Sciences, 112(3):663–668, 2015. [3] M. Bailly-Bechet, C. Borgs, A. Braunstein, J. Chayes, A. Dagkessamanskaia, J.-M. Franois, and R. Zecchina. Finding undetected protein associations in cell signaling by belief propagation. Proceedings of the National Academy of Sciences, 108(2):882–887, 2011. [4] M. Bayati, C. Borgs, A. Braunstein, J. Chayes, A. Ramezanpour, and R. Zecchina. Statistical mechanics of steiner trees. Phys. Rev. Lett., 101:037208, Jul 2008. [5] P. Eschenfeldt, D. Schmidt, S. Draper, and J. Yedidia. Proactive Message Passing on Memory Factor Networks. ArXiv e-prints, January 2016. Submitted to Journal of Machine Learning Research. [6] D Koller and N Friedman. Probabilistic Graphical Models: Principles and Techniques. MIT Press, 2009. [7] Jure Leskovec and Andrej Krevl. SNAP Datasets: Stanford large network dataset collection. http://snap.stanford.edu/data, June 2014. [8] Jonathan S. Yedidia, William T. Freeman, and Yair Weiss. Exploring artificial intelligence in the new millennium. chapter Understanding Belief Propagation and Its Generalizations, pages 239– 269. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2003. 34
8cs.DS
Vehicle Color Recognition using Convolutional Neural Network Reza Fuad Rachmadi∗ , I Ketut Eddy Purnama† , and Mauridhi Hery Purnomo‡ arXiv:1510.07391v2 [cs.CV] 29 Oct 2017 Department of Multimedia and Networking Engineering Institut Teknologi Sepuluh Nopember, Surabaya, Indonesia 60111 Email: ∗ [email protected], † [email protected], ‡ [email protected] Abstract—Vehicle color information is one of the important elements in ITS (Intelligent Traffic System). In this paper, we present a vehicle color recognition method using convolutional neural network (CNN). Naturally, CNN is designed to learn classification method based on shape information, but we proved that CNN can also learn classification based on color distribution. In our method, we convert the input image to two different color spaces, HSV and CIE Lab, and run it to some CNN architecture. The training process follow procedure introduce by Krizhevsky, that learning rate is decreasing by factor of 10 after some iterations. To test our method, we use publicly vehicle color recognition dataset provided by Chen. The results, our model outperform the original system provide by Chen with 2% higher overall accuracy. I. I NTRODUCTION Intelligent Transport System (ITS) is a system that manages transportation from traffic management to law enforcement. One important object that widely explored by ITS is a vehicle and their properties, including type, color, and license plate. Vehicle color is an important property for vehicle identification and provide visual cues for fast action law enforcement. Recognize vehicle color is very challenging task because several factors including weather condition, quality of video/image acquisition, and strip combination of the vehicle. The first factor, weather condition, may dramatically change the color illumination of the acquisition image. For example, if the image/video taken at haze condition then there a lot of ”soft” white noise added to the image. Soft white noise means that the noise is not random but continues and blended with the foreground and background objects. The quality of video/image acquisition is affected the final decision of the vehicle color recognition system and its depends of the optical sensor in the camera. Camera that can capture object at high speed is recommended for ITS, but not all installed camera in the road can do that. A lot of cameras installed in the road only used to monitor the traffic, pedestrians, and street conditions. The last factor is strip combination of the vehicle, which is very affected to the vehicle recognition system. Region selection is very important to tackle the problem. There are some research paper published to tackle vehicle color recognition problem, like in [1], [2], [6], [8], [9]. Chen et al. [2] use feature context and linear SVM classifier to tackle the problem. Feature context is a collection of histogram that build with several areas, like spatial pyramid structure but with different region configuration. In other paper [6], they try to tackle vehicle color recognition problem using 2D histogram with some ROI configuration as features and neural network as classifier. Baek et al. [8] also use 2D histogram but without ROI configuration and SVM as classifier. Another approach is described by Son et al. [9] which using convolution kernel to extract similarity between positive and negative images and then feed up those similarity score to SVM classifier. Color spaces are very important to color recognition applications, like vehicle color recognition. The selection of color space will impact the recognition performance. The most usable color space in digital photography is RGB color space, but RGB color space has problem to color recognition because channel of RGB color space contribute equal for each channel so to distinct color is more difficult. Usually, researcher will not use RGB as their primary color space and convert it to other color spaces that separate illumination and color, like CIE Lab or HSV [6], [8], [9]. Another approach is to make 2D histogram of two channels, like H and S channel in HSV color space, and do classification using those 2D histogram. In this paper, we present vehicle color recognition method using convolutional neural network (CNN). CNN is type of neural network but instead of using fully connected layer, CNN use layer called convolution layer to extract features from data. The training mechanism is very similar to normal neural network and use stochastic gradient descent as training algorithm. CNN is become very popular after winning the ILSVRC (ImageNet Large Scale Visual Recognition Challenge) 2012 [5]. In those paper, they use more than 600,000 neuron and 7 hidden layer to provide good model of the data. To avoid overfitting Krizhevsky et al. [5] employed regularization method called dropout to the fully connected layer [3]. The Krizhevsky model is huge and as reported in the paper, the model trained in six day for 450,000 iteration in GPU hardware. Before going into details, in section two we describe detils related works in color recognition. Section two describe details architecture of our CNN model. Section three reports the experiments we have done and discuss the results. II. R ELATED W ORKS There are several research that try to tackle vehicle color recognition problem including in [1], [2], [6], [8], [9]. The newest research is describe by Chen et al. [2] in 2014 and Fig. 1. The CNN architecture used in our system consist 8 layers with 2 base networks with total 16 layers. First two layers and fifth layer does normalization and pooling after convolution process. The third and fourth layer does only convolution process. Before feed up to fully-connected layers, the networks do channel concatenation process. Sample of input image is taken from Chen [2] dataset. Hsieh et al. [1] in 2015. Chen et al. use feature context (FC) with selected configuration to divide the images into subregions, create histogram for each subregion, and learned it using linear SVM. Not all value in histogram is used to classify the vehicle color but the values clustered to form codebook for the problem and then choose the codebook as feature for the classifier. This mechanism know as Bag-ofWord (BoW) method. Chen et al. done preprocessing using haze removal method [7] and color contrast normalization method. The accuracy of system proposed by Chen et al. is very high, over 92%. Another paper by Hsieh et al. [1] proposed color correction using background image and two frame image of car. Not only color correction method, Hsieh et al. also proposed window removal method that remove the window part of the car images and classify vehicle color using lower part, like bumper and doors, of the car. The window removal done by taking the orientation of the car, fit the detail segmented car image by ellipse shape and cut a half of the ellipse. Hsieh et al. done the experiments using three different classifier, G-Classifier, DC-Classifier, and DG-Classifier. G-Classifier responsible for classify gray and non-gray color. The method is very simple threshold method with assumption that for gray color the avarage of three channel, RGB, is very close with color value of each channel. The DC-Classifier and DG-Classifier trained using SVM with features extracted from RGB and CIE Lab color space. Red, green, blue, and yellow color class classified using DC-Classifier and the rest of the color class classified using DG-Classifier. From the experiments, Hsieh et al. report that the average accuracy for the system is 93,59% with 7 color class including black, silver, white, yellow, red, green, and blue. FC also used by Dule et al. [6] to tackle vehicle color recognition problem. The different between FC used by Chen et al. and Dule et al. is that Dule et al. only used two ROI (smooth hood peace and semi front vehicle). ROI is selected automatically using plate detection method and otsu thresholding to search smooth hood peace and heuristic approach for semi front vehicle. The classifier used by Dule et al. are KNN, ANN, and SVM. The best accuracy that reported in Dule et al. paper is 83,5% with configuration of 8 bin histogram, several combination of color spaces, and ANN classifier. Other approach for vehicle color recognition problem is classify vehicle color using 2D histogram features. Baek et al. [8] proposed the vehicle color recognition system using 2D histogram features and SVM classifier. Hue and saturation in HSV color space is used for creating the 2D histogram. From the experiments, the average accuracy of the system is 94,92%. The dataset used in the experiment has 500 outdoor vehicle images with five color class including black, white, red, yellow, and blue color class. Son et al. [9] proposed other possible approach for color recognition using similirity method. The system using grid kernel that run on hue and saturation channel of HSV color space. The same dataset as in [8] is used in the experiments. Son et al. reported only precission and recall for each color class. The percentage of precission and recall from the experiments is very high and close to 100%. High precission and high recall indicate that the model has good accuracy. III. T HE CNN A RCHITECTURE The architecture of our CNN can viewed in figure 1. Our CNN architecture consists 2 base networks and 8 layers for each base network with total 16 layers. The first two layers of our CNN architecture is a convlutional layer and it does convolution process following by normalization and pooling. Convolutional layer is a layer that do convolution process that same as convolution process in image processing algorithm. For Ii is an input image and h is a some convolution kernel, output image for convolution process Io can be written as Io [m, n] = ∞ X ∞ X Ii [i, j].h[m, n] (1) j=−∞ i=−∞ with [m, n] is pixel value at coordinate (m, n). Training process of CNN will learn h, may called as kernel, as parameters of convolutional layer. The choice of activation function in convolutional layer have huge impact for the networks. There a several choice of activation function including tanh and ReLU (Rectified Linear Unit). In our CNN networks we use ReLU activation function for all layers including the fully-connected layers. The normalization process done by following equation 2 with α = 10−4 , β = 0.75, and n = 5. β  i+n/2 α X i 2 i i (kx,y ) (2) lx,y = kx,y / 1 + n j=i−n/2 i lx,y i with is normalization result and kx,y is output of layer activation function for convolution at coordinate (x, y). Using those normalization, the accuracy of CNN increase about 2% according to [5]. The last process in two first layers is pooling process. There are two type of pooling, max pooling and mean pooling. Each type has different approach, max pooling will take maximum respon from the convolutional process which is shape with sharp edges and mean pooling will take the average of the convolutional process respon which is summarize the shape in neighborhood. In our CNN architecture, we use max pooling with size 3x3 and stride 2 for overlapping pooling. The second, fourth and fifth layer are grouping into two group which each group is independent each others. The third and fourth layer is also a convolutional layer but without pooling and normalization process. Output of third and fourth layer is same as input because we use 3x3 kernel with pad 1 added for each border. The fifth layer is convolutional layer with only pooling process without normalization. Before going into a fully-connected layers, the pooling output of the fifth layer from two base networks is concatenate and flattened into one long vector. The sixth and seventh layer is a fully-connected layer employed dropout regularization method to reduce overfitting. The last layer is the softmax regression layer which can describe in the following equation T p(y (i) (i) eθ j x = j|x ; θ) = Pk l=1 (i) T x(i) eθl (3) with p(y (i) = j|x(i) ; θ) is probability of y (i) being class j given input x(i) with weight parameter θ. Overall, our CNN architecture consists 2 base networks, 8 layers each with total 16 layers. First layer use 11x11@3 kernel with total 48 kernels, second layer use 3x3@48 kernel with total 128 kernels, third use 3x3@128 kernel with total 192 kernels, fourth layer use 3x3@192 kernel with total 192 kernels, and fifth layer use 3x3@192 with total 128 kernels. Pooling process is employed in first, second, and fifth layer with same parameter, pooling size of 3x3 with 2 pixel stride. Fig. 2. Sample images from Chen dataset [2]. Some images are suffering from noise and brightness constancy. Sixth, seventh, and eight layers is fully-connected layers with each 4096-4096-8 neuron with dropout regularization method employed in sixth and seventh layer. The network’s input is a 3 channel image with 150,228 dimensional or 227x227@3 resolution. Total neuron involved in the networks is 658,280 neurons. IV. T HE E XPERIMENTS A. Training Process Our models trained using stochastic gradient descent with 115 examples per batch, momentum of 0.9 and weight decay of 0.0005. For the experiments, we use Chen dataset [2] and some sample images of the dataset can be viewed in figure 2. The dataset contains 15601 vehicle images with 8 classes of vehicle color, which are black, blue, cyan, gray, green, red, white, and yellow. In the training process, half of class examples are used. Each example is resized into 256x256@3 resolution with certain color spaces. We use four different color spaces, RGB, CIE Lab, CIE XYZ, and HSV. Before the data processed for training, it cropped to 227x227@3 and subtracted by mean image of the training data. In training process the data randomly mirrored to increase the classifier accuracy. We use learning rate of 0.01 and reduced continuously by a factor of 10 at multiple iteration of 50,000 with maximum iteration of 200,000. We use caffe framework [4] to implement our models. The weights of the networks are initialized using a gaussian function with δ = 0.01 for connecting weights and fixed value of 0.1 for bias value. The stochastic gradient descent method, SGD for short, is an optimization method that want to find minimum or maximum value of some function. SGD will work for all function that have gradient or first derivative. Usually the system use SGD for minimizing the error or loss function and update the weight parameters based on following function wi+1 = wi − α∇L(z, wi ) (4) TABLE I ACCURACY OF OUR MODELS WITH 4 DIFFERENT COLOR SPACES AND ACCURACY FROM C HEN ET AL . [2] FOR COMPARATION . Color Space Color Class Chen et al. [2] RGB HSV CIE Lab CIE XYZ yellow 0.9794 0.9450 0.9656 0.9828 0.9553 white 0.9666 0.9624 0.9561 0.9649 0.9423 blue 0.9410 0.9576 0.9410 0.9484 0.9535 cyan 0.9645 0.9716 0.9645 0.9716 0.9787 red 0.9897 0.9866 0.9897 0.9886 0.9878 gray 0.8608 0.8503 0.8668 0.8647 0.8466 black 0.9738 0.9703 0.9703 0.9709 0.9730 green 0.8257 0.8215 0.8215 0.7676 0.7884 average 0.9447 0.9372 0.9414 0.9432 0.9282 Fig. 3. Confusion matrix from our model with RGB color space. Each cell describe accuracy for each class measure in percentage. TABLE II E XECUTION TIME FOR OUR MODEL USING CPU AND GPU HARDWARE . CPU (1 core) GPU (448 cores) Initialization time 4.849 s 4.849 s Execution time 3.248 s 0.156 s with wi is current weight parameters, α is learning rate, and ∇L(z, wi ) is the gradient of loss function L with respect to input examples z. For faster model convergence, the weight decay and momentum are added to the update equation. The final equation of update function in SGD method is describe following ∆wi+1 = γ∆wi + (1 − γ)(−α∇L(z, wi ) wi+1 = wi − α∇L(z, wi ) − αζwi (5) (6) with γ is momentum variable and ζ is weight decay. Changing momentum and weight decay may accelerate the training process. The training process done in GPU hardware to reduce the training time. Our GPU hardware consists 14 multiprocessor within 3 GB memory. There are two limitations of our GPU hardware for training process, the memory limiting the size of the networks or the batch size used in the training process and the maximum dimension of the grid block execution (parallel execution configuration) also limiting the batch size used in the training process. The training process taken over 2 GB GPU memory for the data and the networks with 4 days of execution time. B. Results and Discussion For testing purpose, we use 50% examples of dataset that not used in the training process. Table I summarize our testing results with four different color spaces and compare the results with the system provide by Chen et al. [2]. Each class consists different number of examples from 141 to 2371. From table I, it can see that RGB color space achieve the highest accuracy of the testing process with average accuracy of 94,47%. Four color spaces used in the models have high accuracy, more than 90%, with narrow deviation. The results show that our CNN model outperform the original system of dataset provide by Chen et al. [2]. Our models outperform Chen et al. system in yellow, white, blue, red, gray, black, and green color class. Only on cyan color class our system had lower accuracy comparing to the Chen et al. system but with different only 0.7%. Figure 3 is a confusion matrix for our model using RGB color space. The confusion matrix shows that the most worst accuracy of our model is in green and gray color class. Some examples of green class is misclassified as gray class and its above 10%. As seen in the dataset, some green color class examples has color that very close to gray, more like greengray color than green, so the classifier may have it wrong classified as a gray color class. The same case appears in gray color class which some gray color class examples misclassified as white color class. Thus may appears because of very bright sunlight reflection on metallic paint or the color is too light so it’s very close to another color as well. Another issue to tackle is execution time used to classify vehicle color. We implement the models using two different hardware, the first one the model running on 1 core CPU and the second one the model running on 448 cores GPU with NVIDIA Tesla C2050. Table II summarize average execution time for all testing examples. As shown in table II, the models that run on GPU have more than 20x faster than the models that run on CPU, so the issue of execution time is solved if the models running on appropriate hardware configuration. The initialization time is a time for the system to prepare the model, load it to the memory, and load mean image. For (a) Kernel from network 1 (b) Kernel from network 2 (c) Output example from pooling process Fig. 4. 96 kernel with 11x11@3 resolution learned by our first convolutional layer with input resolution 224x224@3 and output example from pooling process. (a) 48 kernel from network 1, (b) 48 kernel from network 2, (c) output from pooling process in layer conv1 and conv2. the practical implementation, we recommend using the client server mechanism, send the vehicle detection result to the server, do the vehicle color classification in server backend using GPU hardware, and send back the result to the Intelligent Transportation System for further processing. To see how our models capturing color information in the data, we visualize a several layer of our CNN models. The first convolutional layer is an important part of the network to extract low-level features. Figure 4 is a visualization of all kernels in the first convolutional layer and an example output of the pooling process in layer conv1 and conv2 of our CNN architecture. As seen in figure 4, the first convolutional layer capture rich color features in the input image. All vehicle color variations in dataset are present in the kernels. The kernels from network 1, figure 4a, capture a lot of cyan-like color. Cyan-like color that appears in the kernel may contribute to the red color class or cyan color class. Another color that appears repeatedly in the kernel are red-blue color, greengray color, and orange-like color. For further investigation, we capture respond from convolutional layer continuing with normalization and pooling process and it can see in figure 4c. We test our models using one of the test images and try to analyze the behaviour of our models. Figure 4c show that for yellow color class a lot of the green-like color kernel neuron is active and its looks like our models learned that color can be recognize from the hood color or the top color of the car. This behaviour occurs because most all of the images in dataset take image of the front of the car from some height and a little deviation of angle, so the side of the car is not cover very much. The camera configuration of taken images in dataset simulate the CCTV or other street camera that relatively used such that configuration. V. C ONCLUSION In the paper, we present the vehicle color recognition system using convolutional neural network. Our model succesfully capturing vehicle color in very high accuracy, 94,47%, and outperform the original system provide by Chen [2]. From the experiment, the best accuracy is achieve using RGB color space and this is contradictive with several papers that not recomend RGB color space for color recognition and using another color space like HSV or YUV. Execution time for our models is about 3 s for CPU (1 core) and 0.156 s for GPU (448 cores), although the execution time is slower than system provide by Chen [2] but its still can be used for practical implementation with several adjustment. R EFERENCES [1] J.-W. Hsieh, L.-C. Chen, S.-Y. Chen, D.-Y. Chen, S. Alghyaline, and H.-F. Chiang, Vehicle Color Classification Under Different Lighting Conditions Through Color Correction, IEEE Sensors Journal, 2015, Vol: 15, Issue: 2, pp: 971–983. [2] P. Chen, X. Bai and W. Liu, Vehicle Color Recognition on an Urban Road by Feature Context, IEEE Transactions on Intelligent Transportation Systems (TITS), 2014, Issue: 99, pp: 1-7. [3] N. Srivastava, G. E. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, Dropout: A Simple Way to Prevent Neural Networks from Overfitting, Journal of Machine Learning Research 15 (2014), pp: 1929– 1958. [4] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. Girshick, S. Guadarrama, and T. Darrell, Caffe: Convolutional Architecture for Fast Feature Embedding, ACM International Conference on Multimedia 2014, pp: 675–678. [5] A. Krizhevsky, I. Sutskever, and G. E. Hinton, ImageNet Classification with Deep Convolutional Neural Networks, NIPS 2012, pp: 1097–1105. [6] E. Dule, M. Gokmen, M. S. Beratoglu, A convenient feature vector construction for vehicle color recognition, Proc. 11th WSEAS International Conference on Neural Networks, Evolutionary Computing and Fuzzy systems, pp: 250255, (2010) [7] K. He, J. Sun, and X. Tang, Single image haze removal using dark channel prior, in Proc. IEEE Conf. CVPR, 2009, pp: 19561963. [8] N. Baek, S.-M. Park, K.-J. Kim, and S.-B. Park, Vehicle Color Classification Based on the Support Vector Machine Method, International Conference on Intelligent Computing, ICIC 2007, pp: 1133–1139. [9] J.-W. Son, S.-B. Park, and K.-J. Kim, A convolutional kernel method for color recognition, International Conference on Advanced Language Processing and Web Information Technology (ALPIT 2007), pp: 242-247.
1cs.CV
A Towards a Compiler for Reals arXiv:1410.0198v3 [cs.PL] 11 Mar 2016 EVA DARULOVA and VIKTOR KUNCAK1 , Ecole Polytechnique Federale de Lausanne Numerical software, common in scientific computing or embedded systems, inevitably uses an approximation of the real arithmetic in which most algorithms are designed. In many domains, roundoff errors are not the only source of inaccuracy and measurement and other input errors further increase the uncertainty of the computed results. Adequate tools are needed to help users select suitable approximations, especially for safety-critical applications. We present the source-to-source compiler Rosa which takes as input a real-valued program with error specifications and synthesizes code over an appropriate floating-point or fixed-point data type. The main challenge of such a compiler is a fully automated, sound and yet accurate enough numerical error estimation. We present a unified technique for floating-point and fixed-point arithmetic of various precisions which can handle nonlinear arithmetic, determine closed- form symbolic invariants for unbounded loops and quantify the effects of discontinuities on numerical errors. We evaluate Rosa on a number of benchmarks from scientific computing and embedded systems and, comparing it to state-of-the-art in automated error estimation, show it presents an interesting trade-off between accuracy and performance. 1. INTRODUCTION Numerical software, common in scientific computing and embedded systems, inevitably approximates the real arithmetic in which its algorithms are typically designed. In addition to roundoff errors from finite-precision arithmetics such as floating-point or fixed-point, many problem domains come with additional sources of imprecision, such as measurement and truncation errors, increasing the uncertainty on the computed results. We need adequate tools to help developers understand whether the computed values meet the accuracy requirements and remain meaningful in the presence of the errors. This is particularly important for safety-critical systems. Today, however, accuracy in numerical computations is often an afterthought. We write programs in a user-selected finite-precision data type and then, perhaps, try to verify that it meets our expectations. This is problematic for several reasons. Firstly, it introduces a mismatch between the real-valued algorithms we write on paper and the low-level implementation details of floating-point or fixed-point arithmetic. Secondly, finite-precision source code semantics prevents the compiler from applying many optimizations (soundly), as, for instance, associativity no longer holds. And lastly, numerical errors remain implicit if they are only the result of some separate analysis tool. We propose a different strategy. The programmer writes the program in a real-valued specification language and makes numerical errors explicit in pre- and postconditions. It is then up to our compiler to determine an appropriate data type which fulfills the specification but is as efficient as possible and to generate the corresponding code. This is in particular attractive for fixed-point arithmetic, often used in embedded systems, where the code generation can be quite challenging as the programmer has to ensure (implicit) decimal points are aligned correctly. Clearly, one of the key challenges of such a compiler is to determine how close a finiteprecision representation is to its ideal implementation in real numbers. While techniques exist which can handle linear operations successfully [Goubault and Putot 2011; Darulova and Kuncak 2011], precise and sound error estimation remains difficult in the presence of nonlinear arithmetic. Roundoff errors and error propagation depend on the ranges of variables in complex and non-obvious ways; even determining these ranges precisely for nonlinear code poses a challenge. Furthermore, due to numerical errors, the control flow in the finite-precision implementation may diverge from the ideal real-valued one, taking 1 This work is supported in part by the European Research Council (ERC) project “Implicit Programming”. ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:2 E. Darulova and V. Kuncak a different branch and producing a result that is far off the expected one. Quantifying discontinuity errors is hard due to many correlations and nonlinearity but also due to lack of smoothness or continuity of the underlying functions that arise in practice [Chaudhuri et al. 2011]. In loops, roundoff errors grow, in general, unboundedly. Even if an iteration bound is known, loop unrolling approaches scale poorly when applied to nonlinear code. We have addressed these challenges and present here our results towards the goal of a verifying compiler for real arithmetic. In particular, we present — a real-valued implementation and specification language for numerical programs with uncertainties; we define its semantics in terms of verification constraints that they induce. — an approximation procedure for computing precise range bounds for nonlinear expressions which combines SMT solving with interval arithmetic. — an approach for sound and fully automatic error estimation for nonlinear expressions for floating-point as well as fixed-point arithmetic of various precisions. We handle roundoff and propagation errors separately with affine arithmetic and a first-order Taylor approximation, respectively. While providing accuracy, this separation also allows us to provide the programmer with useful information about the numerical stability of the computation. — an extension of the error estimation to programs with simple loops, where we developed a technique to express the total error as a function of the number of loop iterations. — a sound and scalable technique to estimate discontinuity errors which crucially relies on the use of a nonlinear SMT solver. — an open-source implementation in a tool called Rosa which we evaluate on a number of benchmarks from the scientific computing and embedded systems domain and compare to state-of-the-art tools. 2. A COMPILER FOR REALS We first introduce Rosa’s specification language and give a high-level overview of the technical challenges and our solutions on a number of examples. A Real-Valued Specification Language Rosa is a ‘verifying’ source-to-source compiler which takes as input a program written in a real-valued non-executable specification language and outputs appropriate finite-precision code. A program is written in a functional subset of the Scala programming language and consists of a number of methods over the Real data type. Figures 1,4 and 5 show three such example methods. Pre- and postconditions allow the user to explicitly state possible errors on method inputs and maximum tolerable errors on the output(s), respectively. Taking into account all uncertainties and their propagation, Rosa chooses a data type from a range of floating-point and fixed-point precisions and emits the corresponding implementation in the Scala programming language. By writing programs in a real-valued source language, programmers can reason about the correctness of the real-valued algorithm, and leave the low-level implementation details to the automated sound analysis in Rosa. Besides this separation of concerns, the real-valued semantics also serves as an unambiguous ideal baseline against which to compute errors. We believe that making numerical errors explicit in pre- and postcondition attached directly to the source code makes it less likely that these will be forgotten or overlooked. Finally, such a language opens the door to sound compiler optimizations exploiting properties which are valid over reals, but not necessarily over finite-precision - as long as the accuracy specification is satisfied. Compilation Algorithm If a full specification (pre- and postcondition) is present on a method, Rosa analyzes the numerical computation and selects a suitable finite-precision data type which fulfills this specification and synthesizes the corresponding code. The user can specify which data types are acceptable from a range of floating-point and fixed-point precisions. The order in which these possible data types are given is important. Rosa searches through the data types, applying a static analysis for each, and tries to find the first in the list which ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:3 def sineWithError(x: Real): Real = { require(x > -1.57079632679 && x < 1.57079632679 && x +/- 1e-11) x - (x*x*x)/6.0 + (x*x*x*x*x)/120.0 - (x*x*x*x*x*x*x)/5040.0 } ensuring(res => res +/- 1.001e-11) Fig. 1. Approximation of sine with a Taylor expansion 101 10-3 10-8 10-13 10-18 10-23 10-28 10-33 10-38 10-43 10-48 10-53 10-58 10-63 Accuracy Running time for 1000 evaluations (ms) 102 100 10-1 16bit 32bit Float Double oubleDoubQlueadDouble D Fig. 2. Running times vs accuracy for different finite-precision data types satisfies the specification. While this analysis is currently repeated for each data type, parts of the computation can be shared and we plan to optimize the compilation process in the future. The selection and the order of data types may depend on resource limits. If, for example, a floating-point unit is not available or would be very costly, the programmer can prioritize fixed-point data types. In general, the larger the data type (in terms of bits) the more time and memory the execution will take. We illustrate the performance vs. accuracy trade-off for the sine function from Figure 1 in the graph in Figure 2, which shows the runtime and accuracy and in particular the trade-off between the two for different data types. Rosa helps programmers navigate this trade-off space by providing automated sound accuracy estimates. Rosa can also be used as an analysis tool. By providing one data type (without necessarily a postcondition), Rosa will perform the analysis and report the results, consisting of a real-valued range and maximum error of the result, to the user. These analysis result are also reported during the regular compilation process as they may yield useful insights. 2.1. Example 1: Straight-line Nonlinear Computations We illustrate this compilation process on the example in Figure 1, which shows the code of a method which computes the sine function with a 7th order Taylor approximation. The Real data type denotes an ideal real-valued variable without uncertainty or roundoff. The require clause specifies the range of the input parameter x as well as an initial uncertainty of 1e-11, which may stem from previous computations or measurement imprecisions. We would like to make sure that error on the result does not grow too large, so we constrain the error to 1.001e-11. We leave the data type unconstrained, so that Rosa considers 8, 16 and 32bit ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:4 E. Darulova and V. Kuncak /* @param x (x +/- 1.e-11) @return ((-1.0003675439019308 <= result && result <= 1.0003675439019308 && (result +/- 3.8907801077969955e-09))) */ def sineWithError(x : Long): Long = { require(-1.5707963268 <= x && x <= 1.5707963268) val val val val val val val val val val val val val val val val val val val _tmp1 = ((x * x) >> 31) _tmp2 = ((_tmp1 * x) >> 30) _tmp3 = ((_tmp2 << 30) / 1610612736l) _tmp4 = ((x << 1) - _tmp3) _tmp5 = ((x * x) >> 31) _tmp6 = ((_tmp5 * x) >> 30) _tmp7 = ((_tmp6 * x) >> 31) _tmp8 = ((_tmp7 * x) >> 31) _tmp9 = ((_tmp8 << 28) / 2013265920l) _tmp10 = ((_tmp4 + _tmp9) >> 1) _tmp11 = ((x * x) >> 31) _tmp12 = ((_tmp11 * x) >> 30) _tmp13 = ((_tmp12 * x) >> 31) _tmp14 = ((_tmp13 * x) >> 31) _tmp15 = ((_tmp14 * x) >> 30) _tmp16 = ((_tmp15 * x) >> 31) _tmp17 = ((_tmp16 << 23) / 1321205760l) _tmp18 = (((_tmp10 << 1) - _tmp17) >> 1) result = _tmp18 } Fig. 3. Sine function implemented in fixed-point arithmetic fixed-point arithmetic as well as single, double, double double and quad double floatingpoint precision by default (in this order). Rosa determines that 8 bit fixed-point precision potentially overflows, 16 or 32 bit fixed-point arithmetic is not accurate enough (total error of 2.54e-4 and 3.90e-9 respectively) and that single-precision floating-point arithmetic is neither (error of 2.49e-7). For double floating-point precision, Rosa determines the error of 1.000047e-11, so that it generates code over the Double data type. If we could accept a somewhat larger error, say 5e-9, then Rosa determines that 32bit fixed-point arithmetic is sufficient. We show the generated code in Figure 3. (All intermediate results fit into 32 bits, but as we need up to 64 bits to perform the arithmetic operations, we simulate the arithmetic here with the 64 bit Long data type.) Note that the generated code retains part of the precondition. In Scala, require expressions are actually runtime checks that throw an exception if the given condition is violated. Our error analysis, and code generation as well, is only valid if the range and error of the input is satisfied. We can only check the ranges at runtime, and Rosa generates the constraints such that they check the actual range (i.e. the ideal real-valued ranges ± all possible errors). Checking the result range with a postcondition is not necessary, since Rosa has already proven those bounds correct. In order to determine which data type is appropriate, Rosa performs a static analysis which computes a sound estimate of the worst-case absolute error. Since roundoff errors and error propagation depend on the ranges of (all intermediate) computations, Rosa needs to compute these as accurately as possible. We developed a technique which combines interval arithmetic [Moore 1966] with a nonlinear SMT solver, which provides accuracy as well as automation (section 4). In addition, using an SMT solver allows Rosa to take into account arbitrary additional constraints on the inputs, which, for example, neither interval nor ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:5 def sine(x: Real): Real = { require(-20 <= x && x <= 20) x - x*x*x/6 + x*x*x*x*x/120 } def pendulum(t: Real, w: Real, n: LoopCounter): (Real, Real) = { require(-2 <= t && t <= 2 && -5 <= w && w <= 5 && -2.01 <= ~t && ~t <= 2.01 && -5.01 <= ~w && ~w <= 5.01) if (n < val h: val L: val m: val g: val val val val val val 100) Real Real Real Real { = = = = 0.01 2.0 1.5 9.80665 k1t = w k1w = -g/L * sine(t) k2t = w + h/2*k1w k2w = -g/L * sine(t + h/2*k1t) tNew = t + h*k2t wNew = w + h*k2w pendulum5(tNew, wNew, n++) } else { (t, w) } } Fig. 4. Simulation of a pendulum affine arithmetic [de Figueiredo and Stolfi 2004] can. Rosa decomposes the total error into roundoff errors and propagated initial errors and computes each differently (section 5). The accumulation of roundoff errors is kept track off with affine arithmetic, while propagation errors are soundly estimated with a first-order Taylor approximation. The latter is fully automatically and accurately computed with again the help of a nonlinear SMT solver. 2.2. Example 2: Loops with Constant Ranges In general, numerical errors in loops grow unboundedly and the state-of-the-art to compute sound error bounds in complex code is by unrolling. It turns out, however, that our separation of errors into roundoff and propagation errors allows us to express the error as a function of the number of loop iterations. We have identified a class of loops for which we can derive a closed-form expression of the loop error bounds. This expression, on one hand, constitutes an inductive invariant, and, on the other hand, can be used to compute concrete error bounds. While this approach is limited to loops where the variable ranges are bounded, our experiments show that this approach can already analyze interesting loops that are out of reach for current tools. Figure 4 shows such an example: a Runge Kutta order 2 simulation of a pendulum. t and w are the angle the pendulum forms with the vertical and the angular velocity respectively. We approximate the sine function with its order 5 Taylor series polynomial. We focus on roundoff errors between the system following the real-valued dynamics and the system following the same dynamics but implemented in finite precision (we do not attempt to capture truncation errors due to the numerical integration, nor due to the Taylor approximation of sine). After 100 iterations, for instance, Rosa determines that the error on the results is at most 8.82e-14 ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:6 E. Darulova and V. Kuncak def jetApproxGoodFitWithError(x: Real, y: Real): Real = { require(-5<=x && x<=5 && -5<=y && y<=5 && x +/- 0.001 && y +/- 0.001) if (y < x) { -0.317581 + 0.0563331*x + 0.0966019*x*x + 0.0132828*y + 0.0372319*x*y + 0.00204579*y*y } else { -0.330458 + 0.0478931*x + 0.154893*x*x + 0.0185116*y 0.0153842*x*y - 0.00204579*y*y } } Fig. 5. Approximation of a complex embedded controller and 1.97e-13 (for t and w respectively) when implemented in double-precision floating-point arithmetic and 7.38e-7 and 1.65e-6 in 32 bit fixed-point arithmetic. 2.3. Example 3: Discontinuities Embedded systems often use piece-wise approximations of more complex functions. In Figure 5 we show a possible piece-wise polynomial approximation of a fairly complex jet engine controller. We obtained this approximation by fitting a polynomial to a sample of values of the original function. Note that the resulting function is not continuous. A precise constraint encoding the difference between the real-valued and finite-precision computation, if they take different paths, features variables that are tightly correlated. This makes it hard for SMT-solvers to cope with and makes linear approaches imprecise. We explore the separation of errors idea in this scenario as well, to soundly estimate errors due to conditional branches. We separate the real-valued difference from finite-precision artifacts. The individual error components are easier to handle individually, yet preserve enough accuracy. In our example, the real-valued difference between the two branches is bounded by 0.0428 (making it arguably a reasonable approximation given the large possible range of the result). However, this is not a sound estimate for the discontinuity error in the presence of roundoff and initial errors (in our example 0.001). With Rosa, we can confirm that the discontinuity error is bounded by 0.0450 with double floating-point precision, with all errors taken into account. 3. PROBLEM DEFINITION Clearly, error computation is the main technical challenge of our compiler for Reals. Before we describe our solution in detail, we first precisely define the error computation problem that Rosa is solving internally. Formally, an input program consists of one or more methods given by the grammar in Figure 6. args denotes possibly multiple arguments and res can be √ a tuple. The method body may consist of the standard arithmetic operators +, −, ∗, /, , as well as immutable variable declarations (val t1 = ...), functional calls and conditionals. Note that square root is only supported for floating-point arithmetic. The specification language is functional, so we represent loops as recursive functions (denoted L), where n denotes the integer loop iteration counter. For loop-free code D, note that more complex conditions on branches can be expressed with nesting. Let us denote by P a real-valued function representing our program and by x its input. Denote by P̃ the corresponding finite-precision implementation of the program, which has the same syntax tree but with operations interpreted in finite-precision arithmetic. Let x̃ denote the input to this finite-precision program. The technical challenge of Rosa is to ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:7 estimate the difference: max |P (x) − P̃ (x̃)| x,x̃ (1) which denotes the absolute error of the result of the program. This error is crucial for selecting an implementation data type. The domains of x and x̃, over which this expression is to be evaluated, are given by the userprovided precondition in the require clause. It defines range bounds xi ∈ [ai , bi ], x̃i ∈ [ci , di ] for each component of the possibly multivariate input, as well as absolute error bounds on the inputs of the form xi +/- λi that define the relationship |x − x̃| ≤ λ, understood component-wise. If no errors are given explicitly, we assume roundoff as the initial error. The ability to specify initial errors in addition to roundoff is important for modular verification where the errors of one method may feed to following ones. Additionally, the require clause may specify further constraints on the inputs, such as x*x + y*y <= 20.0. Method calls are handled either by inlining the postcondition or the whole method body. Corresponding to the syntactic program is a real-valued mathematical expression which is the input to our core error computation procedure. Concretely, the input consists of one or several real-valued functions f : Rm → Rn over some inputs xi ∈ R, representing the arithmetic expressions F. We denote by f and x the exact ideal real-valued function and variables and by f˜ : Rm → Rn , x̃i ∈ R their actual finite-precision counter-parts. Note that for our analysis all variables are real-valued; the finite-precision variable x̃ is considered as a noisy versions of x. We perform the error computation with respect to some fixed target precision in floating-point or fixed-point arithmetic; this choice gives error bounds for each individual arithmetic operation. When P consists of a nonlinear arithmetic expression alone (F), then Equation 1 reduces to bounding the absolute error on the result of evaluating f (x) in finite precision arithmetic: maxx,x̃ |f (x) − f˜(x̃)| (section 5). When the body of P is a loop (L), then the constraint reduces to computing the overall error after k-fold iteration f k of f , where f corresponds to the loop body. We define for any function H: H 0 (x) = x, H k+1 (x) = H(H k (x)). We are then interested in bounding (section 6): max|f k (x) − f˜k (x̃)| x,x̃ For code containing branches (grammar rule D), Equation 1 accounts also for the discontinuity error. For example, if we let f1 and f2 be the real-valued functions corresponding to the if and the else branch respectively with the if condition c, then, if c(x) ∧ ¬c(x̃), the discontinuity error is given by |f1 (x) − f˜2 (x̃)|, i.e., it accounts for the case where the P ::= A S L D B ::= ::= ::= ::= ::= √ ::= F + F | F - F | F * F | F / F | F ::= F ≤ F | F < F | F ≥ F | F > F ::= x | const F C X def mName(args): res = { require(A1 ∧ . . . ∧ An ) ( L | D | B ) } C | x +/- const | S S ∧ S | S ∨ S | ¬ S | C if (n < const) mName(B, n + 1) else args if (C) D else D | B val x = F; B | F | X Fig. 6. Rosa’s input language ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:8 E. Darulova and V. Kuncak real computation takes the if-branch, and the finite-precision one takes the else branch. The overall error on P from Equation 1 in this case must account for the maximum of discontinuity errors between all pairs of paths, as well as propagation and roundoff errors for each path (section 7). A note on relative error Our technique soundly overestimates the absolute error of the computation. A sound estimate of the relative error can be computed from this and from the range of the result provided that the range does not include zero. Whenever this is the case, Rosa also reports the relative error in addition to the absolute one. 3.1. Finite-precision Arithmetic Rosa supports analysis and code generation for floating-point and fixed-point arithmetic of different precisions. We assume IEEE754 floating-point semantics. We regard overflow and underflow as errors and Rosa will report the possibility of these occurring as such. We assume rounding to nearest, however as long as the roundoff error can be determined from the range of possible values, our analysis can be straight-forwardly adapted. Code generation currently supports standard single and double floating-point arithmetic, as well as double-double and quad-double precisions implemented in software [Bailey et al. 2013]. Fixed-point arithmetic also represents a subset of the rationals, but unlike floating-point arithmetic does not require specialized hardware. Instead, it is implemented with integer operations only, which makes it attractive especially for resource-bound systems. The consequence of this is, however, that the alignment of (implicit) decimal points has to be performed manually with bit shift operations at compile time. For this, the global ranges at each intermediate computation step have to be known, respectively have to be computed. For more details please see Anta et al. [2010], whose fixed-point semantics we follow. While the input and output language is a subset of Scala, the analysis is programming language agnostic, providing the IEEE 754 standard is supported, and adapting Rosa to a different back-end would be straight-forward. 4. COMPUTING RANGES ACCURATELY The first step to accurately estimating roundoff and propagation errors is to have a procedure to estimate ranges as tightly as possible. This is important as these errors directly depend on the ranges of all, including intermediate, values and coarse range estimates may result in inaccurate errors computed or make the analysis impossible due to spurious potential runtime errors (division by zero, etc.). 4.1. Interval and Affine Arithmetic Traditionally, guaranteed computations have been performed with interval arithmetic [Moore 1966]. Interval arithmetic computes a bounding interval for each basic operation as x ◦ y = [min(x ◦ y), max(x ◦ y)] ◦ ∈ {+, −, ∗, /} and analogously for square root. For longer computations, interval arithmetic introduces over-approximations, as it cannot track correlations between variables (e.g. x − x 6= 0). Affine arithmetic [de Figueiredo and Stolfi 2004] partially addresses this loss of correlation by representing possible values of variables as affine forms x̂ = x0 + n X xi i i=1 where x0 denotes the central value (of the represented interval) and each noise symbol i is a formal variable denoting a deviation from this central value, intended to range over [−1, 1]. The maximum magnitude of each noise term is given by the corresponding xi . The range ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:9 def getRange(expr, precondition, precision, maxIterations): z3.assertConstraint(precondition) [aInit, bInit] = evalInterval(expr, precondition.ranges); //lower bound if z3.checkSat(expr < a + precision) == UNSAT a = aInit b = bInit numIterations = 0 while (b-a) < precision ∧ numIterations < maxIterations mid = a + (b - a) / 2 numIterations++ z3.checkSat(expr < mid) match case SAT ⇒ b = mid case UNSAT ⇒ a = mid case Unknown ⇒ break aNew = a else aNew = aInit //upper bound symmetrically bNew = ... return: [aNew, bNew] Fig. 7. Algorithm for computing the range of an expression represented by an affine form is computed as [x̂] = [x0 − rad(x̂), x0 + rad(x̂)], rad(x̂) = n X |xi | i=1 Note that the sign of the xi s does not matter in isolation, it does, however, reflect the relative dependence between values. E.g., take x = x0 + x1 1 , then x − x = x0 + x1 1 − (x0 + x1 1 ) = x0 − x0 + x1 1 − x1 1 = 0 If we subtracted x0 = x0 − x1 1 instead, the resulting interval would have width 2 ∗ x1 and not zero. Linear operations are performed term wise and are computed exactly, whereas nonlinear ones need to be approximated. Affine arithmetic can thus track linear correlations, it is, however, not generally better than interval arithmetic: e.g. x∗y, where x = [−5, 3], y = [−3, 1] gives [−13, 15] in affine arithmetic and [−9, 15] in interval arithmetic. 4.2. Range Estimation using Satisfiability Modulo Theories (SMT) Solvers While interval and affine arithmetic are reasonably fast for range estimation, they tend to introduce over-approximations, especially if the input intervals are not sufficiently small. We improve over them by combining interval arithmetic with a nonlinear SMT (Satisfiability Modulo Theories) constraint solver to obtain automation and accuracy. Figure 7 shows the algorithm for computing the lower bound of a range. The computation for the upper bound is symmetric. For each range to be computed, our technique first computes an initial sound estimate of the range with interval arithmetic. It then performs an initial quick check to test whether the computed first approximation bounds are already tight. If not, it uses the first approximation as the starting point and then narrows down the lower and upper bounds using a binary search. At each step of the binary search our tool uses the nonlinear nlsat solver within Z3 [De Moura and Bjørner 2008; Jovanović and de Moura 2012] to confirm or reject the newly proposed bound. The search stops when either ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:10 E. Darulova and V. Kuncak Z3 fails, i.e. returns unknown for a query or cannot answer within a given timeout, the difference between subsequent bounds is smaller than a precision threshold, or the maximum number of iterations is reached. This stopping criterion can be adjusted by the user. Additional Constraints In our approach, since we are using Z3 to check the soundness of bounds, we can assert the additional constraints and perform all checks with respect to all additional and initial constraints. This is especially useful when taking into account branch conditions from conditionals. Optimizations Calling an SMT solver is fairly expensive so we want to minimize the number of calls. The algorithm Figure 7 presents several direct knobs to do this: the maximum number of iterations and the precision of the range estimate. Through our experiments we have identified suitable default values, which seem to present a good trade-off between accuracy and performance. In addition to these two parameters, if we are only interested in the final range, we do not need to call Z3 and the algorithm in Figure 7 for every intermediate expression. In principle, we could call Z3 only on the full expression, however, we found that this resulted in suboptimal results as this expression very often was too complex. We found a good compromise in calling Z3 only every 10 arithmetic operations. All of these parameters can be adjusted by the user. 5. SOUNDLY ESTIMATING NUMERICAL ERRORS IN NONLINEAR EXPRESSIONS Now we address the first challenge of error estimation for a loop-free nonlinear function without branches: |f (x) − f˜(x̃)| where |x − x̃| ≤ λ, f : Rm → Rn and where the ranges for x and x̃ are given by the precondition. 5.1. Error Estimation with Affine Arithmetic Consider first roundoff errors only that is, we are interested in |f (x) − f˜(x)|, where the input errors are zero. Our procedure executes the computation abstractly by computing an interval and an affine form for each AST node: (range: Interval, err ˆ : AffineForm) represents the real-valued range, and err ˆ the accumulated worst-case errors, with essentially one noise term for each roundoff error (together with artifacts from nonlinear approximations). The actual finite-precision range is then given by range + [err], ˆ where [err] ˆ denotes the interval represented by the affine form. For each computation step, we compute the range (1) new range with our range procedure from section 4 (2) propagation of already accumulated errors (3) new roundoff error, which is then added to the propagated affine form. Since we compute the range at each intermediate node, we also check for possible overflows, underflows, division by zero or negative square root errors without extra effort. Propagation of Errors with Affine Arithmetic For linear operations, errors are propagated with the standard rules of affine arithmetic. For multiplication, division and square root the error propagation depends on the range of values, so that we have to adapt our computation to use the ranges computed with our Z3-backed procedure. In the following, we denote the real range of a variable x by [x] and its associated error by the affine form err ˆ x . When we write [x] ∗ err ˆ y we mean that the interval [x] is converted into an affine form and the multiplication is performed in affine arithmetic. Multiplication is computed as x ∗ y = ([x] + err ˆ x )([y] + err ˆ y) = [x] ∗ [y] + [x] ∗ err ˆ y + [y] ∗ err ˆ x + err ˆ x ∗ err ˆy +ρ ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:11 where ρ is the new roundoff error. Thus the first term contributes to the ideal range and the remaining three to the error affine form. The larger the factors [x] and [y] are, the larger the finally computed errors will be so that a tight range estimation is important for accuracy. Division is computed as x 1 = x ∗ = ([x] + err ˆ x )([1/y] + errˆ1/y ) y y 1 1 = [x] ∗ [ ] + [x] ∗ err ˆ y1 + [ ] ∗ err ˆ x + err ˆ x ∗ err ˆ y1 + ρ y y For square root, we first compute an affine approximation of square root as in our previous work [Darulova and Kuncak 2011]: √ x=α∗x+ζ +θ and then perform the affine multiplication term wise. Roundoff Error Computation Roundoff errors for floating-point arithmetic are computed at each computation step as ρ = δ * maxAbs(totalRange) where δ is the machine epsilon, and added to err ˆ as a fresh noise term. Note that this roundoff error computation makes our error computation parametric in the floating-point precision. Since we regard (and report) subnormal numbers as errors, this error abstraction is sound. For fixed-point arithmetic, roundoff errors are computed as ρ = getFormat(totalRange, bitWidth).quantizationError where the getFormat function returns the best fixed-point format [Anta et al. 2010] that can accommodate the range. This computation is parametric in the bit-width. 5.2. Separation of Errors We could use the affine arithmetic based procedure to track all errors,not only roundoff errors, by simply adding the initial error as a fresh noise term at the beginning. Such an approach treats all errors equally: the initial errors are propagated in the same way as roundoff errors which are committed during the computation. We found, however, that the over-approximation introduced by affine arithmetic for nonlinear computations increases substantially as the magnitude of the noise terms (i.e. the errors) becomes larger. Instead, we separate the total error as follows: |f (x) − f˜(x̃)| = |f (x) − f (x̃) + f (x̃) − f˜(x̃)| (2) ≤ |f (x) − f (x̃)| + |f (x̃) − f˜(x̃)| The first term, |f (x) − f (x̃)|, captures the error on the result of f caused by the initial error between x and x̃. The second term, |f (x̃) − f˜(x̃)|, covers the roundoff error committed when evaluating f in finite precision, but note that we can now compute this roundoff error on the same input x̃. Thus, we separate the overall error into the propagation of existing errors, and the newly committed roundoff errors. We denote by σf : Rm → Rn the function which returns the roundoff error committed when evaluating an expression f in finite-precision arithmetic: σf (x̃) = |f (x̃) − f˜(x̃)|. We omit the subscript f , when it is clear from the context. Further, g : Rm → Rn denotes a function which bounds the difference in f , given a difference in its inputs: |f (x) − f (y)| ≤ g(|x − y|). When m, n > 1, the absolute values are component-wise, e.g. g(|x1 − y1 |, . . . , |xm − ym |), but when it is clear from the context, we will write g(|x − y|) for clarity. Thus, the overall numerical error is given by: |f (x) − f˜(x̃)| ≤ g(|x − x̃|) + σ(x̃) ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. (3) A:12 E. Darulova and V. Kuncak One alternative to Equation 2 would be to bound the error by |f (x) − f˜(x)| +|f˜(x) − f˜(x̃)|. The first term now corresponds to roundoff errors, but the second requires bounding the difference of f˜ over a certain input interval. In the separation that we have chosen, we need to compute the difference over the real-valued f . Note that f is a simpler function than its finite-precision counterpart, and its analysis is reusable across different concrete implementations. The function σ is instantiated with the affine arithmetic based procedure from subsection 5.1. Since roundoff errors are local, we found affine arithmetic suitable for this purpose. In contrast, the propagation of existing errors (function g) depends highly on the steepness of the function, so we want to capture as much global information, such as correlations between variables, as possible. This is only feasible when looking at the function as a whole. 5.3. Propagation Errors We instantiate Equation 3 with g(x) = K · x, i.e. |f (x) − f (y)| ≤ K|x − y| which bounds the deviation on the result due to a difference in the input by a linear function in the input errors. The constant K (or vector of constants Ki in the case of a multivariate function) is to be determined for each function f individually, and is usually called the Lipschitz constant. We will also use the in this context more descriptive name propagation coefficient. Note that we need to compute the propagation coefficient K for the mathematical function f and not its finite-precision counterpart f˜. Error amplification or diminution depends on the derivative of the function at the value of the inputs. The steeper the function, i.e. the larger the derivative, the more the errors are magnified. For f : Rm → R we have |f (x) − f (x̃)| ≤ m X i=1 Ki λi , where Ki = sup x,x̃ ∂f ∂wi (4) where λi are the initial errors and wi denote the formal parameters of f . This computation naturally extends component-wise to multiple outputs. Thus, the propagation coefficients are computed as a sound bound on the Jacobian. We formally derive the computation of the propagation coefficients Ki for a multivariate function f : Rm → R in the following. Let h : [0, 1] → R such that h(θ) := f (y + θ(z − y)). d Without loss of generality, assume y < z. Then h(0) = f (y) and h(1) = f (z) and dθ h(θ) = ∇f (y + θ(z − y)) · (z − y). By the mean value theorem: f (z) − f (y) = h(1) − h(0) = h0 (ζ), where ζ ∈ [0, 1]. |f (z) − f (y)| = |h0 (ζ)| = |∇f (y + ζ(z − y)) · (z − y)|   ∂f ∂f = ,..., · (z − y) , s = y + ζ(z − y) ∂w1 s ∂wm s ∂f ∂f · (z1 − y1 ) + · · · + · (zm − ym ) = ∂w1 ∂wm m X ∂f ≤ · |zi − yi | (**) ∂wi i=1 where the partial derivatives are evaluated at s = y + ζ(z − y) (which we omit for readability). The value of s in (**) is constraint to be in s ∈ [y, z], so for a sound analysis we have to determine the maximum absolute value of the partial derivative over [y, z]. y and z in our application range over the values of x and x̃ respectively, so we compute the maximum ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals absolute value of ∂f ∂xi A:13 over all possible values of x and x̃. With |yi − zi | ≤ λi we obtain |f (x) − f (x̃)| ≤ m X Ki λi , where Ki = sup x,x̃ i=1 ∂f ∂wi Bounding Partial Derivatives We compute the partial derivatives symbolically. Recall that √ the arithmetic operations permitted are {+, −, ∗, /, }, which leaves the possibility of discontinuities and undefined expressions. We detect these automatically during the bound computation, so we do not need to make or check any assumptions on the derivatives up-front. We need to soundly bound the partial derivatives over all possible values of x and x̃. Both interval and affine arithmetic suffer from possibly large over-approximations due to nonlinearity and loss of correlations. Furthermore, they cannot take additional constraints into account, for example from branch conditions (e.g. y < x) or user defined constraints on the inputs. We use the range computation from section 4 which allows us to take these into account, making the ranges computed much tighter. Sensitivity to Input Errors Beyond providing a way to compute the propagated initial errors, Equation 4 also makes an upper bound on the sensitivity of the function to input errors explicit. The user can use this knowledge, for example, to determine which inputs need to be determined more precisely, e.g. by more precise measurements or by using a larger number of iterations of a numerical algorithm to find them. We report the values of K back to the user. 5.4. Relationship with Affine Arithmetic Both our presented propagation procedure and propagation using affine arithmetic perform approximations. The question arises then, when is it preferable to use one over the other? Our experience and experiments show empirically that for longer nonlinear computations, error propagation based on Lipschitz continuity gives better results, whereas for shorter and linear computations this is not the case. In this section, we present an analysis of this phenomenon based on a small example. Suppose we want to compute x ∗ y − x2 . For this discussion we consider propagation only and disregard roundoff errors. We consider the case where x and y have an initial error of δx 1 and δy 2 respectively, where i ∈ [−1, 1] are the formal noise symbols of affine arithmetic. Without loss of generality, we assume δx , δy ≥ 0. We first derive the expression for the error with affine arithmetic and take the definition of multiplication from subsection 5.1. We denote by [x] the evaluation of the real-valued range of the variable x. The total range of x is then the real-valued range plus the error: [x] + δx 1 , where 1 ∈ [−1, 1]. Multiplying out, and removing the [x][y] − [x]2 term (since it is not an error term), we obtain the expression for the error of x ∗ y − x2 : ([y]δx 1 + [x]δy 2 + δx δy 3 ) − (2[x]δx 1 + δx δx 4 ) = ([y] − 2[x])δx 1 + [x]δy 2 + δx δy 3 + δx δx 4 (5) 3 and 4 are fresh noise symbols introduced by the nonlinear approximation. Now we compute the propagation coefficients: ∂f = y − 2x ∂x ∂f =x ∂y so that the error is given by [y + δy 2 − 2(x + δx 1 )] δx + [x + δx 1 ] δy ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. (6) A:14 E. Darulova and V. Kuncak We obtain this expression by instantiating Equation (**) with the range expressions of x and y. Note that the ranges used in the evaluation of the partial derivatives include the errors. Multiplying out Equation 6 we obtain: [y − 2x] δx + [x] δx + δx δy + δx δx + δx δx (7) With affine arithmetic, we compute ranges for propagation at each computation step, i.e. in Equation 5 we compute [x] and [y] separately. In contrast, with our new technique, the range is computed once, taking all correlations into account between the variables x and y. It is these correlations that improve the computed error bounds. For instance, if we choose x ∈ [1, 5] and y ∈ [−1, 2] and we, say, know that x < y, then by a step-wise computation we obtain [y] − 2[x] = [−1, 2] − 2[1, 5] = [−11, 0] whereas taking the correlations into account, we can narrow down the range of x to [1, 2] and obtain [y −2x] = [−1, 2]−2[1, 2] = [−5, 0]. Hence, since we compute the maximum absolute value of these ranges for the error computation, affine arithmetic will use the factor 11, whereas our approach will use 5. But, comparing Equation 7 with Equation 5, we also see that one term δx δx is included twice with our approach, whereas in the affine propagation it is only included once. We conclude that a Lipschitz-based error propagation is most useful for longer computations where it can leverage correlations. In other cases, we keep the existing affine arithmetic-based technique. It does not require a two-step computation, so we want to use it for smaller expressions. We remark that for linear operations the two approaches are equivalent. 5.5. Implementation We have implemented Rosa in the Scala programming language. Internally, we use a rational data type implemented on top of Java’s BigIntegers for all our computations. This lets us avoid having to deal with roundoff errors ourselves, and easily interface with Z3 which also uses rationals. 5.6. Comparison with State-of-the-Art We are aware of two other tools which can automatically quantify numerical errors: Fluctuat [Goubault and Putot 2011] and FPTaylor [Solovyev et al. 2015]. Fluctuat is an abstract interpreter which uses affine arithmetic for both the ranges of variables and for the error computation. In order to combat the over-approximations introduced by affine arithmetic, Fluctuat can add constraints on noise terms [Ghorbal et al. 2010]. Further, Fluctuat uses Taylor approximations locally to handle division and square root [Ghorbal et al. 2009], but the expansion is hard coded and does not consider the global expression Another technique employed by Fluctuat is interval subdivision, where the user can designate up to two variables in the program whose ranges will be subdivided, analyzed separately and the results then merged. This procedure works for floating- point arithmetic as the decimal point is dynamic, however, for fixed-point arithmetic the global ranges are needed at each point. Naturally, interval subdivision increases the runtime of the analysis, especially for multivariate functions, and the optimal subdivision strategy may not always be obvious. Interval subdivision can also be straight-forwardly added to Rosa - at a performance penalty. We choose here to compare our SMT-based technique against Fluctuat with and without subdivision to obtain a good comparison between the techniques. In the future, we expect a combination of different techniques to work best. Fluctuat also has a procedure for computing discretization errors, and can handle loops either by computing fixpoints, if such exist, or by unrolling. Finally, Fluctuat also separates errors similarly to our presented approach, although it does not treat the different part fundamentally differently as we do. We want to note that our formalism has also enabled the unified treatment of loops and discontinuities. ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:15 FPTaylor [Solovyev et al. 2015] is a recent tool for computing the roundoff errors of nonlinear expressions, including transcendental functions. It relies similarly to Rosa on Taylor series, but does the expansion with respect to errors, whereas we expand with respect to inputs. Furthermore, FPTaylor uses a global optimization as the backend, which enables the use of transcendental functions (Z3’s nlsat solver only supports arithmetic). FPTaylor currently only supports error computation for straight-line computations in floating-point arithmetic. Like Rosa, both Fluctuat and FPTaylor also compute relative errors from absolute errors, whenever the resulting range does not straddle zero. Another framework that can be used for estimating numerical errors is the Frama-C framework [2015] with the Gappa front-end [Boldo and Marché 2011]. Gappa works internally with interval arithmetic and works best on precise properties when the user can provide hints [Solovyev et al. 2015]. In this paper we want to focus on automated error estimation, thus we only compare our results against those from Fluctuat and FPTaylor. 5.7. Experimental Results We have chosen a number of benchmarks from the domains of scientific computing and embedded systems [Anta et al. 2010; Woodford and Phillips 2012] to evaluate the accuracy and performance of our technique. The tool and all benchmarks are open-source and available at https://github.com/malyzajko/rosa. We perform all tests in double floating-point precision as this is the precision supported by both Fluctuat and FPTaylor. Rosa is currently the only tool that also supports fixedpoint arithmetic. In our experience, while the absolute errors naturally change with varying precisions and data types, relative differences when comparing different tools on the same precision data type remain similar. Experiments were performed on a desktop computer running Ubuntu 14.04.1 with a 3.5GHz i7 processor and 16GB of RAM, and using the unstable branch (as of 10 December 2014) of Z3. Table I shows our experimental results in terms of accuracy (absolute errors computed) and performance (running time of tool). All running times have been rounded up. We consider three flavors of our benchmarks: inputs with roundoff errors only, inputs with initial larger uncertainties and inputs with an additional nonlinear constraint. Inputs with Roundoff In the first set of benchmarks in Table I we assume only roundoff as the initial error on inputs. We compare against Fluctuat without and with subdivisions. For the subdivisions, we uniformly chose 20 subdivisions for the two inputs where the effect was largest. While choosing more is certainly possible, we found the running time increasing rapidly and disproportionately with the accuracy gains. For FPTaylor we used default settings with the improved rounding model, approximate optimization and the branch and bound optimization procedure, which we believe are the most accurate settings. The annotation ’(ref)’ marks benchmarks that are refactored. Rosa’s technique in general benefits from such a refactoring (see subsection 5.4), which is supported by the experiments. For Fluctuat this is also sometimes the case when subdivisions are used. FPTaylor is able to compute the tightest error bounds on these benchmarks, but we observe that the difference (except for the jet example) are in many cases not very large. FPTaylor’s computation is also the most time consuming in the majority of cases. Finally, we would like to remark that subdivisions cannot be directly extended to fixedpoint arithmetic as the determination of fixed-point formats and thus roundoff errors requires the knowledge of the global ranges, i.e. the ranges valid over all input and not only over the subdivision. Inputs with Uncertainties The second set of benchmarks features inputs with uniform uncertainty of 1e-11, aiming to compare the different tools ability to estimate the error propagation accurately. The tools’ settings are the same as for the first set of testcases. ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:16 E. Darulova and V. Kuncak Table I. Absolute errors computed by Rosa, Fluctuat and FPTaylor for double-precision floating-point arithmetic. (r) marks refactored benchmarks, (e) marks benchmarks with additional input errors benchmark Rosa Fluctuat Fluctuat (subdiv) FPTaylor Rosa Fluctuat Fluctuat (subdiv) FPTaylor 3.90e-13 3.90e-13 4.08e-8 4.08e-8 3.65e-11 3.65e-11 7.97e-16 1.15e-15 3.21e-13 9.20e-14 9.26e-14 1.29e-13 1.34e-13 6.99e-14 7.03e-14 1.54e-13 1.40e-13 2.10e-11 1.88e-11 3.65e-11 3.65e-11 7.41e-16 1.09e-15 3.21e-13 2.21e-14 2.21e-14 2.87e-14 2.87e-14 1.34e-14 1.32e-14 1.35e-13 1.35e-13 1.17e-11 1.17e-11 3.61e-11 3.61e-11 5.52e-16 8.90e-16 2.87e-13 2.11e-14 2.11e-14 2.62e-14 2.62e-14 1.55e-14 1.55e-14 total total (-jet) 8 7 95 77 1 1 2 1 1 5 2 2 1 4 2 209 37 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 15 13 2 2 2 2 2 2 1 1 1 2 2 2 2 2 2 27 23 7 7 12 12 6 5 6 4 7 8 8 6 7 7 7 109 85 5.45e-11 4.67e-4 1.82e-9 2.82e-9 1.24e-9 1.50e-7 2.09e-11 2.21e-11 1.37e-7 6.02e-10 6.14e-10 2.53e-10 1.50e-7 1.01e-11 1.82e-11 3.85e-8 4.61e-10 5.86e-10 3.32e-10 1.50e-7 1.00e-11 total total (-jet) 13 76 2 1 2 2 2 98 22 1 1 1 1 1 1 1 7 6 2 2 2 2 2 2 1 13 11 7 13 8 10 8 6 6 58 45 1.09e-13 1.37e-11 4.08e-8 4.67e-4 3.65e-11 1.50e-7 8.66e-14 1.94e-9 1.45e-13 3.02e-9 7.32e-14 1.33e-09 4.84e-14 6.28e-12 1.88e-11 1.37e-7 3.34e-11 1.15e-7 2.21e-14 6.51e-10 2.44e-14 6.33e-10 9.50e-15 2.30e-10 1.57e-14 4.77e-13 1.48e-11 1.52e-11 6.78e-8 2.48e-14 4.59e-10 2.92e-14 4.84e-10 1.49e-14 2.76e-10 total total (-jet) 7 12 84 81 13 13 3 2 2 2 5 5 229 64 1 1 1 1 1 1 1 1 1 1 1 1 12 10 2 2 2 2 2 2 2 2 2 2 2 2 24 20 5 11 1731 61 284 6 109 6 37 11 316 2577 846 with roundoff errors only doppler doppler (r) jet jet (r) rigidBody rigidBody (r) sine sineOrder3 sqroot turbine1 turbine1 (r) turbine2 turbine2 (r) turbine3 turbine3 (r) 4.15e-13 2.42e-13 5.33e-9 4.91e-9 3.65e-11 3.65e-11 5.74e-16 9.96e-16 2.87e-13 5.99e-14 5.15e-14 7.68e-14 6.30e-14 4.62e-14 4.02e-14 with input errors doppler (re) jet (re) turbine1 (re) turbine2 (re) turbine3 (re) rigidBody (re) sine (e) 1.83e-11 3.36e-7 4.61e-10 5.87e-10 3.33e-10 1.50e-7 1.00e-11 with input constraint doppler (r) doppler (re) jet (r) jet (re) rigidBody (r) rigidBody (re) turbine1 (r) turbine1 (re) turbine2 (r) turbine2 (re) turbine3 (r) turbine3 (re) 1.76e-14 4.67e-13 4.91e-9 3.36e-7 1.66e-11 8.84e-8 4.26e-14 4.61e-10 5.26e-14 5.87e-10 3.55e-14 3.33e-10 ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:17 Except for the jet example, which is difficult for Z3, Rosa computes essentially as tight error bounds as FPTaylor with a smaller running time. Inputs with Nonlinear Constraint For the last set of benchmarks, we have constrained the inputs with a nonlinear constraint of the form x ∗ x + y ∗ y + z ∗ z < c, where x, y, z are input variables and c is a meaningful benchmark-specific constant. This constraint is representative of constraints that cannot be captured by a linear technique like affine arithmetic. In Rosa, this constraint can be specified naturally in the precondition. In Fluctuat, it is possible to enclose the computation in an if-condition (if (constr) ...) and the affine terms will be constrained with a linearized branch condition. We used the ’Constraints on noise symbols’ setting. FPTaylor provides syntax to specify additional constraints, however these are only supported with Z3 as the backend, and hence without the improved rounding model. We observe that no one tool consistently provides the most accurate error estimates, but that FPTaylor’s technique turns out to be quite expensive in this case. 6. LOOPS We have identified a class of loops for which the propagation of errors idea allows us to express the numerical errors as a function of the number of iterations. Concretely, we assume a single non-nested loop without conditional branches for which the ranges of variables are bounded and fixed statically. We do not attempt to prove that ranges are preserved across loop iterations; we leave the discovery of suitable inductive invariants that implies ranges for future work. Our approach does not include all loops, but it does cover a number of interesting patterns, including simulations of initial value problems in physics. We note that the alternative for analyzing numerical errors in general nonlinear loops is unrolling, which, as our experiments show, does not scale well. 6.1. General Error Propagation Representing the computation of the loop body by f , we want to compute the overall error after k-fold iteration f k of f : |f k (x) − f˜k (x̃)|. f, g and σ are now vector-valued: f, g, σ : Rn → Rn , because we are nesting the potentially multivariate function f . In essence, we want to compute the effect of iterating Equation 3. Theorem: Let g be such that |f (x) − f (y)| ≤ g(|x − y|), it satisfies g(x + y) ≤ g(x) + g(y) and is monotonic. Further, σ and λ satisfy σ(x̃) ≤ |f (x̃) − f˜(x̃)| and |x − x̃| ≤ λ. The absolute value is taken component-wise. Then the numerical error after k iterations is given by |f k (x) − f˜k (x̃)| ≤ g k (|x − x̃|) + k−1 X g i (σ(f˜k−i−1 (x̃))) (8) i=0 Thus, the overall error after k iterations can be decomposed into the initial error propagated through k iterations, and the roundoff error from the ith iteration propagated through the remaining iterations. ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:18 E. Darulova and V. Kuncak Proof: We show this by induction. The base case k = 1 is covered by our treatment of straight-line computations (subsection 5.2). By adding and subtracting f (f˜k−1 (x̃))1 we get  k  |f (x)1 − f˜k (x̃)1 |   ..   . k k ˜ |f (x)n − f (x̃)n |  k    |f (x)1 − f (f˜k−1 (x̃))1 | |f (f˜k−1 (x̃))1 − f˜k (x̃)1 |     .. .. ≤ +  . . k k−1 k−1 k ˜ ˜ ˜ |f (x)n − f (f (x̃))n | |f (f (x̃))n − f (x̃)n | Applying the definitions of g and σ  k−1  |f (x)1 − f˜k−1 (x̃)1 |   .. k−1 ≤ g  + σ(f˜ (x̃)) . |f k−1 (x)n − f˜k−1 (x̃)n | then using the induction hypothesis and monotonicity of g, ! k−2 X k−1 ~ i k−i−1 ≤g g (λ) + g (σ(f˜ (x̃))) + σ(f˜k−1 (x̃)) i=0 then using g(x + y) ≤ g(x) + g(y), we finally have ≤ g k (~λ) + k−1 X g i (σ(f˜k−i−1 (x̃))) + σ(f˜k−1 (x̃)) i=1 = g k (~λ) + k−1 X g i (σ(f˜k−i−1 (x̃)))  i=0 6.2. Closed Form Expression We instantiate the propagation function g as before using propagation coefficients. Evaluating Equation 8 as given, with a fresh set of propagation coefficients for each iteration i amounts to loop unrolling, but with a loss of correlation between each loop iteration. We observe that when the ranges are bounded (as by our assumption), then we can compute K as a matrix of propagation coefficients, and similarly obtain σ(f˜i ) = σ as a vector of constants, both valid for all iterations. Then we obtain a closed-form for the expression of the error: |f k (x) − f˜k (x̃)| ≤ K k λ + k−1 X i=1 K iσ + σ = K k λ + k−1 X K iσ i=0 where λ is the vector of initial errors. Denoting by I the identity matrix, if (I − K)−1 exists, |f k (x) − f˜k (x̃)| ≤ K k λ + ((I − K)−1 (I − K k ))σ We obtain K k with power-by-squaring and compute the inverse with the Gauss-Jordan method with rational coefficients to obtain sound results (though a closed-form is not strictly necessary for our purpose because we do know the number of iterations k). Computing K and σ When the ranges of the variables of the loop are inductive, that is, both the real-valued and the finite-precision values remain within the initial ranges, then these are clearly the ranges for the computation of K and roundoffs σ. For loops, we require ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:19 the user to specify both the real-valued ranges of variables (e.g. a <= x && x <= b) as well as the actual finite-precision ones (c <= ~x && ~x <= d, as in Figure 4). We also require that the actual ranges always include the real ones ([a, b] ⊆ [c, d]), and we use the actual ranges ([c, d]) for the computation of K and σ. We believe that it is reasonable to assume that a user writing these applications to have the domain knowledge to be able to provide these specifications. 6.3. Handling Additional Sources of Errors What if roundoff errors are not the only errors present? If the real-valued computation given by the specification is also the ideal computation, we can simply add the errors in the same way as roundoff errors. If the real-valued computation is, however, already an approximation of some other unknown ideal function, say f∗ , it is not directly clear how our error computation applies. This may be the case, for example, for truncation errors due to a numerical algorithm. To model such errors, let us suppose that we can compute (or at least overestimate) these by a function τ : Rn → Rn , i.e. τf∗ (x) = |f∗ (x) − f (x)|. In the following we consider the one-dimensional case n = 1 for simplicity of exposition, but it generalizes as before to the n-dimensional case. We can apply a similar separation of errors as before: |f∗ (x) − f˜(x̃)| ≤ |f∗ (x) − f (x)| + |f (x) − f (x̃)| + |f (x̃) − f˜(x̃)| = τ (x) + g(|x − x̃|) + σ(x̃) which lets us decompose the overall error into the truncation error, the propagated initial error and the roundoff error. If we now iterate, we find by a similar argument as before: |f∗m (x) − f˜(x̃)| ≤ g m (|x − x̃|) + m−1 X    g j τ (f∗m−j−1 (x)) + g j σ(f˜m−j−1 (x̃)) j=0 = g m (|x − x̃|) + m−1 X   g j τ (f∗m−j−1 (x)) + σ(f˜m−j−1 (x̃)) j=0 The result essentially means that our previously defined method can also be applied to the case when truncation (or similar) errors are present. We do not pursue this direction further however, and leave a proper automated treatment of truncation errors to future work. 6.4. Experimental Results We evaluate our technique on three benchmarks in Table II. We already presented the pendulum benchmark in Figure 4. The mean benchmark computes a running average of values in a range of [-1200, 1200]. The nbody benchmark is a 2-body simulation of Jupiter orbiting around the Sun. For each benchmark we consider different number of iterations of the loop and report the error for one of the loop’s variables. Fluctuat is not able to compute a fixpoint for these benchmarks, as the errors keep growing with each iteration. Instead we manually set the number of times the loop is unrolled. For the pendulum 50 benchmark Rosa is able to compute a tighter error bound with a faster runtime. For larger numbers of iterations, Fluctuat reports an error of ∞. This is also the result for the nbody benchmark. For the mean benchmark, where the computation is less complex, Fluctuat can compute tighter error bounds, at the expense of much longer analysis times. This illustrates that our technique outperforms unrolling in Fluctuat for benchmarks that are highly nonlinear, ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:20 E. Darulova and V. Kuncak Table II. Absolute errors and runtimes for different benchmarks and different number of loop iterations benchmark Absolute errors Rosa Fluctuat pendulum 50 pendulum 100 pendulum 250 pendulum 500 pendulum 1000 mean 100 mean 500 mean 1000 mean 2000 mean 3000 mean 4000 nbody 50 nbody 100 2.21e-14 8.82e-14 2.67e-12 6.54e-10 3.89e-5 3.21e-7 1.62e-6 3.30e-6 4.51e-6 4.96e-6 5.12e-6 1.30e-11 1.35e-8 2.43e-13 9.92e-9 1.01e-8 1.01e-8 1.03e-8 1.05e-8 1.06e-8 - Running times Rosa Fluctuat 8 8 8 8 8 5 6 7 4 4 5 794 776 47 1 5 27 158 392 734 - whereas Fluctuat’s strategy may be used for cases where the nonlinearity is limited as is the number of iterations. Note that Rosa’s runtime is independent of the loop’s number of iterations. 7. DISCONTINUITIES Recall the piece-wise jet engine approximation from Figure 5. Due to the initial errors on x and y, the real-valued computation may take a different branch than the finite-precision one, and thus produce a different result. We call this difference the discontinuity error. We will assume that individual branch conditions are of the form e1◦e2, where ◦ ∈ {<, ≤ , >, ≥} and e1, e2 are arithmetic expressions. More complex conditions can be obtained by nesting conditionals. We do not assume the function represented by the conditional to be neither smooth nor continuous. We perform our analysis pairwise for each pair of paths in the program. While this gives, in the worst-case, an exponential number of cases to consider, we found that many of these paths are infeasible due to inconsistent branch conditions; such infeasible paths are eliminated early. 7.1. Applying Separation of Errors Using our previous notation, let us consider a function with a single branch statement like in the example above and let f1 and f2 be the real-valued functions corresponding to the if and the else branch respectively. Then, the discontinuity error is given by |f1 (x) − f˜2 (x̃)|, i.e. the real computation takes branch f1 , and the finite-precision one f2 . The opposite case is analogous. We again apply the idea of separation of errors: |f1 (x) − f˜2 (x̃)| ≤ |f1 (x) − f1 (x̃)| + |f1 (x̃) − f2 (x̃)| + |f2 (x̃) − f˜2 (x̃)| (9) The individual components are (1) |f1 (x) − f1 (x̃)|: the difference in f1 due to initial errors. We can compute this difference with our propagation coefficients: |f1 (x) − f1 (x̃)| ≤ K|x − x̃|. (2) |f1 (x̃) − f2 (x̃)|: the real-valued difference between f1 and f2 . We can bound this value by the Z3-aided range computation from section 4. (3) |f2 (x̃) − f˜2 (x̃)|: the roundoff error when evaluating f2 in finite-precision arithmetic. We use the procedure from subsection 5.1 as before. ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:21 We expect the individual parts to be easier to handle for the underlying SMT-solver since we reduce the number of variables and correlations. We clearly introduce an additional over-approximation, but we observed in our experiments that this is in general small. In contrast, Fluctuat’s approach relies on constraints on the affine forms to capture the different branch conditions [Goubault and Putot 2013]. A split of the total error into two parts is also possible, e.g. as |f1 (x) − f˜2 (x̃)| ≤ |f1 (x) − f2 (x̃)| + |f2 (x̃) − f˜2 (x̃)|, which performs one computation less. This split, combined with a precise constraint relating x to x̃ would introduce one constraint with many correlations between variables [Darulova and Kuncak 2014]. Such a precise and complex relation overwhelms the SMT solver quickly, but bounding the ranges without the correlation information yields unsatisfactory results. 7.2. Determining Ranges for x and x̃ As in the previous sections, it is crucial to determine the ranges of x, x̃ ∈ R over which to evaluate the individual parts of Equation 9. A sound approach would be to simply use the input ranges, but this would lead to unnecessary over-approximations. In general, not all inputs can exhibit a divergence between the real-valued and the finite-precision computation. They are determined by the branch conditions and the errors on the variables. Consider the branch condition if (e1 < e2) and the case where the real-valued path takes the if-branch, i.e. variable x satisfies e1 < e2 and x̃ satisfies e1 ≥ e2. The constraint for the finite- precision variables x̃ is then e1 + δ1 < e2 + δ2 ∧ e1 ≥ e2 where δ1 , δ2 are error intervals on evaluating e1 and e2 respectively. This constraint expresses that we want those values which satisfy the condition e1 ≥ e2, but are “close enough” to the boundary such that their corresponding ideal real value could take the other path. We create such a constraint both for the variables representing finite-precision values (x̃), as well as the real-valued ones x and use them as additional constraints when computing the individual parts of Equation 9. The procedure for other branch conditions is analogous. 7.3. Experimental Results We evaluate our technique on a number of benchmarks with discontinuities, which we have either constructed by piece-wise approximating a more complex function or chosen from Goubault and Putot [2013]. All the benchmarks’ source code is available online. We compare our results in terms of accuracy and performance against Fluctuat. Fluctuat does not check for discontinuity errors by default; we enable this analysis with the ’Unstable test analysis’ option (this is the only way). Subdivisions, however, do not appear to work with this setting. Table III summarizes our results. While Fluctuat is faster than Rosa, Rosa is able to compute significantly tighter error bounds and, we believe, achieves a good compromise between accuracy and performance. 8. RELATED WORK To the best of our knowledge, Fluctuat [Goubault and Putot 2011; Goubault and Putot 2013] and FPTaylor [Solovyev et al. 2015] are most related to our work. We are not aware of other tools or techniques that can soundly and automatically quantify numerical errors in the presence of nonlinearity, branches and loops. In the context of abstract interpretation, domains exist that are sound with respect to floating-points and that can be used to prove the absence of runtime errors such as division by zero [Blanchet et al. 2003; Miné 2004; Feret 2004; Chen et al. 2008; Ghorbal et al. 2009]. Feret [2005] presents an abstract domain which associates the ranges with the iteration count, similar to our proposed technique for loops. Martel [2002] considers the stability of loops, by proving whether loops can asymptotically diverge. The problem that we are solving is ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:22 E. Darulova and V. Kuncak Table III. Absolute discontinuity errors computed and runtimes of Rosa and Fluctuat benchmark Rosa Fluctuat cubicSpline jetApprox jetApprox (err) jetApproxBadFit jetApproxBadFit (err) jetApproxGoodFit jetApproxGoodFit (err) linearFit quadraticFit quadraticFit (err) quadraticFit2 quadraticFit2 (err) simpleInterpolator sortOfStyblinski sortOfStyblinski (err) squareRoot squareRoot3 squareRoot3Invalid styblinski styblinski (err) 1.25e-15 0.0232 0.0242 0.8825 0.8852 0.0428 0.0450 0.6374 0.2548 0.2551 3.14e-9 0.0009 3.40e-5 1.0878 1.0982 0.0238 2.76e-9 3.93e-9 4.81e-8 0.0132 12.00 18.40 19.06 9.305 10.09 5.191 5.193 1.721 10.60 10.96 0.6321 0.7188 1.0e-5 27.07 28.82 0.0394 0.4289 0.4288 121.16 124.10 Rosa Fluctuat 9 46 44 16 11 5 5 3 21 20 4 4 1 5 5 3 6 6 30 25 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 different, however, as we want to quantify the difference between the real-valued and the finite-precision computation. Floating-points have been formalized in the SMT-LIB format [Rümmer and Wahl 2010], and approaches exist which deal with the prohibiting complexity of bit-precise techniques via approximations [Brillout et al. 2009; Haller et al. 2012]. Efficient combination of theories needed to express roundoff errors is non-trivial, and we are not aware of an approach that is able to quantify the deviation of finite-precision computations with respect to reals. Floatingpoint precision assertions can also be proven using an interactive theorem prover [Boldo and Marché 2011; Linderman et al. 2010; Ayad and Marché 2010; Harrison 2006]. These tools can reason about ranges and errors of finite-precision implementations, but target specialized and precise properties, which, in general, require an expert user and interactively guiding the proof. Very tight error bounds have been shown by manual proof for certain special computations, such as powers [Graillat et al. 2014]. Our work is on the other side of the trade-off between accuracy and automation as well as generality. Synthesis of specifically fixed-point arithmetic programs has also been an area of active research, with different utilized techniques: simulation or testing [Mallik et al. 2007; Jha and Seshia 2013], interval or affine arithmetic [Lee et al. 2006] or automatic differentiation [Gaffar et al. 2004]. Some approaches try to optimize the bit-width whereas in our case we keep it fixed, but provide a sound and accurate analysis, which could be used in combination with an optimization technique, like e.g. Jha and Seshia [2013]. A similar approach to our range estimation has been developed independently by Kinsman and Nicolici [2009] in the context of fixed-point arithmetic. We also identify the potential of additional constraints and develop optimizations to make the use of an SMT solver efficient enough. Further, our techniques aim to be generally applicable to various finite-precision arithmetics. Several approaches also exist to test the stability of numerical programs, e.g. by perturbation of low-order bits and rewriting [Tang et al. 2010], or by perturbing the rounding modes [Scott et al. 2007]. Another common theme is to run a higher-precision program alongACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. Towards a Compiler for Reals A:23 side the original one. Benz et al. [2012] does so by instrumentation, Paganelli and Ahrendt [2013] generates constraints which are then discharged with a floating-point arithmetic solver and Chiang et al. [2014] developed a guided search to find inputs which maximize errors. Lam et al. [2013] uses instrumentation to detect cancellation and thus loss of precision. Ivancic et al. [2010] combines abstract interpretation with model checking to check the stability of programs, tracking one input at a time. Majumdar et al. [2010] uses concolic execution to find two sets of inputs which maximize the difference in the outputs. These approach are based on testing, however, and cannot prove sound bounds. It is natural to use the Jacobian for sensitivity analysis. Related to our work is a proof framework using this idea for showing programs robust in the sense of k-Lipschitz continuity [Chaudhuri et al. 2011]. Note, however, that our approach does not require programs to be continuous. Gazeau et al. [2012] relaxes the strict definition of robustness to programs with specified uncertainties and presents a framework for proving while-loops with a particular structure robust. Our work follows the philosophy of these approaches in leveraging Jacobians of program paths, yet we explicitly incorporate the handling of roundoff errors in a fully automated system. 9. CONCLUSION We believe that numerical errors, such as roundoff errors, should not be an afterthought and that programming language support is needed and possible to help scientists write numerical code that does what it is expected to do. To this end, we presented, on one hand, a real-valued specification language with explicit error annotations from which our tool Rosa synthesizes finite-precision code that fulfills the given specification. On the other hand, we presented a set of techniques based on unified principles which provides automated, efficient, static error analysis which is crucial towards making such a compiler practical. We have extensively evaluated these techniques against state-of-the-art tools and we believe they represent an interesting compromise between accuracy and efficiency. REFERENCES 2015. Frama-C Software Analyzers. http://frama-c.com/index.html. (2015). Adolfo Anta, Rupak Majumdar, Indranil Saha, and Paulo Tabuada. 2010. Automatic Verification of Control System Implementations. In EMSOFT. Ali Ayad and Claude Marché. 2010. Multi-Prover verification of floating-point programs. In IJCAR. David H. Bailey, Yozo Hida, Xiaoye S. Li, and Brandon Thompson. 2013. C++/Fortran-90 double-double and quad-double package. http://crd-legacy.lbl.gov/~dhbailey/mpdist/. (2013). Florian Benz, Andreas Hildebrandt, and Sebastian Hack. 2012. A dynamic program analysis to find floatingpoint accuracy problems. In PLDI. Bruno Blanchet, Patrick Cousot, Radhia Cousot, Jérome Feret, Laurent Mauborgne, Antoine Miné, David Monniaux, and Xavier Rival. 2003. A static analyzer for large safety-critical software. In PLDI. 196–207. Sylvie Boldo and Claude Marché. 2011. Formal verification of numerical programs: from C annotated programs to mechanical proofs. Mathematics in Computer Science (2011). A. Brillout, D. Kroening, and T. Wahl. 2009. Mixed abstractions for floating-point arithmetic. In FMCAD. 69–76. Swarat Chaudhuri, Sumit Gulwani, Roberto Lublinerman, and Sara Navidpour. 2011. Proving Programs Robust. In ESEC/FSE. Liqian Chen, Antoine Miné, and Patrick Cousot. 2008. A Sound Floating-Point Polyhedra Abstract Domain. In APLAS. Wei-Fan Chiang, Ganesh Gopalakrishnan, Zvonimir Rakamaric, and Alexey Solovyev. 2014. Efficient Search for Inputs Causing High Floating-point Errors. In PPoPP. Eva Darulova and Viktor Kuncak. 2011. Trustworthy Numerical Computation in Scala. In OOPSLA. Eva Darulova and Viktor Kuncak. 2014. Sound Compilation of Reals. In POPL. L. H. de Figueiredo and J. Stolfi. 2004. Affine Arithmetic: Concepts and Applications. Numerical Algorithms 37, 1-4 (2004). ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY. A:24 E. Darulova and V. Kuncak Leonardo De Moura and Nikolaj Bjørner. 2008. Z3: an efficient SMT solver. In TACAS. Jérôme Feret. 2004. Static Analysis of Digital Filters. In ESOP. Jérôme Feret. 2005. The Arithmetic-Geometric Progression Abstract Domain. In VMCAI. A.A. Gaffar, O. Mencer, and W. Luk. 2004. Unifying bit-width optimisation for fixed-point and floating-point designs. In FCCM. Ivan Gazeau, Dale Miller, and Catuscia Palamidessi. 2012. A non-local method for robustness analysis of floating point programs. In QAPL. Khalil Ghorbal, Eric Goubault, and Sylvie Putot. 2009. The Zonotope Abstract Domain Taylor1+. In CAV. Springer Berlin Heidelberg. Khalil Ghorbal, Eric Goubault, and Sylvie Putot. 2010. A Logical Product Approach to Zonotope Intersection. In CAV. Eric Goubault and Sylvie Putot. 2011. Static Analysis of Finite Precision Computations. In VMCAI. Eric Goubault and Sylvie Putot. 2013. Robustness Analysis of Finite Precision Implementations. In APLAS. Stef Graillat, Vincent Lefèvre, and Jean-Michel Muller. 2014. On the maximum relative error when computing xn in floating-point arithmetic. Technical Report <ensl-00945033v2>. Laboratoire d’Informatique de Paris 6, Inria Grenoble Rhône-Alpes. L. Haller, A. Griggio, M. Brain, and D. Kroening. 2012. Deciding floating-point logic with systematic abstraction. In FMCAD. John Harrison. 2006. Floating-Point Verification using Theorem Proving. In Formal Methods for Hardware Verification. F. Ivancic, M.K. Ganai, S. Sankaranarayanan, and A. Gupta. 2010. Numerical stability analysis of floatingpoint computations using software model checking. In MEMOCODE. Susmit Jha and Sanjit A. Seshia. 2013. Synthesis of Optimal Fixed-Point Implementations of Numerical Software Routines. In Proc. Sixth International Workshop on Numerical Software Verification (NSV). Dejan Jovanović and Leonardo de Moura. 2012. Solving Non-linear Arithmetic. In IJCAR. A.B. Kinsman and N. Nicolici. 2009. Finite Precision Bit-Width Allocation using SAT-Modulo Theory. In DATE. Michael O. Lam, Jeffrey K. Hollingsworth, and G.W. Stewart. 2013. Dynamic floating-point cancellation detection. Parallel Comput. 39, 3 (2013). D. Lee, A. A. Gaffar, R. C. C. Cheung, O. Mencer, W. Luk, and G. A. Constantinides. 2006. AccuracyGuaranteed Bit-Width Optimization. IEEE Trans. on CAD of Integrated Circuits and Systems 25, 10 (2006). Michael D. Linderman, Matthew Ho, David L. Dill, Teresa H. Meng, and Garry P. Nolan. 2010. Towards program optimization through automated analysis of numerical precision. In CGO. R. Majumdar, I. Saha, and Zilong Wang. 2010. Systematic Testing for Control Applications. In MEMOCODE. A. Mallik, D. Sinha, P. Banerjee, and H. Zhou. 2007. Low-Power Optimization by Smart Bit-Width Allocation in a SystemC-Based ASIC Design Environment. IEEE Trans. on CAD of Integrated Circuits and Systems 26, 3 (2007). Matthieu Martel. 2002. Static Analysis of the Numerical Stability of Loops. In SAS. Antoine Miné. 2004. Relational Abstract Domains for the Detection of Floating-Point Run-Time Errors. In ESOP. R.E. Moore. 1966. Interval Analysis. Prentice-Hall. Gabriele Paganelli and Wolfgang Ahrendt. 2013. Verifying (In-)Stability in Floating-point Programs by Increasing Precision, using SMT Solving. In SYNASC. Philipp Rümmer and Thomas Wahl. 2010. An SMT-LIB Theory of Binary Floating-Point Arithmetic. In Informal proceedings of 8th International Workshop on Satisfiability Modulo Theories (SMT) at FLoC. N.S. Scott, F. Jézéquel, C. Denis, and J.-M. Chesneaux. 2007. Numerical ‘health check’ for scientific codes: the CADNA approach. Computer Physics Communications (2007). Alexey Solovyev, Charles Jacobsen, Zvonimir Rakamaric, and Ganesh Gopalakrishnan. 2015. Rigorous Estimation of Floating-Point Round-off Errors with Symbolic Taylor Expansions. In FM. Enyi Tang, Earl Barr, Xuandong Li, and Zhendong Su. 2010. Perturbing numerical calculations for statistical analysis of floating-point program (in)stability. In ISSTA. C. Woodford and C. Phillips. 2012. Numerical Methods with Worked Examples. Vol. 2nd. Springer. ACM Journal Name, Vol. V, No. N, Article A, Publication date: January YYYY.
6cs.PL
Post-transcriptional knowledge in pathway analysis increases the accuracy of phenotypes classification This manuscript has been published in Oncotarget Vol 7, No 34. If you are using this work please refer to: Alaimo, S., Giugno, R., Acunzo, M., Veneziano, D., Ferro, A., & Pulvirenti, A. (2016). Post-transcriptional knowledge in pathway analysis increases the accuracy of phenotypes classification. Oncotarget. (http://dx.doi.org/10.18632/oncotarget.9788) Post-transcriptional knowledge in pathway analysis increases the accuracy of phenotypes classification Salvatore Alaimo 1 , Rosalba Giugno 2 , Mario Acunzo 3 , Dario Veneziano 3 , Alfredo Ferro 2 , and Alfredo Pulvirenti 2 , * 1 Department of Mathematics and Computer Science and 2Department of Clinical and Experimental Medicine, University of Catania, Catania, Italy, 3 Department of Molecular Virology, Immunology and Medical Genetics, Comprehensive Cancer Center, The Ohio State University, Columbus, OH, USA. Abstract Motivation: Prediction of phenotypes from high-dimensional data is a crucial task in precision biology and medicine. Many technologies employ genomic biomarkers to characterize phenotypes. However, such elements are not sufficient to explain the underlying biology. To improve this, pathway analysis techniques have been proposed. Nevertheless, such methods have shown lack of accuracy in phenotypes classification. Results: Here we propose a novel methodology called MITHrIL (Mirna enrIched paTHway Impact anaLysis) for the analysis of signaling pathways, which has built on top of the work of Tarca et al., 2009. MITHrIL extends pathways by adding missing regulatory elements, such as microRNAs, and their interactions with genes. The method takes as input the expression values of genes and/or microRNAs and returns a list of pathways sorted according to their deregulation degree, together with the corresponding statistical significance (p-values). Our analysis shows that MITHrIL outperforms its competitors even in the worst case. In addition, our method is able to correctly classify sets of tumor samples drawn from TCGA. Availability: MITHrIL is freely available at the following URL: http://alpha.dmi.unict.it/mithril/ Introduction The prediction of phenotypes, such as diseases, or of responses to therapies from the large amount of genotypic high-dimensional data obtained through Next-Generation Sequencing techniques is an extremely important task in translational biology and precision medicine. However, the gap between current analysis techniques and the ability to obtain accurate knowledge is broad. High-throughput sequencing and gene profiling techniques are radically transforming medical research, allowing the full monitoring of a biological system. The use of these technologies typically generates a list of differentially expressed elements (i.e. genes or microRNAs) whose behavior varies significantly among the phenotypes under examination. Furthermore, compared to traditional gene expression extraction techniques (eg. Microarray), deep sequencing methods, such as RNA-Seq, provide much larger lists of differentially expressed genes, increasing, therefore, the complexity of the analysis. The common approach to simplify and make the analysis of such data more fruitful consisted in grouping genes into smaller sub-sets according to some relationship, leveraging on existing knowledge-bases such as ontologies or pathways. The analysis of this * To whom correspondence should be addressed. type of data at the functional level is crucial since it allows a strong reduction of dimensionality, thus providing greater insights on the biology of the phenomenon under study [1]. An extensive class of techniques known as Pathway Analysis [2] goes in this direction. In the past, such term has been associated to the analysis of ontological terms, protein-protein interaction (PPI) networks, or to the inference of gene regulatory networks from expression data. More recently, great interest has shifted toward a class of methods called Knowledge base-driven pathway analysis [3]. Such methods leverage on existing databases, such as the Kyoto Encyclopedia of Gene and Genomes (KEGG) [4, 5] or Pathway Commons [6], to identify those pathways that may be affected by the expression changes in the observed phenotype. Knowledge base-driven pathway analysis techniques can be grouped into three generations of approaches [3]: i) Over-Representation Analysis (ORA); ii) Functional Class Scoring (FCS); iii) Pathway Topology-based (PT). First-generation methods statistically evaluate the number of altered genes in a pathway with respect to the set of all analyzed genes. After filtering the resulting gene set of an expression assessment experiment, ORA strategies [7-13] typically divide the list of genes according to the pathway each gene belongs to. By applying an hypothesis test (i.e. hypergeometric, chi-square, or binomial) they are able to determine if the number of such genes is over- or under-represented. These methods, however, have some major limitations. Firstly, considering only the number of differentially expressed genes, while omitting their expression, implies that the magnitude of their change be unimportant for pathway activity. Furthermore, considering only statistically significant differential expression may exclude those genes whose coordinated alteration may lead to remarkable effects, although their differential expression may not be statistically significant. Finally, they consider individual genes and pathways, respectively, in an manner independent of the surrounding biological context, eluding what truly happens in reality. A first generation method, DIANA-miRPath [14], assesses the impact of miRNAs in biological processes by identifying the pathways in which they are significantly involved. The software employs a functional annotation of one or more miRNAs by means of a hypergeometric distribution, or an unbiased empirical distribution, or a statistical meta-analysis. Moreover, it allows the identification of sub-sets of miRNAs which significantly regulates a collection of pathway, on the basis of experimental data. Second-generation methods compensated some of the disadvantages of ORA approaches. Typically FCS methods compute a gene-level statistic from their expression levels, by means of a statistical approach (i.e. ANOVA, Q-statistic, signal-to-noise ratio, t-test, or Z-score). Such a statistic is calculated considering all genes in a pathway [15-21] and its statistical significance is estimated through an appropriate null hypothesis [16, 22-24]. FCS methods avoid some of the limitations of the ORA approaches by ranking all genes through their expression level and by considering the dependencies within a pathway. However, by using gene expression only to sort genes, they do not take into account the fact that such values can change pathways activity. In order to overcome the disadvantages of FCS methods, the third class of techniques models a pathway as a graph, considering its topology when computing scores. A thorough analysis of all PT-based approaches has been provided in [25]. In Draghici et al. [26], an analytical technique called impact factor (IF) was introduced. The impact factor is a pathway-level score that takes into account biological factors such as the magnitude of change in genes expression, the type of interactions between genes, and their location in the pathway. In Draghici et al. [26], each pathway is modeled as a graph in which nodes represent genes, while edges represent interactions between them. Authors also define a gene-level statistic (called perturbation factor, PF) as a linear function of the change in gene expression and the perturbation of its neighborhood. Such a statistic is then combined for each element in a pathway, and a p-value is computed by means of exponential distribution. The analysis method presented by Draghici et al. [26], has been further improved by the SPIA algorithm [27] which attenuates the dominant effect exercised by the change in expression within PFs computation, while reducing the high rate of false positives when the input list of genes is small. SPIA uses a bootstrap procedure to evaluate the significance of the observed perturbation in the pathway. All this is combined with a p-value computed in ORA style to make a full assessment of the statistical significance of the perturbation of each pathway. To reduce the number of false positives, and to obtain a more significant analysis, Vaske et al. [28] presented the PARADIGM algorithm, which has been further improved by [29]. PARADIGM is a method to infer patient-specific genetic activity by incorporating information regarding interactions between genes provided in a pathway. The method predicts the degree of alteration in the activity of a pathway by employing a probabilistic inference algorithm. The authors show that their model obtains significantly more reliable results than SPIA. However, Mitrea et al. [25] stated they could not reproduce the results reported in Vaske et al. [28], despite the full cooperation of its authors. However, both SPIA and PARADIGM completely ignore post-transcriptional regulatory interactions enacted by miRNAs. To fill this gap, Calura et al. developed a new approach, Micrographite [30], which is able to integrate pathway with predicted and validated miRNA-target interactions. The method, by performing a topological analysis based on expression profiles, is able to identify significant gene circuits specific of a phenotype. The main advantage of the methodology is the ability to accurately describe the cellular scenario that led to the input expression data. Here, we present MITHrIL (miRNA enriched pathway impact analysis), a technique that extends the method in [26] and SPIA [27], by combining their effectiveness and improves the reliability of the results. The strength of MITHrIL lies in the enrichment of pathways with information regarding microRNAs, posttranscriptional regulatory elements whose addition is clearly essential to the greater meaningfulness of the results. Our method, starting from expression values of genes and/or microRNAs, returns a list of pathways sorted according to the degree of their de-regulation, together with the corresponding statistical significance (p-values), and a predicted degree of alteration for each endpoint (a pathway node whose alteration, based on current knowledge, affects the phenotype in a specific way). To evaluate our algorithm, we used the decoy pathway methodology introduced in Vaske et al. [28] on expression datasets obtained from The Cancer Genome Atlas. We showed that adding information on the otherwise missing regulatory elements proves to be pivotal in improving the reliability of pathway analysis methodologies. As further evidence of the reliability of our pathway impact analysis method, we employed our algorithm for the classification of phenotypes. The results highlight the ability of our methodology to strongly reduce the dimensionality of the data while maintaining a very high classification quality. Results Biological soundness. We compared our methodology with PARADIGM [28], SPIA [27] and Micrographite [30] by employing the technique defined in Vaske et al. 2010. The aim is to establish whether the ranking computed with a pathway analysis algorithm is biologically significant. This is achieved by defining random pathways (called decoy pathways) with the same topology as the real ones but randomly selected nodes. All pathways are then evaluated by each algorithm, estimating the ability of each method to properly separate decoy pathways from real ones by means of a receiver operating characteristic (ROC) curve. In principle, a method that can correctly distinguish real pathways from decoys should yield biologically significant results. We performed comparisons between MITHrIL, SPIA, PARADIGM and Micrographite on a set of selected cancer types (see Table 1). Such a comparison allowed us, by ranking the datasets according to performance, to identify the single cancer type in which our algorithm had the lowest quality results, namely, Lung squamous cell carcinoma (LUSC). The results of the four methodologies were ranked as follows: PARADIGM according to the average number of significant scores, as described in [28]; SPIA according to the adjusted p-value as obtained through their software implementation; Micrographite according to the pathway prioritization phase; MITHrIL according to the adjusted p-value and the accumulator. More precisely, in MITHril, all the results are sorted first by pvalue and, thereafter, in the presence of equal p-values their corresponding accumulator is taken into account to determine their order. In Supplementary Figures 1-3, we present the results of the detailed comparison in each TCGA dataset. Out analysis clearly shows that MITHrIL gives the best performances. As further proof of the goodness of our methodology, we computed the average area under each ROC curve (AUC). The results were summarized in Figure 1 (more details can be found in Supplementary Table 1). The four boxes in the figure represent the AUC variability range for the four compared methodologies, respectively. Prediction of cancer types. We also evaluated our algorithm by assessing its performances in terms of capability to predict the cancer type. To do this, we elected to train the PAMr [31] classification algorithm and evaluated its performance by means of a 10-fold cross validation (CV) procedure. PAMr is an approach devised to predict cancer class from gene expression profiling, based on an enhancement of the nearest shrunken centroid classifier. The algorithm is able to identify subsets of genes that best characterize each class. The technique is general and can be used in many other classification problems. The CV procedure takes as input all the feature profiles of each patient, and divides them into 10 subsets, by balancing the elements of each class in each subset. A subset is, then, removed (test set), and the classifier is trained on the remaining nine sets (training set), in order to prioritize and select the features. Each profile in the test set is then classified, and the results are used to estimate the error. The methodology is repeated so that each subset is used once as the test set. The CV procedure was designed in order to remove overfitting and overestimation of the results. A reference classification was thus established by applying such a procedure to the Log-Fold-Change of differentially expressed genes of our cancer cases. The rationale behind such a choice is to show that pathway perturbation, which takes into account network structure, increases the biologically soundness of the results with respect to a plain Log-Fold-Change-based approach, widely used as a gold standard. First we computed all differentially expressed genes for each tumor type, obtaining a total of 17,326 genes that appear to be de-regulated in at least one disease. Next, we calculated their Log-Fold-Change in each sample, trained a classifier and verified its performance using the above described CV procedure. The results (Table 2) demonstrate that such a classification is quite reliable since it yields a very small error. Notice that Micrographite is not able to compute pathway ranking for a single sample, therefore we did not perform any classification using such a method. Hence, we ran MITHrIL, SPIA and PARADIGM on all samples of our set of selected cancer types, and trained three classification models using total accumulation scores. As before, we performed a 10-fold cross validation and evaluated errors in each class (Table 2). Furthermore, leveraging the ability of MITHrIL and PARADIGM to return the perturbation for each of 3,165 pathway endpoints, we trained additional classifiers based on such values. Since SPIA computes pathwaylevel statistic by means of a linear equation system, it could not return perturbations of endpoints. Therefore we elected to use MITHrIL without miRNAs to establish the classification performances of endpoints, when such elements are missing. Our analysis clearly shows that performances are considerably improved over reference classification, by taking into account endpoint perturbations (Table 2). Moreover, we can notice a significant dimensionality reduction of our data, since by using perturbation of pathway endpoints, computed by means of Equation 1 (see the section Materials and Method), we are able to train PAMR on about 3165 genes (18% of the number of differentially expressed ones). Table 2 reports also the classifications based on MITHrIL pathway accumulators. We recall that accumulator summarizes, with a single value, the general perturbation we observe within a pathway. Hence, as a further effect this yields a stronger dimensionality reduction. Although we notice a slight increase in misclassification error, compared to reference classification, it is important to highlight that we were able to reduce to 237 the number of features on which PAMR classifier was trained. Pathway Accumulators were computed according to Equation 5. The last two columns of Table 2 report the classification performances obtained by SPIA accumulators and PARADIGM scores. All of this shows that the addition of miRNA information is crucial in order to obtain more reliable results. Notice that we cannot deduce any information about the performances of PARADIGM extended with microRNAs, since no implementation with such a knowledge is available, and this goes beyond the scope of our paper. To further highlight the biological relevance of endpoints, we performed a set of experiments with randomly selected nodes within pathways (see third and fourth columns of Table 2). The results show that the choice of endpoints is reasonable, since endpoints synthetize perturbations of upstream nodes. Coherence of the prediction of pathway nodes state. As a further validation our methodology, we chose to verify the percentage of endpoints for which a coherent prediction of the deregulation is obtained. Initially, we applied MITHrIL with and without miRNAs to estimate the perturbations for each endpoint of each sample (excluding the expression values of the endpoints in order to avoid introducing a bias in our results). Subsequently, we computed the percentage of endpoints for which the sign of perturbation agrees with that of the log-Fold Change. This validation estimates the reliability of the predictions of our method and the importance of the addition of miRNA knowledge to our model. The results (Figure 2) highlight that plugging quantitative information on miRNAs is crucial to establish a far more comprehensive and meaningful estimation of phenotype activity. Therefore, using perturbation without miRNAs could be misleading. Discussion In the last decade, miRNAs have ever more revealed to be crucial in the modulation of numerous cellular pathways via the exertion of their important regulatory function when targeting key genes. Since the first connection between miRNAs and cancer was made in 2002 [32], miRNA deregulation has been proven to be indeed at the root of the pathogenesis of all cancers [33]. It suffices to consider, for instance, how the deregulation of even a single miRNA is capable to cause cancer, as in the case of miR-155 which has been shown to be responsible for the onset of Acute Lyphoblastic Leukemia/high-grade lymphoma in mouse [34]. Additionally, the predominant roles played by miRs 21, 221 and 222 in several cancer types prove the importance these small RNA molecules have in tumor pathogenesis and progression, while also being a determining factor in drug resistance [33]. In light of this and many other evidences discovered in recent years, the integration of miRNA expression when evaluating cancer pathway perturbation has become of utmost importance. The proper consideration of the crucial effects yielded by the action of these small non-coding RNA molecules on overall gene expression indeed contributes to a more comprehensive depiction of the biological reality, providing a more accurate means for pathway assessment and phenotype categorization. In fact, given the very important biological role played by miRNAs, integrating their evaluation can greatly help in the discernment of even fine changes in the cellular gene expression profile, which could make the difference between a normal and abnormal phenotypes, already at disease onset. Here we presented a novel knowledge base-driven pathway analysis methodology called MITHrIL. By enriching KEGG pathways with experimentally validated interactions between genes and miRNAs, MITHrIL is capable to clearly improve the reliability of pathway-based analysis of phenotypes. Through the enrichment with miRNA information, MITHrIL can greatly improve predictions over SPIA, PARADIGM, and Micrographite. In fact, while the other methodologies cannot properly distinguish between decoy pathways and real ones, MITHrIL is capable of obtaining much better results. Even our worst case had superior results than our three competitors. From a biological standpoint, the ability to distinguish decoy pathways from real ones addresses the fundamental necessity to be able to properly interpret the actual cellular mechanisms as possessing a biological criterion which is crucial to the life of the cell and not the result of random phenomena. Therefore, we focused our analysis on the ability of our methodology to synthesize information gained from gene expression data and thus provide novel biological clues. For this purpose, by using the PAMR algorithm, we performed different types of classification, taking as reference the results arising from the classification based directly on Log-Fold-Changes. Our findings demonstrated the capability of MITHrIL to synthesize biological information contained in the data, while yielding high classification accuracy. Furthermore, MITHrIL greatly reduces the dimensionality of data of about 73 times compared to a naive Log-Fold-Change based method. This significant dimensionality reduction may also make the analysis more accurate since it could reduce the noise that can be introduced by the technologies used to gather expression data from samples. Furthermore, when knowing the phenotype that is being analyzed, it is possible to further reduce the number of dimensions by focusing only on those pathways that are known to be somehow involved in it. Compared to SPIA, MITHrIL can also return the perturbation computed for pathway endpoints, whose subsequent analysis can lead to important additional insights about the biology underlying the phenomena under study. Indeed, the proper evaluation of pathway endpoints can contribute to a far more accurate phenotype assessment, as a more detailed diversification between pathological phenotypes at the pathway level is reflected more at the endpoints rather than in any other node of the pathway network. This allows to more effectively distinguish pathologies sharing even a very similar set of deregulated genes (as you could more easily distinguish similar yet different trees more easily by confronting their leaves rather than their roots). By leveraging on endpoint perturbation, we are also able to greatly reduce the misclassification error, although we are able to reduce data dimensionality by only 5 times. This allows us to stress the fact that gene perturbations are capable to discriminate among the pathological classes of our data. Leveraging on the potential provided by miRNA enrichment in pathway analysis, MITHrIL represents a bioinformatic resource capable of a far more accurate evaluation of pathway deregulation in cancer. This can provide a decisive contribution to cancer research in terms of directing researchers more effectively, reducing costs and time requirements. Specifically, MITHrIL can contribute to an earlier diagnosis, an early and more accurate drug resistance assessment, as well as to more precise prognosis in terms of predicting future disease development. Nevertheless, our results can be further improved given that pathways are still incomplete, thus potentially resulting in partial or erroneous conclusions. Future development in pathway analysis methodologies should take into account additional regulatory elements, such as long non-coding RNA (lncRNAs), along with epigenetic information, such as methylation patterns, variants, or copy number variants. Mutations could be exploited by considering their impact on the modulation of 𝛽 function (see the section Materials and Method for the definition of 𝛽), for example by assessing the difference in interaction strength by means of free energy. We could also define the 𝛽 function by evaluating the correlation between patient expression profiles and corresponding phenotype. Materials and Methods Pathway Enrichment Outline Our methodology distinguishes itself from other pathway analysis techniques primarily for the use of KEGG [4, 5] pathways enriched with microRNAs (miRNAs) and their interactions with genes. In order to achieve this, we downloaded all validated inhibition interactions between miRNA and targets from miRTarBase [35] and miRecords [36]. We also obtained interactions between transcription factors (TFs) and miRNAs from TransmiR [37]. By taking into account TFs activating miRNA genes we are able to increase the knowledge stored within each pathway. We then standardized all identifiers in their respective databases to avoid duplicates. The mapping of miRNA identifiers was performed by using miRBase release 20 [38-42] as reference database. For each target, we performed a twofold mapping procedure: firstly, each gene identifier has been converted to its Entrez one; then, by taking advantage of KEGG REST API, we mapped each Entrez Id to the corresponding KEGG Id. This standardized list of interactions was, lastly, filtered to remove all duplicates. Such a procedure allowed us to build a knowledge base of 10,537 experimentally validated interactions between 385 miRNAs and 3,080 genes. Pathway enrichment was performed by defining a new type of nodes representing miRNAs in the pathway notation, along with two types of directed edges, for miRNA-target inhibition interactions and TF-miRNA interactions, respectively. The enrichment is thus performed automatically by adding to each pathway only miRNAs that interact with at least one element within it. Finally, in order to acquire information on which endpoints are contained in each pathway, we employed a depth-first search algorithm (DFS) [43] to automatically mark which genes are located at the end of the chains of reactions in each pathway. The search for endpoints in a pathway starts from a random node. The DFS algorithm follows the interactions down to the nodes from which no other one can be reached (putative endpoints). The procedure is repeated until all nodes have been analyzed. Putative endpoints are, then, manually screened to determine if they are associated with phenotypic changes as stated on the KEGG database. Only the latter are taken as pathway endpoint. An example of endpoints is reported in Supplementary Figure 4. Algorithm Our methodology consists in an extension of Draghici et al. [26] and Tarca et al. [27]. It requires a case/control expression data set from which statistically differentially expressed features have been extracted (genes, miRNAs, or both). For such elements, the computation of their Log-Fold-Change is also needed. Starting from such information, MITHrIL computes, for each gene in a pathway, a Perturbation Factor (PF), which is an estimate of how much its activity is altered considering its expression and 1neighborhood. Positive (negative) values of PF indicate that the gene is likely activated (inhibited). By appropriately combining each PF of a pathway, our algorithm is, therefore, able to calculate an Impact Factor (IF) and an Accumulator (Acc). The IF of a pathway is a metric expressing how important are the changes detected in the pathway, the greater the value, the most significant are the changes. The Acc indicates the total level of perturbation in the pathway and the general tendency of its genes: positive Acc values indicate a majority of activated genes (or inhibited miRNAs), while negative ones corresponds to an abundance of inhibited genes (or activated miRNAs). To the Acc is also assigned a p-value which is an estimate of the probability of getting such accumulator by chance. Finally, by applying the [44] method, we estimate the false discovery rate and p-values are adjusted on multiple hypotheses. More precisely, let 𝑛 be a node in pathway 𝑃. . Its perturbation factor, 𝑃𝐹 𝑛, 𝑃. can be defined as: 𝑃𝐹 𝑛, 𝑃. = Δ𝐸 𝑛 + 4∈6 7,89 ;∈< 𝛽 𝑢, 𝑛 4,89 𝛽 𝑢, 𝑑 ⋅ 𝑃𝐹 𝑢, 𝑃. , (1) where Δ𝐸 𝑛 is the Log-Fold-Change computed for the node 𝑛, 𝑈 𝑛, 𝑃. and 𝐷 𝑛, 𝑃. are the set of upstream and downstream nodes of 𝑛 in pathway 𝑃. respectively, and 𝛽 𝑢, 𝑛 is a function that indicates the strength and type of interaction between genes 𝑢 and 𝑛. In particular, negative values of 𝛽 indicate an inhibitory effect, while positive values an activating one. To ensure that the perturbation coming from an upstream node is divided to its downstream ones, proportionally to the strength of their interactions, without altering the total perturbation, a normalization is applied dividing by the sum of the weights absolute values. By exploiting the methodology described in Draghici et al. [26] we compute an impact factor, 𝐼𝐹 𝑃. , which reflects the importance of the changes observed in a pathway, as: 1 7∈89 𝑃𝐹 𝑛, 𝑃. + , (2) 𝑝 𝑃. Δ𝐸 ⋅ 𝑁;G 𝑃. where 𝑝 𝑃. is the probability, calculated using an hyper-geometric distribution, of obtaining a number of 𝐼𝐹 𝑃. = log differentially expressed nodes at least equal to the observed one in 𝑃. ; Δ𝐸 is the mean Log-Fold-Change in 𝑃. ; finally, 𝑁;G 𝑃. represents the number of differentially expressed nodes in the pathway. Our methodology takes also advantage of the accumulation (or accumulator) as described by Tarca et al. [27]. Such a methodology has been revised to take into account the addition of miRNAs. In order to do so, first we need to compute two partial accumulators, 𝐴𝑐𝑐J.K 𝑃. and 𝐴𝑐𝑐LG7G 𝑃. , which take into account the perturbation, respectively, of miRNAs and genes: 𝐴𝑐𝑐J.K 𝑃. = 𝑃𝐹 𝑚, 𝑃. − Δ𝐸 𝑚 , (3) 𝑃𝐹 𝑔, 𝑃. − Δ𝐸 𝑔 , (4) J∈89M 𝐴𝑐𝑐LG7G 𝑃. = L P L∈89 where 𝑃.J and 𝑃. are the sets of miRNAs and genes present in 𝑃. , respectively. L Therefore, in equations 3 and 4, we sum the perturbations of all miRNAs (𝑃.J ) and genes (𝑃. ) in pathway 𝑃. , addressing the dominant effect of the expression change in the PF computation by subtracting such values. We can now compute total perturbation accumulation, 𝐴𝑐𝑐 𝑃. , which measures whether the pathway is likely activated or inhibited. The introduction of miRNAs in our model addresses the necessity to take into account the fact that an increased (decreased) expression of such elements results in an inhibition (activation) of the pathway. We compute 𝐴𝑐𝑐 𝑃. as: 𝐴𝑐𝑐 𝑃. = 𝐴𝑐𝑐LG7G 𝑃. − 𝐴𝑐𝑐J.K 𝑃. − 𝐸 𝐴𝑐𝑐 𝑃. , (5) where 𝐸 𝐴𝑐𝑐 𝑃. is an estimate of the expected value of the distribution of all accumulators computed for pathway 𝑃. , as explained below. P-value estimation is then performed by combining the Z-scores, computed through an inverse Standardized Normal distribution, associated to two probabilistic terms: the first is the probability of obtaining by chance a number of differentially expressed genes in the pathway at least equal to the observed one, while the second consists in the probability of observing by chance an accumulator higher than the computed one. The first term corresponds to 𝑝 𝑃. introduced in equation 2. The second term, instead, has to be estimated through a permutation test. In such a test, we assign, to a random group of genes in the pathway in question, a Log-Fold-Change selected randomly from the input ones, so as to compute a random accumulator. The procedure is repeated several times and the final probability is estimated as the ratio between the number of random accumulators greater than 𝐴𝑐𝑐 𝑃. and the number of repetitions performed. In our experiments, the repetitions were set to 2000 in order to obtain maximum precision up to two decimal places. At this stage we are also able to estimate expected value 𝐸 𝐴𝑐𝑐 𝑃. accumulators. as the median value of the random Therefore, the final result of our algorithm consists of a list of pathways along with their impact factor, accumulator and adjusted p-values. Such list is sorted by p-value and Acc. Expression Data Sources To perform a comprehensive test of our algorithm, we exploited expression data provided by The Cancer Genome Atlas (beginning of 2014). We downloaded all patient expression profiles of genes (RNASeqV2 obtained through platforms Illumina Genome Analyzer and Illumina HiSeq) and miRNAs (miRNASeq obtained through platforms Illumina Genome Analyzer and Illumina HiSeq). The initial dataset was then filtered by removing all patients for which one of the two types of expression was unavailable. We then eliminated all tumor samples for which no healthy controls were available. By applying such a procedure, we built a dataset of 3,053 expression profiles (2,721 case samples and 332 control samples) of patients affected by 10 distinct tumor pathologies (see Table 1 for more details). Case samples were further divided by disease stage. To run our algorithm, we performed a differentially expressed genes analysis by using the RNASeq pipeline based on Limma [45]. The expression matrices for each disease were firstly normalized by using the Voom algorithm [46], then a linear model was trained with Limma and differentially expressed genes for each stage of the disease were extracted along with their Log-Fold-Change. In our analysis we considered as differentially expressed only those genes for which an adjusted p-value was lower than 0.01 as computed by Limma. In order to correctly ascertain PARADIGM performance, for each tumor sample we also downloaded and processed copy number variation (CNV) as shown in Vaske et al. 2010 [28]. Performance Assessment To compare our algorithm with other methodologies, PARADIGM [28], SPIA [27] and Micrographite [30], we used the decoy pathway technique introduced in Vaske et al. 2010 [28]. For each pathway in our internal database, we built a decoy one obtained by maintaining the same structure and substituting each gene (or miRNA) with one randomly chosen from the set of all possible genes. As in Vaske et al. 2010 [28], all the complexes and abstract processes were kept unchanged. After the execution of the three algorithms, the pathways were classified by each method and the fraction of real pathways versus the total number of pathways considered was computed. The higher the fraction of real pathways, the better the ability of an algorithm to extract biologically sound results. Lastly, to achieve a fair comparison with SPIA, we chose the same 𝛽 function as Tarca et al. 2009 [27]: 𝛽 𝑢, 𝑛 = 1 for all interactions that increase node expression level, 𝛽 𝑢, 𝑛 = −1 for those that have the effect of decreasing node expression level, 𝛽 𝑢, 𝑔 = 0 for irrelevant ones. However, the 𝛽 function introduces a huge concealed potential in MITHrIL, which paves the way for possible future extensions. Acknowledgements The results shown here are in whole or part based upon data generated by the TCGA Research Network: http://cancergenome.nih.gov/. V. D. was supported by Italian Foundation for Cancer Research (FIRC) (16572). Conflicts of Interest The authors declare no conflict of interest. References 1. Glazko GV, Emmert-Streib F. Unite and conquer: univariate and multivariate approaches for finding differentially expressed gene sets. Bioinformatics. 2009;25(18):2348-2354. 2. Green ML, Karp PD. The outcomes of pathway database computations depend on pathway ontology. Nucl Acids Res. 2006;34(13):3687-3697. 3. Khatri P, Sirota M, Butte AJ. Ten years of pathway analysis: current approaches and outstanding challenges. PLoS Comput Biol. 2012;8(2):e1002375. 4. Kanehisa M, Goto S. KEGG: kyoto encyclopedia of genes and genomes. Nucl Acids Res. 2000;28(1):27-30. 5. Kanehisa M, Goto S, Sato Y, Kawashima M, Furumichi M, Tanabe M. Data, information, knowledge and principle: back to metabolism in KEGG. Nucl Acids Res. 2014;42(D1):D199-D205. 6. Cerami EG, Gross BE, Demir E, Rodchenkov I, Babur Ö, Anwar N, Schultz N, Bader GD, Sander C. Pathway Commons, a web resource for biological pathway data. Nucl Acids Res. 2011;39(suppl 1):D685-D690. 7. Khatri P, Draghici S, Ostermeier GC, Krawetz SA. Profiling gene expression using onto-express. Genomics. 2002;79(2):266-270. 8. Drǎghici S, Khatri P, Martins RP, Ostermeier GC, Krawetz SA. Global functional profiling of gene expression. Genomics. 2003;81(2):98-104. 9. Berriz GF, King OD, Bryant B, Sander C, Roth FP. Characterizing gene sets with FuncAssociate. Bioinformatics. 2003;19(18):2502-2504. 10. Beißbarth T, Speed TP. GOstat: find statistically overrepresented Gene Ontologies within a group of genes. Bioinformatics. 2004;20(9):1464-1465. 11. Castillo-Davis CI, Hartl DL. GeneMerge—post-genomic analysis, data mining, and hypothesis testing. Bioinformatics. 2003;19(7):891-892. 12. Martin D, Brun C, Remy E, Mouren P, Thieffry D, Jacq B. GOToolBox: functional analysis of gene datasets based on Gene Ontology. Genome biology. 2004;5(12):R101. 13. Doniger SW, Salomonis N, Dahlquist KD, Vranizan K, Lawlor SC, Conklin BR, others. MAPPFinder: using Gene Ontology and GenMAPP to create a global gene-expression profile from microarray data. Genome Biol. 2003;4(1):R7. 14. Vlachos IS, Zagganas K, Paraskevopoulou MD, Georgakilas G, Karagkouni D, Vergoulis T, Dalamagas T, Hatzigeorgiou AG. DIANA-miRPath v3.0: deciphering microRNA function with experimental support. Nucl Acids Res. 2015;43(W1):W460-W466. doi:10.1093/nar/gkv403. 15. Kong SW, Pu WT, Park PJ. A multivariate approach for integrating genome-wide expression data and biological knowledge. Bioinformatics. 2006;22(19):2373-2380. 16. Tian L, Greenberg SA, Kong SW, Altschuler J, Kohane IS, Park PJ. Discovering statistically significant pathways in expression profiling studies. Proc Natl Acad Sci USA. 2005;102(38):13544-13549. 17. Jiang Z, Gentleman R. Extensions to gene set enrichment. Bioinformatics. 2007;23(3):306-313. 18. Lu Y, Liu P-Y, Xiao P, Deng H-W. Hotelling's T2 multivariate profiling for detecting differential expression in microarrays. Bioinformatics. 2005;21(14):3105-3113. 19. Xiong H. Non-linear tests for identifying differentially expressed genes or genetic networks. Bioinformatics. 2006;22(8):919-923. 20. Hummel M, Meister R, Mansmann U. GlobalANCOVA: exploration and assessment of gene group effects. Bioinformatics. 2008;24(1):78-85. 21. Klebanov L, Glazko G, Salzman P, Yakovlev A, Xiao Y. A multivariate extension of the gene set enrichment analysis. Journal of bioinformatics and computational biology. 2007;5(05):1139-1153. 22. Goeman JJ, Bühlmann P. Analyzing gene expression data in terms of gene sets: methodological issues. Bioinformatics. 2007;23(8):980-987. 23. Ackermann M, Strimmer K. A general modular framework for gene set enrichment analysis. BMC Bioinformatics. 2009;10(1):47. 24. Efron B, Tibshirani R. On testing the significance of sets of genes. The annals of applied statistics. 2007:107-129. 25. Mitrea C, Taghavi Z, Bokanizad B, Hanoudi S, Tagett R, Donato M, Voichiţa C, Drăghici S. Methods and approaches in the topology-based analysis of biological pathways. Frontiers in physiology. 2013;4. 26. Draghici S, Khatri P, Tarca AL, Amin K, Done A, Voichita C, Georgescu C, Romero R. A systems biology approach for pathway level analysis. Genome Research. 2007;17(10):1537-1545. 27. Tarca AL, Draghici S, Khatri P, Hassan SS, Mittal P, Kim J-S, Kim CJ, Kusanovic JP, Romero R. A novel signaling pathway impact analysis. Bioinformatics. 2009;25(1):75-82. 28. Vaske CJ, Benz SC, Sanborn JZ, Earl D, Szeto C, Zhu J, Haussler D, Stuart JM. Inference of patientspecific pathway activities from multi-dimensional cancer genomics data using PARADIGM. 2010;26(12):i237-i245. doi:10.1093/bioinformatics/btq182. 29. Sedgewick AJ, Benz SC, Rabizadeh S, Soon-Shiong P, Vaske CJ. Learning subgroup-specific regulatory interactions and regulator independence with PARADIGM. Bioinformatics. 2013;29(13):i62-i70. 30. Calura E, Martini P, Sales G, Beltrame L, Chiorino G, D’Incalci M, Marchini S, Romualdi C. Wiring miRNAs to pathways: a topological approach to integrate miRNA and mRNA expression profiles. Nucl Acids Res. 2014;42(11):e96-e96. doi:10.1093/nar/gku354. 31. Tibshirani R, Hastie T, Narasimhan B, Chu G. Diagnosis of multiple cancer types by shrunken centroids of gene expression. Proceedings of the National Academy of Sciences. 2002;99(10):65676572. 32. Calin GA, Dumitru CD, Shimizu M, Bichi R, Zupo S, Noch E, Aldler H, Rattan S, Keating M, Rai K, others. Frequent deletions and down-regulation of micro-RNA genes miR15 and miR16 at 13q14 in chronic lymphocytic leukemia. Proceedings of the National Academy of Sciences. 2002;99(24):15524-15529. 33. Acunzo M, Romano G, Wernicke D, Croce CM. MicroRNA and cancer--A brief overview. Advances in biological regulation. 2015;57:1-9. 34. Costinean S, Sandhu SK, Pedersen IM, Tili E, Trotta R, Perrotti D, Ciarlariello D, Neviani P, Harb J, Kauffman LR, others. Src homology 2 domain--containing inositol-5-phosphatase and CCAAT enhancer-binding protein β are targeted by miR-155 in B cells of Eμ-MiR-155 transgenic mice. Blood. 2009;114(7):1374-1382. 35. Hsu S-D, Lin F-M, Wu W-Y, Liang C, Huang W-C, Chan W-L, Tsai W-T, Chen G-Z, Lee C-J, Chiu C-M, others. miRTarBase: a database curates experimentally validated microRNA--target interactions. Nucl Acids Res. 2010:gkq1107. 36. Xiao F, Zuo Z, Cai G, Kang S, Gao X, Li T. miRecords: an integrated resource for microRNA--target interactions. Nucl Acids Res. 2009;37(suppl 1):D105-D110. 37. Wang J, Lu M, Qiu C, Cui Q. TransmiR: a transcription factor--microRNA regulation database. Nucl Acids Res. 2010;38(suppl 1):D119-D122. 38. Griffiths-Jones S. The microRNA registry. Nucl Acids Res. 2004;32(suppl 1):D109-D111. 39. Griffiths-Jones S, Grocock RJ, Van Dongen S, Bateman A, Enright AJ. miRBase: microRNA sequences, targets and gene nomenclature. Nucl Acids Res. 2006;34(suppl 1):D140-D144. 40. Griffiths-Jones S, Saini HK, van Dongen S, Enright AJ. miRBase: tools for microRNA genomics. Nucl Acids Res. 2008;36(suppl 1):D154-D158. 41. Kozomara A, Griffiths-Jones S. miRBase: integrating microRNA annotation and deep-sequencing data. Nucl Acids Res. 2010:gkq1027. 42. Kozomara A, Griffiths-Jones S. miRBase: annotating high confidence microRNAs using deep sequencing data. Nucl Acids Res. 2013:gkt1181. 43. Cormen TH, Leiserson CE, Rivest RL, Stein C, others. Introduction to Algorithms. Vol 2. MIT press Cambridge; 2001. 44. Benjamini Y, Yekutieli D. The control of the false discovery rate in multiple testing under dependency. Annals of statistics. 2001:1165-1188. 45. Ritchie ME, Phipson B, Wu D, Hu Y, Law CW, Shi W, Smyth GK. limma powers differential expression analyses for RNA-sequencing and microarray studies. Nucl Acids Res. 2015:gkv007. 46. Law CW, Chen Y, Shi W, Smyth GK. Voom: precision weights unlock linear model analysis tools for RNA-seq read counts. Genome Biol. 2014;15(2):R29. Tables Code Cancer Type Control Samples Case Samples BLCA Bladder Urothelial Carcinoma 19 193 Stage I, II, III, IV BRCA Breast invasive carcinoma 86 642 Stage I, II, III, IV, X COAD Colon adenocarcinoma 8 389 Stage I, II, III, IV KICH Kidney Chromophobe 25 66 Stage I, II, III, IV KIRC Kidney renal clear cell carcinoma 71 224 Stage I, II, III, IV LUAD Lung adenocarcinoma 19 388 Stage I, II, III, IV LUSC 37 247 Stage I, II, III, IV PRAD Prostate adenocarcinoma 50 191 Category 6, 7, 8, 9, 10 READ Rectum adenocarcinoma 3 150 Stage I, II, III, IV UCEC Uterine Corpus Endometrial Carcinoma 14 231 Stage I, II, III, IV All Samples 332 2721 Lung squamous cell carcinoma Case Samples Categories Table 1 List of cancer types extracted from The Cancer Genome Atlas (TCGA) with their codes, number of case and control samples, and Subcategories. Perturb. Of Random Nodes Endpoints Pathway-level Statistics MITHrIL no MITHrIL MITHrIL PARADIGM MITHrIL SPIA miRNA no miRNA Acc. Acc. PARADIGM Scores Data Log-FC MITHrIL BLCA 3.11% 9.59% 6.58% 1.55% 2.60% 2.08% 12.95% 49.74% 82.38% BRCA 1.86% 2.12% 3.97% 1.09% 2.00% 2.34% 13.08% 8.25% 73.05% COAD 2.31% 0.00% 7.81% 0.00% 0.00% 3.10% 0.77% 0.00% 32.90% KICH 3.03% 1.67% 3.03% 0.00% 0.00% 3.03% 4.54% 3.03% 31.81% KIRC 3.12% 2.68% 2.77% 1.79% 2.68% 3.13% 5.80% 2.67% 35.26% LUAD 4.89% 0.03% 8.61% 1.80% 2.06% 5.41% 4.38% 2.83% 64.43% LUSC 6.07% 1.78% 6.92% 1.21% 2.02% 6.91% 5.26% 4.04% 71.54% PRAD 0.00% 0.37% 1.26% 0.00% 0.00% 0.52% 2.61% 30.89% 18.94% READ 3.33% 0.00% 9.40% 0.00% 0.00% 4.00% 0.66% 0.00% 96.66% UCEC 1.73% 1.39% 1.13% 0.00% 0.43% 0.09% 4.32% 1.29% 46.32% Total 2.90% 1.75% 5.38% 0.90% 1.50% 3.20% 6.40% 8.80% 57.60% Table 2 Classification results of tumor samples in our dataset obtained training PAMR algorithm by means of Log-Fold-Change, SPIA total accumulation, Paradigm scores, MITHrIL accumulators, and MITHrIL endpoint perturbations. Each element in the table corresponds to the classification error for a specific cancer type using one algorithm. Despite the reference classification based on Log-Fold-Change yields a low average error (2.90%), the employment of perturbations computed for each endpoint provides a significant improvement in the classification accuracy. Figures Figure 1 Performances comparison between MITHrIL, SPIA, and PARADIGM by means of the average area under the ROC curves. Each box in the figure represents the variability range of AUC values for a specific methodology. Figure 2 Significance of the addition of miRNA in our model by means of a comparison of the percentages of correctly predicted endpoints for each sample between our method with and without miRNAs. Each box in the figure represents the variability range of the percentage of correctly predicted endpoints for the patients of a specific tumor type. A prediction is correct when the deregulation observed in the original data correspond to the one inferred by our algorithm. Namely, the sign of an endpoint logFold-Change corresponds to the sign of its perturbation value.
5cs.CE
Gene Selection With Guided Regularized Random Forest arXiv:1209.6425v3 [cs.LG] 20 Jun 2013 Houtao Deng Intuit, Mountain View, CA, USA George Runger Arizona State University, Tempe, AZ, USA Abstract The regularized random forest (RRF) was recently proposed for feature selection by building only one ensemble. In RRF the features are evaluated on a part of the training data at each tree node. We derive an upper bound for the number of distinct Gini information gain values in a node, and show that many features can share the same information gain at a node with a small number of instances and a large number of features. Therefore, in a node with a small number of instances, RRF is likely to select a feature not strongly relevant. Here an enhanced RRF, referred to as the guided RRF (GRRF), is proposed. In GRRF, the importance scores from an ordinary random forest (RF) are used to guide the feature selection process in RRF. Experiments on 10 gene data sets show that the accuracy performance of GRRF is, in general, more robust than RRF when their parameters change. GRRF is computationally efficient, can select compact feature subsets, and has competitive accuracy performance, compared to RRF, varSelRF and LASSO logistic regression (with evaluations from an RF classifier). Also, RF applied to the features selected by RRF with the minimal regularization outperforms RF applied to all the features for most of the data sets considered here. Therefore, if accuracy is considered more important than the size of the feature This research was partially supported by ONR grant N00014-09-1-0656. Email addresses: [email protected] (Houtao Deng), [email protected] (George Runger) ∗ Preprint submitted to Elsevier June 21, 2013 subset, RRF with the minimal regularization may be considered. We use the accuracy performance of RF, a strong classifier, to evaluate feature selection methods, and illustrate that weak classifiers are less capable of capturing the information contained in a feature subset. Both RRF and GRRF were implemented in the “RRF” R package available at CRAN, the official R package archive. Keywords: classification; feature selection; random forest; variable selection. 1. Introduction Given a training data set consisting of N instances, P predictor variables/features Xi (i = 1, ..., P ) and the class Y ∈ {1, 2, ..., C}, the objective of feature selection is to select a compact variable/feature subset without loss of predictive information about Y . Note feature selection selects a subset of the original feature set, and, therefore, may be more interpretable than feature extraction (e.g., principal component analysis [15] and partial least squares regression [8]) which creates new features based on transformations or combinations of the original feature set [13]. Feature selection has been widely used in many applications such as gene selection [23, 30, 18] as it can moderate the curse of dimensionality, improve interpretability [10] and avoid the effort to analyze irrelevant or redundant features. Information-theoretic measures such as symmetrical uncertainty and mutual information can measure the degree of association between a pair of variables and have been successfully used for feature selection, e.g., CFS (correlation-based feature selection) [12] and FCBF (fast correlation-based filter) [29]. However, these measures are limited to two variables and do not capture high-order interactions between variables well. For example, the measures can not capture the exclusive OR relationship Y = XOR(X1 , X2 ), in which neither X1 nor X2 is predictive individually, but X1 and X2 together can correctly determine Y [14]. LASSO logistic regression [25] and recursive feature elimination with a linear SVM (SVM-RFE) [11] are well-known feature selection methods based on classifiers. These methods assume a linear relationship between the log odds of the class and the predictor variables (LASSO logistic regression) or between the class and the predictor variables (linear SVM). Furthermore, before using these methods, one often needs to preprocess the data such as 2 transforming categorical variables to binary variables or normalizing variables of different scales. A random forest (RF)[3] classifier has been commonly used for measuring feature importance [17]. An RF naturally handles numerical and categorical variables, different scales, interactions and nonlinearities, etc. Although the RF feature importance scores can be used to select K features with the highest importance scores individually, there could be redundancy among the K features. Consequently, the selected features subset can differ from the best combination of K-features, that is, the best feature subset. Similarly, Boruta [22], a method based on RF, aims to select a set of relevant features, which is different from the objective of a relevant and also non-redundant feature subset. A feature selection method based on RF, varSelRF[27], has become popular. varSelRF consists of multiple iterations and eliminates the feature(s) with the least importance score(s) at each iteration. Since eliminating one feature at each iteration is computationally expensive, the authors considered eliminating a fraction, e.g., 1/5, of the features at each iteration. However, when there is a large number of features, many features are eliminated at each iteration, and, thus, useful features, but with small importance scores, can be eliminated. The ACE algorithm [26] is another ensembles-based feature selection method. It was shown to be effective, but it is more computationally demanding than the simpler approaches considered here. It requires multiple forests to be constructed, along with multiple gradient boosted trees [6]. Recently, the regularized random forest (RRF) was proposed for feature selection with one ensemble [4], instead of multiple ensembles [27, 26]. However, in RRF the features are evaluated on a part of the training data at each tree node and the feature selection process may be greedy. Here we analyze a feature evaluation issue that occurs in all the usual splitting algorithms at tree nodes with a small number of training instances. To solve this issue, we propose the guided RRF (GRRF) method, in which the importance scores from an ordinary RF are used to guide the feature selection process in RRF. Since the importance scores from an RF are aggregated from all the trees based on all the training data, GRRF is expected to perform better than RRF. Section 2 presents previous work. Section 3 discusses the node sparsity issue when evaluating features at tree nodes with a small number of training instances. Section 4 describes the GRRF method. Section 5 presents and 3 discusses the experimental results. Section 6 concludes this work. 2. Background 2.1. Variable importance scores from Random Forest A random forest (RF) [3] is a supervised learner that consists of multiple decision trees, each of which grown on a bootstrap sample from the original training data. The Gini index at node v, Gini(v), is defined as Gini(v) = C X c=1 p̂vc (1 − p̂vc ) where p̂vc is the proportion of class-c observations at node v. The Gini information gain of Xi for splitting node v, Gain(Xi , v), is the difference between the impurity at the node v and the weighted average of impurities at each child node of v. That is, Gain(Xi , v) = Gini(Xi , v) − wL Gini(Xi , v L ) − wR Gini(Xi , v R ) where v L and v R are the left and right child nodes of v, respectively, and wL and wR are the proportions of instances assigned to the left and right child nodes. At each node, a random set of mtry features out of P is evaluated, and the feature with the maximum Gain(Xi , v) is used for splitting the node v. The importance score for variable Xi can be calculated as Impi = 1 X Gain(Xi , v) ntree v∈S (1) Xi where SXi is the set of nodes split by Xi in the RF with ntree trees. The RF importance scores are commonly used to evaluate the contributions of the features regarding predicting the classes. 2.2. Regularized Random Forest The regularized random forest (RRF) [4] applies the tree regularization framework to RF and can select a compact feature subset. While RRF is 4 Algorithm 1: Feature selection at node v. input : F and λ output: F 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 gain∗ ← 0, count ← 0, f ∗ ← −1, f1 ← {1, 2, 3, ..., P }, f2 ← ∅ while f1 6= ∅ do m ← select(f1 ) //randomly select feature index m from f1 f2 ← {f2 , m} //add m to f2 f1 ← f1 − m //remove m from f1 gainR (Xm , v) ← 0 if Xm ∈ F then gainR (Xm , v) ← gain(Xm , v) //calculate gainR for all variables in F end √ if Xm ∈ / F and count < ⌈ P ⌉ then gainR (Xm ) ← λ · gain(Xm ) //regularize the gain if the variable is not in F count ← count + 1 end if gainR (Xm , v) > gain∗ then gain∗ ← gainR (Xm , v), f ∗ ← m end end if f ∗ 6= −1 and f ∗ ∈ / F then F ← {F, f ∗ } end return F built in a way similar to RF, the main difference is that the regularized information gain, GainR (Xi , v), is used in RRF ( λ · Gain(Xi , v) i ∈ /F (2) GainR (Xi , v) = Gain(Xi , v) i∈F where F is the set of indices of features used for splitting in previous nodes and is an empty set at the root node in the first tree. Here λ ∈ (0, 1] is called the penalty coefficient. When i ∈ / F , the coefficient penalizes the ith feature for splitting node v. A smaller λ leads to a larger penalty. RRF uses GainR (Xi , v) at each node, and adds the index of a new feature to F if the feature adds enough predictive information to the selected features. RRF with λ = 1, referred to as RRF(1), has the minimum regularization. Still, a new feature has to be more informative at a node than the features already selected to enter the feature subset. The feature subset selected by RRF(1) is called the least regularized subset, indicating the minimal regularization from RRF. Figure 1 illustrates the feature selection process. The nodes in the forest are visited sequentially (from the left to the right and from the top to the 5 bottom). The indices of three distinct features used for splitting are added to F in Tree 1, and the index of X5 is added to F in Tree 2. Algorithm 1 shows the feature selection process at each node. F={}+1 F={1,3,4} X1 X3 F={1,4}+3 F={1}+4 X4 F={1,3,4}+5 X3 X5 Tree 1 ... Tree 2 Figure 1: The feature selection procedure of RRF. The non-leaf nodes are marked with the splitting variables. Three distinct features used for splitting are added to F in Tree 1, and one feature X5 is added to F in Tree 2. Similar to GainR (·), a penalized information gain was used to suppress spurious interaction effects in the rules extracted from tree models [7]. The objective of Friedman and Popescu [7] was different from the goal of a compact feature subset here. Also, the regularization used in Friedman and Popescu [7] only reduces the redundancy in each path from the root node to a leaf node, but the features extracted from such tree models can still be redundant. 3. The Node Sparsity Issue This section discusses an issue of evaluating features in a tree node with a small number of instances, referred to as the node sparsity issue here. The number of instances decreases as the instances are split recursively in a tree, and, therefore, this issue can commonly occur in tree-based models. In a tree node, the Gini information gain or other information-theoretic measures are commonly used to evaluate and compare different features. However, the measures calculated from a node with a small number of instances may not be able to distinguish the features with different predictive information. In the following we establish an upper bound for the number of distinct values of Gini information gain for binary classification. Let D(f ) denote the number of distinct values of a function f (defined over a specified range), N denote the number of instances at a non-leaf node v and N ≥ 2 (otherwise it cannot be split). For simplicity, in the following 6 we also assume N is even. The following procedure is similar when N is odd. Let N1 and N2 be the number of instances of class 1 and class 2, respectively, at the node. Let L denote the number of instances at the left child node, and let L1 and L2 denote the number of instances for class 1 and class 2 at the left child node, respectively, with similar notations R, R1 and R2 for the right child node. Note L ≥ 1 and R ≥ 1. The notation L1 L2 denotes the product function where L1 and L2 assume values in the feasible domain 0 ≤ L1 , L2 ≤ L and L1 + L2 = L. Then we have the following lemmas and theorem. Lemma 1. An upper bound of the number of distinct values of L1 L2 is ⌈(L+ 1)/2⌉. That is, D(L1 L2 ) ≤ ⌈(L + 1)/2⌉, where ⌈·⌉ denotes the ceiling. Proof. L1 has at most L + 1 values (L1 ∈{0,1,...,L}). Now let l1 l2 and m1 m2 be two realizations of L1 L2 , and let l1 l2 = m1 m2 , we have (L − l1 )l1 = (L − m1 )m1 2 2 ⇔ Ll1 − l1 − Lm1 + m1 = 0 ⇔ L(l1 − m1 ) + (m1 + l1 )(m1 − l1 ) = 0 ⇔ (l1 − m1 )(L − l1 − m1 ) = 0 ⇔ l1 = m1 or l1 = L − m1 Therefore, we obtain an upper bound for the number of distinct values for L1 L2 as D(L1 L2 ) <= ⌈(L + 1)/2⌉. Lemma 2. D(L1 L2 /L) ≤ N(N + 2)/4 − 1. Proof. For each L, L1 L2 /L has at most D(L1 L2 ) distinct values. Because 1 ≤ L ≤ N − 1, an upper bound for D(L1 L2 /L) is derived as follows D(L1 L2 /L) ≤ ⌈2/2⌉ + ⌈3/2⌉ + ... + ⌈N/2⌉ = N(N + 2)/4 − 1 Lemma 3. D(L1 L2 /L + R1 R2 /R) ≤ N(N + 2)/4 − 1 Proof. Because L1 L2 /L and R1 R2 /R are symmetric, the upper bound is the same as for one term. That is, D(L1 L2 /L + R1 R2 /R) ≤ N(N + 2)/4 − 1 Theorem 1. For binary classification, an upper bound of the number of distinct information gain values is N(N + 2)/4 − 1. 7 Proof. The information gain for spliting node v is Gain(v) = Gini(v) − wL Gini(v L ) − wR Gini(v R ) Because Gini(v) is a constant at node v, we only need to consider D(wL Gini(v L )+ wR Gini(v R )). For two classes wL Gini(v L ) = (L/N)(L1 /L · L2 /L + L2 /L · L1 /L) = 2(L/N)(L1 L2 )/L2 Then wL Gini(v L ) + wR Gini(v R ) = 2(L/N)(L1 L2 )/L2 + 2(R/N)(R1 R2 )/R2 = (2/N)(L1 L2 /L) + (2/N)(R1 R2 /R) Because N is a constant, we have D(wL Gini(v L )+wR Gini(v R )) = D(L1 L2 /L+ R1 R2 /R). According to Lemma 3, D(L1 L2/L + R1 R2 /R) ≤ N(N + 2)/4 − 1. Note similar conclusions may be applied to other information-theoretic measures such as the regularized information gain in Equation 2. Consequently, when N is small, the number of distinct Gini information gain values is small. For a large number of variables, many could have the same Gini information gain. For example, at a node with 10 instances there are at most 29 distinct Gini information gain values for binary classification problems. For 1000 genes with two classes, there are at least 1000-29=971 genes having the same information gain as other genes. The number of instances can be even smaller than 10 in a node of an RF or RRF as each tree is grown completely. In RRF, a feature with the maximum regularized information gain is added at a node based on only the instances at that node. When multiple features have the maximum regularized information gain, one of these features is randomly selected. As discussed above, at a node with only a small number of instances less relevant, or redundant features may be selected. An additional metric is useful to help distinguish the features. In the following section, we introduce the guided regularized random forest that leverages the importance scores calculated from an RF based on all the training data. 8 4. Guided Regularized Random Forest The guided RRF (GRRF) uses the importance scores from a preliminary RF to guide the feature selection process of RRF. Because the importance scores from an RF are aggregated from all the trees of the RF based on all the training data, GRRF may be able to handle the node sparsity issue discussed in the previous section. A normalized importance score is defined as Imp′i = Impi maxPj=1 Impj (3) where Impi is the importance score from an RF (defined in Equation 1). Here 0 ≤ Imp′i ≤ 1. Instead of assigning the same penalty coefficient to all features in RRF, GRRF assigns a penalty coefficient to each feature. That is, ( λi Gain(Xi , v) Xi ∈ /F (4) GainR (Xi , v) = Gain(Xi , v) Xi ∈ F where λi ∈ (0, 1] is the coefficient for Xi (i ∈ {1, ..., P }) and is calculated based on the importance score of Xi from an ordinary RF. That is, λi = (1 − γ)λ0 + γImp′i (5) where λ0 ∈ (0, 1] controls the degree of regularization and is called the base coefficient, and γ ∈ [0, 1] controls the weight of the normalized importance score and is called the importance coefficient. Note that RRF is a special case of GRRF with γ = 0. Given λ0 and γ, a feature with a larger importance score has a larger λi , and, therefore, is penalized less. In our experiments we found the feature subset size can be effectively controlled by changing either λ0 or γ, but changing the latter often leads to better performance in terms of classification accuracy. To reduce the number of parameters of GRRF, we fix λ0 to be 1 and consider γ as the only parameter for GRRF. With λ0 = 1, we have λi = (1 − γ) + γImp′i = 1 − γ(1 − Imp′i ) (6) For a feature Xi that does not have the maximum importance score (Imp′i 6= 1), a larger γ leads to a smaller λi and, thus, a larger penalty on Gain(Xi , v) when Xi has not been used in the nodes prior to node v. Consequently, γ is essentially the degree of regularization. Furthermore, GRRF with γ = 0 is equivalent to RRF(1), with the minimal regularization. 9 5. Experiments We implemented the RRF and GRRF algorithms in the “RRF” R package based on the “randomForest” package [17]. The “RRF” package is available from CRAN (http://cran.r-project.org/), the official R package archive. Work by [27] showed that the accuracy performance of RF is largely independent √ of the number of trees (between 1000 and 40000 trees), and mtry = P is√often a reasonable choice. Therefore, we used ntree = 1000 and mtry = P for the classifier RF and the feature selection methods RRF, GRRF and varSelRF. Guided by initial experiments, randomly sampling 63% of the data instances (the same as the default setting in the “randomForest” package) without replacement was used in RRF and GRRF. We also evaluated two well-known feature selection methods: varSelRF available in the “varSelRF” R package and LASSO logistic regression available in the “glmnet” R package. Unless otherwise specified, the default values in the packages were used. Also note λ is the parameter of RRF, and as discussed, γ is considered as the only parameter of GRRF here. Table 1: The number of groups identified, and the number of irrelevant or redundant features selected for different algorithms. Method Average Std. err LASSO 4 0.000 # Groups varSelRF RRF 4.95 5 0.050 0.000 GRRF 4.95 0.050 # Irrelevant or Redundant Features LASSO varSelRF RRF GRRF 4.3 4.95 4.95 0.75 0.147 0.050 0.050 0.123 5.1. Simulated Data Sets We start with a simulated data set generated by the following procedure. First generate 10 independent variables: X1 ,..., X10 , each is uniformly distributed in the interval [0,1]. Variable Y is calculated by the formula Y = 10 sin(πX1 X2 ) + 20(X3 − 0.5)2 + 10X4 + 5X5 + e where e follows a standard normal distribution. Note the above data generation procedure was described in [5]. We simulated 1000 instances and then calculated the median of Y as y. We then labeled class 2 to the instances with Y > y, and class 1 otherwise, so that it becomes a classification problem. Furthermore, we added five other variables with X11 =X1 , X12 =X2 , X13 =X3 , X14 =X4 , X15 =X5 . Consequently, the feature selection solution is {(X1 |X11 ) & (X2 |X12 ) & (X3 |X13 ) & (X4 |X14 ) & (X5 |X15 )}, 10 Table 2: Summary of the data sets. Data set adenocarcinoma brain breast.2.class breast.3.class colon leukemia lymphoma nci60 prostate srbct Reference [20] [19] [28] [28] [2] [9] [1] [21] [24] [16] # Examples 76 42 77 95 62 38 62 61 102 63 # Features 9868 5597 4869 4869 2000 3051 4026 5244 6033 2308 # classes 2 5 2 3 2 2 3 8 2 4 where & stands for “and” and (X1 |X11 ) indicates that one and only one from this group should be selected. For example, for the data set considered here, both (X1 , X2 , X3 , X4 , X5 ) and (X11 , X2 , X13 , X4 , X5 ) are correct solutions. However, (X1 , X3 , X4 , X5 ) misses the group (X2 |X12 ). Furthermore, (X1 , X2 , X3 , X4 , X5 , X11 ) has a redundant variable because X11 is redundant to X1 . We simulated 20 replicates of the above data set, and then applied GRRF, RRF and two well-known methods varSelRF and LASSO logistic regression to the data sets. Here γ of GRRF was selected from {0.4,0.5,0.6}, λ of RRF was selected from {0.6,0.7,0.8}, and the regularization parameter of LASSO logistic regression was selected from {0.01,0.02,0.03,0.05,0.1,0.2}, all by 10fold CV. The results are shown in Table 1. LASSO logistic regression identifies the least number of groups on average (4). The methods varSelRF, RRF and GRRF identify almost all the groups, but varSelRF and RRF select 4.95, on average, irrelevant or redundant variables, and GRRF only selects 0.75 irrelevant or redundant variables. This experiment shows GRRF’s potential in selecting a relevant and non-redundant feature subset. 5.2. Gene Data Sets The 10 gene expression data sets analyzed by Uriarte and de Andres [27] are considered in this section. The data sets are summarized in Table 2. For each data set, a feature selection algorithm was applied to 2/3 of the instances (selected randomly) to select a feature subset. Then a classifier was applied to the feature subset. The error rate is obtained by applying the classifier to the other 1/3 of the instances. This procedure was conducted 100 times with different random seeds, and the average size of feature subsets and the average error rate over 100 runs were calculated. In the experiments, we considered 11 Table 3: The number of features selected in the least regularized subset selected by RRF (i.e., RRF(1)), the total number of original features (“All”), and the error rates of RF applied to the least regularized subset and all the features. The win-lose-tie results of “All” compared to RRF(1) are shown. Here “◦” or “•” represents a significant difference at the 0.05 level, according to the paired t-test. RRF(1) uses many fewer features than the original features, and wins on 7 data sets. There are significant differences for four data sets. adenocarcinoma brain breast.2.class breast.3.class colon leukemia lymphoma nci prostate srbct win-lose-tie Number of features RRF(1) All 86 9868 97 5597 210 4869 253 4869 92 2000 24 3051 31 4026 197 5244 88 6033 51 2308 - Average error rates RRF(1)-RF All-RF 0.158 0.159 0.159 0.170 0.352 0.371 0.397 0.415 0.162 0.158 0.053 0.064 0.018 0.006 0.332 0.321 0.082 0.109 0.027 0.032 3-7-0 ◦ ◦ • ◦ Table 4: The total number of original features (“All”) and the average number of features (from 100 replicates for each data set) selected by different methods. All feature selection methods are able to select a small number of features. Here GRRF(0.1) and RRF(0.9) select a similar number of features, but it is shown later that GRRF(0.1) is more accurate than RRF(0.9) (with an RF classifier) for most data sets. adenocarcinoma brain breast.2.class breast.3.class colon leukemia lymphoma nci prostate srbct All 9868 5597 4869 4869 2000 3051 4026 5244 6033 2308 GRRF(0.1) 20 22 59 77 29 6 5 63 18 13 GRRF(0.2) 15 12 25 31 13 4 4 26 13 9 RRF(0.9) 23 27 60 78 27 6 4 61 19 14 varSelRF 4 28 7 12 4 2 81 60 6 34 LASSO 2 24 7 18 7 8 25 53 12 28 RRF, GRRF, varSelRF and LASSO logistic regression as the feature selection algorithms, and random forest (RF) and C4.5 as the classifiers. 5.2.1. Feature selection and classification First compare the accuracy of RF applied to all the features, denoted as “All”, and the least regularized subset (i.e., features selected by RRF(1)). The number of features and the error rates are shown in Table 3. The winlose-tie results of “All” compared to RRF(1) are also shown in the tables. To investigate the statistical significance of these results, we applied the paired 12 Table 5: The error rates of RF applied to the feature subsets selected by GRRF(0.1), GRRF(0.2), RRF(0.9), varSelRF and LASSO logistic regression, respectively (to three decimal places). The win-lose-tie results of each competitor compared to GRRF(0.1) with RF are shown. Here “◦” or “•” represents a significant difference between a method and GRRF(0.1) with RF at the 0.05 level, according to the paired t-test. Here GRRF(0.1) leads to competitive accuracy performance, compared to GRRF(0.2), RRF(0.9), LASSO and varSelRF. adenocarcinoma brain breast.2.class breast.3.class colon leukemia lymphoma nci prostate srbct win-lose-tie GRRF(0.1) -RF 0.169 0.214 0.345 0.387 0.175 0.080 0.067 0.389 0.085 0.064 - GRRF(0.2) -RF 0.168 0.259 0.359 0.403 0.186 0.093 0.076 0.452 0.085 0.072 1-9-0 ◦ ◦ ◦ ◦ ◦ RRF(0.9) -RF 0.160 0.234 0.367 0.410 0.190 0.091 0.098 0.405 0.101 0.074 1-9-0 ◦ ◦ ◦ ◦ ◦ varSelRF -RF 0.212 0.231 0.386 0.418 0.232 0.107 0.022 0.418 0.085 0.035 3-7-0 ◦ ◦ ◦ ◦ ◦ • ◦ • LASSO -RF 0.189 0.259 0.366 0.400 0.180 0.076 0.009 0.396 0.088 0.007 3-7-0 ◦ ◦ ◦ • • Table 6: The error rates of C4.5 applied to the feature subsets selected by GRRF(0.1), GRRF(0.2), RRF(0.9), varSelRF and LASSO logistic regression, respectively. The winlose-tie results of each competitor compared to GRRF(0.1) with C4.5 are calculated. Here “◦” or “•” represents a significant difference between a method and GRRF(0.1) with C4.5 at the 0.05 level, according to the paired t-test. The GRRF methods and the other methods have perform similarly in terms of the accuracy with C4.5. As expected, C4.5 has noticeably higher error rates than RF, shown in Table 5. adenocarcinoma brain breast.2.class breast.3.class colon leukemia lymphoma nci prostate srbct win-lose-tie GRRF(0.1) -C4.5 0.260 0.438 0.402 0.497 0.274 0.133 0.126 0.626 0.157 0.235 - GRRF(0.2) -C4.5 0.251 0.428 0.411 0.494 0.262 0.157 0.125 0.636 0.138 0.208 7-3-0 ◦ • • 13 RRF(0.9) -C4.5 0.241 0.418 0.412 0.491 0.298 0.138 0.126 0.658 0.154 0.207 5-5-0 ◦ ◦ • varSelRF -C4.5 0.248 0.394 0.413 0.481 0.273 0.146 0.152 0.641 0.115 0.209 6-4-0 • ◦ • • LASSO -C4.5 0.218 0.476 0.391 0.482 0.242 0.166 0.138 0.646 0.144 0.194 6-4-0 • ◦ • ◦ • t-test to the error rates of the two methods from 100 replicates for each data set. The data sets with a significant difference at the 0.05 level are marked with “◦” or “•” in the table. The least regularized subset not only has many fewer features than “All”, but also leads to better accuracy performance on 7 data sets out of 10, and the error rates are significantly different on 4 data sets. Therefore, RRF(1) not only improves interpretability by reducing the number of features, but also can improve the accuracy performance of classification, even for RF, considered as a strong classifier capable of handling irrelevant and relevant variables [4]. It should also be noted that although the least regularized subset is much smaller than the original feature set, the size may still be considered large in some cases, e.g., more than 200 features for the breast.2.class data set. GRRF and RRF with larger regularization, investigated in the following experiments, are able to further reduce the number of features. Next compare GRRF to RRF and two well-known methods: varSelRF and LASSO logistic regression. The regularization parameter of LASSO logistic regression was selected from {0.01, 0.02, 0.03, 0.05, 0.1, 0.2} by 10-fold CV. Here γ ∈ {0.1, 0.2} was used for GRRF (i.e., GRRF(0.1) or GRRF(0.2)), and λ = 0.9 was used for RRF (i.e., RRF(0.9)). We used a fixed parameter setting for GRRF or RRF, as the parameter sensitivity analysis in the following section shows a consistent trend that GRRF or RRF tends to select more features and also tends to be more accurate, for a smaller γ or a larger λ. We chose these parameters so that a reasonably small number of features can be selected. One can also use cross-validation error to determine an appropriate parameter value customized for each data set and potentially improve these results. The total number of original features and the average number of features selected by each feature selection method are shown in Table 4. All the feature selection methods are able to select a small number of features. The average error rates of RF applied to all the features (“All”) and the subsets selected by different feature selection methods are shown in Table 5. GRRF(0.1) with RF outperforms GRRF(0.2) with RF on 9 data sets out of 10, 5 of which have significant differences at the 0.05 level. Even though GRRF(0.1) selects more features than GRRF(0.2), the sizes of the feature subsets are reasonably small (all less than 80 features). GRRF(0.1) and RRF(0.9) select a similar number of features. However, GRRF(0.1) with RF outperforms RRF(0.9) with RF on 9 data sets, 5 of which have significant differences at the 0.05 level. Consequently, GRRF 14 selects stronger features than RRF, which is consistent with the simulated experiments. According to the discussion in Section 3, a feature with the maximum Gini information gain in a node with a small number instances may not be truly strong. Yet RRF adds this feature to the subset. GRRF(0.1) with RF outperforms varSelRF with RF on 7 data sets, 6 of which have significant differences. Therefore, GRRF(0.1) may be more favorable than varSelRF for the data sets considered here. Also, as shown in the following section, GRRF has a clear advantage over varSelRF in terms of computational time. Furthermore, GRRF(0.1) with RF outperforms LASSO logistic regression with RF on 7 data sets, 3 of which have significant differences. The accuracy performance may be improved by applying a logistic regression model to the features selected by LASSO logistic regression. However, tree models like GRRF have a few desirable properties compared to LASSO logistic regression: they can naturally handle mixed categorical and numerical features, and multiple classes, etc. The average error rates of C4.5 applied to all the features (“All”) and the subsets selected by different feature selection methods are shown in Table 6. It can be seen that the error rates of C4.5 are clearly higher than RF shown in Table 5. Indeed, RF has been considered as a stronger classifier than C4.5. Interestingly, the differences between the methods in terms of C4.5 are smaller than the RF results. As mentioned by [4], a relatively weaker classifier is less capable of capturing information from data than a stronger classifier. Consequently, a feature subset that includes strong features, but misses the features of small contributions may not affect the accuracy of C4.5 much, but can affect the accuracy of RF. A weak classifier should only be used for evaluating a feature subset if that classifier is actually used for classification after feature selection. However, if a strong classifier is used for classification after feature selection, or the objective is to evaluate the information contained in the feature subset, a strong classifier should be considered [4]. 5.2.2. Parameter Sensitivity and Computational Time We investigated the performance of RRF and GRRF with different parameter settings: λ ∈ {0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1} for RRF and γ ∈ {0.9, 0.8, 0.7, 0.6, 0.5, 0.4, 0.3, 0.2, 0.1, 0} for GRRF. The parameter values are arranged by the degree of regularization in a decreasing order for both methods. The sizes of the feature subsets, averaged over 100 replicates, for each 15 500 1000 500 1000 leukemia lymphoma nci prostate srbct 100 50 # features 5 1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.9 0.8 base coefficient of RRF 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0.1 0 importance coefficient of GRRF 0.6 error rate 0.0 0.2 0.4 0.6 0.4 0.0 0.2 leukemia lymphoma nci prostate srbct adenocarcinoma brain breast.2.class breast.3.class colon 0.8 leukemia lymphoma nci prostate srbct 0.8 adenocarcinoma brain breast.2.class breast.3.class colon 1.0 (b) 1.0 (a) error rate leukemia lymphoma nci prostate srbct adenocarcinoma brain breast.2.class breast.3.class colon 10 50 1 5 10 # features 100 adenocarcinoma brain breast.2.class breast.3.class colon 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.9 base coefficient of RRF 0.8 0.7 0.6 0.5 0.4 0.3 0.2 importance coefficient of GRRF (c) (d) Figure 2: The performance of RRF for selected values of λ and GRRF for selected values of γ. Figure 2(a) shows the number of features selected by RRF. A smaller λ leads to fewer features. Figure 2(b) shows the number of features selected by GRRF. A larger γ leads to fewer features. Figure 2(c) shows the error rates of RF applied to the feature subsets selected by RRF for different λ. The error rates tend to decrease as λ increases. Figure 2(d) shows the error rates of RF applied to the feature subsets selected by GRRF for different γ. The error rates tend to decrease as γ decreases, but are reasonably robust. 16 140 80 60 t bc sr te i ta nc os pr a ly m ph om ia n lo uk em le ss .3 st br ea co la ss .c la n .2 br ea st ar oc ad en .c br ai ci no m a 0 20 40 Time(sec.) 100 120 RF GRRF varSelRF Figure 3: Computational time of RF, GRRF and varSelRF. GRRF is more computationally efficient than varSelRF. GRRF takes about twice as much as RF as it builds two ensembles. parameter setting of RRF and GRRF, are shown in Figures 2(a) and 2(b), respectively. The number of features tends to increase as λ increases for RRF, or as γ decreases for GRRF. The consistent trend illustrates that one can control the size of the feature subset by adjusting the parameters. The error rates, averaged over 100 replicates, for each parameter setting of RRF and GRRF are shown in Figures 2(c) and 2(d), respectively. In general, the error rates tend to decrease as λ increases for RRF, or as γ decreases for GRRF. However, for most data sets, the error rates of GRRF seem to be reasonably robust to the changes of γ. As mentioned, RRF(1) and GRRF(0) are equivalent, and, therefore, they have similar number of features and error rates for every data set (differing only by random selections). The computational time of the RF-based methods: RF, GRRF and varSelRF is shown in Figure 3. As expected, RF was fast for training on these data sets. GRRF builds two ensemble models, and, thus, the computational time of GRRF is only about twice as much as RF. However, varSelRF needs to 17 build multiple ensemble models, and the computational advantage of GRRF over varSelRF is clear. 6. Conclusions We derive an upper bound for the number of distinct Gini information gain values in a tree node for binary classification problems. The upper bound indicates that the Gini information gain may not be able to distinguish features at nodes with a small number of instances, which poses a challenge for RRF that selects a feature only using the instances at a node. Motivated by this node sparsity issue, we propose an enhanced method called the guided, regularized random forest (GRRF), in which a preliminary random forest is used to generate the initial variable importance scores to guide the regularized feature selection process of RRF. The importance scores from the preliminary RF help GRRF select better features when many features share the same maximal Gini information gain at a node. For the experiments here, GRRF is more favorable than RRF, computationally efficient, selects a small set of features, and has competitive accuracy performance. Feature selection eliminates irrelevant or redundant features, but also may eliminate features of small importance. This may not affect the performance of a weak classifier which is less capable of capturing small information, but may affect the performance of a strong classifier such as RF [4]. Still, we found that the least regularized subset selected by RRF with the minimal regularization produces better accuracy performance than the complete feature set. Finally we note that although RRF and GRRF can be used as classifiers, they are designed for feature selection. The trees in RRF and GRRF are not built independently as the features selected in previous trees have an impact on the trees built later. Therefore, as a classifier, RRF or GRRF may have a higher variance than RF because the trees are correlated. Consequently, in this work we applied RF on the feature subset selected by GRRF or RRF for classification. References [1] A.A. Alizadeh, M.B. Eisen, R.E. Davis, C. Ma, I.S. Lossos, A. Rosenwald, J.C. Boldrick, H. Sabet, T. Tran, X. Yu, J.I. Powell, L. Yang, G.E. 18 Marti, T. Moore, J. Hudson, L. Lu, D.B. Lewis, R. Tibshirani, G. Sherlock, W.C. Chan, T.C. Greiner, D.D. Weisenburger, J.O. Armitage, R. Warnke, R. Levy, W. Wilson, M.R. Grever, J.C. Byrd, D. Botstein, P.O. Brown, L.M. Staudt, Distinct types of diffuse large B-cell lymphoma identified by gene expression profiling., Nature 403 (2000) 503–511. [2] U. Alon, N. Barkai, D.A. Notterman, K. Gish, S. Ybarra, D. Mack, A.J. Levine, Broad patterns of gene expression revealed by clustering analysis of tumor and normal colon tissues probed by oligonucleotide arrays, Proceedings of the National Academy of Sciences of the United States of America 96 (1999) 6745–6750. [3] L. Breiman, Random forests, Machine Learning 45 (2001) 5–32. [4] H. Deng, G.C. Runger, Feature selection via regularized trees, in: The 2012 International Joint Conference on Neural Networks (IJCNN), IEEE. [5] J.H. Friedman, Multivariate adaptive regression splines, The annals of statistics (1991) 1–67. [6] J.H. Friedman, Greedy function approximation: A gradient boosting machine, Annals of Statistics 29 (2001) 1189–1232. [7] J.H. Friedman, B.E. Popescu, Predictive learning via rule ensembles, Annals of Applied Statistics 2 (2008) 916–954. [8] P. Geladi, B. Kowalski, Partial least-squares regression: a tutorial, Analytica chimica acta 185 (1986) 1–17. [9] T.R. Golub, D.K. Slonim, P. Tamayo, C. Huard, M. Gaasenbeek, J.P. Mesirov, H. Coller, M.L. Loh, J.R. Downing, M.A. Caligiuri, C.D. Bloomfield, E.S. Lander, Molecular classification of cancer: class discovery and class prediction by gene expression monitoring., Science 286 (1999) 531–537. [10] I. Guyon, A. Elisseeff, An introduction to variable and feature selection, Journal of Machine Learning Research 3 (2003) 1157–1182. 19 [11] I. Guyon, J. Weston, S. Barnhill, V. Vapnik, Gene selection for cancer classification using support vector machines, Machine Learning 46 (2002) 389–422. [12] M.A. Hall, Correlation-based feature selection for discrete and numeric class machine learning, in: Proceedings of the 17th International Conference on Machine Learning, pp. 359–366. [13] A. Jain, D. Zongker, Feature selection: Evaluation, application, and small sample performance, Pattern Analysis and Machine Intelligence, IEEE Transactions on 19 (1997) 153–158. [14] A. Jakulin, I. Bratko, Analyzing attribute dependencies, Knowledge Discovery in Databases: PKDD 2003 (2003) 229–240. [15] I. Jolliffe, MyiLibrary, Principal component analysis, volume 2, Wiley Online Library, 2002. [16] J. Khan, J.S. Wei, M. Ringner, L.H. Saal, M. Ladanyi, F. Westermann, F. Berthold, M. Schwab, C.R. Antonescu, C. Peterson, P.S. Meltzer, Classification and diagnostic prediction of cancers using gene expression profiling and artificial neural networks, Nature Medicine 7 (2001) 673– 679. [17] A. Liaw, M. Wiener, Classification and regression by randomforest, R News 2 (2002) 18–22. [18] H. Liu, L. Liu, H. Zhang, Ensemble gene selection for cancer classification, Pattern Recognition 43 (2010) 2763–2772. [19] S.L. Pomeroy, P. Tamayo, M. Gaasenbeek, L.M. Sturla, M. Angelo, M.E. Mclaughlin, J.Y.H. Kim, L.C. Goumnerova, P.M. Black, C. Lau, J.C. Allen, D. Zagzag, J.M. Olson, T. Curran, C. Wetmore, J.A. Biegel, T. Poggio, S. Mukherjee, R. Rifkin, A. Califano, G. Stolovitzky, D.N. Louis, J.P. Mesirov, E.S. Lander, T.R. Golub, Prediction of central nervous system embryonal tumour outcome based on gene expression., Nature 415 (2002) 436–442. [20] S. Ramaswamy, K.N. Ross, E.S. Lander, T.R. Golub, A molecular signature of metastasis in primary solid tumors., Nature genetics 33 (2003) 49–54. 20 [21] D.T. Ross, U. Scherf, M.B. Eisen, C.M. Perou, C. Rees, P. Spellman, V. Iyer, S.S. Jeffrey, M.V. de Rijn, M. Waltham, A. Pergamenschikov, J.C. Lee, D. Lashkari, D. Shalon, T.G. Myers, J.N. Weinstein, D. Botstein, P.O. Brown, Systematic variation in gene expression patterns in human cancer cell lines, Nature Genetics 24 (2000) 227–35. [22] W. Rudnicki, M. Kursa, Feature selection with the boruta package, Journal of Statistical Software 36 (2010). [23] R. Ruiz, J. Riquelme, J. Aguilar-Ruiz, Incremental wrapper-based gene selection from microarray data for cancer classification, Pattern Recognition 39 (2006) 2383–2392. [24] D. Singh, P.G. Febbo, K. Ross, D.G. Jackson, J. Manola, C. Ladd, P. Tamayo, A.A. Renshaw, A.V. D’Amico, J.P. Richie, E.S. Lander, M. Loda, P.W. Kantoff, T.R. Golub, W.R. Sellers, Gene expression correlates of clinical prostate cancer behavior., Cancer Cell 1 (2002) 203–209. [25] R. Tibshirani, Regression shrinkage and selection via the lasso, Journal of the Royal Statistical Society. Series B (Methodological) (1996) 267– 288. [26] E. Tuv, A. Borisov, G. Runger, K. Torkkola, Feature selection with ensembles, artificial variables, and redundancy elimination, Journal of Machine Learning Research 10 (2009) 1341–1366. [27] R.D. Uriarte, S.A. de Andres, Gene selection and classification of microarray data using random forest, BMC Bioinformatics 7 (2006) 3+. [28] L.J. van ’t Veer, H. Dai, M.J. van de Vijver, Y.D. He, A.A.M. Hart, M. Mao, H.L. Peterse, K. van der Kooy, M.J. Marton, A.T. Witteveen, G.J. Schreiber, R.M. Kerkhoven, C. Roberts, P.S. Linsley, R. Bernards, S.H. Friend, Gene expression profiling predicts clinical outcome of breast cancer, Nature 415 (2002) 530–536. [29] L. Yu, H. Liu, Efficient feature selection via analysis of relevance and redundancy, Journal of Machine Learning Research 5 (2004) 1205–1224. [30] Z. Zhu, Y. Ong, M. Dash, Markov blanket-embedded genetic algorithm for gene selection, Pattern Recognition 40 (2007) 3236–3248. 21
5cs.CE
Smart Meter Privacy via the Trapdoor Channel Miguel Arrieta∗ and Iñaki Esnaola∗§ arXiv:1708.04429v1 [cs.IT] 15 Aug 2017 ∗ Dept. of Automatic Control and Systems Engineering, University of Sheffield, Sheffield S1 3JD, UK § Dept. of Electrical Engineering, Princeton University, Princeton, NJ 08544, USA {marrieta2, esnaola}@sheffield.ac.uk Abstract—A battery charging policy that provides privacy guarantees for smart meter systems with finite capacity battery is proposed. For this policy an upper bound on the information leakage rate is provided. The upper bound applies for general random processes modelling the energy consumption of the user. It is shown that the average energy consumption of the user determines the information leakage rate to the utility provider. The upper bound is shown to be tight by deriving the probability law of a random process achieving the bound. I. I NTRODUCTION The increasing appeal for economical and environmentallyfriendly energy calls for more efficient energy generation, distribution, and consumption [1]. The introduction of a digital infrastructure into the traditional power system takes steps towards this vision by providing a cyber layer that elevates the existing power system to a cyberphysical system. This advanced sensing and communication infrastructure envisioned by the smart grid enables high resolution and real time management of the processes within the grid. This application layer also enables dynamic energy pricing, shifting user demand to match energy generation [2]. Moreover, the introduction of energy consumption indicators through Smart Meters (SMs) are reported to reduce the energy consumption of the user by up to 15% by raising awareness of the energy cost [3]. While the high-resolution information provided by the smart grid brings clear advantages it also raises privacy and security concerns [4], [5], [6]. By analysing the consumption profile of a user, techniques such as non-intrusive load monitoring (NILM) [7] track and recognise appliance usage patterns [8], [9]. Human presence, usage of individual appliances [10], [11], and even tuned TV channel [12] are among the list of recognizable elements [13]. This privacy breach hinders the implementation of some of the essential components of the smart grid [4], [5]. Within this paradigm, SMs are central components to the dilemma posed by the need for accurate monitoring while providing privacy. In 2009 two bills law aimed to enforce the usage of SMs were blocked by the Senate of the Netherlands motivated by the privacy concerns that emerge as a result of the increased penetration of SMs [14]. There is a growing body of literature addressing the conflict between efficient energy monitoring and privacy brought forth by the introduction of SMs. In [15], [16] obfuscation of the knowledge that the utility provider (UP) has about the energy consumption of the user is studied. Indeed, in the case in which the SM readings are the only source of information available to the UP, obfuscation yields some degree of privacy. Obfuscation is achieved by several mechanisms, such as aggregating the consumption of multiple users [15], compression of the energy consumption sequences [16] or homomorphic encryption [17] among others. A different approach to the problem arises in the setting in which users have access to alternative energy sources or energy storage devices [18]. In this case, the UP has perfect knowledge of the energy provided to the user, but the user employs the energy storing capability of the system to dissociate the energy consumed by the appliances from the energy provided by the UP. In [19], [20], [21] the case in which the user is assumed to have an alternative energy source with instantaneous power constraints is studied. In [20], [22], [23], [24] the user is assumed to have access to a rechargeable battery and the energy consumption is modelled as an independent and identically distributed (i.i.d.) random process. In a practical setting, the energy consumption profiles of users exhibit non-stationary statistical structures and are not well described by memoryless random processes [23]. Moreover, information-theoretic privacy measures for random processes that are not i.i.d. are still not well understood [25]. The privacy utility tradeoff is characterized for stationary Gaussian energy consumption models in [26]. A first-order time-homogeneous Markov chain is considered in [27]. In this work we adopt a non-probabilistic framework by modelling the energy management system (EMS) with a finite capacity battery as a finite state channel without probabilistic structure. Inspired by the code construction in [28] we propose an energy charging policy and we characterize the privacy guarantees of the strategy for general random processes. We also particularize the analysis to the case in which the average energy consumption of the user is known. For this case we provide an upper bound to the amount of information that the user leaks to the UP and show that the average energy consumption governs the privacy that is achievable by the user. In this paper vectors are denoted by bold font, e.g. x, random variables are denoted by upper-case, e.g. X, and vectors of n random variables are denoted by super-indexing the size, e.g. X n . II. BATTERY S YSTEM M ODEL We consider the energy management system (EMS) operating in discrete-time illustrated in Fig. 1. The energy consumption of the user is modelled as a discrete-time random process X1 , X2 , . . . where Xi is a random variable taking values in X = {0, 1, . . . , α}. In this setting Xi describes the energy consumed at time instant i ∈ N. At each time instant, the energy consumption of the user is satisfied by requesting energy from the UP or by discharging the battery. This decision is taken by the energy management unit (EMU) at each time instant based on some power consumption performance and privacy criteria. The energy requested from the UP is also a discrete-time random process Y1 , Y2 , ... where Yi is a random variable taking values in Y = {0, 1, ..., γ} and describing the energy requested from the UP at time instant i ∈ N. Fig. 1. Fig. 2. [29] Diagram depicting the operation of a trapdoor channel with β = 1. Diagram of an Energy Management System with finite battery. When Yi > Xi , the excess energy is stored in the battery. Alternatively, when Yi ≤ Xi , the energy deficit is obtained from the battery. We assume the UP is able to satisfy the energy consumption of the user even in the case when there is no battery, i.e. γ ≥ α. In the above model, the state Si taking values in S = {0, 1, ..., β} describes the energy stored in the battery at time i. The energy stored in the battery Si is a function of the previous energy consumption X i , the energy request Y i , and the initial state s0 ∈ S given by Si = s0 + i−1 X (Yk − Xk ) . (1) k=0 Within this setting, a power outage occurs when Si + Yi − Xi < 0, and energy is wasted when Si + Yi − Xi > β. In the following we focus on EMUs that do not allow power outages nor energy wasting but provide a quantifiable privacy guarantee for the user. Given a particular realization x ∈ X n of the random process X1 , X2 , . . . , Xn modelling the energy consumption of the user up to time n, the set of energy requests that the EMU can implement is limited by the power outage and the energy waste constraints. The following definition describes the set of energy requests that the EMU can implement. Definition 1: Given an energy consumption sequence x ∈ X n as the input of an EMU with a battery of capacity β, the set of stable energy request sequences that avoid power outages and energy waste is given by Yβn (s0 , x) := {y ∈ Y n : si + yi − xi ∈ S for all i}, (2) where si ∈ Si is the state of the battery at time i, determined by x and y according to (1). The task of the EMU is therefore to choose a particular sequence in the Yβn (s0 , x) for a given power consumption realization x. The structure of the particular choice determines the policy implemented by the EMU and is captured by the following definition. Definition 2: Given an EMU with a battery of capacity β the set of stable battery policies is the set of mappings between the energy consumption sequences and the set of stable energy request sequences given by n Pβ := {Pβ : S × X → Yβn (s0 , x)}. (3) Since Y n is known by the UP, the information about the energy consumption of the user that the UP acquires via the energy request is given by the mutual information I(X n ; Y n ). As in [22] this motivates the following definition of privacy. Definition 3: Given an EMU operating with the stable battery policy Pβ , the information about the consumption of the user, X n , that is leaked to the UP is the information leakage rate given by 1 Lβ (X n , Pβ ) := I(X n ; Y n ). (4) n In a SM privacy context, the aim of the EMU is to choose a stable battery policy Pβ that minimizes the information leakage rate, i.e. maximizes the privacy of the user. Note that the information leakage depends on the joint probability distribution of X n and Y n . In general, the evaluation of (4) yields involved expressions that are difficult to evaluate [25]. For that reason previous results [19], [20], [22] tend to consider simple probabilistic models, e.g. memoryless processes, to evaluate the mutual information. In the remaining of the paper we analyze the privacy guarantees for general discrete-time random processes modelling the user consumption. To that end, we model the EMS with a battery of capacity β as a nonprobabilistic finite-state channel [28]. The rationale for this approach and the equivalence between the EMS and a nonprobabilistic channel are discussed in the following section. A. Equivalence with the trapdoor channel The trapdoor channel [28], [29] is defined as a box containing b0 blue balls and β − b0 red balls. The operation of the channel is depicted in Fig. 2. At time i a new ball Xi coloured blue or red is thrown into the box. Immediately after, one of the β + 1 balls inside the box is selected and taken out of the box. Let Yi denote the ball extracted at time i. Following this model, the number of blue balls inside the box at time i is given by bi = b0 + i−1 X bl (Xk ) − k=0 i−1 X bl (Yk ) , (5) k=0 where the indicator function bl(·) equals 1 when its argument is coloured blue and 0 otherwise. Similarly, the number of red balls inside the box at time i is given by ri = β −bi . Replacing bi = β − ri and b0 = β − r0 into (5) yields: ri = r0 + i−1 X k=0  bl (Yk ) − bl (Xk ) . (6) The number of red balls inside the box is bounded between 0 and β. For a box of capacity β the set of stable output balls Yβn (r0 , x) is defined as the set of outputs yn ∈ Y n than can be pulled out of the box given an initial state r0 and an input sequence x ∈ X n , i.e. Yβn (r0 , x) = {y : ri + bl (yi ) − bl (xi ) ∈ R for all i}, (7) where R = {0, ..., β}. It is easy to see that for the case in which γ = α = 1 the EMS with a battery of capacity β described in Section II is equivalent to the trapdoor channel of capacity β. The set of balls inside the box determines the state of the trapdoor channel, and similarly, the amount of energy stored in the battery determines the state of the EMS channel. For the case in which α = γ = 1 both systems are equivalent since requesting energy from the grid corresponds to extracting a ball from the trapdoor channel. Similarly, replacing a ball from the trapdoor channel in (6) corresponds to charging the battery of the EMS in (1). III. In this section, we provide bounds on the information leakage rate when no restrictions are imposed on the probability law of X n . We first propose the construction of a stable battery policy Pβ∗ and characterize an upper bound on the information leakage rate Lβ induced by Pβ∗ and any arbitrary random process X n . Furthermore, we show the tightness of the upper bound by constructing a random process X̂ whose leakage is tight with respect to the upper bound. Moreover, the leakage rate induced by the random process X̂ is shown to be independent of the employed battery policy Pβ ∈ Pβ . This shows that the upper bound is tight with respect to the minimum information leakage rate a stable battery policy Pβ can guarantee for general random processes X n . The approach to policy construction in this section is similar to the code construction in [28] where a trapdoor channel with a box of size β̂ is considered. Therein, at every time instant a ball numbered 1, 2, ..., α̂ is introduced into the box and one of the β̂ + 1 inside the box is extracted. In [28, Section II] the case in which the box acts as a jammer trying to obstruct the communication process between a sender inserting the balls into the box and a receiver drawing the output balls is studied. Therein, the ball extracted from the box is selected in order to minimize the mutual information between the input and the output. Note that the extraction criteria is not probabilistic and is instead analyzed using combinatorial tools. Remarkably, in [28, Proposition 1] it is shown that the Shannon capacity Cβ̂ of such channels is lower bounded by log α̂ β̂ + 1 . (8) Moreover, when α̂ = 2 the capacity is upper bounded by Cβ ≤ 1 β̂ + 1 . A. Upper bound on the information leakage rate We propose a battery policy based on the code construction in [28]. The codebook proposed in the trapdoor channel context is the counterpart of the battery policy in the smart meter case. The proposed policy structures the energy request sequences according to the output alphabet defined below. Definition 4: Consider the set of codewords of length l constructed by repetitions of 0 or α symbols, i.e. Ol = {(0, 0, · · · , 0), (α, α, · · · , α)}. For n = lm, we define the block repetition alphabet as the set Olm of sequences obtained by the m-fold concatenation of codewords of length l. Specifically Olm = Ol × Ol × ... × Ol . (10) We now define a stable policy that maps the energy consumption of the user to the output sequences constructed with the block repetition alphabet Olm . P RIVACY W ITH A N A RBITRARY E NERGY C ONSUMPTION Cβ ≥ the battery. However, the output is not required to contain the same symbols as the input . For that reason, the approach in [28] requires some modification but the main idea remains. The derivation is presented in the next section. (9) In [28] the output is constrained to permutations of the input sequence. In our setting, the sum of the output sequence is bounded by the sum of the input sequence and the size of Definition 5: A block battery policy Pβ∗ is a mapping of the form Pβ∗ : S × X n → Olm ∩ Yβl (s0 , x) . (11) Note that a block battery policy is nothing more than a strategy to assign to each input sequence a stable energy request sequence constructed with a block repetition alphabet. With these definitions at hand we now provide the following privacy guarantee. Theorem 1: Consider an EMS with a battery of capacity β and initial state s0 ∈ S . Let X n be a random process with Xi taking values in X = {0, 1, ..., α} for i = 1, 2, . . . n and Pβ∗ a block battery policy as described in Definition 5. Then for l ≤ b(β + 1)/αc at least one policy Pβ∗ exists such that  Lβ X n , Pβ∗ ≤ 1 . b(β + 1)/αc (12) Proof: Notice that the information leakage rate is upper bounded by  1 1 Lβ X n , Pβ∗ = I (X n ; Y n ) ≤ H (Y n ) . (13) n n Since Y n takes values in Olm and |Olm | = 2m the following holds: 1 1 m 1 1 H (Y n ) ≤ log |Olm | = log (2m ) = = . (14) n n n n l We now show that when l ≤ (β + 1)/α there exists at least one block battery policy Pβ∗ for every initial state s0 and consumption x. To prove this we establish that for every realization x and initial state s0 there exist an energy request sequence determined by y ∈ Olm such that y belongs to the set of stable energy requests Yβn (s0 , x). The strategy is to notice that Olm ∩ Yβn (s0 , x) 6= ∅ for m = 1 and to then prove by induction that the non-emptiness of the intersection holds for m ≥ 1. Theorem 2: Consider an EMS with a battery of capacity β and initial state s0 . Let X̂ n be a random process taking uniformly distributed values in Olm with l = d(β + 1)/αe. Let Pβ be a stable battery policy. Then   1 Lβ X̂ n , Pβ = . (19) d(β + 1)/αe Upper bound given by Theorem 1 ^ n given by Theorem 2 Information leakage rate for X Information leakage rate - L- 0.6 0.5 0.4 Proof: We expand Lβ as 0.3 0.2 0.1 5 10 15 20 25 Normalized batery size - -=, Fig. 3. Upper bound on the information leakage rate of an EMS as a function of the ratio between the battery size and the peak power consumption. The intersection {(0, 0, · · · , 0), (α, α, · · · , α)} ∩ Yβl s0 , X l is non-empty if and only if either the sequence (0, 0, · · · , 0) or (α, α, · · · , α) belong to Yβn (s0 , x). Jointly with (2) this implies that either si + 0 − xi ∈ S (15) si + α − xi ∈ S (16) or holds for i ≤ l. In the first case, described in (15), we have that 0 − xi ≤ 0 for i = 0, · · · , l − 1. Hence, the energy stored in the battery, si , decreases monotonically. Therefore, all si belong to S when si ≥ 0 on the last time step, i.e., 0 ≤ s0 − l−1 X xi . (17) i=0 Similarly, in the case described by (16), we have that α −xi ≥ 0 and the energy stored increases monotonically. It is then sufficient to show that s0 − l−1 X 1 1 1 I (X n ; Y n ) = H (X n ) − H (X n |Y n ) . (20) n n n When X n is uniformly distributed over the alphabet Olm it yields 1 1 1 H (X n ) = m = . (21) n n l We now show that the equivocation rate n1 H (X n |Y n ) is 0 when X n takes values in Olm with l > β/α. We prove by induction that when the input realization x belongs to Olm with l > β/α, the sets Yβn (s0 , x) of stable output words generated by different consumption sequences are disjoint, i.e. Yβn (s0 , x̂) ∩ Yβn (s0 , x) = ∅ for x̂ 6= x. (22) As a result, any request sequence y ∈ Yβn (s0 , x) unequivocally determines the generating input x. In other words, given an output sequence y there is no uncertainty about the input x, and therefore, the equivocation rate n1 H (X n |Y n ) is 0. For m = 1 there are two possible inputs (0, 0, · · · , 0) and (α, α, · · · , α). When x = (0, 0, · · · , 0) ∈ Ol1 the energy stored in the battery at time l is given by sl = s0 + l−1 X (yi − 0) . (23) i=0 Similarly, when x = (α, α, · · · , α) ∈ X l the energy stored in the battery at time l is given by zl = s0 + l−1 X (yi − α) . (24) i=0 xi ≤ β − αl. (18) Taking the difference between (23) and (24) yields: i=0 When β − αl ≥ −1 every integer si satisfies at least one of the inequalities given by (17) and (18). This ensures that either (17) or (18) hold for every s0 ∈ S and x ∈ X l , and therefore, the intersection Olm ∩ Yβn (s0 , x) is non-empty. This completes the proof for m = 1. The induction for m ≥ 1 is straightforward as the proof for m = 1 holds for every initial state s0 . The upper bound derived in Theorem 1 is depicted for different battery sizes in Fig. 3. It is interesting to note that the privacy guarantees increase significantly for small values of β/α but the benefit vanishes as the size of the battery increases. B. Tightness of the upper bound We now study the tightness of the upper bound presented in Theorem 1. To this end, we construct a random process modelling the energy consumption of the user that is tight with respect to the result in Theorem 1 for every battery policy Pβ ∈ P β . sl − zl = l−1 X α = lα. (25) i=0 When zl ∈ S we have that sl = zl + lα ≥ lα, showing that for lα > β the events zl ∈ S and sl ∈ S do not occur simultaneously. This implies that the set of output words belonging to Yβn (s0 , (0, 0, · · · , 0)) and Yβn (s0 , (α, α, · · · , α)) is empty for every initial state s0 . Therefore the sets are disjoint and n1 H (X n |Y n ) = 0. The proof for m > 1 follows by induction and noticing that the proof above is valid for every initial state s0 . IV. P RIVACY W ITH A N AVERAGE E NERGY C ONSTRAINT The information leakage rate bounds provided in Section III do not impose any moment restriction on the random process modeling the energy consumption of the user. Indeed, they depend only on the range of the energy consumption and on the size of the battery. However, one of the most widely used energy consumption metrics is the average energy Information leakage rate - L- 0.6 0.5 0.4 0.3 0.2 7/, = 0.50 7/, = 0.25 7/, = 0.10 7/, = 0.05 7/, = 0.02 7/, = 0.01 0.6 Information leakage rate - L- -/, = 1 -/, = 2 -/, = 4 -/, = 8 -/, = 16 0.5 0.4 0.3 0.2 0.1 0.1 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 5 Normalized average energy consumption - 7=, 10 15 20 Normalized batery size - -=, Fig. 4. Upper bound on the information leakage rate of an EMS when n → ∞ as a function of the average energy consumption of the user for different values of the ratio between the battery size and the peak power consumption. Fig. 5. Upper bound on the information leakage rate of an EMS when n → ∞ as a function of the ratio between the battery size and the peak power consumption for different values of the average energy consumption of the user consumption over an arbitrary time interval. In fact, it is common for SMs to display this information to the user. In the following, we particularize the results in Theorem 1 and Theorem 2 to the case in which the average energy consumption of the user is specified. Specifically, we analyze the impact of the average energy consumption on the privacy performance. We define the average energy consumption of the random process X n as " n−1 # 1X Xi . (26) µn = E n i=0 where (28) follows by applying the chain rule and (29) follows from the fact that conditioning reduces entropy. Notice that (29) is the entropy of m sequences Y l taking values in Ol , and therefore, the entropy of Y n is upper bounded by  h Pn−1 i  E n1 i=0 Yi 1 1 , H (Y n ) ≤ H2  (30) n l α Note that since we do not impose any stationarity condition on the random process X n , the average energy consumption is a function of the time index n. This agrees with the nonstationary nature observed in energy consumption profiles of users [23]. A. Upper bound on the information leakage rate The following result provides an upper bound on the information leakage rate for random processes X n with average energy consumption µn . Theorem 3: Consider a battery system with capacity β and initial state s0 . Let X n be a random process with average energy consumption µn . Let Pβ∗ be a block battery policy, then for l ≥ b(β + 1)/αc at least one policy Pβ∗ exists such that      µ −β µ +β max H2 nα n , H2 nα n  Lβ X n , Pβ∗ ≤ , (27) b(β + 1)/αc where H2 (p) = −p log2 p − (1 − p) log2 (1 − p) denotes the binary entropy. Proof: The entropy of a random process Y n taking values in Olm is upper bounded by m−1  1 1X H(Y n ) = H Yil , . . . , Y(i+1)l−1 |Y0 , . . . , Yil−1 (28) n n i=0 m−1 ≤  1X H Yil , . . . , Y(i+1)l−1 , n i=0 (29) for the case in which each sequence Y l is independent and identically distributed, i.e. with distribution h P i n−1 1 E Y   i=0 i n P Y l = (α, α, . . . , α) = , (31) α and     P Y l = (0, 0, . . . , 0) = 1 − P Y l = (α, α, . . . , α) . (32) We now bound the average energy requested from the grid as a function of the average energy consumption of the user and the battery size. Dividing (1) by n and taking the expected value yields " n−1 # " n−1 #   1X 1X Sn − s0 E Yi = E Xi + E , (33) n i=0 n i=0 n or equivalently " n−1 # 1X β β Yi ≤ µn + . µn − ≤ E n n i=0 n (34) Notice now that for l ≤ (β + 1)/α, and for every initial state s0 ∈ S and input realization x ∈ X n there exists a sequence y ∈ Olm such that y belongs to the set of stable energy requests Yβn (s0 , x). This completes the proof. The upper bound on the information leakage rate when the average energy consumption of the user is known and n → ∞ is illustrated in Fig. 4 and Fig. 5. As expected, the binary entropy term in Theorem 3 introduces concavity in the upper bound as shown in Fig. 4. Interestingly, Fig. 5 shows that the information leakage rate reduction as the size of the battery increases is less significant for extreme values of the average energy consumption. B. Tightness of the upper bound Proceeding in a similar fashion as in Section III we now prove that the upper bound in Theorem 3 is tight for a certain class of random processes modelling the energy consumption. Theorem 4: Consider a battery system with capacity β and initial state s0 . Let X̂ n be a random process with average energy consumption µn and taking values in Olm with l = d(β + 1)/αe. Let Pβ be a stable battery policy, then   µ  1 n Lβ X̂ n , Pβ = . (35) H2 d(β + 1)/αe α Proof: Borrowing from (30) the entropy rate of the random process X n taking values in Olm is upper bounded by  h Pn−1 i  E n1 i=0 Xi 1 1 n ,  (36) H (X ) ≤ H2 n l α with equality when the X l symbols forming X n are i.i.d. We now recall that when X n takes values in Olm with l > β/α the input xn can be uniquely determined from the output sequence yn and H (X n |Y n ) = 0. We conclude the proof by selecting l = d(β + 1)/αe. V. C ONCLUSION We have studied the information leakage rate of EMSs with finite battery capacity for general random processes modelling the energy consumption of the user. Inspired by the results on permuting channels we have proposed a battery charging policy with bounded information leakage rate for arbitrary random processes. We have particularized the analysis to the case in which the average energy consumption of the user is known and we have concluded that extreme values of the average energy consumption provide lower values of information leakage to the utility provider. [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] R EFERENCES [1] [2] [3] [4] [5] [6] [7] [8] A. Ipakchi and F. Albuyeh, “Grid of the future,” IEEE Power Energy Mag., vol. 7, no. 2, pp. 52–62, Mar. 2009. R. Hartway, S. Price, and C.K. Woo, “Smart meter, customer choice and profitable time-of-use rate option,” Energy, vol. 24, no. 10, pp. 895–903, Oct. 1999. G. Wood and M. Newborough, “Dynamic energy-consumption indicators for domestic appliances: environment, behaviour and design,” Energy and Buildings, vol. 35, no. 8, pp. 821–841, 2003. E. L. Quinn, “Privacy and the new energy infrastructure,” Available at SSRN 1370731, 2008. P. McDaniel and S. McLaughlin, “Security and privacy challenges in the smart grid,” IEEE Security Privacy, vol. 7, no. 3, pp. 75–77, May 2009. I. Rouf, H. Mustafa, M. Xu, W. Xu, R. Miller, and M. Gruteser, “Neighborhood watch: Security and privacy analysis of automatic meter reading systems,” in Proc. Conf. Computer and Commun. Security, New York, NY, USA, 2012. G. W. Hart, “Nonintrusive appliance load monitoring,” Proc. IEEE, vol. 80, no. 12, Dec. 1992. E. McKenna, I. Richardson, and M. Thomson, “Smart meter data: Balancing consumer privacy concerns with legitimate applications,” Energy Policy, vol. 41, no. C, pp. 807–814, 2012. [23] [24] [25] [26] [27] [28] [29] A. Molina-Markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, “Private memoirs of a smart meter,” in Proc. Workshop Embedded Sensing Systems Energy-Efficiency Building, New York, NY, USA, 2010. M. Enev, S. Gupta, T. Kohno, and S. N. Patel, “Televisions, video privacy, and powerline electromagnetic interference,” in Proc. Conf. Computer Commun. Security, New York, NY, USA, 2011. A. Prudenzi, “A neuron nets based procedure for identifying domestic appliances pattern-of-use from energy recordings at meter panel,” in IEEE Power Engineering Society Winter Meeting, 2002. U. Greveler, B. Justus, and D. Loehr, “Forensic content detection through power consumption,” in Proc. IEEE Int. Conf. Commun., Ottawa, ON, Canada, Jun. 2012. H. Y. Lam, G. S. K. Fung, and W. K. Lee, “A novel method to construct taxonomy electrical appliances based on load signaturesof,” IEEE Trans. Consum. Electron., vol. 53, no. 2, pp. 653–660, May 2007. C. Cuijpers and B. Koops, Smart Metering and Privacy in Europe: Lessons from the Dutch Case, pp. 269–293, Springer Netherlands, 2012. A. Bartoli, J. Hernandez-Serrano, M. Soriano, M. Dohler, A. Kountouris, and D. Barthel, “Secure lossless aggregation over fading and shadowing channels for smart grid m2m networks,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 844–864, Dec. 2011. S. R. Rajagopalan, L. Sankar, S. Mohajer, and H. V. Poor, “Smart meter privacy: A utility-privacy framework,” in Proc. IEEE Int. Conf. Smart Grid Commun., Brussels, Belgium, Oct. 2011. F. Li, B. Luo, and P. Liu, “Secure information aggregation for smart grids using homomorphic encryption,” in Proc. IEEE Int. Conf. Smart Grid Commun., Oct. 2010. L. Zhu, Z. Zhang, Z. Qin, J. Weng, and K. Ren, “Privacy protection using a rechargeable battery for energy consumption in smart grids,” IEEE Trans. Network, vol. 31, no. 1, pp. 59–63, Jan. 2017. J. Gomez-Vilardebo and D. Gündüz, “Privacy of smart meter systems with an alternative energy source,” in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jul. 2013. O. Tan, D. Gündüz, and H. V. Poor, “Smart meter privacy in the presence of energy harvesting and storage devices,” in Proc. IEEE Int. Conf. Smart Grid Commun., Tainan, Taiwan, Nov. 2012. Z. Li and T. J. Oechtering, “Privacy on hypothesis testing in smart grids,” in Proc. IEEE Inf. Theory Workshop, Jeju, South Korea, Oct. 2015. D. Varodayan and A. Khisti, “Smart meter privacy using a rechargeable battery: Minimizing the rate of information leakage,” in Proc. IEEE Int. Conf. Acoust. Speech Sig. Proc., Prague, Czech Republic, May 2011. G. Kalogridis, C. Efthymiou, S. Z. Denic, T. A. Lewis, and R. Cepeda, “Privacy for smart meters: Towards undetectable appliance load signatures,” in Proc. IEEE Int. Conf. Smart Grid Commun., Gaithersburg, MD, USA, Oct. 2010. G. Kalogridis, R. Cepeda, S. Z. Denic, T. Lewis, and C. Efthymiou, “Elecprivacy: Evaluating the privacy protection of electricity management algorithms,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 750–758, Dec. 2011. I. Esnaola, A. M. Tulino, and H. V. Poor, “A statistical physics approach to the wiretap channel,” in Proc. IEEE Int. Symp. Inf. Theory, Istanbul, Turkey, Jul. 2013. L. Sankar, S. Raj Rajagopalan, S. Mohajer, and H. V. Poor, “Smart meter privacy: A theoretical framework,” IEEE Trans. Smart Grid, vol. 4, no. 2, pp. 837–846, Jun. 2013. G. Giaconi and D. Gündüz, “Smart meter privacy with renewable energy and a finite capacity battery,” in Proc. IEEE Int. Workshop Sig. Process. Advances Wireless Commun., Edinburgh, UK, Jul. 2016. R. Ahlswede and A. Kaspi, “Optimal coding strategies for certain permuting channels,” IEEE Trans. Inf. Theory, vol. 33, no. 3, pp. 310– 314, May 1987. R. B. Ash, Information Theory, Dover Publications Inc., New York, 1990.
7cs.IT
Where to Focus: Deep Attention-based Spatially Recurrent Bilinear Networks for Fine-Grained Visual Recognition Lin Wu‡ , Yang Wang† The University of Queensland, Australia † The University of New South Wales, Kensington, Sydney, Australia [email protected]; [email protected] arXiv:1709.05769v1 [cs.CV] 18 Sep 2017 ‡ Abstract Fine-grained visual recognition typically depends on modeling subtle difference from object parts. However, these parts often exhibit dramatic visual variations such as occlusions, viewpoints, and spatial transformations, making it hard to detect. In this paper, we present a novel attention-based model to automatically, selectively and accurately focus on critical object regions with higher importance against appearance variations. Given an image, two different Convolutional Neural Networks (CNNs) are constructed, where the outputs of two CNNs are correlated through bilinear pooling to simultaneously focus on discriminative regions and extract relevant features. To capture spatial distributions among the local regions with visual attention, soft attention based spatial LongShort Term Memory units (LSTMs) are incorporated to realize spatially recurrent yet visually selective over local input patterns. All the above intuitions equip our network with the following novel model: two-stream CNN layers, bilinear pooling layer, spatial recurrent layer with location attention are jointly trained via an end-to-end fashion to serve as the part detector and feature extractor, whereby relevant features are localized and extracted attentively. We show the significance of our network against two well-known visual recognition tasks: fine-grained image classification and person re-identification. 1 Introduction Fine-grained recognition such as identifying the species of birds, models of aircrafts, identities of persons, is a challenging task since the realistic images between categories often have subtle visual difference, and easily overwhelmed by nuisance factors such as the poses, viewpoints or illuminations. Unlike general object recognition, fine-grained scenario can be improved by learning critical regions of the objects, to discriminate different subclasses meanwhile align the objects from the same class [Huang et al., 2016a; Lin et al., 2015a; Zhang et al., 2016; Wei et al., 2016]. lstm Input image Two-stream convolutional Spatially lstm with attention softmax feature extraction + bilinear pooling over the image Figure 1: The attention model with spatially recurrent bilinear features. The two-stream CNNs detect and extract features of regions, and spatially LSTMs focus selectively on distinct parts with visual attention. The white regions show what the mode is attending to and the brightness indicates the strength of focus. Best view in color. 1.1 Motivations The great efforts have been paid for fine-grained recognition. Motivated by the advances in training deep neural networks, the recent typical work [Lin et al., 2015b; Wang et al., 2017a; 2015b; Ustinova et al., 2015] has largely improved that by utilizing a principled bilinear CNNs to localize discriminative regions and model the appearances conditioned on them. Specifically, the feature extraction is performed based on the convolutional layers from two different CNN streams whose outputs are multiplied using outer product on each region (a.k.a bilinear pooling), on which sum-pooling over all regions is performed to derive global image descriptor. The resulting orderless features are normalized, and fed into the softmax layer for classification. However, such spatial relationship is disposed in bilinear combination. Essentially, convolutional layers are using sliding filters, and their outputs, known as feature maps, which involve not only the strength of the responses, but also their spatial positions. This indicates that the matching of visual objects should follow its spatial constraints. For instance, the region containing the head of a bird should be compared with head region rather than feet. For fine-grained recognition, humans often abstract discriminative features of these objects and then compare the similarity among them to find the specific one, which can be repeated many times with relative spatial distributions (e.g.,multiple glimpses of each person on his/her hair, jacket, and pants). As indicated [Rensink, 2000], one of the most curious facets of the human visual system is “attention”. Rather than compress an entire image into static representation, “attention” enables salient features to dynamically come to the forefront as needed. This is especially important when there are a lot of clutters in an image, and also in the case of visually similar objects that are difficult to be distinguished. 1.2 Our approach Inspired by the observations above, we propose a soft attention model with spatial recurrence for fine-grained visual recognition, and show how our model dynamically pools convolutional features. Specifically, we propose a flexible solution by simulating the process of human visual system and learning an end-to-end model from raw images to recurrently localize discriminative parts of visual objects in spatial manipulations. The network is designed to nontrivially combine the strengths of bilinear CNNs and multi-dimensional recurrent neural networks (MDRNNs) [Graves et al., 2007] to produce spatially expressive representations of feature interactions on critical object regions. Hence, the learned deep features help discriminate different subclasses (see Fig.1). To this end, we implement a spatial variant of MDRNNs with long-short term memory units [Graves and Schimidhuber, 2009], i.e.,spatial LSTMs, which naturally render bilinear pooled features spatially-context aware due to its capacity to capture long-range correlations. These recurrent connections are dynamically pooled via our soft attention mechanism to create flexible internal representations on focused object regions, yet robust to localized distortions along any combination of the input dimensions. Contributions The major contributions are three-fold: (1) We present a novel deep spatially recurrent model with visual attention. The proposed method is based on spatial LSTMs that benefits the bilinear features with spatial manipulations to focus on the most relevant regions but also to render those regions robust against potential transformations and local distortions; (2) We delivered an interesting intuitions on our network from visualizing “where” and “what”, the attention focused on through stochastic back-propagation of classification errors in an end-to-end fashion; (3) We show that using these features for visual recognition delivers better results compared with spatial pyramid pooling [He et al., 2014]. Our model is a powerful mechanism to learn to attend at the right regions to extract relevant information for recognition, which outperforms the state-of-the-arts throughout the typical visual recognition tasks. 2 2.1 Related work Fine-grained visual object recognition A number of effective fine-grained recognition methods have been developed in the literature [Branson et al., 2014; Huang et al., 2016a; Lin et al., 2015a; Zhang et al., 2016; Wu et al., 2017c; Wu and Wang, 2017b; Wu et al., 2016b; 2016a; 2017a; 2017b; Wei et al., 2016; Lin et al., 2015b; Jaderberg et al., 2015; Zhang et al., 2014]. One pipeline is to align the objects to eliminate pose variations and the influence of camera positions, e.g.,[Branson et al., 2014; Lin et al., 2015a]. Considering that the subtle difference between fine-grained images mostly resides in the unique properties of object parts, some approaches based on partbased representations [Zhang et al., 2014; Lin et al., 2015a; Azizpour and Laptev, 2012] use both bounding boxes of the body and part annotations during training to learn an accurate part localization model. The most related work to us are bilinear CNNs (B-CNNs) [Lin et al., 2015b] and spatial transformer network [Jaderberg et al., 2015]. B-CNNs introduce bilinear pooling upon the outputs of two different CNN streams in order to separate part detector and feature extractor. Nonetheless, the resulting bilinear features are orderless in which spatial relationship is disposed. In [Jaderberg et al., 2015], a module of spatial transformation is embedded into CNNs such that features from CNNs are invariant against a variety of spatial transformations. However, the region detection and feature extraction are not fully studied. By contrast, we enhance bilinear CNNs with visual attention in spatial recurrence which inherits the advantage of bilinear models and learns features not only robust against potential spatial transformations but also useful in salient region modeling. 2.2 Long-short term memory with attention Attention models add a dimension of interoperability by capturing where the model is focusing its attention when performing a particular task. For example, a recent work of Xu et al.[Xu et al., 2015] used both soft attention and hard attention mechanism to generate image descriptions. Their model actually looks at the respective objects when generating their description. Building upon this work, Sharma et al.[Sharma et al., 2016] developed recurrent soft attention based models for action recognition and analyzed where they focus their attention. However, that method is limited in learning representations in spatial constraints, which turn out to be crucial in visual recognition. In this paper, we propose recurrent attention model to generate location dependent features by learning to attend on spatial regions. To our best knowledge, our work is the first of realizing attention mechanism to finegrained visual recognition. 3 Deep spatially recurrent bilinear model with visual attention The attention model can be presented in a quadruple M = ([gA , gB ], B, S, C), where gA and gB are feature functions, B is bilinear pooling, S is a spatial recurrent function with LSTM units, and C is a classification function. In our architecture, each image is first processed by two separate CNNs (gA and gB ) to produce features at particular part locations. Then a bilinear pooling B allows pairwise correlations between feature channels and part detectors. After that, spatial LSTMs are used to model the spatial distribution of images with visual attention and produce hidden states as feature representation that can be fed into classification function C. In the following sections, we will explain each of the components in greater details. 3.1 Convolutional features We consider two CNNs to extract features to produce features for bilinear pooling. Specifically, we use CNNs pretrained on the ImageNet dataset [Krizhevsky et al., 2012]: L 𝐼𝐼 = 𝐸𝐸𝐿𝐿 [𝐵𝐵] ∈ 𝑅𝑅 𝐾𝐾×𝐾𝐾×𝐷𝐷� K K B be retained. To model the distribution of locations, we employ spatial LSTM [Graves and Schimidhuber, 2009], which can be modified with location attention mechanism to achieve adaptive visual attention. For each location (i, j) on a twodimensional grid of I, the operations performed by spatial LSTM are given by � 𝐷𝐷 r l ii,j = σ(Wxi I<i,j + Whi hi,j−1 + Whi hi−1,j ) Figure 2: The soft attention mechanism. M-Net [Chatfield et al., 2014] and D-Net [Simonyan and Zisserman, 2015], truncated at the convolutional layer including non-linearities as feature functions. The architectures of the two CNNs are shown in Table 1. For notational simplicity, we refer to the complete CNNs as a function, conv5 = gA (I), conv50 = gB (I) for the two CNNs, that take an image I as input and produces activations of the last convolution (conv5/conv5 4 ) as output. 3.2 Bilinear pooling In CNNs, a feature function is defined as a mapping that takes an input image I at location L and outputs the feature of determined size D, that is, g : I × L → R1×D . Let gA ∈ Ra×a×DA and gB ∈ RK×K×DB denote the feature outputs from the last convolution, where K × K is the feature dimension, DA and DB denote respective feature channels. Feature outputs from the two feature extractors are combined at each location using the outer product, i.e.,bilinear pooling operation of gA and gB at a location l: B(l, I, gA , gB ) = gA (l, I)T gB (l, I). (1) Thus, the bilinear form B ∈ RK×K×D̂ (D̂ = DA DB ) allows the outputs of two feature streams to be conditioned on each other by considering all their pairwise interactions. Specifically, in our architecture, the outer product of the deep features from two CNN streams are calculated for each spatial location, resulting in the quadratic number of feature maps. Our intention here is to fuse two networks such that channel responses at the same position are put in correspondence. To motivate this, consider the case of recognizing a bird, if a filter in a CNN has responses to textures of some spatial location (head or wing), and the other network can recognize the location, and their combination then discriminates this bird species. To sequentially focus on different parts of the visual object and extract relevant information, bilinear features are filtered by location-dependent importance, which takes the expectation of the whole 2-D features, i.e.,I = EL [B] where L is a location matrix over K × K locations, which encodes the strength of focus (defined in Eq. (3)). 3.3 Spatial LSTM with soft attention mechanism The resulting bilinear features only allow feature interaction at every location on the spatial grid of last convolution outputs. The statistical correlations among grids should be captured in order to make the model flexible in local feature displacement and robust to potential spatial transformations. Meanwhile, different parts of an object should be assigned different weights from which more relevant informations can l l l fi,j = σ(Wxf I<i,j + Whf hi−1,j ) r r r fi,j = σ(Wxf I<i,j + Whf hi,j−1 ) l r oi,j = σ(Wxo I<i,j + Who hi−1,j + Who hi,j−1 ) gi,j = tanh(Wxc I<i,j + l Whc hi−1,j ci,j = gi,j ii,j + ci,j−1 hi,j = tanh(ci,j oi,j ) r fi,j + (2) r Whc hi,j−1 ) + ci−1,j l fi,j where σ is the sigmoid function, indicates an element-wise product. W are the weights connecting the layers of the neurons. Let Ii,j be the feature at location (i, j), and I<i,j designate the set of locations Im,n such at m < i or m = i and n < j. In our model, we limit I<i,j to a smaller neighborhood surrounding the specific location, referred to casual neighborhood. This is based on the assumption that each location is stationary to local displacement or shift invariance. Deterministic soft attention The feature cube of I is computed by multiplying location attention matrix over bilinear features B: I = EL [B]. This formulates a deterministic attention model by computing a soft attention weighted bilinear features. Specifically, the location attention is formulated into a location dependent matrix, L, which is a softmax over K × K locations. The location softmax is defined as follows, T exp(Uu,v hi,j ) , Pj T u=1 v=1 (Uu,v hi,j ) Lu,v = P (L = (u, v)|hi,j ) = Pi (3) where Uu,v are the weights mapping to the (u, v) element of the location softmax, and L is a random variable which can take 1-of-K 2 values. This softmax can be thought of as the probability with which our model deems the corresponding region in the input frame is important. After calculating these probabilities, the soft attention mechanism [Bahdanau et al., 2015; Xu et al., 2015] computes the expected values of the input by taking expectation over the feature slices at different regions (see Fig.2): I = EP (Lu,v |hi,j ) [Bi,j ] = j i X X Lu,v Bu,v . (4) u=1 v=1 where B is the bilinear pooled feature tube, and Bu,v is the (u, v) slice of the feature cube within the region Bi,j . This corresponds to feeding in a soft weighted feature cube into the system, and the whole model is smooth and differentiable under the deterministic attention. Thus, learning end-to-end is trivial by using standard back-propagation. 3.4 Loss function and attention penalty In the training of our model, we use cross-entropy loss coupled with the doubly stochastic penalty regularization [Xu et Table 1: CNN architectures. Each architecture contains 5 convolutional layers (conv 1-5). In M-Net, the details of each convolutional layer are given in three sub-rows: the first specifies the number of convolution filters and their receptive field size as “num × size × size”; the second indicates the convolution stride (“st.”) and spatial padding (“pad”); the third indicates if Local Response Normalisation (LRN) is applied, and the max-pooling downsampling factor. In D-Net, each convolutional layer has additional 1 × 1 convolution filters (e.g.,conv1 2 ), which can be seen as linear transformation of the input channels. The convolution stride is fixed to 1 pixel, and padding is 1 pixel for 3 × 3 convolution layers. Arch. conv1 96 × 7 × 7 st. 2, pad 0 LRN, ×2 pool conv2 256 × 5 × 5 st. 2, pad 1 LRN, ×2 pool conv1 1 (64 × 3 × 3) conv1 2 (64 × 1 × 1) × 2 pool conv2 1 (128 × 3 × 3) conv2 2 (128 × 1 × 1) × 2 pool M-Net D-Net conv3 512 × 3 × 3 st. 1, pad 1 conv3 1 (256 × 3 × 3) conv3 2 (256 × 1 × 1) conv3 3 (256 × 1 × 1) conv3 4 (256 × 1 × 1) conv4 512 × 3 × 3 st. 1, pad 1 conv4 1 (512 × 3 × 3) conv4 2 (512 × 1 × 1) conv4 3 (512 × 1 × 1) conv4 4 (512 × 1 × 1) conv5 512 × 3 × 3 st. 1, pad 1 conv5 1 (512 × 3 × 3) conv5 2 (512 × 1 × 1) conv5 3 (512 × 1 × 1) conv5 4 (512 × 1 × 1) al., 2015], which encourages the model to pay equal attention to every part of the image. We imposePan additional constraint over the location softmax, so that Lu,v ≈ τ where 2 τ ≥ K /D̂. Finally, the loss function is defined as follows: Loss = C X i=1 yi log ŷi + λ X XX 2 (τ − Lu,v )2 + γ Θi,j , (5) u,v i j where y is the one hot label vector, ŷ is the vector of class probabilities, which is computed via Eq.(6), C is the number of output classes, λ is the attention penalty coefficient, γ is the weight decay coefficient, and Θ represents all the model parameters. The computation of ŷ is ex·wj P (ŷ = j|x) = PC c=1 ex·wc (6) where x is the feature vector from the network, and P (ŷ = j|x) is to predict the probability for the j-th class given x over a combination of C linear functions. The gradients of classification, recurrent layer of LSTM units, bilinear layer, and two-stream CNNs with convolution, pooling, and nonlinear activations can be computed using the chain rule. We use the following initialization strategy [Xu et al., 2015] for the cell states, and hidden states of spatial LSTM for faster convergence: Figure 3: Examples from birds dataset (left), cars dataset (middle), aircraft dataset (right), and examples from person re-identification dataset: VIPeR (left), CUHK03 dataset (middle), and Market1501 (right). the property of the proposed method in localizing object parts and modeling the appearance conditioned on detected locations while being robust against a range of spatial transformations. Person re-identification shares much similar to finegrained categorizations where the matching process often resorts to the analysis of texture details and body parts to be localized. Also, the spatial distribution among distinguished parts is a helpful prior in recognizing identities. 4.1 Baselines The following baselines are used in our experiments: (1) CNN with fully-connected layers (FC-CNN): The input image is resized to 224 × 224 and mean-subtracted before prop! ! K K K K agating it through the CNN. For fine-tuning, we replace the 1 XX 1 XX Bu,v , h0 = finit,h Bu,v c0 = finit,c 1000-way classification layer trained on the ImageNet with K2 u v K2 u v a k-way softmax layer where k is the number of classes in (7) target dataset. The layer before the softmax layer is used to where finit,c and finit,h are two multi-layer perceptions and extract features. (2) Fisher vectors with CNN features (FVthese values are used to calculate the first location matrix L CNN): Following [Cimpoi et al., 2015], we construct a dewhich determines the initial input of I. Details about archiscriptor using FV pooling of CNN filter bank responses with tecture and hyper-parameters are given in Section 4.2. 64 GMM components. FV is computed on the output of the last convolution layer. Following [Lin et al., 2015b], the input 4 Experiments images are resized to 448 × 448 and pool features in a singleTo evaluate the effectiveness of the proposed method, we conscale. (3) Fisher vectors with SIFT features (FV-SIFT): It duct experiments by comparison to a variety of baselines and is implemented by using dense SIFT features over 14 dense state-of-the-arts on two applications: fine-grained image clasoverlapping 32 × 32 pixels regions with a step stride of 16 sification and person re-identification. pixels in both direction. The features are PCA projected before learning a GMM with 256 components. (4) Bilinear Why on fine-grained image categorization and person reCNN classification model (B-CNN) [Lin et al., 2015b]: This identification? Fine-grained recognition tasks refer to test method is to perform bilinear pooling on the output features Table 2: Fine-grained categorization results. We report perimage accuracy on three datasets: CUB-200-2011, without bounding-boxes on birds body part, aircrafts and cars. Method FV-SIFT FC-CNN [M] FC-CNN [D] FV-CNN [M] FV-CNN [D] B-CNN [D,M] B-CNN + SPP [D,M] Krause et al. Part-based R-CNN Pose-normalized CNN Spatial transformer Chai et al. Gosselin et al. Ours [D,M] Birds 18.8 58.8 70.4 64.1 74.7 84.1 86.9 82.0 73.9 75.7 84.1 89.7 Aircrafts 61.0 57.3 74.1 70.1 77.6 83.9 86.7 72.5 80.7 88.4 Cars 59.2 58.6 79.8 77.2 85.7 91.3 92.5 92.6 78.0 82.7 93.4 from two CNN streams. Then, orderless sum-pooling is employed to aggregate the bilinear features across the image. We use the model initialized with a D-Net and a M-Net (B-CNN [D,M]). The input images are resized to 448 × 448 and features are extracted using two networks before bilinear combination, sum-pooling and normalization. The D-Net produces output 28 × 28 while M-Net has 27 × 27. Thus, a downsampling is conducted by dropping a row and a column from D-Net outputs. (5) Bilinear CNN model with spatial pyramid pooling [He et al., 2014] (B-CNN+SPP): To have fair comparison, we perform a 2-level pyramid [He et al., 2014]: 2×2 and 1×1 subdivisions. (6) The proposed method: Identical to B-CNN, features are extracted using two CNNs with outputs from the last convolutional layer (conv5+relu for M-Net and conv54 +relu for D-Net), followed by bilinear pooling, spatial recurrence with visual attention, and flattening. 4.2 Implementations In all of our experiments, model architecture and hyperparameters are set using cross-validation. In particular, we train a 2-layer spatial LSTM model for all datasets, where the dimensionality of the hidden state and cell state are set to 512. The attention penalty coefficient λ is set to be 1, weight decay γ = 10−5 , and use dropout rate of 0.5 at all non-recurrent connections. In fact, the training of proposed model is finetuning the components of of pre-trained two CNNs, and spatial recurrence. To this end, we add a k-way softmax layer. We adopt the two-step training procedure [Branson et al., 2014] where we first train the last layer using logistic regression, followed by a fine-tuning the entire model using backpropagation for a number of epochs at a small learning rate (η = 0.001). Once the fine-tuning is done, training and validation sets are combined to train one-vs-all linear SVMs on the extracted features. In experiments, we employ two kinds of data augmentation: flipping and shifting. For flipping, we flip each sample horizontally to allow the model observe mirror images of the original images during training. For shifting, we shift each image by 5 pixels to the left, 5 pixels to the right, and then further shift it by 3 pixels to the top, and 3 pixels to the bottom. This procedure makes the model more robust to slight shifting of an object in an image. The shifting was done without padding the borders of the images. 4.3 Results on fine-grained image classification We conduct experiments on three fine-grained datasets: bird species [Wah et al., 2011], aircrafts [Maji et al., 2013], and cars [Krause et al., 2013]. Examples selected from the three datasets are shown in Fig.3. Birds species classification The CUB-200-2011 dataset [Wah et al., 2011] contains 11,788 images of 200 bird species. All methods are evaluated in a protocol where the object bounding-boxes are not provided in both training and testing phase. The comparison results without bounding boxes are shown in Table 2. We can see that FV-CNN[D] 74.7% and FV-CNN[M] 64.1% achieves better results than FC-CNN [D] 70.4% and FC-CNN [M] 58.8%. This is mainly because FV-CNN pools local features densely within the described regions, and therefore more apt at describing local patch textures. Our method achieves the best results compared with B-CNN and B-CNN+SPP in all corresponding variants. More recent results are reported by Krause et al.[Krause et al., 2015] where 82% accuracy is achieved by leveraging more accurate CNN models to train part detectors in a weakly supervised manner. Part based RCNN [Zhang et al., 2014] and pose-normalized CNN [Branson et al., 2014] also perform well on this dataset with accuracy of 73.9% and 75.7%, respectively. However, the two methods are performing a two-step procedure on part detection and CNN based classifier. A competing accuracy of 84.1% is achieved by spatial transformer networks [Jaderberg et al., 2015] while this method only models the spatial transformation locally. Aircraft classification The Fine-Grained Visual Classification of Aircraft (FGVCAircraft) dataset [Maji et al., 2013] consists of 10,000 images of 100 aircraft variants. The task involves discriminating variants such as Boeing 737-300 from Boeing 737-400, and thus the difference are very subtle, where sometimes one may be able to distinguish them by counting the number of windows in the model. In this dataset, airplanes tend to occupy a large portion of the whole image and appear in a relatively clear background. Comparison results are reported in Table 2, from which it can be seen that the results of trends are similar to those in birds dataset. It is notable that FV-SIFT performs remarkably better (61.0%) and outperforms FC-CNN [M] (57.3%). In comparison to state-of-the-art approaches, the two best performing methods [Gosselin et al., 2014] and [Chai et al., 2013] achieve 80.7% and 72.5%, respectively. Our method outperforms these approaches by a significant margin. It indicates that spatial pooling is vital to image categorization due to its robustness to local feature displacement. Car model classification The cars dataset [Krause et al., 2013] contains 16,185 images of 196 classes. The data is split into 8,144 training images and 8,041 testing images, where each class has been split roughly in a 50-50 split. Classes are typically at the level of Table 3: Rank-1, -5, -10, -20 recognition rate of different methods on the VIPeR, CUHK03 dataset, and mAP on Market1501. Method JointRe-id [Ahmed et al., 2015] SDALF [Farenzena et al., 2010] SalMatch [Zhao et al., 2013] PatchStructure [Shen et al., 2015] SCSP [Chen et al., 2016] LocalMetric [Huang et al., 2016b] FPNN [Li et al., 2014] Multi-region [Ustinova et al., 2015] Ours [D,M] R=1 34.80 19.87 30.16 34.80 53.54 42.30 56.11 VIPeR R = 5 R = 10 63.32 74.79 38.89 49.37 52.00 62.50 68.70 82.30 82.59 91.49 70.99 85.23 87.29 93.66 Make, Model, Year, e.g.,2012 Tesla Model S or 2012 BMW M3 coupe. Cars in the dataset are smaller and appear in a more cluttered background, and thus, challenging object and part localization. Once again the proposed method consistently outperforms all baselines with [D, D] model achieving 93.4% accuracy. Krause et al.[Krause et al., 2015] achieves 92.6%, and methods of [Gosselin et al., 2014] and [Chai et al., 2013] achieve 82.7% and 78.0%. Our spatial bilinear model has a clear advantage over these models by attentively selecting features from regions for matching. 4.4 Results on person re-identification We perform experiments on three benchmarks: VIPeR [Gray et al., 2007], and CUHK03 [Li et al., 2014]. The VIPeR data set contains 632 individuals taken from two cameras with arbitrary viewpoints and varying illumination conditions. The 632 person’s images are randomly divided into two equal halves, one for training and the other for testing. The CUHK03 data set includes 13,164 images of 1360 pedestrians. This dataset provides both manually labeled and detected pedestrian bounding boxes, and we report results on labeled data set. The dataset is randomly partitioned into training, validation, and test with 1160, 100, and 100 identities, respectively. The Market-1501 data set contains 32,643 fully annotated boxes of 1501 pedestrians, making it the largest person re-id dataset to date. Each identity is captured by at most six cameras. The dataset is randomly divided into training and testing sets, containing 750 and 751 identities, respectively. The evaluation metric we use is Cumulative Matching Characteristic (CMC). This evaluation is performed ten times, and the average results are reported. Comparison to state-of-the-art approaches Comparative experiments with state-of-the-art methods are conducted, and results are reported in Table 3. It can be seen that our approach outperforms all competitors consistently on the two benchmarks on rank-1 recognition accuracy. Compared with some approaches that consider pre-defined spatial distribution among body parts to improve matching such as SCSP [Chen et al., 2016], PatchStructure [Shen et al., 2015], SDALF [Farenzena et al., 2010], and SalMatch [Zhao et al., 2013], our model is more beneficial to person re-identification by jointly performing feature extraction and spatial manipulation. Compared with deep learning approaches with computation on local patch region difference i.e.,JointRe-id [Ahmed R = 20 82.45 65.73 75.60 91.80 96.65 94.25 96.97 R=1 54.74 5.60 20.65 63.87 65.23 CUHK03 R = 5 R = 10 86.42 91.50 23.45 36.09 51.32 68.74 89.25 94.33 90.95 95.73 R = 20 97.31 51.96 83.06 97.05 98.52 Market1501 R=1 mAP 20.53 8.20 51.90 26.35 45.58 54.67 34.33 Figure 4: Attending to distinct regions. Best view in color. et al., 2015], FPNN [Li et al., 2014], and LocalMetric [Huang et al., 2016b], our method learns features from critical parts, which helps discriminate different persons with subtle differences. Also, our method achieves performance gain over multi-region based bilinear models [Ustinova et al., 2015] which manually partition body parts on which bilinear features are computed, whereas the proposed network can localize distinct patches with spatial attention and select features automatically for matching. Learning to attend Visualizing the attention learned by the model allows us to interpret the output of the model. In this sense, our model is more flexible by attending salient regions. The input to two CNNs is resized to 448 × 448, and with five convolution with max pooling layers and bilinear pooling, we get an output dimension of 28 × 28. In order to visualize the attention weights for the soft model, we upsample the weights by a factor of 25 = 32 and apply a Gaussian filter emulate the large receptive field size. Fig. 4 shows the model learns alignments that agree very strongly with human intuition. 5 Conclusion In this paper, we present a deep recurrent soft attention based model for fine grained visual recognition and analyzed where they focus their attention. The proposed model tends to recognize important elements in visual objects that have subtle appearance difference, and thus achieve performance improvement. The impressive soft attention models are found to be computationally expensive since they require all the features to perform dynamic pooling. In future, we plan to explore some hard attention solution to sample locations over input image, as well as kernel approximation to bilinear features and multi-view features [Wang et al., 2015d; 2016b; Wu and Wang, 2017a; Wu et al., 2013b; 2015; 2013a; Wang et al., 2017b; Wang and Wu, 2017a; 2017b; Wang et al., 2016a; 2015a; 2014a; 2015c; 2014b; 2014c], which can reduce the computational cost of our model. References [Ahmed et al., 2015] Ejaz Ahmed, Michael Jones, and Tim K. Marks. An improved deep learning architecture for person reidentification. In CVPR, 2015. [Azizpour and Laptev, 2012] Hossein Azizpour and Ivan Laptev. Object detection using strongly-supervised deformable part models. In ECCV, 2012. [Bahdanau et al., 2015] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation by jointly learning to align and translate. In ICLR, 2015. [Branson et al., 2014] Steve Branson, Grant Van Horn, Serge Belongie, and Pietro Perona. Bird species categorization using pose normalized deep convolutional nets. In BMVC, 2014. [Chai et al., 2013] Yuning Chai, Victor Lempitsky, and Andrew Zisserman. Symbiotic segmentation and part localization for finegrained categorization. In ICCV, 2013. [Chatfield et al., 2014] Ken Chatfield, Karen Simonyan, Andrea Vedaldi, and Andrew Zisserman. Return of the devil in the details: Delving deep into convolutional nets. In BMVC, 2014. [Chen et al., 2016] Dapeng Chen, Zejian Yuan, Badong Chen, and Nanning Zhang. Similarity learning with spatial constraints for person re-identification. In CVPR, 2016. [Cimpoi et al., 2015] M. Cimpoi, S. Maji, and A. Vedaldi. Deep filter banks for texture recognition and description. In CVPR, 2015. [Farenzena et al., 2010] M. Farenzena, L. Bazzani, A. Perina, V. Murino, and M. Cristani. Person re-identification by symmetry-driven accumulation of local features. In CVPR, 2010. [Gosselin et al., 2014] P.-H. Gosselin, N. Murray, H. Jegou, and F. Perronnin. Revisiting the fisher vector for fine-grained classification. Pattern Recognition Letter, 49:92–98, 2014. [Graves and Schimidhuber, 2009] Alex Graves and Jurgen Schimidhuber. Offline handwriting recognition with multidimensional recurrent neural networks. In NIPS, 2009. [Graves et al., 2007] Alex Graves, Santiago Fernandez, and Jurgen Schimidhuber. Multidimensional recurrent neural networks. In International conference on artificial neural networks, 2007. [Gray et al., 2007] D. Gray, S. Brennan, and H. Tao. Evaluating appearance models for recognition, reacquisition, and tracking. In Proc. Int’l. Workshop on Perf. Eval. of Track. and Surv’l., 2007. [He et al., 2014] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Spatial pyramid pooling in deep convolutional networks for visual recognition. In ECCV, 2014. [Huang et al., 2016a] Shaoli Huang, Zhe Xu, Dacheng Tao, and Ya Zhang. Part-staced cnn for fine-grained visual categorization. In CVPR, 2016. [Huang et al., 2016b] Siyuan Huang, Jinwen Lu, Jie Zhou, and Anil K. Jain. Nonlinear local metric learning for person reidentification. In CVPR, 2016. [Jaderberg et al., 2015] Max Jaderberg, Karen Simonyan, Andrew Zisserman, and Koray Kavukcuoglu. Spatial transformer networks. In NIPS, 2015. [Krause et al., 2013] Jonathan Krause, Michael Stark, Jia Deng, and Li Fei-Fei. 3d object representations for fine-grained categorization. In 4th IEEE Workshop on 3D Representation and Recognition, at ICCV, 2013. [Krause et al., 2015] J. Krause, H. Jin, J. Yang, and L. Fei-Fei. Fine-grained recognition without part annotations. In CVPR, 2015. [Krizhevsky et al., 2012] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hinton. Imagenet classification with deep convolutional neural networks. In NIPS, 2012. [Li et al., 2014] Wei Li, Rui Zhao, Xiaoou Tang, and Xiaogang Wang. Deepreid: Deep filter pairing neural network for person re-identification. In CVPR, 2014. [Lin et al., 2015a] Di Lin, Xiaoyong Shen, Cewu Lu, and Jiaya Jia. Deep lac: Deep localization, alignment, and classification for fine-grained recognition. In CVPR, 2015. [Lin et al., 2015b] Tsung-Yu Lin, Aruni RoyChowdhury, and Subhransu Maji. Bilinear cnn models for fine-grained visual recognition. In ICCV, 2015. [Maji et al., 2013] Subhransu Maji, Esa Rahtu, Juho Kannala, Matthew Blaschko, and Andrea Vedaldi. Fine-grained visual classification of aircraft. In arXiv preprint arXiv:1306.5151, 2013. [Rensink, 2000] Ronald A Rensink. The dynamic representation of scences. VIsual cognition, 7(1-3):17–42, 2000. [Sharma et al., 2016] Shikhar Sharma, Ryan Kiros, and Ruslan Salakhutdinov. Action recognition using visual attention. In ICLR Workshop, 2016. [Shen et al., 2015] Yang Shen, Weiyao Lin, Junchi Yan, Mingliang Xu, Jianxin Wu, and Jingdong Wang. Person re-identification with correspondence structure learning. In ICCV, 2015. [Simonyan and Zisserman, 2015] Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. In ICLR, 2015. [Ustinova et al., 2015] Evgeniya Ustinova, Yaroslav Ganin, and Victor Lempitsky. Multiregion bilinear convolutional neural networks for person re-identification. In arXiv:1512.05300, 2015. [Wah et al., 2011] Catherine Wah, Steve Branson, Peter Welinder, Pietro Perona, and Serge Belongie. The caltech-ucsd birds-2002011 dataset. In Technical Report CNS-TR-2011-001, CalTech, 2011. [Wang and Wu, 2017a] Yang Wang and Lin Wu. Beyond lowrank representations: Orthogonal clustering basis reconstruction with optimized graph structure for multi-view spectral clustering. arXiv preprint arXiv:1708.02288, 2017. [Wang and Wu, 2017b] Yang Wang and Lin Wu. Multi-view spectral clustering via structured low-rank matrix factorization. arXiv preprint arXiv:1709.01212, 2017. [Wang et al., 2014a] Yang Wang, Xuemin Lin, Lin Wu, Wenjie Zhang, and Qing Zhang. Exploiting correlation consensus: Towards subspace clustering for multi-modal data. In ACM Multimedia, 2014. [Wang et al., 2014b] Yang Wang, Xuemin Lin, Qing Zhang, and Lin Wu. Shifting hypergraphs by probabilistic voting. In PAKDD, pages 234–246, 2014. [Wang et al., 2014c] Yang Wang, Jian Pei, Xuemin Lin, Qing Zhang, and Wenjie Zhang. An iterative fusion approach to graphbased semi-supervised learning from multiple views. In PAKDD, pages 162–173, 2014. [Wang et al., 2015a] Yang Wang, Xiaodi Huang, and Lin Wu. Clustering via geometric median shift over riemannian manifolds. Information Sciences, 220:292–305, 2015. [Wang et al., 2015b] Yang Wang, Xuemin Lin, Lin Wu, and Wenjie Zhang. Effective multi-query expansions: Robust landmark retrieval. In ACM Multimedia, pages 79–88, 2015. [Wang et al., 2015c] Yang Wang, Xuemin Lin, Lin Wu, Wenjie Zhang, and Qing Zhang. Lbmch: Learning bridging mapping for cross-modal hashing. In ACM SIGIR, 2015. [Wang et al., 2015d] Yang Wang, Xuemin Lin, Lin Wu, Wenjie Zhang, Qing Zhang, and Xiaodi Huang. Robust subspace clustering for multi-view data by exploiting correlation consensus. IEEE Trans. Image Processing, 24(11):3939–3949, 2015. [Wang et al., 2016a] Yang Wang, Xuemin Lin, Lin Wu, Qing Zhang, and Wenjie Zhang. Shifting multi-hypergraphs via collaborative probabilistic voting. Knowledge and Information Systems, 46(3):515–536, 2016. [Wang et al., 2016b] Yang Wang, Wenjie Zhang, Lin Wu, Xuemin Lin, Meng Fang, and Shirui Pan. Iterative views agreement: An iterative low-rank based structured optimization method to multiview spectral clustering. In IJCAI, 2016. [Wang et al., 2017a] Yang Wang, Xuemin Lin, Lin Wu, and Wenjie Zhang. Effective multi-query expansions: Collaborative deep networks for robust landmark retrieval. IEEE Trans. Image Processing, 26(3):1393–1404, 2017. [Wang et al., 2017b] Yang Wang, Wenjie Zhang, Lin Wu, Xuemin Lin, and Xiang Zhao. Unsupervised metric fusion over multiview data by graph random walk-based cross-view diffusion. IEEE Trans. Neural Networks and Learning Systems, 28(1):57– 70, 2017. [Wei et al., 2016] Xiushen Wei, Chenwei Xie, and Jianjin Wu. Mask-cnn: localizaing parts and selecting descriptors for finegrained image recognition. In arXiv: 1605.06878, 2016. [Wu and Wang, 2017a] Lin Wu and Yang Wang. Robust hashing for multi-view data: Jointly learning low-rank kernelized similarity consensus and hash functions. Image Vision Comput, 57:58– 66, 2017. [Wu and Wang, 2017b] Lin Wu and Yang Wang. Structured deep hashing with convolutional neural networks for fast person reidentification. arXiv:1702.04179, 2017. [Wu et al., 2013a] Lin Wu, Yang Wang, and John Shepherd. Efficient image and tag co-ranking: a bregman divergence optimization method. In ACM Multimedia, 2013. [Wu et al., 2013b] Lin Wu, Yang Wang, John Shepherd, and Xiang Zhao. Max-sum diversification on image ranking with nonuniform matroid constraints. Neurocomputing, 118:10–20, 2013. [Wu et al., 2015] Lin Wu, Xiaodi Huang, Chengyuan Zhang, John Shepherd, and Yang Wang. An efficient framework of bregman divergence optimization for co-ranking images and tags in a heterogeneous network. Multimedia Tools and Applications, 74(15):5635–5660, 2015. [Wu et al., 2016a] Lin Wu, Chunhua Shen, and Anton Van den Hengel. Personnet: Person re-identification with deep convolutional neural networks. arXiv:1601.07255, 2016. [Wu et al., 2016b] Lin Wu, Yang Wang, and Shirui Pan. Exploiting attribute correlations: A novel trace lasso-based weakly supervised dictionary learning method. IEEE Trans. Cybernetics, 2016. [Wu et al., 2017a] Lin Wu, Chunhua Shen, and Anton van den Hengel. Deep linear discriminant analysis on fisher networks: A hybrid architecture for person re-identification. Pattern Recognition, 65:238–250, 2017. [Wu et al., 2017b] Lin Wu, Yang Wang, Junbin Gao, and Xue Li. Deep adaptive feature embedding with local sample distributions for person re-identification. Pattern Recognition, 2017. [Wu et al., 2017c] Lin Wu, Yang Wang, Xue Li, and Junbin Gao. What-and-where to match: Deep spatially multiplicative integration networks for person re-identification. arXiv:1707.07074, 2017. [Xu et al., 2015] Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron Courville, Ruslan Salakhutdinov, Richard Zemel, and Yoshua Bengio. Show, attend and tell: Neural image caption generation with visual attention. In ICML, 2015. [Zhang et al., 2014] Ning Zhang, Evan Shelhamer, Yang Gao, and Trevor Darrell. Part-based r-cnns for fine-grained category detection. In ECCV, 2014. [Zhang et al., 2016] Yu Zhang, Xiushen Wei, Jianxin Wu, Jianfei Cai, and Jiangbo Lu. Weakly supervised fine-grained categorization with part-based image representation. IEEE Transactions on Image Processing, 25(4):1713–1725, 2016. [Zhao et al., 2013] Rui Zhao, Wanli Ouyang, and Xiaogang Wang. Person re-identification by salience matching. In ICCV, 2013.
1cs.CV
1 arXiv:1605.06696v1 [math.AC] 21 May 2016 ON THE STRAIGHTENING LAW FOR MINORS OF A MATRIX RICHARD G. SWAN In memory of Gian Carlo Rota Abstract. We give a simple new proof for the straightening law of Doubilet, Rota, and Stein using a generalization of the Laplace expansion of a determinant. 1. Introduction The straightening law was proved in [5] by Doubilet, Rota, and Stein generalizing earlier work of Hodge [6]. Since then a number of other proofs have been given [4, 2, 1]. The object of the present paper is to offer yet another proof of this result based on a generalization of the Laplace expansion of a determinant. This proof has the advantage (to some!) of not requiring any significant amount of combinatorics, Young diagrams, etc. On the other hand, for the same reason, it does not show the interesting relations between the straightening law and invariant theory but these are very well covered in the above references and in [3]. For completeness, I have also included a proof of the linear independence of the standard monomials. 2. Laplace Products Let X = (xij ) be an m × n matrix where 1 ≤ i ≤ m and 1 ≤ j ≤ n. If A ⊆ {1, . . . , m}, B ⊆ {1, . . . , n}, and A and B have the same number of elements we define X(A|B) to be the minor determinant of X with row indices in A and column indices in B. I will usually just write (A|B) for X(A|B) when it is clear what X is. I will write |A| for the number of elements in A. We set X(A|B) = 0 if |A| 6= |B|. e e P I will write A for the complement {1, . . . , m} − A and B for {1, . . . , n} − B. Also A will denote the sum of the elements of A. Definition 2.1. If m = n, we define the Laplace product X{A|B} to be X{A|B} = P P e B). e (−1) A+ B (A|B)(A| If X is understood, I will just write {A|B} for X{A|B}. This notation is, of course, for this paper only and is not recommended for general use. The terminology comes from the Laplace expansion X X {A|T } {S|B} = (1) det X = |T |=|A| |S|=|B| where A and B are fixed. The following lemma explains the sign in Definition 2.1. e×B e and let yij = 0 Lemma 2.2. Let yij = xij if (i, j) lies in A × B or in A otherwise. Then X{A|B} = det(yij ). 1 I would like to thank Darij Grinberg for many corrections to an earlier version of this paper 1 2 RICHARD G. SWAN Proof. Rearrange the rows and columns of Y = (yij ) so that those with indices in A and B lie in the upper left hand corner. The resulting matrix has determinant P P e B). e The sign of the permutation of rows and columns is (−1) A+ B by (A|B)(A| the next lemma.  Lemma 2.3. Let A = {a1 < · · · < ap } be a subset of {1, . . . , n} and let {c1 < · · · < cq } = {1, . . . , n} − A. Then the sign of the permutation taking {1, . . . , n} to P {a1 , . . . , ap , c1 , . . . , cq } is (−1) (ai −i) . Proof. Starting with {1, . . . , n} move a1 to position 1, then a2 to position 2, etc., each time keeping thePremaining elements in their given order. The number of transpositions used is (ai − i).  The Laplace expansion (1) gives us a non-trivial relation between the Laplace products of X. This suggests looking for more general relations of the form X ai {Si |Ti } = 0 (2) i with constant ai . Since {A|B} is multilinear in the rows of X it will suffice to check a relation (2) for the case in which the rows of X are all of the form 0, . . . , 0, 1, 0, . . . , 0. Since {A|B} is also multilinear in the columns of X, all terms of (2) will be 0 unless there is a 1 in each column. Therefore it will suffice to check a relation (2) for the case where X is a permutation matrix, X = P (σ −1 ) = (δσi,j ). To do this we first compute {A|B} for this X. Lemma 2.4. If X = (δσi,j ) is a permutation matrix P (σ −1 ) then {A|B} = sgn σ if σA = B and {A|B} = 0 otherwise. This is immediate from Lemma 2.2 and the fact that det X becomes 0 if any entry 1 is replaced by 0. P products (with conCorollary 2.5. A relation i ai {Si |Ti } = 0 between Laplace P stant ai ) holds if and only if for each σ in Sn we have ai = 0 over those i with σSi = Ti . Theorem 2.6. For given A and B we have X X {A|V } = {U |B}. V ⊆B U⊇A Proof. As above, it will suffice to check this when X is a permutation matrix, X = P (σ −1 ) = (δσi,j ). For this X the right hand side is sgn σ if σA ⊆ B and otherwise is 0. The same is true of the left hand side.  In particular, we recover the Laplace expansion (1) by setting A = ∅ or by setting B = {1, . . . , n}. We will show later that, for generic X, all linear relations between Laplace products are consequences of those in Theorem 2.6. Corollary 2.7. For given A, B, and for C ⊆ B we have X X (−1)|W | {U |B − W }. {A|V } = C⊆V ⊆B U⊇A W ⊆C STRAIGHTENING LAW Proof. By Theorem 2.6, the right hand side is X X X (−1)|W | {A|V } = W ⊆C V ⊆B−W X 3 (−1)|W | {A|V } V ⊆B W ⊆C−V which is equal to the left hand side since the inner sum is 0 unless C ⊆ V .  e here denotes the complement of A. Recall that A Corollary 2.8. For given A, B, X X f (−1)|W | {U |W } = {A|Ve }. V ⊆B U⊇A W ⊇B Proof. Set B = {1, . . . , n} in Corollary 2.7, getting X X f }. {A|V } = (−1)|W | {U |W V ⊇C U⊇A W ⊆C e Ve , W f where B is now the B given in Corollary 2.8. Replace C, V , W by B,  3. Straightening Laplace products If S = {s1 < · · · < sp } and T = {t1 < · · · < tq } are subsets of {1, · · · , n}, we define a partial ordering S ≤ T as in [3] to mean p ≥ q and sν ≤ tν for all ν ≤ q. Equivalently S ≤ T if and only if |S ∩ {1, · · · , r}| ≥ |T ∩ {1, · · · , r}| for all 1 ≤ r ≤ n. Note that S ⊇ T implies S ≤ T and S ⊃ T implies S < T . As above let Se be the complement {1, . . . , n} − S. For want of a better terminology, I will say that S is good if S ≤ Se and that S is bad otherwise. The following theorem is our straightening law for Laplace products. P Theorem 3.1. For any {A|B} we have {A|B} = ±{Ai |Bi } where Ai ≤ A, Bi ≤ B and Ai and Bi are good. Note that some of the (Ai , Bi ) may be equal. Proof. By induction on the set of pairs of subsets of {1, · · · , n} partially ordered by (A, B) ≤ (C,P D) if A ≤ C and B ≤ D, it is sufficient to prove that if A is bad, then {A|B} = P ±{Ai |Bi } with Ai < A and Bi ≤ B, and, similarly, if B is bad then {A|B} = ±{Ai |Bi } with Ai ≤ A and Bi < B. Each statement implies the other by transposing our matrix. Suppose first that |A| = |B| < n/2. Note both A and B are bad in this case. By Corollary 2.8 we have X ±{U |W } = 0. U⊇A W ⊇B since the other side in Corollary 2.8 is 0 because |A| < n/2 < |Ve |. One term of this sum is ±{A|B} while all other nonzero terms have the form ±{U |W } where U < A and W < B. In the remaining case |A| = |B| ≥ n/2 we use an argument similar to that of e = {j1 < · · · < jq }. Hodge [6]. Suppose B is bad. Let B = {i1 < · · · < ip } and let B Since B is bad and q ≤ p, we have iν > jν for some ν which we choose minimal. Let D = B ∪ {j1 , . . . , jν } and let C = {j1 < · · · < jν < iν < · · · < ip }. Apply 4 RICHARD G. SWAN Corollary 2.7 with D in place of B. The left hand side is 0 since |A| = p < |C| = p+1 so we get X (−1)|W | {U |D − W } = 0. U⊇A W ⊆C The term with U = A and W = {j1 , . . . , jν } is ±{A|B}. This is the only term of the form ±{U |B} since |U | = |B| and U ⊇ A. In the remaining terms we have U ≤ A since U ⊇ A. In these terms D −W 6= B so if W ⊆ {j1 < · · · < jν } then D −W ⊃ B and therefore D − W < B. In any case we have |D − W | = |U | ≥ |A| = |B|. If W contains some iµ then D − W is obtained from B by removing some (and at least one) of the elements {iν < · · · < ip } and replacing them by at least as many of the smaller elements {j1 < · · · < jν }. This operation does not decrease the size of the sets (D − W ) ∩ {1, · · · , r} for r ≥ 1 so |(D − W ) ∩ {1, · · · , r}| ≥ |B ∩ {1, · · · , r}|. Therefore D − W < B.  4. The straightening law for minors We now use a simple trick to generalize Theorem 3.1 to the case of products of any two minors of a rectangular matrix X = (xij ) where 1 ≤ i ≤ m and 1 ≤ j ≤ n. Recall that (S|T ) is the minor of X with row indices in S and column indices in T . We set (S|T ) = 0 if |S| 6= |T |. As above we write (S ′ , S ′′ ) ≤ (T ′ , T ′′ ) if S ′ ≤ T ′ and S ′′ ≤ T ′′ . The following theorem is the straightening law for minors. Theorem 4.1. If (S ′ , T ′ )  (S ′′ , T ′′ ) then X (S ′ |T ′ )(S ′′ |T ′′ ) = ±(Si′ |Ti′ )(Si′′ |Ti′′ ) where (Si′ , Ti′ ) < (S ′ , T ′ ) and (Si′ , Ti′ ) ≤ (Si′′ , Ti′′ ). We need two lemmas for the proof. By an order preserving map I mean one satisfying f (a) ≤ f (b) if a ≤ b. Lemma 4.2. Let U ′ and U ′′ be finite subsets of a totally ordered set and let k = |U ′ | + |U ′′ |. Then there is an order preserving map f : K = {1, . . . , k} → U ′ ∪ U ′′ and disjoint subsets K ′ and K ′′ of K with K = K ′ ⊔ K ′′ such that (a): f maps K ′ isomorphically onto U ′ and K ′′ isomorphically onto U ′′ (b): If a, b ∈ K, f (a) = f (b), and a < b, then a ∈ K ′ and b ∈ K ′′ . Proof. Let L′ and L′′ be disjoint sets in 1 − 1 correspondence with U ′ and U ′′ . Let L = L′ ⊔ L′′ and let f : L → U ′ ∪ U ′′ map L′ bijectively onto U ′ and L′′ bijectively onto U ′′ . Define an ordering on L by setting a < b if f (a) < f (b) or if f (a) = f (b) with a ∈ L′ and b ∈ L′′ . It is easy to check that this defines a total ordering preserved by f . Since L is a totally ordered finite set of order k it is isomorphic to K = {1, . . . , k} and we can substitute K for L letting K ′ and K ′′ correspond to L′ and L′′ . (a) is clear and (b) follows from the definition of the ordering/  If f is order preserving and is injective on P and Q then P ≤ Q implies f (P ) ≤ f (Q) since the injectivity guarantees that |f (P )| = |P | and similarly for Q. Lemma 4.3. In the situation of Lemma 4.2 if P is a subset of K on which f is injective then P < K ′ implies that f (P ) < f (K ′ ) = U ′ . STRAIGHTENING LAW 5 Proof. It is clear that f (P ) ≤ f (K ′ ). We must show that f (P ) 6= f (K ′ ). Suppose f (P ) = f (K ′ ). Injectivity shows that |P | = |f (P )| = |f (K ′ )| = |K ′ |. Let P = {u1 < · · · < up } and K ′ = {v1 < · · · < vp }. Since f is order preserving and injective on P and on K we have f (P ) = {f (u1 ) < · · · < f (up )} and f (K ′ ) = {f (v1 ) < · · · < f (vp )} Now uν ≤ vν for all ν since P < K ′ but f (uν ) = f (vν ) for all ν since f (P ) = f (K ′ ). Since P < K ′ , uν = vν can’t hold for all ν otherwise P and K ′ would be equal, so for some ν we have uν < vν . But since f (uν ) = f (vν ), Lemma 4.2(b) shows that vν must lie in K ′′ which is a contradiction.  Proof of Theorem 4.1. We can assume that |S ′ | = |T ′ | and |S ′′ | = |T ′′ | since otherwise the left hand side is 0. Let k = |S ′ | + |S ′′ | = |T ′ | + |T ′′ | and apply Lemma 4.2 to U ′ = S ′ and U ′′ = S ′′ getting an order preserving map ϕ : I → S ′ ∪ S ′′ with I = I ′ ⊔ I ′′ (disjoint union), I ′ mapping isomorphically to S ′ , and I ′′ mapping isomorphically to S ′′ . Similarly define ψ : J → T ′ ∪ T ′′ with J = J ′ ⊔ J ′′ . Note that I = J = {1, . . . , k}. We call them I and J to distinguish their use as row and column indices. Define a k × k matrix Y indexed by I and J by setting yij = xϕ(i)ψ(j) . Then, for P ⊆ I and Q ⊆ J, we have Y (P |Q) = X(ϕ(P )|ψ(Q)) if ϕ|P and ψ|Q are injective while Y (P |Q) = 0 otherwise since two rows P or columns will be equal. By Theorem 3.1 we have Y {I ′ |J ′ } = ±Y {Ii′ |Ji′ } which we can write as X (3) Y (I ′ |J ′ )Y (I ′′ |J ′′ ) = ±Y (Ii′ |Ji′ )Y (Ii′′ |Ji′′ ) where Ii′′ = I − Ii′ = Iei′ and Ji′′ = J − Ji′ = Jei′ . By Theorem 3.1 we see that Ii′ ≤ I ′ , Ji′ ≤ J ′ and that Ii′ and Ji′ are good so that Ii′ ≤ Ii′′ and Ji′ ≤ Ji′′ . By omitting all 0 terms in (3) we can insure that ϕ is injective on all Ii′ and all Ii′′ and that ψ is injective on all Ji′ and Ji′′ . Let Si′ = ϕ(Ii′ ), Si′′ = ϕ(Ii′′ ) and similarly for T . Because of the injectivity we can write (3) (with the 0 terms removed) as X (4) (S ′ |T ′ )(S ′′ |T ′′ ) = ±(Si′ |Ti′ )(Si′′ |Ti′′ ) where (Si′ , Ti′ ) ≤ (S ′ , T ′ ) and (Si′ , Ti′ ) ≤ (Si′′ , Ti′′ ). If I ′ and J ′ are good then I ′ ≤ I ′′ and J ′ ≤ J ′′ which implies that S ′ ≤ S ′′ and ′ T ≤ T ′′ contrary to the hypothesis. Therefore one of I ′ and J ′ , say I ′ , must be bad. Since I ′ is bad, Ii′ is good, and Ii′ ≤ I ′ , we have Ii′ < I ′ . By Lemma 4.3 it follows that Si′ < S ′ showing that (Si′ , Ti′ ) < (S ′ , T ′ ). The same argument applies if J ′ is bad.  Remark 4.4. Suppose A = A′ ⊔ A′′ where A′ and A′′ are disjoint and ϕ : A → B is onto. Suppose ϕ is injective on A′ and on A′′ . Let B ′ = ϕ(A′ ) and B ′′ = ϕ(A′′ ). Then B ′ ∩ B ′′ = {x| |ϕ−1 (x)| = 2} is independent of A′ and A′′ . We can think of B = ϕ(A) as a set with multiplicities where the multiplicity of a point x is the order of ϕ−1 (x). If we think of B ′ and B ′′ as sets with all points of multiplicity 1 then B ′ ∪ B ′′ = B as sets with multiplicities. Applying this remark to the maps ϕ : I → S ′ ∪ S ′′ and ψ : J → T ′ ∪ T ′′ defined in the proof of Theorem 4.1 we see that the sets given by our proof of Theorem 4.1 satisfy Si′ ∪ Si′′ = S ′ ∪ S ′′ and Ti′ ∪ Ti′′ = T ′ ∪ T ′′ as multisets. 6 RICHARD G. SWAN 5. Standard monomials We say that a product (A1 |B1 ) · · · (Ar |Br ) of the minors of a matrix X is a standard monomial if A1 ≤ A2 ≤ · · · ≤ Ar and B1 ≤ B2 ≤ · · · ≤ Br . We regard two standard monomials which only differ by factors of the form (∅|∅) as identical. The following is an easy consequence of Theorem 4.1. Corollary 5.1. Any polynomial in the entries of X is a linear combination of standard monomials in the minors of X. Proof. Since xij = ({i}|{j}), it is clear that any such polynomial is a linear combination of products of the minors of X. We show that any product (A1 |B1 ) · · · (Ar |Br ) with r factors is a linear combination of standard monomials with r factors by induction on r and on (A1 , B1 ) in the finite partially ordered set of pairs of subsets of {1, . . . , m} and {1, . . . , n}. By induction on r we can assume that (A2 , B2 ) ≤ · · · ≤ (Ar , Br ). If (A1 , B1 ) ≤ (A P2 , B2 ) or r = 1 we are done. If not, Theorem 4.1 shows that (A1 |B1 )(A2 |B2 ) = ±(Ci |Di )(Pi |Qi ) where (Ci , Di ) < (A1 , B1 ) so we are done by induction on (A1 , B1 ).  Remark 5.2. It follows from Remark 4.4 that if we write (A1 |B1 ) · · · (Ar |Br ) as a (i) (i) (i) (i) linear combination of standard monomials (A1 |B1 ) · · · (Ari |Bri ) then S S (i) S S (i) = j Bj for all i, counting multiplicities. In other j Bj j Aj and j Aj = words the two sides have the same content in the sense of [2]. To conclude, we give a proof of the following theorem which is rather similar to the proof in [4] but which uses no combinatorial constructions. By a generic matrix we mean one whose entries are distinct indeterminates. Theorem 5.3. If X is a generic matrix, the standard monomials in the minors of X are linearly independent. Before giving the proof we review some results about ordering monomials. Given a totally ordered set of indeterminates, we can order the monomials in these indeterminates as follows. If x is an indeterminate and m is such a monomial write ordx m for the number of times x occurs in m. If m1 and m2 are monomials define m1 > m2 to mean ordx m1 > ordx m2 for some x while ordy m1 = ordy m2 for all y > x. It is easy to check that this defines a total ordering on the set of monomials. Lemma 5.4. If u1 , u2 , · · · , uk and v1 , v2 , · · · , vk are monomials with ui ≤ vi for all i and ui < vi for some i then u1 u2 · · · uk < v1 v2 · · · vk . It is sufficient to show a < b implies ac < bc and then replace the ui ’s by the vi ’s one by one. It follows that if f and g are linear combinations of monomials, the leading monomial of f g is the product of the leading monomials of f and g. Proof of Theorem 5.3. We specialize X to a matrix of the form X = Y Z where Y is a generic m × N matrix, Z is a generic N × n matrix and N is sufficiently large. By the classical Binet–Cauchy theorem we have X (5) X(A|B) = Y (A|S)Z(S|B). S This just expresses the functoriality of the exterior product: ^ ^ ^ (6) (X) = (Y ) (Z). STRAIGHTENING LAW 7 By omitting 0 terms in equation (5) we can assume that |A| = |B| = |S| = p. In the (ν) (ν) situation of equation (5) let Y = (yi )1≤i≤m, 1≤ν≤N and Z = (zj )1≤ν≤N 1≤j≤n (ν) (ν) be generic matrices where the indeterminates yi and zj are all distinct. Then PN (ν) (ν) X = Y Z has entries xij = ν=1 yi zj . We order the indeterminates as follows: (1) (1) (2) (1) (2) y1 > · · · > ym > z1 > · · · > zn(1) > y1 > · · · > ym > ··· (7) and order the monomials in these indeterminates as described above. If A = {a1 < · · · < ap } and S = {s1 < · · · < sp }, then X p) (8) Y (A|S) = . ±ya(sσ11 ) · · · ya(sσp σ∈Sp (s ) (s ) (s ) (s ) (s ) (s ) p The leading monomial of Y (A|S) is ya11 · · · yapp since ya11 · · · yapp > yaσ11 · · · yaσp for σ 6= 1. To see this, let i be least such that σi 6= i. Then σi > i so (sp ) (s ) (s ) (s ) (s ) (s ) (s ) while yaσii < yaii . Choose x = yaii . Then ordx ya11 · · · yapp > ordx yaσ11 · · · yaσp (sp ) (sp ) (s1 ) (s1 ) ordz ya1 · · · yap = ordz yaσ1 · · · yaσp for z > x. Similarly, if B = {b1 < · · · < bp }, then the leading monomial of Z(S|B) is (s ) (s1 ) zb1 · · · zbpp . The various terms on the right hand side of (5) have leading mono- (s ) (s ) (s ) (s ) mials ya11 · · · yapp zb1 1 · · · zbpp . Of these, the one with si = i for all i is the largest by Lemma 5.4. Therefore, if N ≥ |A| = |B|, the leading monomial of X(A|B) is (p) (1) (p) (1) y(A)z(B) where y(A) = ya1 · · · yap and z(B) = zb1 · · · zbp . It follows that the leading term of (A1 |B1 ) · · · (Ar |Br ) is y(A1 ) · · · y(Ar )z(B1 ) · · · z(Br ). Now if A1 ≤ A2 ≤ · · · ≤ Ar , and if N ≥ |A1 |, we can recover A1 from M = y(A1 ) · · · y(Ar ) as follows. Let Ai = {ai1 < · · · < aipi }. Then (9) M= Y j ··· ya(1) j1 Y ··· ya(s) js j Since A1 ≤ A2 ≤ · · · ≤ Ar we have a1s ≤ a2s ≤ · · · , and we see that a1s is the (s) least c such that yc occurs in M . Note that p1 ≥ p2 ≥ · · · so that a1s will exist if ais does. Since M/y(A1 ) = y(A2 ) · · · y(Ar ) we see that M determines A2 , A3 , etc. if N ≥ |A1 |. Similarly z(B1 ) · · · z(Br ) determines B1 , B2 , etc. Therefore the leading monomials of the standard monomials (A1 |B1 ) · · · (Ar |Br ) with N ≥ |A1 | and N ≥ |B1 | are all distinct and the theorem follows since N can be arbitrarily large.  Corollary 5.5. For a generic square matrix X, all linear relations between the Laplace products of X are consequences of those in Theorem 2.6. Proof. By Theorem 3.1 the space of all Laplace products of X is spanned by those of e B) e is a standard the form {A|B} with A and B good. For these {A|B} = ±(A|B)(A| monomial so these {A|B} are linearly independent. Since the only relations needed to prove Theorem 3.1 are those of Theorem 2.6, the result follows.  References [1] C. Akin, D. Buchsbaum, and J. Weyman, Schur functors and Schur complexes, Adv. in Math. 44(1982), 207–278. [2] C. De Concini, D. Eisenbud, and C. Procesi, Young diagrams and determinantal varieties, Inv. Math. 56(1980), 129–165. 8 RICHARD G. SWAN [3] C. De Concini, D. Eisenbud, and C. Procesi, Hodge Algebras, Astérisque 91(1982). [4] J. Desarmenien, J. P. S. Kung, and G. C. Rota, Invariant theory, Young bitableaux, and combinatorics, Adv. in Math. 27(1978), 63–92. [5] P. Doubilet, G. C. Rota, and J. Stein, On the foundations of combinatorial theory IX: combinatorial methods in invariant theory, Studies in Appl. Math. 53(1974), 185–216. [6] W. V. D. Hodge, Some enumerative results in the theory of forms, Proc. Camb. Phil. Soc. 39(1943), 22–30. Department of Mathematics, The University of Chicago, Chicago, IL 60637 E-mail address: [email protected]
0math.AC
Constant Factor Approximation for ATSP with Two Edge Weights Ola Svensson∗ [email protected] Jakub Tarnawski† [email protected] László A. Végh‡ [email protected] arXiv:1511.07038v2 [cs.DS] 4 Sep 2017 Abstract We give a constant factor approximation algorithm for the Asymmetric Traveling Salesman Problem on shortest path metrics of directed graphs with two different edge weights. For the case of unit edge weights, the first constant factor approximation was given recently by Svensson. This was accomplished by introducing an easier problem called LocalConnectivity ATSP and showing that a good solution to this problem can be used to obtain a constant factor approximation for ATSP. In this paper, we solve Local-Connectivity ATSP for two different edge weights. The solution is based on a flow decomposition theorem for solutions of the Held-Karp relaxation, which may be of independent interest. 1 Introduction The traveling salesman problem — one of finding the shortest tour of n cities — is one of the most classical optimization problems. Its definition dates back to the 19th century and since then a large body of work has been devoted to designing “good” algorithms using heuristics, mathematical programming techniques, and approximation algorithms. The focus of this work is on approximation algorithms. A natural and necessary assumption in this line of work that we also make throughout this paper is that the distances satisfy the triangle inequality: for any triple i, j, k of cities, we have d(i, j)+d(j, k) ≥ d(i, k) where d(·, ·) denotes the pairwise distances between cities. In other words, it is not more expensive to take the direct path compared to a path that makes a detour. With this assumption, the approximability of TSP turns out to be a very delicate question that has attracted significant research efforts. Specifically, one of the first approximation algorithms (Christofides’ heuristic [Chr76]) was designed for the symmetric traveling salesman problem (STSP) where we assume symmetric distances (d(i, j) = d(j, i)). Several works (see e.g. [FGM82, AGM+ 10, GS11, AG15, Sve15]) have addressed the more general asymmetric traveling salesman problem (ATSP) where we make no such assumption. However, there are still large gaps in our understanding of both STSP and ATSP. In fact, for STSP, the best approximation algorithm remains Christofides’ 3/2-approximation algorithm from the 70’s [Chr76]. For the harder ATSP, the state of the art is a O(log n/ log log n)approximation algorithm by Asadpour et al. [AGM+ 10] and a recent O(poly log log n)-estimation algorithm1 by Anari and Oveis Gharan [AG15]. On the negative side, the best inapproximability results only say that STSP and ATSP are hard to approximate within factors 123/122 ∗ École Polytechnique Fédérale de Lausanne. Supported by ERC Starting Grant 335288-OptApprox. École Polytechnique Fédérale de Lausanne. ‡ London School of Economics. Supported by EPSRC First Grant EP/M02797X/1. 1 An estimation algorithm is a polynomial-time algorithm for approximating/estimating the optimal value without necessarily finding a solution to the problem. † 1 and 75/74, respectively [KLS15]. Closing these gaps is a major open problem in the field of approximation algorithms (see e.g. “Problem 1” and “Problem 2” in the list of open problems in the recent book by Williamson and Shmoys [WS11]). What is perhaps even more intriguing about these questions is that we expect that a standard linear programming (LP) relaxation, often referred to as the Held-Karp relaxation, already gives better guarantees. Indeed, it is conjectured to give a guarantee of 4/3 for STSP and a guarantee of O(1) (or even 2) for ATSP. An equivalent formulation of STSP and ATSP from a more graph-theoretic point of view is the following. For STSP, we are given a weighted undirected graph G = (V, E, w) where w : E → R+ and we wish to find a multisubset F of edges of minimum total weight such that (V, F ) is connected and Eulerian. Recall that an undirected graph is Eulerian if every vertex has even degree. We also remark that we use the term multisubset as the solution F may use the same edge several times. An intuitive point of view on this definition is that G represents a road network, and a solution is a tour that visits each vertex at least once (and may use a single edge/road several times). The definition of ATSP is similar, with the differences that the input graph is directed and the output is Eulerian in the directed sense: the in-degree of each vertex equals its out-degree. Having defined the traveling salesman problem in this way, there are several natural special cases to consider. For example, what if G is planar? Or, what if all the edges/roads have the same length, i.e., if G is unweighted? For planar graphs, we have much better algorithms than in general. Grigni, Koutsoupias and Papadimitriou [GKP95] first obtained a polynomial-time approximation scheme for STSP restricted to unweighted planar graphs, which was later generalized to edge-weighted planar graphs by Arora et al. [AGK+ 98]. More recently, ATSP on planar graphs (and more generally bounded genus graphs) was shown to admit constant factor approximation algorithms (first by Oveis Gharan and Saberi [GS11] and later by Erickson and Sidiropoulos [ES14] who improved the dependency on the genus). In contrast to planar graphs, STSP and ATSP remain APX-hard for unweighted graphs (ones where all edges have identical weight) and, until recently, there were no better algorithms for these cases. Then, in a recent series of papers, the approximation guarantee of 3/2 was finally improved for STSP restricted to unweighted graphs. Specifically, Oveis Gharan, Saberi and Singh [GSS11] first gave an approximation guarantee of 1.5−ǫ; Mömke and Svensson [MS11] proposed a different approach yielding a 1.461-approximation guarantee; Mucha [Muc12] gave a tighter analysis of this algorithm; and Sebő and Vygen [SV14] significantly developed the approach to give the currently best approximation guarantee of 1.4. Similarly, for ATSP, it was only very recently that the restriction to unweighted graphs could be leveraged: the first constant approximation guarantee for unweighted graphs was given by Svensson [Sve15]. In this paper we make progress towards the general problem by taking the logical next step and addressing a simple case left unresolved by [Sve15]: graphs with two different edge weights. Theorem 1.1. There is an O(1)-approximation algorithm for ATSP on graphs with two different edge weights. The paper [Sve15] introduces an “easier” problem named Local-Connectivity ATSP, where one needs to find an Eulerian multiset of edges crossing only sets in a given partition rather than all possible sets (see next section for definitions). It is shown that an “α-light” algorithm to this problem yields a (9 + ε)α-factor approximation for ATSP. For unweighted graphs (and slightly more generally, for node-induced weight functions2 ) it is fairly easy to obtain a 3-light algorithm for Local-Connectivity ATSP; the difficult part in [Sve15] is the black-box reduction of ATSP to this problem. Note that [Sve15] easily gives an O(wmax /wmin )-approximation algorithm in 2 For ATSP, we can think of a node-weighted graph as an edge-weighted graph where the weight of an edge (u, v) equals the node weight of u. 2 general if we take wmax and wmin to denote the largest and smallest edge weight, respectively. However, obtaining a constant factor approximation even for two different weights requires substantial further work. In Local-Connectivity ATSP we need a lower bound function lb : V → R+ on the vertices. P ∗ The natural choice for node-induced weights is lb(v) = e∈δ+ (v) w(e)xe . With this weight function, every vertex is able to “pay” for the incident edges in the Eulerian subgraph we are looking for. This choice of lb does not seem to work for more general weight functions, and we need to define lb more “globally”, using a new flow theorem for Eulerian graphs (Theorem 2.1). In Section 1.2, after the preliminaries, we give a more detailed overview of these techniques and the proof of the theorem. Our argument is somewhat technical, but it demonstrates the potential of the Local-Connectivity ATSP problem as a tool for attacking general ATSP. Finally, let us remark that both STSP [PY93, BK06] and ATSP [Blä04] have been studied in the case when all distances are either 1 or 2. That restriction is very different from our setting, as in those cases the input graph is complete. In particular, it is trivial to get a 2-approximation algorithm there, whereas in our setting – where the input graph is not complete – a constant factor approximation guarantee already requires non-trivial algorithms. (In our setting, we can still think about the metric completion, but it will usually have more than two different edge weights.) 1.1 Notation and preliminaries We consider an edge-weighted directed graph G = (V, E, w) with w : E → R+ . For a vertex subset S ⊆ V we let δ+ (S) = {(u, v) ∈ E : u ∈ S, v ∈ V \ S} and δ− (S) = {(u, v) ∈ E : u ∈ V \ S, v ∈ S} denote the sets of outgoing and incoming edges, respectively. For two vertex subsets X, Y ⊆ V , we let δ(X, Y ) = {(u, v) ∈ E : u ∈ X \ Y, v ∈ Y \ X}. For a subset of edges − + − ′ ′ + ′ E ′ ⊆ E, we use δE ′ (S) = δ (S) ∩ E and δE ′ (S) = δ (S) ∩ E . We also let C(E ) = (G̃1 , . . . , G̃k ) ′ denote the set of weakly connected components of the graph (V, E ); the vertex set V will always be clear from the context. For a directed graph G̃ we use V (G̃) to denote its vertex set and E(G̃) the edge set. For brevity, P we denote the singleton set {v} by v (e.g. δ+ (v) = δ+ ({v})), and we use the notation x(F ) = e∈F xe for a subset F ⊆ E of edges and a vector x ∈ RE . For a multiset F , we have 1F denote the indicator vector of F , which has a coordinate for each edge e with value equal to the number of copies of e in F . For the case of two edge weights, we use 0 ≤ w0 < w1 to denote the two possible values, and partition E = E0 ∪ E1 so that w(e) = w0 if e ∈ E0 and w(e) = w1 if e ∈ E1 . We will refer to edges in E0 and E1 as cheap and expensive edges, respectively. We define ATSP as the problem of finding a connected Eulerian subgraph of minimum weight. As already mentioned in the introduction, this definition is equivalent to that of visiting each city exactly once (in the metric completion) since we assume the triangle inequality. The formal definition is as follows. ATSP Given: An edge-weighted (strongly connected) digraph G = (V, E, w). P Find: A multisubset F of E of minimum total weight w(F ) = e∈F w(e) such that (V, F ) is Eulerian and connected. 3 Held-Karp Relaxation. The Held-Karp relaxation has a variable xe ≥ 0 for every edge in G. The intended meaning is that xe should equal the number of times e is used in the solution. The relaxation LP(G) is defined as follows: X minimize w(e)xe e∈E subject to x(δ+ (v)) = x(δ− (v)) v ∈ V, + x(δ (S)) ≥ 1 ∅= 6 S ( V, x ≥ 0. (LP(G)) The first set of constraints says that the in-degree should equal the out-degree for each vertex, i.e., the solution should be Eulerian. The second set of constraints enforces that the solution is connected; they are sometimes referred to as subtour elimination constraints. Finally, we remark that although the Held-Karp relaxation has exponentially many constraints, it is wellknown that we can solve it in polynomial time either by using the ellipsoid method with a separation oracle or by formulating an equivalent compact (polynomial-size) linear program. We will use x∗ to denote an optimal solution to LP(G) of value OPT, which is a lower bound on the value of an optimal solution to ATSP on G. Local-Connectivity ATSP. The Local-Connectivity ATSP problem can be seen as a twostage procedure. In the first stage, the input is an edge-weighted digraph G = (V, E, w) and the output is a “lower bound” function lb : V → R+ on the vertices such that lb(V ) ≤ OPT. In the second stage, the input is a partition of the vertices, and the output is an Eulerian multisubset of edges which crosses each set in the partition and where the ratio of weight to lb of every connected component is as small as possible. We now give the formal description of the second stage, assuming the lb function is already computed. Local-Connectivity ATSP Given: An edge-weighted digraph G = (V, E, w), a function lb : V → R+ with lb(V ) ≤ OPT, and a partitioning V = V1 ∪ V2 ∪ . . . ∪ Vk of the vertices. Find: A Eulerian multisubset F of E such that |δF+ (Vi )| ≥ 1 for i = 1, 2, . . . , k and w(G̃) is minimized. G̃∈C(F ) lb(G̃) max P Here we used the notation that for a connected component G̃ of (V, F ), w(G̃) = e∈E(G̃) w(e) P (summation over the edges) and lb(G̃) = v∈V (G̃) lb(v) (summation over the vertices). We say that an algorithm for Local-Connectivity ATSP is α-light on G if it is guaranteed, for any partition, to find a solution F such that for every component G̃ ∈ C(F ), w(G̃) ≤ α. lb(G̃) P In [Sve15], lb is defined as lb(v) = e∈δ+ (v) w(e)x∗e ; note that lb(V ) = OP T in this case. We remark that we use the “α-light” terminology to avoid any ambiguities with the concept 4 of approximation algorithms (an α-light algorithm does not compare its solution to an optimal solution to the given instance of Local-Connectivity ATSP). Perhaps the main difficulty of ATSP is to satisfy the connectivity requirement, i.e., to select an Eulerian subset F of edges which connects the whole graph. Local-Connectivity ATSP relaxes this condition – we only need to find an Eulerian set F that crosses the k cuts defined by the partition. This makes it intuitively an “easier” problem than ATSP. Indeed, an αapproximation algorithm for ATSP (with respect to the Held-Karp relaxation) is trivially an α-light algorithm for Local-Connectivity ATSP for an arbitrary lb function with lb(V ) = OP T : just return the same Eulerian subset F as the algorithm for ATSP; since the set F connects the graph, we have maxG̃∈C(F ) w(G̃)/ lb(G̃) = w(F )/ lb(V ) ≤ α. Perhaps more surprisingly, the main technical theorem of [Sve15] shows that the two problems are equivalent up to small constant factors. Theorem 1.2 ([Sve15]). Let A be an algorithm for Local-Connectivity ATSP. Consider an ATSP instance G = (V, E, w), and let OPT denote the optimum value of the Held-Karp relaxation. If A is α-light on G, then there exists a tour of G with value at most 5α OPT. Moreover, for any ε > 0, a tour of value at most (9 + ε)α OPT can be found in time polynomial in the number n = |V | of vertices, in 1/ε, and in the running time of A. In other words, the above theorem says that in order to approximate an ATSP instance G, it is sufficient to devise a polynomial-time algorithm to calculate a lower bound lb and a polynomial time algorithm for Local-Connectivity ATSP that is O(1)-light on G with respect to this lb function. Our main result is proved using this framework. 1.2 Technical overview Singleton partition. Let us start by outlining the fundamental ideas of our algorithm and comparing it to [Sve15] for the special case of Local-Connectivity ATSP when all partition P classes Vi are singletons. For unit weights, the choice lb(v) = e∈δ+ (v) w(e)x⋆e = x⋆ (δ+ (v)) in [Sve15] is a natural one: intuitively, every node is able to pay for its outgoing edges. We can thus immediately give an algorithm for this case: just select an arbitrary integral solution z to ⋆ + the circulation problem with node capacities 1 ≤ z(δ+ (v)) P ≤ ⌈x (δ (v))⌉. Then for any v we + ⋆ + ⋆ + have z(δ (v)) ≤ x (δ (v)) + 1 ≤ 2x (δ (v)) and hence e∈δ+ (v) w(e)ze ≤ 2 lb(v), showing that z is a 2-light solution. The same choice of lb does not seem to work in the presence of two different edge costs. Consider a case when every expensive edge carries only a small fractional amount of flow. Then P ⋆ e∈δ+ (v) w(e)xe can be much smaller than the expensive edge cost w1 , and thus the vertex v would not be able to “afford” even a single outgoing expensive edge. To resolve this problem, we bundle small fractional amounts of expensive flow, channelling them to reach a small set of terminals. This is achieved via Theorem 2.1, a flow result which might be of independent interest. It shows that within the fractional Held-Karp solution x⋆ , we can send the flow from an arbitrary edge set E ′ to a sink set T with |T | ≤ 8x⋆ (E ′ ); in fact, T can be any set minimal for inclusion such that it can receive the total flow from E ′ . We apply this theorem for E ′ = E1 , the set of expensive edges; let f be the flow from E1 to T , and call elements of T terminals. Now, whenever an expensive edge is used, we will “force” it to follow f to a terminal in T , where it can be paid for. Enforcement is technically done by splitting the vertices into two copies, one carrying the f flow and the other the rest. Thus we obtain the split graph Gsp and split fractional optimal solution x⋆sp . The design of the split graph is such that every walk in it which starts with an expensive edge must proceed through cheap edges until it reaches a terminal before visiting another expensive 5 edge. In our terminology, expensive edges create “debt”, which must be paid off at a terminal. Starting from an expensive edge, the debt must be carried until a terminal is reached, and no further debt can be taken in the meantime. The bound on the number of terminals guarantees that we can assign a lower bound function lb with lb(V ) ≤ OPT such that (up to a constant factor) cheap edges are paid for locally, at their heads, whereas expensive edges are paid for at the terminals they are routed to. Such a splitting easily solves Local-Connectivity ATSP for the singleton partition: find an arbitrary integral circulation zsp in the split graph with an upper bound zsp (δ+ (v)) ≤ ⌈2x⋆sp (δ+ (v))⌉ on every node, and a lower bound 1 on whichever copy of v transmits more flow. Note that 2x⋆sp is a feasible fractional solution to this problem. We map zsp back to an integral circulation z in the original graph by merging the split nodes, thus obtaining a constant-light solution. Arbitrary partitions. Let us now turn to the general case of Local-Connectivity ATSP, where the input is an arbitrary partition V = V1 ∪ . . . ∪ Vk . For unit weights this is solved in [Sve15] via an integer circulation problem on a modified graph. Namely, an auxiliary node Ai is added to represent each partition class Vi , and one unit of in- and outgoing flow from Vi is rerouted through Ai . In the circulation problem, we require exactly one in- and one outgoing edge incident to Ai to be selected. When we map the solution back to the original graph, there will be one incoming and one outgoing arc from every set Vi (thus satisfying the connectivity requirement) whose endpoints inside Vi violate the Eulerian condition. In [Sve15] every Vi is assumed to be strongly connected, and therefore we can “patch up” the circulation by connecting the loose endpoints by an arbitrary path inside Vi . This argument easily gives a 3-light solution. Let us observe that the strong connectivity assumption is in fact not needed for the result in [Sve15]. Indeed, given a component Vi which is not strongly connected, consider its decomposition into strongly connected (sub)components, and pick a Ui ⊆ Vi which is a sink (i.e. it has no edges outgoing to Vi \ Ui ). We proceed by rerouting 1 unit of flow through a new auxiliary vertex just as in that algorithm, but we do this for Ui instead. This guarantees that Ui has at least one outgoing edge in our solution, and that edge must leave Vi as well. Our result for two different edge weights takes this observation as the starting point, but the argument is much more complicated. We will find an integer circulation in a graph based on the split graph Gsp , and for every 1 ≤ i ≤ k, there will be an auxiliary vertex Ai representing a certain subset Ui ⊆ Vi . These sets Ui will be obtained as sink components in certain auxiliary graphs we construct inside each Vi . This construction is presented in Section 3.2; we provide a roadmap to the construction at the beginning of that section. 2 The Flow Theorem In this section we prove our main flow decomposition result. As indicated in Section 1.2, we will use it to channel the flow from the expensive edges E1 to a small set of terminals T (where |T | ≤ 8w(E1 )). We will use the theorem stated below by moving the tail of every edge in E1 to a new vertex s. If w(E1 ) ≥ 1, then the constraints of the Held-Karp relaxation guarantee condition (1). The details of the reduction are given in Lemma 3.4. Theorem 2.1. Let D = (V ∪ {s}, E) be a directed graph, let c : E → R+ be a nonnegative capacity vector, and let s be a source node with no incoming edges, i.e., δ− (s) = ∅. Assume that for all ∅ = 6 S ⊆ V we have c(δ− (S)) ≥ max{1, c(δ+ (S))}. (1) 6 Consider a set T ⊆ V such that there exists a flow f ≤ c of value c(δ+ (s)) from the source s to the sink set T , and T is minimal subject to this property.3 Then |T | ≤ 8c(δ+ (s)). The proof of this theorem can be skipped on first reading, as the algorithm in Section 3 only uses it in a black-box manner. Proof. Fix a minimal set T and denote k = |T |. Our goal is to prove that k ≤ 8c(δ+ (s)). We know that there exists a flow of value c(δ+ (s)) from s to T . For any such flow f we define its imbalance sequence to be the sequence of values z(t) = f (δ− (t)) − f (δ+ (t)) ∈ R+ for all t ∈ T sorted in non-increasing order. We select the flow f which maximizes the imbalance sequence (lexicographically). We write T = {t1 , . . . , tk } so that z(t1 ) ≥ z(t2 ) ≥ . . . ≥ z(tk ); denote zi = z(ti ) for brevity. By minimality of T we have z(tk ) > 0. The following is our main technical lemma. Lemma 2.2. Let ℓ be the number of t ∈ T with z(t) ≥ 14 , i.e., z1 ≥ ... ≥ zℓ ≥ zk . Then we have ℓ X 1 zi . (k − ℓ) ≤ 4 1 4 > zℓ+1 ≥ ... ≥ i=1 In other words, the number of terminals with small imbalance is not much more than the sum of large imbalances. Assuming this lemma, the main theorem follows immediately, since we have 14 k = 41 ℓ + 14 (k − P P ℓ) ≤ ℓi=1 zi + ℓi=1 zi ≤ 2c(δ+ (s)), i.e., k ≤ 8c(δ+ (s)). The remainder of this section is devoted to the proof of the technical lemma. Let us first give an outline. We analyze the residual capacity (with respect to f ) of certain cuts that must be present due to the lexicographic property. First of all, there must be a saturated cut (that is, one of 0 residual in-capacity) A ⊆ V containing all large terminals (i.e., those with imbalance at least 1/4) but no small ones (Claim 3). Next, consider an arbitrary small terminal i. Also by the maximality property, it is not possible to increase the value of zi to 1/4 by rerouting flow from other small terminals to i. Hence there must be a cut Bi , disjoint from A, which contains ti as the only terminal and has residual in-capacity less than 1/4−zi in D\A (Claim 4). As an illustration of the argument, let us assume that these sets Bi are pairwise disjoint. It follows from (1) that the residual in-capacity of Bi is at least 1 − zi (Claim 2). Hence every set Bi must receive 3/4 units of its residual in-capacity from A. On the other hand, (1) upperPℓ bounds the residual out-capacity of A by 2 i=1 zi (Claim 1). These together give a bound Pℓ 3 i=1 zi . Recall however that we assumed that all sets Bi are disjoint. Since these 4 (k − ℓ) ≤ 2 sets may in fact overlap, the proof needs to be more careful: instead of sets Bi , we argue with the sets Bi \ (∪j6=i Bj ) (nonempty as containing ti ), and the union of pairwise intersections B ∗ ; thus instead of 3/8, we get a slightly worse constant 1/4. Proof of Lemma 2.2. First note that the claim is trivial if ℓ = k, so assume ℓ < k. For an − arc e = (u, v), we let ← e = (v, u) denote the reverse arc. We define the residual graph Df = − − (V ∪ {s}, Ef ) with Ef = {e ∈ E : f (e) < c(e)} ∪ {e : ← e ∈ E, f (← e ) > 0}. The residual capacity − for the first set of arcs is defined as cf (e) = c(e) − f (e), and for the second set as cf (e) = f (← e ). − + For any set X ⊆ V , and a disjoint Y ⊆ V , let δf (X), δf (X) and δf (X, Y ) denote the capacities 3 That is, the maximum flow value from s to any proper subset T ′ ( T is smaller than c(δ + (s)). 7 of the respective cuts in the residual graph Df of f , i.e., δf− (X) = X cf (e) = c(δ− (X)) − f (δ− (X)) + f (δ+ (X)), e∈δ− (X) δf+ (X) = X cf (e) = c(δ+ (X)) − f (δ+ (X)) + f (δ− (X)), e∈δ+ (X) δf (X, Y ) = X cf (e) = c(δ(X, Y )) − f (δ(X, Y )) + f (δ(Y, X)). e∈δ(X,Y ) The next two claims derive simple bounds from (1) on the residual in-and out-capacities of cuts. P Claim 1. If X ⊆ V , then δf− (X) + 2 t∈T ∩X z(t) ≥ δf+ (X). Proof.  δf− (X) − δf+ (X) = c(δ− (X)) − c(δ+ (X)) − 2 f (δ− (X)) − f (δ+ (X)) X X = c(δ− (X)) − c(δ+ (X)) − 2 z(t) ≥ −2 z(t). t∈T ∩X t∈T ∩X The equality is by flow conservation. The inequality is by (1). The claim follows. Claim 2. Consider X ⊆ V such that X ∩ T = {ti } for some 1 ≤ i ≤ k. Then δf− (X) ≥ 1 − zi . Proof.  δf− (X) = c(δ− (X)) − f (δ− (X)) − f (δ+ (X)) ≥ 1 − zi . Here we used (1) and the flow conservation f (δ− (X)) − f (δ+ (X)) = zi (as the single sink contained in X is ti ). The next claim shows that the large terminals can be separated from the small ones by a cut of residual in-degree 0. This follows from the lexicographically maximal choice, and is not a particular property of the threshold 1/4 (it remains true if we replace ℓ by any 1 ≤ j ≤ k). Claim 3. There exists a set A ⊆ V with A ∩ T P = {t1 , ..., tℓ } (i.e., A contains exactly the large terminals) such that δf− (A) = 0, and δf+ (A) ≤ 2 ℓi=1 zℓ . Proof. If ℓ = 0, then we can choose A = ∅. So assume 0 < ℓ < k. Consider the maximum flow in the residual graph Df from the source set {tℓ+1 , ..., tk } to the sink set {t1 , ..., tℓ }. If its value is positive, then there exists a path P in Df from ti to tj for some i > ℓ and j ≤ ℓ (without loss of generality it contains no other terminals). Set ε = min{z(ti ), min(u,v)∈P cf (u, v)} > 0. Then the s-T flow f ′ = f + ε · 1P has a lexicographically larger imbalance sequence than f because zi is increased without decreasing any other of the large imbalances, a contradiction. So there must be a cut A ⊆ V with A ∩ T = {t1 , ..., tℓ } and δf− (A) = 0.4 The second part follows by the first via Claim 1. Claim 4. For any ℓ + 1 ≤ i ≤ k (i.e., ti is a small terminal) there exists a set Bi ⊆ V \ A such that Bi ∩ T = {ti } and δf− (Bi ) − δf (A, Bi ) < 41 − zi . 4 Note that s ∈ / A since Df contains a path from tk to s. 8 Proof. If k = ℓ + 1, then we can choose Bk = V \ A; we have δf− (Bk ) − δf (A, Bk ) = 0 since all arcs leaving the source s are saturated. So assume k − ℓ ≥ 2. Consider the maximum flow from the source set {tℓ+1 , ..., tk } \ {ti } to the sink ti in the graph Df \ (A ∪ {s}). If its value is at least 14 − zi , then we will get a contradiction by increasing the imbalance of ti to at least 41 without changing any of the large imbalances. Namely, let g be a flow from {tℓ+1 , ..., tk } \ {ti } to ti of value 41 − zi . Consider the vector f + g. There are two possible cases: • If f + g is still an s-T flow, i.e., if for all j we have g(δ+ (tj )) − g(δ− (tj )) ≤ z(tj ), then it has a lexicographically larger imbalance sequence than f , a contradiction. • Otherwise pick the maximum α > 0 such that f + αg is still an s-T flow, i.e., for all j we have α (g(δ+ (tj )) − g(δ− (tj ))) ≤ z(tj ), with equality for some j. This means that f + αg is an s-T flow where at least one terminal tj has zero imbalance, i.e., it can be removed from the set T , contradicting its minimality. So there must be a cut Bi ⊆ V \ (A ∪ {s}) such that Bi ∩ T = {ti } and 1 − zi > δf (V \ (A ∪ {s} ∪ Bi ), Bi ) = δf− (Bi ) − δf (A, Bi ) − δf (s, Bi ). 4 The claim follows by δf (s, Bi ) = 0, which holds since all edges in δ+ (s) are saturated in f . P The argument uses the bound δf+ (A) ≤ 2 ℓi=1 zℓ and the fact that all the Bi ’s must receive a large part of their residual in-degrees from A. Since the sets Bi overlap, we have to take their intersections into account. Let us therefore define [ B ⋆ := (Bi ∩ Bj ) ⊆ V \ (A ∪ {s}) i,j>ℓ,i6=j as the set of vertices contained in at least two sets Bi . Let α⋆ := δf (A, B ⋆ ), αi := δf (A, Bi \B ⋆ ), and βi := δf (B ⋆ , Bi \ B ⋆ ) for each ℓ + 1 ≤ i ≤ k. Claim 5. For each ℓ + 1 ≤ i ≤ k we have 3 4 < αi + βi . Proof. Note that (Bi \ B ⋆ ) ∩ T = {ti }, and thus δf− (Bi \ B ⋆ ) ≥ 1 − zi by Claim 2. From this we can see 1 − zi ≤ δf− (Bi \ B ⋆ )   ≤ δf− (Bi ) − δf (A, Bi ) + δf (A, Bi \ B ⋆ ) + δf (B ⋆ , Bi \ B ⋆ ) < 1 − zi + αi + βi , 4 where the second inequality follows because an edge entering Bi \ B ⋆ either enters Bi from outside of A, or enters Bi \ B ⋆ from B ⋆ , or enters Bi \ B ⋆ from A. For the residual in-degree of the set B ⋆ , we apply the trivial bound δf− (B ⋆ ) k   X 1 ≤ δf (A, B ) + δf− (Bi ) − δ(A, Bi ) ≤ α⋆ + (k − ℓ). 4 ⋆ i=ℓ+1 The last estimate is by the choice of the sets Bi in Claim 4. For the residual out-degree, we get δf+ (B ⋆ ) ≥ k X i=ℓ+1 k X 3 βi > (k − ℓ) − αi , 4 i=ℓ+1 9 using Claim 5. Applying Claim 1 to B ⋆ and noting that B ⋆ ∩ T = ∅ gives δf− (B ⋆ ) ≥ δf+ (B ⋆ ). Putting Claim 3 and the above two bounds together, we conclude that 2 ℓ X zi ≥ δf+ (A) ⋆ ≥α + i=1 Lemma 2.2 now follows. 3 k X i=ℓ+1 1 αi ≥ (k − ℓ). 2 (2) Algorithm for Local-Connectivity ATSP We prove our main result in this section. Our claim for ATSP follows from solving LocalConnectivity ATSP: Theorem 3.1. There is a polynomial-time 100-light algorithm for Local-Connectivity ATSP on graphs with two edge weights. Together with Theorem 1.2, this implies our main result: Theorem 3.2. For any graph with two edge weights, the integrality gap of its Held-Karp relaxation is at most 500. Moreover, we can find an 901-approximate tour in polynomial time. The factor 500 comes from 5 · 100. In Theorem 1.2, we select ε such that (9 + ε) · 100 ≤ 901. Our proof of Theorem 3.1 proceeds as outlined in Section 1.2. In Section 3.1, we give an algorithm for calculating lb and define the split graph which will be central for finding light solutions. In Section 3.2, we then show how to use these concepts to solve Local-Connectivity ATSP for any given partitioning of the vertices. Recall that the edges are partitioned into the set E0 of cheap edges and the set E1 of expensive edges. Set x⋆ to be an optimal solution to the Held-Karp relaxation. We start by noting that the problem is easy if x⋆ assigns very small total fractional value to expensive edges. In that case, we can easily reduce the problem to the unweighted case which was solved in [Sve15]. Lemma 3.3. There is a polynomial-time 6-light algorithm for Local-Connectivity ATSP for graphs where x⋆ (E1 ) < 1. Proof. If x⋆ (E1 ) = 0, then just apply the standard 3-light polynomial-time algorithm for unweighted graphs [Sve15]. So suppose that 0 < x⋆ (E1 ) < 1. Then clearly the graph (V, E0 ) is strongly connected, i.e. every pair of vertices is connected by a directed path of cheap edges (of length at most n − 1). Thus each expensive edge (u, v) can be replaced by such a u-v-path P (u, v). Let us obtain a new circulation x′ from x⋆ by replacing all expensive edges in this way, i.e., X x⋆(u,v) · 1P (u,v) . x′ = x⋆ |E0 + (u,v)∈E1 To bound the cost of x′ , note that x⋆ (E0 ) = x⋆ (E) − x⋆ (E1 ) > n − 1 > (n − 1)x⋆ (E1 ) and thus w(x′ ) ≤ w0 · x⋆ (E0 ) + (n − 1)w0 · x⋆ (E1 ) ≤ 2w0 · x⋆ (E0 ) ≤ 2w(x⋆ ). By construction, x′ is a feasible solution for the Held-Karp relaxation and supp(x′ ) ⊆ E0 . Therefore we can use it in the standard 3-light polynomial-time algorithm for the unweighted graph (V, E0 ). Together with the bound w(x′ ) ≤ 2w(x⋆ ) this gives a 6-light algorithm. For the rest of this section, we thus assume x⋆ (E1 ) ≥ 1. Our objective is to define a function lb : V → R+ such that lb(V ) ≤ OPT = w(x⋆ ) and then show how to, given a partition V = V1 ∪ ... ∪ Vk , find an Eulerian set of edges F which crosses all Vi -cuts and is O(1)-light with respect to the defined lb function. 10 3.1 Calculating lb and constructing the split graph First, we use our flow decomposition technique to find a small set of terminals T such that it is possible to route a certain flow f from endpoints of all expensive edges to T . Next, we use f and T to calculate the function lb and to construct a split graph Gsp , where each vertex of G is split into two. Finding terminals T and flow f . We use Theorem 2.1 to obtain a small-enough set of terminals T and a flow f which takes all flow on expensive edges to this set T . More precisely, we have the following corollary of Theorem 2.1. Lemma 3.4. There exist a vertex set T ⊆ V and a flow f : E → R+ from source set {tail(e) : e ∈ E1 } to sink set T of value x⋆ (E1 ) such that: • |T | ≤ 8x⋆ (E1 ), • f ≤ x⋆ , • f saturates all expensive edges, i.e., f (e) = x⋆e for all e ∈ E1 , • for each t ∈ T , f (E0 ∩ δ+ (t)) = 0 and f (δ− (t)) > 0. Moreover, T and f can be computed in polynomial time. Proof. We construct G′ to be G with a new vertex s, where the tail of every expensive edge is redirected to be s. Formally, V (G′ ) = V ∪ {s} and E(G′ ) = E0 ∪ {(s, head(e)) : e ∈ E1 }. The capacity vector c is obtained from x⋆ by just following this redirection, i.e., for any edge e′ ∈ E(G′ ) we define c(e′ ) = x⋆e , where e ∈ E(G) is taken to be the preimage of e′ in G. Clearly c(δ+ (s)) = x⋆ (E1 ), and s ∈ V (G′ ) has no incoming edges. To see that condition (1) of Theorem 2.1 is satisfied, recall that for every ∅ = 6 S ( V (G) we have x⋆ (δ+ (S)) = x⋆ (δ− (S)) ≥ 1; redirecting the tail of some edges to s can only reduce the outdegree or increase the indegree of S, i.e., c(δ− (S)) ≥ x⋆ (δ− (S)) = x⋆ (δ+ (S)) ≥ c(δ+ (S)). This gives condition (1) for all sets S ( V (G′ ) − s; for S = V (G′ ) − s, note that c(δ− (S)) = x⋆ (E1 ) ≥ 1 = max{1, 0} = max{1, c(δ+ (S))} since we assumed that x⋆ (E1 ) ≥ 1. From Theorem 2.1 we obtain a vertex set T with |T | ≤ 8x⋆ (E1 ) and a flow f ′ : E(G′ ) → R+ from s to T of value x⋆ (E1 ) with f ′ ≤ c. We can assume f ′ (δ+ (t)) = 0 for all t ∈ T : in a path-cycle decomposition of f ′ we can remove all cycles and terminate every path at the first terminal it reaches. The flow f is obtained by mapping f ′ back to G, i.e., taking each f (e) to be f ′ (e′ ), where e′ is the image of e. Note that f ′ must saturate all outgoing edges of s, so f saturates all expensive edges. For the last condition, the part f (E0 ∩ δ+ (t)) = 0 is implied by f ′ (δ+ (t)) = 0, and for the part f (δ− (t)) > 0, note that if f (δ− (t)) = 0, then we could have removed t from T . Note that such a set T can be found in polynomial time: starting from T = V (for which the required flow exists: consider f ′ = c|δ+ (s) , the restriction of c to δ+ (s)), we remove vertices from T one by one until we obtain a minimal set T such that there exists a flow of value x⋆ (E1 ) from s to T . Definition of lb. defined as follows: We set lb : V → R+ to be a scaled-down variant of lb : V → R+ which is ( w0 · x⋆ (δ− (v)) lb(v) := w0 · x⋆ (δ− (v)) + w1 · ⌈f (δ− (t))⌉ 11 if v ∈ / T, if v ∈ T. The definition of lb is now simply lb(v) = lb(v)/10. The scaling-down is done so as to satisfy lb(V ) ≤ OPT (see Lemma 3.5). Clearly we have lb(v) ≥ w0 for all v ∈ V and lb(t) ≥ w1 + w0 ≥ w1 for terminals t ∈ T . The intuition behind this setting of lb is that we want to pay for each expensive edge e ∈ E1 in the terminal t ∈ T which the flow f “assigns” to e. Indeed, in the split graph we will reroute flow (using f ) so as to ensure that any path which traverses e must then visit such a terminal t to offset the cost of the expensive edge. As for the total cost of lb, note that if we removed the rounding from its definition, then we would get lb(V ) ≤ 2 OPT, since X X w0 · x⋆ (δ− (v)) + w1 · f (δ− (t)) = w0 · x⋆ (E0 ) + w0 · x⋆ (E1 ) + w1 · x⋆ (E1 ) ≤ 2w(x⋆ ) v∈V v∈T P (here we used that f is of value x⋆ (E1 ) = t∈T f (δ− (t))). So, similarly to the 3-light algorithm for unweighted metrics in [Sve15], the key is to argue that rounding does not increase this cost too much. For this, we will take advantage of the small size of T . Details are found in the proof of the following lemma. Lemma 3.5. lb(V ) ≤ 10 · OPT . Proof. The bound follows from elementary calculations: X X lb(V ) = w0 · x⋆ (δ− (v)) + w1 · ⌈f (δ− (t))⌉ v∈V ≤ w0 · X t∈T ⋆ − x (δ (v)) + w1 · v∈V ⋆ X t∈T ⋆  f (δ− (t)) + 1 ≤ w0 · x (E) + w1 · (x (E1 ) + |T |) ≤ w(x⋆ ) + w1 · 9x⋆ (E1 ) ≤ 10w(x⋆ ) (recall that |T | ≤ 8x⋆ (E1 ) by Lemma 3.4). Construction of the split graph. The next step is to reroute flow so as to ensure that all expensive edges are “paid for” by the lb at terminals. To this end, we define a new split graph and a split circulation on it (see also Fig. 1 for an example). Definition 3.6. The split graph Gsp is defined as follows. For every v ∈ V we create two copies v 0 and v 1 in V (Gsp ). For every cheap edge (u, v) ∈ E0 : • if x⋆ (u, v) − f (u, v) > 0, create an edge (u0 , v 0 ) in E(Gsp ) with x⋆sp (u, v) = x⋆ (u, v) − f (u, v), • if f (u, v) > 0, create an edge (u1 , v 1 ) in E(Gsp ) with x⋆sp (u, v) = f (u, v). For every expensive edge (u, v) ∈ E1 we create one edge (u0 , v 1 ) in E(Gsp ) with x⋆sp (u, v) = f (u, v). Finally, for each t ∈ T we create an edge (t1 , t0 ) in E(Gsp ) with x⋆sp (t1 , t0 ) = f (δ− (t)). The new edges are weighted as follows: images of edges in E0 have weight w0 , the images of edges in E1 have weight w1 , and the new edges (t1 , t0 ) have weight 0. Let us denote the new weight function by wsp . Vertices v 0 will be called free vertices and vertices v 1 will be called debt vertices. Edges entering a free vertex will be called free edges, and those entering a debt vertex will be called debt edges. 12 A fundamental consequence of our construction is the following. Fact 3.7. Consider any path P in Gsp such that the first edge of P is a debt edge and the last one is a free edge or an expensive edge. Then P must go through a terminal, i.e., it must contain an edge (t1 , t0 ) for some t ∈ T .  We also have the following two properties by design. Fact 3.8. The vector x⋆sp : E(Gsp ) → R+ is a circulation in Gsp . Proof. Intuitively, this is because our rerouting corresponds to taking every path v0 , v1 , ..., vk in a path-cycle decomposition of f (where (v0 , v1 ) is an expensive edge and vk ∈ T is a terminal) and, rather than placing it on the “free level” in Gsp (i.e., mapping it to v00 , v10 , ..., vk0 ), instead 1 , v 1 , v 0 . We can think of the edge (v 0 , v 1 ) as incurring a routing it as follows: v00 , v11 , v21 , ..., vk−1 0 1 k k debt, and of the edge (vk1 , vk0 ) as discharging this debt. Now we proceed to give a formal proof. For all v ∈ V we will prove that x⋆sp (δ+ (v 0 )) = ⋆ xsp (δ− (v 0 )) and x⋆sp (δ+ (v 1 )) = x⋆sp (δ− (v 1 )). Suppose v = t ∈ T . Then x⋆sp (δ− (t1 )) = f (δ− (t)). Also x⋆sp (δ+ (t1 )) = x⋆sp (t1 , t0 ) = f (δ− (t)) because of the property that f (E0 ∩ δ+ (t)) = 0. For t0 we have x⋆sp (δ− (t0 )) = f (δ− (t)) + (x⋆ − f )(E0 ∩ δ− (t)) = f (E1 ∩ δ− (t)) + x⋆ (E0 ∩ δ− (t)) = x⋆ (δ− (t)) and x⋆sp (δ+ (t0 )) = (x⋆ − f )(E0 ∩ δ+ (t)) + x⋆ (E1 ∩ δ+ (t)) = x⋆ (E0 ∩ δ+ (t)) + x⋆ (E1 ∩ δ+ (t)) = x⋆ (δ+ (t)) where the second inequality again follows by f (E0 ∩ δ+ (t)) = 0. This implies that x⋆sp (δ− (t0 )) = x⋆ (δ− (t)) = x⋆ (δ+ (t)) = x⋆sp (δ+ (t0 )). We turn to the case v ∈ / T . Note that since all expensive edges are saturated by f , and their tails are exactly the sources of f , we have f (E0 ∩ δ+ (v)) = f (E0 ∩ δ− (v)) + x⋆ (E1 ∩ δ− (v)). (3) Since the left hand side is equal to x⋆sp (δ+ (v 1 )) and the right hand side is x⋆sp (δ− (v 1 )), we have proved our claim for v 1 . For v 0 , note that the incoming edges of v0 are all cheap, and the incoming flow is x⋆sp (δ− (v 0 )) = (x⋆ − f )(E0 ∩ δ− (v)). As for outgoing flow, v 0 is also the tail of all expensive edges whose tail in G was v, i.e., x⋆sp (δ+ (v 0 )) = (x⋆ − f )(E0 ∩ δ+ (v)) + x⋆ (E1 ∩ δ+ (v)) = x⋆ (δ+ (v)) − f (E0 ∩ δ+ (v)) = x⋆ (δ− (v)) − f (E0 ∩ δ− (v)) − x⋆ (E1 ∩ δ− (v)) = x⋆ (E0 ∩ δ− (v)) − f (E0 ∩ δ− (v)) = (x⋆ − f )(E0 ∩ δ− (v)) = x⋆sp (δ− (v 0 )), where the third equality is by (3). 13 Gsp and x⋆sp G and f a0 1/3 a 1/3 1/3 1/3 1/3 e b 0 2/3 d1 1/3 1/3 2/3 1/3 c g c a1 2/3 1/3 1/3 d0 1/3 1/3 b0 1/3 0 1/3 d 1/3 e0 1/3 2/3 b1 e1 2/3 2/3 g0 0 1/3 1 c1 1/3 g1 1 Figure 1: An example of the construction of Gsp and x⋆sp from G, x⋆ and f . Here x⋆ is 1/3 for the expensive edges (depicted as thick) and 2/3 for the remaining (cheap) edges; the set T of terminals of the flow f is depicted in black. Fact 3.9. For each proper subset U ⊂ V we have x⋆sp (δ− ({v 0 , v 1 : v ∈ U })) = x⋆sp (δ+ ({v 0 , v 1 : v ∈ U })) ≥ 1. In other words, the image of every cut in G is still crossed by at least one unit of x⋆sp . Proof. This follows since x⋆ (δ+ (U )) = x⋆ (δ− (U )) ≥ 1, and contracting all pairs v 0 , v 1 would yield back G and x⋆ . 3.2 Solving Local-Connectivity ATSP Now our algorithm is given a partition V = V1 ∪ ... ∪ Vk of the original vertex set. The objective is to output a set of edges F which crosses all Vi -cuts and is O(1)-light with respect to our lb function. We are aiming for a similar construction as in the unit-weight case: based on the split graph Gsp , we construct an integer circulation problem with an auxiliary vertex Ai representing a certain subset Ui ⊆ Vi for every 1 ≤ i ≤ k. We then map its solution back to the original graph and patch up the loose endpoints inside every Ui by a path. However, we have to account for the following difficulties: (i) an edge leaving Ui should also leave Vi ; (ii) debt should not disappear inside Ui : if the edge entering it carries debt but the edge leaving does not, we must make sure this difference can be charged to a terminal in Ui ; (iii) the path used inside Ui must pay for all expensive edges it uses. All three issues can be appropriately tackled by defining an auxiliary graph inside Vi . Edges of the auxiliary graph represent paths containing one expensive edge and one terminal (which can pay for themselves); however, these paths may not map to paths in the split graph. We select the subset Ui ⊆ Vi as a sink component in the auxiliary graph. For convenience, Figs. 2 and 3 give an overview of the different steps, graphs and flows used by our algorithm. Construction of auxiliary graphs and modification of split graph. Our first step is to construct an auxiliary graph for each component Vi . The strong-connectivity structure of this graph will guide our algorithm. Definition 3.10. The auxiliary graph Gaux is a graph with vertex set Vi and the following edge i set: for u, v ∈ Vi , (u, v) ∈ E(Gaux ) if any of the following three conditions is satisfied: i • there is a cheap edge (u, v) ∈ E0 ∩ G[Vi ] inside Vi , or 14 name x⋆ x⋆sp x′sp ′ ysp ysp y F graph G Gsp G′sp G′sp Gsp G G circulation yes yes yes yes no no yes integral no no no yes yes yes yes obtained from the previous by solving LP (Section 1.1) splitting (Definition 3.6) redirecting edges to Ai rounding to integrality (Lemma 3.12) redirecting edges back from Ai mapping back to G adding walks Pi Figure 2: This table summarizes the various circulations and pseudo-flows that appear in our algorithm, in order. • there is a u-v-path in G[Vi ] whose first edge is expensive and all other edges are cheap, and v ∈ T is a terminal – we then call the edge (u, v) ∈ E(Gaux i ) a postpaid edge – or • there is a u-v-path in G[Vi ] whose last edge is expensive and all other edges are cheap, and u ∈ T is a terminal – we then call the edge (u, v) ∈ E(Gaux i ) a prepaid edge. Define the preimage of such an edge (u, v) ∈ E(Gaux i ) to be a shortest path inside Vi as above (in the first case, a single edge). Now, for each i consider a decomposition of Gaux into strongly connected components.5 Let i Ui ⊆ Vi be the vertex set of a sink component in this decomposition. That is, there is no edge aux is constructed based only on from Ui to Vi \ Ui in the auxiliary graph Gaux i . Note that Gi the original graph G and not the split graph Gsp . However, we will solve Local-Connectivity ATSP by solving an integral circulation problem on G′sp : a modification of the split graph Gsp , described as follows. For each i, define Uisp = {v 0 , v 1 : v ∈ Ui } ⊆ V (Gsp ) to be the set of vertices in the split graph corresponding to Ui . (Note that Uisp may not be strongly connected in Gsp .) We are going to reroute part of the x⋆sp flow going in and out of Uisp to a new auxiliary vertex Ai . While the 3-light algorithm for unit-weight graphs rerouted flow from all boundary edges of a component Ui (see Section 1.2), here we will be more careful and choose only a subset of boundary edges of Uisp to be rerouted. To this end, select a subset of edges Xi− ⊆ δ− (Uisp ) with x⋆sp (Xi− ) = 1/2 such that either all edges in Xi− are debt edges, or all are free edges. This is possible since x⋆sp (Uisp ) ≥ 1 by Fact 3.9.6 We define the set of outgoing edges Xi+ ⊆ δ+ (Uisp ) to be, intuitively, the edges over which the flow that entered Uisp by Xi− exits Uisp . That is, consider an arbitrary cycle decomposition of the circulation x⋆sp , and look at the set of cycles containing the edges in Xi− . We define Xi+ as the set of edges on these cycles that first leave Uisp after entering Uisp on an edge in Xi− ; clearly, x⋆sp (Xi+ ) = 1/2.7 Let gi denote the flow on these cycles connecting the heads of edges in Xi− and the tails of edges in Xi+ . We will use the following claim later in the construction. Fact 3.11. Assume all edges in Xi− are debt edges but e ∈ Xi+ is a free edge or an expensive edge. Then there exists a path in Gsp [Ui ] between a vertex t0 (for some terminal t ∈ T ) and the tail of e, made up of only cheap edges. 5 Note that we decompose the vertex set Vi , but with respect to the edge set E(Gaux ), not E(G[Vi ]). i To obtain exactly 1/2, we might need to break an edge up into two copies, dividing its x⋆sp -value between them appropriately, and include one copy in Xi− but not the other; we omit this for simplicity of notation, and assume there is such an edge set with exactly x⋆sp (Xi− ) = 1/2. 7 Again, we might need to split some edges into two copies. 6 15 Gaux i G[Vi ] Ui Gsp and x⋆sp on Vi G′sp and x′sp on Vi Xi+ 1 1 .5 Ai .5 .5 1 .5 .5 Xi+ .5 .5 .5 .5 .5 .5 .5 .5 .5 1 .5 .5 .5 .5 1 Xi− .5 .5 .5 .5 .5 Xi− ′ on V G′sp and ysp i G and F on Vi Xi+ 0 0 0 1 Ai 0 0 0 1 0 Xi− 0 1 1 1 0 Xi+ Xi− Figure 3: An illustration of the different graphs and flows (restricted to a single component Vi ) used in our algorithm for Local-Connectivity ATSP. The black vertices depict terminals. In the split graphs, we depict debt vertices by squares and free vertices by circles. Proof. Consider the cycle in the cycle decomposition that contains e; it enters Ui on a debt edge. Using Fact 3.7, this cycle fragment must contain an edge of the form (t1 , t0 ); pick the last such edge. All edges that follow are free and cheap. We now transform Gsp into a new graph G′sp and x⋆sp into new circulation x′sp as follows. For every set Vi in the partition we introduce a new auxiliary vertex Ai and redirect all edges in Xi− to point to Ai and those in Xi+ to point from Ai . We further subtract the flow gi inside Uisp ; hence the resulting vector x′sp will be a circulation, with x′sp (δ− (Ai )) = 1/2. If Xi− is a set of free edges, then we will say that Ai is a free vertex, otherwise we say that it is a debt vertex. Transforming x′sp into an integral flow and obtaining our solution F . we round x′sp to integrality while respecting degrees of vertices: In the next step ′ on G′ satisfying the following condiLemma 3.12. There exists an integral circulation ysp sp tions: ′ (δ − (v)) ≤ ⌈2x⋆ (δ − (v))⌉ for each v ∈ V (G ), • ysp sp sp 16 ′ (δ − (A )) = 1 for each i. • ysp i ′ can be found in polynomial time. Such a circulation ysp Proof. The bounds are integral, and there exists a fractional circulation which satisfies them, namely 2x′sp . ′ into an Eulerian set of edges F in the original graph G. We can We will now transform ysp think of this as a three-stage process. First, we map all edges adjacent to the auxiliary vertices Ai back to their preimages in Gsp , ′ an integral pseudo-flow y obtaining from ysp sp in Gsp . (We use the term pseudo-flow as now, some vertices may not satisfy flow conservation.) Second, we contract the two copies v 0 and v 1 of every vertex v ∈ V , thus mapping all edges back to their preimages in G. (We remove all edges (t1 , t0 ) for t ∈ T .) This creates an integral pseudo-flow y in G. ′ , now (in y) in each component U Since the in- and out-degree of Ai were exactly 1 in ysp i there is a pair of vertices ui , vi which are the head and tail, respectively, of the mapped-back edges adjacent to Ai . These are the only vertices where flow conservation in y can be violated.8 As the third step, to repair this, we route a walk Pi from ui to vi , as described below. Our Eulerian set of edges F ⊆ E which we finally Preturn is the integral pseudo-flow y plus the union (over i) of all such walks Pi , i.e., 1F = y + i 1Pi . It remains to describe how we route these paths. Fix i. Recall that Ui is strongly connected in Gaux i . We distinguish two cases: ′ (in G′ ) is a debt edge, then select a • If Ai is a free vertex or the edge exiting Ai in ysp sp shortest ui -vi -path in Gaux , map each edge of this path to its preimage path (see Definii tion 3.10) and concatenate them to obtain a ui -vi -walk Pi in Vi .9 ′ (in G′ ) is a free edge, then by Fact 3.11 • If Ai is a debt vertex but the edge exiting Ai in ysp sp there is a terminal t inside Ui , with a path from t to vi using only cheap edges.10 Proceed as above to obtain a ui -t-walk and then append this cheap t-vi -path to it, obtaining a ui -vi -walk Pi in Vi . This concludes the description of the algorithm. In Sections 3.2.1 and 3.2.2 we prove that the returned Eulerian set of edges F has the properties we desire, i.e., e e of (V, F ) we have w(G) e ≤ 10 · lb(G). Lemma 3.13. For every connected component G Lemma 3.14. For every component Vi we have |δF+ (Vi )| ≥ 1. Lemmas 3.5 and 3.13 together prove that our algorithm is 100-light with respect to lb. 3.2.1 Bounding the cost – proof of Lemma 3.13 e to be a connected component of (V, F ). We want to prove the For this section, let us fix G e ≤ 10 · lb(G). e following lightness claim: w(G) Intuitively, our solution is cheap because we built the split graph Gsp so as to ensure that any circulation in Gsp which roughly respects the degree bounds given by x⋆sp has low cost, and 8 It is violated unless ui = vi . Note that this walk may exit Ui , but it will stay inside Vi . 10 Map the path given by Fact 3.11 from Gsp to G. 9 17 because our pseudoflow y is not too far from being a circulation (in particular, the cost of walks Pi can be accounted for). We make this argument precise below. First, recall that the edges in F are edges in the integral pseudo-flow y and the edges of the e if Pi is contained in G e (note that a walk walks P1 , P2 , . . . , Pk . For a walk Pi , we write Pi ⊆ G e e is either contained in or disjoint from G because G is a connected component of (V, F )). Hence X X e = w(G) ye w(e) + w(Pi ). (4) e e∈E(G) e i:Pi ⊆G P We start by analyzing the first term: e∈E(G) e ye w(e). Recall that y is obtained by mapping esp denote the pre-image of G e in Gsp . It will be convenient to define ysp from Gsp to G. Let G the debt of ysp as the number of “unpaid” expensive edges in this component: X X ysp (e) − ysp (t1 , t0 ). debt = e t∈V (G)∩T e sp ):wsp (e)=w1 e∈E(G esp is the difference between the ysp -flow on all expensive edges inside That is, the debt of ysp on G esp (those edges “incur debt”) and the ysp -flow on all edges (t1 , t0 ) inside G esp (those edges G P “discharge debt”). Note also that, by the definition of y from ysp , e∈E(Gesp ):wsp (e)=w1 ysp (e) = P y(e). e e∈E(G):w(e)=w 1 By the construction of Gsp we have the following upper bound on debt. + ′ Lemma 3.15. Let e− i and ei be the incoming and outgoing edges of Ai in ysp . For any i, define ( + 1 if e− i is a debt edge and ei is a free edge, bad(i) = 0 otherwise. Then debt ≤ X bad(i) e i:Pi ⊆G Moreover, if ysp is a circulation, then debt = 0. Proof. In Gsp , the only edges of the form (u0 , v 1 ) are the expensive edges, and the only edges of the form (u1 , v 0 ) are edges (t1 , t0 ) with t ∈ T . Hence, if ysp is a circulation, then X e ysp (e) = ysp (δ− ({v 1 : v ∈ V (G)})) esp ):wsp (e)=w1 e∈E(G e = ysp (δ+ ({v 1 : v ∈ V (G)})) = X ysp (t1 , t0 ), e t∈V (G)∩T which shows that debt = 0 in this case. Now, if ysp is not a circulation, then one can imagine transforming it into one by connecting + the “dangling” endpoints of e− i and ei in Gsp using a new “virtual” edge for each i; this edge + would be from a debt vertex to a free vertex if and only if e− i is a debt edge and ei is a free edge. Hence, by the calculations above, debt is upper-bounded by the number of such new edges in our component. (We do not have equality as the new edges may also be introduced from free vertices to debt vertices.) 18 P Using the above lemma, degree bounds and basic calculations, we upper-bound the term e ye w(e): e∈E(G) Lemma 3.16. We have P e ye w(e) e∈E(G) e ≤ 6 lb(G). Proof. We begin by writing: X X ye + w1 ye w(e) ≤ w0 e e∈E(G) e e∈E(G) X = w0 e e∈E(G) = w0 X X ysp (e) esp ):wsp (e)=w1 e∈E(G  ye + w1 debt + X e t∈V (G)∩T X y(δ− (v)) + w1  ysp (t1 , t0 ) ′ ysp (t1 , t0 ) + w1 · debt . e t∈V (G)∩T e v∈V (G) We bound the first term. Note that for each v ∈ V we have y(δ− (v)) = ysp (δ− ({v 0 , v 1 })) ′ (δ − (v j )) ≤ ⌈2x⋆ (δ − (v j ))⌉ and x⋆ (δ− (v)) = x⋆sp (δ− ({v 0 , v 1 })). Lemma 3.12 guarantees that ysp sp ′ (δ − ({v 0 , v 1 })) ≤ 2x⋆ (δ − (v)) + 2, because: for j ∈ {0, 1}. This implies that ysp • If v ∈ T , then v 1 has only one outgoing edge in Gsp , which goes to v 0 , and thus for any cir′ (δ − ({v 0 , v 1 })) = culation c in Gsp we have c(δ− ({v 0 , v 1 })) = c(δ− (v 0 )). It follows that ysp ′ − 0 ⋆ − 0 ⋆ − 0 ⋆ − 0 1 ysp (δ (v )) ≤ ⌈2xsp (δ (v ))⌉ ≤ 2xsp (δ (v ))+1 = 2xsp (δ ({v , v }))+1 = 2x⋆ (δ− (v))+1. • If v 6∈ T , then there are no edges between v 0 and v 1 in Gsp , and thus for any circulation c in Gsp we have c(δ− ({v 0 , v 1 })) = c(δ− (v 0 )) + c(δ− (v 1 )). It similarly follows ′ (δ − ({v 0 , v 1 })) = y ′ (δ − (v 0 )) + y ′ (δ − (v 1 )) ≤ ⌈2x⋆ (δ − (v 0 ))⌉ + ⌈2x⋆ (δ − (v 1 ))⌉ ≤ that ysp sp sp sp sp − ⋆ 2xsp (δ (v 0 )) + 2x⋆sp (δ− (v 1 )) + 2 = 2x⋆sp (δ− ({v 0 , v 1 })) + 2 = 2x⋆ (δ− (v)) + 2. ′ except for the edges redirected from the auxiliary vertices in G As ysp is the same as ysp sp (which may increase the in-degree of a vertex by at most 1), ′ y(δ− (v)) = ysp (δ− ({v 0 , v 1 })) ≤ ysp (δ− ({v 0 , v 1 })) + 1 ≤ 2x⋆ (δ− (v)) + 3 ≤ 5x⋆ (δ− (v)), where we used x⋆ (δ− (v)) ≥ 1 for the last inequality. Therefore X X X x⋆ (δ− (v)). y(δ− (v)) ≤ 5 · w0 ye = w0 w0 e v∈V (G) e v∈V (G) e e∈E(G) We bound the second term similarly: ′ ′ ysp (t1 , t0 ) = ysp (δ− (t1 )) ≤ ⌈2x⋆sp (δ− (t1 ))⌉ ≤ 2⌈x⋆sp (δ− (t1 ))⌉ = 2⌈f (δ− (t))⌉. Plugging both in we get: X X x⋆ (δ− (v)) + 2 · w1 ye w(e) ≤ 5 · w0 e e∈E(G)  e v∈V (G) ≤ 5 · w0 X x⋆ (δ− (v)) + w1 ⌈f (δ− (t))⌉ + w1 · debt e t∈(G)∩T X e t∈V (G)∩T e v∈V (G) e + w1 · debt . = 5 lb(G) X 19  ⌈f (δ− (t))⌉ + w1 · debt (For the final equality, recall the definition of the function P lb.) We will be done if we show that e w1 · debt ≤ lb(G). By Lemma 3.15 we have debt ≤ i:Pi ⊆Ge bad(i). Whenever bad(i) = 1, Fact 3.7 implies that Pi contains a terminal, and so lb(Pi ) ≥ w1 . Consequently, X X w1 · debt ≤ w1 ≤ lb(Pi ) ≤ lb(G̃). e i:Pi ⊆G,bad(i)=1 e i:Pi ⊆G,bad(i)=1 In the last inequality we used that the different Pi ’s are disjoint subsets of G̃ (each Pi is contained in Vi ). The statement follows. It remains to argue that the cost of the walks Pi can be accommodated. Lemma 3.17. For every i we have w(Pi ) ≤ 4 · lb(Pi ). Proof. This holds because in Pi , each vertex has low indegree and expensive edges can be offset against terminals. Concretely, we have the following two claims: Claim 6. For each v ∈ V (Pi ) we have |δP−i (v)| ≤ 4. (In particular, |E(Pi )| ≤ 4|V (Pi )|.) (see Proof. This follows from the fact that we select a shortest ui -vi -path (or ui -t-path) in Gaux i Definition 3.10). This implies that each vertex v appears as an internal vertex on at most one preimage path of a prepaid edge (otherwise we could shortcut the path in Gaux i ). Same applies for postpaid edges. And similarly, each v appears as head of at most one preimage path of any kind (single cheap edge, prepaid or postpaid). This means that v has indegree at most 3 on the walk created from preimages of edges in Gaux i . The path from t to ui can contribute a fourth incoming edge. Claim 7. The number of expensive edges on Pi is at most twice the number of terminals on Pi , i.e., |E1 ∩ E(Pi )| ≤ 2 · |T ∩ V (Pi )|. Proof. Expensive edges appear only in preimage paths of prepaid or postpaid edges, one per such preimage path, and such a path also contains a terminal (as its head or tail). A terminal can only appear as head of one prepaid and as tail of one postpaid edge (otherwise, again, we could shortcut the path in Gaux i ). Having these two claims, we can bound the cost: w(Pi ) ≤ w0 · |E(Pi )| + w1 · |E1 ∩ E(Pi )| ≤ w0 · 4|V (Pi )| + w1 · 2|T ∩ V (Pi )| ≤ 4 (w0 · |V (Pi )| + w1 · |T ∩ V (Pi )|) ≤ 4 · lb(Pi ). Now we have all the tools needed to prove our lightness claim, i.e., to upper-bound (4) by e 10 · lb(G): X X e = w(G) ye w(e) + w(Pi ) e e∈E(G) e + ≤ 6 · lb(G) X e i:Pi ⊆G 4 · lb(Pi ) e i:Pi ⊆G e + 4 · lb(G) e ≤ 6 · lb(G) e = 10 · lb(G), where line 2 is by Lemmas 3.16 and 3.17, and in line 3 we use that all walks Pi are disjoint and e This completes the proof of Lemma 3.13. in G.  20 3.2.2 Crossing the cuts – proof of Lemma 3.14 In this section we prove that our solution F ⊆ E crosses each component Vi . Let us recall that aux from Ui is a sink strongly-connected component of the graph Gaux i , so there is no edge in Gi Ui to Vi \ Ui . However, there can be such edges in G and therefore it might not be the case that the edge in F which leaves Ui also leaves Vi . We will however argue that F does contain some edge leaving Vi . Assume towards a contradiction that this is not true, i.e., that Vi is a union of connected components of the graph (V, F ). ′ (in G′ ) with tail A ; let e Fix i. Consider the (only) edge in ysp i sp be its image in ysp (in sp Gsp ) and e its image in y (in G). We have esp ∈ Xi+ ; the tail of e is vi ∈ Ui , and the head of e is in Vi \ Ui (since we assumed that no edge of F leaves Vi ). The following claim is the first, simplest example of how we use the structure of Gaux to i reason about our solution F . Claim 8. Any edge from Ui to Vi \ Ui in G is expensive. (Therefore e is expensive, and esp is a debt edge.) Proof. If there was such a cheap edge, it would also appear in Gaux i . However, there is no edge in Gaux from U to V \ U . i i i i Define (Vi \ Ui )sp = {v 0 , v 1 : v ∈ Vi \ Ui } ⊆ V (Gsp ). We can now start traversing ysp inside (Vi \ Ui )sp like an Eulerian graph (since ysp satisfies flow conservation in (Vi \ Ui )sp ), starting from esp , until we return to Uisp . Claim 9. We will not reach a terminal before returning to Uisp . (Therefore we will return on a debt edge e′sp .) Proof. If there was a terminal t ∈ T ∩ (Vi \ Ui ) such that there is a path from head(esp ) (a debt vertex) to t1 in Gsp [Vi ], then (assuming without loss of generality that there is no other terminal on this path) all edges of this path are cheap. Therefore e together with the image of this path in G would give rise to a postpaid edge (tail(e), t) from Ui to Vi \ Ui in Gaux i , a contradiction. Since head(esp ) is a debt vertex and we do not visit a terminal, we will return on a debt edge. Now we distinguish two cases. Suppose that the debt edge e′sp on which we return to Uisp is ′ (in G′ ) with head A . This means that we can not the image in Gsp of the (only) edge in ysp i sp sp sp keep following y inside Ui until we exit Ui again via some edge e′′sp (maybe e′′sp = esp ). By Claim 8, e′′sp is expensive. So we have followed a path (a segment of y) which contains a debt edge and later an expensive edge; this means (see Fact 3.7) that it must also contain a terminal in between. Pick the last such terminal t; then the segment of y between t0 and tail(e′′sp ) must consist of cheap (free) edges. This gives rise to a prepaid edge (t, head(e′′sp )) from Ui to Vi \ Ui in Gaux i , a contradiction. So suppose instead that the debt edge e′sp on which we return to Uisp is, in fact, the image in ′ (in G′ ) with head A . This means that e′ ∈ X − . Recall that by Gsp of the (only) edge in ysp i sp sp i definition, Xi− consists only of debt or only of free edges, and therefore every edge in Xi− must be a debt edge. By Fact 3.11, Gsp [Ui ] contains a path from a terminal t0 via cheap edges to the expensive edge esp . Again, the image of this path in G gives rise to a prepaid edge (t, head(esp )) from Ui to Vi \ Ui in Gaux  i , a contradiction. This concludes the proof of Lemma 3.14. 21 Acknowledgment An earlier version of this paper has appeared in the proceedings of IPCO 2016 (the 18th Conference on Integer Programming and Combinatorial Optimization). This work has been published in Mathematical Programming Series B. The final publication is available at Springer via http://dx.doi.org/10.1007/s10107-017-1195-7. References [AG15] Nima Anari and Shayan Oveis Gharan. Effective-resistance-reducing flows and asymmetric TSP. In Proceedings of the 56th Annual IEEE Symposium on Foundations of Computer Science (FOCS). IEEE, 2015. [AGK+ 98] Sanjeev Arora, Michelangelo Grigni, David R. Karger, Philip N. Klein, and Andrzej Woloszyn. A polynomial-time approximation scheme for weighted planar graph TSP. In Proceedings of the Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 1998, pages 33–41, 1998. [AGM+ 10] Arash Asadpour, Michel X. Goemans, Aleksander Madry, Shayan Oveis Gharan, and Amin Saberi. An O(log n/ log log n)-approximation algorithm for the asymmetric traveling salesman problem. In Proceedings of the Twenty-First Annual ACMSIAM Symposium on Discrete Algorithms, SODA 2010, pages 379–389, 2010. [BK06] Piotr Berman and Marek Karpinski. 8/7-approximation algorithm for (1, 2)-TSP. In Proceedings of the Seventeenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA, pages 641–648, 2006. [Blä04] Markus Bläser. A 3/4-approximation algorithm for maximum ATSP with weights zero and one. In Approximation, Randomization, and Combinatorial Optimization, Algorithms and Techniques, 7th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX, pages 61–71, 2004. [Chr76] Nicos Christofides. Worst-case analysis of a new heuristic for the travelling salesman problem. Technical report, DTIC Document, 1976. [ES14] Jeff Erickson and Anastasios Sidiropoulos. A near-optimal approximation algorithm for asymmetric TSP on embedded graphs. In 30th Annual Symposium on Computational Geometry (SOCG), page 130, 2014. [FGM82] Alan M. Frieze, Giulia Galbiati, and Francesco Maffioli. On the worst-case performance of some algorithms for the asymmetric traveling salesman problem. Networks, 12(1):23–39, 1982. [GKP95] Michelangelo Grigni, Elias Koutsoupias, and Christos H. Papadimitriou. An approximation scheme for planar graph TSP. In 36th Annual Symposium on Foundations of Computer Science, FOCS 1995, pages 640–645, 1995. [GS11] Shayan Oveis Gharan and Amin Saberi. The asymmetric traveling salesman problem on graphs with bounded genus. In Proceedings of the twenty-second annual ACMSIAM symposium on Discrete Algorithms, pages 967–975. SIAM, 2011. 22 [GSS11] Shayan Oveis Gharan, Amin Saberi, and Mohit Singh. A randomized rounding approach to the traveling salesman problem. In IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, pages 550–559, 2011. [KLS15] Marek Karpinski, Michael Lampis, and Richard Schmied. New inapproximability bounds for TSP. J. Comput. Syst. Sci., 81(8):1665–1677, 2015. [MS11] Tobias Mömke and Ola Svensson. Approximating graphic TSP by matchings. In IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011, pages 560–569, 2011. [Muc12] Marcin Mucha. 13/9-approximation for graphic TSP. In 29th International Symposium on Theoretical Aspects of Computer Science, STACS 2012, pages 30–41, 2012. [PY93] Christos H. Papadimitriou and Mihalis Yannakakis. The traveling salesman problem with distances one and two. Math. Oper. Res., 18(1):1–11, 1993. [SV14] András Sebő and Jens Vygen. Shorter tours by nicer ears: 7/5-approximation for the graph-TSP, 3/2 for the path version, and 4/3 for two-edge-connected subgraphs. Combinatorica, 34(5):597–629, 2014. [Sve15] Ola Svensson. Approximating ATSP by relaxing connectivity. In Proceedings of the 56th Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2015. URL: http://arxiv.org/abs/1502.02051. [WS11] David P. Williamson and David B. Shmoys. The Design of Approximation Algorithms. Cambridge University Press, 2011. 23
8cs.DS
On interestingness measures of formal concepts arXiv:1611.02646v2 [cs.AI] 19 Apr 2017 Sergei O. Kuznetsov, Tatiana Makhalova National Research University Higher School of Economics Kochnovsky pr. 3, Moscow 125319, Russia [email protected], [email protected] Abstract. Formal concepts and closed itemsets proved to be of big importance for knowledge discovery, both as a tool for concise representation of association rules and a tool for clustering and constructing domain taxonomies and ontologies. Exponential explosion makes it difficult to consider the whole concept lattice arising from data, one needs to select most useful and interesting concepts. In this paper interestingness measures of concepts are considered and compared with respect to various aspects, such as efficiency of computation and applicability to noisy data and performing ranking correlation. Formal Concept Analysis intrestingess measures closed itemsets 1 Introduction and Motivation Formal concepts play an important role in knowledge discovery, since they can be used for concise representation of association rules, clustering and constructing domain taxonomies, see surveys [40, 41, 34]. Most of the difficulties in the application of closed itemsets (or, a more common name, attribute sets) to practical datasets are caused by the exponential number of formal concepts. It complicates both the process of the model construction and the analysis of the results as well. Recently, several approaches to tackle these issues were introduced. For a dataset all closed sets of attributes ordered by inclusion relation make a lattice, below we use the terminology of concept lattices and Formal Concept Analysis [21]. In terms of FCA, a concept is a pair consisting of an extent (a closed set of objects, or transactions in data mining terms) and an intent (the respective closed set of attributes, or itemset). We propose to divide existing approaches to simplifying concept mining into the groups presented in Figure 1. Methods of the first group compute the concept lattice built on simplified data. The most general way to get smaller lattices is to reduce the size of datasets preserving the most important information. For this purpose such methods as Singular Value Decomposition [15], Non-negative Matrix Decomposition [44] and more computationally efficient k-Means [16], fuzzy k-Means [18], agglomerative clustering of objects based on a similarity function of weighted attributes [17] are used. Another way to reduce the lattice size was proposed in [19]. This approach aims at the reduction in the number of incomparable concepts by making slight changes of the context. Approaches to concept mining simplification Preprocessing: modification of the original data Dimension reduction Computing: approximate concepts (clusters) Changing of data entries Computing a subset of concepts Application of an antimonotonic function Postprocessing: application of indices to concepts Modification of a closure operator Fig. 1: Classification of methods for concept mining simplification Computing approximate concepts, or so-called bi-/triclusters, is becoming increasingly more ubiquitous nowadays. In general, biclustering refers to performing simultaneous row–column clustering of real-valued data. Biclusters itself can be defined in different ways [36], e.g. as a submatrix with constant values, with constant values on rows or columns, with coherent values, etc. In the case of binary data bicluster is defined as a submatrix with high density (i.e., the proportion of 1s). In [24] authors presented a set of evaluation criteria for triclusters, which are density, coverage, diversity, noise tolerance and cardinality. As it was shown in experiments, the optimality by some criteria imposes non-optimality w.r.t. other criteria and the optimization by a particular criteria underlies a clustering algorithm itself. Put differently, in the case of multimodal clustering the choice of criteria for cluster evaluation defines the choice of a clustering algorithm rather than selection of a subset of computed clusters. Methods from “Computing a subset of concepts” class aim at simplifying the analysis of a concept lattice by computing a subset of concepts. It can be done, e.g., by defining an antimonotonic function w.r.t. the size of concept extent. Computing concepts with extents exceeding a threshold was proposed in [35] and studied in relation to frequent itemsets mining in [45], where the authors propose an algorithm for building iceberg lattices. In this case some interesting rare concepts can be discarded, thus, it yields fewer results. From this perspective, the most promising approach is applying ∆-stability. Σoϕια algorithm (Sofia) for computing a subset of most ∆-stable concepts was proposed in [10]. ∆-stability will be considered in Section 3. The most well-reasoned way to build a subset of concepts is to modify the closure operator and to restrict the creation of new concepts by involving background knowledge. In [8] attribute-dependency formulas (AD-formulas) were introduced. The authors define mandatory attributes for particular attributes of a context. If an attribute is included in a closed attribute set without its mandatory attributes the concepts will not be generated. In [5] an analogous approach based on weights of attributes was proposed. The interestingness of concepts is estimated using an aggregation function (average, maximum or minimum), which is applied to a generator, a minimal generator, or to an intent. The authors also note the correspondence between the numerical approach and AD-formulas. Some restricted closure operators naturally arise from analyzed data and subject area. Carpineto and Romano [13] considered the document–term relation, where objects are documents and terms used in documents are attributes. The authors proposed to modify the closure operator using a hierarchy of terms as follows: two different attributes are considered as equivalent if they have a common ancestor that is a more general term. In the last decade some polynomial-time algorithms for computing Galois sub-hierarchies were proposed, see [9, 2]. The main idea of methods from the latter group is to assess interestingness of concepts by means of interestingness indices. This approach does not have disadvantages of the previously described methods, namely, getting concepts approximately corresponding to original objects or attributes, missing interesting concepts due to early termination of an algorithm, a costly preprocessing procedure requiring the involvement of domain experts or another reliable source of background knowledge. This class, however, has its own drawbacks, for example, the exponential complexity of the lattice computation can be aggravated by high complexity of index computation. The most promising approach from this point of view is to compute a subset of concepts using the idea of antimonotonicity of an index. When the index value is antimonotonic w.r.t. the order relation of the concept lattice, one can start computing from the top concept and proceed top-down until the concepts with the lowest possible value given by a threshold. In this paper we focus on a thorough study of concept indices. We leave statistical significance tests of concepts beyond this study, some basic information on statistical approaches to itemsets mining can be found in [48]. The paper is naturally divided into three parts. First, we investigate the main features of indices and discuss the intuition behind them, as well as their applicability in practice with regard to their computation cost. Second, we provide a framework for the development of new indices and give detailed information on the basic metrics and operations that can be used to create new indices. Third, we describe the results of the comparative study of indices regarding the following aspects: estimation of interestingness concepts, approximation of intractable indices and non-sensitivity to noise. The rest of the paper is organized as follows. Section 2 briefly introduces the main definitions of Formal Concept Analysis. Section 3 is devoted to the description of indices. The main index features are given in Section 3.1. Section 3.2 provides the basic information on indices and respective formulas. In Section 3.3 we use the known indices and their features to build a concept lattice, then we reveal the most interesting concepts (i.e. groups of indices) w.r.t. certain indices. In Section 4 we propose guidelines for the development of new indices based on indices for arbitrary sets of attributes. We discuss the approaches to measuring interestingness and provide the basic metrics and operations that can be used for index construction. Section 5 focuses on a comparative study of the indices w.r.t. the most important tasks: selection of interesting concepts (Section 5.1), approximation of intractable indices (Section 5.2) and noise reduction (Section 5.3). In Section 6 we conclude and discuss the future work. 2 Formal Concept Analysis: Basic Definitions Here we briefly recall the main definitions of FCA [21]. Given a finite set of objects G and a finite set of attributes M , we consider an incidence relation I ⊆ G × M so that (g, m) ∈ I if object g ∈ G has attribute m ∈ M . A formal 0 context is a triple (G, M, I). The derivation operators (·) are defined for A ⊆ G and B ⊆ M as follows: A0 = {m ∈ M | gIm for all g ∈ A} B 0 = {g ∈ G | gIm for all m ∈ B} A0 is the set of attributes common to all objects of A and B 0 is the set of 0 objects sharing all attributes from B. The double application of (·) is a closure 00 operator, i.e., (·) is extensive, idempotent and monotone. Sets A ⊆ G, B ⊆ M , such that A = A00 and B = B 00 are said to be closed. A (formal) concept is a pair (A, B), where A ⊆ G, B ⊆ M and A0 = B, 0 B = A. A is called the (formal) extent and B is called the (formal) intent of the concept (A, B). A concept lattice (or Galois lattice) is a partially ordered set of concepts, the order 6 is defined as follows: (A, B) ≤ (C, D) iff A ⊆ C (D ⊆ B), a pair (A, B) is a subconcept of (C, D) and (C, D) is a superconcept of (A, B). Each finite lattice has the highest element with A = G, called the top element, and the lowest element with B = M , called the bottom element. a1 stability × ∆l × ∆h (collapse × index) stab2N OE × stab2OE × stab2OIE × robustness × a2 a3 a4 a5 a6 a7 a8 a9 a10 a11 × × × × × × × × × × × × × × × × × × × × × × × × × stability, ∆l , ∆h , stab2N OE , stab2OE ,stab2OIE , robustness {a1 , a2 } × × × × × × × × × × × × × × × × × × × × × × a1 : (designed) for closed subsets, a2 : not applicable to arbitrary subsets, a3 : based on comparison to other attribute subsets, a4 : based on comparison to neighboring attribute subsets, a5 : size-based, a6 : monotonic–antimonotonic w.r.t. order on attribute sets, a7 : using a tuning parameter, a8 : polynomial complexity, a9 : linear complexity, a10 : cubic and higher complexity, a11 : computable in one-pass over data stability, robustness, {a1 , a2 , a10 } ∆l , ∆h , stab2N OE , stab2OE ,stab2OIE , robustness a1 , a2 , a3 , a4 , a6 ∆l , ∆h , stab2OIE , robustness a1 , a2 , a3 , a4 , a6 , a11 robustness a1 , a2 , a3 , a4 , a6 , a7 , a10 , a11 ∆l , ∆h , stab2N OE , stab2OE ,stab2OIE a1 , a2 , a3 , a4 , a5 , a6 , a8 , a9 ∆l , ∆h ,stab2OIE a1 , a2 , a3 , a4 , a5 , a6 , a8 , a9 , a11 – a1 , a2 , a3 , a4 , a5 , a6 , a8 , a9 , a10 a11 Fig. 2: Formal context of subsampling-based indices (on the left) and the corresponding concept lattice (on the right) Example 1 Let us consider a formal context given in Fig. 2. Group of subsampling-based indices for formal concepts is a set of objects, their essential features are attributes. The corresponding concept lattice (see Fig. 2, on the right) consists of 8 concepts. 3 Closed Itemset Indices The application of indices offers advantages over other approaches to reducing of the number of analyzed concepts. For example, it provides a thorough study of a concept lattice without recomputing the lattice and ensures easily interpretable results by preserving objects and attributes corresponding exactly to the original data. However, the exponential time complexity of lattice computation makes attracts attention to antimonotonic indices, since they allow generating only a subset of formal concepts. In this section we propose a hierarchical clustering of the existing indices for closed set of attributes using the FCA-based approach. We describe the most important index features and use them to build a concept lattice of indices: we consider a formal context of indices and their features, and then compute the ordered set of formal concepts. Upon that we apply some of the described indices to identify the most interesting (top-ranked) concepts. 3.1 Description of Index Features Some of the indices originally designed to assess concepts (“designed for closed subsets”) can not be applied to an arbitrary set of attributes (“not applicable to arbitrary subsets”), whereas others were originally designed as measures for arbitrary attribute sets. In our study we consider only two indices for arbitrary sets of attributes, i.e. support/frequency, due to their importance in concept mining. There exist indices which deal with each attribute of an intent (or a whole context) separately and assess the contribution of these attributes to a concept (“using all of the single attributes of a context”). Another essential feature of the concept indices is the use of other concepts (“based on comparison to other attribute subsets”). The concepts are selected based on a particular condition or index values, i.e., frequent, (dis)similar to some other concepts, etc. In this case an index is comprised of relative values or differences between absolute values of the selected concepts and the assessed concept. We additionally add only one predicate “is neighbor” (“based on comparison to neighboring attribute subsets”), since the direct neighbors of a concept are highly important both for computing closed itemsets and for concept mining. As it was noted previously, support has a special place in concept mining. We define “support-based (for subsets of attributes)” and “support-based (for single attributes)” features to characterize whether an index is based on support. Support may be regarded as probability of an attribute or a set of attributes, along with it we also consider conditional probability (“using conditional (joint) probability”). “Size-based” indices use the size of an intent or an extent, the total number of attributes or objects, thus, they do not require to assess particular elements of a context. As it was mentioned before, the antimonotonicity is one of the most important index properties, since it allows one to solve the problem of exponential complexity of algorithms for generating concepts. The time complexity is referred through the following attributes: “polynomial complexity”, “sublinear complexity”, “linear complexity”, “quadratic complexity”, “cubic and higher complexity”. These groups are defined w.r.t. the size of a context, i.e., |G||M | under the assumption that the lattice has been computed. The possibility to compute indices in “one-pass over data” is relevant to complexity problem, but mostly it refers to the memory complexity and analysis of streaming data. Some indices have a tuning parameter (“using a tuning parameter”) that either changes the concept rankings or is used as a binarization threshold (“boolean value”). 3.2 Description of Indices In our study we use the indices described below. Stability Stability indices for formal concepts were introduced in [30, 31] and modified in [33]. For a formal concept (A, B) the (integral) intentional stability index is the probability that B will remain closed when removing a subset of objects from extent A with equal probability. The intentional stability is defined as follows: | {C ⊆ A|C 0 = B} | 2|A| Intentional stability measures overfitting, i.e., the dependence of an intent (i.e.,a closed pattern) on observations (objects of the respective extent). Extensional stability is defined dually. In [11] it was noted that stability indices are antimonotonic w.r.t. chain of projections. This class of antimonotonicity contains previously known classes [46] and allows one to generate k most stable concepts with delay polynomial in k and the input size. Stabi (A, B) = Estimates of stability Logarithmic Stability The problem of computing stability is #P -complete [31], which hampers its application in practice where one usually faces large-sized contexts. In [4] it was proposed to use Monte Carlo approximation of stability, in [12] combination of Monte Carlo and an upper-bound estimate is described. The authors use the logarithmic scale of stability (the concept rankings remain the same): LStab (c) = −log2 (1 − Stab (c)) It allows one to deal with the problem described in [25]: closeness of stability values to 1 for large contexts. The bounds of stability are given by X ∆min (c) − log2 (|M |) ≤ −log2 2−∆(c,d) ≤ LStab (c) ≤ ∆min (c) , d∈DD(c) where ∆min (c) = mind∈DD(c) ∆ (c, d), DD (c) is the set of all direct descendants of c in a lattice and ∆ (c, d) is the size of the set-difference between extents of formal concepts c and d. In [32] more precise upper bounds of the logarithmic stability were described. These estimates are based on two direct neighbors. The formulas are given below. Max-disjoint-extents upper bound (stab2N OE ) The estimate uses two lower neighbors, one of them has the maximal extent among all the lower neighbors, the second one has the maximal extent among the rest of neighbors and does not share elements with the first one: (∅) LStab (c) ≤ ∆min (c) + ∆min (c, ∆min (c)) (∅) where ∆min (c) = mind∈DD(c) ∆ (c, d), ∆min (c, ∆min (c)) = d1 + d2 , where d1 = mind∈DD(c) ∆ (c, d) , d2 = mind∈DD {∆ (c, d) |d1 ∩ d = ∅} . Max-distinguished-extents upper bound (stab2OE ) To compute this index the first neighbor is selected in the same way, while the second one meets the following condition: its extent has the maximal number of objects not included in the extent of the first one. LStab (c) ≤ |d1 | + |d2 | − |d1 ∩ d2 |  where d2 = mind∈DD(c) ∆ (c, d) |d2 − d1 = maxd∗ ∈DD(c) d∗ − d1 and d1 = mind∈DD(c) ∆ (c, d). Max-extent upper bound (stab2OIE ) The estimate takes into account two different maximal extends: LStab (c) ≤ |d1 | + |d2 | − |d1 ∩ d2 | where d1 = mind∈DD(c) (c, d), d2 = mind∈DD (c) and d1 6= d2 . But such a “greedy” strategy can give an underestimated upper bound. Stability Indices The notion of stability was revised and considered with regard to estimating concept-based hypotheses in [31]. Level-wise stability indices are studied. For formal concept c = (A, B) stability index of the jth γ (c) level (2 ≤ j ≤ n − 1) is defined as follows: Jj (c) = jn , where n = |A|, j 0 γj (c) = | {Y ⊂ A | |Y | = j, Y = B} |. Pn−1 Integral stability index is defined as JΣ (c) = i=2 Ji . In this study we also consider integral stability indices of the jth level (2 ≤ j ≤ n − 1): Pj – Minor-set-based integral stability: JΣj (c) = i=2 Ji Pn−1 – Major-set-based integral stability:JΣj (c) = i=j Ji . Integral stability of the jth level may be regarded as the approximation of the stability index. The survey of the problem of best approximation is given in Section 5. Robustness Robustness [46] of an (arbitrary) set of attributes of a dataset has been introduced to estimate the probability that a pattern would still be generated if some transactions (rows) of the dataset are removed. To compute this index one needs to generate 2|G| subsamples, where G is the set of transactions (objects). Some classes of itemsets allow computing this index using an exact formula instead of subsampling the data. Here we use the formula for closed sets of attributes. For formal concept (A, B) this is the probability that B will remain closed when removing an object (row) from extent A with probability 1 − α. Hence, stability index can be considered as an instantiation of robustness for α = 0.5. So, for formal concept c = (A, B) the robustness is given as follows: X |B |−|Bc | |A |−|Ad | r (c, α) = (−1) d (1 − α) c d≤c Proposition 1. Stability of concept (A, B) is equal to its robustness for α = 0.5. Proof In [43] it was noted that stability can be computed recursively by the traversal of covering relation (i.e., graph of the diagram) of the concept lattice from the bottom concept upwards as follows: Stab(A, B) = | {C ⊆ A | C 0 = B} | σ(A, B) = , 2|A| 2|A| P where σ(A, B) = 2|A| − (C,D)<(A,B) σ(C, D). In [4] the following relation of stability to Möbius function µ [22] was shown: X | {C ⊆ A | C 0 = B} | = 2|C| µ((C, D), (A, B)) (C,D)≤(A,B) Using the Möbius function lattice, the formula takes the folP of the concept |C| lowing form: σ(A, B) = µ ((C, D), (A, B)) and stability can (C,D)≤(A,B) 2 alternatively be represented as X Stab(A, B) = 2|C|−|A| µ ((C, D), (A, B)) . (C,D)≤(A,B) Robustness of concept (A, B) is computed as X ak = { P|A| k=0 ak (1 − α)k , where e(D, B) | |A| − |C| = k}, (C,D)≤(A,B) and e(D, B) =  − 1 P (C,D)<(E,F )≤(A,B) if D = B e(F, B) otherwise. This formula gives Möbius function, thus robustness can be rewritten as r((A, B), α) = X (C,D)≤(A,B) µ ((C, D), (A, B)) (1 − α)|A|−|C| . Replacing 1 − α by 0.5 we obtain the formula for stability, which completes the proof.  Concept Probability In [29] it was noticed that some interesting concepts with the small number of objects (i.e., small extents) usually have low stability values. The concept probability was proposed to get rid of this bias. The definition of concept probability from [29] is equivalent to the concept probability introduced earlier by R. Emilion [20]. The probability that an arbitrary object has all attributes from set B is defined as follows: Y pB = pm m∈B Concept probability is defined as the probability of B being closed: 00 p (B = B ) = n X k=0 0 00 p (|B | = k, B = B ) = n X k=0 " Ckn pkB n−k (1 − pB ) Y m∈B / 1− pkm  # where n = |G|. Concept probability aggregates three probabilistic components: the occurrence of each attribute from B in all k objects, the absence of at least one attribute from B in other objects and the absence of other attributes shared by all k objects. Separation The index was introduced in [29] to estimate the specificity of the object–attribute relation of a concept with respect to the formal context. It is defined as a part of the area covered by a formal concept among all nonzero elements in the rows and columns corresponding to the formal concept. s (A, B) = P 0 g∈A |g | + |A||B| P m∈B |m0 | − |A||B| Frequency (support) It is one of the most popular measures in the theory of pattern mining. Frequency arises from the assumption that the most “interesting” concepts are frequent ones: supp (A, B) = |A| |G| The support provides an efficient level-wise algorithm of semilattice computing since it exhibits antimonotonicity (a priori property [1, 37]): B1 ⊂ B2 → supp (B1 ) ≥ supp (B2 ) . In this study we say that a set of attributes is frequent if its support exceeds a certain threshold. So, the frequency of an attribute set means that it is frequent. Monocle The Monocle [47] is a method that defines concept weights based on a subset of concepts. The weight function has the following form:   ! X X   w(c, H) = |A| + NG (g, H) · |B| + NM (m, H) , g∈A m∈B where NG (g, H) = |{(A, B) | (A, B) ∈ H, g ∈ / A}| is the number of concepts in H not containing an object g, NM (m, H) is defined similarly for attributes, H ⊂ L. The weight function is monotone w.r.t. the size of H. δ-Tolerance Closed Frequent Itemsets (δ-TCFIs) δ-TCFIs [14] uses the subset of lower neighbors (direct descendants) in the concept lattice to assess concept interestingness. The main idea is to select relatively frequent concepts with respect to their direct descendants. Concept c = (A, B) is δ-TCFI iff it meets the following condition: ∀d = (C, D), such that |D| = |B| + 1, supp(D) ≥ (1 − δ) · supp(B), where δ ∈ [0, 1] is a tolerance factor. Margin-closed itemset The index was proposed by Moerchen et al. [38]. A margin closed itemset has no supersets with almost the same support, by definition, it satisfies the following expression: X ∈ F I & ∀X 0 ∈ F I : X ⊂ X 0 ⇒ supp(X 0 ) supp(X) ≤ 1 − α, where F I is a set of frequent itemsets. As can be seen from the formulas, margin-closed itemset and δ-TCFIs indices are very close to each others. They are based on the same indices computed on different subsets of concepts. In our study we consider the relaxed formulation of the margin-closed itemset index, namely, we consider the ratio of the maximal extent size among all direct predecessors of a concept to the extent size of the concept itself. Belohlavek and Trnecka in [6, 7] investigated the group of so-called “basic level” measures. It is a psychology-motivated approach that was designed to formalize the existing psychological approach to defining the basic level of concepts [39]. The group is comprised of similarity- and predictability-based indices, cue validity, category feature collocation and category utility indices. Similarity approach (S) The similarity approach to the assessment of belonging to a basic level was proposed in [42] and subsequently formalized and applied to FCA in [6]. This index is the combination of three fuzzy functions that correspond to formalized properties outlined by E. Rosch [42]: high cohesion of concepts, considerably greater cohesion with respect to upper neighbors and a slightly less cohesion with respect to lower neighbors. The membership degree of the basic level is defined as follows: ∗∗ BLS = coh∗∗ (A, B) ⊗ coh∗∗ un (A, B) ⊗ cohln (A, B) , where coh is a fuzzy function that corresponds to the conditions defined above, ⊗ is t-norm [28]. A cohesion function is based on the pairwise similarity of objects from an extent. To assess similarity between two objects authors use simple matching coefficient or Jaccard similarity: simSM C (B1 , B2 ) = |B1 ∩ B2 | + |M − (B1 ∪ B2 ) | ; |M | simJ (B1 , B2 ) = |B1 ∩ B2 | . |B1 ∪ B2 | A cohesion function is one of the following aggregation functions: P 0 0 {x1 ,x2 }⊆A,x1 6=x2 sim... (x1 , x2 ) a coh... (A, B) = |A| (|A| − 1) /2 0 0 cohm ... (A, B) = min sim... (x1 , x2 ) x1 ,x2 ∈A The Rosch’s properties for upper and lower neighbors take the following forms: P ∗ ∗ c∈U N (A,B) coh... (c) /coh... (A, B) a∗ coh...,un (A, B) = 1 − |U N (A, B) | P ∗ ∗ c∈LN (A,B) coh... (A, B) /coh... (c) coha∗ ...,ln (A, B) = |LN (A, B) | cohm∗ ...,un (A, B) = 1 − cohm∗ ...,ln (A, B) = max c∈U N (A,B) min c∈LN (A,B) coh∗... (c) /coh∗... (A, B) coh∗... (A, B) /coh∗... (c) where U N (A, B) and LN (A, B) are upper and lower neighbors of formal concept (A, B) respectively. As the authors noted, experiments revealed that the type of a cohesion function does not affect the result, while the choice of a similarity measure can greatly affect the outcome. More than that, in some cases upper (lower) neighbors may have higher (lower) cohesion than the formal concept itself (for example, the boundary cases, when a neighbors’s extent / intent is comprised of identical rows / columns). To tackle this issue of non-monotonic neighbors w.r.t. a sim∗∗ ilarity function the authors proposed to take coh∗∗ ...,ln and coh...,un as 0, if the rate of non-monotonic neighbors is larger than a threshold. ∗∗ ∗∗ Below, we use the following notation: SSM C and SJ , where stars are replaced by the type of cohesion functions for neighbors and objects, respectively. SM C and J stand for simple matching coefficient or Jaccard similarity, respectively. Predictability approach (P) Predictability [7] of a formal concept is computed in a way quite similar to the previous one. In this approach a cohesion function is replaced by the predictability function: ∗∗ P (A, B) = pred∗∗ (A, B) ⊗ pred∗∗ un (A, B) ⊗ predln (A, B) . From this point of view, concepts are close to basic level if there are only few attributes outside B contained in objects from A: E (I [hx, yi ∈ I] |I [x ∈ A]) = − pred (A, B) = 1 − X y∈M −B |A ∩ y 0 | |A ∩ y 0 | log |A| |A| E (I [hx, yi ∈ I] |I [x ∈ A]) . |M − B| Cue Validity (CV), Category Feature Collocation (CFC), Category Utility (CU) The following measures are based on the conditional probability of object g ∈ A given y ⊆ g 0 [7]: CV (A, B) = X P (A|y 0 ) = y∈B y∈B X |A ∩ y 0 | |A ∩ y 0 | |y 0 | |A| y∈M y∈M " 2  0 2 # i |A| X Xh |A ∩ y 0 | |y | 2 0 0 2 CU (A, B) = p (A) p (y |A) − p (y ) = − |G| |y 0 | |G| CF C (A, B) = y∈M X X |A| |y 0 | p (A|y 0 ) p (y 0 |A) = y∈M CV deals with the probability of an extent given attributes from an intent, CFC takes into account the relation between all attributes from a context and an intent of a formal concept, and CU characterizes how much an attribute from an intent is specific for a given concept rather than for a formal context [49]. 3.3 Concept Lattice of Indices for Closed Itemsets In this part of the paper we propose a classification of the existing indices for formal concepts. The classification can be done w.r.t. several features, thus a lot of different index classifications may be suggested. FCA provides a universal framework for discovering domain structure by constructing inclusion-ordered overlapping clusters with various degrees of generality. We represent the indices described in Section 3.2 and their features from Section 3.1 as a formal context of size 20 × 19. The objects and attributes of the formal context are indices and their features, respectively. The context is given in Table 1, the corresponding lattice consists of 73 formal concepts. We applied the described indices to the lattice to discover interesting concepts and consider top-8 concepts (about 10% of all concepts) by values of the following indices: probability, separation, monocle, margin-closed, frequency, stability, stability estimates, CV, CFC, CU, predictability, similarity approach (SJaa and aa SSM C ), robustness with α = 0.3. Below, the most frequent concept in the topranked groups are listed. We obtained top-ranked concepts with a singleton as an extent or an intent for margin-closed and probability, respectively. The most interesting groups of indices (concepts) with their frequencies (i.e., the rate of top-8 groups where a concept has been included) are listed below. Frequency = 0.4: Extent: ∆l , ∆h , stab2OIE , δ-TCFIs. Intent: for closed subsets, not applicable to arbitrary subsets, based on comparison to other attribute subsets, based on comparison to neighboring attribute subsets, size-based, (anti)monotonic, polynomial complexity, linear complexity, computable in one-pass over data. Extent: ∆l , ∆h , stab2N OE , stab2OE , stab2OIE , margin-closed*, δ-TCFIs Intent: for closed subsets, not applicable to arbitrary subsets, based on comparison to other attribute subsets, based on comparison to neighboring attribute subsets, size-based, (anti)monotonic, polynomial complexity, linear complexity. The most interesting concepts by stability and its estimates. Frequency = 0.33: Extent: ∆l , ∆h , stab2N OE , stab2OE , stab2OIE , similarity, predictability, margin-closed*, δ-TCFIs. Intent: for closed subsetes, not applicable to arbitrary subsets, based on comparison to other attribute subsets, based on comparison to neighboring attribute subsets, polynomial complexity. The most interesting concepts by CV and separation. Table 1: A formal context of indices for formal concepts and their key features Index name (the number a1 of section) stability (3.2) × ∆l (3.2) × ∆h (collapse × index)(3.2) stab2N OE (3.2) × stab2OE (3.2) × stab2OIE (3.2) × robustness (3.2) × probability (3.2) × separation (3.2) × support (3.2) frequency (3.2) monocle (3.2) × δ-TCFIs (3.2) × margin× closed (3.2) margin× closed* (3.2) similarity (3.2) × predictability (3.2) × CV (3.2) × CFC (3.2) × CU (3.2) × a2 a3 a4 a5 a6 a7 a8 a9 a10 a11 a12 a13 a14 a15 a16 a17 a18 a19 × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × × a1 : (designed) for closed subsets, a2 : not applicable to arbitrary attribute subsets, a3 : applicable to arbitrary attribute subsets, a4 : using all of the single attributes of a context, a5 : based on comparison to other attribute subsets, a6 : based on comparison to neighboring attribute subsets, a7 : support-based (for subsets of attributes), a8 : support-based (for single attributes), a9 : size-based, a10 : using conditional (joint) probability, a11 : monotonic–antimonotonic w.r.t. order on attribute sets, a12 : using a tuning parameter, a13 : boolean value, a14 : polynomial complexity, a15 : sublinear complexity, a16 : linear complexity, a17 : quadratic complexity, a18 : cubic and higher complexity, a19 : computable in one-pass over data Extent: ∆l , ∆h , stab2N OE , stab2OE , stab2OIE , separation, margin-closed, margin-closed*, δ-TCFIs. Intent: for closed subsets, size-based. The most interesting concepts by frequency. Frequency = 0.25: Extent: ∆l , ∆h , stab2N OE , stab2OE , stab2OIE , robustness, margin-closed*, δ-TCFIs. Intent: for closed subsets, not applicable to arbitrary subsets, based on comparison to other attribute subsets, based on comparison to neighboring attribute subsets, (anti)monotonic. Extent: stability, ∆l , ∆h , stab2N OE , stab2OE , stab2OIE , probability, robustness, separation, similarity, predictability, CV, CFC, CU, margin-closed, margin-closed*, monocle, δ-TCFIs. Intent: for closed. Extent: ∆l , ∆h , stab2N OE , stab2OE , stab2OIE , robustness, similarity, predictability, margin-closed*, δ-TCFIs. Intent: for closed subsets, not applicable to arbitrary subsets, based on comparison to other attribute subsets, based on comparison to neighboring attribute subsets. The most interesting concepts by monocle. Extent: ∆l , ∆h , stab2N OE , stab2OE , stab2OIE , robustness, CV, CFC, marginclosed*, δ-TCFIs. Intent: for closed subsets, (anti)monotonic. The most interesting concepts by CFC. Extent: ∆l , ∆h , stab2N OE , stab2OE , stab2OIE , probability, margin-closed*, δ-TCFIs. Intent: for closed subsets, not applicable to arbitrary subsets, polynomial complexity, linear complexity. The most interesting concepts by CU. Extent: support, frequency, δ-TCFIs. Intent: support-based (for attribute sets), (anti)monotonic, polynomial complexity, computable in one-pass over data. The most interesting concepts by robustness, α = 0.3. Extent: CV, CFC. Intent: for closed subsets, using conditional probability, (anti)monotonic, polynomial complexity, linear complexity, computable in one-pass over data. The most interesting concepts by predictability, similarity (Basic Level Metrics). As can be seen from the results of the concept rankings, most of the selected indices (accordingly, the rankings) include either ∆-indices or support-based measures. Both types of concepts have almost the same intent that causes the large number of quite similar concepts. 4 Generic Approach to the Assessment of Closed Itemsets In this section we propose guidelines for applying arbitrary itemset indices to closed ones. It should be noted that the problem of the arbitrary itemset assessment was thoroughly investigated in the literature and a lot of different indices for arbitrary sets of attributes and associative rules were proposed. We will not consider in this study statistical-based approaches to patterns and rules assessment (the basic information on the approach can be found in [48]). Some indices for associative rules can be applied directly to evaluate sets of attributes, for example, lif t given Q in Table 2 takes the following form for itemset assessment: lif t(A) = P (A)/ a∈A P (a). Moreover, a rule-assessment measure may be applied to attribute set within the rule-based approach. In this case, all possible rules are generated from the examined attribute set and then an aggregation function is used to obtain a new index (see details in [48]). All these indices can be applied directly to formal concepts to assess them either as subsets of objects or as subsets of attributes. However, the closeness of attribute sets can be exploit to construct new indices. The purpose of this section is to provide the main ideas of how to adopt arbitrary itemset indices (including rule-based measures) to assess both dimensions of concepts simultaneously. To develop a new index one needs to answer the following questions: – Which concepts are interesting (which patterns we are looking for)? – Which index will be chosen as the basic measure? – Which operations will be used to aggregate the values of the basic measure? The starting point is the personal perspective on concept interestingness. We define the following ones: – Some “internal”/“external” properties of the concept itself. In this case homogeneous components are considered. – Impact of the element gathering. Here, a measure is applied to a set and its elements: f (set) and {f (element) | element ∈ set}. – Impact of a condition: f (parameter | condition) and f (parameter). – Concept pureness. This approach is based on the comparison of features computed on a concept and out of the concept: f (parameter) and f (U \ parameter)), where U is the domain of the parameter. – Stability to random changes in data. Resampling strategy is applied to a set: {resamplingα (set)}, where α is a noise rate. The most popular basic measures are given in Table 2 to make the paper self-contained. More detailed information about the listed indices can be found in [23, 3, 27]. In the case of formal concepts, indices for associative rules, can be used not only in the ways mentioned above, but also to compare a concept to others similar concepts, i.e., to discover some relatively interesting concepts in a neighborhood. To combine values of basic measures an aggregation function is used. If a new index measures a relative property of a concepts, then aggregation and comparison operators are applied in any order, i.e., compare(aggregateel∈S (el), d) or aggregateel∈S (compare(el, d)), where S is a set of peer elements, d is a distinguished value to compare. It is worth noting that both real-valued and fuzzy functions can be used to aggregate values. If the values are in the interval [0, 1] (i.e., they can be considered as probabilistic components), a fuzzy aggregation function should be applied. Some binary fuzzy operators (t-norm or its dualization s-norm related the equation t(v1 , v2 ) = 1−s(1−v1 , 1−v2 )) and real-valued aggregation functions are given in Table 3. In the case of poor data quality a robust aggregation function, as median, can be applied to data. A comparison function can take one of the following forms: ∗ − ∗, ∗/∗, log(∗/∗). Example 2 Let us consider how the proposed guidelines can be used for designing a new index. We will give examples to show that the existing indices conform to the presented approach and to demonstrate how new indices can be constructed step-by-step using this scheme. Cue Validity (or CV): CV (A, B) = X P (A|y 0 ) = y∈B X |A| . |y 0 | y∈B – Notion of interestingness: a concept (A, B) is interesting, if the objects from its extent A are more specific for the set of attributes B. We study only a subset of attributes, i.e., properties of the concept itself. – Basic measure: conditional probability. – Aggregation operator (applied to homogeneous elements): sum. A new index: Index1 (A, B) = min (C,D)∈U A((A,B)) (P S(D) − P S(B)) , where U N ((A, B) is the set of direct ancestors of (A, B), and P S(B) = P (B) − Q m∈B P (m). – Notion of interestingness: a concept (A, B) is interesting if it differs from more general (in the descriptive sense) concepts. We study only direct ancestors in a lattice. – Basic measure: Piatetsky-Shapiro. – Aggregation operator (applied to non-homogeneous elements): comparison of a concept to each of its ancestors, aggregation by taking the minimal value. Table 2: Indices for arbitrary itemsets (associative rules A → B) Index accuracy added value/change of support certainty factor collective strength conditional probability conviction cosine Gini index information gain Formula P (AB) + P (¬A¬B) P (B|A) − P (B) (P (B|A) − P (B)) / (1 − P (B)) P (AB)+P (¬B|¬A) (A)P (B)P (¬A)P (¬B) · 1−P P (A)P (B)+P (¬A)P (¬B) 1−P (AB)−P (¬B|¬A) P (B|A) P (A)P (¬B)/P (A¬B) p P (AB)/ P (A)P (B)  P (A) P (B|A)2 + P (¬B|A)2 +  2 +P (¬A) P (B|¬A) + P (¬B|¬A)2 − P (B)2 − P (¬B)2 P (AB) log P (A)P (B) P (AB) log PP(B|A) + P (A¬B) log PP(¬B|A) (B) (¬B) P (AB)/ (P (A) + P (B) − P (AB)) p pP (AB)(P (B|A)P (B)), Klosgen P (AB) max(P (B|A)P (B), P (A|B)P (A)) Laplace correction (N (AB) + 1) /(N (A) + 2) least contradiction (P (AB) − P (A¬B)) /P (B) leverage P (B|A) − P (A)P (B) lift P (AB)/ (P (A)P (B)) Loevinger 1 − P (A)P (¬B)/P (A¬B)  P P P P (Ai Bj ) / − i P (Ai ) log2 P (Ai ) normalized mutual information i j P (Ai Bj ) · log2 P (Ai )P (Bj ) odd multiplier (P (AB)P (¬B)) / (P (B)P (A¬B)) Example and 1 − P (A¬B)/P (AB) counter example Rate odds ratio P (AB)P (¬A¬B)/ (P (A¬B)P (¬BA)) P (AB) one-way support P (B|A) log2 P (A)P (B)   (P (AB)−P (A)P (B))2 (P (¬AB)−P (¬A)P (B))2 |G| + + P (¬A)P (B)  P (A)P (B)  Pearson’s χ2 (P (A¬B)−P (A)P (¬B))2 (P (¬A¬B)−P (¬A)P (¬B))2 +|G| + P (A)P (B) P (¬A)P (¬B) J-measure Jaccard P (AB) − P (A)P (B) P (B|A)/P (B|¬A) P (AB)/P (A¬B) P (AB) P (AB) log2 P (A)P (B) P (AB)−P (A)P (B) Linear Correlation Coefficient √ Piatetsky-Shapiro relative risk Sebag-Schoenaue two-way support P (A)P (B)P (¬A)P (¬B) Zhang (P (AB) − P (A)P (B)) / max (P (AB)P (¬B), P (B)P (A¬B)) Table 3: Aggregation functions Real-valued Ordinal (for sorted Numerical values X(1) , X(2) , . . . , X(n) ) X (n−1) , if n is odd P 2 Sum Median v 0.5(X n2 + X n2 +1 ), v∈V if n is even P v//|V | Arithmetic mean Maximum X(n) v∈V q Q |V | Geometric mean Minimum X(1) v∈V v P Harmonic mean |V |/( v∈V v −1 ) Midrange 0.5(X(1) + X(n) ) Fuzzy T-norms S-norms min(v1 , v2 ), max(v1 , v2 ), if max(v1 , v2 ) = 1 Drastic sum if min(v1 , v2 ) = 0 Drastic product 0, otherwise 1, otherwise Bounded difference max(0, v1 + v2 − 1) Bounded sum min(1, v1 + v2 ) v1 v2 v1 +v2 Einstein product Einstein sum 2−(v1 +v2 −v1 v2 ) 1+v1 v2 Algebraic product v1 v2 Probabilistic sum v1 + v2 − v1 v2 v2 v1 +v2 −2v1 v2 Hamacher product v1 +vv21 −v Hamacher sum v 1−v1 v2 1 2 Minimum min(v1 , v2 ) Maximum max(v1 , v2 ) A new index: Index2 (A, B) = |M \ B| X 1/P (m|B). m∈M \B – Notion of interestingness: a concept (A, B) is interesting if it stands out from the context. We study out-of-concept elements of a context. – Basic measure: conditional probability. – Aggregation operator (applied to homogeneous elements): harmonic mean. 5 Quality of Indices Application of indices in practice is aimed mostly at addressing the following goals: selecting a subset from the whole set of concepts or computing only a fragment of a concept lattice. The first goal then is attained by selecting the most interesting concepts from the set of concepts or detecting “original” concepts computed on a noisy context. The second goal is to reduce the computation cost by constructing only the most interesting concepts. 5.1 Rank Correlation To realize how similar the indices are, we examined the similarity of the concept rankings by values of indices. The pairwise similarity of indices is measured by the Kendall tau correlation coefficient [26], this coefficient takes into account not only an absolute rank, but also a relative position. We randomly generated 4 groups of formal concepts with the following densities (the rate of the “1” in the context): 0.1, 0.2, 0.3, 0.4. Each group consisted of 100 formal contexts with the number of attributes ranged between 10 and 50, and the number of objects varying from 40 to 80. The standard deviation of within-group pairwise correlation is quite small (not more then 0.05) and does not depend on the context density (p-values of Levene’s test is less than 0.05). Since the studied values cannot be assumed to be normally distributed (based on D’Agostino and Pearson’s test), the Wilcoxon’s test was used to compare mean values of the Kendall tau coefficient. The averaged values of the pairwise Kendall tau coefficients are presented in Table 4. Among investigated indices several groups of correlated measures stood out, but only few values of pairwise correlation are statistically stable (have the same average value w.r.t. context densities). One of the groups of correlated indices corresponds to approximate robustness with different values of parameters. It allows us to conclude that relative importance of concepts is mostly preserving regardless of α. Another class of indices that utilizes similarity and predictability approaches (Basic Level Metrics group) yields the second group. It should be noted that the highly correlated indices of this group are the measures based on similarity approach with the same cohesion function and with different aggregation functions for sub/superordinate concepts. The conclusion agrees with the results presented in [6]. The other groups of correlated indices are highlighted in Table 4. Stability (robustness) is the most complex index for calculation, hence it is important to identify more easily computable indices and use them instead. In our experiments we found that logarithmic estimates of stability (∆l , ∆h ) and Max-distinguishedextents upper bound (stab2OE ) are strongly correlated with stability, highly correlated robustness indices belong to the same complexity class as stability. 5.2 Integral Stability Indices: Best Approximation of Stability Here, we consider the problem of stability approximation w.r.t. different levels of integral stability index, i.e., the number of levels that are used to compute the index. Since the extent size of concepts varies in the range from 0 to |G|, for each concept we took the level of stability depending on the size of set A, to be precise, the level is defined by formula [rate ∗ |A|], where 0 < rate < 1. To find the best rate we used randomly generated formal contexts (described in the previous subsection) of different densities: 0.1, 0.2, 0.3 and applied simple linear regression. The integral stability index of the jth level was taken as a regressor and the stability as a dependent variable. Scatter plots of the studied indices are given in Figure 3. As we can see from the diagrams, taking too small rates does not allow us to estimate stability, since for most concepts small-sized subsets Y ⊂ A, such that Y 0 = B do not exist. The first local maximum of the coefficients of determination for model stability = A ∗ stabilityΣratio + B CU CFC CV P SJmm SJma SJam SJaa mm SSM C ma SSM C am SSM C aa SSM C marg-clos∗ support separation probability rob0,8 rob0,5 rob0,3 rob0,1 stab2OIE stab2OE stab2N OE ∆h ∆l stability 0,88 0,73 0,48 0,63 0,54 0,86 0,94 1,00 0,97 0,27 0,18 0,32 0,12 0,17 0,16 0,05 0,05 0,18 0,18 0,07 0,08 -0,02 0,05 0,06 0,07 ∆l 0,55 0,34 0,50 0,40 0,88 0,93 0,88 0,83 0,15 0,13 0,18 0,20 0,16 0,16 0,00 0,00 0,13 0,13 0,01 0,02 -0,06 0,00 -0,02 -0,05 ∆h 0,66 0,67 0,65 0,53 0,64 0,73 0,76 0,55 0,28 0,65 -0,07 0,16 0,16 0,15 0,15 0,29 0,30 0,19 0,21 0,08 0,16 0,27 0,34 stab2N OE 0,88 0,95 0,32 0,41 0,48 0,51 0,67 0,36 0,80 -0,47 0,34 0,36 0,35 0,35 0,53 0,53 0,45 0,47 0,30 0,21 0,38 0,50 stab2OE 0,94 0,47 0,56 0,63 0,66 0,60 0,32 0,72 -0,37 0,38 0,38 0,39 0,39 0,54 0,55 0,47 0,48 0,34 0,18 0,29 0,40 stab2OIE 0,38 0,47 0,54 0,57 0,65 0,36 0,78 -0,45 0,36 0,37 0,37 0,37 0,53 0,54 0,46 0,47 0,32 0,21 0,35 0,47 rob0.1 0,91 0,86 0,81 0,14 0,12 0,17 0,22 0,17 0,16 0,02 0,02 0,12 0,13 0,02 0,03 -0,04 -0,02 -0,05 -0,05 rob0.3 0,94 0,89 0,21 0,15 0,26 0,16 0,17 0,16 0,04 0,03 0,16 0,16 0,05 0,06 -0,03 0,02 0,01 0,02 rob0.5 0,97 0,27 0,18 0,32 0,12 0,17 0,16 0,05 0,05 0,18 0,18 0,07 0,08 -0,02 0,05 0,06 0,07 rob0.8 0,30 0,19 0,36 0,09 0,16 0,16 0,06 0,05 0,19 0,19 0,08 0,09 -0,01 0,07 0,08 0,10 probability 0,27 0,81 -0,51 0,22 0,24 0,29 0,30 0,44 0,44 0,35 0,38 0,28 -0,02 0,31 0,36 separation 0,40 -0,27 0,25 0,27 0,17 0,17 0,24 0,25 0,26 0,25 0,14 0,40 0,25 0,18 support -0,62 0,27 0,29 0,32 0,33 0,53 0,53 0,43 0,45 0,28 0,23 0,48 0,61 ∗ marg-clos -0,26 -0,28 -0,37 -0,38 -0,47 -0,47 -0,50 -0,51 -0,39 -0,19 -0,36 -0,53 aa SSM C 0,91 0,58 0,57 0,61 0,61 0,50 0,51 0,52 0,07 0,03 0,16 am SSM 0,57 0,57 0,62 0,63 0,50 0,50 0,51 0,08 0,05 0,17 C ma SSM 0,97 0,59 0,59 0,68 0,69 0,73 0,00 0,01 0,16 C mm SSM 0,59 0,59 0,67 0,68 0,73 0,00 0,01 0,16 C SJaa 0,97 0,61 0,62 0,55 0,11 0,17 0,36 SJam 0,61 0,62 0,55 0,11 0,17 0,35 ma SJ 0,93 0,65 0,12 0,11 0,30 mm SJ 0,66 0,11 0,12 0,29 P -0,05 -0,03 0,12 CV 0,35 0,39 CFC 0,42 Table 4: The averaged Kendall tau coefficient for indices. Statistically equal average values are in bold type. Fig. 3: The dependence of stability values on integral stability values corresponds to rate = 0.4 (0.78 and 0.79 for context densities 0.2 and 0.3, respectively). Thus, this value can be used as the most suitable one for computing estimates of stability by integral stability index. 5.3 Noise Filtering In practice one usually faces noisy data. Even a small noise rate can result in exponential explosion of the number of formal concepts [29]. In this connection, we study the ability of indices to select original concepts from the set of concepts computed on a noisy context. We took 5 formal concepts, the lattices of the first four of them have quite simple structure (see Figure 4) and the last one is a fragment of Mushroom dataset 1 consisted of 500 objects and 14 attributes. [a] [b] [c] [d] Fig. 4: The concept lattices of formal contexts with 300 objects and 6 attributes (a - c), with 400 objects and 4 attributes (d) We added different amount of noise into the contexts as follows: each entry changes with given probability (noise rate). For “noisy” lattices we identified original concepts and considered a binary classification problem. We computed the AUC (Area Under the Receiver Operator Curve) from each index separately. The averaged AUCs within groups corresponding the same datasets with different noise rates and within groups with the same noise rate for the described above contexts are given in Figure 5. As can be seen in Figure 5, the index quality mostly depends on lattice structure rather than on noise rate. Cue Validity (CV), Category Feature Collocation (CFC), Category Utility (CU) and separation have the highest AUC on particular datasets, but the quality considerably changes depending on the lattice structure. For instance, AUC of CFC varies from 0.67 to 0.95. The most stable results correspond to robustness with α ∈ {0.3, 0.5, 0.8}, the estimates of stability are able to distinguish most of the original concepts (the AUC is greater than 0.7). Almost all indices are stable with respect to different noise rates. The poor data quality has the strong impact on the estimates of stability: the quality of these indices drops down as the noise rate increases. Since these measures are based on the elements of a lattice, the more noise is introduced, the more noisy 1 https://archive.ics.uci.edu/ml/datasets/Mushroom Fig. 5: The averaged AUC within groups with the same noise rate (dotted lines) and corresponding to the same datasets (lines a-d) concepts are involved in computation. The quality of similarity-based indices (Basic Level group) is close to random guessing, which makes them inapplicable to the analysis of noisy data. The experiments allow us to conclude that the CV, CU, CFC, separations and robustness are the most suitable for the analysis of noisy data. 6 Conclusion In this paper we have presented some results on formal concept indices. We have also analyzed the existing indices for closed itemsets in Data Mining. We defined the main features of the indices and proposed their classification using an FCA-based approach. We have also provided some examples of most interesting groups of indices selected by means of some of the studied indices. We have given basic ideas of adapting indices for arbitrary itemsets to closed ones. We have suggested to utilize bimodal nature of the concepts to get new indices on the basis of the indices for arbitrary set of attributes. An important part of the study is devoted to practical application of indices. We have performed a comparative study of indices in the context of the following tasks: selection of the most interesting concepts, approximation of the exponentially computable indices (stability) and filtering noisy data. The results of our experiments allow us to distinguish groups of correlated indices, thus these results can be used to reduce computational complexity of concept mining by choosing easily computable indices among the correlated ones. Another important aspect of our study is identification of indices that can be used for the analysis of noisy data. It was shown that the noise filtering quality of indices depends more on the structure of the concept lattice than on the noise rate. The strongest dependence of the filtering quality on noise rate corresponds to the estimates of stability. Even a small proportion of noise added to data can significantly change the lattice structure, which results in biased values of neighbor-based indices. As possible directions of future work, we can propose the study of indices for approximate concepts, e.g., biclusters, as well as indices for multimodal concepts. Another important application of indices as tools for selecting hypothesis can be examined within the framework of classification and learning. Acknowledgments This paper was prepared within the framework of the Basic Research Program at the National Research University Higher School of Economics (HSE) and supported within the framework of a subsidy by the Russian Academic Excellence Project ’5-100’. List of indices Used notation stability (3.2) Description It estimates the probability of the closeness of an attribute set after removing some elements from the object set. ∆l (3.2) ∆-measure that is based on direct descendents of a concept. ∆h (3.2) ∆-measure that is based on the maximal extent. stab2N OE (max-disjoint-extents ∆-measure that is based on two maximal disupper bound, 3.2) joint extents. stab2OE (max-distinguished- ∆-measure that is based on the maximal extent extents upper bound, 3.2) and the extent with maximal disjoint subset. stab2OIE (max-extent upper ∆-measure that is based on two maximal exbound, 3.2) tents. robustness (3.2) It estimates the probability that an attribute set will be arose from the data, if some transactions are removed. probability (3.2) It estimates the probability that a set of attributes is closed, if all attributes are independent and the probability of an attribute is assumed to be equal to its frequency. separation (3.2) The ratio of the area covered by a formal concept to all nonzero elements in rows and columns corresponding to the concept. frequency, support (3.2) The frequency of an attribute set (if all attributes are assumed to be independent). monocle (3.2) The index assigns weights to concepts by taking into account the size of a context and the number of the concepts that do not contain objects and attributes contained to the concept. δ-TCFIs (3.2) It selects relatively frequent concepts with respect to their direct descendants. margin-closed (3.2) The index characterizes whether a frequent intent have well-distinguishable support w.r.t. other frequent intents, supersets of the intent. S∗∗∗ (similarity, 3.2) A fuzzy combination of three cohesion functions which correspond to the following conditions: high cohesion of concepts, considerably greater cohesion with respect to upper neighbors and a slightly less cohesion with respect to lower neighbors. The bottom star is replaced by a similarity function defined on the two sets of attributes that correspond to particular objects (SM C and J denotes simple matching coefficient and Jaccard similarity, respectively). The first and the second top stars are replaced by cohesion functions defined on the set of neighbouring concepts and objects, respectively. P (predictability, 3.2) Defined the same way as the previous one, the only difference is the cohesion function is replaced by a predictability function. CV (cue validity, 3.2) The sum of the conditional probabilities of objects from an extent given attributes from an intent. CFC (category feature colloca- Characterizes specificity of all attributes of a tion, 3.2) context for given set of objects. CU (category utility, 3.2) Characterizes specificity each context attribute for a given concept. References References 1. Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Proc. 20th int. conf. very large data bases, VLDB. vol. 1215, pp. 487–499 (1994) 2. Arévalo, G., Berry, A., Huchard, M., Perrot, G., Sigayret, A.: Performances of Galois sub-hierarchy-building algorithms. In: International Conference on Formal Concept Analysis, pp. 166–180. Springer (2007) 3. Azevedo, P.J., Jorge, A.M.: Comparing rule measures for predictive association rules. In: Machine Learning: ECML 2007, pp. 510–517. Springer (2007) 4. Babin, M., Kuznetsov, S.: Approximating concept stability. In: Domenach, F., Ignatov, D., Poelmans, J. (eds.) Formal Concept Analysis. Lecture Notes in Computer Science, vol. 7278, pp. 7–15. Springer Berlin Heidelberg (2012) 5. Belohlavek, R., Macko, J.: Selecting important concepts using weights. In: Valtchev, P., Jschke, R. (eds.) Formal Concept Analysis, Lecture Notes in Computer Science, vol. 6628, pp. 65–80. Springer Berlin Heidelberg (2011) 6. Belohlavek, R., Trnecka, M.: Basic level of concepts in formal concept analysis. In: Domenach, F., Ignatov, D., Poelmans, J. (eds.) Formal Concept Analysis, Lecture Notes in Computer Science, vol. 7278, pp. 28–44. Springer Berlin Heidelberg (2012) 7. Belohlavek, R., Trnecka, M.: Basic level in formal concept analysis: Interesting concepts and psychological ramifications. In: Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence. pp. 1233–1239. IJCAI ’13, AAAI Press (2013) 8. Belohlavek, R., Vychodil, V.: Formal concept analysis with background knowledge: attribute priorities. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on 39(4), 399–409 (2009) 9. Berry, A., Huchard, M., McConnell, R., Sigayret, A., Spinrad, J.: Efficiently computing a linear extension of the sub-hierarchy of a concept lattice. In: Ganter, B., Godin, R. (eds.) Formal Concept Analysis, Lecture Notes in Computer Science, vol. 3403, pp. 208–222. Springer Berlin Heidelberg (2005) 10. Buzmakov, A., Kuznetsov, S., Napoli, A.: Sofia: How to Make FCA Polynomial? In: Proceedings of the 4th International Conference on What Can FCA Do for Artificial Intelligence? - Volume 1430. pp. 27–34. FCA4AI’15, CEUR-WS.org, Aachen, Germany, Germany (2015) 11. Buzmakov, A., Kuznetsov, S.O., Napoli, A.: Fast generation of best interval patterns for nonmonotonic constraints. In: Machine Learning and Knowledge Discovery in Databases, pp. 157–172. Springer (2015) 12. Buzmakov, A., Kuznetsov, S., Napoli, A.: Scalable estimates of concept stability. In: Glodeanu, C., Kaytoue, M., Sacarea, C. (eds.) Formal Concept Analysis, Lecture Notes in Computer Science, vol. 8478, pp. 157–172. Springer International Publishing (2014) 13. Carpineto, C., Romano, G.: A lattice conceptual clustering system and its application to browsing retrieval. Machine Learning 24, 95–122 (1996) 14. Cheng, J., Ke, Y., Ng, W.: Delta-tolerance closed frequent itemsets. In: Data Mining, 2006. ICDM’06. Sixth International Conference on. pp. 139–148. IEEE (2006) 15. Cheung, K., Vogel, D.: Complexity reduction in lattice-based information retrieval. Information Retrieval 8(2), 285–299 (2005) 16. Dhillon, I., Modha, D.: Concept decompositions for large sparse text data using clustering. Machine Learning 42(1-2), 143–175 (2001) 17. Dias, S.M., Vieira, N.: Reducing the size of concept lattices: The JBOS approach. In: Proceedings of the 7th International Conference on Concept Lattices and Their Applications, Sevilla, Spain, October 19-21, 2010. pp. 80–91 (2010) 18. Dobša, J., Dalbelo-Bašić, B.: Comparison of information retrieval techniques: latent semantic indexing and concept indexing. Journal of Inf. and Organizational Sciences 28(1-2), 1–17 (2004) 19. Düntsch, I., Gediga, G.: Simplifying contextual structures. In: Kryszkiewicz, M., Bandyopadhyay, S., Rybinski, H., Pal, S.K. (eds.) Pattern Recognition and Machine Intelligence, Lecture Notes in Computer Science, vol. 9124, pp. 23–32. Springer International Publishing (2015) 20. Emilion, R.: Concepts of a discrete random variable. In: Brito, P., Cucumel, G., Bertrand, P., de Carvalho, F. (eds.) Selected Contributions in Data Analysis and Classification, pp. 247–258. Studies in Classification, Data Analysis, and Knowledge Organization, Springer Berlin Heidelberg (2007) 21. Ganter, B., Wille, R.: Contextual attribute logic. In: Tepfenhart, W.M., Cyre, W. (eds.) Conceptual Structures: Standards and Practices, Lecture Notes in Computer Science, vol. 1640, pp. 377–388. Springer Berlin Heidelberg (1999) 22. Gauss, C.F.: Disquisitiones Arithemeticae, Arthur A. Clarke (English translator) (corrected 2nd ed.). Springer-Verlag, New York (1986) 23. Geng, L., Hamilton, H.J.: Interestingness measures for data mining: A survey. ACM Computing Surveys (CSUR) 38(3), 9 (2006) 24. Ignatov, D.I., Gnatyshak, D.V., Kuznetsov, S.O., Mirkin, B.G.: Triadic formal concept analysis and triclustering: searching for optimal patterns. Machine Learning 101(1-3), 271–302 (2015) 25. Jay, N., Kohler, F., Napoli, A.: Analysis of social communities with iceberg and stability-based concept lattices. In: Medina, R., Obiedkov, S. (eds.) Formal Concept Analysis, Lecture Notes in Computer Science, vol. 4933, pp. 258–272. Springer Berlin Heidelberg (2008) 26. Kendall, M.G.: A new measure of rank correlation. Biometrika pp. 81–93 (1938) 27. Kirchgessner, M., Leroy, V., Amer-Yahia, S., Mishra, S.: Testing interestingness measures in practice: A large-scale analysis of buying patterns. arXiv preprint arXiv:1603.04792 (2016) 28. Klement, E.P., Mesiar, R., Pap, E.: Triangular norms. Springer Netherlands (2000) 29. Klimushkin, M., Obiedkov, S., Roth, C.: Approaches to the selection of relevant concepts in the case of noisy data. In: Kwuida, L., Sertkaya, B. (eds.) Formal Concept Analysis, Lecture Notes in Computer Science, vol. 5986, pp. 255–266. Springer Berlin Heidelberg (2010) 30. Kuznetsov, S.O.: Stability as an estimate of degree of substantiation of hypotheses derived on the basis of operational similarity. Nauchn. Tekh. Inf., Ser. 2 (12), 21–29 (1990) 31. Kuznetsov, S.O.: On stability of a formal concept. Annals of Mathematics and Artificial Intelligence 49(1-4), 101–115 (2007) 32. Kuznetsov, S.O., Makhalova, T.P.: Concept interestingness measures: a comparative study. In: Proceedings of the Twelfth International Conference on Concept Lattices and Their Applications. pp. 59–72 (2015) 33. Kuznetsov, S.O., Obiedkov, S., Roth, C.: Reducing the representation complexity of lattice-based taxonomies. In: Conceptual Structures: Knowledge Architectures for Smart Applications, pp. 241–254. Springer Berlin Heidelberg (2007) 34. Kuznetsov, S.O., Poelmans, J.: Knowledge representation and processing with formal concept analysis. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 3(3), 200–215 (2013) 35. Kuznetsov, S.O.: Interpretation on graphs and complexity characteristics of a search for specific patterns. Nauchno-Tekhnicheskaya Informatsiya Ser. 2 pp. 37–45 (1989) 36. Madeira, S.C., Oliveira, A.L.: Biclustering algorithms for biological data analysis: a survey. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB) 1(1), 24–45 (2004) 37. Mannila, H., Toivonen, H., Verkamo, A.I.: Efficient algorithms for discovering association rules. In: KDD-94: AAAI workshop on Knowledge Discovery in Databases. pp. 181–192 (1994) 38. Moerchen, F., Thies, M., Ultsch, A.: Efficient mining of all margin-closed itemsets with applications in temporal knowledge discovery and classification by compression. Knowledge and Information Systems 29(1), 55–80 (2011) 39. Murphy, G.L.: The big book of concepts. MIT press (2002) 40. Poelmans, J., Ignatov, D.I., Kuznetsov, S.O., Dedene, G.: Formal concept analysis in knowledge processing: A survey on applications. Expert systems with applications 40(16), 6538–6560 (2013) 41. Poelmans, J., Kuznetsov, S.O., Ignatov, D.I., Dedene, G.: Formal concept analysis in knowledge processing: A survey on models and techniques. Expert systems with applications 40(16), 6601–6623 (2013) 42. Rosch, E.: Principles of categorization. Hillsdale, NJ: Lawrence Erlbaum (1978) 43. Roth, C., Obiedkov, S., Kourie, D.: Towards concise representation for taxonomies of epistemic communities. In: Concept Lattices and Their Applications, pp. 240– 255. Springer (2008) 44. Snásel, V., Polovincak, M., Abdulla, H.M.D., Horak, Z.: On concept lattices and implication bases from reduced contexts. In: ICCS Supplement 45. Stumme, G., Taouil, R., Bastide, Y., Pasquier, N., Lakhal, L.: Computing iceberg concept lattices with titanic. Data Knowl. Eng. 42(2), 189–222 (Aug 2002) 46. Tatti, N., Moerchen, F., Calders, T.: Finding robust itemsets under subsampling. ACM Transactions on Database Systems (TODS) 39(3), 20 (2014) 47. Torim, A., Lindroos, K.: Sorting concepts by priority using the theory of monotone systems. In: Conceptual Structures: Knowledge Visualization and Reasoning, pp. 175–188. Springer (2008) 48. Zaki, M.J., Meira Jr, W., Meira, W.: Data mining and analysis: fundamental concepts and algorithms. Cambridge University Press (2014) 49. Zeigenfuse, M.D., Lee, M.D.: A comparison of three measures of the association between a feature and a concept. In: Proceedings of the 33rd Annual Conference of the Cognitive Science Society. pp. 243–248 (2011)
2cs.AI
arXiv:1712.04034v1 [cs.CL] 11 Dec 2017 Learning Robust Dialog Policies in Noisy Environments Maryam Fazel-Zarandi Amazon Inc, USA [email protected] Shang-Wen Li Amazon Inc, USA [email protected] Jin Cao Amazon Inc, USA [email protected] Jared Casale Amazon Inc, USA [email protected] Peter Henderson Amazon Inc, USA [email protected] David Whitney Brown University [email protected] Alborz Geramifard Amazon Inc, USA [email protected] Abstract Modern virtual personal assistants provide a convenient interface for completing daily tasks via voice commands. An important consideration for these assistants is the ability to recover from automatic speech recognition (ASR) and natural language understanding (NLU) errors. In this paper, we focus on learning robust dialog policies to recover from these errors. To this end, we develop a user simulator which interacts with the assistant through voice commands in realistic scenarios with noisy audio, and use it to learn dialog policies through deep reinforcement learning. We show that dialogs generated by our simulator are indistinguishable from human generated dialogs, as determined by human evaluators. Furthermore, preliminary experimental results show that the learned policies in noisy environments achieve the same execution success rate with fewer dialog turns compared to fixed rule-based policies. 1 Introduction Modern speech-based assistants, such as Amazon Alexa, Apple Siri, and Google Assistant, enable users to complete daily tasks such as shopping, setting reminders, and getting answers to factual questions using vocal commands. Such human-like interfaces create a rich experience for users by enabling them to complete many tasks hands-free and eyes-free in a conversational manner. Depending on how complicated a task is, multiple rounds of conversation may be needed for the assistant to fully understand user requests. To achieve this, these interfaces require the design of complex dialog policies which can generate appropriate responses to queries and steer the conversation. Designing dialog policies in current speech-based assistants is challenging and time-consuming. In particular, responding to a user can be difficult since the selection of system actions is conditioned on the task, the user goals and preferences, and the dialog history. Additionally, environment noise and ambiguous user utterances present added complexity. Communicating with speech-based assistants always involves a noisy communication channel and the assistant should be able to recover from automatic speech recognition (ASR) and natural language understanding (NLU) errors by confirming its recognition results or eliciting more information from the user. To address these issues, both rule-based strategies and statistical modeling techniques have been developed [27]. Rule-based NIPS 2017 Workshop on Conversational AI: Today’s Practice and Tomorrow’s Potential, Long Beach, CA, USA. systems are costly to design and maintain, and generally assume the dialog state is fully observable with only a limited account of errors and uncertainties. Statistical modeling techniques, on the other hand, are able to generalize to such unknowns, but rely on the availability of huge amounts of training data. Some statistical-modeling techniques formulate dialog management as a reinforcement learning (RL) problem [16]. In this formulation, the goal is to adjust a parameterized dialog policy in order to maximize the expected cumulative reward over the course of a dialog. To reduce the cost of collecting the large amount of data needed by such models, researchers have focused on the development of user simulators which interact with the dialog policy (e.g., [6, 8, 9, 12, 27, 29]). Most of the existing simulators are domain dependent [9] and lack robustness against noise in real user utterances in order to recover from ASR/NLU errors [19]. In this paper, we focus on learning dialog policies in noisy environments where the assistant needs to recover from ASR/NLU errors. The key contribution of this paper is the development of a realistic user simulator which interacts with the assistant through voice commands. The simulator is trained on real-world data and takes dialog context into account. Furthermore, while other works simulate NLU errors at the intent- or slot-level [18], our simulator is able to use artificial noise in audio signals to induce a similar corpus-specific ASR word-error rate (WER). This error can then propagate to realistic intent- or slot-level errors. Using dialogs collected from MovieBot [25], an Alexa Skill [14] that converses with users about existing, new, and forthcoming movies, we show that our simulator generates dialogs that are indistinguishable from human generated dialogs. Using the simulator, we leverage deep RL to learn robust dialog policies that overcome upstream ASR/NLU errors in a noisy environment. Experimental results show that the learned policies achieve the same execution success rate with fewer dialog turns compared to fixed rule-based policies in noisy environments. 2 Related Work A dialog system can be formalized as a Markov Decision Process (MDP) [16]. An MDP is a tuple <S, A, P, R, γ> of states, actions, transition probability function, reward, and discount factor. In the formulation of RL, at each time step t, the agent observes a state st ∈ S and selects an action at ∈ A according to its policy (π : S → A). After performing the selected action, the agent receives the next state st+1 and a scalar reward rt . The trajectory restarts after the agent reaches a terminal state. With this formalization, RL can be used to find the optimal dialog policy (e.g., [26, 34, 15, 13]). In this context, at each turn the system acts based on its understanding of what the user has said, and the reward function is modeled in terms of different dimensions such as per-interaction user satisfaction, accomplishment of the task, efficiency of interaction, dialog duration, etc. Recently, deep RL has also been applied to the problem of dialog management. Cuayahuitl [7] presented an implementation of DQN [23, 24]. Zhao and Eskenazi [36] similarly used a deep recurrent Q-network (DRQN) to learn both state tracking and dialog policy for task-oriented dialogs. Fatemi et al. [10] compared different deep RL techniques on a restaurant-finding dialog problem. They showed that DDQN [32] converges faster than DQN for this domain. An important challenge in using RL for learning dialog policies is creating realistic user simulators that can generate natural conversations similar to a human user [27]. Existing approaches for simulating users can be categorized into two groups: intent-level and utterance-level simulation. An intent-level simulator abstracts a conversation as a sequence alternating between user intents and slots and bot actions, where an intent indicates the user’s intention (e.g., getting the plot) and slots represent information about a particular entity (e.g., movie title). The goal is to predict the next user intent based on the dialog history (e.g., [8, 11, 18, 28]). These methods require extensive work to manually design the user goal or agenda, which makes them less generalizable. Additionally, it is difficult to simulate real-world recognition errors. Utterance-level user simulators, on the other hand, attempt to generate natural language user responses. To this end, template-based natural language generation is usually adopted to output utterances based on handcrafted rules and predicted user intents [18]. Inspired by recent studies in sequence-to-sequence machine translation [31], end-to-end dialog simulators generate utterances with minimal feature engineering [9, 5]. However, these techniques often produce generic responses [17]. Additionally, they have to be trained with a significant amount of dialogs, and thus they do not work well for domain-specific applications. Given that the dialog state is not fully observable due to ASR/NLU errors and uncertainty over a user’s goals, researchers have also investigated the use of Partially Observable Markov Decision Processes 2 (POMDPs) [35]. However, these systems are complex and exact policy learning for POMDPs is intractable [35]. Rule-based policies, on the other hand, use ASR/NLU confidence scores to recover from errors. However, asking too many clarifying questions can frustrate users and in some scenarios it might be more beneficial to execute on available information. Additionally, ASR/NLU components are not static and as such policies with fixed confidence levels need to be constantly updated. 3 User Simulation To develop a user simulator that generates voice responses to the agent, we adopt a hybrid of language model based intent prediction and template-based utterance generation. The overall architecture of the user simulator is illustrated in Figure 1. The user simulator first generates the next intent and slot type based on dialog context. Dialog context includes previous intent and slot type pairs in the conversation, as well as text responses from the agent encoded with word2vec [22]. We model intent generation as a language modeling problem and use recurrent neural networks (RNNs) to predict the trajectory of intents. In this formulation, each possible intent and slot type pair form a token in the vocabulary, and every training dialog becomes a training intent sequence. For example, the sequence for the conversation with MovieBot in Table 1 is [Start, GetGenreMoviesIntent+genre, GetNextActorIntent, GetRatingIntent, End]. Given the predicted intent and slot type, the user simulator uniformly samples one utterance from the templates and fills the utterance with slot values uniformly sampled from a lexicon of the corresponding slot type. For example, given intent GetDirectorIntent and slot type movie_title, a sample utterance from the template is "who is the director of {movie_title}?". {movie_title} is then replaced uniformly by a value from the lexicon of movie titles. When the simulator is responding to a clarifying question, it answers yes or no to a confirmation question, but repeats the original utterance for elicitation. Providing the sampled text directly to the MovieBot NLU model would result in practically zero errors as the sample utterances are used in training the NLU model via the ASK portal. Therefore, we take the approach of generating a spoken audio signal from the text, injecting noise into the audio and then passing the audio to ASR and NLU models of the MovieBot Skill. This process simulates the real-world sources of error such as background noise in a person’s home. Concretely, we synthesize an audio signal with the text-to-speech (TTS) service provided by Amazon Polly [1] and contaminate the clean TTS output using PyAcoustics [20] to achieve a desired signal-to-noise ratio (SNR). Contamination is performed by filtering a white noise signal using a Fast Fourier transform applied to the original TTS output. Given our choice of architecture, any noise injection strategy may be developed without impacting the rest of the experimental setup. For example, in the future we plan User Simulator Conversational Agent Text Response TTS Add Noise ASR + NLU Dialog Policy Simulated user utterance User Utterance Simulated Generator intent + slot Intents, Slots Text Response Intent/Slot Generator Response Generator Action Previous Intents/Slots Figure 1: User simulator and conversational agent interaction. We use the text response generated by the agent before sending it to TTS to eliminate the need for ASR/NLU on the user simulator side. 3 Table 1: Example of a conversation with MovieBot. The intent indicates the user’s intention and slots (e.g., genre) represent information about a particular entity. Speaker User Bot User Bot User Bot User Bot Utterance A science fiction movie [intent = GetGenreMoviesIntent, genre = science fiction] How about Arrival, starring Amy Adams. If you want, you can say who else is in it. Who else is in it? [intent = GetNextActorIntent] The character of Ian Donnelly was played by Jeremy Renner. Is it any good? [intent = GetRatingIntent] It is rated 8.4 on I.M.D.b., based on about 70000 votes. Thank you [intent = AMAZON.StopIntent] Thank you for using MovieBot. to explore the impact of using different kinds of noise such as background noise, speaker-dependent speech variations, or multiple concurrent speakers. In this particular set of experiments, we tune the injected white noise to a level that causes the ASR WER of the simulator to match that of MovieBot’s deployed ASR model. This approach to simulating users has a number of benefits. By predicting intents first, the model becomes highly accurate and data efficient at the intent level due to the smaller number of intents compared to words in the language. By using RNNs, our simulator learns long-term dependencies between dialog context and intents from data to predict consistent user behavior. Additionally, using handcrafted templates ensures that the generated utterances are of high quality, while the TTS component with synthesized noise allows us to simulate real-world noisy environments. 3.1 Implementation and Evaluation We used a corpus of 966 MovieBot dialogs consisting of 6349 user turns to train the intent generation model with and without agent responses. The corpus is collected from real user interactions with MovieBot and annotated at the utterance level. For example, a user request such as "How old is Tom Hanks?" is annotated as intent=GetAgeIntent and slot PersonName=Tom Hanks. For intents and slot types, we added an embedding layer initialized with small random values. We used a single layer network followed by softmax, and for the hidden units we used two variants: vanilla RNN and Gated Recurrent Unit (GRU) [4]. The output of the network is a sequence of vectors, each with total number of intent/slot pair elements. The optimal parameters were found using grid search (Appendix A). For all models we set the learning rate to 0.001, and used Google’s trained word2vec model for encoding agent responses. As a baseline, we used a bigram model. Note that this model only takes the intent and slot type inputs. With this setting, we found that the vanilla RNN models have the lowest perplexity [30] scores across various trials (Table 2). We also conducted a user study to evaluate if participants could distinguish simulator generated dialogs from real human dialogs. The participants were each presented 10 dialogs via a web interface and asked to determine if each dialog was generated by a human or a simulated user. Optionally, the participants could also provide feedback as to why they made their decision. For each participant, five dialogs were sampled from the annotated MovieBot data, and the first utterance of each was used to generate five dialogs with the simulator. We used two models for the simulated data, namely, the bigram model and the vanilla RNN model (see Appendix B for example of simulated dialogs). The difference between the true positive rate (human dialog correctly identified as human) and false positive rate (simulated user incorrectly identified as human) is of particular interest: more individuals identifying simulated user dialogs as human indicates better user simulation. Table 2: Perplexity results for the Bigram, RNN, and GRU models. Note that a lower value indicates better performance. Model Intent and Slot Only Intent and Slot + Bot Response 4 Bigram 16.270 − RNN 7.675 7.274 GRU 7.769 7.892 Table 3: Results of the user study for distinguishing between real and simulated dialogs. The difference between identifying human as human and simulator as human is small. Number of Subjects Total Number of Dialogs Accuracy (Human/RNN + Bigram Models) Precision (Human/RNN + Bigram Models) Recall (Human/RNN + Bigram Models) F1-Score (Human/RNN + Bigram Models) Human Identified as Human Simulator Identified as Human (RNN + Bigram Models) Simulator Identified as Human (RNN Model) Simulator Identified as Human (Bigram Model) All Participants Participants Who Left Feedback 31 309 50.49% 50.29% 57.14% 53.50% 13 129 58.14% 57.14% 62.50% 59.70% 57.14% 56.13% 59.21% 53.16% 154 dialogs 155 dialogs 76 dialogs 79 dialogs 62.50% 46.15% 58.82% 32.26% 64 dialogs 65 dialogs 34 dialogs 31 dialogs In total, 31 individuals from the Amazon Alexa team participated in the study and evaluated 309 dialogs. The results are reported in Table 3. Overall results indicate that the difference between identifying human as human (57.14%) and simulator as human (56.13%) is not statistically significant (p-value = 0.858). Additionally, the RNN model is performing slightly better than the bigram model. Upon further inspection, we found a weak correlation (Pearson’s correlation coefficient: 0.38, p-value: 0.036) between how participants rated a dialog and whether or not they left feedback. The results for the 13 participants who left feedback is reported separately in the table, clearly showing the RNN (58.82% of simulated users identified as human) significantly (p-value = 0.033) outperforms the bigram model (32.26% of simulated users identified as human). We hypothesize that this is due to bigram dialogs being longer on average, and the participants who left feedback read the dialogs more carefully. Criteria for selecting a dialog as a real human as indicated in the participant feedback included: the expression of emotions (e.g., the user gets mad when the bot doesn’t answer correctly), logical progression of the dialog, specific goals that humans have regardless of the dialog system’s response, and naturalness of the dialogs. On the other hand, top criteria for identifying simulated users included: asking a question without context, referring to non-existent entities in the dialog, random responses by the user, and the user not getting frustrated. These comments illustrate that better context tracking and use of sentiments would further improve user simulation. Nevertheless, given the small difference between true positive and false positive results, the user simulator can sufficiently replace real users for dialog policy learning. 4 Dialog Policy Learning We used the proposed user simulator to train dialog policies through deep RL with the goal of conversational error recovery – that is, recovering from ASR/NLU errors through necessary clarifications. The components of the dialog policy learning problem are as follows: • S: The state is composed of 1) the hypothesis intent and slot, 2) the ASR and NLU intent and slot confidence scores, and 3) the previous bot action. • A: We constrain the action space to three actions that are critical for conversational error recovery: execute, confirm, and elicit. execute accesses an IMDb database and answers the user’s question. confirm and elicit are used to recover from ASR/NLU errors. confirm clarifies the intent and/or the slot with the user (e.g., "Do you want movies directed by Christopher Nolan?"), whereas elicit asks the user for missing information (e.g., "Which movie are you talking about?"). • R: Table 4 summarizes the reward function. Here, ref indicates the reference intent and slot as generated by the user simulator, and hyp refers to what the bot understands. If hyp 6= ref , this indicates that an NLU error was induced by added noise to the audio signal. The environment gives a large positive reward for executing correctly, a large negative reward for executing incorrectly, and smaller negative rewards for confirm and elicit. A successful execution is when the reference and hypothesis intent and slots are equal. Clarification, although sometimes necessary, can frustrate users, hence the small 5 Table 4: Reward Function a s r execute(hyp) execute(hyp) confirm elicit terminate (after correct execute) terminate (after incorrect execute) hyp = ref hyp 6= ref ∗ ∗ ∗ ∗ +10 −12 −3 −6 +1 −5 negative rewards for clarifying actions. Additionally, if the user leaves the conversation after a successful execution, the bot receives a small positive reward, but if the user leaves after an incorrect execution, the bot receives a medium negative reward. The reason we give a small positive reward to termination after a successful execution is that in the absence of an explicit goal we assume the user received the requested information and decided to terminate the dialog. All specific values were assigned through empircal analysis of user interactions with the simulator. For the deep RL experiments we used DQN and Dueling DDQN [33], with a fully-connected Multi-Layer Perceptron (MLP) to represent the deep Q-network. The input of the network is the concatenated embedding vector of intent and slot, the vector of confidence scores, and previous bot action. Additionally, we tuned a window size to include previous dialog turns as input. The hidden layers use a rectifier nonlinearity, and the output layer is a fully connected layer with linear activation function and a single output for each valid action. We trained the agents using an -greedy policy with  decreasing linearly from 1 to 0.1 over 100,000 steps. We ran each method 30 times for 150,000 steps, and in each run, after every 10,000 steps, we sampled 30 dialog episodes with no exploration to evaluate performance. All methods used the same set of random seeds and the best parameters were empirically found for each method using Hyperopt [2]. Additionally, we experimented with two fixed policies: 1) execute only and 2) execute with confirm and elicit. For the second fixed policy, we learned global ASR and NLU confidence score thresholds for MovieBot by optimizing the simulated agent’s average return (Table 5). Table 5: Fixed Policy (MovieBot - Execute/Confirm/Elicit) 4.1 a s execute(hyp) elicit confirm scoreASR ≥ 0.34 AND scoreN LU ≥ 0.56 scoreASR < 0.06 otherwise Experimental Results For our experiments, we varied the amount of noise such that we match the ASR WER of the MovieBot corpus. This was achieved when SNR was set to 2.8. Figure 2 shows the simulation results (see Appendix C for learned parameters). The Y-axis in the four subfigures is the average reward per turn, the average discounted return, the average number of turns per dialog, and the execution success rate of each technique, respectively. The X-axis in all four figures shows the number of learning steps. Shaded areas highlight the standard error of the mean. RL approaches have the same dialog episodes with the user with fewer clarifying questions, and as such result in around 40% relative gain in average rewards per turn over the best rule-based method (Figure 2a). Furthermore, they achieve the same success rate (Figure 2d) with 2 fewer turns per dialog on average (Figure 2c). To better understand the advantage of RL approaches, Figure 3 illustrates what a user experiences in order to obtain information in terms of number of turns needed to execute for each agent, where 1 means execute without any clarifying question. This figure illustrates that RL approaches learn to ask fewer clarifying questions while achieving a similar success rate. In other words, the percentage of unsuccessful executions stays the same with 6.2% for the Fixed Policy, 7.2% (±1.3%) for DQN, and 5.0% (±1.7%) for Dueling DDQN, with 0.2 less turns per execution. 6 (a) (b) (c) (d) Figure 2: Results during policy learning process. a) Average reward per turn, b) average discounted return, c) average number of turns per dialog, and d) execution success rate. Shaded areas highlight the standard error of the mean. RL approaches achieve our goal of recovering from ASR/NLU errors without frustrating the user and result in around 40% relative gain in average rewards per turn over the best rule-based method, with the same success rate and 2 fewer turns per dialog. To gain insight into the learned policy’s properties, we conducted a qualitative analysis to compare 100 dialogs generated by Dueling DDQN and Fixed Policy agents. To achieve a fair comparison, we fixed the random number generator so that the user simulator generated identical sequences of intents and utterances to interact with both agents. Overall, 28% of the dialogs were identical. Considering the remaining dialogs, two main reasons for the differences can be identified. First, the DDQN agent can decide not to clarify based on the combination of specific intent and confidence scores. Table 6 shows one dialog turn between the simulator and the two agents, along with the ground truth of the simulated utterance and intent (first column of the table), the hypothesis from MovieBot’s ASR/NLU component (second column), and the confidence scores of the hypotheses with a range between 0 and 1 (third column). In this example, since the ASR score is relatively low (0.239), the Figure 3: The number of turns needed in order to execute for Fixed Policy (Execute/Confirm/Elicit), DQN and Dueling DDQN when testing on the learned policies. RL approaches learn to ask fewer clarifying questions while achieving the same success rate. 7 Table 6: One dialog turn between a simulated user and Fixed Policy (MovieBot - Execute/Confirm/Elicit) agent, and Dueling DDQN agent, along with the ground truth of the utterance and intent (first column of the table), the hypothesis from the ASR/NLU components (second column), and the confidence scores of the hypotheses with a range between 0 to 1 (third column). The DDQN agent can decide not to clarify based on the combination of specific intent and confidence scores. Fixed Policy USER: recommend a popular movie BOT: Do you want popular movies? <confirm> Dueling DDQN USER: recommend a popular movie BOT: A popular movie is It, a Drama Horror film, starring Bill Skarsgård. <execute> reference hypothesis confidence score recommend a popular movie popular movies 0.239 GetPopularMoviesIntent GetPopularMoviesIntent 0.769 Fixed Policy agent decides to ask a clarifying question (denoted as <confim>). However, the low ASR score comes from the misrecognition of words which have small effect on the recognition of the intent as indicated by the high NLU confidence score. As such, the DDQN agent learns that the ASR confidence score is less important in this case and the agent executes the command and provides the requested information. Secondly, the DDQN agent learns that elicitation brings more information than confirmation since the user simulator repeats the original utterance. 82% of the clarifying questions asked by the DDQN agent are elicitation, as opposed to 61% for the Fixed Policy. 5 Conclusion In this paper, we demonstrate a method for learning robust dialog policies despite upstream NLU/ASR errors caused by noisy environments. The user simulator presented here is able to mimic realistic conversations, nearly indistinguishable from human dialogs, in the context of a real-world application – the MovieBot Alexa Skill. While other simulators inject noise via stochastic processes at the intent or slot level [18], our simulator is able to leverage audio signals and white noise to train policies in a production-like environment. Using this simulator, we apply deep RL to learn dialog policies which achieve the same success rate with fewer dialog turns compared to fixed rule-based policies in noisy environments. Based on feedback from the participants in our user study, an interesting area of future work is to use sentiment to further improve the user simulator. That is, user sentiment can be sampled to generate polarized target utterances to simulate user frustration or satisfaction. Furthermore, we plan to investigate other dimensions of dialog to improve our simulator and RL-based dialog policy learning methods. These include per-interaction user satisfaction and efficiency of interactions to model the reward function. Lastly, we plan to explore the impact of using different kinds of noise on the learned policies. Acknowledgments We thank Jason Pazis and other members of the Conversational AI group at Amazon for helpful discussions and comments. We also thank our anonymous reviewers for insightful feedback. Appendix A Intent Generation Hyper-parameters Number of Hidden Nodes per Layer Intent and Slot Embedding Size Number of Epochs RNN Model RNN Model + Bot Response GRU Model GRU Model + Bot Response 30 50 100 90 50 30 10 70 10 10 70 10 8 B Example of simulated dialogs identified as human dialogs Bigram Simulator Dialog User Bot User Bot User Bot User Bot User Bot User Bot C RNN Simulator Dialog ummm comedy I’d recommend Kingsman: The Golden Circle, a comedy action film starring Taron Egerton Look for something else. I really liked Moana, a comedy adventure film starring Auli’i Cravalho. What’s my favorite genre? Sci-fi, because it has been in 25 percent of your genre-related requests. Give me a blooper from the movie inception. Here is an interesting inception goof. *gives goof* How does John Wick rate? John Wick has a rating of 7.3 on IMDb., based on about 300000 votes. Cancel Thank you for using MovieBot. User Bot ummm comedy I think you might like Cars 3, a comedy adventure film, starring Owen Wilson. User Bot How long is the movie? The movie duration is 1 hour and 42 minutes. User Bot Who wrote the soundtrack? I don’t know how to handle that yet. You can also say, can children watch this movie. What is a popular romantic comedy movie? I’d recommend Blind, a romance drama film starring Demi Moore. Tell me about it. Here is a summary of blind from IMDb. *gives plot summary* That is enough. Thank you for using MovieBot. User Bot User Bot User Bot Learning parameters for DQN and Dueling DDQN for SNR of 2.8 Number of Hidden Layers Number of Hidden Nodes per Layer Embedding Size Dropout Learning Rate Experience Replay Size Window Size Discount Factor Target Model Update Interval DQN Dueling DDQN 2 32 5 0.5 0.0001 10,000 2 0.97 12,000 3 128 30 0.0 0.00001 15,000 8 0.97 8,000 References [1] Amazon Polly. https://aws.amazon.com/polly [2] Bergstra, J.; Yamins, D.; Cox, D. D. (2013). Hyperopt: A Python Library for Optimizing the Hyperparameters of Machine Learning Algorithms, Computational Science & Discovery, 8(1). https://github.com/hyperopt/hyperopt. [3] Chandramohan, S.; Geist, M.; Lefevre, F.; Pietquin, O. (2011). "User Simulation in Dialogue Systems using Inverse Reinforcement Learning,” in Proceedings of Interspeech. [4] Cho, B. van Merrienboer, D. Bahdanau, and Y. Bengio. (2014). On the properties of neural machine translation: Encoder-decoder approaches. In Proceedings of the Eighth Workshop on Syntax, Semantics and Structure in Statistical Translation. [5] Crook, P. A.; Marin, A. (2017). Sequence to Sequence Modeling for User Simulation in Dialog Systems. In Proceedings of the 18th Annual Conference of the International Speech Communication Association (INTERSPEECH 2017), 1706–1710. [6] Cuayahuitl, H.; Renals, S.; Lemon, O.; Shimodaira, H. (2005). Human-computer dialogue simulation using hidden Markov models. In Automatic Speech Recognition and Understanding, 2005 IEEE Workshop on (pp. 290-295). [7] Cuayahuitl, H. (2016). SimpleDS: A Simple Deep Reinforcement Learning Dialogue System, in Proceedings of International Workshop on Spoken Dialogue Systems (IWSDS). 9 [8] Eckert, W.; Levin, E.; Pieraccini, R. (1997). User modeling for spoken dialogue system evaluation. In Automatic Speech Recognition and Understanding, 1997. Proceedings., 1997 IEEE Workshop on (pp. 80-87). IEEE. [9] El Asri, L.; He, J.; Suleman, K. (2016). A Sequence-to-Sequence Model for User Simulation in Spoken Dialogue Systems, Interspeech, 1151–1155. [10] Fatemi, M.; Asri, L. E.; Schulz, H.; He, J.; Suleman, K. (2016). Policy networks with two-stage training for dialogue systems, in the Annual SIGdial Meeting on Discourse and Dialogue (SIGDIAL). [11] Frampton, M.; Lemon, O. (2006). Learning more effective dialogue strategies using limited dialogue move features. In Proceedings of the 21st International Conference on Computational Linguistics and the 44th annual meeting of the Association for Computational Linguistics, Association for Computational Linguistics, 185–192. [12] Georgila, K.; Henderson, J.; Lemon, O. (2006). User Simulation for Spoken Dialogue Systems: Learning and Evaluation, in Proceedings of Interspeech. [13] Georgila, K.; Traum, D. R. (2011). Reinforcement learning of argumentation dialogue policies in negotiation, in INTERSPEECH, 2073–2076. [14] Kumar, A.; Gupta, A.; Chan, J.; Tucker, S.; Hoffmeister, B.; Dreyer, M. (2017). Just ASK: Building an Architecture for Extensible Self-Service Spoken Language Understanding. arXiv:1711.00549 [cs.CL] [15] Lee, S.; Eskenazi, M. (2012). Pomdp-based let’s go system for spoken dialog challenge, in Proceedings of Spoken Language Technology Workshop (SLT), IEEE, 61–66. [16] Levin, E.; Pieraccini, R.; Eckert, W. (2000). A Stochastic Model of Human-Machine Interaction for Learning Dialog Strategies, IEEE Transactions on Speech and Audio Processing, 1, 11–23. [17] Li, J.; Monroe, W.; Ritter, A.; Galley, M.; Gao, J.; Jurafsky, D. (2016). Deep Reinforcement Learning for Dialogue Generation, in Proceedings of the 2016 Conference on Empirical Methods in Natural Language Processing (EMNLP). [18] Li, X.; Lipton, Z. C.; Dhingra, B.; Li, L.; Gao, J.; Chen, Y. N. (2016). A user simulator for task-completion dialogues. arXiv preprint arXiv:1612.05688. [19] Li, X.; Chen, Y. N.; Li, L.; Gao, J.; Celikyilmaz, A. (2017). End-to-End Task-Completion Neural Dialogue Systems, in Proceedings of The 8th International Joint Conference on Natural Language Processing. [20] Mahrt, T. (2016). PyAcoustics. https://github.com/timmahrt/pyAcoustics. [21] Mikolov, T; Karafiat, M.; Burget, L.; Cernocky, J; Khudanpur, S. (2010). Recurrent neural network based language model, in Proceedings of INTERSPEECH, vol. 2010, no. 9. International Speech Communication Association, 1045–1048. [22] Mikolov, T.; Sutskever, I.; Chen, K.; Corrado, G.; Dean, J. (2013). Distributed Representations of Words and Phrases and their Compositionality, in Proceedings of NIPS. [23] Mnih, V.; Kavukcuoglu, K.; Silver, D.; Graves, A.; Antonoglou, I.; Wierstra, D.; Riedmiller,M. (2013). Playing atari with deep reinforcement learning, in Proceesinds of NIPS Deep Learning Workshop. [24] Mnih, V.; Kavukcuoglu, D.; Silver, A. A.; Rusu, J.; Veness, M. G.; Bellemare, A.; Graves, M.; Riedmiller, A. K.; Fidjeland, G.; Ostro-vski, S.; Petersen, C.; Beattie, A.; Sadik, I.; Antonoglou, H.; King, D.; Kumaran, D.; Wierstra, D.; Legg, S.; Hassabis, D. (2015). Human-level control through deep reinforcement learning, Nature, 518(7540), 529–533. [25] MovieBot. https://www.amazon.com/Amazon-MovieBot/dp/B01MRKGF5W [26] Singh, S.; Litman, D.; Kearns, M.; Walker, M. (2002). Optimizing dialogue management with reinforcement learning: Experiments with the njfun system, Journal of Artificial Intelligence Research, 105–133. [27] Schatzmann, J.; Weilhammer, K.; Stuttle, M.; Young, S. (2006). A survey of statistical user simulation techniques for reinforcement-learning of dialogue management strategies. The knowledge engineering review, 21(2), 97–126. [28] Schatzmann, J.; Young, S. (2009). The hidden agenda user simulation model. IEEE transactions on audio, speech, and language processing, 17(4), 733–747. [29] Scheffler, K.; Young, S. (2002). Automatic learning of dialogue strategy using dialogue simulation and reinforcement learning. In Proceedings of the second international conference on Human Language Technology Research, Morgan Kaufmann Publishers Inc, 12–18. [30] Serban, I. V.; Sordoni, A.; Bengio, Y.; Courville, A.; Pineau, J. (2016). Building End-To-End Dialogue Systems Using Generative Hierarchical Neural Network Models, in Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 3776–3783. [31] Sutskever, I.; Vinyals, O.; Le, Q. V. (2014). Sequence to sequence learning with neural networks. In Advances in neural information processing systems, pp. 3104–3112. 10 [32] van Hasselt, H.; Guez, A.; Silver, D. (2015). Deep Reinforcement Learning with Double Q-Learning, in Proceedings of AAAI 2016, arXiv:1509.06461. [33] Wang, Z.; Schaul, T; Hessel, M.; van Hasselt, H.; Lanctot, M.; de Freitas, N. (2016). Dueling Network Architectures for Deep Reinforcement Learning, in Proceedings of the 33rd International Conference on Machine Learning, vol 48. [34] Williams, J. D.; Young, S. (2007). Partially observable markov decision processes for spoken dialog systems, Computer Speech & Language, 21(2), 393–422. [35] Young, S.; Gasic, M.; Thomson, B.; and Williams, J. D. (2013). POMDP-based statistical spoken dialog systems: A review, IEEE, 101(5), 1160–1179. [36] Zhao, T.; Eskenazi, M. (2016). Towards end-to-end learning for dialog state tracking and management using deep reinforcement learning, in Proceedings of the Meeting of the Special Interest Group on Discourse and Dialogue (SIGDIAL). 11
2cs.AI
Causality in the Semantics of Esterel: Revisited MohammadReza Mousavi Department of Computer Science, Eindhoven University of Technology, P.O. Box 513, NL-5600 MB Eindhoven, The Netherlands We re-examine the challenges concerning causality in the semantics of Esterel and show that they pertain to the known issues in the semantics of Structured Operational Semantics with negative premises. We show that the solutions offered for the semantics of SOS also provide answers to the semantic challenges of Esterel and that they satisfy the intuitive requirements set by the language designers. 1 Introduction Esterel [Ber99, PBEB07] is an imperative synchronous language used for the specification and programming of embedded systems. Esterel is based on the synchronous hypothesis, i.e., instantaneous reaction to signals and immediate propagation of signals in each time-instant. The combination of the imperative programming style and the synchronous hypothesis in Esterel has led to semantic challenges addressed in the literature [BG92, Ber99, Tin00, Tin01, TdS05, PB02]. In this paper, we present the main semantic challenge posed by Esterel, namely, the issue of causality. We show that it is reminiscent of the semantic challenges [Gro93, BG96, Gla04] in Structured Operational Semantics [AFV01] (esp. in the setting with negative premises; the same challenges were encountered before in logic programming [AB94]). We then show that using the known solutions for the latter simplifies the presentation of the semantics of the former substantially and leads to the desired intuitive properties set forth by the language designers. The rest of this paper is organized as follows. In Section 2, we present a brief overview of the Esterel language and its intuitive semantics. Section 3 introduces Structured Operational Semantics and notions of semantics and well-definedness associated with SOS specifications. Section 4 connects these two worlds by first presenting an SOS specification for Esterel and then studying the notions of semantics and well-definedness for the given specification. There, we show that certain notions of semantics for SOS formalize the intuitive criteria given by the language designers. Section 5 concludes the paper and presents directions for future research. 2 Esterel and Its Semantics: A Cook’s Tour The abstract syntax of Esterel is given by the grammar in Figure 1. A short introduction to the intuitive semantics of each of these constructs follows. In this grammar, 0 stands for the terminated process. Emitting signal s is denoted by emit s, which is instantaneously p, q ::= 0 | emit s | pres s ? p  q end | p ; q | p || q | sign s in p end | 1 | susp p when s | trap t in p end | exit t | loop p end Figure 1: The Abstract Syntax of Esterel B. Klin, P. Sobociński (Eds.): 6th Workshop on Structural Operational Semantics (SOS’09) EPTCS 18, 2010, pp. 32–45, doi:10.4204/EPTCS.18.3 c M.R. Mousavi This work is licensed under the Creative Commons Attribution-Noncommercial-No Derivative Works License. M.R. Mousavi 33 visible to all parts of the system (and may in turn cause more signals to be emitted). Reacting to present and absent signals is done via the if-then-else construct pres s ? p  q end, where if s is currently present (emitted by some other part of the system), p is executed, otherwise if s is absent q is executed. The combination of synchronous assumption, i.e., instantaneous propagation of signals, and checking for absence/presence of signals leads to semantic complications, presented shortly. Parallel composition of p and q is denoted by p || q. Process sign s in p end encapsulates s in p, i.e., declares s local to p. Another way of reacting to signals is by using the suspend construct susp p when s, which initially acts as p, but after one synchronous round will stop p as soon as signal s is emitted (suspension may happen after a number of rounds). Process 1 stands for a process that passes one unit of time and then terminates. One can define traps (exit points, exception handlers) to which a program can jump to by trap t in p end. The actual jump (raising the exception) is performed by executing exit t. A program can engage in a loop by means of loop p end (it can either keep on executing in the loop or exit the loop using exit t). An Esterel program is usually suffixed by a header declaring input and output signals. The syntax of this header is of the form input i; output o; and we assume that the set of input and output variables in a program is disjoint from the set of its local signals. Moreover, to unclutter the syntax, we assume fixed sets ι, ω and λ , respectively, of input, output and local variables. We pick typical members i, i0 , i0 , . . . ∈ ι, o, o0 , o0 , . . . ∈ ω and s, s0 , s0 ∈ λ . This way, one does not need to consider the input and out declaration anymore since input and output (and local) variables are recognized by their names. In some cases output and local variables can be treated uniformly, in which case we denote them by x, x0 , x0 ∈ ω ∪ λ . To study the semantic challenge concerning causality it suffices for us to look at the first two rows of our grammar. The other constructs, e.g., traps and time passing, are semantically interesting on their own but are treated satisfactorily in the literature and are orthogonal to the causality problems addressed here. Hence, in the remainder, we focus on the subset of Esterel given in the first two lines of our grammar and only in passing mention how to include time and traps in our presented semantics. A causality relation between events s and s0 (signals in this case), means that the presence and absence of s directly influences the presence or absence of s0 . For example, consider the following Esterel program: P0 pres i ? emit s  0 end ; pres s ? 0  emit o end In the above program, there is a causality chain starting from the input variable i to the local variable s and from s to the output variable o, namely the presence of i determines the presence of s and eventually leads to the absence of o, while the absence of s (caused by the absence of i), determines the presence of o. Using the syntax of Esterel one can easily write programs with cyclic dependencies (e.g., s is present if and only if s is present) or even worse, cyclic dependencies of a paradoxical nature (e.g., s is present if and only if s is absent). To illustrate these issues in Esterel, consider the following simple programs, which are all due to [Ber99]. These programs are canonical examples of different issues concerning causality in Esterel programs. P1 pres s ? emit s  0 end Program P1 relies on the presence of s in order to emit signal s. The logical semantics of Esterel rejects this program on the ground that it has two “models”. The first one is by assuming that s is present, which leads to a justification of this assumption by emitting s. The other one is by assuming that s is absent, which is supported by that 0 does not emit (denies emitting) signal s. In each synchronous round, the “model” of an Esterel program is defined by a global status, which defines the status (presence/absence) of signals in this round. A global status of a program is called 34 Causality in the Semantics of Esterel coherent when the presence/absence of signals are determined consistently by the emit statements in the program [Ber99]: The global status of a program is logically coherent iff at least one emit statement is executed for each signal assumed present and no emit statement is executed for each signal assumed absent. For example, program P1 has two logically coherent global statuses, namely presence of s and absence of s, as motivated above. The basis for rejecting program P1 is called “logical determinism” and is defined as follows [Ber99]. A program is logically deterministic if it has at most one logically coherent global status. P2 pres s ? 0  emit s end Program P2 relies on the absence of s in order to emit signal s. According to the logical semantics of Esterel, the above-given program has no logically coherent global status. Assuming that s is absent leads to s being emitted and hence, incoherency. Likewise, assuming that s is present requires emission of s, which is only justified when s is absent. The basis for rejecting program P2 is called “logical reactivity” and is defined as follows [Ber99]. A program is logically reactive if it has at least one logically coherent global status. The conjunction of logical determinism and logical reactivity is called logical coherency and is the main well-definedness criterion for the logical semantics of Esterel. P3 pres s ? emit s  emit s end The program above has only one logically coherent global status, namely that s is present. This global status is also coherent since assuming the presence of s leads to emitting it and moreover, it is not logically coherent to assume the absence of s, because it leads to its emission. Hence, as far as logical coherency is concerned this program is accepted and the logical semantics defines the semantics sketched above for this program. However, the semantics of Esterel used for its compiler, called the constructive semantics [Ber99, PBEB07], has further constraints which lead to the rejection of the above program. In this paper, we consider the issue of causality in both variants of the semantics and hence, also study the issue of constructiveness defined below. A program is constructive, if for each signal, it either proves its presence (must emit the signal) or proves its absence (cannot emit it). Program P3 is rejected by the above criterion since it can neither prove the emission of s (its only possible proof is cyclic since relies on the assumption that s is emitted), nor can it coherently prove its absence, since to prove the absence of s it should prove that neither of the two emit statements can be executed, thus it should prove that s can neither be present nor absent. P4 pres s0 ? emit s0  0 end || pres s0 ? pres s1 ? 0  emit s1 end  0 end Note that P4 is logically coherent, since its only logically coherent global status is that both s0 and s1 are absent. To check its constructiveness, let us focus on the emission of s0 . It definitely does M.R. Mousavi 35 not have to emit s0 , since the only reason for emitting s0 is the emit s0 statement in the left-hand side of the parallel composition, which is guarded by the check on the presence of s0 . Hence, the only proof for emitting s0 is cyclic. But it can potentially emit s0 (because it contains an emit s0 statement) and the only way to make sure that s0 cannot be emitted is to prove that the guard for emit s0 never becomes true, i.e., we need again to show that s0 cannot be emitted, which is also a cyclic reasoning. Hence, we conclude that P4 is not constructive because it neither must emit s0 , nor it can deny its emission. P5 pres s0 ? emit s1  0 end ; emit s0 The above program is logically coherent and its unique logically coherent global status is that both s0 and s1 are present. However, it is again rejected by the constructive semantics of Esterel. The reason is that in order to reach the emit statement for s0 , we should first make sure that the first statement has a well-defined semantics in this context, i.e., it either takes the if branch or the else branch and then terminates. However, giving a constructive proof for the transition of the conditional requires a constructive proof for the emission of s0 . This is another instance of the cyclic proof phenomenon rejected by the constructive semantics. 3 Structured Operational Semantics Structural Operational Semantics (SOS) was originally proposed by Plotkin [Plo04] as a syntax-directed and compositional way of defining semantics. Gradually, SOS has gained popularity and by now has become a de facto standard in defining operational semantics. This popularity has called for a richer syntax for SOS deduction rules and thus, in some applications, SOS deduction rules lost their structural, i.e., inductive, nature. Some authors then decided to use the same acronym for Structured Operational Semantics [AFV01, GV92]. With the richer syntax of SOS rules, one can write deduction rules whose meaning is not clear any more. Example 1 Examples of cyclic rules are the deduction rules (r1) and (r2) given below. s s p −→ p (r1) s p −→ p (r2) p9 s p −→ p The reader may already note the curious similarity between program P1 and deduction rule (r1) on one hand and program P2 and deduction rule (r2) on the other hand. Moreover, program P3 resembles the combination of (r1) and (r2). These similarities materialize as formal definitions in the remainder of this paper. To formalize the syntax and semantics of SOS, we first formalize the concepts of formulae and (transition) formulae. Definition 2 (Signature and (sub)terms) We let V represent an infinite set of variables. A signature Σ is a set of function symbols (operators), each with a fixed arity. An operator with arity zero is called a constant. We define the set T(Σ) of terms over Σ as the smallest set satisfying the following constraints. • A variable x ∈ V is a term. • If f ∈ Σ has arity n and t1 , . . . ,tn are terms, then f (t1 , . . . ,tn ) is a term. 36 Causality in the Semantics of Esterel We write t1 ≡ t2 if t1 and t2 are syntactically equal. The function vars : T(Σ) → 2V gives the set of variables appearing in a term. The set C(Σ) ⊆ T(Σ) is the set of closed terms, i.e., terms that contain no variables. A substitution σ is a function of type V → T(Σ). We extend the domain of substitutions to terms homomorphically. If the range of a substitution lies in C(Σ), we say that it is a closing substitution. A term s is considered a subterm of itself; if s is a subterm of ti , then s is also a subterm of f (t0 , . . . ,ti , . . . ,tn−1 ), for each s,ti ∈ T(Σ), 0 ≤ i < n, and n-ary f ∈ Σ. The set of subterms of a term t are denoted by subterms(t). Next, we formalize the syntax of SOS in terms of Transition System Specifications. Definition 3 (Transition System Specifications (TSS)) A transition system specification is a triplet (Σ, L, D) where • Σ is a signature. l l • L is a set of labels. If l ∈ L, and t,t 0 ∈ T(Σ) we say that t −→t 0 is a positive formula and t 9 (also l l denoted by ¬t −→ ) and t 9t 0 are negative formulae. A formula, typically denoted by φ , ψ, φ 0 , φi , . . . is either a negative formula or a positive one. • D is a set of deduction rules, i.e., tuples of the form (Φ, φ ) where Φ is a set of formulae and φ is a positive formula. We call the formulae contained in Φ the premises of the rule and φ the conclusion. We write vars(r) to denote the set of variables appearing in a deduction rule (r). We say a formula is closed if all of its terms are closed. Substitutions are also extended to formulae and sets of formulae in the natural way. A deduction rule (Φ, φ ) is typically written as Φ φ . For a deduction rule r, we write conc(r) to denote its conclusion and prem(r) to denote its premises. A set of positive closed formulae is called a transition relation. Given a transition relation T , L0 -labeled transitions of closed term p, denoted by T ↓ (p, L0 ) is the subset of T containing all formulae in T that have p as their source and some l ∈ L0 as their label. A TSS is supposed to define a transition relation but for the TSSs such as those given by deduction rules (r0) and (r1), it is not clear what the associated transition relation is. Several proposals are given in the literature, of which [Gla04] gives a comprehensive overview and comparison. In this paper, we shall use some of these proposals to define the semantics of Esterel. In order to facilitate the presentation of these proposals, we need two auxiliary definitions, namely contradiction and contingency, which are given below. l l l Definition 4 (Contradiction and Consistency) Formula t −→t 0 is said to contradict both t 9 and t 9t 0 , and vice versa. Φ is consistent w.r.t. Ψ, denoted by Φ  Ψ, when for each positive formula ψ ∈ Ψ, it holds that ψ ∈ Φ and for each negative formula ψ ∈ Ψ, there is no φ ∈ Φ such that φ contradicts ψ. l In the remainder, we only use negative formulae of the form t 9 in our specifications. We now have all the necessary ingredients to present different proposals for the semantics of TSSs. The first proposal is the following notion of supported model, which is a slight modification of the definition in [Gla04] (restricting it to particular sets of terms and labels). Definition 5 (Supported Model) Given A TSS, a transition relation T is a supported model for a set P ⊆ C(Σ) of closed terms and a set L0 ⊆ L of labels, when Φ l 1. for each q, q0 ∈ T(Σ) and l ∈ L if q −→ q0 ∈ T , then there exists a deduction rule and a substiφ l tution σ such that σ (φ ) = q −→ q0 and T  Φ, and M.R. Mousavi 37 2. for each p ∈ P and l ∈ L0 , p0 ∈ T(Σ), if there exists a deduction rule l Φ and a substitution σ such φ l that σ (φ ) = p −→ p0 and T  Φ, then p −→ p0 ∈ T . A transition relation T is a supported model for a TSS when it is a supported model for C(Σ) and L. Note that in the above definition and throughout the rest of the paper, we only consider the “immediate transitions” of p as its semantics. One can adapt the above definitions (and the subsequent ones) to consider the “transition system” associated with p as its semantics. For the subset of Esterel considered in this paper, these two notions lead to the same conclusion concerning the well-definedness and the semantics of a program. Semantics 1 (Unique Supported Model Semantics) Given a set P ∈ C(Σ) of closed terms and a set L0 ⊆ L of labels a TSS is meaningful w.r.t. P and L0 when it has a unique supported model for P and L0 ; the transition system associated with P and L0 is the unique supported model for P and L0 . A TSS is meaningful when it has a unique supported model; the transition relation associated with a TSS is its unique supported model. To illustrate these concepts, we give a few simple TSSs and study their supported models. Example 6 Consider the deduction rules given in Example 1. Consider the TSS comprising only deduction rule (r1). This TSS is not meaningful (w.r.t. {p} and s {s}) according to Semantics 1 because it has two supported models, namely 0/ and {p −→ p}. Also according to Semantics 1, the TSS comprising only deduction rule (r2) is not meaningful (w.r.t. {p} and {s}) either, because it has no supported model. Particularly, T = 0/ is not a supported model s s because it follows from the right-to-left implication of Definition 5 that p −→ p ∈ T . T = {p −→ p} is s not a supported model either since the only deduction rule providing a reason for p −→ p ∈ T is (r2) but s it does not hold that T  p0 9 . The TSS comprising both (r1) and (r2) is indeed meaningful and its associated transition relation is s T = {p −→ p}. Transition relation T is indeed a supported model since (r1) now provides a reason for s p −→ p ∈ T . Moreover T 0 = 0/ is not a supported model for this TSS because it then follows from (r2) s and the right-to-left implication of Semantics 1 that p −→ p ∈ T 0 . If one takes the transition system of a program as a formalization of its global state, then the TSS comprising of deduction rule (r1) is rejected because it has no coherent global state and the TSS with only (r2) is rejected because it does equivocally define a coherent global state. This suggests that Semantics 1 provides a suitable formalization for logical coherency. Next, we give a formalization of constructiveness in terms of supported proofs and denials. Definition 7 (Supported Proofs) A TSS T provides a supported proof for a formula φ , denoted by T `s φ , when there is a well-founded upwardly branching tree with formulae as nodes and of which • the root is labelled by φ ; • if a node is labelled by a positive formula ψ and the nodes above it form the set K then instance of a deduction rule in T . K ψ is an • if a node is labelled by a negative formula ψ, and the nodes above it form the set K, then for each instance of a deduction rule ψKii in T such that ψi contradicts ψ, there exists a formula ψi0 ∈ K contradicting a formula in Ki . 38 Causality in the Semantics of Esterel Semantics 2 (S-Complete Semantics) A TSS is s-complete for a set of closed terms P when for each formula φ with a p ∈ P as its source, either φ or a formula contradicting it has a supported proof. A TSS is s-complete when it is s-complete for the set C(Σ) of all closed terms and its transition relation is the set of positive formulae, for which it provides supported proofs. The following theorem is taken from [Gla04], which shows that constructiveness is indeed stronger than logical coherency. Theorem 8 A program (TSS) is s-complete only if it is meaningful according to Semantics 1 (has a unique supported model) and its associated transition system (unique supported model) coincides with the set of all positive formulae with a supported proof. Another useful property of supported proofs is their consistency [Gla04], stated below. Theorem 9 The notion of supported proof is consistent, i.e., for each formula φ with a supported proof, its negation does not have a supported proof. Next, we re-examine the TSS of Example 6 using our new notion of semantics. Example 10 The two TSSs comprising only (r1) and only (r2) are both rejected by Semantics 2, as s s well, since neither p −→ p, nor p 9 can be proven from either of them. (This is also an immediate consequence of Theorem 8.) s In the case of the TSS comprising only (r1), any attempt to build a supported proof for p −→ p has s the same formula as its premise. Moreover, p 9 cannot be proven because its proof tree should prove a s s s negation of a premise of (r1), i.e., again p 9 . In other words, both p −→ p and p 9 only have cyclic, and thus unsupported, proofs. s s Similarly, in the case of the TSS comprising only (r2), neither p −→ p, nor p 9 have a supported proof. Consider the TSS comprising both (r1) and (r2); it does have a unique supported model T = s s {p −→ p} but it is not s-complete and is thus rejected by Semantics 2. Any proof for p −→ p or its negation leads to a cycle, i.e., repeating the node below in the node above, and are thus not supported. Again drawing an analogy with Esterel programs, Semantics 2 requires the existence of a “constructive” (supported) proof for presence/absence of signals and thus rejects a program which uses both possibilities for a signal in order to establish its own presence. 4 Structured Operational Semantics for Esterel Our semantic specification of Esterel is presented in Figures 2 and 3. The state of the SOS comprises the syntax of the program currently being executed (defined by the grammar in Figure 1). The semantics is supposed to define two predicate, pXI,c , p ↑I,c,s , respectively, where the former means that p terminates with input evaluation I and under context c (if p is part of program c), and the latter means that p emits signal s (in the present time-instant) under the same assumptions. (A predicate formula can be formally interpreted as a transition formula with a dummy right-hand-side; in our case one can take 0 to be the dummy target of all predicate formulae, i.e., read p ↑I,c,s and pXI,c as p ↑I,c,s 0 and pXI,c 0, respectively.) In addition to the two predicates, the semantics is supposed to define a transition relation of the form I,c,s p −→ p0 , which denotes that program p emits signal s under input evaluation I and context c. Next, we briefly describe the deduction rules in Figures 2 and 3 and then show how they formalize the intuitive properties of Esterel programs discussed before. In all labels (of predicates and transitions) of Figures 2 M.R. Mousavi (e0) (p0) 39 (s0) emit x ↑I,c,x p ↑I,c,x p || q ↑I,c,x (p1) (f2) p ↑I,c,x (s1) p ; q ↑I,c,x q ↑I,c,x p || q ↑I,c,x i+ ∈ I (f0) pXI,c q ↑I,c,x p ; q ↑I,c,x c ↑I,c,s I,c,x0 (s2) p ↑I,c,x pres s ? p  q end ↑I,c,x p ↑I,c,x (f3) pres i ? p  q end ↑I,c,x i− ∈ I p −→ p0 (f1) p0 XI,c q ↑I,c,x p ; q ↑I,c,x ¬c ↑I,c,s q ↑I,c,x pres s ? p  q end ↑I,c,x q ↑I,c,x pres i ? p  q end ↑I,c,x 0 (en0) p[s00 /s] ↑I,c,s 0 sign s in p end ↑I,c,s [s/s 00 ] s00 fresh in p and r Figure 2: Structured Operational Semantics for Esterel (Part I: Signal Emission) and 3, I ⊆ {i+ , i− | i ∈ ι} such that for each i ∈ ι, either i− ∈ I or i+ ∈ ι (but not both), c ∈ C(Σ), i ∈ ι, x ∈ ω ∪ λ and s, s0 , s00 ∈ λ . In Figure 2, (e0) states that emit s can emit signal s under any arbitrary input evaluation and context. Deduction rules (s0), (s1) and (s2) describe when a sequential composition emits a signal, namely, when either the first component of the composition emits it, or when the first component terminates (possibly after a transition) and the second component emits the signal. The notions of termination and transition are defined in Figure 3. A parallel composition emits a signal if one of its components emits the signal, which is captured by deduction rules (p0) and (p1). An if-then-else constructs emits a signal, if either, according to deduction rule (f0), the local signal in its condition is emitted and the if-branch emits the signal or, according to deduction rule (f1), the local signal in the condition cannot be emitted and the else-branch is taken. Deduction rules (f2) and (f3) take care of the case where the condition is an input signal. In such cases, the condition is checked against the given input evaluation. A program p with a local signal s can emit a signal s0 , if p with a fresh signal s00 substituted for s can emit s0 (but if s0 is s, then p should be able to emit s00 ). In Figure 3, the concept of termination is defined through the predicate XI,c , in a straightforward manner. Exceptions are deduction rules (if4) and (if5), which rely on (the impossibility of) the emission of the condition signal for proving termination. In Figure 3, the deduction rules specifying a transition relation are almost identical to their counterparts in Figure 2. The most notable exceptions are deduction rules (seq0) to (seq4) and (par0) to (par3), which should consider all possible combinations of simultaneous transitions and individual transitions with (non-)termination in order to record the right target for the transition. One advantage of our approach to the semantics of Esterel presented in [Ber99, Tin00, Tin01] is that we can capture both the logical semantics and constructive semantics of Esterel using the same TSS (by using two generic notions of semantics for TSS already known in the literature). Another advantage is that it establishes a clear link between, respectively, the logical and the constructive approaches to Esterel semantics, on the one hand and the model- and proof-theoretic semantics of TSSs on the other hand. Definition 11 (Logical Semantics of Esterel) An Esterel program p is logically coherent if the above given TSS is meaningful according to Semantics 1 for subterms(p) and (predicates and) transitions I,p,x labeled {XI,p , ↑I,p,x , −→ }. The semantics of p is the set of above-mentioned predicates and transitions 40 Causality in the Semantics of Esterel (nil) I,c,x (seq0) (seq2) p −→ p0 I,c,x0 p0 XI,c I,c,x q −→ q0 (seq1) I,c,x I,c,x I,c,x q −→ q0 (seq3) I,c,x p ; q −→ q0 pXI,c (if0) p −→ p0 p −→ p0 I,c,x I,c,x I,c,x (par3) I,c,x p || q −→ q0 c ↑I,c,s p −→ p0 (if2) I,c,x I,c,x c ↑I,c,s pXI,c pres s ? p  q endXI,c (if6) i− ∈ I qXI,c p || q −→ p0 pXI,c pres i ? p  q endXI,c (if3) (if5) (if7) qXI,c p ; qXI,c I,c,x0 q −→ q0 (par4) pXI,c qXI,c p || qXI,c I,c,x q −→ q0 ¬c ↑I,c,s I,c,x pres s ? p  q end −→ q0 i− ∈ I I,c,x q −→ q0 I,c,x pres i ? p  q end −→ q0 ¬c ↑I,c,s qXI,c pres s ? p  q endXI,c i+ ∈ I qXI,c pres i ? p  q endXI,c c,s0 (enc0) pXI,c I,c,x0 I,c,x (if1) (seq4) p || q −→ p0 || q0 I,c,x p −→ p0 pres i ? p  q end −→ p0 (if4) p −→ p0 I,c,x p −→ p0 pres s ? p  q end −→ p0 i+ ∈ I qXI,c I,c,x (par1) q −→ q0 I,c,x0 p ; q −→ p0 q −→ q0 I,c,x0 p0 XI,c p ; q −→ q0 I,c,x p || q −→ p0 || q0 q −→ q0 p −→ p0 p0 XI,c I,c,x0 I,c,x (par0) I,c,x emit x −→ 0 p ; q −→ q0 pXI,c (par2) (em) 0XI,c p[s00 /s] −→ p0 c,s0 [s/s00 ] sign s in p end −→ sign s in p0 [s/s00 ] end (enc1) p[s00 /s]Xc sign s in p endXI,c s00 fresh in p and r Figure 3: Structured Operational Semantics for Esterel (Part II: Transition and Termination) M.R. Mousavi 41 associated with subterms(p). Next, we show that Definition 11 indeed satisfies the intuition behind logical coherency by reexamining the examples introduced in Section 2. Example 12 Consider program P0, recalled below. P0 pres i ? emit s  0 end ; pres s ? 0  emit o end It is straightforward to check that the following is the semantics of P0: {P0 ↑{i + },P0,s , P0 ↑{i − },P0,o {i+ },P0,i {i− },P0,o {i− },P0,s {i+ },P0,s {i+ },P0,s {i− },P0,s , P0 −→ 0, P0 −→ 0, emit s −→ 0, emit s −→ 0, emit o −→ 0, emit o −→ 0, 0X{i+ },P0 , 0X{i− },P0 }. Consider program P1 quoted below. 1 P1 pres s ? emit s  0 end 0,P1,s / 0,P1,s / / / It has two supported models, namely {P1 ↑0,P1,s , P1 −→ 0, emit s ↑0,P1,s , emit s −→ 0, 0X0,P1 } / 0,P1,s / / , 0X0,P1 }. Hence, P1 is not meaningful according to Semantics 1. and {emit s −→ 0, emit s ↑0,P1,s / Consider program P2 recalled below. P2 pres s ? 0  emit s end / Program P2 does not have any supported model: Assume, towards a contradiction, that P2 ↑0,P2,s is in the purported supported model of T . It then follows from item 1 in Definition 5 that there exists a / deduction rule whose conclusion can match P2 ↑0,P2,s and whose premises are consistent with T . The only candidates are (f0) and (f1); we analyze both cases below and show that they both lead to a contradiction. / / (f0) The premises of the instance of (f0) are P2 ↑0,P2,s and 0 ↑0,P2,s . It follows from item 1 of Definition 5 that both predicates should be in T and hence, item 1 again applies to both predicates and in / particular to 0 ↑0,P2,s . Hence, there should exist a deduction rule whose conclusions matches with the above predicate. A simple syntactic check on the deduction rules of Figures 2 and 3 reveals that none of the conclusions can be unified with the above predicate and hence a contradiction follows. / / (f1) The premises of the instance of (f0) are ¬P2 ↑0,P2,s and emit s ↑0,P2,s , both of which should be in 0,P2,s / T . Again item 1 of Definition 5 applies and thus, ¬P2 ↑ should be consistent with T , or in / other words, P2 ↑0,P2,s ∈ / T , which contradicts our initial assumption. The next program to consider is P3, quoted below. P3 pres s ? emit s  emit s end Program P3 is indeed meaningful and has the following unique supported model. 0,P3,s / 0,P3,s / / / {P3 ↑0,P3,s , P3 −→ 0, emit s ↑0,P3,s , emit s −→ 0, 0X0,P3 }. / 0,P3,s / Note that P3 ↑ (and/or the transition of P3) cannot be removed from the supported model; to see / this, it follows from item 2 of Definition 5 and deduction rule (e0) that emit s ↑0,P3,s ∈ T , and following 0,P3,s / the same reasoning and deduction rule (f1), we have that P3 ↑ ∈ T. Program P4 is considered logically coherent but not constructive by the language designers. Next, we show that this intuition is indeed supported by our formal definitions. 1 For each program, we choose ι, ω and λ , respectively, to comprise only the input, output and local variables mentioned in the program at hand. This allows us to focus only on the possibly relevant part of I when considering supported models. 42 Causality in the Semantics of Esterel P4 pres s0 ? emit s0  0 end || pres s0 ? pres s1 ? 0  emit s1 end  0 end Program P4 has a unique supported model, given below. 0,P3,s / 1 0,P3,s / 0 / / 1 , emit s −→ 0, 0X 0 , emit s −→ 0, emit s ↑0,P3,s }. {emit s0 ↑0,P3,s 0,P3 / 1 1 0 Note that neither emission of s0 , nor s1 cannot be present in a supported model. First, concerning s1 , suppose that s1 can be emitted, then it follows from item 1 of Definition 5 that there should be a deduction rule supporting this emission. This can only be due to (p1) and thus, the right-hand-side component of the parallel composition. This component, in turn can only emit s1 (due to deduction rules (f0) and then (f1)) if s0 is present and s1 is absent under the same context. The latter contradicts our assumption. Similarly, suppose that the supported model contains a predicate (or transition) to the effect that s0 can be emitted. We already know that no predicate for emitting s1 can be in the supported model. Hence, it follows from successive application of item 2 of Definition 5 using deduction rules (f0), (f1) and (e0) that s1 can be emitted under the same context, which is already shown to lead to contradiction. P5 pres s0 ? emit s1  0 end ; emit s0 Program P5 is also meaningful and has a unique supported model, given below. 0,P5,s / 0 0,P5,s / 1 / / 0 , P5 ↑0,P5,s 1 , P5 −→ 0, P5 −→ 0, {P5 ↑0,P5,s 0,P5,s / 1 / 1 , pres s ? emit s  0 end −→ 0, pres s0 ? emit s1  0 end ↑0,P5,s 0 1 0,P3,s / 0 0,P3,s / 1 / / 0 , emit s −→ 0, emit s ↑0,P5,s 1 , emit s −→ 0, 0X emit s0 ↑0,P5,s }. 0 1 1 0,P5 / Note that none of the predicates or transitions concerning the emission of s0 and s1 can be omitted from the supported model. If the predicate (transition) concerning the emission of s0 is omitted then the first component of sequential composition terminates and hence s0 should be emitted due to the second component. Since s0 should always be emitted, the emission of s1 is guaranteed by the first component of sequential composition. Definition 13 (Constructive Semantics of Esterel) An Esterel program p is constructive if for each sigI,p,s I,c,s nal s and each input evaluation I either p ↑I,p,s and p −→ p0 (for some p0 ) or ¬p ↑I,p,s and p 9 has a supported proof and moreover, either pXI,p or ¬pXI,p has a supported proof. To illustrate this semantics and identify its differences with the logical semantics, we reconsider those programs whom are considered non-constructive but logically coherent in Section 2. Example 14 Consider program P3. This program is both intuitively and formally shown to be logically coherent. Moreover, in Section 2, we introduced this program as a canonical example of a non/ constructive program. Next, we show that it is also formally non-constructive since neither P3 ↑0,P3,s 0,P3,s / / nor ¬P3 ↑0,P3,s have a supported proof (a similar reasoning shows that neither P3 −→ p0 for any p0 0,P3,s / / nor P3 9 have a supported proof). Suppose P3 ↑0,P3,s has a supported proof, then its proof is either due to (f0) or (f1). In the former case, the nodes placed above our proof obligation are P3 ↑I,P3,s and / emit s ↑0,P3,s . While the latter has a supported proof (due to (e0)), the former was our original proof obligation, thus, it only remains to check the alternative option due to (f1). The premises of (f1) are / then ¬P3 ↑I,P3,s and emit s ↑0,P3,s . Again the latter formula has a supported proof but the former is the negation of our proof obligation and thanks to Theorem 9, we know that if ¬P3 ↑I,P3,s has a supported proof then P3 ↑I,P3,s cannot have a supported proof. Similarly, if ¬P3 ↑I,P3,s has a supported proof, then a negation of a premise of all deduction rules that can match P3 ↑I,P3,s must have a supported proof. M.R. Mousavi 43 These two rules are again (f0) and (f1). The negation of the common premise of these two rules, i.e., / emit s ↑0,P3,s cannot have a supported proof (following Theorem 9, because the premise itself has a supported proof). Hence a negation of both P3 ↑I,P3,s and ¬P3 ↑I,P3,s should have supported proofs, which is again impossible due to Theorem 9. / 0 , nor its negation have a supported proof. Program P4 is not constructive since neither P4 ↑0,P4,s The only possible proof for the emission predicate can be due to (p0) or (p1). The case for (p1) does not lead to a supported proof since the right-hand-side does not contain any emit statement for s0 . If / 0 which was to be proven. The the supported proof is due to (p0), then it should hold that P4 ↑0,P4,s 0,P4,s / 0 does not have a supported proof, either. Since then a negation negation of the predicate, i.e., P4 ↑ of a premise of (p0) and (p1) should have a supported proof. The negation of the only premise of (p0) is / 0 , which in turn means that a negation of a premise of (f0) or (f1) must pres s0 ? emit s0  0 end ↑0,P4,s / 0 , but we were seeking a proof of have a supported proof. Consider (f0), its two premises are P4 ↑0,P4,s 0,P4,s / 0 , whose negation cannot be proven. its negation and emit s0 ↑ / 0 nor its negation are Program P5 is not constructive, either. We next show that neither P5 ↑0,P5,s 0,P5,s / 0 is due to one of the rules (s0) to (s2). provable. The purported supported proof for predicate P5 ↑ Next, we analyze each case and show that it leads to a contradiction. / 0 . This, in turn, can be either due to (s0) Then, it should hold that pres s0 ? emit s1  0 end ↑0,P5,s / 0, (f0) or (f1). If the predicate is due to (f0), then we should have a supported proof for P5 ↑0,P5,s 0,P5,s / 0 which was to be proven. If the proof is due to (f1), then ¬P5 ↑ should have a supported proof, which is impossible due to Theorem 9. (s1) Then, it should hold that pres s0 ? emit s1  0 endX0,P5 . This termination can be due to ei/ / 0 or ther (if4) or (if5). None of these two are possible since otherwise, respectively, P5 ↑0,P5,s 0,P5,s / 0 ¬P5 ↑ should have a supported proof. 0 0 0 0 p for some s and p . This transition (s2) Then, it should hold that pres s0 ? emit s1  0 endX0,P5,s / is due to either (if0) or (if1). Again, both cases lead to a contradiction due to a similar reasoning as in item (s0). As a side note, the common intuition and the similarities between deduction rules of Figures 2 and 3 may suggest that we can replace deduction rules of Figure 2 with the following rule (or even do without the emission predicates and make the same changes in the deduction rule for if-then-else statements in Figure 3): I,c,x p −→ p0 (emit) p ↑I,c,x This change leads to a much more restrictive semantics, which is unable to provide supported proofs for transitions of perfectly acceptable programs such as the following: P6 pres s ? emit o  0 end || emit s To see this, the reader may try to prove that P6 can emit signal o using deduction rule (par0). The proof of the premise of (par0) then should rely on (if0) and hence due to deduction rule (emit), we need to prove that s can be emitted (for the if-then-else to be able to take a transition). In turn, this can only be due to (par1). But to apply (par1), we need to know that the left-hand-side component can take a transition (in order to record its target), which is what we wanted to prove initially. This cycle is broken in our semantics, by deduction rule (p1) which only considers one of the two components to infer the 44 Causality in the Semantics of Esterel emission of s0 (without trying to record the target of the transition). The following proof illustrates why this program is indeed constructive. / emit s ↑0,P6,s / P6 ↑0,P6,s 0,P6,o / emit o −→ 0 0,P6,o / pres s ? emit o  0 end −→ 0 0,P6,s / emit s −→ 0 0,P6,o / P6 −→ 0 || 0 5 Conclusions and Future Work In this paper, we presented a link between the intuitive notions of logical coherency and constructiveness in the semantics of Esterel on the one hand, and the formal notions of supported models and supported proofs in the semantics of Structured Operational Semantics, on the other hand. By means of several canonical examples from the literature, we showed that our formal definitions indeed capture the intuitive criteria put forward by the language designers. Several formalizations of these two intuitive criteria exist in the literature. For example [Ber99, PBEB07] present three formalizations of constructive semantics of Esterel. In [Tin00, Tin01] another formalization of constructive semantics of Esterel is presented and is proven to coincide with one of the notions in [Ber99]. A rigorous comparison between all these notions and the ones presented in this paper remains as a topic for future research. In the semantics presented in this paper, we abstracted from the issues of exceptions (traps), loops and time. We expect that one can include these aspects without any substantial change in the semantics presented in this paper using the modular semantics approach of [Mos04, MN08]. This remains as another interesting exercise for the future. Acknowledgements. Inspiring discussions with Jean-Pierre Talpin and Paul Guernic are gratefully acknowledged. The author would like to thank the anonymous reviewers of SOS 2009 for their insightful reviews. References [AB94] Krzysztof R. Apt and Roland N. Bol. Logic programming and negation: A survey. Journal of Logic Programming (JLAP), 19/20:9–71, 1994. [AFV01] Luca Aceto, Willem Jan (Wan) Fokkink, and Chris Verhoef. Structural operational semantics. In Jan A. Bergstra, Alban Ponse, and Scott A. Smolka, editors, Handbook of Process Algebra, Chapter 3, pages 197–292. Elsevier Science, Dordrecht, The Netherlands, 2001. [Ber99] Gérard Berry. The Constructive Semantics of Pure Esterel. 1999. Draft version, available from: ftp://ftp-sop.inria.fr/meije/esterel/papers/constructiveness3.ps.gz. [BG92] Gérard Berry and Georges Gonthier. The Esterel synchronous programming language: Design, semantics, implementation. Science of Computer Programming (SCP), 19(2):87–152, 1992. [BG96] Roland N. Bol and Jan Friso Groote. The meaning of negative premises in transition system specifications. Journal of the ACM (JACM), 43(5):863–914, September 1996. [Gla04] Robert Jan (Rob) van Glabbeek. The meaning of negative premises in transition system specifications II. Journal of Logic and Algebraic Programming (JLAP), 60-61:229–258, 2004. M.R. Mousavi 45 [Gro93] Jan Friso Groote. Transition system specifications with negative premises. Theoretical Computer Science (TCS), 118(2):263–299, 1993. [GV92] Jan Friso Groote and Frits W. Vaandrager. Structured operational semantics and bisimulation as a congruence. Information and Computation (I&C), 100(2):202–260, October 1992. [MN08] Peter D. Mosses and Mark J. New. Implicit propagation in structural operational semantics. In Proceedings of the 5th Workshop on Structural Operational Semantics (SOS’08), pages 78–92, 2008. [Mos04] Peter D. Mosses. Modular structural operational semantics. Journal of Logic and Algebraic Programming (JLAP), 60-61:195–228, 2004. [PB02] Dumitru Potop-Butucaru. Optimizations for Faster Simulation of Esterel Programs. PhD thesis, École des Mines de Paris, CMA, Paris, France, 2002. [PBEB07] Dumitru Potop-Butucaru, Stephen A. Edwards, and Gérard Berry. Compiling Esterel. Springer-Verlag, 2007. [Plo04] Gordon D. Plotkin. The origins of structural operational semantics. Journal of Logic and Algebraic Programming (JLAP), 60:3–15, 2004. [TdS05] Olivier Tardieu and Robert de Simone. Loops in Esterel. ACM Transactions on Embedded Computing Systems (ACM TECS), 4:708–750, 2005. [Tin00] Simone Tini. Structural Operational Semantics for Synchronous Languages. PhD thesis, Dipartimento di Informatica, Università degli Studi di Pisa, Pisa, Italy, 2000. [Tin01] Simone Tini. An axiomatic semantics for Esterel. Theoretical Computer Science (TCS), 269(1-2):231– 282, 2001.
6cs.PL
Enumerating submodules invariant under an endomorphism Tobias Rossmann arXiv:1606.00760v1 [math.NT] 1 Jun 2016 Fakultät für Mathematik, Universität Bielefeld, D-33501 Bielefeld, Germany We study zeta functions enumerating submodules invariant under a given endomorphism of a finitely generated module over the ring of (S-)integers of a number field. In particular, we compute explicit formulae involving Dedekind zeta functions and establish meromorphic continuation of these zeta functions to the complex plane. As an application, we show that ideal zeta functions associated with nilpotent Lie algebras of maximal class have abscissa of convergence 2. 1 Introduction Zeta functions derived from endomorphisms. Throughout, rings are assumed to be commutative and unital. We say that a ring R has polynomial submodule growth if the following holds for every finitely generated R-module M : for each m > 1, the number of submodules of additive index m of M is finite and polynomially bounded as a function of m. Recall that R is semi-local if it contains only finitely many maximal ideals. Theorem 1.1 ([20, Thm 1]). Let R be a ring which is finitely generated over Z or semi-local with finite residue fields. Then R has polynomial submodule growth if and only if it has Krull dimension at most 2. Let R be a ring with polynomial submodule growth, let M be a finitely generated R-module, and let A ∈ EndR (M ). For m > 1, let am (A, R) denote the number of A-invariant R-submodules U 6 M with |M : U | = m. We define a zeta function ζA,R (s) := ∞ X am (A, R)m−s m=1 and we let αA,R < ∞ denote its abscissa of convergence; it is well-known that αA,R is precisely the degree of polynomial growth of the partial sums a1 (A, R) + · · · + am (A, R) as a function of m. 2010 Mathematics Subject Classification. 11M41, 15A04, 15A21, 17B30 Keywords. Zeta functions, invariant submodules, nilpotent matrices, ideal growth, submodule growth. This work is supported by the DFG Priority Programme “Algorithmic and Experimental Methods in Algebra, Geometry and Number Theory” (SPP 1489). The zeta functions ζA,R (s) belong to the larger theory of subobject zeta functions; for a recent survey of the area, see [25]. Indeed, using the terminology from [17], ζA,R (s) is ∞ P the submodule zeta function ζR[A]yM (s) of the enveloping algebra R[A] := R · Ai ⊂ i=0 EndR (M ) of A acting on M . The main results of this article, Theorems A–D, constitute a rather exhaustive analysis of the zeta functions ζA,R (s) in the cases that R is the ring of (S-)integers of a number field or a (generic) completion of such a ring. In particular, our findings provide further evidence in support of the author’s general conjectures on submodule zeta functions stated in [17, §8]. Related work: invariant subspaces. The study of subspaces invariant under an endomorphism has a long history. For a finite-dimensional vector space V over the real or complex numbers and A ∈ End(V ), Shayman [21] investigated topological properties of the compact analytic space SA of A-invariant subspaces of V . In particular, if A is nilpotent, then he found the subspace SA (d) ⊂ SA of d-dimensional A-invariant subspaces of V to be connected but usually singular. For an arbitrary ground field F and a fixed number n, Ringel and Schmidmeier [16] studied the category of triples (V, U, T ), where V is a finite-dimensional vector space over F , T ∈ EndF (V ) satisfies T n = 0, and U 6 V is F -invariant. While their point of view is rather different from ours, we would like to point out that they found the case of exponent n > 7 to involve instances of so-called “wild” representation type. Ideal zeta functions. In our study of the zeta functions ζA,R (s), we will frequently encounter another special case of submodule zeta functions, namely ideal zeta functions. Let R be a ring with polynomial submodule growth and let A be a possibly non-associative R-algebra whose underlying R-module is finitely generated. We write I /R A to indicate that I is a two-sided ideal of A which is also an R-submodule. The ideal zeta function (cf. [11]) of A is X ζA (s) := |A : I|−s . I/R A |A:I|<∞ For example, the ideal zeta function of the ring of integers of a number field k is precisely the Dedekind zeta function of k. In particular, the ideal zeta function of Z is the Riemann zeta function ζ(s). As explained in [17, Rem. 2.2(ii)], ideal zeta functions are in fact a special case of the submodule zeta functions discussed below. Global setup, Euler products, and growth rates. For the remainder of this article, let k be a number field with ring of integers o. Let Vk denote the set of non-Archimedean places of k. For v ∈ Vk , let kv be the v-adic completion of k and let ov be its valuation ring. For S ⊂ Vk , let \ oS = ov ∩ k v∈Vk \S 2 be the usual ring of S-integers of k. In the following, we investigate ζA,R (s), where A ∈ EndR (M ) and R = ov or R = oS for v ∈ Vk or a finite set S ⊂ Vk , respectively. The techniques that we use are predominantly local and valid for almost all places of k (i.e. for all but finitely many places); the exclusion of a finite number of exceptional places is common and frequently unavoidable in the theory of subobject zeta functions. If M is a finitely generate oS -module, then M ⊗oS ov is a free ov -module for almost all v ∈ Vk \ S. We thus lose little by henceforth assuming that M = onS and A ∈ Mn (oS ), where Mn (R) denotes the algebra of n × n matrices over a ring R. Note that if A ∈ Mn (k), then A ∈ Mn (ov ) for almost all v ∈ Vk . In order to exclude trivialities, unless otherwise stated, we always assume that n > 0. Being instances of submodule zeta functions, the zeta functions ζA,oS (s) admit natural Euler product factorisations. Proposition (Cf. [17, Lemma 2.3]). Let A ∈ Mn (oS ) for finite S ⊂ Vk . Then Y ζA,oS (s) = ζA,ov (s). v∈Vk \S The following is a consequence of deep results of du Sautoy and Grunewald on subobject zeta functions expressible in terms of what they call “cone integrals”. Theorem 1.2 (Cf. [7, §4]). Let A ∈ Mn (oS ) for finite S ⊂ Vk . Then: (i) The abscissa of convergence αA,oS of ζA,oS (s) is a rational number. (ii) ζA,oS (s) admits meromorphic continuation to {s ∈ C : Re(s) > αA,oS − δ} for some δ > 0. This continued function is regular on the line Re(s) = αA,oS except for a pole at s = αA,oS . (iii) Let βA,oS denote the multiplicity of the pole of (the meromorphic continuation of ) ζA,oS (s) at αA,oS . Then there exists a real constant cA,oS > 0 such that a1 (A, oS ) + · · · + am (A, oS ) ∼ cA,oS · mαA,oS (log m)βA,oS −1 . where f (m) ∼ g(m) signifies that f (m)/g(m) → 1 as m → ∞. Matrices, polynomials, and partitions. Prior to stating our main results, we need to establish some notation and recall some terminology. By a partition of an integer n > 0, we mean a non-increasing sequence λ = (λ1 , . . . , λr ) of positive integers with n = λ1 + · · · + λr ; for background, we refer to [12]. We write |λ| := n, len(λ) := r, and λ−1 := λr . We write λ ` n to signify that λ is a partition of n. For i > 0, define σi (λ) := λ1 +· · ·+λi . For 1 6 j 6 |λ|, let λ−1 (j) be the unique number i ∈ {1, . . . , len(λ)}   −1 with σi−1 (λ) < j 6 σi (λ); equivalently, λ (j) = min i ∈ {1, . . . , len(λ)} : j 6 σi (λ) . The dual partition of λ is denoted by λ∗ . Thus, if |λ| > 0, then λ∗ = (µ1 , . . . , µt ), where t = λ1 and µi = # i ∈ {1, . . . , len(λ)} : λi > i . 3 For a monic polynomial f = X m + am−1 X m−1 + · · · + a0 , let   0 1   .. ..   . . C(f ) =    0 1  −a0 . . . −am−2 −am−1 be its companion matrix. Let A ∈ Mn (k). It is well-known that there are monic irreducible polynomials f1 , . . . , fe ∈ k[X] and partitions λ1 , . . . , λe of positive integers n1 ,. . . , ne such that n = deg(f1 )n1 + · · · + deg(fe )ne and A is similar to its (primary) rational canonical form     λ     λ  λ λ e len(λe ) 1,len(λ1 ) diag C f1 1,1 , . . . , C f1 , . . . . . . , C fe e,1 , . . . C fe , over k. We call ((f1 , λ1 ), . . . , (fe , λe )) an elementary divisor vector of A over k; any two elementary divisor vectors of A coincide up to reordering. Main results. Recall that k is a number field with ring of integers o. Throughout, pv ∈ Spec(o) denotes the prime ideal corresponding to a place v ∈ Vk and qv = |o/pv | denotes the residue field size of kv . Our global main result is the following. Theorem A. Let S ⊂ Vk be finite and A ∈ Mn (oS ). Let ((f1 , λ1 ), . . . , (fe , λe )) be an elementary divisor vector of A over k. Write ki = k[X]/(fi ). Let oi denote the ring of integers of ki . Let Si = {w ∈ Vki : ∃v ∈ S.w | v} and write oi,Si := (oi )Si . Then the following hold: (i) There are finitely many places w1 , . . . , w` ∈ Vk \ S and associated rational functions W1 , . . . , W` ∈ Q(X) such that ζA,oS (s) = ` Y u=1 −s Wu (qw ) u × |λi | e Y Y  ζoi,Si (λ∗i )−1 (j) · s − j + 1 . (1.1) i=1 j=1 In particular, ζA,oS (s) admits meromorphic continuation to the complex plane. (ii) The abscissa of convergence αA,oS of ζA,oS (s) satisfies αA,oS = max len(λi ) ∈ N. 16i6e  (iii) Let I := i ∈ {1, . . . , e} : len(λi ) = αA,o PS . Then the multiplicity βA,oS of the pole of ζA,oS (s) at αA,oS satisfies βA,oS = λi,−1 . i∈I As we will see, part (i) is in fact a consequence of a similar formula (5.1) which is −s ) in (1.1) valid for almost all local zeta functions ζA,ov (s). The exceptional factors Wu (qw u cannot, in general, be omitted, see Example 5.5 below. We note that the special case A = 0n in Theorem A is consistent with the well-known formula ζoS (s)ζoS (s − 1) · · · ζoS (s − (n − 1)) for the zeta function enumerating all finiteindex submodules of onS . We further note that the shape of the right-hand side of (1.1) is 4 rather similar to that of Solomon’s formula [22, Thm 1] for the zeta function enumerating submodules of finite index of a ZG-lattice for a finite group G. Local functional equations under “inversion of the residue field size” are a common, but not universal, phenomenon in the theory of subobject zeta functions; see [23, 24]. For an extension of number fields k 0 /k and v ∈ Vk , let gv (k 0 ) denote the number of places of k 0 which divide v. Theorem B. Let A ∈ Mn (k) and let ((f1 , λ1 ), . . . , (fe , λe )) be an elementary divisor vector of A over k. Write µi := λ∗i . Then, for almost all v ∈ Vk , e  λ e i1 P P P e |λi | P deg(f ) − deg(f ) jµ s ( ) i i ij 2 |λi | ·gv (k[X]/(fi )) i=1 i=1 j=1 ζA,ov (s) = (−1)i=1 · qv · ζA,ov (s). qv →qv−1 (1.2) The operation of inverting qv can be interpreted using (5.1) or, in far greater generality, in terms of suitable explicit formulae as in [23]. We note that in the special case that (A − a1n )n = 0 for some a ∈ k, the functional equation (1.2) follows from [24, Thm 1.2] (see [24, Rem. 1.5]). It is natural to ask what properties of A can be inferred from its associated zeta functions. We will make frequent use of the following elementary observation. Lemma. Let A, B ∈ Mn (k). Suppose that k[A] and k[B] are similar (i.e. GLn (k)conjugate). Then for almost all v ∈ Vk , ζA,ov (s) = ζB,ov (s).  The following is another consequence of our explicit formulae. Theorem C. Let A ∈ Mn (k) and B ∈ Mm (k) be nilpotent. The following are equivalent: (i) n = m and A and B are similar. (ii) For almost all v ∈ Vk , ζA,ov (s) = ζB,ov (s). (iii) There exists a finite S ⊂ Vk such that A and B both have entries in oS and such that ζA,oS (s) = ζB,oS (s). The nilpotency condition in Theorem C cannot, in general, be omitted, see Remark 5.8. The author previously conjectured [17, §8.3] that generic local submodule zeta functions associated with nilpotent matrix algebras have a simple pole at zero. In the present case, our explicit formulae allow us to deduce the following. Theorem D. Let A ∈ Mn (k). Then for almost all v ∈ Vk , ζA,ov (s) has a pole at zero. Moreover, the following are equivalent: (i) For almost all v ∈ Vk , ζA,ov (s) has a simple pole at zero. (ii) There exists a ∈ k with (A − a1n )n = 0. 5 Behaviour at zero in general—a conjecture. We use this opportunity to state a generalisation of our conjecture on the behaviour at zero of local submodule zeta functions (see [17, Conj. IV and §8.3]); this generalisation disposes of the mysterious nilpotency assumption found in its precursor. For a ring R with polynomial submodule growth, a finitely generated R-module M , and Ω ⊂ EndR (M ), the submodule zeta function ζΩyM (s) is the Dirichlet series enumerating Ω-invariant R-submodules of finite index of M (cf. [17, Def. 2.1(ii)]). Let V be a finite-dimensional vector space over k and let A ⊂ Endk (V ) be an associative, unital subalgebra. Let rad(A) denote the (nil)radical of A. By the Wedderburn-Malcev Theorem [6, Thm 72.19], there exists a subalgebra S ⊂ A such that A = rad(A) ⊕ S as vector spaces (whence S ≈k A/ rad(A) is semisimple); moreover, S is unique up to conjugacy under (1 + rad(A)) 6 A× . Choose o-forms V ⊂ V , A ⊂ Endo (V) and S ⊂ Endo (V) of V , A, and S, respectively. We write Xv := X ⊗o ov in the following. Conjecture E. For almost all v ∈ Vk , ζAv yVv (s) ζSv yVv (s) = 1. s=0 This conjecture reduces to the behaviour predicted in [17, §8.3] in the “nilpotent case” A = rad(A) ⊕ k1V . In order to make Conjecture E more explicit, we recall Solomon’s formula for ζSv yVv (s). Let S = S1 ⊕ · · · ⊕ Sr be the Wedderburn decomposition of the semisimple algebra S (so that each Si is simple). Let Wi be a simple Si -module and decompose V = V1 ⊕ · · · ⊕ Vr , where Vi is isomorphic to Wimi and S acts diagonally on V . Let ki be the centre of Si and let oi be the ring of integers of ki . Finally, let ei be the Schur index of the central simple ki -algebra Si and define ni by dimki (Ai ) = n2i . Theorem 1.3 ([22, §4]). For almost all v ∈ Vk , ζSv yVv (s) = r m i ei Y Y Y ζoi,w (ni s − j + 1). (1.3) i=1 j=1 w∈Vki w|v The special case A = k[α] (α ∈ Endk (V )) of Conjecture E follows from Theorem 1.3 and Theorem 5.1 below. For a more abstract interpretation of Conjecture E, note that we may identify S acting on V with A/ rad(A) acting (faithfully) on the semi-simplification of V as an A-module (i.e. the direct sum of the composition factors of V as an A-module). Overview. In order to derive Theorems A–D, we proceed as follows. In §2, we reduce the computation of ζA,oS (s) to the case that the minimal polynomial of A over k is a power of an irreducible polynomial. In §3, we then further reduce to the case that A is nilpotent. The heart of this article, §4, is then devoted to the explicit determination of ζA,ov (s) for nilpotent A and almost all v ∈ Vk ; as a by-product, in Theorem 4.4, we compute the ideal zeta function of the 2-dimensional ring Z[[X]]. We then combine our findings and derive Theorems A–D in §5. Finally, as an application, in §6, we use Theorem A to compute the abscissae of convergence of some (largely unknown) submodule and ideal zeta functions. 6 Acknowledgment I would like to thank Christopher Voll for interesting discussions. Notation Throughout, N = {1, 2, . . . } and δij denotes the Kronecker symbol. The symbol “⊂” indicates not necessarily proper inclusion. We use ≈R to denote both the similarity of matrices over R and the existence of an R-isomorphism. Matrices act by rightmultiplication on row vectors. Matrix sizes are indicated by single subscripts for square matrices and double subscripts in general; in particular, 1n and 0m,n denote the n × n identity and m × n zero matrix, respectively. We say that a property depending on S holds for sufficiently large finite S ⊂ Vk , if there exists a finite S0 ⊂ Vk such that the property holds for all finite S ⊂ Vk with S ⊃ S0 . Given v ∈ Vk , we write | · |v for the v-adic absolute value on kv with |π|v = qv−1 for π ∈ pv \ p2v . By a p-adic field, we mean a finite extension K of the p-adic numbers Qp for some prime p. We let OK denote the valuation ring of K and write qK for the residue field size of K. Furthermore, νK and | · |K denote the additive valuation and absolute value on K, −1 respectively, normalised such that any uniformiser π satisfies νK (π) = 1 and |π|K = qK . When the reference to K is clear, we occasionally omit the subscript “K”. 2 Reduction to the case of a primary minimal polynomial By the following, up to enlarging S, we may reduce the computation of ζA,oS (s) to the case where the minimal polynomial of A over k is primary (i.e. a power of an irreducible polynomial). Proposition 2.1. Let A ∈ Mn (k). Let f = f1 · · · fe be a factorisation of the minimal polynomial f of A over k into a product of pairwise coprime monic polynomials fi ∈ k[X]. Let Ai ∈ Mni (k) denote the matrix of A acting on Ker(fi (A)) with respect to an arbitrary k-basis. Then for almost all v ∈ Vk , ζA,ov (s) = e Y ζAi ,ov (s). i=1 Proof. It is well-known that k n = Ker(f1 (A)) ⊕ · · · ⊕ Ker(fe (A)) is an A-invariant decomposition into subspaces of dimensions n1 , . . . , ne , say, and fi is the minimal polynomial of Ai . We may thus assume that A = diag(A1 , . . . , Ae ). By the Chinese remainder theorem, for each i = 1, . . . , e, there exists gi ∈ k[X] with gi ≡ δij mod fj for j = 1, . . . , e. Hence, gi (A) = diag(δi1 1n1 , . . . , δie 1ne ) ∈ k[A]. Choose a finite set S ⊂ Vk with Ai ∈ Mni (oS ) and gi ∈ oS [X] for i = 1, . . . , e. Let v ∈ Vk \ S. Write V := onv . The block diagonal shape of A yields an A-invariant decomposition V = V1 ⊕ · · · ⊕ Ve into free ov -modules of ranks n1 , . . . , ne . Note that A acts as Ai on each Vi and that each gi (A) acts as the natural map V  Vi ,→ V . Let 7 U 6 V be an ov -submodule. If U is A-invariant, then it decomposes as U = U1 ⊕ · · · ⊕ Ue for Ai -invariant submodules Ui 6 Vi . We conclude that (U1 , . . . , Ue ) 7→ U1 ⊕ · · · ⊕ Ue defines a bijection from n o (U1 , . . . , Ue ) : Ui 6ov Vi and Ui Ai 6 Ui for i = 1, . . . , e onto the set of A-invariant submodules of V whence ζA,ov (s) = ζA1 ,ov (s) · · · ζAe ,ov (s).  3 Reduction to the case of a nilpotent matrix Recall that C(f ) denotes the companion matrix of a polynomial f . Given a partition λ = (λ1 , . . . , λr ), let N(λ) := diag(C(X λ1 ), . . . , C(X λr )). Suppose that the minimal polynomial of A ∈ Mn (k) is a power of an irreducible polynomial f ; we then say that A is (f -)primary. The elementary divisors of A are f λ1 , . . . , f λr for a unique partition λ = (λ1 , . . . , λr ) of n/ deg(f ). We call λ the type of A. For an extension k 0 /k of number fields and S ⊂ Vk , define Dk0 /k (S) = {w ∈ Vk0 : ∃v ∈ S.w | v}. P Hence, using the notation from Theorem B, #Dk0 /k (S) = gv (k 0 ). v∈S In this section, we prove the following. Theorem 3.1. Let f ∈ k[X] be monic and irreducible. Let A ∈ Mn (k) be an f -primary matrix of type λ. Let k 0 = k[X]/(f ), and let o0 be the ring of integers of k 0 . Then for almost all v ∈ Vk , Y ζN(λ),o0w (s). ζA,ov (s) = w∈Vk0 w|v Hence, for all sufficiently large finite S ⊂ Vk , setting S 0 = Dk0 /k (S). ζA,oS (s) = ζN(λ),o0 0 (s). S Remark 3.2. In [21, §3], the study of the variety of subspaces invariant under an endomorphism of a finite-dimensional real or complex vector space is reduced to the case of a nilpotent endomorphism. Shayman proceeds by first reducing to the case of a primary endomorphism ([21, Thm 2]) and our Proposition 2.1 proceeded along the same lines. In his setting, the minimal polynomial of a primary endomorphism is a power of a linear or quadratic irreducible and he considers these cases separately. His reasoning is similar to arguments employed in our proof of Theorem 3.1 below. We may regard the factorisation of ζA,ov (s) obtained by combining Proposition 2.1 and Theorem 3.1 as an arithmetic analogue of the factorisation of the space of A-invariant subspaces in [21, Thm 3]. In [21, §4], Shayman then proceeds to study invariant subspaces of nilpotent matrices in Jordan normal form. For our purposes, a slightly different normal form, introduced in §4.1, will prove advantageous. 8 Our proof of Theorem 3.1 requires some preparation. 3.1 A generalised Jordan normal form for primary matrices Let ⊗ denote the usual Kronecker product [aij ] ⊗ B = [aij B] of matrices. The following result is a special case of the “separable Jordan normal form” in [14, §6.2]; it can also be obtained by restriction of scalars from the usual Jordan normal form of an f -primary matrix over a minimal splitting field of f over k. Proposition 3.3. Let f ∈ k[X] be monic and irreducible of degree d. Let A ∈ Mn (k) be f -primary of type λ. Write m := n/d. Then A ≈k 1m ⊗ C(f ) + N(λ) ⊗ 1d . Lemma 3.4. Let f ∈ k[X] be monic and irreducible of degree d, λ ` m > 0, and A = 1m ⊗ C(f ) + N(λ) ⊗ 1d . Then 1m ⊗ C(f ) = diag(C(f ), . . . , C(f )) ∈ k[A]. Proof. Write γ := C(f ) and e := λ1 ; note that X e is the minimal polynomial of N(λ) over every field. We may naturally regard A as an m × m matrix over the field k 0 := k[γ]. Moreover, we may identify k 0 = k[1m ⊗ C(f )] as k-algebras. Thus, k[A, 1m ⊗ C(f )] = k 0 [γ1m + N(λ)] = k 0 [N(λ)] whence the k-dimension of k[A, 1m ⊗ C(f )] is |k 0 : k|e = de. As f e is the minimal polynomial of A over k, the number de is also the k-dimension of k[A] whence the claim follows.  Regarding the transition from the number field k to the local ring ov , we note that the enveloping algebras of companion matrices take the expected forms over UFDs. Lemma 3.5. Let R be a UFD and let f ∈ R[X] be monic. Then evaluation at C(f ) induces an isomorphism R[X]/(f ) ≈R R[C(f )]. Proof. Let K denote the field of fractions of R. The kernel of the natural map R[X] → R[C(f )] is I := R[X] ∩ f K[X] and, clearly, f R[X] ⊂ I. Let h ∈ I so that h = f g for some g ∈ K[X]. By [4, Thm 7.7.2], there exists a ∈ K × with af, a−1 g ∈ R[X]. As f is monic (hence primitive), a ∈ A whence g = a(a−1 g) ∈ R[X] and h ∈ f R[X].  3.2 Properties of S-integers and their completions Lemma 3.6. Let k 0 /k be an extension of number fields. Let o0 be the ring of integers of k 0 . Let S ⊂ Vk be finite and S 0 = Dk0 /k (S). Then o0 ⊗o oS ≈o o0S 0 . Proof. The following argument is taken Q from [5]: if h is the class number of k and a ∈ o generates the principal ideal v∈S phv , then oS = o[1/a]. We conclude that o0 ⊗o oS = o0 [1/a] = o0S 0 .  Lemma 3.7. Let f ∈ k[X] be monic and irreducible. Let k 0 = k[X]/(f ) with ring of integers o0 . Then the following holds for all sufficiently large finite S ⊂ Vk : (i) oS [X]/(f ) ≈oS o0S 0 , where S 0 = Dk0 /k (S). 9 (ii) ov [X]/(f ) ≈ov Q o0w for v ∈ Vk \ S. w∈Vk0 w|v Proof. We freely use the exactness of localisation and completion; see [10, Prop. 2.5, Thm 7.2]. Let S0 ⊂ Vk be finite with f ∈ oS0 [X]. If S ⊃ S0 , then oS0 [X]/(f ) ⊗oS0 oS ≈oS oS [X]/(f ). As oS0 [X]/(f ) and o0 both become isomorphic to k 0 after base change to k, for sufficiently large finite S ⊃ S0 , oS [X]/(f ) ≈oS o0S 0 by Lemma 3.6. This proves the first part. For the second part, first note that, using (i) and Lemma 3.6, ov [X]/(f ) ≈ov oS [X]/(f ) ⊗oS ov ≈ov o0S 0 ⊗oS ov ≈ov o0 ⊗o ov . (3.1) Write o(v) := ov ∩ k for the v-adic valuation ring of k. It is easy to see that we may naturally identify o0 ⊗o o(v) with the integral closure of o(v) in k 0 . The key observation here is that if a ∈ k 0 is a root of a monic polynomial f (X) ∈ o(v) [X], then there exists m ∈ o with v(m) = 0 and ma ∈ o0 . Indeed, as in the proof of Lemma 3.6, we find m ∈ o such that for all w ∈ Vk , w(m) > 0 if and only if some coefficient c of f (X) satisfies w(c) < 0. By replacing m by a suitable power, we can ensure that all coefficients of mf (X) belong to o whence ma is integral over o and thus belongs to o0 . isomorphism k 0 ⊗k kv ≈kv QWe0 conclude (see [13, Ch. II, §8, Exerc. 4]) that the canonical Q 0 0 kw ([13, Ch. II, Prop. 8.3]) induces an isomorphism o ⊗o ov ≈ov ow . Part (ii) thus w|v w|v follows from the latter isomorphism and (3.1).  3.3 Proof of Theorem 3.1 Recall that am (A, R) denotes the number of A-invariant R-submodules of Rn of index m, where A ∈ Mn (R). Proposition 3.8. Let R1 , . . . , Rr be rings with polynomial submodule growth. (i) R := R1 × · · · × Rr has polynomial submodule growth. (ii) (Cf. [22, Lem. 1].) Let A ∈ Mn (R) and let Ai denote the image of A under the map Mn (R) → Mn (Ri ) induced by the projection R → Ri . Then am (A, R) = am (A1 , R1 ) · · · am (Ar , Rr ) for each m ∈ N. Thus, ζA,R (s) = ζA1 ,R1 (s) · · · ζAr ,Rr (s). Proof. Decompose Rn = R1n × · · · × Rrn with R acting diagonally on Rn . Multiplication by ei = (δ1i , . . . , δni ) ∈ R acts as the natural map Rn → Rin → Rn . Given an Ri -submodule Ui 6 Rin for i = 1, . . . , r, we obtain an R-submodule U = U1 × · · · × Ur of Rn and it is easy to see that every R-submodule of Rn is of this form in a unique way. Evidently, U has finite index in Rn if and only if each Ui has finite index in Rin . Part (i) is immediate and (ii) follows since A acts as Ai on Rin .  Proof of Theorem 3.1. Assuming that the finite set S ⊂ Vk is sufficiently large, we can make the following assumptions for all v ∈ Vk \ S: (NOR) A = 1m ⊗ C(f ) + N(λ) ⊗ 1d ∈ Mn (ov ) for d = deg(f ) and λ ` m (Proposition 3.3). 10 (DIA) 1m ⊗ C(f ) ∈ ov [A] (Lemma 3.4). Q 0 (INT) ov [X]/(f ) ≈ov ow (Lemma 3.7). w∈Vk0 w|v Let v ∈ Vk \ S. First note that as an ov -module, ov [C(f )] is freely generated by (1d , C(f ), . . . , C(f )d−1 ). It follows easily that onv is free of rank m as an ovQ [C(f )]-module. Using Lemma 3.5,(INT) allows us to identify ov [C(f )] = ov [X]/(f ) = w|v o0w =: Rv . Thanks to (NOR), we may then regard A as an m × m matrix over Rv . It follows from (DIA) that A-invariant ov -submodules of onv coincide with A-invariant Rv -submodules of Rvm . Using (DIA) once more, the latter Rv -submodules are precisely those invariant under A − C(f ) · 1m = N(λ). Therefore, ζA,ov (s) = ζN(λ),Rv (s). Noticing that the 0 (0, 1)-matrix N(λ) Q is preserved by each projection Rv → ow , Proposition 3.8 shows that ζN(λ),Rv (s) = ζN(λ),o0w (s) which concludes the proof.  w|v 4 The case of a nilpotent matrix Let λ ` n. Recall the definitions of λ−1 (j) from the introduction and of N(λ) from §3. Definition. Wλ (X, Y ) = 1/ n Q −1 (j) 1 − X j−1 Y λ  ∈ Q(X, Y ). j=1 Equivalently, Wλ (X, Y ) = 1/ len(λ) λi Q Q  1 − X σi−1 (λ)+j−1 Y i . This section is devoted i=1 j=1 to proving the following. Theorem 4.1. Let λ ` n and let K be a p-adic field. Then −s ζN(λ∗ ),OK (s) = Wλ (qK , qK ). Prior to giving a proof of Theorem 4.1, we record a few consequences. Corollary 4.2. Let A ∈ Mn (k) be nilpotent of type λ (see §3). Then for all sufficiently large finite sets S ⊂ Vk , ζA,oS (s) = n Y   ζoS (λ∗ )−1 (j) · s − j + 1 . j=1 If A ∈ Mn (o) and A ≈o N(λ), then we may take S = ∅.  As an application, we can determine the ideal zeta function of Z[X]/(X n ). Recall that ζ(s) denotes the Riemann zeta function. Corollary 4.3. For every prime p, ζZp [X]/(X n ) (s) = 1/ n Y (1 − pj−1−js ). j=1 11 In particular, ζZ[X]/(X n ) (s) = n Y ζ(js − j + 1). j=1 Proof. The matrix of multiplication by X acting on Z[X]/(X n ) with respect to the basis (1, X, . . . , X n−1 ), i.e. the companion matrix of X n , is precisely N((n)).  Remark. The subalgebra zeta functions of Zp [X]/(X n ) are known only for n 6 4 and sufficiently large primes p. Moreover, the author’s computation of these zeta functions for n = 4 relied on fairly involved machine calculations; see [18, §9.2]. (The formula for ζZp [X]/(X 4 ) (s) in [18] takes up about a page in total.) Subobject zeta functions over rings other than oS or ov have received little attention so far. We obtain the following. Theorem 4.4. (i) Z[[X]] has polynomial submodule growth. (ii) ζZ[[X]] (s) = ∞ Q ζ(js − j + 1) for Re(s) > 1. j=1 Proof. It is well-known that the maximal ideals of Z[[X]] are precisely of the form (X, p) for a rational prime p. It follows that X acts nilpotently on every Z[[X]]-module of finite length. Hence, if U 6Z[[X]] Z[[X]]d has finite index, then U contains X n Z[[X]]d for some n > 1. As Z[[X]] is Noetherian, U thus corresponds to a Z[X]-submodule of Z[X]d /X n Z[X]d . In particular, (i) follows since Z[X] has polynomial submodule growth by Theorem 1.1. Moreover, Corollary 4.3 implies the identity in (ii) on the level of formal Dirichlet series. In order to establish Q∞(absolute) convergence, let s > 1 be real. By well-known facts on infinite products, j=1 ζ(js − j + 1) converges (absolutely) if and only if the same is P true of F (s) := ∞ (ζ(js − j + 1) − 1). Using the non-negativity of the coefficients of j=1 each Dirichlet series ζ(js − j + 1), we obtain F (s) = ∞ X ∞ X nj−1 (nj )−s = j=1 n=2 gn n−s , n=2 where gn := n · ∞ X X m>2,j>1 n=mj 1 . m We see that for N > 2, N X n=2 gn 6 N X m>2,j>1 mj 6N N X 1 2 log N 6N = O(N (log N )2 ) = O(N 1+ε ) m m m=2 for every ε > 0. In particular, F (s) and ζZ[[X]] (s) both converge for Re(s) > 1. 12  Remark 4.5. Note, in particular, that ζZ[[X]] (s) has an essential singularity at s = 1 and therefore does not admit meromorphic continuation beyond its abscissa of convergence. This illustrates that Theorem 1.2(ii) does not carry over to general ground rings with polynomial submodule growth. In order to prove Theorem 4.1, we employ the p-adic integration machinery from [11]. For a ring R, let Trn (R) denote the R-algebra of upper triangular n × n-matrices over R. Recall that an element of a ring is regular if it is not a zero divisor. Write Trreg n (R) = {x ∈ Trn (R) : det(x) ∈ R is regular}. For a p-adic field K, let µK denote the Haar measure on K n with µK (OnK ) = 1. Proposition 4.6 ([11, §3]). Let K be a p-adic field and A ∈ Mn (OK ). Define VK (A) :=  reg x ∈ Trn (OK ) : OnK xA ⊂ OnK x to be the set of upper-triangular n × n matrices over OK whose rows span an A-invariant OK -submodule of finite index of OnK . Then Z s−1 s−n −1 −n ζA,OK (s) = (1 − qK ) |x11 |K |x22 |s−2 (4.1) K · · · |xnn |K dµK (x). VK (A) Strategy. In order to prove Theorem 4.1, we proceed as follows. First, in §4.1, we define a matrix A(λ) which is similar (over Z) to N(λ∗ ) so that ζN(λ∗ ),OK (s) = ζA(λ),OK (s). As we will see in §4.2, the advantage of A(λ) over N(λ∗ ) is that the sets VK (A(λ)) in Proposition 4.6 exhibit a natural, recursive structure. Specifically, we will define dλ := (λ2 , . . . , λlen(λ) ) and find that VK (A(λ)) can be described in terms of VK (A(dλ)) and membership conditions for generic vectors in generic sublattices. In §4.3, the geometry of such membership conditions is elucidated by means of suitable (birational) changes of coordinates. Finally, in §4.4, we combine all these ingredients and prove Theorem 4.1. 4.1 A dual normal form for nilpotent matrices Definition. Let λ = (λ1 , . . . , λr ) ` n > 0. Define dλ := (λ2 , . . . , λr ). We recursively define A(λ) ∈ Mn (Z) as follows: (i) If r 6 1, define A(λ) = 0n . (ii) If r > 1, define   0λ1  A(λ) =    1 λ2 0λ1 −λ2 ,λ2 A(dλ) In other words, 13  0λ1 ,λ3 +···+λr   .   (4.2)   0  λ1      A(λ) =          1 λ2 0λ1 −λ2 ,λ2 0 λ2 1λ3 0λ2 −λ3 ,λ3 .. . .. . .. . 1λr 0λr−1 −λr ,λr 0λr                (4.3) By the following, the A(λ) parameterise similarity classes of nilpotent matrices. Proposition 4.7. A(λ∗ ) and N(λ) are conjugate by permutation matrices. Proof. Let T (λ) be the Young diagram of λ and let V (λ) be the Z-module freely generated by the cells of T ; we use “English notation” for T (λ) and draw each row underneath its predecessor (if any). Define Θ(λ) to be the endomorphism of V (λ) (acting on the right) which sends each cell to its right neighbour if it exists and to zero otherwise. We consider two orderings on the cells of T (λ) and describe the associated matrices representing Θ(λ). The horizontal order is defined by traversing the cells of T (λ) from left to right within each row, proceeding from top to bottom. Clearly, N(λ) is the matrix of Θ(λ) with respect to this order. The vertical order is obtained by traversing the cells of T (λ) from top to bottom within each column, proceeding from left to right. Write µ := λ∗ , say µ = (µ1 , . . . , µ` ). We now show by induction on ` that the matrix of Θ(λ) with respect to the vertical order is A(µ)—it then follows, in particular, that A(µ) and N(λ) are conjugate as claimed. If ` 6 1, then Θ(λ) = 0 and A(µ) = 0 so let ` > 1. Let t1 , . . . , tn be the cells of T (λ) according to the vertical order. Then ti Θ(λ) = tµ1 +i for 1 6 i 6 µ2 and ti Θ(λ) = 0 for µ2 < i 6 µ1 . Let λ̃ := (dµ)∗ and Ṽ := Ztµ1 +1 ⊕ · · · ⊕ Ztn . We may naturally identify the endomorphism of Ṽ induced by Θ(λ) with Θ(λ̃) acting on V (λ̃); the defining basis of Ṽ is then ordered vertically. By induction, the matrix of Θ(λ) acting on Ṽ with respect to the basis (tµ1 +1 , . . . , tn ) is therefore A(dµ) whence the claim follows from the recursive description of A(µ) in (4.2).  For |λ| > 0, let B(λ) ∈ M|λ|,|dλ| (Z) denote the matrix obtained by deleting the first λ1 columns of A(λ). The following consequence of (4.3) will be useful below. Lemma 4.8. B(λ) contains precisely λ1 zero rows and by deleting these, the |dλ| × |dλ| identity matrix is obtained.  4.2 Recursion In this subsection, we give a recursive description of VK (A(λ)) (see Proposition 4.6). 14 Lemma 4.9. Let λ = (λ1 , . . . , λr ) ` n and let X be the generic upper triangular n × n matrix. Partition X in the form  XλI 2 ∗ X =  0λ1 −λ2 ,λ2 XλII1 −λ2 0 X̄λ1 ,|dλ| 0 X|dλ|  , where subscripts are added to denote block sizes. Then   XI X̄B(dλ)  0 0 XA(λ) =  λ1 . 0 0 X A(dλ)  Proof. This follows easily from (4.2). By Lemmas 4.8–4.9, the λ1 × |dλ| submatrix obtained by considering the first λ1 rows of XA(λ) and then deleting the first λ1 columns is of the form   x1,1 . . . x1,λ2 ∗ . . . ∗  .. .. . . ..  ..  . . . . .   λ  xλ2 ,λ2 ∗ . . . ∗ (4.4) X :=  ,  .. . . ..   . . . ∗ ... ∗ where the entries marked “∗” indicate unspecified but distinct variables taken from X̄. Corollary 4.10. Let λ ` n and let K be a p-adic field. For x ∈ Trn (K), define x0 and xλ by specialising X 0 and X λ from Lemma 4.9 and (4.4), respectively, at x. Then n |dλ| 0 λ VK (A(λ)) = x ∈ Trreg n (OK ) : (i) each row of x belongs to OK x and o (ii) x0 ∈ VK (A(dλ)) . (4.5) Proof. Let x ∈ Trreg n (OK ). Clearly, x ∈ VK (A(λ)) if and only if every row of xA(λ) is contained in the OK -span of the rows of x. By Lemma 4.9 and since det(x) 6= 0, the first λ1 rows of xA(λ) satisfy this condition if and only if every row of xλ is contained in the OK -span of the rows of x0 . Similarly, the rows numbered λ1 + 1, . . . , n of xA(λ) are contained in the OK -span of x if and only if each row of x0 A(dλ) is contained in the OK -span of x0 or, equivalently, if x0 ∈ VK (A(dλ)).  4.3 Characterising submodule membership Condition (i) in (4.5) leads us to investigate pairs (x, y) ∈ Rn × Trn (R) (where R is a ring) such that x is contained in the row span of y over R. In this subsection, we study the set of all such pairs (x, y) in the case that R = OK for a p-adic field K. 15 We write An = Spec(Z[X1 , . . . , Xn ]) and Trn = Spec(Z[Yij : 1 6 i 6 j 6 n]). Let  En (R) := (x, y) ∈ Rn × Trn (R) : x ∈ Rn y . (4.6) We identify An × Trn = Spec(Z[X1 , . . . , Xn , Y11 , . . . , Y1n , Y22 , . . . , Ynn ]). Define  Cn := (α, ω) ∈ Rn>0 × Trn (R>0 ) : ωii 6 αi for 1 6 i 6 n . (4.7) For a p-adic field K, we extend νK to families of elements of K via νK (a1 , . . . , am ) = (νK (a1 ), . . . , νK (am )) and write n o Cn (K) := (x, y) ∈ K n × Trn (K) : (νK (x), νK (y)) ∈ Cn ⊂ OnK × Trreg n (OK ). The following lemma will play a key role in our proof of Theorem 4.1. It shows that away from sets of measure zero, a suitable Z-defined change of coordinates (defined independently of K) transforms En (OK ) into Cn (K). Lemma 4.11. There exist • closed subschemes Vn , Vn0 ⊂ An × Trn of the form fn = 0 and fn0 = 0, respectively, where fn , fn0 ∈ Z[X, Y ] are non-zero non-units, and • an isomorphism ϕn : (An × Trn ) \ Vn → (An × Trn ) \ Vn0 such that the following conditions are satisfied: 0 K (i) For each p-adic field K, ϕK n (En (OK ) \ Vn (OK )) = Cn (K) \ Vn (OK ), where ϕn denotes the map induced by ϕn on K-points. (ii) The Jacobian determinant of ϕn is identically 1. (iii) ϕn commutes with (the restriction to its domain of ) the projection of An × Trn onto Trn and (the restriction of ) the projection onto the first coordinate of An . Example (n = 2). Let K be a p-adic field; we drop the subscripts “K” in the following. Let x, y, a, b, c ∈ O and suppose that x(ay − bx)abc 6= 0. Define y 0 := y − xa b ∈ K and   note that y 0 6= 0. Then (x, y) ∈ O2 · a0 cb if and only if ν(a) 6 ν(x) and (x, y) − xa (a, b) = (0, y 0 ) ∈ O(0, c); the latter condition toν(c) 6 ν(y 0 ) and implies that y 0 ∈ O.   is equivalent  We see that the map ((x, y), a0 cb ) 7→ ((x, y 0 ), a0 cb ) has the properties of ϕ2 stated in Lemma 4.11. Proof of Lemma 4.11. We proceed by induction. For n = 1, we let f1 = f10 = X1 Y11 and define ϕ1 to be the identity. Clearly, (i)–(iii) are satisfied. Let n > 1 and suppose that ϕn−1 with the stated properties has been defined. Let K be a p-adic field and let (x, y) ∈ K n × Trn (K) with x1 y11 6= 0. We again drop the subscripts “K”. Gaussian elimination shows that (x, y) ∈ En (O) if and only if the following conditions are satisfied: (a) xi , yij ∈ O for 1 6 i 6 j 6 n, 16 (b) x1 y11 ∈ O, and (c) x2 − x1 y11 y12 , . . . , xn − x1 y11 y1n  h i ∈ On−1 · yij 26i6j6n . We will now simplify (c) using a change of coordinates. For 2 6 j 6 n, let x0j := xj − yx111 y1j . Write x01 := x1 and x0 := (x01 , . . . , x0n ). Note that (x, y) 7→ (x0 , y) is an automorphism of the complement of Y11 = 0 in An × Trn and that the Jacobian determinant of this map is identically 1. Assuming that yij ∈ O for 1 6 i 6 j 6 n and yx111 ∈ O, we see that xj ∈ O if and only if x0j ∈ O. Hence, (x, y) ∈ En (O) if and only if (b) and the following two conditions are satisfied: (a’) x0i , yij ∈ O for 1 6 i 6 j 6 n, h i (c’) (x02 , . . . , x0n ) ∈ On−1 · yij 26i6j6n . After excluding suitable hypersurfaces, our inductive hypothesis allows us to perform another change of coordinates, replacing x02 , . . . , x0n by x002 , . . . , x00n , say, such that (x, y) ∈ En (K) if and only if the following conditions are satisfied: (a”) x00i , yij ∈ O for 1 6 i 6 j 6 n (where x001 := x01 = x1 ) and (c”) ν(yii ) 6 ν(x00i ) for 1 6 i 6 n; note that (b) is implied by the case i = 1 of (c”). For (i), assuming that the product of all x00i and yij is non-zero, conditions (a”) and (c”) are both satisfied if and only if (x00 , y) ∈ Cn (K), where x00 := (x001 , . . . , x00n ). The change of coordinates x 7→ x00 is defined over Z, does not depend on K, and, does not modify the x1 - or y-coordinate, as required for (iii); part (ii) follows since ϕn is defined as a composite of maps, the Jacobian determinant of each of which is identically 1.  Remark 4.12. It follows from Lemma 4.11(ii) that the change of variables afforded by ϕn does not affect p-adic measures. Moreover, it is well-known that if 0 6= f ∈ OK [X1 , . . . , Xn ], then the zero locus of f in OnK has measure zero. We conclude that Vn and Vn0 in Lemma 4.11 are without relevance for the computation of the integral in Proposition 4.6. 4.4 Final steps towards Theorem 4.1 By combining Corollary 4.10 and Lemma 4.11, we may reduce the computation of the integral in Proposition 4.6 for A = A(λ) to a purely combinatorial problem. Proposition 4.13. Let λ = (λ1 , . . . , λr ) ` n and let K be a p-adic field. Then −1 −n ζA(λ),OK (s) = (1 − qK ) Z Vλ (OK ) 17 n Y i=1 |xi |s−i K dµ(x), (4.8) n(n+1)/2 where Vλ (OK ) consists of those x ∈ OK satisfying the following divisibility conditions, where the yi,j,` below denote distinct variables among the xn+1 , . . . , xn(n+1)/2 : • For 2 6 i 6 r and 1 6 j 6 λi , xσi−1 (λ)+j xσi−2 (λ)+j , yi,j,1 , . . . , yi,j,j−1 . • For 3 6 i 6 r and σi−1 (λ) < j 6 n, xj yi,j,n+1 , . . . , yi,j,n+λi−2 . Remark. Since the yi,j,` do not appear in the integrand in the right-hand side of (4.8), it is of no consequence precisely which of the xn+1 , . . . , xn(n+1)/2 each yi,j,` refers to provided that distinct triples (i, j, `) yield different yi,j,` . Proof of Proposition 4.13. If r 6 1, the claim is trivially true so let r > 2. As our first step, we combine Corollary 4.10 and Lemma 4.11 in order to transform the membership condition (i) in (4.5) into the given divisibility conditions for i = 2 and i = 3, respectively; here, x1 , . . . , xn correspond to the diagonal entries x11 , . . . , xnn in Proposition 4.6. This transformation does not affect the integrand in (4.1) thanks to condition (iii) in Lemma 4.11. Subsequent steps then recursively apply the same procedure in order to express the condition x0 ∈ VK (A(dλ)) in Corollary 4.10 in terms of the stated divisibility conditions, taking into account the evident shifts of variable indices. Crucially, in doing so, none of the diagonal coordinates x1 , . . . , xn will ever be modified, again thanks to condition (iii) in Lemma 4.11. Therefore, the divisibility conditions obtained during earlier steps will never be altered by subsequent ones. The claim thus follows by induction.  Proof of Theorem 4.1. We once again omit subscripts “K” in the following. Moreover, we will make repeated use of the identity Z Z r s |x| |y| dµ(x, y) = |x|r+s+1 |y|s dµ(x, y) (4.9) {(x,y)∈O2 :x|y} O2 which follows by performing a change of variables y = xy 0 on the left-hand side. We will R s furthermore use the well-known identity O |x| dµ(x) = (1 − q −1 )/(1 − q −s−1 ). By repeatedly applying (4.9), we can eliminate all the yi,j,` variables and rewrite (4.8) as an integral over On . In order to record the effect of this procedure on the integrand, we use λ to index x1 , . . . , xn as follows. Let f (i, j) := σi−1 (λ) + j and, for x = (x1 , . . . , xn ), write xij := xf (i,j) . Define n o Uλ (O) := x ∈ On : xi,j | xi−1,j for 2 6 i 6 r and 1 6 j 6 λi 18 Proposition 4.7 and repeated applications of (4.9) to (4.8) show that Z −1 −n ζN(λ∗ ),O (s) = ζA(λ),O (s) = (1 − q ) Fλ (x) dµ(x), Uλ (O) where Fλ (x) = λi r Y Y s−f (i,j) xij × = x1j xij j−1 × s−j × j=1 λi r Y Y s−(λi−1 +1) xij λi r Y r Y Y xij λa−2 a=3 i=a j=1 i=2 j=1 i=1 j=1 λ1 Y λi r Y Y ; i=2 j=1 P the second equality follows since s − f (i, j) + j − 1 + ia=3 λa−2 = s − (λi−1 + 1) for 2 6 i 6 r and 1 6 j 6 λi . Another sequence of applications of (4.9) can be used to remove the divisibility conditions in Uλ (O), yielding (1 − q −1 n ) ζA(λ),O (s) = Z Y λ1 On = x1j j=1 × λi r Y Y s−j+i−1+ xij i−1 P (s−(λa +1)) a=1 dµ(x) i=2 j=1 Z Y λi r Y On s−j xij is−(σi−1 (λ)+j) dµ(x) i=1 j=1 = (1 − q −1 )n · λi  r Y Y 1 − q −is+σi−1 (λ)+j−1 −1 i=1 j=1 = (1 − q −1 n ) · Wλ (q, q −s ).  5 Proofs of Theorems A–D At the heart of our proofs of Theorems A–D lies the following local version of Theorem A. Theorem 5.1. Let S ⊂ Vk be finite and A ∈ Mn (oS ). Let ((f1 , λ1 ), . . . , (fe , λe )) be an elementary divisor vector of A over k. Write ki = k[X]/(fi ). Let oi denote the ring of integers of ki . Then for almost all v ∈ Vk , ζA,ov (s) = |λi | e Y Y Y  ζoi,w (λ∗i )−1 (j) · s − j + 1 . (5.1) i=1 j=1 w∈Vki w|v Proof. Combine Proposition 2.1, Theorem 3.1, and Theorem 4.1.  The following is a consequence of Proposition 4.6 and well-known rationality results from p-adic integration. 19 Proposition 5.2 (Cf. [11, §3]). Let K be a p-adic field and let A ∈ Mn (OK ). Then −s ζA,OK (s) ∈ Q(qK ). Hence, ζA,OK (s) admits meromorphic continuation to all of C. In order to deduce parts (ii)–(iii) of Theorem A, we will use the following corollary to the detailed analysis of analytic properties of subobject zeta functions in [7]. Lemma 5.3. Let S 0 ⊂ Vk be finite, S ⊂ S 0 , and let A ∈ Mn (oS ). Then αA,oS = αA,oS0 and βA,oS = βA,oS0 . Proof. We first argue that αA,ov < αA,oS for each v ∈ Vk \S. The zeta function ζA,oS (s+n) is an Euler product of cone integrals (cf. Proposition 4.6) in the sense of [7, Def. 4.2]; cf. [7, Cor. 5.6]. Using the notation from [7], by [7, Cor. 3.4] (which is correct despite a minor, fixable mistake in [7, Prop. 3.3], see [1, Rem. 4.6]), it follows that each αA,ov for v ∈ Vk \ S is a number of the form n − Bj /Aj for j = 1, . . . , q. Hence, by combining [7, Cor. 4.14, Lem. 4.15], for each v ∈ Vk \ S, 1 − Bk = αA,oS . Ak Q Clearly, 0 < αA,oS0 6 αA,oS . Define F (s) = v∈S 0 \S ζA,ov (s) so that ζA,oS (s) = F (s)ζA,oS0 (s) for all s ∈ C with Re(s) > αA,oS − δ and some constant δ > 0 (see Theorem 1.2). By the above, every real pole of F (s) is less than αA,oS . Since F (s) is a non-zero Dirichlet series with non-negative coefficients, we conclude that F (αA,oS ) > 0. In particular, since ζA,oS (s) has a pole at αA,oS , the same is true of ζA,oS0 (s) whence αA,oS0 > αA,oS . Moreover, F (αA,oS ) > 0 clearly also implies that βA,oS = βA,oS0 .  αA,ov < n + max k=1,...,q Remark 5.4. (i) The corresponding statement for subalgebra and submodule zeta functions (proved in the same way) is certainly well-known to experts in the area. Unfortunately, it does not seem to have been spelled out in the literature. For a similar statement in the context of representation zeta functions, see [2, Thm 1.4]. (ii) While in [7] only the case k = Q, S = ∅ is discussed, their arguments carry over to the present setting in the expected way (cf. [1] and [9, §4]). Proof of Theorem A. Part (i) follows from Theorem 5.1 and Proposition 5.2. Let µ ` n. We now determine the largest real pole, α say, and its multiplicity, β say, of Z(s) := n Y ζoS (µ−1 (j) · s − j + 1). j=1 Write r = len(µ). Since ζoS (s) has a unique pole at 1 (with multiplicity 1) and ζoS (s0 ) 6= 0 for real s0 > 1, α = max 16j6n j σi−1 (µ) + j σi (µ) = max max = max = µ1 = len(µ∗ ), 16i6r µ−1 (j) 16i6r 16j6λi i i 20 σi+1 (µ) i+1 1. Next, β is precisely the number of i ∈ {1, . . . , r} with µ1 = σi (µ) i the largest ` > 1 with µ1 = . . . = µ` . In other words, β = µ∗−1 . where the penultimate equality follows since iµi+1 6 σi (µ) and thus σi (µ) i > for 1 6 i 6 r− or, equivalently, Parts (ii)–(iii) of Theorem A now follow from Lemma 5.3 and the observation that Z(s) > 0 for s > α.  −s ) in Theorem A is in Example 5.5. The presence of the exceptional factors Wu (qw u   general unavoidable. For a simple example, let a ∈ o be non-zero and define A = 00 a0 . Using Proposition 4.6, a simple computation reveals that for v ∈ Vk , (1−s)(v(a)+1) ζA,ov (s) = 1 − qv1−2s + qv 1 − qv1−s · (qv−s − 1) · ζov (s)ζov (2s − 1); (5.2) note that ζA,ov (s) = ζov (s)ζov (2s − 1) whenever v(a) = 0. We further note that the exceptional factor in (5.2) in fact belongs to Z[qv−s ] and is thus regular at s = 1; this is consistent with the general fact that for subobject zeta functions, each local abscissa of convergence is strictly less than the associated global one (see the proof of Lemma 5.3). Finally note the failure of (1.2) for the finitely many v ∈ Vk with v(a) > 0. Remark 5.6. In view of a conjecture of Solomon proved by Bushnell and Reiner [3], it is natural to ask if the Wu ∈ Q(X) in Theorem A are in fact always elements of Z[X]. Proof of Theorem B. The claim follows by combining Theorem 5.1 and the following simple observation. Let k 0 /k be an extension of number fields, let o0 be the ring of integers of k 0 , and let v ∈ Vk be unramified in k 0 . If w ∈ Vk0 divides v, define f(w/v) by f(w/v) qw = qv . Define Y Y −1 Zv (s) = ζo0w (s) = 1 − qv−f(w/v)s . w∈Vk0 w|v w∈Vk0 w|v Then, recalling the definition of gv (k 0 ) from p. 5 and using P f(w/v) = |k 0 : k|, w|v Zv (s) 0 qv →qv−1 0 = (−1)gv (k ) qv−|k :k|s · Zv (s).  0 Lemma 5.7. Let S ⊂ Vk be finite. Let Z(s) and series Q Z (s) be two Dirichlet Q with finite abscissae of convergence. Suppose that Z(s) = v∈Vk \S Zv (s) and Z0 (s) = v∈Vk \S Z0v (s), where each Zv (s) and Z0v (s) is a series in qv−s with non-negative real coefficients. Suppose that Z(s) = Z0 (s) and that W (X, Y ), W 0 (X, Y ) ∈ Q(X, Y ) satisfy Zv (s) = W (qv , qv−s ) and Z0v (s) = W 0 (qv , qv−s ) for almost all v ∈ Vk \ S. Then W (X, Y ) = W 0 (X, Y ). Proof. of S. in the of the Let S0 be the set of rational primes which are Q divisible by at least one element For a rational prime p 6∈ S0 , define Zp (s) = v∈Vk ,v|p Zv (s) and define Z0p (s) same way. Assuming that Z(s) = Z0 (s), it is well-known that the coefficients Dirichlet series Z(s) and Z0 (s) coincide. We conclude that Zp (s) = Z0p (s) for 21 p 6∈ S0 . By Chebotarev’s density theorem, there exists an infinite set of rational primes P such that each p ∈ P splits completely in k. Writing d = |k : Q|, for almost all p ∈ P , we thus have W (p, p−s )d = Zp (s) = Z0p (s) = W 0 (p, p−s )d which easily implies W (X, Y )d = W 0 (X, Y )d . Thus, W (X, Y )/W 0 (X, Y ) is a dth root of unity in R(X, Y ) and hence in R, for the latter is algebraically closed in the former (see [4, Prop. 11.3.1]). The non-negativity assumptions on the coefficients of Zv (s) and Z0v (s) as series in qv−s now imply W (X, Y ) = W 0 (X, Y ).  Proof of Theorem C. The implications “(i)⇒(ii)⇒(iii)” in Theorem C are obvious. Suppose that (iii) holds. Let λ and µ be the types of the matrices A and B, respectively. By Theorem 5.1 and the preceding lemma, Wλ (X, Y ) = Wµ (X, Y ). It is easy to see that the binomials 1 − X a Y b for a > 0 and b > 1 freely generate a free abelian subgroup of Q(X, Y )× . Hence, λ = µ and A and B are similar.  Remark 5.8. If A is nilpotent and α ∈ k × , then A and A + α1n give rise to the same local and global zeta functions without A and A + α1n being similar. In general, equality of local and global zeta functions associated with non-nilpotent matrices A and B does not suffice to even conclude that the algebras k[A] and k[B] are similar. We give two examples to illustrate this behaviour, the first being arithmetic and the second of combinatorial origin. (i) By [15], there are monic irreducible polynomials f, g ∈ Z[X] of the same degree such that the number fields Q[X]/(f ) and Q[X]/(g) are non-isomorphic but have the same Dedekind zeta functions; moreover, as explained in [15, §1], every rational prime has the same “splitting type” in each of these two number fields. Consequently, ζC(f ),Zp (s) = ζC(g),Zp (s) for almost all primes p (ii) Recall the definition of Wλ from §4. A simple calculation shows that W(2,2,1) · W(3,1) = W(2,2) · W(3,1,1) . Let a, b ∈ k × be distinct and choose A, B ∈ M9 (k) to have elementary divisor vectors ((X − a, (3, 2), (X − b, (2, 1, 1))) and ((X − a, (2, 2)), (X − b, (3, 1, 1))), respectively. Then k[A] and k[B] are not similar but ζA,ov (s) = ζB,ov (s) for almost all v ∈ Vk . Remark 5.9. We further note that even for nilpotent A, the family of associated functional equations (1.2) in Theorem B does not determine A up to similarity; an example is given by two nilpotent 7 × 7-matrices with types (3, 1, 1, 1, 1) and (2, 2, 2, 1), respectively. Proof of Theorem D. By Theorem 5.1, ζA,ov (s) has a pole at zero for almost all v ∈ Vk . Moreover, again for almost all v ∈ Vk , this pole is simple if and only if e = 1 and almost all places of k remain inert in k[X]/(f1 ); the latter condition is equivalent to f1 being linear.  22 6 Applications 6.1 Submodules for unipotent groups Let S ⊂ Vk be finite, let M be a finitely generated oS -module, and let Ω ⊂ EndoS (M). We let αΩyM denote the abscissa of convergence of ζΩyM (s). As a special case (cf. [17, Rem. 2.2(ii)])), given a possibly non-associative oS -algebra A whose underlying oS -module is finitely generated, we let αA denote the abscissa of convergence of its ideal zeta function ζA (s), as defined in the introduction. We now illustrate how Theorem A can sometimes be used to determine αΩyM or αA without computing the corresponding zeta function. The key observation is that if ω ∈ Ω, then αΩyM 6 αω,o ; by Theorem A(ii), the latter number can be easily read off from an elementary divisor vector of ω ⊗oS k. We let Un denote the group scheme of upper unitriangular n × n matrices. For λ = (λ1 , . . . , λr ) ` n, we regard Uλ := Uλ1 × · · · × Uλr as a subgroup scheme of Un via the natural diagonal embedding. The case len(λ) = 1 of the following provides an affirmative answer to [18, Question 9.7]. Proposition 6.1. Let λ ` n. Then αUλ (o)yon = len(λ). Proof. Using the characterisation of Um (k) as the centraliser of a maximal flag of subspaces of k m , we see that on contains an Uλ (o)-invariant submodule N such that Uλ (o) acts trivially on on /N and on /N ≈o olen(λ) . We conclude that αUλ (o)yon > len(λ). For an upper bound, note that (1 + N(λ)) ∈ Uλ (o) whence αUλ (o)yon 6 αN(λ),o = len(λ).  For |λ| 6 5 and almost all v ∈ Vk , explicit formulae for ζUλ (ov )yonv (s) have been obtained by the author (see [18, §9.4] and the database included with [19]); the only unknown case for len(λ) = 6, namely λ = (6), seems out of reach at present. In addition to their global abscissae of convergence, the ζUλ (ov )yonv (s) are known to generically satisfy local functional equations under inversion of qv by [24, §5.2]. 6.2 Lie algebras of maximal class Let g be a finite-dimensional Lie k-algebra. For finite S ⊂ Vk , by an oS -form of g, we mean a Lie oS -algebra g whose underlying module is free and such that g ⊗oS k ≈k g. Let g = g1 ⊃ g2 ⊃ · · · be the lower central series of g. Recall that g has maximal class if g is nilpotent of class dimk (g) − 1. Equivalently, g has maximal class if and only if dimk (g1 /g2 ) = 2 and dimk (gi /gi+1 ) = 1 for 1 6 i 6 dimk (g) − 1. Proposition 6.2. Let g be an oS -form of a non-abelian finite-dimensional Lie k-algebra of maximal class. Then αg = 2. A proof of Proposition 6.2 using Theorem A will be given below. We note that Proposition 6.2 is consistent with explicit calculations carried out for specific Z-forms of the Lie algebras M3 ,M4 ,M5 , and Fil4 of maximal class and dimension at most 5 over the rationals; see [8, Ch. 2]. 23 Lemma 6.3. Let S ⊂ Vk be finite. Let g be an oS -form of a nilpotent Lie k-algebra of finite dimension n. Let A be the enveloping unital associative algebra of ad(g) within EndoS (g). (i) For each ϕ ∈ A, there exists c ∈ oS with (ϕ − c1g )n = 0; thus, ϕ ⊗oS k is primary. (ii) Let ϕ ∈ A have type λ over k. Then αg 6 len(λ). Proof. The first part follows from Engel’s theorem and the second part is then an immediate consequence of Theorem A(ii).  Lemma 6.4. Let g be an (n + 2)-dimensional non-abelian Lie k-algebra of maximal class. Then there exists a k-basis (x1 , x2 , y1 , . . . , yn ) of g such that [x1 , x2 ] = y1 , [x1 , yi ] = yi+1 for 1 6 i 6 n − 1, and [x1 , yn ] = 0. L Proof. Consider the graded Lie algebra i>1 gi /gi+1 associated with g. We claim that there exists an element a ∈ g/g2 such that [a, · ] maps gi /gi+1 onto gi+1 /gi+2 for each i > 1. To see that, first note that [g/g2 , gi /gi+1 ] = gi+1 /gi+2 for each i > 1. Let (u, v) be a k-basis of g/g2 . Then [u, v] spans g2 /g3 . Moreover, if wi spans gi /gi+1 , then the image of at least one of [u, wi ] and [v, wi ] spans gi+1 /gi+2 . Consequently, we may take a = u + cv for almost all c ∈ k. Given a as above, choose b ∈ g/g2 such that (a, b) is a basis of g/g2 . Let x1 , x2 ∈ g be preimages of a and b, respectively. Then, if we define y1 = [x1 , x2 ] and yi+1 = [x1 , yi ], we obtain a basis (x1 , x2 , y1 , . . . , yn ) of the desired form.  Proof of Proposition 6.2. By Lemma 5.3 and Remark 5.4(i), we are free to enlarge S as needed. In particular, we may assume that g/g2 ≈oS o2S whence αg > 2 follows. Moreover, we may assume that g possesses an oS -basis (x1 , x2 , y1 , . . . , yn ) as in by Lemma 6.4. The matrix of [x1 , · ] with respect to the basis (x2 , y1 , . . . , yn , x1 ) is precisely N((n + 1, 1)) whence αg 6 2 follows from Theorem A.  References [1] N. Avni, B. Klopsch, U. Onn, and C. Voll, Representation zeta functions of compact p-adic analytic groups and arithmetic groups, Duke Math. J. 162 (2013), no. 1, 111–197. [2] , Arithmetic Groups, Base Change, and Representation Growth, Geom. Funct. Anal. 26 (2016), no. 1, 67–135. [3] C. J. Bushnell and I. Reiner, Zeta functions of arithmetic orders and Solomon’s conjectures, Math. Z. 173 (1980), no. 2, 135–161. [4] P. M. Cohn, Basic algebra, Springer-Verlag London, Ltd., London, 2003. Groups, rings and fields. [5] B. Conrad, The lattice of S-integers. See http://math.stanford.edu/~conrad/248APage/handouts. [6] C. W. Curtis and I. Reiner, Representation theory of finite groups and associative algebras, Pure and Applied Mathematics, Vol. XI, Interscience Publishers, a division of John Wiley & Sons, New York-London, 1962. [7] M. P. F. du Sautoy and F. J. Grunewald, Analytic properties of zeta functions and subgroup growth, Ann. of Math. (2) 152 (2000), no. 3, 793–833. [8] M. P. F. du Sautoy and L. Woodward, Zeta functions of groups and rings, Lecture Notes in Mathematics, vol. 1925, Springer-Verlag, Berlin, 2008. 24 [9] D. H. Dung and C. Voll, Uniform analytic properties of representation zeta functions of finitely generated nilpotent groups (2015). To appear in Trans. Amer. Math. Soc. arXiv:1503.06947. [10] D. Eisenbud, Commutative algebra, Graduate Texts in Mathematics, vol. 150, Springer-Verlag, New York, 1995. With a view toward algebraic geometry. [11] F. J. Grunewald, D. Segal, and G. C. Smith, Subgroups of finite index in nilpotent groups, Invent. Math. 93 (1988), no. 1, 185–223. [12] I. G. Macdonald, Symmetric functions and Hall polynomials, The Clarendon Press, Oxford University Press, New York, 1979. Oxford Mathematical Monographs. [13] J. Neukirch, Algebraic number theory, Grundlehren der Mathematischen Wissenschaften, vol. 322, Springer-Verlag, Berlin, 1999. [14] C. Norman, Finitely generated abelian groups and similarity of matrices over a field, Springer Undergraduate Mathematics Series, Springer-Verlag, London, 2012. [15] R. Perlis, On the equation ζK (s) = ζK 0 (s), J. Number Theory 9 (1977), no. 3, 342–360. [16] C. M. Ringel and M. Schmidmeier, Invariant subspaces of nilpotent linear operators. I, J. Reine Angew. Math. 614 (2008), 1–52. [17] T. Rossmann, Computing topological zeta functions of groups, algebras, and modules, I, Proc. Lond. Math. Soc. (3) 110 (2015), no. 5, 1099–1134. [18] [19] , Computing local zeta functions of groups, algebras, and modules (preprint) (2016). arXiv:1602.00919. , Zeta, version 0.3, 2016. See http://www.math.uni-bielefeld.de/~rossmann/Zeta/. [20] D. Segal, On the growth of ideals and submodules, J. London Math. Soc. (2) 56 (1997), no. 2, 245–263. [21] M. A. Shayman, On the variety of invariant subspaces of a finite-dimensional linear operator, Trans. Amer. Math. Soc. 274 (1982), no. 2, 721–747. [22] L. Solomon, Zeta functions and integral representation theory, Advances in Math. 26 (1977), no. 3, 306–326. [23] C. Voll, Functional equations for zeta functions of groups and rings, Ann. of Math. (2) 172 (2010), no. 2, 1181–1218. [24] , Local functional equations for submodule zeta functions associated to nilpotent algebras of endomorphisms (preprint) (2016). arXiv:1602.07025. [25] , Zeta functions of groups and rings – recent developments, Groups St Andrews 2013, 2016, pp. 469–492. 25
4math.GR
Journal of Machine Learning Research () Submitted ; Published A k-core Decomposition Framework for Graph Clustering Christos Giatsidis [email protected] LIX, École Polytechnique Palaiseau, 91120, France Fragkiskos D. Malliaros [email protected] LIX, École Polytechnique Palaiseau, 91120, France arXiv:1607.02096v1 [cs.SI] 7 Jul 2016 Nikolaos Tziortziotis [email protected] LIX, École Polytechnique Palaiseau, 91120, France Charanpal Dhanjal [email protected] TSI, Télécom ParisTech Paris, 75013, France Emmanouil Kiagias [email protected] LIX, École Polytechnique Palaiseau, 91120, France Dimitrios M. Thilikos [email protected] CNRS, LIRMM, University of Athens Montpellier, 34095, France and Athens, 15784, Greece Michalis Vazirgiannis [email protected] LIX, École Polytechnique Palaiseau, 91120, France Editor: - Abstract Graph clustering or community detection constitutes an important task for investigating the internal structure of graphs, with a plethora of applications in several domains. Traditional techniques for graph clustering, such as spectral methods, typically suffer from high time and space complexity. In this article, we present CoreCluster, an efficient graph clustering framework based on the concept of graph degeneracy, that can be used along with any known graph clustering algorithm. Our approach capitalizes on processing the graph in an hierarchical manner provided by its core expansion sequence, an ordered partition of the graph into different levels according to the k-core decomposition. Such a partition provides an efficient way to process the graph in an incremental manner that preserves its clustering structure, while making the execution of the chosen clustering algorithm much faster due to the smaller size of the graph’s partitions onto which the algorithm operates. An experimental analysis on a multitude of real and synthetic data demonstrates that our approach can be applied to any clustering algorithm accelerating the clustering process, while the quality of the clustering structure is preserved or even improved. Keywords: Graph clustering, community detection, k-core decomposition, graph degeneracy, graph mining ©. Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis 1. Introduction Detecting clusters or communities in graphs constitutes a cornerstone problem with many applications in several disciplines. Characteristic application domains include social and information network analysis, biological networks, recommendation systems and image segmentation. Due to its importance and multidisciplinary nature, the problem of graph clustering has received great attention from the research community and numerous algorithms have been proposed (see Fortunato, 2010, for a survey in the area). Spectral clustering (e.g. Ng et al., 2001; von Luxburg, 2007) is one of the most sophisticated methods for capturing and analyzing the inherent structure of data and can have highly accurate results on different data types such as data points, images, and graphs. Nevertheless, spectral methods impose a high cost of computing resources both in time and space regardless of the data on which it is going to be applied (Fortunato, 2010). Other well-known approaches for community detection are the ones based on modularity optimization (Newman and Girvan, 2004; Clauset et al., 2004), stochastic flow simulation (Satuluri and Parthasarathy, 2009) and local partitioning methods (Fortunato, 2010). In any case, scalability is still a major challenge in the graph clustering task, especially nowadays with the significant increase of the graphs’ size. Typically, the methodologies for scaling up a graph clustering method can be divided into two main categories: (i) algorithm-oriented and (ii) data-oriented. The former considers the algorithm of interest and appropriately optimizes, whenever is possible, the “parts” of the algorithm responsible for scalability issues. Prominent examples here are the fast modularity optimization method (Clauset et al., 2004) and the scalable flow-based Markov clustering algorithm (Satuluri and Parthasarathy, 2009). The latter constitutes a widely used class of methodologies relied on sampling/sparsification techniques. In this case, the size of the graph onto which the algorithm will operate is reduced, by disregarding nodes/edges. However, possible useful structural information of the graph (i.e., nodes/edges) is ignored in this approach. In this paper, we propose CoreCluster, a graph clustering framework that capitalizes on the notion of graph degeneracy, also known as k-core decomposition (Seidman, 1983). The main idea behind our approach is to combine any known graph clustering algorithm with an easy-to-compute, clustering-preserving hierarchical representation of the graph – as produced by the k-core decomposition – towards a scalable graph clustering tool. The k-core of a graph is a maximal size subgraph where each node has at least k neighbors in the subgraph (we say that k is the rank of such a core). The maximum k for which a graph contains a k-core is known as its degeneracy. We refer to this core as “the densest core”. Intuitively, the k-core of such a graph is located in its “densest territories”. Based on this idea, we show that the densest cores of a graph are roughly maintaining its clustering structure and thus constitute good starting points (seed subgraphs) for computing it. Given the fact that the size of the densest core of a graph is orders of magnitude smaller than that of the original graph, we apply a clustering algorithm starting from its densest core and then, on the resulting structure, we incrementally cluster the rest of the nodes in the lower rank cores in decreasing order, following the hierarchy produced by the k-core decomposition. At a high level, the main contributions of this paper are three-fold: 2 CoreCluster: A core decomposition framework for graph clustering • Clustering Framework : We introduce CoreCluster, a scalable degeneracy-based graph clustering framework, that can be used along with any known graph clustering algorithm. We show how CoreCluster utilizes the k-core decomposition of a graph in order to (i) select seed subgraphs for starting the clustering process and (ii) expand the already formed clusters or create new ones. • Scalability and Accuracy Analysis: We discuss analytically the ability of CoreCluster to scale-up, describing its expected running time. We also justify why the k-core decomposition provides the direction under which to perform clustering incrementally. More specifically, we demonstrate that the k-core structure captures the clustering properties of a graph, thus being able to indicate good seed subgraphs for a clustering algorithm. Furthermore, we derive upper bounds about the difference between eigenspaces of successive cores. Finally, we show that the cluster expansion process of the CoreCluster framework is closely related to the minimization of the graph cut criterion. • Experimental Analysis: We perform an extensive experimental evaluation regarding the efficiency and accuracy of the CoreCluster framework. A large set of experiments were conducted both on synthetic and real-world graphs. This is to evaluate on ground truth information from the synthetic datasets and on the quality of the clusters from the real-world graphs. The empirical results show that the time complexity is improved by 3-4 orders of magnitude (compared to a baseline algorithm), especially for large graphs. Moreover, in the case of graphs with inherent community structure, the quality of the results is maintained or even improved. In additionally, the initial experimentation of Giatsidis et al. (2014) is extended here to a wide range of algorithms in order to identify the properties of the graphs and algorithms that optimize the performance our framework. The CoreCluster framework was introduced on the basis of studies of degeneracy in real social graphs (Giatsidis et al., 2011b). Given the interdisciplinary application of graphs, we do not hold claims of universal applicability (i.e., not all types of graphs have the same properties). We conduct here an extensive evaluation of CoreCluster in order to outline detectable properties that indicate the conditions under which the proposed framework is useful or meaningless. The remainder of this paper is organized as follows. Section 2 discusses related work and Section 3 introduces some preliminary notions. Section 4 formally introduces the CoreCluster framework. The theoretical analysis and the computational complexity of the proposed framework are presented in Sections 5 and 6, respectively. Finally, our extended empirical analysis is presented in Section 7 and we conclude with a discussion about the advantages of the CoreCluster framework along with suggestions for future work in Section 8. 2. Related Work In this section, we review the related work regarding the graph clustering problem, approaches for scaling-up graph clustering and applications of the k-core decomposition. Graph clustering. The problem of community detection and graph clustering has been extensively studied from several points of view. Some well-known approaches include spectral 3 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis clustering (e.g., Ng et al., 2001; Shi and Malik, 2000; White and Smyth, 2005), modularity optimization (e.g., Newman, 2004; Clauset et al., 2004), multilevel graph partitioning (e.g., Metis, Karypis and Kumar, 1998), flow-based methods (Satuluri and Parthasarathy, 2009), hierarchical methods (Newman and Girvan, 2004) and many more. A very informative and comprehensive review over the different approaches can be found in Fortunato (2010). Also, Lancichinetti et al. (2008) have conducted a comparative analysis on the performance of some of the most recent algorithms, in artificial data produced by their parameterized generator of benchmark graphs. In our work, we use the same graph generator as in Lancichinetti et al. (2008) to evaluate our framework. Another recent empirical comparison of community detection algorithms has been performed by Leskovec et al. (2010). There, due to lack of ground-truth data, the evaluation of the produced clusters is achieved applying quality measures, such as conductance. As we will present during our experimental analysis (see Section 7), we follow a similar practice to evaluate our framework in the case of real-world graph data. Scaling-up graph clustering. The efficiency of graph clustering can be improved in various ways. Two well-known approaches are the ones of sampling and sparsification. In the case of spectral clustering, sampling-based approaches include the Nyström method (Kumar et al., 2009) and randomized SVD algorithm (Drineas et al., 2004). The approach of Kumar et al. (2009) capitalizes on the Nyström column-sampling method (Williams and Seeger, 2001) which is an efficient technique to generate low-rank matrix approximations. More specifically, a novel technique has been proposed that follows a non uniform sampling of columns of the affinity matrix. Although, Nyström method suffers from high time and memory complexity (Yan et al., 2009). Drineas et al. (2004) proposed the randomized SVD algorithm that essentially samples a number of columns of the Gram matrix with probability proportional to their norms, and performs Principal Component Analysis on the selected features. Nevertheless, the randomized SVM algorithm may need to sample a large number of columns in order to get a sufficient small appproximation error in some cases. In (Yan et al., 2009) a fast approximate algorithm for spectral clustering has been presented where two different preprocessors have been used in order two reduce the size of the initial data structure. The first one is the classical k-means algorithm while the other one is the Random Projection tree. In a nutshell, neighbouring data points correspond into a set of local representative points and then the spectral algorithm is executed only on the reduced set of the representative points. Concerning graph sampling, the goal is to produce a graph of smaller size (nodes and edges), preserving a set of desired graph properties (e.g., degree distribution, clustering coefficient) (Leskovec and Faloutsos, 2006). The work by Maiya and Berger-Wolf (2010), presents a method, based on the notion of expansion properties, to sample a subgraph that preserves the community structure, i.e., contains representative nodes of the communities. Then, the community membership of the nodes that do not belong to the sample can be expressed as an inference problem. Unlike the previous methods that sample both nodes and edges, the graph sparsification algorithm presented in Satuluri et al. (2011) reduces only the number of edges (focusing on inter-community edges) in order improve the running time of a clustering algorithm. In contrast to the aforementioned methodologies, our approach keeps the structure of the graph intact, without excluding any structural information from the clustering process. 4 CoreCluster: A core decomposition framework for graph clustering k-core decomposition. The k-core decomposition constitutes a well-established approach for identifying particular subsets of a graph, called k-cores, in an hierarchical way, starting from external vertices and moving to more central ones. The k-cores are important structures in graph theory and their study goes back to the 60s (Erdős, 1963). Seidman (1983) first applied the k-core decomposition to study the cohesion of social networks. Since then, k-core decomposition has been applied in several graph-related tasks, such as graph visualization (Alvarez-Hamelin et al., 2005; Zhang and Parthasarathy, 2012), dense subgraph discovery (Andersen and Chellapilla, 2009) and as an edge ordering criterion for graph coarsening (Abou-Rjeili and Karypis, 2006). Some very recent studies include the extension of the notion of k-cores to directed graphs (Giatsidis et al., 2011a) and core decomposition in massive graphs (Cheng et al., 2011). 3. Preliminaries Given an undirected graph G, we denote by V (G) and E(G) ⊂ V (G) × V (G) the sets of its vertices and edges, respectively. Given a set S ⊆ V (G), we denote by G[S] the induced subgraph of G that is obtained if we remove from it all vertices that do not belong in S. We also define as n and m the number of vertices and edges of graph G, respectively, i.e., n = |V (G)| and m = |E(G)|. The neighbourhood of a vertex v ∈ V (G) is denoted by NG (v) and contains all vertices of G that are adjacent to v. The degree degG (v) of a vertex v in G, is the number of edges incident to the vertex and is equal to |NG (v)|. The minimum degree of graph G, denoted by δ(G), is the minimum degree of the vertices in G, i.e., δ(G) = min{degG (v) | v ∈ V (G)}. Given a non-negative integer k, we define the k-core of a graph G, denoted by Gk , corek (G), as the maximum size subgraph of G with minimum degree k, where k is the rank of the core. In a nutshell, in the k-core of a graph G every vertice is adjacent with at least k vertices. The degeneracy of a graph G is the maximum k for which G contains a non-empty core. In a more formal way, the degeneracy of a graph is denoted by δ ∗ (G) and is given as: δ ∗ (G) = max{δ(H) | H ⊆ G}. (3.1) Intuitively, the dense cores of a graph, i.e., those whose ranks are close to δ ∗ (G), may serve as starting seeds for any clustering algorithm as they are expected to preserve the clustering structure of the original graph. Later in this paper, we make this statement more precise, providing the necessary theoretical as well as experimental justification. For a given graph G with δ ∗ (G) = k, we define its core expansion sequence as a sequence of vertex sets {Vk , Vk−1 , ..., V0 }, computed in a recursive top-down way as follows:  V (corek (G)), if i = k, Vi = (3.2) V (corei (G)) \ Vi+1 , if i = k − 1, . . . , 0. We refer to the sets of a core expansion sequence as layers, with set Vi being its ith layer (see Fig. 1 for an illustrative example). In general terms, detecting the i-core of a graph G is an easy process (Batagelj and Zaversnik, 2003): just remove vertices, and edges incident to them, of degree less than 5 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis core0(G) core1(G) core2(G) core3(G) core4(G) Figure 1: A graph G of degeneracy 4 and its cores. The different colors express the partition of the vertices of the graph to layers V4 , V3 , V2 , V1 , and V0 . Fat-edges indicate parts of a clustering of the graph. i until this is not possible any more. It can be easily verified that O(k · n) steps are required for the computation of the k-core decomposition. Typically, the degeneracy of real world graphs is small, making the computation of the core expansion sequence an easy computational task. 4. Graph Clustering with Degeneracy In this section, we describe in detail the proposed graph clustering framework. CoreCluster capitalizes on the concept of degeneracy to improve the efficiency of graph clustering. The main idea behind our approach is that the k-core decomposition preserves the clustering structure of a graph and therefore the “best” k-core subgraph can be used as good starting point for a clustering method. At the same time, the decomposition provides an hierarchical organization of the nodes in the graph, that can serve as a “guide” for the clustering process. 4.1 The CoreCluster Framework One of the main attributes of the proposed framework, which constitutes our initial motivation, is its ability to accelerate the application of computationally complex clustering algorithms without any significant loss in their accuracy. Suppose we have a clustering algorithm that takes as input a graph G and outputs a partition of V (G) into a number of sets that form a clustering of G. As our method could be applied at any clustering algorithm, we do not further specify the attributes of such an algorithm and we, abstractly, name it Cluster. Furthermore, we assume that Cluster algorithm runs in O(n3 ) steps. This assumption coincides with the computational complexity of the spectral clusetering algorithm 6 CoreCluster: A core decomposition framework for graph clustering Algorithm 1 CoreCluster(G) Input: A graph G. Output: A partition of V (G) into clusters. 1: k := δ ∗ (G) 2: q := 0 3: Let Vk , . . . , V0 be the core expansion sequence of G 4: Let Gi be the i-core of G, for i = 0, . . . , k 5: Sk = Vk 6: Ak = {C1k , . . . , Cρkk } = Cluster(G[Sk ]) 7: for i = k − 1 to 0 do 8: Si =Select(Gi , Ak ∪ . . . ∪ Ai+1 , Vi ) 9: Ai = (C1i , . . . , Cρi i ) = Cluster(G[Si ]) 10: end for 11: Return Ak ∪ · · · ∪ A0 proposed by Ng et al. (2001) and utilized in our initial experiments as well as during the theoretical analysis of our methodology. In the totality of our experiments (see Section 7), we study more than the computational complexity and we utilize various algorithms in the place of Cluster including “fast” algorithms. In a nutshell, the CoreCluster framework applies the Cluster algorithm at the highest k-core of the graph and then it iterates from the highest to the lowest core applying the following strategy: i. assign based on a simple criterion all the nodes that can be assigned to the already existing clusters, and ii. apply the Cluster algorithm to the remaining nodes (in order to create new clusters). A sketch of CoreCluster framework is given in pseudocode in Alg. 1. Initially, CoreCluster performs k-core decomposition to obtain the core expansion sequence of the graph. Then, algorithm Cluster is applied to the k-core subgraph, creating the first set of ρk clusters. The procedure Select (see Section 4.3, for a detailed description) takes as input the, so far, created clusters, i.e., the sets in Fi+1 = Ak ∪ · · · ∪ Ai+1 and the ith layer Vi , and tries to assign each of the vertices of Vi in some cluster in Ak ∪ · · · ∪ Ai+1 . After this update, the procedure Select returns the unassigned vertices. The choice of the selection procedure considers the way under which the vertices of Vi are adjacent with the vertices of the clusters in Ak ∪ · · · ∪ Ai+1 . This selection can be done by using several heuristic approaches, and next we describe such a procedure. Afterwards, the Cluster is applied to the unassigned vertices returned from the Select procedure. The whole procedure is implemented for each layer (Vi ) in a recursive manner, starting from the highest level. 4.2 Spectral Clustering It should be stressed that the CoreCluster can be essentially seen as a “meta-algorithmic procedure” that can be applied to any graph clustering algorithm, accelerating the execution and preserving the clustering structure of the latter. The discussion that follows in the 7 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis experimental analysis (Section 7) of the paper argues that this indeed can accelerate a highdemanding clustering algorithm without any significant expected loss in its performance. The spectral clustering algorithm, proposed by Ng et al. (2001), is one of the most important and well-known algorithms in data mining and constitutes the initial motivation of the proposed framework, since its computational complexity restrict its applicability to large graph networks. Under this prism, we use spectral clustering as the baseline and the basis for the theoretical analysis of the CoreCluster framework (algorithm Cluster). The central idea of the spectral clustering algorithm is to keep the top ρ eigenvectors of the normalized Laplacian matrix, defined as: L = D−1/2 (D − W)D−1/2 = I − D−1/2 WD−1/2 , (4.1) where W ∈ Rn×n and D ∈ Rn×n are the adjacency and the degree matrix, respectively. The adjacency matrix gives the similarity between pairs of graph vertices, such that Wij > 0 if there is an edge from vertex i to vertex j and zero (Wij = 0) otherwise. If the graph is undirected, as happens in our case, the adjacency matrix is symmetric (Wij = Wji ). The degree P matrix is a diagonal matrix containing the degrees of the nodes on its diagonal, e.g., Dii = j Wij . Afterward, assign the corresponding eigenvectors as columns to a matrix Y ∈ Rn×ρ and apply k-means clustering on the rows of Y . Thereafter, each row of the new formed matrix corresponds to a data point, while the parameter ρ identifies the number of clusters that we are looking for. It has been shown that the performance of the k-means is strongly affected by the initialization scheme (Bubeck et al., 2012). Until now, various approaches have been proposed for the initialization of k-means algorithm (Arthur and Vassilvitskii, 2007; Redmond and Heneghan, 2007; Lu et al., 2008). During our empirical analysis (Section 7), we are using the k-means++ algorithm proposed by Arthur and Vassilvitskii (2007), instead of the classical k-means algorithm, taking advantage of performing better seeding during the initialization process. Moreover, since we desire to have an automatic choice of ρ, we define it by noticing the “sudden drop” in the eigenvalues as it is suggested by Polito and Perona (2001). 4.3 Selection procedure In this section, we give a detailed description of the selection procedure (Select) presented in Line 8 of Alg. 1. The procedure takes as input the, so far, created clustering Fi+1 = Ak ∪ · · · ∪ Ai+1 and the vertex set Vi . Then, this procedure assigns some of the vertices of Vi to the clusters in Fi+1 and outputs the remaining ones. For simplicity purposes, we will call the tuple (G, F, V ) as a candidate triple, where G is a graph and F ∪ {V } is a partition of V (G). Thus, given a candidate triple (G, F, V ), we define the following property over the vertices of V : Pα,β (v) = ∃C ∈ F : |NG (v) ∩ V (C)| ≥α |NG (v)| and |NG (v)| ≥ β, (4.2) where α > 0.5 and β is a positive integer. Notice that, as α > 0.5, the truth of Pα,β (v) can be certified by a unique set C in F. We call such a set the certificate of verticle v. The selection procedure first (lines 1–4) tries to assign vertices of V to clusters of F using the criterion of the property Pα,β that assigns a vertex to a cluster only if the vast 8 CoreCluster: A core decomposition framework for graph clustering Algorithm 2 Select(G, F, V ) Input: A candidate triple (G, F, V ) Output: A subset S of V and a partition F 0 of V (F) ∪ (V \ S). 1: while Pα,β (v) is true for some v ∈ V do 2: F ← (F \ {C}) ∪ {C ∪ {v}} where C is the certificate of v. 3: V ← V \ {v}. 4: end while 5: V 1= NG (V (F)) 6: V 2 = V \ (V 1 ∪ F) 7: if V 2 is either empty or an independent set of G, then 8: F ← Assign(G, F, V, V 1 ) 9: F ←Assign(G, F, V, V 2 ) 10: return ∅ 11: else 12: return V 1 ∪ V 2 . 13: end if majority of its neighbours belong in this cluster. The quantification of this “vast majority” criterion is done by the constants α and β. The vertices that cannot be assigned at an already existing cluster are partitioned into two groups: (i) V 1 contains those that have neighbours in vertices that are already classified in the clusters of F and (ii) V 2 contains the rest. As the vertices in V 2 have no neighbours in the clusters, they have at least k neighbours out of them, it is most likely that they may not enter to any existing cluster in the future, unless, possibly, they are completely disjoint. If this is not the case, a further (milder) classification is attempted by the assign procedure that first classifies the vertices in V 1 in the existing clusters and then we do the same for the vertices in V 2 . It is worth noting that the last selection procedure has been found useful in our experiments, especially in the case of cores with low rank (where many independent vertices may appear). The procedure assign is a heuristic that classifies each vertex to the cluster that has the majority of its neighbours. Before presenting the Assign routine, given by Alg. 3, let us first give some definitions. Given a candidate triple (G, F, V ) and a vertex v ∈ V , we define as span(v) = max{|NG (v) ∩ V (C)| | C ∈ F }. We also define argspan(v) as a minimum size C ∈ F with the property that |NG (v) ∩ V (C)| = span(v). A number of illustrative examples about the choices of the selection procedure can be extracted by Fig. 2, that is an instance of a graph derived from our experimental data (in particular from the D1 dataset see Sec. 7.1.1). In the particular graph, the 7-core (i.e., the graph delimited by the red square) consists exclusively of the vertices of the grey cluster. The set V6 contains all the vertices of the 6-core that are not in the 7-core. All but two of these vertices are sparsely connected with the grey cluster, while they exhibit a strong interconnection between them. Therefore, they form the red cluster, while the remaining two vertices, that have all of their neighbours in the gray cluster, become a member of it. A similar assignment to the gray and red clusters is happening for the vertices in V5 , i.e., the vertices in the 5-core that do not belong in the 6-core. Finally, the remaining vertices of the graph (the vertices in V4 ) either clearly belong to the existing clusters or are forming 9 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis Algorithm 3 Assign(G, F, V, S) Input: A candidate triple (G, F, V ) and a subset S of V Output: A partition F 1: while S 6= ∅ do 2: ` = max{span(v) | v ∈ S} 3: L = {v ∈ S | span(v) = `} 4: for each v ∈ L do 5: C 0 = C ∪ {v}, where C = argspan(v) 6: S ← S \ {v} 7: F ← (F \ {C}) ∪ {C 0 } 8: end for 9: end while 10: return F two new clusters, the ping and the purple ones. The experimental analysis indicates that a similar clustering behaviour characterizes the entire data set and that it is captured by the CoreCluster framework. Figure 2: An example of the operation of the CoreCluster procedure for a portion of a graph used through our experimental study. This graph consists of the core sequence members V7 , V6 , V5 , and V4 that are included in the black, green (#), blue (∗), and red (s) squares respectively. Vertices of different colors correspond to different clusters. 10 CoreCluster: A core decomposition framework for graph clustering 5. Theoretical Analysis of the CoreCluster’s Quality The intuition behind the CoreCluster framework is that the core expansion sequence Vk , Vk−1 , . . . , V0 gives a good sense of direction on how to perform clustering in an incremental way. After that, the procedure considers Vk−1 as the remaining vertices of the (k − 1)-core Gk−1 , and tries to assign them one by one to the already existing clusters C1k , . . . , Cρkk . The vertices for which an assignment to an already existing cluster is not possible, form the set Sk−1 and the Cluster is now applied on G[Sk−1 ]. As the algorithm continues, the existing clusters grow up and the vertices for which this is not possible, are grouped to new clusters. The fact that this procedure approximates satisfactorily the result of the application of Cluster to the whole graph is justified by the observation that the early i-cores (i.e., i-cores where i is close to k) are already dense, and therefore sufficiently coherent, to provide a good starting clustering that will expand well because of the selection criterion. In fact, the subgraphs obtained by the k-core decomposition, provide an (1/2)approximation algorithm for the Densest-Subgraph problem (Andersen and Chellapilla, 2009). In the remaining of this section, a number of theoretical results are presented which confirms that the core expansion sequence offers an reliable way for performing any clustering methodology incrementally. Our theoretical analysis could be divided on three main axis: 1. Initially, we justify why the k-core subgraph can be supposed as a seed subgraph for any clustering algorithm, as nodes with a high clustering coefficient are usually retained at the highest k-core subgraph. 2. Afterwards, based on the perturbation theory, we demonstrate that the difference between eigenspaces of successive cores is upper bounded. Under this prism, we are able to analyze the conditions under which the eigenspaces of successive cores vary significantly with each other. 3. Last but not least, we highlight that the cluster expansion process, which assigns the vertices of Vi to an already existing cluster by using the selection criterion, is closely related to minimizing the graph cut criterion. 5.1 Quality of the maximal core as a starting seed We claim that the decomposition identifies subgraphs that progressively correspond to the most central regions and connected parts of the graph. Here we show that nodes with high clustering coefficient in G, are more likely to“survive” at the highest k-core subgraph by the pruning (k-core decomposition) procedure. At this point, let us describe the clustering coefficient (Watts and Strogatz, 1998) measure which will be used later through the analysis of our framework. The clustering coefficient measures the density of triangles in the graph and indicates the degree to which nodes tend to cluster together. More specifically, the local clustering coefficient of a vertex is defined as the ratio of the links that the vertex has with the vertices of its neighbourhood to the total number of edges that could exist among the vertices within its neighbourhood. On the other hand, the global clustering coefficient is defined as the mean of the local clustering coefficients over all graph vertices. Our claim is based on the following theorem. 11 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis Theorem 1 (Gleich and Seshadhri (2012)) Let G be a graph with heavy-tailed degree distribution, and let CG be the (global) clustering coefficient of G. Then, there exists a dε k-core in G for k ≥ CG max , where ε < 1 is a constant such that most edges are incident 2 to a node with degree at least dεmax (typically ε = 2/3), where dmax is the maximum degree of the nodes. The above theorem implies that graphs with heavy-tailed degree distribution and high global clustering coefficient CG , have large degeneracy. Next we present our claim for the relationship between the local clustering coefficient Cv , ∀v ∈ V (G) and the k-core subgraph justifying the selection of the k-core as good seed subgraph in the clustering procedure. Corollary 2 Let G be a graph with heavy-tailed degree distribution. The contribution of each node v ∈ V (G) to the k-core decomposition of the graph is proportional to the local clustering coefficient Cv . Proof The global clustering coefficient CG of the entire graph is given by the average of 1P the local clustering coefficients Cv , ∀v ∈ V (G), i.e., CG = Cv , where n = |V (G)|. n v Then, according to the Theorem 1 we get that: ! ! dεmax 1X dεmax 1 dεmax X k ≥ CG = Cv = Cv 2 n v 2 n 2 v | {z } γ ⇒ k≥γ X Cv , v where parameter γ captures global characteristics of the graph (that depend on the total number of nodes and the maximum degree). Therefore, nodes with high clustering coefficient (in the original graph) are more likely to be found in the best (max-core) k-core (k = δ ∗ (G)) subgraph, since they tend to be more robust to the degeneracy process. Thus, the k-core subgraph can be used as good starting point (seed subgraph) for the clustering task. Furthermore, we have experimentally validated the above claim (see Appendix A). 5.2 The Eigenspaces of k-cores The spectral clustering algorithm of (Ng et al., 2001) is based on the eigenvectors of a Laplacian matrix and here we study the eigenspaces of successive cores in conjunction with the CoreCluster approach. The key question we are interested in is under which conditions the ρ largest eigenvectors of the Laplacian L(i) for the ith core are similar to the corresponding eigenvectors of L(i+1) for i = 0, . . . , k − 1? If the eigenspaces are indeed similar then it follows that clustering on a core is a good basis for clustering the entire graph. To answer this question we defer to perturbation theory (Stewart and Sun (1990)) so that we can examine the change of the eigenvalues along with the eigenvectors of a matrix 12 CoreCluster: A core decomposition framework for graph clustering when a small perturbation is added, corresponding to moving from one core to the next. In the case of spectral clustering, consider that the perturbation between the Laplacian matrices (L(i) and L(i+1) ) of successive cores is given by ∆L(i) = L(i) − L(i+1) . The key result that we will use, is presented by Davis and Kahan (1970), and bounds the difference between eigenspaces of Hermitian matrices under perturbations. Theorem 3 (Davis and Kahan (1970)) Let A ∈ Rn×n be a Hermitian matrix with spectral resolution given by [X1 X2 ]> A[X1 X2 ] = diag(L1 , L2 ), where [X1 , X2 ] is unitary with X1 ∈ Rn×ρ . Let Z ∈ Rn×ρ have orthonormal columns, M be any Hermitian matrix of order ρ and define the residual matrix as R = AZ−ZM. Let λ(A) represent the set of eigenvalues of A and suppose that λ(M) ⊂ [α, β] and for some δ > 0, λ(L2 ) ⊂ R\[α − δ, β + δ]. Then, for any unitary invariant norm, we have: ksinΘ(R(X1 ), R(Z))k ≤ kRk , δ (5.1) where R(X1 ) is the column space of matrix X1 . The spectral resolution of A is a transformation of it using the unitary matrix [X1 X2 ] such that X1 spans the invariant subspace of A. The function sinΘ(·, ·) corresponds to a diagonal matrix of dimension ρ, composed of sines of the canonical angles between two subspaces. Roughly speaking, this corresponds to the angles between the bases of the subspaces and measures how the two subspaces differ (see Stewart and Sun, 1990, for details). Then, the following lemma can be easily derived. Lemma 4 Let A and à = A + E be two n × n Hermitian matrices whose eigendecompositions are given by A = UΛU> and à = ŨΛ̃Ũ> , with corresponding sets of eigenvalues λ1 ≤ λ2 ≤ · · · ≤ λn and λ̃1 ≤ λ̃2 ≤ · · · ≤ λ̃n . Then the following results hold, where U1 and Ũ1 are the matrices of the first ρ eigenvectors of A and Ã: q P (ρ) > i λi (E E) ksinΘ(R(U1 ), R(Ũ1 ))kF ≤ , (5.2) λ̃ρ+1 − λρ σmax (E) ksinΘ(R(U1 ), R(Ũ1 ))k2 ≤ , (5.3) λ̃ρ+1 − λρ where λ(ρ) (·) is the largest ρ eigenvalues of a matrix, σmax (·) is the largest singular value of a matrix and λ̃ρ+1 > λρ . Proof First, note that we can express the eigendecompositions of A and à as:   Λ1 0 A = UΛU> = [U1 U2 ] [U1 U2 ]> 0 Λ2   Λ̃1 0 à = ŨΛ̃Ũ> = [Ũ1 Ũ2 ] [Ũ1 Ũ2 ]> . 0 Λ̃2 13 (5.4) (5.5) Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis Then, we can apply Theorem 3 by setting X1 = Ũ1 , X2 = Ũ2 , L1 = Λ̃1 , L2 = Λ̃2 , M = Λ1 and Z = U1 . Computing the residual matrix R gives: R = ÃU1 − U1 Λ1 = AU1 + EU1 − U1 Λ1 = EU1 . P (ρ) > > The Frobenius norm of the residual is kRk2F = tr(U> 1 E EU1 ) ≤ i λi (E E) where we have used the Rayleigh-Ritz theorem to bound the trace (Lutkepohl, 1997). With the spectral norm we have kEU1 k2 = σmax (EU1 ) ≤ σmax (E) using a similar process. It is easy to show that δ is computed as λ̃ρ+1 − λρ provided λ̃ρ+1 > λρ . It follows that we want to choose a ρ to make the “eigengap” λ̃ρ+1 − λρ as large as possible whilst having a residual matrix with small maximum eigenvectors. The eigengap corresponds to the quality of the clusters (see von Luxburg, 2007, for example), while the perturbation represents the residual eigenvalues whilst moving from one Laplacian to the next. In the following part of this subsection we will elaborate on the perturbation by showing how it relates to edges in a graph. It is worth noting that when we add vertices by going from a core to a lower core, the dimensions of the eigenspace corresponding to the new vertices will be zero in the higher core. Therefore, we restrict the analysis of the eigenspace to existing dimensions. In other words, we are interested in the following matrix: ∆L(i) = L̂(i) − L(i+1) , L̂(i) L(i) where is the submatrix of corresponding to the vertices in the (i + individual elements of the normalized Laplacian are computed as:  if x = y and deg(vx ) 6= 0   1 1 √ − if x 6= y and (vx , vy ) ∈ E(G) Lxy = deg(vx )deg(vy )   0 otherwise (5.6) 1)th core. The (5.7) so we have Lxy ∈ [−1, 1] for all x, y. Note that off-diagonal elements are non-positive. This allows us to introduce our main result. Theorem 5 Let L(i) ∈ Rni ×ni be the Laplacian matrix corresponding to the ith core of a graph, and L̂(i) be the submatrix of L(i) corresponding to the vertices in the (i + 1)th core. Similarly, E (i) is the set of edges in the ith core, and Ê (i) is the subset of E (i) with one vertex in the (i + 1)th core. Then the following results hold with U1 and Ũ1 as the matrices of the first ρ eigenvectors of L̂(i) and L(i+1) : p |Ji ||i − k| ksinΘ(R(U1 ), R(Ũ1 ))kF ≤ , (5.8) ik(λ̃ρ+1 − λρ ) √ ni+1 |i − k| ksinΘ(R(U1 ), R(Ũ1 ))k2 ≤ , (5.9) ik(λ̃ρ+1 − λρ ) S where Ji = (vx ,vy )∈∆E (i) NGi (vx , vy ) is the number of changes in the Laplacian, ∆E (i) = Ê (i) − E (i+1) is the change in the edges, NG (vx , vy ) is the set of edges adjacent to and including the edge (vx , vy ) in G and λ̃ρ+1 > λρ . 14 CoreCluster: A core decomposition framework for graph clustering Proof The change in Laplacian elements between cores can be bounded for x 6= y as 1 1 ∆L(i) +q xy = − p degGi (vx )degGi (vy ) degGi+1 (vx )degGi+1 (vy ) ≥ i−k , ik where Gi = corei (G). It follows that the Frobenius norm of the change in Laplacians is bounded as:   X i−k 2 2 (∆L(i) ) ≤ |J | k∆L(i) k2F = . i xy ik x,y P Note also that k∆L(i) k2F = j λ2j (∆L(i) ). The spectral norm can be written in terms of maximising the Rayleigh quotient: uT (∆L(i) )2 u uT u   i−k 2 ≤ ni+1 , ik k∆L(i) k22 = max where u ∈ Rni+1 . Putting the pieces together with Lemma 4 gives the required result. According to this theorem, we can readily show the scenarios in which moving from the ith core to the (i + 1)th core does not significantly alter the eigenspaces. The i−k ik term implies that for a fixed degeneracy k the core transitions close to k result in small eigenspace perturbations. In the case of Frobenius norm, the eigenspaces grow apart at a rate proportional to the neighbourhood of edge changes within the (i + 1)th core. On the other hand, for the spectral norm we see that the eigenspaces diverge according to the size (ni+1 ) of the (i + 1)th core. 5.3 Cluster Expansion The analysis so far has considered changes between cores however an important part of the CoreCluster algorithm is how clusters are grown in a greedy fashion according to Alg. 2. In this section we show a close relationship between the selection criterion and the the notion of graph cuts, which motivate many spectral clustering approaches. To see the connection, first we define the cut of a graph as follows: X Wij , (5.10) cut(C1 , C2 ) = vi ∈C1 ,vj ∈C2 and it corresponds to the number of edges between disjoint subsets C1 , C2 ⊂ V (G). Based on this definition the cut for a partition into ρ clusters is defined as: cut(C1 , . . . , Cρ ) = ρ X i=1 15 cut(Ci , C̄i ), (5.11) Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis where C̄ is the set of vertices in G that are not in C. Consider adding a new vertex v to the graph, then the change in the cut term corresponding to candidate cluster Cj is given by ∆cutj = cut(Cj0 , C̄ 0 j ) − cut(Cj , C̄j ) = cut(Cj , C̄j ) + |NG (v) ∩ V (C̄j )| − cut(Cj , C̄j ) = |NG (v) ∩ V (C̄j )| = |NG (v)| − |NG (v) ∩ V (Cj )|, where Cj0 = Cj ∪ {v}. The connection to the selection criteria of Eq. 4.2 can be seen by noting that the minimization of ∆cutj corresponds to choosing a cluster j for the vertex v which maximises |NG (v) ∩ V (Cj )|. In this sense, the values of α|NG (v)| and β can be seen respectively as confidence thresholds on the number of neighbours in the chosen cluster and the degree of the vertex at hand. 6. Complexity The proposed CoreCluster procedure executes the graph clustering algorithm (Cluster(G)) on the subgraphs induced by the subsets Sk , . . . , S0 . Each Si corresponds to a subset of vertices of Vi that cannot be assigned to already existing clusters according to the selection procedure (see Step 8 of Alg. 1). Thus, the selection step makes it possible for some of the vertices in Vi to be incorporated in an already created cluster, reducing the burden of the computation of Cluster(G[Si ]). In this way, it becomes apparent that the speed up of the algorithm is attributed to the fact that the CoreCluster(G) runs in k + 1 disjoint subgraphs of G instead of G itself. As the i-th selection phase requires O(|V (Gi )|3 ) steps, we conclude that the running time of CoreCluster(G) is bounded by X X O(|Si |3 ) ≤ O(|Vi |3 ) ≤ O(k · n3max ), (6.1) i=k,...,0 i=k,...,0 where nmax = max{|Vk |,. . . ,|V0 |}. In the above bound, the first equality holds only in the extremal case where no selection occurs during the selection phases. Clearly, the general bound in Eq. 6.1 is the best possible when |Vk |,. . . ,|V0 | tend to be equally distributed (which would accelerate the running time by a factor of k 2 ). According to the first inequality of Eq. 6.1 the running time of the algorithm is proportionaloto (k + 1) · n3max , where n n nmax = max{|Sko|, |V (G)| . . . , |S0 |}. Let ρG = max |Si | | i = 0, . . . , k and µG = max |V|V(G)| | i = 0, . . . , k . i| Therefore, we observe that ρG ≥ µG . Notice that the discrepancy between ρG and µG is a measure of the acceleration of the algorithm because of the selection phases. Concluding, the acceleration of CoreCluster is upper bounded by X i=k,...,0   k 3 O(|Si | ) = O 3 · n . ρG 3 16 CoreCluster: A core decomposition framework for graph clustering This estimation is purely theoretical and its purpose is to expose the general complexity contribution of our algorithmic machinery. In practice, the acceleration can be much better and this also depends on the heuristics that are applied at the selection phase. 7. Experimental Evaluation The CoreCluster framework is intended to be used with algorithms of high computational complexity as its’ primal purpose is to “lower” the cost of such algorithms and apply them only on the “important parts” of a graph. This can be demonstrated simply by utilizing an expensive algorithm (see Section 4.2) as we do in our experiments. The computational cost becomes obviously smaller as the sum of the parts (in processing time) is smaller than the total for algorithms with high complexity (e.g., O(n3 )). The degeneracy behaviour of graphs might differ along with their other properties (e.g., density, etc.). Thus, in this section, we introduce additional experiments to study the effectiveness of CoreCluster framework under different scenarios. The purpose of these experiments is to identify in a clear manner the properties of the graphs and the utilized algorithms that best optimize its’ performance. 7.1 Datasets description While real networks are the objective, actual datasets lack ground truth which leaves only evaluation metrics of the quality of clustering as an option and not direct comparison. On the other hand, artificial networks offer ground truth and a large variety of properties that can be parameterized to produce different “types” of networks. The evaluation of our framework is conducted on both real and artificial networks in order to have complete and decisive results. 7.1.1 Artificial Networks We exploit the graph generator by Fortunato Lancichinetti et al. (2008) to produce graphs with a clustering structure which is available to the tester (ground truth). This graph generator provides a wide range of input parameters. We used the parameters presented on Table 1 and tuned them accordingly, by considering various combinations in order to get a wide range of graphs with different features. Thus, the testing of our approach is credible as it is evaluated in essentially hundreds of graphs with different properties and quality of the clustering structure. The parameters used are: N is the size of the graph, maxd is the maximum node degree, mind is the minimum node degree and µ is the mixing parameter representing the overlapping between clusters, i.e., each node shares a fraction 1 − µ of its links with the other nodes of its community and a fraction µ with the other nodes of the network. Graphs produced by the generator contain inherent clusters and the cluster assignment is offered by the generator, enabling thus usage of these data sets for evaluating graph clustering algorithms. In order to ensure a thorough and robust evaluation, for each of the combinations among the parameters, we generated 10 distinct graphs. Table 1 depicts the various parameters’ values for the three main different settings in our experiments. It becomes apparent that the most important parameter is the mind , as it is the one differentiating the overall density of the graph. 17 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis D1 D2 D3 maxd (node max degree) 10%, 30%, 10%, 30%, 50% 200 edges mind (node min degree) ∼5 (the absolutely minimum) 7 20 µ (mixing parameter) 1% – 43% (in 7 equal steps) 3% – 43% (in 6 equal steps) 3% – 43% (in 6 equal steps) N (graph size in nodes) 100−3600 100−3600 100−3600 Table 1: Parameters’ values for the artificial graphs. 7.1.2 Real Networks We also perform evaluations to a subset of the Facebook 100 dataset provided by Traud et al. (2011). This is a collection of friendship networks of Facebook from 2005, for 100 US Universities (i.e., 100 individual networks). The evaluations were not performed to the full extend of this dataset as hardware limitation did not allow us to evaluate, with spectral clustering, networks with more than 13K nodes (the CoreCluster framework could handle much larger networks). About half of the networks from this dataset were used for the final evaluation. 7.2 Evaluation Metrics To evaluate the clustering results we use different metrics for the artificial and the real (Facebook 100 ) data. • Artificial networks: Given the ground truth, we measure the quality of the clustering results in terms of the widely used Normalized Mutual Information (NMI, Manning et al., 2008). NMI measures how “clear” each found cluster is in relevance to the known clusters (taking into account the size of the cluster as well). Let Ω = {ω1 , ω2 , . . . , ωk } be the set of detected clusters and C = {c1 , c2 , . . . , cj } the set of known clusters (ground-truth). Then, NMI is given as follows: NMI(Ω, C) = I(Ω, C) , [H(Ω) + H(C)]/2 where I is the mutual information:   X X |ωk ∩ cj | N |ωk ∩ cj | I(Ω; C) = log , N |ωk ||cj | k (7.1) (7.2) j and H is the Entropy: H(Ω) = − X |ωk | k 18 N  log |ωk | N  . (7.3) CoreCluster: A core decomposition framework for graph clustering • Facebook: Since the networks of this dataset lack ground truth, we choose to evaluate the results with the evaluation criterion of conductance. Given a graph G and a cut (S, S), conductance is defined as: P i∈S,j ∈S / Aij φ(S) = , min (a(S), a(S)) P P where Aij are the entries in the adjacency matrix A of G and a(S) = i∈S j∈G Aij . Informally, conductance measures (for a cluster) the ratio of internal to external connectivity. It has been used widely to examine clustering quality (e.g., Leskovec et al. (2010)) and has a simple and intuitive definition. Both NMI and Conductance measures takes values in the range of (0, 1). It is also important to be noticed that: 1. For NMI, higher values are better. 2. For Conductance, lower values are indicating better clustering quality. 7.3 Algorithms for Additional Evaluation Apart from the spectral clustering algorithm proposed by Ng et al. (2001), we expand the study of our framework to a wide variety of algorithms. The purpose of this extended study is to evaluate the clustering performance of CoreCluster various properties these algorithms might display. At the same time, we examine whether the properties of the graphs affect the framework in a consistent manner (i.e., the performance is good for the same “type” of graphs across different algorithms). The latter is justified through this extended analysis and establishes clear conditions for the use CoreCluster. We considered algorithms indiscriminately of their computational complexity, focusing more on how they approach the clustering problem (i.e., what they try to optimize). In the following, we list in sort the clustering algorithms that have been considered in our analysis. • InfoMap (Rosvall et al., 2009): An information theoretic approach that tackles the problem of graph clustering as a compression problem. For random walks over a graph the probability of flow is converted to a description. By minimizing the description length of the nodes in the flow’s path, InfoMap optimizes the network’s partitions. • Leading Eigenvector (Newman, 2006): In order to optimize modularity, this method uses the eigenvector corresponding to the largest eigenvalue of the modularity matrix. While this is also a spectral method, the calculation of the leading eigenvector is much more efficient as it can be done with the power iteration method. • Fast Greedy (Clauset et al., 2004): This is another modularity optimization algorithm that works in a greedy manner. It follows an hierarchical agglomerative process, starting from each node being a unique community and joining communities that produce the highest modularity. • MCL (Van Dongen, 2000): The Markov Cluster (MCL) algorithm follows a simple iteration of two steps over the transition probability matrix T of graph : i) raise T to 19 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis an integer power and ii) raise the values in the cells of the latter resulting matrix in a real valued power p. The two steps “represent”: i) the probability that a random walker takes a specific path in p steps and ii) enhancing the probability that two nodes are connected in with “greater strength” for larger values from step a. • Metis (Karypis and Kumar, 1998): Metis relies on a multilevel approach where the graph is coarsened (vertices are unified and edge weights are adjusted accordingly). Then follows the partitioning of the coarsened graph and the projection of the clusters back to the original one. It is a well established algorithm with low computational cost that has been shown to be very effective. • MultiLevel (Blondel et al., 2008): The term MultiLevel is used to refer to the greedy optimization algorithm introduced by Blondel et al. (2008). This approach is similar to Fast Greedy algorithm with the difference that, at each iteration, joined vertices are replaced with single nodes (similarly to metis). • SpinGlass (Reichardt and Bornholdt, 2006): A cross-discipline approach, that interprets the community structure of a graph as the spin configuration with the minimum energy of the spin glass (spin glass: disordered magnet, spin: magnetic orientation, the spin states represent the community indices). In essence, this algorithm deals with the adhesion between vertices which is the equivalent of edge betweenness and provides a different approach to the work of Clauset et al. (2004) • Walktrap (Pons and Latapy, 2005): The main intuition behind this algorithm is that short random walks will tend to stay in the same communities. Thus the transition probability between two vertices will be high if they are in the same community (for short random walks and adjusting for the degree of a vertex). By using this property as distance, clustering can be applied with an agglomerative approach (for efficiency). 7.4 Performance 7.4.1 Artificial Data, NMI comparison As mentioned on the previous sections, we wish to evaluate the performance of our framework in multiple aspects. We start here with the artificial data, comparing the performance in relevance to the NMI metric. This comparison is separate for each of the three groups of the artificial data. Moreover, we compare across the parameters of the data generator (Table 1) as those affect crucial aspects of the graph’s structure (density, cluster clarity, etc.). These parameters also affect the degeneracy properties of the graph (number of nodes in the maximum k-core, number of core partitions etc.). We organize the comparisons per algorithm. For each of the aforementioned clustering algorithms, we display the evaluation of the “original version” (which we will refer to as Baseline in all comparisons) in comparison to the evaluation for the corresponding CoreCluster “combination” (CoreCluster utilizing the Baseline in place of the Cluster algorithm as described in Section 4). Thus for each algorithm we have three figures (one for each of the aforementioned artificial data sets - Section 7.1.1) displaying the NMI clustering evaluation metric in relevance to the cluster size as well as the mixing parameter (that affects the “clarity” of the clusters). 20 CoreCluster: A core decomposition framework for graph clustering Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 (a) Spectral Clustering Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 (b) InfoMap Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 (c) Leading Eigenvector Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 (d) Fast Greedy Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 (e) MCL Figure 3: Clustering quality comparisons in terms of NMI for the three artificial graphs (D1, D2, and D3) (Part I). We start this comparison at Figure 3 with the Spectral Clustering algorithm. In this case, we observe that the CoreCluster solution performs quite close to the Baseline and 21 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 (f) Metis Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 (g) MultiLevel Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 (h) SpinGlass Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 Baseline CoreCluster 1.0 0.8 0.6 NMI 0.4 0.2 0.0 0.0 mix 0.1 0.2 ing par 0.3 am ete 0.4 0.5 r 4 1.0 0.8 3 1 2 size graph 0.6 0.4 0.2 x10e3 0.0 0 (i) Walktrap Figure 3: Clustering quality comparisons in terms of NMI for the three artificial graphs (D1, D2, and D3) (Part II). in fact outperforms it in many occasions. We further make an initial note on the effect of graph density to the quality of the results for our framework. Thus, we can remark that the largest gap between the Baseline and CoreCluster across all algorithms is observed for the D3 dataset, which has the biggest density. This is an expected result as the global density of the graph affects the maximum k-core number and the partitions generated by the k-core decomposition algorithm. Graphs that are very dense will have a high maximum core number but there will be no partition of significance. In simpler terms, when all the nodes are highly connected, they are all likely to belong in high-core partitions and subsequently the biggest portion of the graph could 22 CoreCluster: A core decomposition framework for graph clustering belong to the maximum core. The case of the D3 dataset displays this point as it was intentionally generated with high density. On the contrary, D1 was generated as a case closer to the density of real graphs and D2 was generated as an intermediate case. We see consistently along all experiments that the general graph density affects more or less the same our framework. The cases in D3 where CoreCluster performs in a similar manner with the Baseline are of those with low mixing parameter. The reason for this is twofold: 1. The clusters are better separated from each other. 2. While the minimum and the maximum node degree are the main parameters that affect directly the density of the generated graph, the mixing parameter contributes as well. Thus, for low mixing parameters, we can get lower densities as well in all of the datasets. Our framework is designed based on analysis of real networks and their Degeneracy (Giatsidis et al., 2011b,c) and for this reason datasets with “abnormal” behaviour in the Degeneracy aspect are expected to give bad evaluations. Intuitively, in order to provide acceleration to the “input” algorithm (Cluster), the size of corei should be (significantly) smaller than the size of corei−1 . Otherwise, the incremental nature of our framework would not make sense. Moving to the rest of the algorithms, we see similarly that CoreCluster performs quite close to the Baseline for most cases. In addition to the cases of high density, we would like to study in detail other parameters that also affect the divergence between the two algorithms(the Baseline and CoreCluster). For this reason in the following sections, we examine in depth properties of both the graph and the Baseline algorithms in order to clearly outline the evaluation of the CoreCluster framework. It is also worth noting that the SpinGlass algorithm is missing evaluations for the larger graphs in the Baseline part. Its execution was conducted with the implementation provided by igraph1 and it was riddled with abruptly terminations on these datasets. Only a small portion of the data was processed successfully with just the Baseline and for this reason we present only the parts that were covered thoroughly (i.e., more than one graph per combination passed the processing with SpinGlass). 7.4.2 Analysis: Graph and Algorithm Properties - Artificial Data In this part of our work, we present a thorough analysis of the evaluations in regards to the following two aspects: • Performance analysis in relevance to the coverage of the maximum-core: How much of the complete graph exists in the max-core versus the NMI from CoreCluster. • “Final Performance” vs “Performance at the Maximum-Core”: The relation of the performance of the Baseline on the max-core versus that of CoreCluster at the entire graph. Similarly to the performance evaluations presented in Section 7.4.3, the aforementioned evaluations are conducted per Dataset (D1,D2,D3). 1. http://igraph.org/c/ 23 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis How to use the information bellow Most tools and algorithms in the Machine Learning domain require a lot of experimentation and fine tuning before deployment. Since CoreCluster is a meta algorithmic framework, we are limiting the additional complexity in this process by clearly marking properties that are easy and efficient to detect before the deployment of our framework. Instead of general remarks on the performance, the next two sections will provide a clear roadmap to anyone who wishes to apply CoreCluster on any data. Performance analysis in relevance to the coverage of the maximum-core The degeneracy properties of a graph can vary greatly in two main aspects. The first one is the k-core number of the graph, i.e., the maximum of interconnectivity for which we can get a non empty part of the graph. The other one is the number of nodes for all the possible cores from 0 to k. As graphs with communities are complex structures with dense and sparse areas, it would be disorienting to evaluate all possible properties for a graph in relevance to Degeneracy and the performance of CoreCluster. For example, while density affects the core numbers, a graph with a high k-core value could be sparse as well. For this reason, we focus on a key aspect that can portray the graph in a major manner. This aspect is the percentage of the graph that is maintained in the maximal k-core. We call this dimension “max-core coverage” and we examine across it how well our framework performs (in terms of NMI). In Figure 4, we see the comparison between the max-core coverage and the NMI of our framework in the entire graph (referred here as final NMI). From this comparison, there is clearly a negative correlation between the two. This correlation is consistent across all algorithms which points out that it is a property of the graph that affects the performance of CoreCluster. In simple terms, our framework performs better when the max-core contains a small percentage of the total graph (and performs worse in the opposite case). This makes sense in an intuitive manner as well as the reasons for having a high percentage of the graph in the max-core coincide with those of having bad or no clustering structures. Regardless of the general density of the graph, the main reason for getting a high “max-core coverage”, is that the distribution of edges among the vertices is close to uniform. “Final Performance” vs “Performance at the Maximum-Core” Our proposed framework works in an incremental manner starting a cluster from the most cohesive part and adding on top of that. Following this hierarchical manner it is susceptible to errors propagating from the starting basis to the final clustering result. Thus, it is important to evaluate an algorithm at the most cohesive part in order to anticipate the behaviour at the entirety of the graph. In this section, we would like to study properties of the algorithm and in particular the behaviour of our framework in regards with the starting core (which is the application of the Baseline on the max-core). Specifically we would like to see how the “starting” performance at the maximum core affects the final performance in the entire graph. The performance at the maximum core is evaluated in the same manner as it would be for the entire graph but only for the sub-graph of the maximum core. We assume that: • the maximum core is the input graph, 24 CoreCluster: A core decomposition framework for graph clustering D1 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 D2 D3 final NMI Percentage over all Graphs 0.200 0.175 0.150 0.125 0.100 0.075 0.050 0.025 0.0 0.5 1.0 0.0 0.5 1.0 0.0 0.5 1.0 max-core coverage (percentage of the graph) 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 D2 D3 (a) Spectral Clustering 0.5 1.0 0.0 0.5 1.0 0.0 0.5 1.0 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 0.5 1.0 0.0 0.5 1.0 0.0 0.5 0.5 1.0 0.0 0.5 1.0 D1 (c) Fast Greedy D2 D3 0.16 0.14 0.12 0.10 0.08 0.06 0.04 0.02 final NMI Percentage over all Graphs 0.18 0.16 0.14 0.12 0.10 0.08 0.06 0.04 0.02 0.0 1.0 0.0 Percentage over all Graphs D3 final NMI 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 0.5 max-core coverage (percentage of the graph) (b) Leading Eigenvector D2 D3 0.14 0.12 0.10 0.08 0.06 0.04 0.02 0.0 max-core coverage (percentage of the graph) D1 D2 final NMI final NMI Percentage over all Graphs 0.14 0.12 0.10 0.08 0.06 0.04 0.02 0.0 D1 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 Percentage over all Graphs D1 1.0 0.0 max-core coverage (percentage of the graph) 0.5 1.0 0.0 0.5 1.0 0.0 0.5 1.0 max-core coverage (percentage of the graph) (d) MCL (e) Metis Figure 4: Performance analysis in relevance to the coverage of the maximum-core for the three artificial graphs (D1, D2, and D3) (Part I) 25 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis D3 0.5 1.0 0.0 0.5 1.0 0.0 0.5 1.0 D2 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 0.5 1.0 0.0 0.5 1.0 0.0 0.5 1.0 0.0 0.5 1.0 0.0 0.5 1.0 D1 (g) SpinGlass D2 D3 0.135 0.120 0.105 0.090 0.075 0.060 0.045 0.030 0.015 final NMI Percentage over all Graphs 0.18 0.16 0.14 0.12 0.10 0.08 0.06 0.04 0.02 0.0 0.5 max-core coverage (percentage of the graph) D3 final NMI 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 (f) MultiLevel D3 0.135 0.120 0.105 0.090 0.075 0.060 0.045 0.030 0.015 0.0 max-core coverage (percentage of the graph) D1 D2 final NMI final NMI Percentage over all Graphs 0.16 0.14 0.12 0.10 0.08 0.06 0.04 0.02 0.0 D1 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 Percentage over all Graphs D2 Percentage over all Graphs D1 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 1.0 0.0 max-core coverage (percentage of the graph) 0.5 1.0 0.0 0.5 1.0 0.0 0.5 1.0 max-core coverage (percentage of the graph) (h) InfoMap (i) Walktrap Figure 4: Performance analysis in relevance to the coverage of the maximum-core for the three artificial graphs (D1, D2, and D3) (Part I) • the cluster membership is maintained, and we simply apply any of the given clustering algorithms. The maximum core contains a very dense part of the graph (Andersen and Chellapilla, 2009). Moreover, it contains the most cohesive parts of the clusters in respect to interconnectivity (i.e., a sub-graph where the number of neighbours k is -at least- the maximal one for all). In our analysis of the results on the artificially generated data, we noticed that almost 50% of the data contain only one cluster. Many graph clustering algorithms are implemented or originally designed with the assumption that the graph contains multiple clusters. In the current state of our framework, we apply the clustering algorithm in the maximum core without conducting any analysis on the number of the clusters. While the assumption that there will always be more than one cluster makes sense in general cases, in this specific scenario we see two distinctive behaviors. Therefore, in order to study the effect of the performance at the maximum core, we partition our cases to data that have more that one cluster at the maximum core and data that have only one. For the first case, we report the relation of the NMI at the maximum 26 CoreCluster: A core decomposition framework for graph clustering D1 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 D2 D3 final NMI Percentage over all Graphs 0.18 0.16 0.14 0.12 0.10 0.08 0.06 0.04 0.02 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 D2 1.0 0.0 0.5 D3 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 1.0 0.0 0.5 1.0 0.0 max-core NMI 0.5 1.0 0.0 (b) Leading Eigenvector D2 D3 0.0 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 0.5 1.0 0.0 0.5 1.0 0.0 max-core NMI 0.5 D1 D2 D3 0.050 0.045 0.040 0.035 0.030 0.025 0.020 0.015 0.010 0.005 0.5 D1 1.0 0.0 0.5 1.0 0.0 max-core NMI (c) Fast Greedy D2 0.5 1.0 D3 0.045 0.040 0.035 0.030 0.025 0.020 0.015 0.010 0.005 final NMI Percentage over all Graphs 0.16 0.14 0.12 0.10 0.08 0.06 0.04 0.02 final NMI 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 D1 1.0 final NMI Percentage over all Graphs final NMI 0.5 0.5 (a) Spectral Clustering 0.036 0.032 0.028 0.024 0.020 0.016 0.012 0.008 0.004 0.0 1.0 0.0 max-core NMI Percentage over all Graphs D1 0.5 Percentage over all Graphs 0.0 1.0 0.0 (d) MCL 0.5 1.0 0.0 0.5 1.0 0.0 max-core NMI 0.5 1.0 (e) Metis Figure 5: “Final Performance” vs “Performance at the Maximum-Core” for the three artificial graphs (D1, D2, and D3) (Part I). 27 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis D3 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 D1 1.0 0.0 0.5 1.0 0.0 max-core NMI (f) MultiLevel D2 0.5 1.0 0.0 0.0 D3 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 0.16 0.14 0.12 0.10 0.08 0.06 0.04 0.02 0.5 1.0 0.0 0.5 1.0 0.0 max-core NMI 0.5 D3 0.036 0.032 0.028 0.024 0.020 0.016 0.012 0.008 0.004 0.5 D1 1.0 0.0 0.5 1.0 0.0 max-core NMI (g) SpinGlass D2 0.5 1.0 D3 0.064 0.056 0.048 0.040 0.032 0.024 0.016 0.008 final NMI final NMI 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 0.5 Percentage over all Graphs 0.0 D2 final NMI final NMI Percentage over all Graphs 0.056 0.048 0.040 0.032 0.024 0.016 0.008 D1 Percentage over all Graphs D2 Percentage over all Graphs D1 1.0 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 1.0 0.0 (h) InfoMap 0.5 1.0 0.0 0.5 1.0 0.0 max-core NMI 0.5 1.0 (i) Walktrap Figure 5: “Final Performance” vs “Performance at the Maximum-Core” for the three artificial graphs (D1, D2, and D3) (Part II). core versus the NMI on the entire graph. In the second case, since the evaluation at the maximum core is meaningless, we report only the final evaluation on the entire graph. Starting with Figure 5 (multiple clusters at the maximum core), we see a consistent behaviour: 1. There is an obvious correlation between the performance at the maximum core and that at the entire graph. 2. Combinations of datasets and clustering algorithms that CoreCluster was very close to the Baseline, are cases where the latter was performing relatively well on the max-core. 3. The performance at D1 dataset is consistently better. This validates that D1 contains structures which most algorithms would identify as clusters. One example, of the second observation, is the case of the algorithm “Leading EigenVector” in D1 where the performance of our framework is identical to that of the Baseline. At the same time, Figure 5 indicates that this algorithm was really good at detecting the clusters 28 leading eigenvector spinglass infoMap label propagation metis multilevel spectral clustering fast greedy walktrap edge betweenness mcl D1 D2 D3 0.16 0.14 0.12 0.10 0.08 0.06 0.04 0.02 Percentage over all Graphs Algorithm CoreCluster: A core decomposition framework for graph clustering 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 0.0 0.2 0.4 0.6 0.8 1.0 NMI Figure 6: Final NMI: one cluster at maximum core. at the maximum core. On the other hand, “InfoMap” is an example of an algorithm that had “failures” at the maximum core which would explain the greater divergence. Additionally, we examine Figure 6 to provide further insight. With “Walktrap” as a counter example, we see that this algorithm behaves quite similarly to “Leading EigenVector” in the case where we have multiple clusters in the maximum core. But the NMI evaluation is not that similar. We attribute this to the other 50% of the data where we have only one cluster (at the maximum core). In this case, “Walktrap” performs distinctively worse. Upon close examination this algorithm was less capable at detecting that there is only one cluster in the maximum core (in comparison to other algorithms). We can clearly see the result of this in Figure 6. 7.4.3 Real Data, Conductance comparison The previous sections offered a great detail on the inner workings of our framework and gave an easy set of techniques to determine how appropriate is the application of our framework without having to perform exhaustive evaluations. Given that the artificial data range over a wide variety of properties, the results on the performance (NMI) might not always reflect the performance on real data. Simply put, the artificial data were intentionally created to stress test our framework in even extreme cases. In this section, we apply CoreCluster into a real dataset along with all of the aforementioned algorithms, and we evaluate its performance with the well know conductance metric. In this manner, we provide a complete picture of how well our framework performs and we justify its’ usefulness with real and concrete examples. In Figure 7, the comparison between the aforementioned “Baselines” (Section 7.3) and the corresponding CoreCluster “combination” is presented. Given that the Facebook dataset is composed by 100 different graphs, we summarize the clustering performance in the following two aspects: 1. Conductance per cluster size: The upper “parts” of the sub-figures in Figure 7 represents the comparison of the clusters found (along all the graphs) in terms of conductance (lower values are better). While conductance reflects in both a practical and intuitive manner the quality of a cluster, the size of the clusters found plays 29 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis 1.0 CoreCluster Baseline Bin size Conductance 0.8 0.6 80 70 60 50 0.4 40 0.2 30 0.0 20 Baseline 10 core cluster 10 1 0 10 4 10 2 10 3 Cluster size (number of nodes) (a) Spectral Clustering CoreCluster Baseline Bin size 0.6 0.4 0.2 0.0 Baseline core cluster 10 1 10 4 10 2 10 3 Cluster size (number of nodes) 32 0.2 24 0.0 16 Baseline 10 1 2400 1800 1200 600 10 4 10 2 10 3 Cluster size (number of nodes) CoreCluster Baseline 0.8 Conductance 3000 core cluster 0 10 4 10 2 10 3 Cluster size (number of nodes) 1.0 4200 0.4 Baseline 8 core cluster 4800 3600 0.0 40 (c) Fast Greedy 0.6 0.2 48 0.4 10 1 Bin size Bin size Conductance 0.8 CoreCluster Baseline 56 0.6 (b) Leading Eigenvector 1.0 CoreCluster Baseline 0.8 Conductance Conductance 0.8 1.0 90 80 70 60 50 40 30 20 10 0 Bin size 1.0 0 0.6 (d) MCL 150 100 0.2 75 0.0 50 Baseline 25 core cluster 10 4 10 2 10 3 Cluster size (number of nodes) (e) Metis Figure 7: Facebook conductance (Part I). 30 175 125 0.4 10 1 200 0 CoreCluster: A core decomposition framework for graph clustering CoreCluster Baseline 0.6 120 0.8 105 90 75 0.4 60 0.2 45 0.0 30 Baseline 15 core cluster 10 1 1.0 Bin size Bin size Conductance 0.8 135 Conductance 1.0 10 2 10 4 10 3 0 0.6 0.4 0.2 0.0 Baseline core cluster 10 1 Cluster size (number of nodes) (f) MultiLevel Bin size 0.6 0.4 0.2 0.0 Baseline core cluster 10 1 10 4 10 2 10 3 Cluster size (number of nodes) 1.0 2250 2000 1750 1500 1250 1000 750 500 250 0 CoreCluster Baseline 0.8 Conductance Conductance 0.8 CoreCluster Baseline 10 4 10 2 10 3 Cluster size (number of nodes) (g) SpinGlass Bin size 1.0 45 40 35 30 25 20 15 10 5 0 CoreCluster Baseline 0.6 (h) InfoMap 105 90 75 0.4 60 0.2 45 0.0 30 Baseline 15 core cluster 10 1 120 10 4 10 2 10 3 Cluster size (number of nodes) 0 (i) Walktrap Figure 7: Facebook conductance (Part II). an important role (e.g., we can’t consider a clustering “good” if there is one “huge” cluster with high conductance and many “small” ones with low). On an additional note, we excluded from the comparison small non connected components as those are trivial to be detected by any algorithm and don’t provide additional information for the comparison. 2. Frequency of the bin (bin size): For presentation purposes, the aforementioned comparison is done by binning the cluster sizes in logarithmic bins. This is to avoid noise in the plot and to provide a better picture on the average behaviour. In this point, we evaluate the frequency of the bins to further investigate the clustering “tendencies” of the Baselines and their combinations. On the plots we refer to the frequency of the bin as Bin size. With the exception of “MultiLevel”, we see that CoreCluster either outperforms the corresponding Baselines or has an almost identical quality of results. Regarding the sizes of the clusters, we see from the frequency of the bins that some of the Baselines (Spinglass, InfoMap, Metis, MCL,) are more prone to a specific range of sizes. On the other hand, CoreCluster framework maintains a good clustering quality while being able to detect 31 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis cluster in all possible ranges indiscriminately of the “input” algorithm. Evidently, this is important as it is not an attribute that all algorithms can demonstrate. 7.4.4 Execution Time As a final part of our evaluation, we present the average execution time of the Baselines in comparison to the corresponding one when CoreCluster is applied. We once more clarify that not all of the Baseline algorithms are appropriate for “acceleration” with this framework. As mentioned at Section 4, CoreCluster is designed to accelerate a computationally expensive algorithm. For the cases of “complex” algorithms, we can see in Figures 8 and 9 the examples of Spectral Clustering, SpinGlass, Walktrap and MCL algorithms. In these examples, we see orders of magnitude in the difference between the Baseline and CoreCluster that increases exponentially for greater graph sizes. In the case of the algorithms that are not as computationally expensive there is the added overhead to compute the core structure with the k-core algorithm. This overhead makes the CoreCluster slower but we see that the difference is great as the k-core algorithm can be linear to the number of edges (Batagelj and Zaversnik, 2003). This means that the additional cost will not increase immensely for greater graph sizes but, as we also observe in the plots, it will remain within a practically logical range. Additionally, we note that CoreCluster does not require the full graph in memory as it processes parts of the graph incrementally. Added with the fact that CoreCluster can outperform the Baseline (e.g., Metis for conductance at Figure 7 ) we can envision CoreCluster being applicable with “fast” algorithms as well. 8. Conclusions In this paper, we have presented in full detail a framework for optimizing the efficiency of graph clustering. This framework, is capitalizing on the structures produced by the kcore decomposition algorithm. The intuition is that the extreme k-cores maintain the most crucial parts of the clustering structure of the original graph. Our main contribution is the CoreCluster framework that processes the graph in an incremental manner and in parts of small size (compared to the entire graph). We have described how this framework scales-up from an analytical view and why the kcore structure offers an appropriate partition with increased “importance” (to the clustering structure) of vertices. We displayed both of these in an experimental manner as well with a multitude of evaluations. In more detail, we have presented an exhaustive set of experiments on real and artificial data which: • Displayed the acceleration of computationally expensive algorithms while maintaining high cluster quality. • Through thorough analysis, described a set of properties -easy to identify and detectfor the proper usage of our framework. Moreover, we provided an indirect review of the used algorithms and offered insights on their individual performance. As future work, we plan to further extend and improve our framework in the following aspects: 32 CoreCluster: A core decomposition framework for graph clustering 10 3 Time (sec) 10 2 10 1 10 0 10 -1 Baseline CoreCluster 10 -2 10 -30.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 1e3 Graph size Baseline CoreCluster (a) Spectral Clustering 10 0 10 -1 10 0 Time (sec) Time (sec) 10 1 10 -1 10 -2 Baseline CoreCluster 10 -20.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 1e3 Graph size 10 -30.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 1e3 Graph size (b) Leading Eigenvector 10 2 Baseline CoreCluster 10 0 Time (sec) Time (sec) 10 1 (c) Fast Greedy 10 -1 10 -2 10 -1 Baseline CoreCluster 10 -2 10 -30.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 1e3 Graph size 10 -30.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 1e3 Graph size (d) MCL (e) Metis Figure 8: Artificial Graphs execution time (Part I). 33 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis 10 -1 10 3 Time (sec) Time (sec) 10 2 10 -2 Baseline CoreCluster 10 1 10 0 Baseline CoreCluster 10 -1 10 -30.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 1e3 Graph size 10 -20.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 1e3 Graph size (f) MultiLevel (g) SpinGlass 10 1 10 0 10 0 Time (sec) Time (sec) 10 -1 10 -1 10 -2 10 -2 Baseline CoreCluster 10 -30.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 1e3 Graph size Baseline CoreCluster 10 -30.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 1e3 Graph size (h) Info Map (i) Walktrap Figure 8: Artificial Graphs execution time (Part II). • Optimize the heuristics and clustering assignments our framework uses when not utilizing the provided clustering algorithm. • Merging adjacent cores. On a few hand picked occasions, we noticed that the framework would have been more effective if adjacent cores were merged as one. This is mainly for cores that were only marginally different. It could potentially increase the efficiency of execution and the quality of the results if a second pass over the cores merged them appropriately. • Extend it for directed graphs. For the application of the same model in a directed network, one would have to take into account that degeneracy creates partitions in two different dimensions (incoming and outgoing vertices). Exploring all possible partitions in this case becomes a computation issue by itself. Finally, we provide our implementation of CoreCluster for the use of further experiments and its’ application to real world scenarios. The full implementation along with instructions on how to utilize the algorithms described in this paper can be found at: removedwillbeinthepublishedversion 34 CoreCluster: A core decomposition framework for graph clustering 10 5 Time (sec) 10 4 Baseline CoreCluster 10 3 10 2 10 1 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 1e4 Graph size (a) Spectral Clustering 10 3 Time (sec) Time (sec) 10 2 10 2 10 1 Baseline CoreCluster 10 1 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 1e4 Graph size (b) Leading Eigenvector 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 1e4 Graph size (c) Fast Greedy 10 3 Time (sec) Time (sec) 10 2 10 2 10 1 Baseline CoreCluster Baseline CoreCluster 10 1 10 0 Baseline CoreCluster 10 -1 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 1e4 Graph size (e) Metis 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 1e4 Graph size (d) MCL Figure 9: Facebook execution time (Part I). 35 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis 10 2 Time (sec) Time (sec) 10 2 10 1 10 0 10 1 Baseline CoreCluster Baseline CoreCluster 10 0 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 1e4 Graph size (f) MultiLevel 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 1e4 Graph size (g) SpinGlass 10 2 Time (sec) Time (sec) 10 3 10 2 10 1 Baseline CoreCluster 10 1 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 1e4 Graph size (h) Info Map Baseline CoreCluster 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 1e4 Graph size (i) Walktrap Figure 9: Facebook execution time (Part II). Appendix A. Empirical Analysis of the CoreCluster’s Quality As described in the main part, the intuition behind the CoreCluster framework is that the core expansion sequence Vk , Vk−1 , . . . , V0 gives a good sense of direction on how to do clustering in an incremental way. Moreover, the observation is that the early i-cores (i.e., i-cores where i is close to k) are already dense, and therefore sufficiently coherent, to provide a good starting clustering that will expand well because of the selection criterion. Figure 10 depicts the above intuition about the datasets used in our experiments (as they are described in the main document). More specifically, it represents the average clustering coefficient of a k-core subgraph with regards to the core index value k (normalized by the maximum k of each graph). This indicates that, overall, a clearer clustering can be given at the maximum k-core. As a reminder, the reader may see the properties of the artificial data presented on Table 1. The particular results, along with the theoretical justification (described in the main document, Section 5), provide the conclusion that the highest ranked k-core will most likely have the nodes of the graph that belong to the largest clusters and at the same the clustering structure will be the best under the measure of the clustering coefficient. As the 36 CoreCluster: A core decomposition framework for graph clustering 0.9 Clustering Coefficient 0.85 0.8 0.75 0.7 0.65 0.6 0.55 0.5 0.1 0.2 0.3 0.4 0.5 0.6 0.7 Core (normalized) 0.8 0.9 1 Figure 10: Average clustering coefficient compared to k-core index normalized by the maximum value. CoreCluster framework starts from that subgraph (the maximal k-core), it will perform the best into separating the clusters of this subgraph and then it will move one the ”next best” subset of nodes and edges as they are given from the core expansion sequence. References Amine Abou-Rjeili and George Karypis. Multilevel algorithms for partitioning power-law graphs. In IPDPS, pages 124–124, 2006. José I. Alvarez-Hamelin, Luca Dall’asta, Alain Barrat, and Alessandro Vespignani. k-core decomposition: a tool for the visualization of large scale networks. arXiv, 2005. Reid Andersen and Kumar Chellapilla. Finding dense subgraphs with size bounds. In WAW, pages 25–37, 2009. David Arthur and Sergei Vassilvitskii. k-means++: the advantages of careful seeding. In SODA, pages 1027–1035, 2007. Vladimir Batagelj and Matjaz Zaversnik. An o(m) algorithm for cores decomposition of networks. CoRR, 2003. Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment, 2008(10):P10008, 2008. S. Bubeck, M. Meila, and U. von Luxburg. How the initialization affects the stability of the k-means algorithm. ESAIM: Probability and Statistics, 16:436–452, 2012. J. Cheng, Yiping Ke, Shumo Chu, and M.T. Ozsu. Efficient core decomposition in massive networks. In ICDE, pages 51–62, 2011. 37 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis Aaron Clauset, M. E. J. Newman, and Cristopher Moore. Finding community structure in very large networks. Phys. Rev. E, 70(6):066111, Dec 2004. doi: 10.1103/PhysRevE.70. 066111. Chandler Davis and W. M. Kahan. The rotation of eigenvectors by a perturbation. iii. SIAM Journal on Numerical Analysis, 7(1):1–46, 1970. P. Drineas, A. Frieze, R. Kannan, S. Vempala, and V. Vinay. Clustering large graphs via the singular value decomposition. Mach. Learn., 56(1-3), 2004. ISSN 0885-6125. Paul Erdős. On the structure of linear graphs. Israel J. Math., 1:156–160, 1963. ISSN 0021-2172. Santo Fortunato. Community detection in graphs. Physics Reports, 486(3-5), 2010. Christos Giatsidis, Dimitrios M. Thilikos, and Michalis Vazirgiannis. D-cores: Measuring collaboration of directed graphs based on degeneracy. In ICDM, pages 201–210, 2011a. Christos Giatsidis, Dimitrios M Thilikos, and Michalis Vazirgiannis. D-cores: Measuring collaboration of directed graphs based on degeneracy. In Data Mining (ICDM), 2011 IEEE 11th International Conference on, pages 201–210. IEEE, 2011b. Christos Giatsidis, Dimitrios M Thilikos, and Michalis Vazirgiannis. Evaluating cooperation in communities with the k-core structure. In Advances in Social Networks Analysis and Mining (ASONAM), 2011 International Conference on, pages 87–93. IEEE, 2011c. Christos Giatsidis, Fragkiskos Malliaros, Dimitrios M Thilikos, and Michalis Vazirgiannis. Corecluster: A degeneracy based graph clustering framework. In AAAI’14: 28th Conference on Artificial Intelligence, 2014. David F. Gleich and C. Seshadhri. Vertex neighborhoods, low conductance cuts, and good seeds for local community methods. In KDD, pages 597–605, 2012. George Karypis and Vipin Kumar. A fast and high quality multilevel scheme for partitioning irregular graphs. SIAM J. Sci. Comput., 20(1):359–392, December 1998. ISSN 1064-8275. Sanjiv Kumar, Mehryar Mohri, and Ameet Talwalkar. On sampling-based approximate spectral decomposition. In ICML’09, pages 553–560, 2009. Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. Benchmark graphs for testing community detection algorithms. Physical Review E, 78, 2008. doi: 10.1103/PhysRevE. 78.046110. Jure Leskovec and Christos Faloutsos. Sampling from large graphs. In KDD, pages 631–636, 2006. ISBN 1-59593-339-5. Jure Leskovec, Kevin J. Lang, and Michael Mahoney. Empirical comparison of algorithms for network community detection. In WWW, pages 631–640, 2010. J.F. Lu, J.B. Tang, Z.M. Tang, and J.Y. Yang. Hierarchical initialization approach for k-means clustering. Pattern Recognition Letters, 29(6):787 – 795, 2008. ISSN 0167-8655. 38 CoreCluster: A core decomposition framework for graph clustering Helmut Lutkepohl. Handbook of matrices. Computational Statistics and Data Analysis, 2 (25):243, 1997. Arun S. Maiya and Tanya Y. Berger-Wolf. Sampling community structure. In WWW, pages 701–710, 2010. Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schütze. Introduction to information retrieval. Cambridge University Press, 2008. M. E. J. Newman. Fast algorithm for detecting community structure in networks. Phys. Rev. E, 69(6):066133, Jun 2004. doi: 10.1103/PhysRevE.69.066133. M. E. J. Newman and M. Girvan. Finding and evaluating community structure in networks. Physical Review E, 69, 2004. doi: 10.1103/PhysRevE.69.026113. Mark EJ Newman. Finding community structure in networks using the eigenvectors of matrices. Physical review E, 74(3):036104, 2006. Andrew Y. Ng, Michael I. Jordan, and Yair Weiss. On spectral clustering: Analysis and an algorithm. In NIPS, pages 849–856, 2001. Marzia Polito and Pietro Perona. Grouping and dimensionality reduction by locally linear embedding. In NIPS, pages 1255–1262, 2001. Pascal Pons and Matthieu Latapy. Computing communities in large networks using random walks. In Computer and Information Sciences-ISCIS 2005, pages 284–293. Springer, 2005. Stephen J. Redmond and Conor Heneghan. A method for initialising the k-means clustering algorithm using kd-trees. Pattern Recognition Letters, 28(8):965–973, 2007. Jörg Reichardt and Stefan Bornholdt. Statistical mechanics of community detection. Physical Review E, 74(1):016110, 2006. Martin Rosvall, Daniel Axelsson, and Carl T Bergstrom. The map equation. The European Physical Journal Special Topics, 178(1):13–23, 2009. Venu Satuluri and Srinivasan Parthasarathy. Scalable graph clustering using stochastic flows: applications to community discovery. In KDD, pages 737–746, 2009. Venu Satuluri, Srinivasan Parthasarathy, and Yiye Ruan. Local graph sparsification for scalable clustering. In SIGMOD, pages 721–732, 2011. Stephen B. Seidman. Network structure and minimum degree. Social Networks, 5(3):269– 287, 1983. Jianbo Shi and Jitendra Malik. Normalized cuts and image segmentation. IEEE Trans. Pattern Anal. Mach. Intell., 22(8):888–905, 2000. ISSN 0162-8828. GW Stewart and Ji-Guang Sun. Matrix perturbation theory (computer science and scientific computing), 1990. 39 Giatsidis, Malliaros, Tziortziotis, Dhanjal, Kiagias, Thilikos and Vazirgiannis Amanda L. Traud, Peter J. Mucha, and Mason A. Porter. Social structure of facebook networks. CoRR, 2011. Stijn Van Dongen. A cluster algorithm for graphs. Report-Information systems, (10):1–40, 2000. Ulrike von Luxburg. A tutorial on spectral clustering. Statistics and Computing, 17(4): 395–416, 2007. ISSN 0960-3174. D. J. Watts and S. H. Strogatz. Collective dynamics of’small-world’networks. Nature, 393 (6684), 1998. Scott White and Padhraic Smyth. A spectral clustering approach to finding communities in graph. In SDM, 2005. Christopher K. I. Williams and Matthias Seeger. Using the nyström method to speed up kernel machines. In Advances in Neural Information Processing Systems 13, pages 682–688. MIT Press, 2001. Donghui Yan, Ling Huang, and Michael I. Jordan. Fast approximate spectral clustering. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’09, pages 907–916. ACM, 2009. Yang Zhang and Srinivasan Parthasarathy. Extracting analyzing and visualizing triangle k-core motifs within networks. In ICDE, pages 1049–1060, 2012. 40
8cs.DS
arXiv:1709.05266v1 [math.LO] 15 Sep 2017 DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS NOAM GREENBERG, JOSEPH S. MILLER, ALEXANDER SHEN, AND LINDA BROWN WESTRICK Abstract. We show that a sequence has effective Hausdorff dimension 1 if and only if it is coarsely similar to a Martin-Löf random sequence. More generally, a sequence has effective dimension s if and only if it is coarsely similar to a weakly s-random sequence. Further, for any s ă t, every sequence of effective dimension s can be changed on density at most H ´1 ptq ´ H ´1 psq of its bits to produce a sequence of effective dimension t, and this bound is optimal. The theory of algorithmic randomness defines an individual object in a probability space to be random if it looks plausible as an output of a corresponding random process. The first and the most studied definition was given by Martin-Löf [ML66]: a random object is an object that satisfies all “effective” probability laws, i.e., does not belong to any effectively null set. (See [DH10, UVS13, She15] for details; we consider only the case of uniform Bernoulli measure on binary sequences, which corresponds to independent tossings of a fair coin.) It was shown by Schnorr and Levin (see [Sch72, Sch73, Lev73]) that an equivalent definition can be given in terms of description complexity: a bit sequence X P 2ω is Martin-Löf (ML) random if and only if the prefix-free complexity of its n-bit prefix X æn is at least n ´ Op1q. (See [LV93, UVS13, She15] for the definition of prefix-free complexity and for the proof of this equivalence; one may use also monotone or a priori complexity.) This robust class also has an equivalent characterization based on martingales that goes back to Schnorr [Sch71]. The notion of randomness is in another way quite fragile: if we take a random sequence and change to zero, say, its 10th, 100th, 1000th, etc. bits, the resulting sequence is not random, and for a good reason: a cheater that cheats once in a while is still a cheater. To consider such sequences as “approximately random”, one option is to relax the Levin-Schnorr definition by replacing the Op1q term in the complexity characterisation of randomness by a bigger opnq term, thus requiring that limnÑ8 KpX æn q{n “ 1. Such sequences coincide with the sequences of effective Hausdorff dimension 1. (Effective Hausdorff dimension was first explicitly introduced by Lutz [Lut00]. It can be defined in several equivalent ways via complexity, via natural generalizations of effective null sets, and via natural generalizations of martingales; again, see [DH10, UVS13, She15] for more information.) Another approach follows the above example more closely: we could say that a sequence is approximately random if it differs from a random sequence on a set The first and fourth authors were supported by a Rutherford Discovery Fellowship from the Royal Society of NZ. The second author was partially supported by grant #358043 from the Simons Foundation. The third author was partially supported by RaCAF ANR-15-CE40-0016-01 grant. 1 2 N. GREENBERG, J.S. MILLER, A. SHEN, AND L.B. WESTRICK of density 0. Our starting point is that this also characterizes the sequences of effective Hausdorff dimension 1. To set notation, for n ě 1, we let d be the normalised Hamming distance n on t0, 1u , the set of binary strings of length n: # tk : σpkq ‰ τ pkqu ; n and we also denote by d the Besicovitch distance on Cantor space 2ω (the space of infinite binary sequences), defined by dpσ, τ q “ dpX, Y q “ lim sup dpX æn , Y æn q, nÑ8 where Z æn stands for the n-bit prefix of Z. If dpX, Y q “ 0, then we say that X and Y are coarsely equivalent.1 Theorem 1.7. A sequence has effective Hausdorff dimension 1 if and only if it is coarsely equivalent to a ML-random sequence. In Section 2, we generalize this result to sequences of effective dimension s in various ways. Because a sequence X having effective dimension s implies that the prefix-free complexity of its n-bit prefix X æn is at least sn ´ opnq, it is natural to consider the weakly s-randoms, those sequences X such that KpX æn q ě sn ´ Op1q. Theorem 2.5. Every sequence of effective Hausdorff dimension s is coarsely equivalent to a weakly s-random. Along the way to proving this, we pass through the question of how to raise the effective dimension of a given sequence while keeping density of changes at a minimum. If dpX, Y q “ 0, then dimpXq “ dimpY q; so sequences of effective Hausdorff dimension s ă 1 cannot be coarsely equivalent to a ML random sequence. It is natural then to ask, what is the minimal distance required between any sequence and a random? By Theorem 2.5, it is equivalent to ask about distances between sequences of dimension s and dimension 1; and naturally generalising, to ask, for any 0 ď s ă t ď 1, about distances between sequences of dimension s and dimension t. We start with a naive bound. For any X, Y P 2ω , | dimpY q ´ dimpXq| ď HpdpX, Y qq. This is our Proposition 3.1. Here Hppq “ ´pp log p ` p1 ´ pq logp1 ´ pqq is the binary entropy function defined on r0, 1s. The binary entropy function is used to measure ` ˘ ř the size of Hamming balls. If V pn, rq “ kďnr nk is the size of a Hamming ball of radius r ă 1{2 in 2n , then Hprqn ´ Oplog nq ď logpV pn, rqq ď Hprqn (see [MS77, Cor. 9, p. 310]). In Proposition 3.5, we will see that this bound is tight, in the sense that if s ă t then there are X, Y P 2ω with dimpXq “ s, dimpY q “ t and dpX, Y q “ H ´1 pt ´ sq. Note that for H ´1 we take the branch which maps r0, 1s to r0, 1{2s. Bounding the distance from an arbitrary dimension s sequence to the nearest dimension t sequence requires more delicate analysis. For example, fix 0 ă s ă t ď 1. If X is Bernoulli H ´1 psq-random, then its dimension is s. But its density of 1s is H ´1 psq. If dimpY q ě t then the density of 1s in Y is at least H ´1 ptq, so 1One place this is defined is in [JS12], where it is called “generic similarity”. DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS 3 dpX, Y q ě H ´1 ptq ´ H ´1 psq. Note that H ´1 ptq ´ H ´1 psq ě H ´1 pt ´ sq, so this is a sharper bound, and it is tight: Theorem 4.1. For every sequence X with dimpXq “ s, and every t P ps, 1s, there is a Y with dimpY q “ t and dpX, Y q ď H ´1 ptq ´ H ´1 psq. In particular, for t “ 1, in light of Theorem 1.7, we obtain Theorem 2.1. For every X P 2ω there is a ML-random sequence Y such that dpX, Y q ď 1{2 ´ H ´1 pdimpXqq. (We however prove Theorem 2.1 first, and elaborate on its proof to obtain Theorem 2.5 and then Theorem 4.1.) We can also ask, starting from an arbitrary random, how close is the nearest sequence of dimension s guaranteed to be? For example, a typical construction of a sequence of effective dimension 1{2 starts with a random and replaces all the even bits with 0. The distance between the resulting pair is 1{4, less than the 1{2 ´ H ´1 p1{2q « .4 needed to get to a Bernoulli random, but more than the H ´1 p1 ´ 1{2q « .1 lower limit from Proposition 3.1. Here, the latter bound is tight: Theorem 3.3. For any Y P 2ω there is some X P 2ω such that dimpXq ď s and dpX, Y q ď H ´1 p1 ´ sq. These results mean that in general, the distance from an arbitrary dimension 1 sequence to the nearest dimension s sequence is quite a bit less than the distance from an arbitrary dimension s sequence to the nearest dimension 1 sequence. Finally, we mention that for t ă 1, the bound given by Proposition 3.1 for the required distance to a sequence of dimension s ă t is not optimal; we show below (Proposition 3.4) that for the case t “ 1{2 and s “ 0, there are Y P 2ω of dimension 1{2 with no X P 2ω of dimension 0 within distance H ´1 p1{2q. Here decreasing information is not so simple due to the possibility of redundancy of information. Each of these infinitary results have finite versions. Examples of similar finite theorems previously appeared in [BFNV04]. The finite versions are proved using either Harper’s Theorem, a result of finite combinatorics; or estimates on covering Hamming space by balls of a given radius. We adapt those methods, together with some convexity arguments, to prove our results. These results exist in the context of a larger set of questions on the general theme of asking whether every sequence of high effective dimension is obtainable by starting with a random and “messing it up”. If a random were messed up only slightly to produce a sequence of high effective dimension, it might be possible to computably extract a random sequence back out. It was shown in [BDS09, FHP` 11] that if X has positive packing dimension, then X computes a sequence of packing dimension at least 1 ´ ε for each ε ą 0. On the other hand, the second author showed that for any left-c.e. α P p0, 1q, there is a sequence of effective dimension α which does not compute any sequence of effective dimension greater than α [Mil11], and in [GM11] it was shown that there is a sequence of dimension 1 that does not compute any random. Therefore, the symmetric differences X∆Y which we find here are not, in general, computable. For more references on this type of question, see [DH10, Section 13.7]. 4 N. GREENBERG, J.S. MILLER, A. SHEN, AND L.B. WESTRICK n To set notation, for a binary string σ of length n (we write σ P t0, 1u ) let Kpσq ; n then for an infinite binary sequence X P 2ω , dimpσq “ dimpXq “ lim inf dimpX æn q. n We can similarly define conditional dimension: dimpσ | τ q “ Kpσ | τ q . |σ| 1. Dimension 1 sequences and randoms In this section, we prove Theorem 1.7. Let P be the set of random sequences with deficiency 0: P “ tY : p@nq KpY æn q ě nu . This P is not empty. Given a dimension 1 sequence X, we will build a Y P P such that dpX, Y q “ 0. Let P be the set of extendible strings of P : the prefixes of elements of P . The following lemma tells us that every string σ in P has many extensions in P of length 2|σ|. An analogous lemma for supermartingales rather than prefix-free complexity was proved by Merkle and Mihailovic [MM04, Rmk. 3.1]. They gave a clean presentation of the Kučera–Gács theorem. Gács made use of a similar lemma ([Gác86, Lem. 1]), which guaranteed a sufficient number of extensions in Π01 classes. Lemma 1.1. Every σ P P has at least 2|σ|´Kp|σ|q´Op1q extensions in P of length 2|σ|. Proof. We prove that there is a k such that every σ P P has at least 22|σ|´Kpσq´k extensions of length 2|σ|. This is enough, since Kpσq ď |σ| ` Kp|σ|q ` Op1q. Suppose that some σ P P has fewer than 22|σ|´Kpσq´k extensions in P (but has some, otherwise σ cannot be in P). Then each extension (denoted by σ 1 ) has small complexity: Kpσ 1 q ď Kpσq ` Kpσ 1 |σ, Kpσqq ` Op1q ď ď Kpσq ` Kpσ 1 |k, σ, Kpσqq ` Oplog kq ď ď Kpσq ` 2|σ| ´ Kpσq ´ k ` Oplog kq “ 2|σ| ´ k ` Oplog kq The first inequality is the formula for the complexity of a pair. In the second one we add k to the condition; the additional Oplog kq term appears. For the third one, if we know k, σ, and Kpσq, then we can wait until fewer than 22|σ|´Kpσq´k candidates for σ 1 remain (the set P is co-c.e.), and then specify each remaining candidate by its ordinal number using a 2|σ|´Kpσq´k bit string; this is a self-delimiting description since its length is known from the condition. For each such σ 1 , we have Kpσ 1 q ě 2|σ|. Therefore, k ´ Oplog kq ď 0. So if such a σ exists, then k is bounded. Equivalently, if k is sufficiently large, then there is no such σ, i.e., each σ must have at least 22|σ|´Kpσq´k extensions.  n For sets of strings A, B Ď t0, 1u , we let dpA, Bq “ min tdpσ, τ q : σ P A, τ P Bu. We let dpσ, Aq “ dptσu, Aq. Harper’s theorem ([Har66], see also [FF81]) says that among all subsets A, B Ď n t0, 1u of fixed sizes, a pair with maximal distance is obtained by taking spheres DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS 5 with opposite centres of 0n and 1n . Here a sphere centred at σ is a set C that (for some k) contains the Hamming ball of radius k{n centred at σ and is also contained in the ball of radius pk ` 1q{n with the same centre.2 n Harper’s Theorem. For any sets A, B Ď t0, 1u , there are spheres Â, B̂, centred at 0n and 1n respectively, such that |A| “ |Â|, |B| “ |B̂| and dpA, Bq ď dpÂ, B̂q. A first application, useful for us, is the following. n Lemma 1.2. For every ε ą 0 there is a q ă 1 such that for any n and any A Ď t0, 1u of size at least 2nq , there are at most 2nq strings σ P t0, 1un such that dpσ, Aq ą ε. n n Proof. For a given A Ď t0, 1u , let B “ tσ P t0, 1u : dpσ, Aq ą εu. We need to show that A and B cannot both contain at least 2nq elements, for an appropriate choice of q. Note that if |A| ě 2nq and |B| ě 2nq , where q “ Hp1{2 ´ ε{2q, then the inner radii of the spheres  and B̂ from Harper’s Theorem are at least 1{2 ´ ε{2 ´ Op1q{n, because each sphere is an intermediate set between two balls whose radii differ by 1{n. Therefore, dpA, Bq ď ε ` Op1q{n. Note that H is strictly increasing on r0, 1{2s and Hp1{2q “ 1, so q ă 1. To get rid of the error term Op1q{n that appears because of discretisation, we can decrease ε in advance. Then the statement is true for all sufficiently large n. To make it true for all n, we choose q so close to 1 that the statement is vacuous for small n; it is guaranteed if 2nq ą 2n ´ 1.  These tools (Harper’s theorem and the entropy bound) were used in [BFNV04] to prove results on increasing the Kolmogorov complexity of finite strings by flipping a limited number of bits. As an example of this technique, consider the following “finite version” of Theorem 1.7: for any ε ą 0 there is a q ă 1 such that for n sufficiently large n, for any string σ P t0, 1u of dimension at least q (i.e., Kpσq ě n nq), there is a random string τ P t0, 1u (i.e., Kpτ q ě n) such that dpσ, τ q ď ε. Here is the argument using Lemma 1.2. The set of random strings has size at least 2n´1 , and is co-c.e.; so once we see that a string σ is one of the fewer than 2qn many strings that are at least ε-away from each random string, we can give it a description of length essentially nq. A naive plan for the infinite version is to repeat this construction for longer and longer consecutive blocks of bits of a given sequence X of dimension 1, finding closer and closer extensions in a Π01 class of randoms. This fails because the opponent X can copy the extra information that we pump into Y , erasing our gains. For example, if X begins with a very large string of 0s, we must begin Y with a random string to stay in P . Then X (which must have dimension 1 eventually) could bring its initial segment complexity as close to 1/2 as it likes by copying Y from the beginning onto its upcoming even bits. Then Y can never take advantage of X’s complexity to get closer to X, since that would cause Y to repeat information. We cannot overcome this problem by taking huge steps (so large that X runs out of things to copy and must show us new information) because X can still use a similar strategy to ensure that the density of symmetric difference is large near the beginning of each huge interval, driving up the lim supn dpX æn , Y æn q even as we keep dpX æn , Y æn q low for n on the interval boundary. Our solution is to not do an initial segment construction but rather use compactness to let ourselves change our mind about our initial segment whenever the 2This is, admittedly, an unusual use of “sphere”; we adopt it from [FF81]. 6 N. GREENBERG, J.S. MILLER, A. SHEN, AND L.B. WESTRICK opponent seems to take advantage of its extra information. Lemma 1.3 below shows how to do this. Let E be the set of all finite sequences ε̄ “ pε1 , ε2 , . . . , εm q such that ε1 “ 1 and εk`1 equals either εk or εk {2 for all k ă m. For m ě 1, binary sequences σ, τ of length 2m , and ε̄ P E of length m, we write σ „ε̄ τ if for all k P t1, . . . , mu, ` ˘ d σ ær2k´1 ,2k q , τ ær2k´1 ,2k q ď εk . So we compare the second halves of the strings for k “ m, the second quarters for k “ m ´ 1, and so on. (The 0th bits of σ and τ are ignored.) Lemma 1.3. For every ε ą 0 there is an s ă 1 such that for sufficiently large m, for every ε̄ P E of length m, and for all binary strings σ, ρ of length 2m , if (1) pε̄, εq P E (i.e., ε P tεm , εm {2u), (2) dimpρ | σq ě s,3 and (3) there is a τ P P of length 2m such that τ „ε̄ σ, then there is a ν P P of length 2m`1 such that ν „pε̄,εq σρ. Note that the guaranteed ν need not be an extension of τ . n Proof. Let n “ 2m . For a given σ and ε̄, let A be the set of all strings η P t0, 1u such that for some τ̂ P P X t0, 1un we have τ̂ „ε̄ σ and τ̂ η P P. The set A is co-c.e. (given σ and ε̄). Let q be given by Lemma 1.2 (for ε). Now apply Lemma 1.1 to n any τ̂ P P X t0, 1u : since Kpnq{n Ñ 0 as n Ñ 8, the size of A (and even its part that corresponds to this specific τ̂ ) is at least 2nq (for sufficiently large m). n Let B be the set of strings π P t0, 1u such that dpπ, Aq ě ε. The set B is c.e., and Lemma 1.2 guarantees that the size of B is at most 2nq . This implies that each string in B can be given a description (conditioned on σ) of length nq ` m ` Op1q bits; m bits are used to specify ε̄. Set s ą q. Then since m “ log n, for sufficiently large m we have dimpπ | σq ă s for all π P B. So ρ R B. This means that there is some η P A such that dpη, ρq ď ε. Let τ̂ witness that η P A. Then ν “ τ̂ η is as required.  We finish our preparation with three easy observations. Lemma 1.4. Let X, Y P 2ω and suppose that lim dpX ær2m´1 ,2m q , Y ær2m´1 ,2m q q “ 0. mÑ8 Then dpX, Y q “ 0.  ω Lemma 1.5. Let X P 2 and suppose that dimpXq “ 1. Then KpX ær2m ,2m`1 q | X æ2m q “ 1. 2m Proof. The complexity of pairs formula shows that lim mÑ8 KpX æ2m`1 q “ KpX æ2m q ` KpX ær2m ,2m`1 q | X æ2m q ` op2m q; the sum can be (almost) maximal only if both terms are (almost) maximal.  Lemma 1.6. If dpX, Y q “ 0, then dimpXq “ dimpY q.  3Recall that dimpρ | σq “ Kpρ | σq{|ρ|. DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS 7 Theorem 1.7. Let X P 2ω . Then dimpXq “ 1 if and only if there is a ML random Y P 2ω such that dpX, Y q “ 0. Proof. One direction is immediate from Lemma 1.6. For the other direction, assume that dimpXq “ 1. Let sm “ dim pX ær2m ,2m`1 q | X æ2m q. Define an infinite sequence ε̄ “ pε1 , ε2 , . . . q such that: ‚ ε1 “ 1 and εk`1 P tεk , εk {2u for all k, ‚ limkÑ8 εk “ 0, and ‚ for all m, the triple εm , sm , m satisfies the conclusion of Lemma 1.3 (so if sm slowly converges to 1, we need a sequence εm that slowly converges to 0). We then let ! ) 2m Qm “ ν P P X t0, 1u : ν „pε1 ,...,εm q X æ2m . By induction, Lemma 1.3 shows that for all m the set Qm is nonempty. Note also that all elements of Qm have a prefix from Qm´1 . By compactness, there is a Y P P such that Y æ2m P Qm for all m. By Lemma 1.4, such Y is as required.  2. Dimension s sequences and randoms In this section, we look at the distance between dimension s sequences and two kinds of randoms. We consider first the density of symmetric difference required to change a sequence of dimension s into a ML random. Extending that argument, we then show that every sequence of dimension s is coarsely similar to a weakly s-random. Theorem 2.1. For every X P 2ω there is a ML-random sequence Y such that dpX, Y q ď 1{2 ´ H ´1 pdimpXqq. In the introduction we saw that Theorem 2.1 is optimal by considering the case when X is a Bernoulli H ´1 psq-random sequence. The proof of Theorem 2.1 requires several modifications to the work we did in the previous section. For one thing, Lemma 1.4 fails to generalize, as a positive upper density of X∆Y may be greater partway through these intervals than at their boundaries. This could be improved by shortening the intervals. On the other hand, to make something like Lemma 1.5 true for dimension s we would need to increase the size of the intervals; shortening them only makes it fail even worse. The solution is to go ahead and shorten the intervals, but instead of trying to approach a given target symmetric distance slowly and directly, we let the local symmetric difference rise and fall in accordance with the rise and fall of the conditional complexity of each new chunk. Then a convexity argument will let us conclude that the distance between X and Y is small enough. Letting the size of the intervals grow quadratically achieves a happy medium. In 2 this and all following constructions, the ř jth2chunk has size j 2 and the first j chunks have concatenated length of nj :“ iăj i , so that nj ` j “ nj`1 . There was plenty of freedom in choice of chunk growth rate, but we must choose something satisfying these conditions: We need nj`1 ´ nj ! nj so that the impact of new chunks on the density of symmetric difference and effective dimension goes to zero in the limit. And although we could get away with somewhat less, we also want 8 N. GREENBERG, J.S. MILLER, A. SHEN, AND L.B. WESTRICK j log j ! nj`1 ´ nj in order to have room to fit a description of δ, which we define next. To replace the set E of descending sequences of εi , we use the set D of finite sequences δ “ pδ1 , . . . , δm q such that each δj is a fraction of the form k{j for some positive integer k ď j. As before, we write σ „δ τ if for each j, dpσ ærnj ,nj`1 q , τ ærnj ,nj`1 q q ă δj . By Theorem 1.7, it suffices to construct Y of effective dimension 1. So instead of staying inside a tree of randoms, in this and all following constructions we stay in trees of the following type. Given a sequence t̄ of numbers in the unit interval, let Pt̄ “ tY : p@iq dimpY ærni ,ni`1 q | Y æni q ě ti u. Let Pt̄ denote the set of initial segments of Pt̄ . For this first argument, we let t̄ be 1̄, the sequence of all 1s. By Lemma 2.4 below, if Y P P1̄ , then dimpY q “ 1. The following lemma plays the role of Lemma 1.2 and Lemma 1.3. Lemma 2.2. For every ε ą 0, there is an N such that for every j ě N , σ P t0, 1unj , j2 ρ P t0, 1u , δ̄ P D, and δ “ k{j, if δ ą ε and (1) dimpρ | σq ě Hp1{2 ` ε ´ δq and (2) σ „δ τ for some τ P P1̄ , then there is a ν P P1̄ such that σρ „pδ,δq ν. Proof. The sets A and B are defined the same as in the proof of Lemma 1.3: j2 A “ tη P t0, 1u : Dτ̂ P P1̄ pτ̂ „δ̄ σ and τ̂ η P P1̄ qu, j2 and B “ tπ P t0, 1u : dpπ, Aq ě δu. Now use Harper’s Theorem to show that 2 because |A| ą 2j ´1 , we have log |B| ď Hp1{2´δqj 2. Therefore, relative to σ, codes for elements of B can be given which have length Hp1{2 ´ δqj 2 ` Opj log jq, where Opj log jq bits are used to describe δ̄. The difference Hp1{2 ` ε ´ δq ´ Hp1{2 ´ δq is bounded away from zero by a fixed amount that does not depend on δ. Therefore, there is an N large enough that codes for elements of B are shorter than Hp1{2 ` ε ´ δqj 2 , where the choice of N does not depend on δ.  In the construction itself, we define an infinite sequence pε1 , ε2 , . . . q so that εi Ñ 0 and N “ i witnesses Lemma 2.2 for εi . Then we define (1) sj “ dim pX ærnj ,nj`1 q | X ænj q and finally δj “ 1{2`εj ´H ´1 psj q`Op1{jq to obtain the sequence pδ1 , δ2 , . . . q to be used for the definition of Qj and the proof that the Qj are nonempty. This produces Y P P1̄ with X „δ̄ Y . It remains only to examine the relationship between the sj , the δj , dimpXq, and dpX, Y q for X „δ Y . The following variations on Lemma 1.4 and Lemma 1.5 are well-known. Lemma 2.3. For X, Y P 2ω , letting δi “ dpX ærni ,ni`1 q , Y ærni ,ni`1 q q, j´1 1 ÿ 2 δi i . dpX, Y q “ lim sup jÑ8 nj i“1 Proof. Since nj grows slowly enough, both are equal to lim sup dpX ænj , Y ænj q. jÑ8  DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS 9 Lemma 2.4. For X P 2ω , letting sj be defined as in (1), dimpXq “ lim inf jÑ8 j´1 1 ÿ 2 si i . nj i“1 Proof. Since nj grows slowly enough, it suffices to show Kpσq “ j´1 ÿ si i2 ` opnj q i“1 considering only σ of length nj . One direction is immediate; the other uses j applications of symmetry of information and the fact that j log j ! nj (since we condition only on X ænj and not its code, each application of symmetry of information introduces an error of up to log nj « log j.)  In our case, with X „δ Y , we have δi “ 1{2 ` εi ´ H ´1 psi q ě dpX ærni ,ni`1 q , Y ærni ,ni`1 q q. so j´1 j´1 1 ÿ 1 ÿ 2 δi i “ lim sup p1{2 ´ H ´1 psi qqi2 dpX, Y q ď lim sup jÑ8 nj i“1 jÑ8 nj i“1 because εi Ñ 0. By Lemma 2.4 and the concavity of 1{2 ´ H ´1 pxq, this is bounded by 1{2 ´ H ´1 pdimpXqq, as required. This finishes the proof of Theorem 2.1. This method can be extended to answer a question that was suggested to us by M. Soskova. Recall that a sequence X is called weakly s-random if it satisfies KpX æn q ě sn ´ Op1q. Theorem 2.5. Every sequence of effective Hausdorff dimension s is coarsely equivalent to a weakly s-random. Simply staying in a tree of s-randoms (direct generalization of Theorem 1.7) does not provide a strong enough lower bound on the number of possible extensions to use Harper’s theorem, since we now need for more than half of the possible strings of a certain length to be available at each stage. To ensure this, we instead require our constructed sequence to buffer its complexity above the level needed to be s-random. Such a strategy was not a possibility in the 1-random case. In the case of finite strings, Harper’s Theorem can be used to show, essentially, that if x is a string of dimension s, then by changing it on ε fraction of its bits, its dimension can be increased to M ps, εq :“ Hpminp1{2, H ´1 psq ` εqq. We adapt the standard method to prove the following lemma, Case 2 of which is identical to Lemma 2.2. n Lemma 2.6. For all ε, there is an N such that for all j ě N , all σ P t0, 1u j and j2 ρ P t0, 1u , all δ̄ P D, t̄ P D of length j, and all δ, if (1) pδ̄, δq P D and δ ě ε and (2) there is a τ P Pt̄ with τ „δ̄ σ, then, letting s “ dimpρ | σq and t “ M ps, δ ´ εq ` Op 1j q, there is a ν P Ppt̄,tq with ν „pδ̄,δq σρ. 10 N. GREENBERG, J.S. MILLER, A. SHEN, AND L.B. WESTRICK Proof. Like before, let 2 A “ tη P t0, 1uj : Dτ̂ „δ̄ σ pτ̂ η P Ppt̄,tq qu j2 and B “ tπ P t0, 1u : dpπ, Aq ě δu. Case 1. Suppose that 0 ď s ď Hp1{2 ´ δ ´ ε{2q. The upper bound is chosen so that t is bounded below 1 for s in this interval. Since τ exists, by considering only 2 2 extensions of it, we can bound |A| ą 2j ´ 2tj . Letting q “ M ps, δ ´ ε ` ε{4q (note this q is chosen so that t ă q ă 1), for sufficiently large j we have (2) 2 |A| ą 2j ´ V pj 2 , H ´1 pqqq, where V pn, rq is the size of a sphere of radius rn in 2n (this uses the lower bound for V pn, rq mentioned in the introduction). How large j has to be for this bound to hold depends on the size of q ´ t, which in general varies with s and δ. But since q ą t for all s, δ with ε ď δ ď 1 and s in the closed interval associated to this case, compactness allows us to bound q ´ t away from 0 by a quantity that depends only on ε. Assuming j is large enough for (2) to hold, Harper’s Theorem tells us that log |B| ď HpH ´1 pqq ´ δqj 2 “ HpH ´1 psq ´ ε ` ε{4qj 2 so B is either empty, or everything in B can be compressed (relative to σ) to length HpH ´1 psq ´ 3ε{4qj 2 ` Opj log jq, (where the Opj log jq is enough to code the parameters δ̄ and t̄ needed to define B as a c.e. set), and for large enough j the code length is less than sj 2 . How large j has to be depends on the difference s ´ HpH ´1 psq ´ 3ε{4q, but this can again be bounded in a way that depends only on ε. So for sufficiently large j, if the conditions are satisfied, then ρ R B, and the lemma holds. Case 2. Suppose that Hp1{2 ´ δ ` ε{2q ď s ď 1. Because τ exists, |A| ě 2 2j ´1 , so log |B| ď Hp1{2 ´ δqj 2 (this is true regardless of the choice of s). Either B is empty, or this allows the construction of a similar code, with the needed largeness of j determined by s ´ Hp1{2 ´ δq, which is bounded away from 0 by Hp1{2 ´ δ ` ε{2q ´ Hp1{2 ´ δq for all s ě Hp1{2 ´ δ ` ε{2q. For δ P rε, 1{2s, this bound is strictly positive, so by compactness there is a uniform lower bound depending only on ε. Choosing N large enough that j ě N works for both cases finishes the proof.  Now given an X with dimpXq “ s, define the sequence sj as in (1). Suppose also that an infinite sequence ε̄ Ñ 0 is given, decreasing slowly enough that N “ i satisfies the previous lemma for εi . Define the infinite sequence δ̄ by δi “ 2εi , and define t̄ by letting tj be M psj , δj ´εj q “ M psj , εj q rounded up to the nearest rational with denominator j. The previous lemma together with the usual compactness argument provides a sequence Y P Pt̄ with dpX, Y q “ 0 and thus dimpY q “ s. We claim that by that by appropriately slow choice of ε̄, we can guarantee that Y comes out weakly s-random. The idea is that while ε is held fixed above 0, by changing ε fraction of each new chunk, we make Y behave like a sequence of dimension strictly greater than s for as long as we like. This allows the production and maintenance of a buffer of extra complexity which is used to smooth out the bumps in our construction— the logarithmic factors from the use of the complexity of pairs formula and the possibility for a mid-chunk decrease in the complexity of Y . DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS 11 Specifically, using the complexity of pairs formula repeatedly, and considering worst case mid-chunk complexities, we have KpY ænj `k q ě j ÿ ti i2 ´ Opj log jq i“0 2 where k ă j . So Y will be s-random if we can arrange that eventually j ÿ ti i2 ´ Opj log jq ą spnj ` j 2 q, i“0 which is what the next lemma guarantees. Lemma 2.7. For any constant c and any infinite sequence s̄ P D, let s “ lim inf jÑ8 j 1 ÿ 2 si i . nj i“0 Then there is an infinite ε̄ P E with εi Ñ 0, and a constant b, such that for all j, j ÿ M psi , εi qi2 ´ cj 2 ą snj ´ b. i“0 Proof. Observe that for any fixed ε, there is a d ą 0 such that M px, εq ě d ` p1 ´ dqx. (On the closed interval r0, Hp1{2 ´ εqs, M px, εq ą x, so by compactness, on this interval M px, εq ą x ` d for some d. Outside this interval, M px, εq “ 1.) By this bound, j j ÿ ÿ si i 2 . M psi , εqi2 ě dnj ` p1 ´ dq i“1 i“0 Since s ă 1, there is a δ such that d ` p1 ´ dqps ´ δq ą s ` δ. So for large enough N , we have for each j ą N , j ÿ M psi , εqi2 ě dnj ` p1 ´ dqps ´ δqnj ą ps ` δqnj ą snj ` cj 2 . i“1 All this was done for fixed ε, so rename this N as Nε . The sequence we want is defined by letting ε0 “ 1, and then let εj “ εj´1 {2 if j ą Nεj´1 {2 , and otherwise εj “ εj´1 . The constant b is chosen to absorb any irregularity that occurs for j ď N1 .  Setting c large enough, choosing ε̄ according to Lemma 2.7, and constructing Y using ε̄ with Lemma 2.6 produces a Y which is coarsely similar to X and with KpY æn q ą sn ´ b. This completes the proof of Theorem 2.5. 3. Intermezzo: decreasing dimension In the next section, we will generalise Theorem 2.1 to increasing dimension from s to some t ă 1. Now we discuss decreasing dimension. As discussed in the introduction, in one case we can meet the following naive bound. Proposition 3.1. For any X, Y P 2ω , | dimpY q ´ dimpXq| ď HpdpX, Y qq. 12 N. GREENBERG, J.S. MILLER, A. SHEN, AND L.B. WESTRICK Proof. Let s “ dimpXq and δ “ HpdpX, Y qq. For infinitely many n we have KpY æn q ď ps ` εqn ` Hpδ ` εqn ` Oplog nq, where ε is arbitrary. The first term comes from the inequality KpX æn q ď ps ` εqn which holds infinitely often. The second term comes from a description of the symmetric difference X æn ∆Y æn , using the fact that eventually dpX æn , Y æn q ă δ ` ε to bound the number of possible symmetric differences to 2nHpδ`εq .  Therefore, if dimpY q “ 1 and dimpXq “ s, then dpX, Y q ě H ´1 p1 ´ sq. We show that in this case, the bound is tight. This will be based on the finite case: Lemma 3.2. For any string y of length n and a given radius r, there is a string x in Bpy, rq with dimpxq ď 1 ´ Hprq ` Oplog n{nq. Lemma 3.2 can be proved using tools from the Vereshchagin-Vitányi theory [VV10], which is surveyed in [VSar]. This is essentially the first part of Theorem 8 of [VSar], modified using the following facts. First, the class of Hamming balls satisfies the conditions of Theorem 8 (see [VSar, Proposition 28]). Second, if V pn, rq is the size of a Hamming ball of radius r contained in 2n , then logpV pn, rqq “ Hprqn ˘ Oplog nq (see [VSar, Remark 11]). Finally, the complexity of a Hamming ball is within Oplog nq of the complexity of its center. Another way to obtain Lemma 3.2 is by considering covering Hamming space by balls. For any n and r P p0, 1{2q, Ť let κpn, rq be the smallest cardinality of a n n set C Ď t0, 1u such that t0, 1u “ xPC Bpx, rq. Delsarte and Piret ([DP86], see [CHLL97, Thm.12.1.2]) showed that κpn, rq ă 1 ` n2n ln 2{V pn, rq, where recall from the introduction that V pn, rq is the size of the Hamming space of radius r. As mentioned above, log V pn, rq ě Hprqn ´ Oplog nq (for fixed r), whence logpκpn, rqq ď p1 ´ Hprqqn ` Oplog nq; Lemma 3.2 follows by finding a witness for κpn, rq and giving appropriately short descriptions to all the strings in that witness. Now the counterpart to Proposition 3.1 follows. Theorem 3.3. For any Y P 2ω there is some X P 2ω such that dimpXq ď s and dpX, Y q ď H ´1 p1 ´ sq. Note that if Y is random, then it must be the case that dimpXq “ s. Proof. Let δ “ H ´1 p1 ´ sq. Given any Y , we build X by initial segments. Split Y into chunks by cutting it at the locations nj as before. By Lemma 3.2, for each chunk y from Y , find a chunk x in Bpy, δq with dimpxq ď s ` Oplog n{nq, where n “ |y|, and append it to X. Then dpX, Y q ď δ, and dimpXq ď s, because each chunk satisfies these (with Op logn n q error in the latter case), and Lemma 2.3 and Lemma 2.4 apply.  On the other hand, Proposition 3.1 is not always optimal. This can be demonstrated with a simple error correcting code. Proposition 3.4. There is a sequence Y P 2ω of dimension 1{2 such that dimpXq ą 0 for all X with dpX, Y q ď H ´1 p1{2q. DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS 13 Proof. if Y is the join of a random with itself pt “ 1{2q, and if s “ 0, suppose X is such that dpX, Y q ď H ´1 p1{2q. Then Y æn can be given a description of length KpX æn q ` H ´1 p1{2qn ` n{4 ` opnq. Here the description first provides X æn . Then for each i such that Xp2iq ‰ Xp2i`1q (there are at most H ´1 p1{2qn such i), it gives Y p2iq. Then it gives a description of ´1 ti : Xp2iq “ Xp2i ` 1q ‰ Y p2iqu, a subset of n{2 which has size at most H 2p1{2q n, and therefore a description of length HpH ´1 p1{2qq n2 . Since H ´1 p1{2q ` 1{4 ă 1{2, and for all n we have KpY æn q ě n{2, we have dimpXq ą 0.  In a weaker sense, however, the bound from Proposition 3.1 is always optimal. Proposition 3.5. For all s ă t there are X, Y P 2ω with dimpXq “ s, dimpY q “ t and dpX, Y q “ H ´1 pt ´ sq. Proof. This is similar to the proof of Theorem 3.3, once we obtain the analogous finite case. Let r “ H ´1 pt ´ sq. Find a witness C for κpn, rq; then Ť find some D Ď C of log-size sn ` Oplog nq maximising the size of SpDq “ xPD Bpx, rq. Because we can guarantee to cover at least |D| |C| of the space with SpDq, we have log |SpDq| ě nt ´ Oplog nq. This gives: Lemma 3.6. There are at least 2nt nOp1q many strings y P t0, 1un which are H ´1 pt´ sq-close to a string of dimension at most s ` Oplog n{nq. Sequences X and Y as promised by Proposition 3.5 are constructed by chunks of size i2 , as above. Having defined X ænj and Y ænj , we choose xj “ X ærnj ,nj`1 q and yj “ Y ærnj ,nj`1 q so that dimpxj q ď s ` Oplog n{nq, dimpyj | Y ænj q ě t ´ Oplog n{nq (where n “ j 2 ), and dpxj , yj q ď r.  4. Dimension s sequences and dimension t sequences Finally we ask what density of changes are needed to turn a dimension s sequence into a dimension t sequence (where t ą s). By the results of this paper, it is equivalent to ask for the density of changes needed to turn a weakly s-random into a weakly t-random. Theorem 2.1 can be generalized. Recall that Bernoulli randoms show that the following bound is optimal. Theorem 4.1. For every sequence X with dimpXq “ s, and every t ą s, there is a Y with dimpY q “ t and dpX, Y q ď H ´1 ptq ´ H ´1 psq. In analogy with the proof of Theorem 2.1, in which the relative complexity of each chunk of X was raised to 1 via whatever distance was necessary, one might first consider raising the complexity of each chunk up to t. This fails because of a failure of concavity. Given an individual chunk whose relative complexity si is less than t, the density of changes needed to bring it up to t is δi “ H ´1 ptq ´ H ´1 psi q. But when si ą t, no changes are needed, so we should choose δi “ 0. However, the resulting function (mapping si to δi ) is not concave. So a tricky X could cause this strategy to use distance greater than H ´1 ptq ´ H ´1 psq. We use one of two different strategies, with the chosen strategy depending on the particular s ă t pair. The first strategy is simple: raise the complexity of each chunk as much as possible while staying within distance δ “ H ´1 ptq ´ H ´1 psq 14 N. GREENBERG, J.S. MILLER, A. SHEN, AND L.B. WESTRICK of the given chunk. This strategy clearly produces a Y with dpX, Y q ď δ, but showing that dimpY q ě t takes a little work and requires the assumption that p1 ´ sqg 1 psq ď p1 ´ tqg 1 ptq, where gptq “ H ´1 ptq. The second strategy is informed by the following reasoning. If for some j, we have dimpX ænj q « s, then we should hope to have arranged that dimpY ænj q ě t, since if we do so, then we have made the effective dimension of Y large enough. If we have achieved this for Y ænj and then X’s next chunk is relatively random, we can make Y ’s next chunk relatively random for free, so we may as well do so. This has the effect that pdimpX ænj`1 q, dimpY ænj`1 qq lies on or above the line connecting ps, tq to p1, 1q. In this case, our strategy is to use whatever density of changes are necessary to keep pdimpX ænj`1 q, dimpY ænj`1 qq on or above this line. Then it is clear that dimpY q ě t, but showing dpX, Y q ď δ requires a little work and the assumption that p1 ´ tqg 1 ptq ď p1 ´ sqg 1 psq, complementary to the assumption under which the first strategy works. Proof of Theorem 4.1. Given X, let si be defined as in (1), and define ŝj by ŝj “ j´1 1 ÿ 2 si i . nj i“1 For notational convenience, define gptq “ H ´1 ptq. Case 1. Suppose that p1 ´ sqg 1 psq ď p1 ´ tqg 1 ptq. We will construct Y P Pt̄ , where t̄ is the infinite sequence defined by ti “ M psi , δq ` Op1{iq. (The small extra factor is just to round ti up to a fraction of the form k{i.) Let εi Ñ 0 be an infinite sequence decreasing slowly enough that N “ i satisfies Lemma 2.6 for εi . Let δ̄ be defined by δi “ δ ` εi . By that lemma and the usual compactness argument, there is Y P Pt̄ with dpX, Y q ď δ. We must show that if Y P Pt̄ , then dimpY q ě t. Let rpxq “ M px, δq, so that ti ě rpsi q. By Lemma 2.4, dimpY q ě lim inf j j´1 1 ÿ rpsi qi2 . nj i“0 We would like it if rpxq were convex, so that we could conclude that if ŝj « s, řj´1 then n1j i“0 rpsi qi2 ě rpŝj q « rpsq “ t. But it is not convex, so we use a convex approximation. Let ℓpxq be the tangent line to rpxq at s. Note that since r is increasing, ℓ has positive slope. Below we will show that ℓpxq ď rpxq on r0, 1s. Assuming this, we can finish the argument. Whenever ŝj ď s, we have ℓpŝj q “ ℓpsq ˘ ε “ t ˘ ε, with ε vanishing in the limit infimum. On the other hand, if ŝj ą s, then since ℓ is increasing and each ti ě ℓpsi q, we have j´1 1 ÿ rpsi qi2 ě ℓpŝj q ą ℓpsq “ t, nj i“0 as required. It remains to show that ℓpxq ď rpxq. The proof of the following lemma is elementary but not short; here we state and use it, but delay a proof sketch to the end of the section. DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS 15 Lemma 4.2. There is a point z P p0, 1q such that rpxq is convex on p0, zq and concave on pz, 1q. We can assume t ă 1 (if t “ 1, we are covered by Theorem 2.1), so in a neighborhood of s, rpxq “ Hpgpxq ` δq. We claim that r is convex at s. Consider the slope of r at s. We have r1 pxq “ H 1 pgpxq ` δqg 1 pxq, so (using that H 1 pgpxqq “ 1{g 1 pxq) r1 psq “ H 1 pgptqqg 1 psq “ g 1 psq{g 1 ptq. By the case assumption, r1 psq is less than the slope of the line connecting ps, tq to p1, 1q. Since r1 psq is also the slope of ℓ, it follows that ℓp1q ď 1, a fact we use later. If r were concave already at s (and therefore also onwards), its graph would lie below this line for all x ą s, so we would have rpxq ă 1 for all x P ps, 1q. But when gpxq ` δ “ 1{2, rpxq “ 1, and this happens for some x P ps, 1q. Therefore, rpxq is convex at s, so s ď z. By convexity of r on p0, zq, ℓpxq ď rpxq on r0, zs. Also, ℓp1q ď 1 by the case assumption, and rp1q “ 1. Since ℓpzq ď rpzq and ℓp1q ď rp1q, and since ℓ is linear on rz, 1s while r is concave on that interval, ℓpxq ď rpxq on that interval. Therefore, ℓpxq ď rpxq on r0, 1s, completing the proof of this case. Case 2. Suppose that p1 ´ tqg 1 ptq ď p1 ´ sqg 1 psq. Let t´s 1´t x` . 1´s 1´s This is the line containing ps, tq and p1, 1q. We will construct Y P Pt̄ , where t̄ is the infinite sequence defined by ℓpxq “ ti “ ℓpsi q ` Op1{iq. (Again, the extra factor is just to round ti up to a fraction of the form k{i.) By linearity, if each psi , ti q is on or above the graph of ℓ, then ¸ ˜ j´1 j´1 1 ÿ 2 1 ÿ 2 si i , ti i nj i“1 nj i“1 is also. By Lemma 2.4, the limit infimum of the first coordinate is dimpXq, and the limit infimum of the second coordinate is a lower bound for dimpY q. So if dimpXq “ s, then dimpY q ě t as required. Considering also the density of changes, we need to find Y P Pt̄ with dpX, Y q ď gptq ´ gpsq. Let ε̄ Ñ 0 be an infinite sequence decreasing slowly enough that N “ i satisfies Lemma 2.6 for εi . Let δ̄ be defined by δi “ gpti q ´ gpsi q ` εi . Observe that M psi , δi ´ εq ` Op1{iq “ ti . This is the complexity increase guaranteed by Lemma 2.6, so by that lemma and the usual compactness argument, there is Y P Pt̄ with dpX, Y q ď lim sup j Now, letting j´1 1 ÿ 2 δi i . nj i“1 ppxq “ gpℓpxqq ´ gpxq, 16 N. GREENBERG, J.S. MILLER, A. SHEN, AND L.B. WESTRICK by the uniform continuity of g on r0, 1s, we may additionally assume that εi decreases slowly enough that |x ´ y| ă 1{i implies |gpxq ´ gpyq| ă εi , so that δi ď ppsi q ` 2εi . Since εi Ñ 0, j´1 1 ÿ ppsi qi2 . dpX, Y q ď lim sup nj i“1 j The proof of the concavity of p is elementary but not short. We just use the lemma here and give a sketch of the proof at the end of this section. Lemma 4.3. The function p is concave on r0, 1s. By the concavity of p, for each j we have j´1 1 ÿ ppsi qi2 ď ppŝj q. nj i“1 When ŝj ď s, we have ppŝj q “ ppsq ˘ ε “ δ ˘ ε, with ε vanishing in the limit supremum. But when ŝj ą s, we still need to bound ppŝj q ď δ “ ppsq. Here we use the case assumption. We claim p is decreasing on rs, 1s, because p1 pxq ď 0 is true exactly when 1´t ´ g 1 pxq ď 0, g 1 pℓpxqq 1´s which is satisfied when x “ s by assumption, and therefore satisfied for x ą s because p is concave. Therefore, ppŝj q ď δ for ŝj ą s, so dpX, Y q ď δ.  Now we sketch the lemmas about convexity and concavity used above. The proofs use only undergraduate calculus, mostly of a single variable. Proof sketch of Lemma 4.2. Given rpxq “ M px, δq, we need to show there is a z P p0, 1q such that r is convex on p0, zq and concave on pz, 1q. It suffices to consider only what happens on the interval r0, Hp1{2 ´ δqs, since r is increasing and rpxq “ 1 for x ě Hp1{2 ´ δq, continuing the concavity begun at z. For x in this interval, r2 pxq “ H 2 pgpxq ` δqpg 1 pxqq2 ` H 1 pgpxq ` δqg 2 pxq Since these functions all reference gpxq, we make the substitution y “ gpxq. Note that y P r0, 1{2 ´ δs. With this substitution, r2 pxq “ H 2 py ` δq{pH 1 pyqq2 ` H 1 py ` δqp´H 2 pyqq{pH 1 pyqq3 Multiplying by lnp2qpH 1 pyqq3 and dividing by H 2 pyqH 2 py ` δq, r2 pxq shares its sign with wpyq “ f py ` δq ´ f pyq where f pyq “ yp1 ´ yq log2 p1{y ´ 1q. When y “ 0, wpxq “ f pδq ą 0 (since δ ă 1{2). When y “ 1{2 ´ δ, wpxq “ ´f p1{2 ´ δq ă 0. (Perhaps neither r2 nor f is strictly defined in these places, but the limits exist). So to show that r2 pxq is positive on p0, zq and negative on pz, Hp1{2 ´ δqq for some z in p0, Hp1{2 ´ δqq, since g 1 pxq is positive, it suffices to show that w is strictly decreasing. Equivalently, f 1 py ` δq ´ f 1 pyq is negative; it suffices to show that f 1 pyq is strictly decreasing on p0, 1{2q; equivalently f 2 pyq is strictly negative on this interval. But f 2 pyq “ ´p1 ´ 2yq{pln 2py ´ y 2 qq ´ 2 log2 p1{y ´ 1q, which is negative, so we are done.  DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS 17 Proof sketch of Lemma 4.3. Letting ppxq “ gpℓpxqq ´ gpxq for ℓ with slope in r0, 1s, we show that p is concave. Since ℓp1q “ 1, we write ℓpxq “ ax ` 1 ´ a. We need to show p2 pxq “ g 2 pax ` 1 ´ aqa2 ´ g 2 pxq is non-positive. When a “ 1, p2 pxq ” 0, so defining kpa, xq “ g 2 pax ` 1 ´ aqa2 ´ 2 g 2 pxq, it suffices to show that Bk Ba pa, xq is non-negative for pa, xq P p0, 1s . We have Bk pa, xq “ g 3 pax ` 1 ´ aqpx ´ 1qa2 ` 2ag 2 pax ` 1 ´ aq, Ba which, with the substitution y “ gpax ` 1 ´ aq, simplifies to ` ˘ Bk pa, xq “ a g 3 pHpyqqpHpyq ´ 1q ` 2g 2 pHpyqq . Ba So it suffices to show that this function is non-negative for all y P rgp1 ´ aq, 1{2s. Expanding the computation of g 3 and g 2 , we have Bk pa, xq “ f pyq{papH 1 pyqq5 p1 ´ yq2 y 2 pln 2q2 q Ba where f pyq, which has the same sign as Bk{Ba, is ˙˙ ˆ ˆ 1 ´1 pHpyq ´ 1q f pyq “ 3 ´ pln 2qp1 ´ 2yq log2 y ˙˙2 ˆ ˆ 1 ´1 ` 2pln 2qyp1 ´ yq log2 y It suffices to show that f pyq ě 0 on rgp1 ´ aq, 1{2s. Since f p1{2q “ 0, it suffices to show that f 1 pyq ď 0. One may check that f 1 p1{2q “ 0, so it suffices to show that f 2 pyq ě 0. We have f 2 pyq “ phpyq ` yp1 ´ yqq{py 2 p1 ´ yq2 q, where hpyq “ lnp2 ´ 2yq ´ yp2 ´ 3y ` 2y 2 q lnp1{y ´ 1q. It suffices to show that hpyq ě 0. Since hp1{2q “ 0, it suffices to show that h1 pyq ď 0. One may check h1 p1{2q “ 0, so it suffices to show that h2 pyq ě 0. We have h2 pyq “ 3p1 ´ yqy lnp1{y ´ 1q ` p1 ´ 2yq ě 0, 2yp1 ´ yqp1 ´ 2yq completing the proof.  References [BDS09] Laurent Bienvenu, David Doty, and Frank Stephan. Constructive dimension and Turing degrees. Theory Comput. Syst., 45(4):740–755, 2009. [BFNV04] Harry Buhrman, Lance Fortnow, Ilan Newman, and Nikolay Vereshchagin. Increasing Kolmogorov complexity. Technical Report TR04-081, Electronic Colloquium on Computational Complexity, 2004. [CHLL97] Gérard Cohen, Iiro Honkala, Simon Litsyn, and Antoine Lobstein. Covering codes, volume 54 of North-Holland Mathematical Library. North-Holland Publishing Co., Amsterdam, 1997. [DH10] Rodney G. Downey and Denis R. Hirschfeldt. Algorithmic randomness and complexity. Theory and Applications of Computability. Springer, New York, 2010. [DP86] Philippe Delsarte and Philippe Piret. Do most binary linear codes achieve the Goblick bound on the covering radius? IEEE Trans. Inform. Theory, 32(6):826–828, 1986. [FF81] P. Frankl and Z. Füredi. A short proof for a theorem of Harper about Hamming-spheres. Discrete Mathematics, 34:311–313, 1981. 18 N. GREENBERG, J.S. MILLER, A. SHEN, AND L.B. WESTRICK [FHP` 11] Lance Fortnow, John M. Hitchcock, A. Pavan, N. V. Vinodchandran, and Fengming Wang. Extracting Kolmogorov complexity with applications to dimension zero-one laws. Inform. and Comput., 209(4):627–636, 2011. [Gác86] Péter Gács. Every sequence is reducible to a random one. Inform. and Control, 70(23):186–192, 1986. [GM11] Noam Greenberg and Joseph S. Miller. Diagonally non-recursive functions and effective Hausdorff dimension. Bull. Lond. Math. Soc., 43(4):636–654, 2011. [Har66] L. H. Harper. Optimal numberings and isoperimetric problems on graphs. J. Combinatorial Theory, 1:385–393, 1966. [JS12] Carl G. Jockusch, Jr. and Paul E. Schupp. Generic computability, Turing degrees, and asymptotic density. J. Lond. Math. Soc. (2), 85(2):472–490, 2012. [Lev73] L. A. Levin. On the notion of a random sequence. Soviet Math. Dokl., 14(5):1413–1416, 1973. [Lut00] Jack H. Lutz. Gales and the constructive dimension of individual sequences. In Automata, languages and programming (Geneva, 2000), volume 1853 of Lecture Notes in Comput. Sci., pages 902–913. Springer, Berlin, 2000. [LV93] Ming Li and Paul Vitányi. An introduction to Kolmogorov complexity and its applications. Texts and Monographs in Computer Science. Springer-Verlag, New York, 1993. [Mil11] Joseph S. Miller. Extracting information is hard: a Turing degree of non-integral effective Hausdorff dimension. Adv. Math., 226(1):373–384, 2011. [ML66] Per Martin-Löf. The definition of random sequences. Information and Control, 9:602– 619, 1966. [MM04] Wolfgang Merkle and Nenad Mihailović. On the construction of effectively random sets. J. Symbolic Logic, 69(3):862–878, 2004. [MS77] F. J. MacWilliams and N. J. A. Sloane. The theory of error-correcting codes. I. NorthHolland Publishing Co., Amsterdam-New York-Oxford, 1977. North-Holland Mathematical Library, Vol. 16. [Sch71] Claus Peter Schnorr. A unified approach to the definition of random sequences. Mathematical Systems Theory, 5(3):246–258, sep 1971. [Sch72] Claus Peter Schnorr. The process complexity and effective random tests. In Proceedings of the 4th STOC, Denver, Colorado, pages 168–176. ACM, 1972. [Sch73] C.-P. Schnorr. Process complexity and effective random tests. J. Comput. System Sci., 7:376–388, 1973. Fourth Annual ACM Symposium on the Theory of Computing (Denver, Colo., 1972). [She15] Alexander Shen. Around Kolmogorov complexity: Basic Notions and Results. In Vladimir Vovk, Harris Papadopoulos, and Alexander Gammerman, editors, Measures of Complexity. Festschrift for Alexey Chervonenkis, chapter 7, pages 75–116. Springer International Publishing, 2015. [UVS13] Vladimir A. Uspensky, Nikolai K. Vereshchagin, and Alexander Shen. Kolmogorov complexity and algorithmic randomness (Russian title: Kolmogorovskaya slozhnost i algoritmichskaya sluchainost). MCCME, 2013. [VSar] Nikolai Vereshchagin and Alexander Shen. Algorithmic statistics: forty years later. To appear. [VV10] Nikolai K. Vereshchagin and Paul M. B. Vitányi. Rate distortion and denoising of individual data using Kolmogorov complexity. IEEE Trans. Inform. Theory, 56(7):3438– 3454, 2010. DIMENSION 1 SEQUENCES ARE CLOSE TO RANDOMS 19 (N. Greenberg) School of Mathematics, Statistics and Operations Research, Victoria University of Wellington, Wellington, New Zealand E-mail address: [email protected] URL: http://homepages.mcs.vuw.ac.nz/~greenberg/ (J.S. Miller) Department of Mathematics, University of Wisconsin–Madison, 480 Lincoln Dr., Madison, WI 53706, USA E-mail address: [email protected] URL: http://www.math.wisc.edu/~jmiller/ (A. Shen) LIRMM, CNRS & University of Montpellier, 161 rue Ada, 34095, Montpellier, France. Supported by RaCAF ANR grant. E-mail address: [email protected] URL: http://www.lirmm.fr/~ashen (L.B. Westrick) Department of Mathematics, University of Connecticut, 341 Mansfield Rd U-1009, Storrs, CT 06269, USA E-mail address: [email protected] URL: http://www.math.uconn.edu/~westrick/
7cs.IT
Robust Low-Rank Matrix Estimation arXiv:1603.09071v4 [math.ST] 24 Jul 2017 Andreas Elsener and Sara van de Geer Seminar for Statistics ETH Zurich 8092 Zurich Switzerland e-mail: [email protected] e-mail: [email protected] Abstract: Many results have been proved for various nuclear norm penalized estimators of the uniform sampling matrix completion problem. However, most of these estimators are not robust: in most of the cases the quadratic loss function and its modifications are used. We consider robust nuclear norm penalized estimators using two well-known robust loss functions: the absolute value loss and the Huber loss. Under several conditions on the sparsity of the problem (i.e. the rank of the parameter matrix) and on the regularity of the risk function sharp and non-sharp oracle inequalities for these estimators are shown to hold with high probability. As a consequence, the asymptotic behavior of the estimators is derived. Similar error bounds are obtained under the assumption of weak sparsity, i.e. the case where the matrix is assumed to be only approximately low-rank. In all our results we consider a high-dimensional setting. In this case, this means that we assume n ≤ pq. Finally, various simulations confirm our theoretical results. MSC 2010 subject classifications: Primary 62J05, 62F30; secondary 62H12. Keywords and phrases: Matrix completion, robustness, empirical risk minimization, oracle inequality, nuclear norm, sparsity. 1. Introduction 1.1. Background and Motivation Netflix, Spotify, Apple Music, Amazon and many other on-line services offer an almost infinite amount of songs or films to their users. Clearly, a single person will never be able to watch every film or to listen to every available song. For this reason, an elaborate recommendation system is necessary in order to allow the users to choose content that already match his or her preferences. Many models and estimation methods have been proposed to address this question. Matrices provide an appropriate way of modelling this problem. Imagine that the plethora of films/songs is identified with the rows of a matrix, call it B ∗ , and the users with its columns. One entry of the matrix corresponds to the rating given to film “i” (row) by user “j” (column). This matrix will have many missing entries. These entries are bounded and we can expect the rows of B ∗ to be very similar to each other. It is therefore sensible to assume that B ∗ has a low rank. The challenge is now to predict the missing ratings/fill in the empty 1 Elsener and van de Geer/Robust Low-Rank Matrix Estimation 2 entries of B ∗ . Define for this purpose the set of observed (possibly noisy) entries A := {(i, j) ∈ {1, . . . , p} × {1, . . . , q} : the (noisy) entry (1.1) ∗ Aij of B is observed} , where p is the number of films/songs and q the number of users. Our estimation problem can therefore be stated in the following way: for B ∈ B ⊂ Rp×q we minimize Rn (B), subject to rank(B) = s. In this special case we have that  B = B ∈ Rp×q |kBk∞ ≤ η , (1.2) where η is for instance the mean highest rating, and Rn is some convex empirical error measure that is defined by the data, e.g. Rn (B) = 1 X (Aij − Bi,j )2 . |A| (1.3) (i,j)∈A Since the rank of a matrix is not convex we use the nuclear norm as its convex surrogate. This leads us to a relaxed convex optimization problem. For B ∈ B we minimize Rn (B), subject to kBknuclear ≤ τ, for some τ > 0. The model described above can be considered as a special case of the trace regression model. In the trace regression model (see e.g. Rohde and Tsybakov (2011)) one considers the observations (Xi , Yi ) satisfying Yi = trace(Xi B ∗ ) + εi , i = 1, . . . , n, (1.4) where εi are i.i.d. random errors. The matrices Xi are so-called masks. They are assumed to lie in  χ = ek (q)el (p)T : 1 ≤ k ≤ q, 1 ≤ l ≤ p , (1.5) where ek (q) is the q-dimensional k-th unit vector and el (p) is the p-dimensional l-th unit vector. We will assume that the Xi are i.i.d. with   1 P Xikj = 1 = 1 − P Xikj = 0 = pq for all i ∈ {1, . . . , n}, k ∈ {1, . . . q}, and j ∈ {1, . . . , p}. However, we point out that it is not necessary for our estimators to know this distribution. This knowledge will only be used in the proofs of the theoretical results. The trace regression model together with the space χ and the distribution on χ is equivalent to the matrix completion case. The entries of the vector Y can be identified with the observed entries as those in the matrix A. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 3 From this, it can be seen that we are in a high-dimensional setting since the number of observations n must be smaller than or equal to the total number of entries of A. The setup described above is then called uniform sampling matrix completion. A very similar setup was first considered in Srebro, Rennie and Jaakkola (2005) and Srebro and Shraibman (2005). As in the standard regression setting, parameter estimation in the trace regression model is also done via empirical risk minimization. Using the Lagrangian form for B ∈ B we minimize Rn (B) + λkBknuclear , Pn where Rn (B) = 1/n i=1 ρ(Yi − trace(Xi B)), ρ is a convex loss function and λ > 0 is the tuning parameter. The loss function is often chosen to be the quadratic loss (or one of its modifications) as in Koltchinskii, Lounici and Tsybakov (2011); Negahban and Wainwright (2011, 2012); Rohde and Tsybakov (2011) and many others. In Lafond (2015) the case of an error distribution belonging to an exponential family is considered. As long as the errors are assumed to be light tailed as it is the case for i.i.d. Gaussian errors the least squares estimator will perform very well. However, the ratings are heavily subject to frauds (e.g. by the producer of a film). It is necessary to take this fact into account also in the estimation procedure. One might also be interested in estimating the median or another quantile of the ratings. For this purpose, M-estimators based on different losses than the quadratic loss are usually chosen. 1.2. Proposed estimators In this paper, we consider the absolute value loss and the Huber loss. The first robust estimator is then given by n B̂ := arg min B∈B 1X |Yi − trace (Xi B)| + λ kBknuclear . n i=1 (1.6) Using the Huber loss we can define n B̂H := arg min B∈B 1X ρH (Yi − trace (Xi B)) + λ kBknuclear , n i=1 (1.7) where the function  ρH (x) := x2 , if |x| ≤ κ 2κ |x| − κ2 , if |x| > κ defines the Huber loss function. The tuning parameter κ > 0 is assumed to be given for our estimation problem. The possible values for the Huber parameter κ depend on the distribution of the errors as shown in Lemma 2.1. In practice, one usually estimates κ and λ with methods such as cross-validation. Notice that it could happen that the estimators defined in Equations 1.6 and 1.7 are Elsener and van de Geer/Robust Low-Rank Matrix Estimation 4 not unique since the objective functions are not strictly convex. As will be shown, the rates depend on the Lipschitz constants of the loss functions and on η. Typically, the Lipschitz constants of the absolute value loss as well as of the Huber loss induce smaller constants in the rates compared to the Lipschitz constant of the truncated quadratic loss. The “target” is defined as B 0 := arg min R(B), B∈B where R(B) = ERn (B) is the theoretical risk. It has to be noticed that the matrix B 0 is not necessarily equal to the matrix B ∗ . Our main interest lies in the theoretical analysis of the above estimators. The estimators should mimic the sparsity behavior of an oracle B. In the case of the absolute value loss we will prove a non-sharp oracle inequality. Whereas for the Huber loss, thanks to its differentiability, we are able to derive a sharp oracle inequality. Assuming B = B 0 in Corollary 3.1 the upper bound is typically of the form R(B̂H ) − R(B 0 ) . λ2 pqs0 , (1.8) where . means that some multiplicative constants (depending on the tuning parameter κ) are omitted. The assumptions for this kind of results are mainly based on the regularity of the absolute value and the Huber loss. Moreover, the properties of the nuclear norm, which are very similar to those of the `1 -norm for vectors, will be exploited. In addition, we use the sparsity behavior induced by the nuclear norm to infer the behavior of weakly sparse estimators. This takes into account that a matrix could have few very large singular values and many small, but not exactly zero singular values:   q   X B ∈ B0 ∈ B : Λrj ≤ ρrr , Λ1 , . . . , Λq the singular values of B 0 ,   j=1 where 0 < r < 1 and ρrr is some reasonably small constant. 1.3. Related Literature A first study with robust matrix estimation was made in Chandrasekaran et al. (2011) in a setting with no missing entries. In order to avoid identifiability issues the authors introduce “incoherence” conditions on the low-rank component. These conditions make sure that the low-rank component itself is not too sparse. The locations of the corruptions are assumed to be fixed. In the context of Principal Component Analysis (PCA) which is a special case of the matrix regression model robustness was investigated in Candès et al. (2011). The authors assume that the matrix to be estimated is decomposed in a low-rank matrix and a sparse matrix. In contrast to Chandrasekaran et al. (2011) the non-zero entries Elsener and van de Geer/Robust Low-Rank Matrix Estimation 5 of the sparse matrix are assumed to be drawn randomly following a uniform distribution. Following this line of research Li (2011) apply these conditions to the matrix completion problem with randomly observed entries. In a parallel work Chen et al. (2013) consider the case where the indices of the observed entries may be simultaneously both random and deterministic. In these papers only noiseless robust matrix completion is considered. Cambier and Absil (2016) study computational aspects of robust matrix completion (in the previously mentioned setting). A method relying on Riemannian optimization is proposed. The authors assume the rank of the matrix to be estimated to be known. In Foygel et al. (2011) weighted nuclear norm penalized estimators with (possibly nonconvex) Lipschitz continuous loss functions are studied from a learning point of view. The partially observed entries are assumed to follow a possibly non-uniform distribution on the set χ. In contrast, our derivations rely among other properties on the convexity of the risk (i.e. the margin conditions). Noisy robust matrix completion was first investigated in Klopp, Lounici and Tsybakov (2016). The authors assume that the truth A∗ is decomposed in a low-rank matrix and a sparse matrix where the low-rank matrix contains the “parameters of interest” and the sparse matrix contains the corruptions. In addition, every observation is corrupted by independent and centered subgaussian noise. The largest entries of both the low-rank and sparse matrices are assumed to be bounded (e.g. by the maximal possible rating). Their model is as follows: (Xi , Ỹi ), i = 1, . . . N satisfy Ỹi = trace(Xi A∗ ) + ξi , i = 1, . . . , N, (1.9) where A∗ = L∗ + S ∗ with L∗ a low-rank matrix and S ∗ a matrix with entrywise sparsity. Columnwise sparsity is also considered but in view of a comparison of this and our approach we prefer to restrict to entrywise sparsity. The masks Xi are assumed to lie in the set χ (1.5) and to be independent of the noise ξi for all i. The set of observed indices is assumed to be the union of two disjoint components Ξ and Ξ̃. The set Ξ corresponds to the non-corrupted noisy observations (i.e. only entries of L∗ plus ξi ). The entries corresponding to these observations of S ∗ are zero. The set Ξ̃ contains the indices of the observations that are corrupted by a (nonzero) entry of S ∗ . It is not known if an observation comes from Ξ or Ξ̃. The estimator given in Klopp, Lounici and Tsybakov (2016) is ( (L̂, Ŝ) ∈ arg min kLk∞ ≤η kSk∞ ≤η N 1 X (Ỹi − trace(Xi (L + S)))2 + λ1 kLknuclear + λ2 kSk1 N i=1 ) . (1.10) In contrast to the previously mentioned papers on robust matrix completion, we consider (possibly heavy-tailed) random errors that affect the observations but not the truth. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 6 1.4. Organization of the paper The paper is organized in the following way. We state the main assumptions that are used throughout the paper in Section 2. Then, the nuclear norm, its properties, and its similarities to the `1 -norm are discussed. To bound the empirical process part resulting from the matrix completion setting we make use of the results in Section B.3 of the Supplementary Material (Appendix B). In Section 3 the main theorems are presented: the (deterministic) sharp and nonsharp oracle inequalities. In Section 3.3 we present the applications of these results to the case of Huber loss and absolute value loss. The asymptotics and the applications to weak sparsity are presented in Section 4. Finally, to verify the theoretical findings, Section 5 presents some simulations. The Student t distribution with three degrees of freedom is considered as an error distribution. 2. Preliminaries In this section the assumptions on the loss functions, the risk, and the distribution of the errors are presented. In particular, Assumptions 1-3 below are on the curvature of the (theoretical) risk. They are used to derive the deterministic sharp and non-sharp oracle inequalities. It is important to notice that the curvature of the risk mainly depends on the properties of the distribution of the errors. Assumptions 4 and 5 below will be shown to be sufficient for Assumptions 2 and 3 to hold, respectively. Furthermore, we also discuss the properties of the nuclear norm. Thanks to the penalization term in the objective functions the optimization problems become computationally tractable. We also highlight the commonalities of the vector `1 -norm and the nuclear norm for matrices. 2.1. Assumptions on the risk and the distribution of the errors The first assumption is about the loss function. Assumption 1. Let ρ be the loss function. We assume that it is Lipschitz continuous with constant L, i.e. that for all x, y ∈ R |ρ(x) − ρ(y)| ≤ L|x − y|. (2.1) The next two assumptions ensure the identifiability of the parameters by requiring a sufficient convexity of the risk around the target. Assumption 2. One-point-margin condition. There is an increasing strictly convex function G with G(0) = 0 such that for all B ∈ B   R (B) − R B 0 ≥ G kB − B 0 kF , where R is the theoretical risk function. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 7 Assumption 3. Two-point-margin condition. There is an increasing strictly convex function G with G(0) = 0 such that for all B, B 0 ∈ B we have   T R (B) − R (B 0 ) ≥ trace Ṙ (B 0 ) (B − B 0 ) + G (kB − B 0 kF ) , where R is the theoretical risk function and [Ṙ(B 0 )]kl = ∂ 0 ∂Bkl R(B)|B=B . Assumption 1 is crucial when it comes to the application of the Contraction Theorem which in turn allows us to apply the dual norm inequality to find a bound for the random part of the oracle bounds. Assumptions 2 and 3 are essential in the proofs of the (deterministic) results. In particular, in addition to the differentiability of the empirical risk Rn , Assumption 3 is responsible for the sharpness of the first oracle bound that will be proved. The margin conditions are strongly related to the shape of the distribution function and the corresponding density of the errors. For the specific application to the Huber loss and absolute value loss estimators we show that mild conditions on the distribution of the errors ensure a sufficient curvature of the risk for both loss functions under study. Assumption 3 holds under a weak condition on the distribution function of the errors: Assumption 4. Assume that there exists a constant C1 > 0 such that the distribution function F with density with respect to Lebesgue measure f of the errors fulfills F (u + κ) − F (u − κ) ≥ 1/C12 , for all |u| ≤ 2η and κ ≤ 2η. (2.2) Lemma 2.1. Assumption 4 implies Assumption 3 with G(u) = u2 /(2C12 pq). The following assumption guarantees that Assumption 2 holds. Assumption 5. Suppose ε1 , . . . , εn are i.i.d. with median zero and density f with respect to Lebesgue measure. Assume that for C2 > 0 f (u) ≥ 1 , for all |u| ≤ 2η. C22 (2.3) Lemma 2.2. Assumption 5 implies Assumption 2 with G(u) = u2 /(2C22 pq). Another important fact is that when the distribution of the errors is assumed to be symmetric around zero B ∗ = B 0 . This phenomenon is discussed in Section 4 of the Supplement. 2.2. Properties of the nuclear norm The regularization by the nuclear norm plays a similar role as the `1 -norm in the Lasso (Tibshirani, 1996). We illustrate the similarities and differences of these types of regularizations. In view of the oracle inequalities and in order to keep the notation as simple as possible we discuss the properties of the nuclear norm Elsener and van de Geer/Robust Low-Rank Matrix Estimation 8 of the oracle. The oracle is typically a value B that takes an up-to-constants optimal trade-off between approximation error and estimation error. In what follows, B is called “the oracle” although its choice is flexible. Consider the singular value decomposition of the oracle B with rank s? given by B = P ΛQT , (2.4) where P is a p × q matrix, Q a q × p matrix and Λ a q × q diagonal matrix containing the ordered singular values Λ1 ≥ · · · ≥ Λq . Then the nuclear norm is given by q X kBknuclear = Λi (B) = kΛ(B)k1 , (2.5) i=1 by interpreting Λ(B) ∈ Rq as the vector of singular values. The penalization with the nuclear norm induces sparsity in the singular values, whereas the penalization with the vector `1 -norm of the parameters in linear regression induces sparsity directly in the parameters. On the other hand, the rank plays the role of the number of non-zero coefficients in the Lasso setting, namely s? = kΛ(B)k0 . (2.6) One main ingredient of the proofs of the oracle inequalities is the so-called triangle property as introduced in van de Geer (2001). This property was used in e.g. Bühlmann and van de Geer (2011) to prove non-sharp oracle inequalities. For the `1 -norm the triangle property follows from its decomposability. For the nuclear norm the triangle property as it is used in this work depends on the features of the oracle B. For this reason we notice that for any positive integer s ≤ q the oracle can be decomposed in B = B+ + B−, B+ = s X Λk Pk QTk , B− = k=1 q X Λk Pk QTk . k=s+1 The matrix B is called “active” part of the oracle B, whereas the matrix B − is called the “non-active” part. The singular value decomposition of B + is given by T B + = P + ΛQ+ . + We observe that the integer s is not necessarily the rank of the oracle B. The choice of s is free. One may choose a value that trades off the roles of the “active” part B + and “non-active” part B − , see Lemma 4.1. The following lemma is adapted from Lemma 7.2 and Lemma 12.5 in van de Geer (2016). Lemma 2.3. Let B + ∈ Rp×q be the active part of the oracle B. Then we have for all B 0 ∈ Rp×q with  √  + +T 0 T T T 0 s P P B + B 0 Q+ Q+ + P + P + B 0 Q+ Q+ Ω+ B + (B ) := F F and 0 Ω− B + (B ) :=  T I − P +P +    T B 0 I − Q+ Q+ nuclear F Elsener and van de Geer/Robust Low-Rank Matrix Estimation 9 that  0 + 0 B + nuclear − kB 0 knuclear ≤ Ω+ − Ω− B+ B − B B + (B ) . We then say that the triangle property holds at B + . − 0 p×q In particular, since Ω+ B + (B ) = 0, we have for any B ∈ R (2.7) − 0 0 − kBknuclear − kB 0 knuclear ≤ Ω+ B + (B − B) − ΩB + (B − B) + 2 B nuclear . (2.8) Moreover, we have − k·knuclear ≤ Ω+ (2.9) B + + ΩB + . − − From now on, we write Ω+ = Ω+ B + and Ω = ΩB + . Equation 2.8 is proved in Appendix A. Hence, the property that our estimators should mimic is not the rank of the oracle but rather the fact that the “non-active” part is zero under the semi-norm induced by the active part. Moreover, we define the norm Ω as Ω := Ω+ + Ω− . Remark 1. Notice that the semi-norms Ω+ and Ω− form a complete pair, meaning that Ω := Ω+ + Ω− is a norm. The estimation error in several different norms can thus be “computed” in general (semi-)norms. A tail bound for the maximal singular value of a finite sum of matrices lying in the set χ defined in Equation (1.5) is given in the following theorem. For this purpose, we first need to define the Orlicz norm of a random variable. Let Z ∈ R be a random variable and α ≥ 1 a constant. Then the Ψα −Orlicz norm is defined as α (2.10) kZkΨα := inf {c > 0 : E exp [|Z| /cα ] ≤ 2} Theorem 2.1 ( Proposition 2 in Koltchinskii, Lounici and Tsybakov (2011) ). Let X1 , . . . , Xn be i.i.d. q × p matrices that satisfy for some α ≥ 1 (and all i) EXi = 0, kΛmax (Xi )kΨα =: K < ∞. Define ( 2 S := max Λmax n X i=1 ! EXi XiT /n, Λmax n X ! EXiT Xi ) /n . i=1 Then for a constant C and for all t > 0 ! r n X t + log(p + q) P Λmax Xi /n ≥ CS n i=1    K t + log(p + q) +C log1/α ≤ exp(−t). S n This theorem is used with the tail summation property of the expectation in the derivations of the tail bounds in Section 3 of the Supplementary Material. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 10 3. Oracle inequalities We first give two deterministic sharp and non-sharp oracle inequalities. The connection to the empirical process parts and to the specific loss functions follows in Subsection 3.3. Let B 0 = arg min R(B 0 ) be the target. It is assumed that B 0 ∈B q ≤ p. 3.1. Sharp oracle inequality Here, we assume that the loss function is differentiable and Lipschitz continuous. The next lemma gives a connection between the empirical risk and the penalization term. Lemma 3.1 (adapted from Lemma 7.1 in van de Geer (2016)). Suppose that Rn is differentiable. Then for all B ∈ B   − trace Ṙn (B̂)T (B − B̂) ≤ λkBknuclear − λkB̂knuclear . The following theorem is inspired by Theorem 7.1 in van de Geer (2016). In contrast to this theorem, we need to bound the empirical process part differently. In view of the application to the matrix completion problem, we assume a specific bound on the empirical process. Theorem 3.1. Suppose that Assumptions 1 and 3 hold, that the loss function is differentiable, and let H be the convex conjugate of G. Assume further for all B 0 ∈ B that for λε > 0 and λ∗ > 0   T trace Ṙn (B 0 ) − Ṙ (B 0 ) (B − B 0 ) ≤ λε Ω(B 0 − B) + λ∗ . Take λ > λε . Let 0 ≤ δ < 1 be arbitrary, and define λ := λ − λε , λ := λε + λ + δλ Then δλΩ+ (B̂ − B) + δλΩ− (B̂ − B) + R(B̂) − R(B) √ ≤ H(λ3 s) + 2λ B − nuclear + λ∗ . In the proof of this theorem the differentiability of the loss function and Assumption 3 are crucial. Without this property an additional term arising from the one-point-margin condition would appear in the upper bound. This term would then lead to a non-sharp bound. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 11 3.2. Non-sharp oracle inequality Instead of bounding an empirical process term depending on the derivative of the empirical and theoretical risks we need to consider differences of these functions. Theorem 3.2. Suppose that Assumptions 1 and 2 hold. Let H be the convex conjugate of G. Suppose further that for λε > 0, λ∗ > 0, and all B 0 ∈ B |[Rn (B 0 ) − R(B 0 )] − [Rn (B) − R(B)]| ≤ λε Ω(B 0 − B) + λ∗ . (3.1) Let 0 < δ < 1, take λ > λε and define λ = λ + λε , λ = λ − λε . (3.2) Then, √ δλΩ(B̂ − B) ≤ 2H(λ(1 + δ)3 s)  + 2 λ∗ + (R(B) − R(B 0 )) + 4λkB − knuclear and R(B̂) − R(B) ≤ √ 1 2H(λ(1 + δ)3 s) + λ∗ + 2(R(B) − R(B 0 )) δ  +2λkB − knuclear + λ∗ + 2λkB − knuclear . It has to be noticed that the above bound is “good” only if R(B) − R(B 0 ) is already small. The main cause for the non-sharpness is Assumption 2 that leads to an additional term in the upper bound of the inequality. 3.3. Applications to specific loss functions We now apply the deterministic sharp and non-sharp oracle inequalities to the case of the Huber loss and absolute value loss, respectively. We assume in both cases that the distribution of the errors is symmetric around 0 so that B 0 = B ∗ . This is discussed in detail in Section B.4. Huber Loss-sharp oracle inequality We first consider the case that arises by choosing the Huber loss. Theorem 3.1 together with Lemma 2.1 and the first claim of Lemma 3.2 in the Supplement imply the following corollary. It is useful to notice that the Lipschitz constant of the Huber loss is 2κ. Corollary 3.1. Let B = B + + B − where B + and B − are defined in Equation 2.4. Let Assumption 4 be satisfied. For a constant C0 > 0 let s ! p √ log(p + q) log(p + q) λε = 2(4η + 2κ) (8C0 + 2) + 8C0 log(1 + q) nq n Elsener and van de Geer/Robust Low-Rank Matrix Estimation 12 and λ∗ = 8η(4η + 2κ)p log(p + q)/(3n) + λε . Assume that λ > λε . Take 0 ≤ δ < 1, λ := λ − λε and λ := λε + λ + δλ √ Choose j0 := dlog2 (7q pqη)e and define (3.3) α = (j0 + 2) exp(−p log(p + q)). Then we have with probability at least 1 − α that δλΩ+ (B̂H − B) + δλΩ− (B̂H − B) + R(B̂H ) − R(B) pqC12 λ̄2 9s + 2λ B − nuclear + λ∗ . 2 Assumption 4 guarantees that the risk function is sufficiently convex. From this assumption we also obtain a bound for the possible values of the tuning parameter κ. We can also see that the results hold for errors with a heavier tail than the Gaussian. The choice of the noise level λε and consequently of the tuning parameter λ results from the the probability inequalities for the empirical process in Section B.3. The quantity λ∗ is also a consequence of the bound on the empirical process part. However, it does not affect the asymptotic rates. ≤ Absolute value loss - non-sharp oracle inequality The next corollary is an application to the case of the absolute value loss. Theorem 3.2 combined with Lemma 2.2 and the second claim of Lemma 3.2 in the Supplement lead to the following corollary. The Lipschitz constant in this case is 1. Corollary 3.2. Let the oracle B be as in 2.4. Suppose that Assumption 5 is satisfied. For a constant C0 > 0 let s ! p √ log(p + q) log(p + q) λε = 2 (8C0 + 2) + 8C0 log(1 + q) nq n and λ∗ = 8ηp log(p + q)/(3n) + λε . Take 0 < δ < 1 and λ > λε . Choose √ j0 := dlog2 (7q pqη)e and define α = (j0 + 2) exp(−p log(p + q)). Then we have with probability at least 1 − α that δλΩ(B̂ − B) 2 2 ≤ 6C 2 λ (1 + δ) pqs + 2λ∗ + 2(R(B) − R(B 0 )) + 4λkB − knuclear and R(B̂) − R(B) ≤ 1h 2 2 2 6C2 λ (1 + δ) pqs + λ∗ + 2(R(B) − R(B 0 )) δ i + 2λkB − knuclear + λ∗ + 2λkB − knuclear . Elsener and van de Geer/Robust Low-Rank Matrix Estimation 13 Also in this case, the choices of λε and λ∗ are a consequence of the probability bounds. 4. Asymptotics and Weak sparsity The results in Section 3 are valid for finite values of the dimension of the matrix p, q, the rank, and the number of observed entries n. A question that is answered in this section is how the estimation errors of the proposed estimators behave when n, p, and q are allowed to grow. As mentioned in Negahban and Wainwright (2012), practical reasons motivate the assumption that the matrix B 0 is not exactly low-rank but only approximately. In relation to the matrix completion problem one observes that the ratings given by the users are unlikely to be exactly equal but rather very similar. This translates to a matrix that is not low-rank. However, it is sensible to assume that the matrix is almost low-rank. The notion of weak sparsity quantifies this assumption by assuming that for some 0 < r < 1 and ρ > 0 q X Λ0k r =: ρrr , (4.1) k=1 where Λ01 , . . . , Λ0q are the singular values of B 0 . For r = 0 we have under the convention that 00 = 0 that q q X 0 X Λ0k = 1{Λ0 >0} = s0 , k k=1 k=1 where s0 is the rank of B 0 . The following lemma gives a bound of the non-active part of the matrix B that appears in the oracle bounds. Lemma 4.1. For σ > 0 we may take B − nuclear ≤ σ 1−r ρrr , (4.2) and s ≤ σ −r ρrr . We first consider the asymptotic behavior of our estimators in the case of an exactly low-rank matrix and deduce from this the asymptotics for the case of an approximately low-rank matrix. 4.1. Asymptotics 4.1.1. sharp   n , and therefore using By Corollary 3.1, assuming that q log(1 + q) = o log(p+q) the choice for the noise level s log(p + q) λε  nq Elsener and van de Geer/Robust Low-Rank Matrix Estimation 14 we obtain R(B̂H ) − R(B 0 ) ≤ R(B) − R(B 0 ) + OP ps log(p + q) + n s !  log(p + q) 1 + B − nuclear . nq (4.3) We choose for simplicity the oracle to be the matrix B 0 itself with s0 = rank(B 0 ). Then, we make use of the two point margin condition that is shown to hold in Lemma 2.1.The resulting rate is then given by   2 0 2 2 4 p qs0 log(p + q) kB̂H − B kF = OP (4η + 2κ) C1 , (4.4) n where κ is the Huber parameter and C1 is the constant from Lemma 2.1. Remark 2. The rate (4.4) depends on η as in Koltchinskii, Lounici and Tsybakov (2011) and on the Lipschitz constant of the loss function which is typically smaller than η. If C12 = O(η), the constant in front of the rate is of order O(η 4 ). This is a “worst-case” scenario that shows the cost that is paid when allowing for very general error distributions as in our case. We emphasize that in this case the distribution of the errors is not required to have a density. In addition to the rate obtained for the Frobenius norm, we are also able to derive rates for the estimation error measured in nuclear norm. From Corollary 3.1 and Equation 2.9 under the previous conditions it follows that s ! log(p + q) 0 2 . (4.5) kB̂H − B knuclear = OP C1 pqs0 nq 4.1.2. non-sharp By Corollary  3.2  it is known that the assumption p n q log(1 + q) = o log(p+q) leads to the choice λε  log(p + q)/nq. Therefore, we have R(B̂) − R(B 0 ) = OP  ps log(p + q) + R (B) − R B 0 + n s ! log(p + q) − (1 + B nuclear ) . nq (4.6) What can be observed comparing the rates in Equations (4.3) and (4.6) is the presence of the additional term R(B) − R(B 0 ) in the non-sharp case in contrast to the sharp case. We choose again the oracle to be the matrix B 0 itself. By Elsener and van de Geer/Robust Low-Rank Matrix Estimation 15 the one point margin condition derived in Lemma 2.2 we see that the rate of convergence in this case is given by   2 0 2 4 p qs0 log(p + q) kB̂ − B kF = OP C2 , (4.7) n where the constant C2 comes from Lemma 2.2. Remark 3. If C22 = O(η) a comparison with the rates obtained in Koltchinskii, Lounici and Tsybakov (2011) shows that the rates agree. In contrast to the rate obatined for the Huber loss (Equation 4.4), the distribution of the errors is assumed to have a density. This leads to a constant of order O(η 2 ) in a “worst-case” scenario. It is a natural consequence of the stronger assumption on the distribution of the errors. This is comparable to the constant obtained in Koltchinskii, Lounici and Tsybakov (2011). In analogy to the previous case, we are able to derive a rate for the estimation error measured in nuclear norm: s ! log(p + q) 0 2 . (4.8) kB̂ − B knuclear = OP C2 pqs0 nq The rates are indeed very slow but this is not surprising given that per entry the number of observations is about n/(pq). The price to pay for the estimation of the reduced number of parameters ps0 is given by the term log(p + q). 4.2. Weak sparsity In what follows, the asymptotic behavior of the proposed estimators is discussed when applied to an estimation problem where one aims at estimating a matrix that is not exactly low-rank. With Lemma 4.1 and the rates given in the previous section we are able to derive an explicit rate also for the approximatley low-rank case. For this purpose, we assume that Equation 4.1 holds. 4.2.1. Huber estimator The following corollary gives rates for the estimation error of the Huber estimator when used for estimation of a not exactly low-rank matrix.   n Corollary 4.1. With q log(1 + q) = o log(p+q) we choose s λε  log(p + q) . nq We then have B̂H − B 0 2 F  1−r 2 2 4 p q log(p + q) ρrr . = OP (η + κ) C1 n Elsener and van de Geer/Robust Low-Rank Matrix Estimation 16 4.2.2. Absolute value estimator Using the oracle inequality under the weak sparsity assumption we obtain the following result.   n we choose Corollary 4.2. With q log(1 + q) = o log(p+q) s λε  log(p + q) . nq Then we have for the Frobenius norm of the estimation error  2 1−r 2 p q log(p + q) = OP B̂ − B 0 ρrr . n F (4.9) 5. Simulations In this section, the robustness of the Huber estimator 1.7 is empirically demonstrated. In Subsection 5.3, the Huber estimator is compared with the estimator proposed in Klopp, Lounici and Tsybakov (2016) under model 1.4 and 1.9 with each Student t and standard Gaussian noise. The sample size ranges in all simulations for all dimensions considered here from 3p log(p)s0 to pq. Between minimal and maximal sample size there are in each case 10 points. To illustrate the rate derived in Section 4 we compute the error kB̂H − B 0 k2F for different dimensions of the problem under increasing number of observations. To compute the solution of the optimization problem 1.7 functions from the Matlab library cvx (CVX Research, 2012) were used. Throughout this section the error is assumed to have the following shape 1 Error = B̂H − B 0 pq 2 F p q 2 1 XX 0 = B̂Hij − Bij . pq i=1 j=1 (5.1) To verify the robustness of the estimator 1.7 and the rate of convergence that was derived in Section 4 we use the Student t distribution with 3 degrees of freedom. Every point in the plots corresponds to an average of 25 simulations. The value of the tuning parameter is set to s log(p + q) . λ=2 nq A comparison with λε from Corollary 3.1 indicates that λ is rather small. For the settings we consider in this section we found that this value for λ is more appropriate. As done in Candès and Plan (2010), for a better comparison between the error curves of our estimator and the oracle rate in Equation (4.4) this rate was multiplied with 1.68 in the case of Student t distributed errors and with 1.1 in the case of Gaussian errors. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 17 5.1. t-distributed and gaussian errors The variance of the Student t distribution with ν > 2 degrees of freedom is given by ν Var (εi ) = , for εi ∼ tν . (5.2) ν−2 Figure 1a shows a comparison between the Huber estimator 1.7 with the estimator that uses the quadratic loss in the case of Student t with 3 degrees of freedom distributed errors. As expected, the estimator that uses the quadratic loss is not robust against the corrupted entries. On the other hand, we can see in Figure 1b that the Huber estimator performs almost as well as the quadratic loss estimator in the case of Gaussian errors with variance 1. In agreement with the theory, the rate of the estimator is very close to the oracle rate for sufficiently large sample sizes. The value of κ that we used in the simulations is 1.345. The maximal rating η is chosen to be η = 10. (a) (b) Fig 1: Comparison of the Huber and quadratic loss in the case of Student t distributed (left figure) and Gaussian errors (right figure). We choose p = q = 80 and s0 = 2. The dot-dashed red line corresponds to 1.68 multiplied with the oracle bound derived in Equation 4.4 for the exact low-rank case. 5.2. Changing the problem size In order to confirm/verify the theoretical results, we proceed similarly to what was done in Negahban and Wainwright (2011) and Negahban and Wainwright (2012) in the corresponding cases. Here, we consider three different problem sizes: p, q ∈ {30, 50, 80}. In Figure 2a we observe that as the problem gets harder, i.e. as the dimension of the matrix increases, also the sample size needs to be larger. Figure 2b shows that by rescaling the sample size by n/(3ps0 log(p)) Elsener and van de Geer/Robust Low-Rank Matrix Estimation 18 the rate of convergence agrees very well with the theoretical one. It is assumed that the rank of the matrices is s0 = 2 for all cases. Every point corresponds to an average of 25 simulations. The maximal rating η and the tuning parameter κ are chosen as before. (a) (b) Fig 2: Three different problem sizes are considered: p = q ∈ {30, 50, 80}. The rank is fixed to s0 = 2 in both cases. In Panel (b) it can be seen that the rate of convergence corresponds approximately to the theoretical one derived in Equation 4.4. The dot-dashed line is the oracle. It was multiplied by 1.68 in order to fit our curves. 5.3. Comparison with a low-rank + sparse estimator In this subsection, we compare the performance of the Huber estimator 1.7 with the performance of the low-rank matrix estimator proposed by Klopp, Lounici and Tsybakov (2016) 1.10. We first compare the estimators B̂H and L̂ with the observations Yi generated according to the model 1.4 with standard Gaussian and Student t with 3 degrees of freedom distributed errors. Equation (21) in Klopp, Lounici and Tsybakov (2016) suggests that the tuning parameters are chosen as follows: s log(p + q) log(p + q) λ1 = 2 , λ2 = 2 , nq n where λ1 and λ2 are the tuning parameters of the estimator 1.10. Also in this case it has to be noticed that the tuning parameters are smaller than the theoretical values given in their paper. In Figure 3a the Huber estimator 1.7 is compared with the low-rank plus sparse estimator 1.10 under the model 1.4 with i.i.d. Student t noise with 3 degrees of freedom. As expected, these estimators perform comparably well under Elsener and van de Geer/Robust Low-Rank Matrix Estimation (a) 19 (b) Fig 3: The left panel shows the Huber estimator 1.7 and the low-rank plus sparse estimator 1.10 under the model 1.4 with Student t noise with 3 degrees of freedom. The right panel shows the same estimators under the same model with standard Gaussian noise. the trace regression model 1.4. In Figure 3b the same estimators are compared under the model 1.4 with i.i.d. standard Gaussian noise. Also in this case, we see that both estimators achieve approximately the same error. These observations are not surprising since the theoretical analysis of Section 3 could be carried over by adapting the (semi-)norms to the different penalization. We now consider the model proposed in Klopp, Lounici and Tsybakov (2016) where around 5% of the observed entries are taken to be only one rating. This is the case of malicious users who systematically rate only one particular movie with the same rating. We refer to Section 2.3 of Klopp, Lounici and Tsybakov (2016) for more details on this setting. In Figure 4a we see that the Huber estimator outperforms the low-rank plus sparse estimator with Student t noise with 3 degrees of freedom. This might be due to the quadratic loss function and to the choice of the tuning parameters. In Figure 4b where Gaussian noise is considered we observe that both estimators perform almost equally well. 6. Discussion In this paper, we have derived sharp and non-sharp oracle inequalities for two robust nuclear norm penalized estimators of the noisy matrix completion problem. The robust estimators were defined using the well-known Huber loss for which the sharp oracle inequality has been derived and the absolute value loss for which we have shown a non-sharp oracle inequality. For both types of oracle inequalities we proved a general deterministic result first and added then the part arising from the empirical process. We have also shown how to apply the Elsener and van de Geer/Robust Low-Rank Matrix Estimation (a) 20 (b) Fig 4: The left panel shows the Huber estimator 1.7 and the low-rank plus sparse estimator 1.10 under the model 1.9 with Student t noise with 3 degrees of freedom. The right panel shows the same estimators under the same model as on the left panel but with standard Gaussian noise. oracle inequalities to the case where we only assume weak sparsity, i.e. approximately low-rank matrices. It is worth pointing out that our estimators do not require the distribution on the set of matrices (1.5) to be known in contrast to e.g. Koltchinskii, Lounici and Tsybakov (2011). In our case, the distribution on the set of matrices (1.5) is only needed in the theoretical analysis. The proofs of the oracle inequalities rely on the properties of the nuclear norm, and for the empirical process part on the Concentration, Symmetrization, and Contraction Theorems. A main tool in this context was also the bound on the largest singular value of a matrix with finite Orlicz norm. Our simulations, in the case of the Huber loss, showed a very good agreement with the convergence rates obtained by our theoretical analysis. We saw that the oracle rate is attained up to constants in presence of non-Gaussian noise and that the robust estimation procedure outperforms the quadratic loss function. It is left to future research to establish a sharp oracle inequality also for the case of a non-differentiable robust loss function. The Contraction inequality used in this paper for the Huber loss requires that also the derivative of the loss is Lipschitz continuous. This is not the case for the absolute value loss. Thanks to the convexity of the loss function it might be possible to derive a sharp result also for this case. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 21 Appendix A: Proofs of main results Proof of Inequality 2.8. Using the triangle property at B + with B 0 = B + we obtain 0 = kB + knuclear − kB + knuclear ≤ Ω+ (B + − B + ) −Ω− (B + ) {z } | =0 ⇒ Ω− (B + ) = 0. By the triangle property at B + with B 0 = B = B + + B − we have that kB + knuclear − kBknuclear = kB + knuclear − kB + + B − knuclear ≤ Ω+ (B − ) − Ω− (B + + B − ) = −Ω− (B + + B − ). By the triangle inequality it follows using Ω− (B + ) = 0 that Ω− (B + + B − ) ≥ Ω− (B − ) − Ω− (B + ) = Ω− (B − ). Therefore, we have kB + knuclear − kB + + B − knuclear ≤ −Ω− (B − ), and by the triangle inequality kB + knuclear − kB + + B − knuclear ≥ −kB − knuclear , which gives Ω− (B − ) ≤ kB − knuclear . For an arbitrary B we have again by the triangle inequality kBknuclear − kB 0 knuclear ≤ kB + knuclear + kB − knuclear − kB 0 knuclear . Applying the triangle property at B + we find that kBknuclear − kB 0 knuclear ≤ Ω+ (B + − B 0 ) − Ω− (B 0 ) + kB − knuclear . Apply now twice the triangle inequality (first inequality) to find that kBknuclear − kB 0 knuclear ≤ Ω+ (B − B 0 ) + Ω+ (B − ) − Ω− (B − B 0 ) + Ω− (B) + kB − knuclear ≤ Ω+ (B − B 0 ) − Ω− (B − B 0 ) + 2kB − knuclear , where it was used that Ω(B − ) = 0 and that Ω− (B) ≤ Ω− (B − ) ≤ kB − knuclear . Elsener and van de Geer/Robust Low-Rank Matrix Estimation 22 Proof of Lemma 3.1. Let B ∈ B. Define for 0 < t < 1 B̃t := (1 − t)B̂ + tB. Since B is convex we have that B̃t ∈ B for all 0 < t < 1. Since B̂ is the minimizer of the objective function and by the convexity of the objective function we have Rn (B̂) + λkB̂knuclear ≤ Rn (B̃t ) + λkB̃t knuclear ≤ Rn (B̃t ) + (1 − t)λkB̂knuclear + tλkBknuclear . Finally, we can conclude that Rn (B̂) − Rn (B̃t ) ≤ λkBknuclear − λkB̂knuclear . t Letting t → 0 the claim follows. Proof of Theorem 3.1. The first order Taylor expansion of R at B̂ is given by   R(B) = R(B̂) + trace Ṙ(B̂)T (B − B̂) + Rem(B̂, B). (A.1) Then it follows that   R(B̂) − R(B) + Rem(B̂, B) = − trace Ṙ(B̂)T (B − B̂) . (A.2) Case 1 If   trace Ṙ(B̂)T (B − B̂) ≥ δλΩ+ (B̂ − B) + δλΩ− (B̂ − B) − 2λkB − knuclear − λ∗ , (A.3) then by the two-point-margin condition 3 we find that   R(B) − R(B̂) ≥ trace Ṙ(B̂)T (B − B̂) + G(kB − B̂kF ). (A.4) Which implies that R(B) − R(B̂) ≥ δλΩ+ (B̂ − B) + δλΩ− (B̂ − B) − 2λkB − knuclear − λ∗ + G(kB − B̂kF ) | {z } ≥0 ≥ δλΩ (B̂ − B) + δλΩ− (B̂ − B) − 2λkB − knuclear − λ∗ . + Case 2 Assume in the following that   trace Ṙ(B̂)T (B − B̂) ≤ δλΩ+ (B̂ − B) + δλΩ− (B̂ − B) − 2λkB − knuclear − λ∗ , (A.5) Elsener and van de Geer/Robust Low-Rank Matrix Estimation 23 By the two-point inequality (Lemma 3.1) we have that   − trace Ṙn (B̂)T (B − B̂) ≤ λkBknuclear − λkB̂knuclear , (A.6) which implies that   0 ≤ trace Ṙn (B̂)T (B − B̂) + λkBknuclear − λkB̂knuclear . (A.7) Hence,   − trace Ṙ(B̂)T (B − B̂) + δλΩ+ (B̂ − B) + δλΩ− (B̂ − B)   ≤ trace (Ṙn (B̂) − Ṙ(B̂))T (B − B̂) + δλΩ+ (B̂ − B) + δλΩ− (B̂ − B) + λkBknuclear − λkB̂knuclear ≤ λε Ω(B̂ − B) + λ∗ + δλΩ+ (B̂ − B) + δλΩ− (B̂ − B) + λkBknuclear − λkB̂knuclear ≤ λε Ω+ (B̂ − B) + λε Ω− (B̂ − B) + λ∗ + δλΩ+ (B̂ − B) + δλΩ− (B̂ − B) + λΩ+ (B̂ − B) − λΩ− (B̂ − B) + 2λkB − knuclear = λΩ+ (B̂ − B) − (1 − δ)λΩ− (B̂ − B) + 2λkB − knuclear + λ∗ . Therefore, by Equation A.5 Ω− (B̂ − B) ≤ λ Ω+ (B̂ − B). (1 − δ)λ We then have by the convex conjugate inequality √ Ω+ (B̂ − B) ≤ kB̂ − BkF 3 s √  ≤ H 3 s + G(kB̂ − BkF ). Which implies that   − trace Ṙ(B̂)T (B − B̂) + λΩ− (B̂ − B) + δλΩ+ (B̂ − B) = R(B̂) − R(B) + Rem(B̂, B) + λΩ− (B̂ − B) + δλΩ+ (B̂ − B) √  ≤ H λ3 s + G(kB̂ − BkF ) + 2λkB − knuclear + λ∗ √  ≤ H λ3 s + Rem(B̂, B) + 2λkB − knuclear + λ∗ . Proof of Theorem 3.2. We start the proof with the following inequality using the fact that B̂ is the minimizer of the objective function. Rn (B̂) + λkB̂knuclear ≤ Rn (B) + λ kBknuclear (A.8) Elsener and van de Geer/Robust Low-Rank Matrix Estimation 24 Then, by adding and subtracting R(B̂) on the left hand side and R(B) on the right hand side we obtain h i R(B̂) − R(B) ≤ − (Rn (B̂) − R(B̂) − (Rn (B) − R(B)) + λkBknuclear − λkB̂knuclear . Applying Assumption 3.1, the definition of Ω, and Lemma 2.8 we obtain R(B̂) − R(B) ≤ λε Ω(B̂ − B) + λ∗ + λkBknuclear − λkB̂knuclear ≤ λε Ω+ (B̂ − B) + λε Ω− (B̂ − B) + λ∗ + λΩ+ (B̂ − B) − λΩ− (B̂ − B) + 2λkB − knuclear = (λε + λ)Ω+ (B̂ − B) − (λ − λε )Ω− (B̂ − B) + λ∗ + 2λkB − knuclear . Since later on we apply Assumption 2 we subtract on both sides of the above inequality R(B 0 ). R(B̂) − R(B 0 ) + λΩ− (B̂ − B) ≤ R(B) − R(B 0 ) + λΩ+ (B̂ − B) + λ∗ + 2λkB − knuclear . (A.9) It is then useful to make the following case distinction that allows us to obtain an upper bound for the estimation error. Case 1  λ∗ + R(B) − R(B 0 ) + 2λkB − knuclear , then If λΩ+ (B̂ − B) ≤ (1−δ) δ  δλΩ+ (B̂ − B) ≤ (1 − δ) λ∗ + R(B) − R(B 0 ) + 2λkB − knuclear ≤ λ∗ + R(B) − R(B 0 ) + 2λkB − knuclear . By multiplying Equaiton A.9 on both sides with δ we arrive at δλΩ− (B̂ − B) ≤ λ∗ + R(B) − R(B 0 ) + 2λkB − knuclear . Therefore, δ(λΩ+ (B̂ − B) + λΩ− (B̂ − B)) ≤ 2λ∗ + 2(R(B) − R(B 0 )) + 4λkB − knuclear . (A.10) And since λ < λ, we conclude that δλ(Ω+ + Ω− )(B̂ − B) ≤ 2λ∗ + 2(R(B) − R(B 0 )) + 4λkB − knuclear . Case 2 If λΩ+ (B̂ − B) ≥ (1−δ) δ  λ∗ + R(B) − R(B 0 ) + 2λkB − knuclear , then R(B̂) − R(B 0 ) + λΩ− (B̂ − B) ≤ λΩ+ (B̂ − B) + λΩ+ (B̂ − B) δ . (1 − δ) Elsener and van de Geer/Robust Low-Rank Matrix Estimation 25 This implies h i (1 − δ) R(B̂) − R(B 0 ) + (1 − δ)λΩ− (B̂ − B) ≤ λΩ+ (B̂ − B). And finally we conclude that Ω− (B̂ − B) ≤ λ Ω+ (B̂ − B). (1 − δ)λ We then obtain using the definition of Ω+ in Lemma 2.3 √ Ω+ (B̂ − B) ≤ kB̂ − BkF 3 s √ ≤ (kB̂ − B 0 kF + kB − B 0 kF )3 s √ ≤ G(kB̂ − B 0 kF ) + G(kB − B 0 kF ) + 2H(3 s). Invoking the convex conjugate inequality and Assumption 2 we get δλΩ+ (B̂ − B) + δλΩ− (B̂ − B) √ ≤ 2H(λ(1 + δ)3 s) + R(B) − R(B 0 ) + (R(B) − R(B 0 )) + λ∗ + 2λkB − knuclear √ ≤ 2H(λ(1 + δ)3 s) + 2(R(B) − R(B 0 )) + λ∗ + 2λkB − knuclear . Combining the two cases we have for the estimation error δλ(Ω+ + Ω− )(B̂ − B) √ ≤ 2H(λ(1 + δ)3 s) + 2λ∗ + 2(R(B) − R(B 0 )) + 4λkB − knuclear . and for the second claim we conclude that R(B̂) − R(B) ≤ λΩ+ (B̂ − B) + λ∗ + 2λkB − knuclear √ 1 ≤ 2H(λ(1 + δ)3 s) + λ∗ + 2(R(B) − R(B 0 )) δ  + 2λkB − knuclear + λ∗ + 2λkB − knuclear . Proof of Lemma 2.1. The theoretical risk function arising from the Huber loss is given by n R(B) = 1X EXi [E [ρH (Yi − trace(Xi B)) |Xi ]] . n i=1 (A.11) Elsener and van de Geer/Robust Low-Rank Matrix Estimation 26 Suppose that Xi has its only 1 at entry (k, j). Then XB = (B)jk . Define r(x, B) := E [ρH (Yi − trace (Xi B)) |Xi = x] = E [ρH (Yi − Bjk )] h i dρH (Yi −Bjk ) = E . The derivative with respect We notice that ṙ(x, B) = dr(x,B) dBjk dBjk to Bjk of ρH (Yi − Bjk ) is given by   −2(Yi − Bjk ), if |Yi − Bjk | ≤ κ −2κ, if Yi − Bjk > κ ρ̇H (Yi − Bjk ) :=  2κ, if Yi − Bjk < −κ. Then, Z Bjk +κ ṙ(x, B) = −2 Z ∞ Z (y − Bjk )dF (y) − 2κ Bjk −κ Z Bjk +κ Bjk +κ = −2 Z dF (y) −∞ Bjk +κ dF (y) − 2κ [1 − F (κ + Bjk )] ydF (y) + 2Bjk Bjk −κ Bjk −κ dF (y) + 2κ Bjk −κ + 2κF (Bjk − κ) = −2(Bjk + κ)F (Bjk + κ) + 2(Bjk − κ)F (Bjk − κ) Z Bjk +κ +2 F (y)dy + 2Bjk [F (Bjk + κ) − F (Bjk − κ)] − 2κ Bjk −κ + 2κF (κ + Bjk ) + 2κF (Bjk − κ). Z Bjk +κ =2 F (y)dy − 2κ. Bjk −κ The second derivative of r(x, B) with respect to Bjk is then given by r̈(x, B) = 2[F (Bjk + κ) − F (Bjk − κ)]. Therefore, the Taylor expansion around B 0 is given by 0 r(x, B) = r(x, B 0 ) + ṙ(x, B 0 )(Bjk − Bjk )+ r̈(x, B̃) 0 2 (Bjk − Bjk ) , 2 where B̃ ∈ B is an intermediate point. We can see that Assumption 3 holds with G(u) = u2 /(2C12 pq). Proof of Lemma 2.2. For the (theoretical) risk function R arising from the absolute value loss we have R(B) = E [Rn (B)] n 1X = E [|Yi − trace (Xi B)|] . n i=1 (A.12) (A.13) (A.14) Elsener and van de Geer/Robust Low-Rank Matrix Estimation 27 Using the tower property of the conditional expectation we obtain n R(B) = 1X EXi [E [|Yi − trace(Xi B)| |Xi ]] . n i=1 (A.15) Suppose that Xi has its only 1 at entry (k, j). Then XB = (B)jk . Define r(x, B) := E [|Yi − trace (Xi B)| |Xi = x] = E [|Yi − Bjk |] Z Z = (y − Bjk ) dF (y) + y≥Bjk (Bjk − y) dF (y) y<Bjk Z ∞ Z (Bjk − y) dF (y) (y − Bjk ) dF (y) + = −∞ y≥Bjk Z ∞ − (Bjk − y) dF (y) Bjk Z ∞ Z ∞ (y − Bjk ) dF (y) + =2 (Bjk − y) dF (y) −∞ Bjk Z ∞ Z ∞ dF (y) − Bjk −∞ {z } | =1 Z ∞ Z ∞ =2 (1 − F (y)) dy + Bjk − ydF (y). Z ∞ (y − Bjk ) dF (y) + Bjk =2 ydF (y) −∞ −∞ Bjk The Taylor expansion of r(x, B) around B 0 , assuming that B 0 minimizes r, is given by   r̈(x, B̃) 0 2 0 r(x, B) = r(x, B 0 ) + ṙ(x, B 0 ) Bjk − Bjk + Bjk − Bjk 2  0 2 = r(x, B 0 ) + f (B̃jk ) Bjk − Bjk , where B̃ ∈ B is an intermediate point. r(x, B) − r(x, B 0 ) ≥  1 0 2 Bjk − Bjk 2 C2 which means that the one point margin Condition 2 is satisfied with G(u) = u2 /(2C22 pq). Appendix B: Supplemental Material This supplemental material contains an application to real data sets, the proofs of the lemmas in Section 2 of the main text, and a section on the bound of the empirical process part of the estimation problem. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 28 B.1. Example with real data In Section 5 we have shown several synthetic data examples. The convex optimization problems there were solved using the semidefinite programming (SDP) toolbox CVX Research (2012). These algorithms work very well for comparably low-dimensional optimization problems. When real datasets are considered, due to the much larger problem sizes different algorithms are needed. To solve the optimization problem with real data a proximal gradient algorithm is used. The algorithm is given in pseudocode. We define F1 to be the empirical risk for the Huber loss n F1 (B) = 1X ρH (Yi − trace(Xi B)). n i=1 We define F2 to be the empirical risk for the quadratic loss n F2 (B) = 1X (Yi − trace(Xi B))2 . n i=1 The gradient of F1 is given by n OF1 (B) = − 1X ρ̇H (Yi − trace(Xi B))XiT , n i=1 where ρ̇H (Yi −trace(Xi B)) is given in the proof of Lemma 2.1 in the main paper. The gradient of F2 is given by n OF2 (B) = − 2X (Yi − trace(Xi B))XiT . n i=1 The proximity operator proxnuc for W ∈ Rp×q and γ > 0 is defined as 1 proxnucγ (W ) = arg min γkBknuclear + kB − W k2F . 2 p×q B∈R For the nuclear norm the proximity operator has a closed form: let W = U diag(σ1 , . . . , σmin(p,q) )V 0 be the singular value decomposition of W , then  proxnucγ (W ) = U Sγ (σ1 , . . . , σmin(p,q) ) V 0 , where for x ∈ R the operator Sγ (x) applied elementwise is given by   x − γ, if x > γ 0, if x = γ Sγ (x) =  x + γ, if x < γ. It is known that the solution of the optimization problem B̂H satisfies the following fixed point equation Elsener and van de Geer/Robust Low-Rank Matrix Estimation 29   B̂H = proxnucγ B̂H − γOF . The same holds also for the quadratic loss function. To compute the proximal operator in Algorithm 1 the function prox nuclearnorm from the Matlab toolbox Unlocbox (2016) was used. The algorithm is a Nesterov-type Accelerated Proximal Gradient algorithm. We refer to Section 4.3 in Parikh and Boyd (2014) and references therein. In particular, the present form of Algorithm 1 goes back to Beck and Teboulle (2009). The Huber constant is chosen to be κ = 2 in all the examples. Algorithm 1 is applied to the Huber loss (i = 1) and to the quadratic loss (i = 2). The tuning parameter for the quadratic loss case is smaller than for the Huber loss. Algorithm 1 HuberQuadProx Start with an initial value B = Bobs containing the entries belonging p to the training set. Define the dummy variable v = B. Choose L = 0.1, β = 1.2, λ1 = 20 log(p + q)/(nq), and p λ2 = log(p + q)/(nq). while Stopping criterion is not satisfied OR t ≤ maxiter do obj ← Fi (B) + λi kBknuclear Bprev ← B δ=1 while δ > 0.001 do B ← v − 1/LOFi (v) B ← proxnucλ/L (B) T 2 ← FβL δL ← i (B) + λkBknuclear − obj − trace(OFi (Bprev ) (B − Bprev )) − L/2kB − Bprev kF end while L ← L/β v ← B + t/(t + 3)(B − Bprev ) end while This method was applied to the MovieLens data set which consists of p = 943 users, q = 1682 movies, and 1000 000 observed ratings, we call the set containing the indices of the observed ratings Γ. The minimal and maximal ratings are 1 and 5 respectively. Every user has rated at least 20 movies. The data set is available at MovieLens (1998). Training and testing sets of different sizes are drawn randomly without replacement from the set of observed ratings. The testing error is computed as follows: with 1000 000 = ntest + ntrain and using the disjoint union Γ = Γtest ∪ Γtrain (where |Γtest | = ntest and |Γtrain | = ntrain ) we have X 1 0 test error = (Bj,k − B̂j,k )2 . ntest (j,k)∈Γtest Elsener and van de Geer/Robust Low-Rank Matrix Estimation 30 The results are reported in Table 1: training set size 250 000 500 000 750 000 test set size 750 000 500 000 250 000 Huber loss test error Iterations 1.43 60 000 1.14 60 000 1.01 60 000 Table 1 Quadratic loss test error Iterations 1.32 60 000 1.06 60 000 0.96 60 000 It can be observed that the test error of the quadratic loss estimator is slightly smaller than the test error for the Huber loss estimator. This might be due to the fact that there are no heavily corrupted entries in the data. On the other hand, this indicates that the Huber estimator is able to “adapt” also to the usual setting without heavy corruptions. We have applied Algorithm 1 also to the MovieLens data set with 10 0000 209 observed ratings from 60 040 users on 30 952 movies. The minimal and maximal ratings are 1 and 5 respectively. Every user has rated at least 20 movies. The data set is available at MovieLens (2003). The results are reported in Table 2: training set size 2500 000 5000 000 7500 000 test set size 7500 209 5000 209 2500 209 Huber loss test error Iterations 1.05 100 000 0.92 100 000 0.85 100 000 Table 2 Quadratic loss test error Iterations 1.04 100 000 0.90 100 000 0.84 100 000 B.2. Proofs of Lemmas in Section 2 The following lemma shows “equivalence” of the nuclear norm and Frobenius norm. This fact is useful since it is more common and meaningful to measure the estimation error in the Frobenius norm. The rest of the lemma contains technicalities that are used in the sequel to derive the triangle property. Lemma B.1. Let A ∈ Rp×q . Then kAkF ≤ kAknuclear ≤ √ rank A kAkF . Let P ∈ Rp×s with P T P = I and s ≤ p. Then √ P P T A F ≤ sΛmax (A) and PPTA F ≤ kAkF , kAQQT kF ≤ kAkF , kAP P T kF ≤ kAkF , where kAkF is the Frobenius norm of A and Λmax (A) its largest singular value. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 31 Proof of Lemma B.1. Consider the singular value decomposition (SVD) of A with s := rank(A) A = PA ΛA QTA (B.1) with PAT PA = 1s×s , QTA QA = 1s×s and ΛA = diag (ΛA,1 , . . . , ΛA,s ). Then the nuclear norm of A can be written as kAknuclear = s X ΛA,k . (B.2) k=1 The first claim follows from Hölder’s inequality applied in two different manners for the lower and upper bounds. For the second claim consider the p−dimensional j−th unit vector ej . Define u := P P T ej . Then T T u AA u = 2 2 AT u 2 kuk2 2 kuk2  ≤ max kuk2 =1 2 T A u = Λ2max (A) P P T ej 2 kuk2 2 2 2 . Then, by the invariance of the trace under cyclic permutations we obtain the claimed result. In order to show that the triangle property holds we also need the dual norm of the nuclear norm so that to apply the dual norm inequality (see Lemma B.2). The subdifferential of the nuclear norm is then used to deduce the triangle property. The following lemma gives the dual norm and the subdifferential of the nuclear norm. It cites results of Lange (2013) and Watson (1992). Lemma B.2. Let A kAknuclear is given by ∈ Rp×q .The dual norm of the nuclear norm Ω∗ (A) = Λmax (A), where Λmax (A) is the largest singular value of A . Moreover, the subgradient of the nuclear norm is given by    ∂ kBknuclear = Z = P QT + 1p×p − P P T W 1q×q − QQT : Λmax (W ) = 1} . Proof. The derivation of the dual norm of the nuclear norm can be found in Example 14.3.6. from Lange (2013). A justification for the second claim can be found in Watson (1992). Proof of Lemma 2.1 in the main text. Let Z ∈ ∂ kB + knuclear , i.e.     T T T Z = P + Q+ + 1p×p − P + P + W 1q×q − Q+ Q+ , Elsener and van de Geer/Robust Low-Rank Matrix Estimation 32 where W ∈ Rp×q is such that Λmax (W ) = 1. Therefore, it is possible to write Z = Z1 + Z2 , T where Z1 := P + Q+     T T and Z2 := 1p×p − P + P + W 1q×q − Q+ Q+ . Recall the definition of the subdifferential of the nuclear norm   ∂ B + nuclear = Z| kB 0 knuclear − B + nuclear ≥ trace Z T B 0 − B + , ∀B 0 ∈ Rp×q For Z ∈ ∂ kB + knuclear we have B + nuclear − kB 0 knuclear ≤ trace Z T B + − B 0  = trace (Z1 + Z2 ) T  B+ − B0  . To prove the first assertion we need to bound the right  hand side of the above inequality. For simplicity consider first trace Z1T B 0 . Using the invariance of the trace under cyclic permutations we have    T   T trace Z1T B 0 = trace Q+ P + B 0 = trace P + B 0 Q+   T T T = trace |P +{zP +} P + B 0 Q+ Q+ Q+  | {z } =1 =1   + +T + +T 0 + +T = trace Q P P P B Q Q   T T T ≤ Ω∗ Q+ P + kP + P + B 0 Q+ Q+ knuclear T T = P + P + B 0 Q+ Q+ nuclear ,   T since Λmax P + Q+ = 1.  On the other hand, consider trace Z2T B 0 . Again by the invariance of the trace under cyclic permutations we have       T T trace Z2T B 0 = trace 1q×q − Q+ Q+ W T 1p×p − P + P + B 0      T T = trace W T 1p×p − P + P + B 0 1q×q − Q+ Q+     T T ≤ Λmax (W ) 1p×p − P + P + B 0 1q×q − Q+ Q+ | {z } nuclear =1      T T = sup trace W T 1p×p − P + P + B 0 1q×q − Q+ Q+ . W :Λmax (W )=1 Hence, it is possible to find a W such that Λmax (W ) = 1 and such that      T T trace W T B 0 = 1p×p − P + P + B 0 1q×q − Q+ Q+ . (B.3) nuclear Elsener and van de Geer/Robust Low-Rank Matrix Estimation 33 Substituting B 0 with B 0 − B + we have that  max trace Z T B 0 − B + + Z∈∂kB k nuclear   n    T T trace 1q×q − Q+ Q+ W T 1p×p − P + P + B0 − B+ = max Λmax (W )=1  o T + trace Q+ P + B 0 − B + Hence,      T T T T − 1 − P + P + B 0 1 − Q+ Q+ P + P + B 0 − B + Q+ Q+ nuclear nuclear  + +T √ − + +T 0 + 0 ≤ s P P − ΩB + (B ) B −B Q Q F  0 + ≤ Ω+ . B+ B − B For the second assertion we have T T T T kB 0 knuclear = P + P + B 0 + B 0 Q+ Q+ − P + P + B 0 Q+ Q+     T T + 1 − P + P + B 0 1 − Q+ Q+ nuclear T ≤ P +P + B0 + +T T nuclear 0 + + B 0 Q+ Q+ nuclear +T + P P BQ Q    nuclear T  + +T + 1−P P B 0 1 − Q+ Q+ nuclear √  + +T 0 T T 0 + +T ≤ s P P B + BQ Q + P + P + B 0 Q+ Q+  F  F + +T 0 + +T + 1−P P B 1−Q Q . nuclear  F Since the dual of Ω may not be easy to deal with we bound it by the dual norm of the nuclear norm. By doing so, it will be possible to apply results about the tail of the maximum singular value of a sum of independent random matrices. Lemma B.3. For the dual norm of Ω we have that Ω∗ ≤ Λmax . Proof. By Lemma 2.1 in the main text it is known that − k·knuclear ≤ Ω+ B + + ΩB + = Ω. Therefore, using Lemma 2.2 in the main text we have for the dual norms that Ω∗ ≤ k·knuclear∗ = Λmax . Elsener and van de Geer/Robust Low-Rank Matrix Estimation 34 B.3. Probability bounds for the empirical process  Pn To bound the expectation of Λmax n1 i=1 ε̃i Xi where ε̃1 , . . . , ε̃n are i.i.d. Rademacher random variables independent of (Xi , Yi )ni=1 we use Theorem 2.1 in the main text together with the fact that the 2-Orlicz norm of a Rademacher random variable ε̃ is equal to r 1 kε̃kψ2 = . log 2 Now we check the assumptions of Theorem 2.1 in the main text. For the case of matrix completion with uniform sampling we obtain that EXi XiT = 1 T ιι , pq where ι is a q−vector consisting of only 1’s. It follows that    1 1 T T ιι = . Λmax EXi Xi = Λmax pq p Analogously, we obtain that  1 Λmax EXiT Xi = . q Notice that by the independence of the Rademacher sequence and the random matrices Xi we have Eε̃i XiT = Eε̃i EXiT = 0, Eε̃2i Xi XiT = EXi XiT , and Eε̃2i XiT Xi = EXiT Xi . Moreover, since Λmax (·) is a norm we have Λmax (ε̃i Xi ) = |ε̃i | Λmax (Xi ) ≤ |ε̃i | , ∀i. Hence, r 1 , ∀i. log 2 Lemma B.4. 1. Suppose that ρ is differentiable and Lipschitz continuous with constant L. Suppose further that ρ̇(x)x is Lipschitz continuous with Lipschitz constant L̃. Assume that for a constant KΩ Λ2max (ε̃i Xi ) ψ 2 ≤ kε̃kψ2 = max Ω∗ (Xi ) ≤ KΩ . 1≤i≤n Define for all M > 0 ZM := sup trace  Ṙn (B 0 ) − Ṙ(B 0 ) T  (B − B 0 ) . (B.4) B 0 ∈B:Ω(B−B 0 )≤M Then we have for a constant C0 > 0 and λ̃1 = 8η L̃p log(p + q)/(3n) that ZM ≤ L̃M (8C0 + √ s 2) p log(p + q) log(p + q) + 8C0 log(1 + q) nq n with probability at least 1 − exp(−p log(p + q)). ! + λ̃1 Elsener and van de Geer/Robust Low-Rank Matrix Estimation 35 2. Let ρ be a Lipschitz continuous function with Lipschitz constant L. Assume that for a constant KΩ max Ω∗ (Xi ) ≤ KΩ . 1≤i≤n Define for all M > 0 ZM := |[Rn (B 0 ) − R(B 0 )] − [Rn (B) − R(B)]| . sup B 0 ∈B:Ω(B 0 −B)≤M Then we have for a constant C0 > 0 and λ̃2 = 8ηLp log(p + q)/(3n) that ZM ≤ LM (8C0 + √ s 2) p log(p + q) log(p + q) + 8C0 log(1 + q) nq n ! + λ̃2 with probability at least 1 − exp(−p log(p + q)). Proof. The proof of this lemma is based on the Symmetrization Theorem, on the Contraction Theorem, on the dual norm inequality, and on Bousquet’s Concentration Theorem. We use the notation ρ(Xi B, Yi ) := ρ(Yi − trace(Xi B)) and ρ̇(Xi B, Yi ) := ρ̇(Yi − trace(Xi B)). We have " #  T 0 0 0 Ṙn (B ) − Ṙ(B ) (B − B ) trace E sup B 0 ∈B:Ω(B−B 0 )≤M " n  1X T trace (B − B 0 ) XiT ρ̇(Xi B 0 , Yi ) B 0 ∈B:Ω(B−B 0 )≤M n i=1 #  T 0 − EXi ρ̇(Xi B , Yi ) =E sup " n  1X ≤ 2E sup ε̃i trace (B − B 0 )T XiT ρ̇(Xi B 0 , Yi ) B 0 ∈B:Ω(B−B 0 )≤M n i=1 ! n X 0 ≤ 4L̃Ω(B − B )EΩ∗ ε̃i Xi /n, (B.5) # i=1 ≤ 4L̃M EΩ∗ n X ! ε̃i Xi /n, since Ω ≤ Ω ⇒ Ω∗ ≤ Ω∗ . (B.6) i=1 The first inequality follows from Theorem B.1, the second p from Theorem B.2 √ and the dual norm inequality. With S = 1/ q and K = 1/ log 2 in Theorem 2.1 in the main text together with the concavity of the logarithm s r  s   s   q 1 1 1 q 1 log = log q + log ≤ log + log 2 2 2 log 2 2 2 log 2 p ≤ log (q + 1) Elsener and van de Geer/Robust Low-Rank Matrix Estimation 36 we obtain integrating the tail that the expectation of the largest singular value of the sum of masks is bounded by s ! ! n X log(p + q) p log(p + q) EΛmax + log (q + 1) . (B.7) ε̃i Xi /n ≤ C0 nq n i=1 Hence, defining   T f (Xi B 0 ) := trace (B − B 0 ) XiT ρ̇(Xi B 0 , Yi ) (B.8) we have using the Lipschitz continuity of the loss function and the fact that the Xi ∈ χ are i.i.d. sup Var(f (X1 B 0 )) B 0 ∈B:Ω(B−B 0 )≤M = sup B 0 ∈B:Ω(B−B 0 )≤M ≤ sup B 0 ∈B:Ω(B−B 0 )≤M = sup B 0 ∈B:Ω(B−B 0 )≤M   q X p X 0 X1lj (Bjl − Bjl Var  )ρ̇(X1 B 0 , Yi )) l=1 j=1  2  q X p X  0   X1lj (Bjl − Bjl )  L2 E  l=1 j=1   q X p X 0 2 L2 E  X12lj (Bjl − Bjl ) l=1 j=1 2 = L̃ 0 2 kBjl − Bjl kF B 0 ∈B:Ω(B−B 0 )≤M pq ≤ L̃2 M 2 =: T 2 . pq sup Therefore, using kf k∞ ≤ 2η L̃ =: D (B.9) we obtain from Bousquet’s Concentration Theorem B.3 that for all t > 0 s ! log(p + q) p log(p + q) P ZM ≥ 8L̃M C0 + log (q + 1) nq n ! r M L̃ 2t 8tη L̃ +√ + pq n 3n ≤ exp(−t). Elsener and van de Geer/Robust Low-Rank Matrix Estimation 37 Replacing t by p log(p + q) we obtain s ! p √ log(p + q) log(p + q) P ZM ≥ M L̃ (8C0 + 2) + 8C0 log(q + 1) nq n ! 8η L̃p log(p + q) ≤ exp(−p log(p + q)). + 3n For the second claim we proceed similarly. We have " E 0 # 0 |[Rn (B ) − R (B )] − [Rn (B) − R (B)]| sup B 0 ∈B:Ω(B 0 −B)≤M " =E " sup B 0 ∈B:Ω(B 0 −B)≤M " n # n 1X 0 0 {ρ (Xi B , Yi ) − Eρ (Xi B , Yi )} n i=1 ## 1X {ρ (Xi B, Yi ) − Eρ (Xi B, Yi )} n i=1 " # " n 1X =E sup {ρ (Xi B 0 , Yi ) − ρ (Xi B, Yi )} n i=1 B 0 ∈B:Ω(B 0 −B)≤M ## " n 1X 0 {Eρ (Xi B , Yi ) − Eρ (Xi B, Yi )} − n i=1 " # n 1X ≤ 2E sup ε̃i (ρ (Xi B 0 , Yi ) − ρ (Xi B, Yi )) B 0 ∈B:Ω(B 0 −B)≤M n i=1 " # n 1X 0 ≤ 4E sup Lε̃i trace (Xi (B − B)) B 0 ∈B:Ω(B 0 −B)≤M n i=1 ( n ) !# " 1X ε̃i Xi {B 0 − B} trace = 4LE sup n i=1 B 0 ∈B:Ω(B 0 −B)≤M ! n 1X ≤ 4LEΩ∗ ε̃i Xi Ω (B 0 − B) , by the dual norm inequality n i=1 ! n 1X ≤ 4LM EΛmax ε̃i Xi n i=1 s ! log(p + q) p log(p + q) ≤ 4C0 LM + log (q + 1) , as before. nq n − The first inequality follows from Theorem B.1, the second from Theorem B.2. Moreover, we have for all i = 1, . . . , n that |ρ(Yi − trace(Xi B 0 )) − ρ(Yi − trace(Xi B))| ≤ L |trace (Xi (B 0 − B))| ≤ 2ηL =: D. Elsener and van de Geer/Robust Low-Rank Matrix Estimation 38 In view of applying Bousquet’s Concentration Theorem B.3 we have with a similar calculation as for the first claim h i 2 E (ρ(Yi − trace(Xi B 0 )) − ρ(Yi − trace(Xi B)))   ≤ L2 E trace2 (Xi (B − B 0 )) ≤ M 2 L2 =: T 2 pq Replacing t by p log(p + q) we obtain s ! log(p + q) log(p + q) p + log (q + 1) P ZM ≥ 8C0 LM nq n ! r M L 2p log(p + q) +√ + λ̃2 pq n ≤ exp (−p log(p + q)) . To obtain a uniform bound for all B ∈ B we use the peeling device given in van de Geer (2000). Lemma B.5. λε,1 1. Let L̃ and λ̃1 be as in Lemma B.4. Define s ! p √ log(p + q) log(p + q) + 8C0 log(1 + q) = L̃ (8C0 + 2) nq n We have for any fixed B ∈ B 0 P ∃B ∈ B : trace  0 0 Ṙn (B ) − Ṙ(B ) T 0  (B − B) ! 0 > 2λε,1 (Ω(B − B) + 1) + λ̃1 ≤ (j0 + 2) exp(−p log(p + q)). 2. Let L and λ̃2 be as in Lemma B.4. Define s ! p √ log(p + q) log(p + q) + 8C0 log(1 + q) λε,2 = L (8C0 + 2) nq n We have for any fixed B ∈ B P(∃B 0 ∈ B : |(Rn (B 0 ) − R(B 0 )) − (Rn (B) − R(B))| > 2λε,2 (Ω(B 0 − B) + 1) + λ̃2 ) ≤ (j0 + 2) exp(−p log(p + q)). Elsener and van de Geer/Robust Low-Rank Matrix Estimation 39 Proof. We subdivide the set B as follows for a fixed B ∈ B B = {B 0 ∈ B : Ω(B − B 0 ) ≤ 1} √ ∪ {B 0 ∈ B : 1 < Ω(B − B 0 ) ≤ 14q pqη} . Suppose we are on the first set, then n   ∃B 0 : Ω(B − B 0 ) ≤ 1, trace (Ṙn (B 0 ) − Ṙ(B 0 ))T (B − B 0 ) o > 2λε,1 (Ω(B − B 0 ) + 1) + λ̃1 n   ⊂ ∃B 0 : Ω(B − B 0 ) ≤ 1, trace (Ṙn (B 0 ) − Ṙ(B 0 ))T (B − B 0 ) o > λε,1 + λ̃1 . Therefore, by Lemma B.4 we conclude that    P ∃B 0 : Ω(B − B 0 ) ≤ 1, trace (Ṙn (B 0 ) − Ṙ(B 0 ))T (B − B 0 )  > 2λε,1 (Ω(B − B 0 ) + 1) + λ̃1 ≤ exp(−p log(p + q)).  √ We then consider the set B 0 ∈ B : 1 < Ω(B − B 0 ) ≤ 14q pqη . We first refine √ it by choosing j0 as the smallest integer such that j0 + 1 > log2 (14q pqη). This leads us to √ {B 0 ∈ B : 1 < Ω(B − B 0 ) ≤ 14q pqη} ⊂ j0 [  0 j B : 2 < Ω(B − B 0 ) ≤ 2j+1 . | {z } j=0 =:Bj For one j we have for the event n   ∃B 0 ∈ Bj : trace (Ṙn (B 0 ) − Ṙ(B 0 ))T (B 0 − B) o > 2λε,1 (Ω(B − B 0 ) + 1) + λ̃1 n   o ⊂ ∃B 0 ∈ Bj : trace (Ṙn (B 0 ) − Ṙ(B 0 ))T (B 0 − B) > 2j+1 λε,1 + λ̃1 . By the first claim in Lemma B.4 we can conclude that    P ∃B 0 ∈ Bj : trace (Ṙn (B 0 ) − Ṙ(B 0 ))T (B 0 − B)  > 2λε,1 (Ω(B − B 0 ) + 1) + λ̃1 ≤ exp(−p log(p + q)). Elsener and van de Geer/Robust Low-Rank Matrix Estimation 40 To keep the notation clean we define the event n √ C = ∃B 0 ∈ B : 1 < Ω(B − B 0 ) ≤ 14q pqη,   o trace (Ṙn (B 0 ) − Ṙ(B 0 ))T (B − B 0 ) > 2λε,1 (Ω(B − B 0 ) + 1) + λ̃1 and for all j = 0, . . . , j0 the events  n  Cj = ∃B 0 ∈ Bj : trace (Ṙn (B 0 ) − Ṙ(B 0 ))T (B 0 − B) o > 2j+1 λε,1 + λ̃1 . Sj 0 Cj . Therefore, by the union bound   j0 j0 [ X Cj  ≤ P (Cj ) ≤ (j0 + 1) exp(−p log(p + q)). P (C) ≤ P  Then C ⊂ j=0 j=0 j=0 The second claim follows by an analogous reasoning. The proof of Lemma B.4 requires the Symmetrization Theorem and the Contraction Theorem (or Contraction Principle). The first theorem allows us to reduce the case of non-centred random variables to the case of mean zero random variables. A main tool for this type of reduction is a sequence of Rademacher random variables. The second theorem, the Contraction Principle, is used to compare the limit behaviour of two series of Rademacher random variables with different coefficients. We state these results for the sake of completeness. Theorem B.1 (Symmetrization of Expectations, van der Vaart and Wellner (1996)). Consider X1 , . . . , Xn independent matrices in χ and let F be a class of real-valued functions on χ. Let ε̃1 , . . . , ε̃n be a Rademacher sequence independent of X1 , . . . , Xn , then " # " # n n X X E sup (f (Xi ) − Ef (Xi )) ≤ 2E sup ε̃i f (Xi ) . (B.10) f ∈F i=1 f ∈F i=1 Theorem B.2 (Contraction Theorem, Ledoux and Talagrand (1991)). Consider the non-random elements x1 , . . . , xn of χ. Let F be a class of real-valued functions on χ. Consider the Lipschitz continuous functions ρi : R → R with Lipschitz constant L, i.e. |ρi (µ) − ρi (µ̃)| ≤ L |µ − µ̃| , for all µ, µ̃ ∈ R. Let ε̃1 , . . . , ε̃n be a Rademacher sequence . Then for any function f ∗ : χ → R, we have " # " # n n X X E sup ε̃i {ρi (f (xi )) − ρi (f ∗ (xi ))} ≤ 2E Lsup ε̃i (f (xi ) − f ∗ (xi )) . f ∈F i=1 f ∈F i=1 (B.11) Elsener and van de Geer/Robust Low-Rank Matrix Estimation 41 Theorem B.3 (Bousquet’s Concentration Theorem, Bousquet (2002)). Suppose that for all i = 1, . . . , n and for all f ∈ F n E [f (Xi )] = 0,   1X sup E f 2 (Xi ) ≤ T 2 . n i=1 f ∈F Assume further for a constant D > 0 and for all f ∈ F that kf k∞ ≤ D. Define n Z := sup f ∈F 1X (f (Xi ) − E [f (Xi )]) . n i=1 Then we have for all t > 0 r P Z ≥ 2EZ + T 2t 4tD + n 3n ! ≤ exp(−t). B.4. On the distribution of the errors In this section we discuss the consequences arising from the assumption that the distribution of the errors is symmetric around 0. Let F be the distribution function of the errors. For purposes of illustration, we discuss the location model. The case of low-rank matrix estimation then follows easily. The location model is as follows X = µ∗ + ε, (B.12) where µ∗ is some fixed real number such that |µ∗ | ≤ η and ε is additive noise with symmetric (around 0) distribution. Lemma B.6. Assume that f is the density with respect to Lebesgue measure of the errors. Suppose further that f (u) > 0 for all |u| ≤ 2η. Define µ01 = arg min E [|X − µ|] . (B.13) µ∗ = µ01 . (B.14) |µ|≤η Then, Proof. We first notice that µ01 is the median of the distribution of X. Since the distribution is continuous and the density positive everywhere the median is unique. Since the distribution of the errors is symmetric around 0 the distribution of X is symmetric around µ∗ . This implies that µ∗ must be the median. But since the median is unique we must have µ∗ = µ01 . Elsener and van de Geer/Robust Low-Rank Matrix Estimation 42 Lemma B.7. Assume that the distribution function of the errors satisfies F (u + κ) − F (u − κ) ≥ 1/C12 for all |u| ≤ 2η and κ ≤ 2η. (B.15) Define µ02 = arg min E [ρH (X − µ)] , (B.16) |µ|≤η where ρH is the Huber loss as defined in the main text. Then, µ∗ = µ02 . (B.17) Proof. We notice that the first derivative of the Huber loss evaluated in X − µ02 is given by   −2(X − µ02 ), if |X − µ02 | ≤ κ 0 −2κ, if X − µ02 > κ ρ̇H (X − µ2 ) = (B.18)  2κ, if X − µ02 < −κ. By straightforward computation   E ρ̇H (X − µ02 ) = 2 Z κ+µ02 −µ∗ F (ε)dε − 2κ = 0. −κ+µ02 −µ∗ We now use the symmetry of the distribution of the errors. This translates to F (ε) = 1 − F (−ε). (B.19) This implies Z κ+µ∗ −µ02 F (ε̃)dε̃ = κ. −κ+µ∗ −µ02 On the other hand, we also have that Z κ+µ02 −µ∗ F (ε)dε = κ. −κ+µ02 −µ∗ By changing the variables in the previous integrals we arrive at Z κ F (ε + µ02 − µ∗ ) − F (ε + µ∗ − µ02 )dε = 0. −κ The previous integral is always larger than 0 by assumption unless µ∗ = µ02 . Elsener and van de Geer/Robust Low-Rank Matrix Estimation 43 B.5. Proof of Lemma 4.1 in the main text Proof of Lemma 4.1 in the main text. The proof of this lemma is analogous to the first part of the proof of Corollary 2 in Negahban and Wainwright (2012). Take σ > 0 such that  s = max k ∈ {1, . . . , q} |Λ0k > σ . Then, we have B − nuclear = q X Λk k=s+1 q X Λk σ k=s+1  r q X Λk ≤σ σ =σ k=s+1 ≤ σ 1−r ρrr . Moreover, we have sσ r = σ r s X k=1 1{Λ0k >σ} = σr s X k=1 1 Λ0k r σ  >1 ≤ σr s  0 r X Λ k k=1 σ ≤ ρrr , where Λ0k denotes a singular value of the matrix B 0 . Therefore we obtain s ≤ σ −r ρrr . References Beck, A. and Teboulle, M. (2009). Gradient-based algorithms with applications to signal recovery problems. Convex optimization in signal processing and communications. 42–88. MR2767564 Bousquet, O. (2002). A Bennett concentration inequality and its application to suprema of empirical processes. C. R. Math. Acad. Sci. Paris 334 495–500. MR1890640 Bühlmann, P. and van de Geer, S. (2011). Statistics for High-Dimensional Data: Methods, Theory and Applications. Springer Series in Statistics. Springer, Heidelberg. MR2807761 Cambier, L., Absil, P-A.(2016). Robust low-rank matrix completion by Riemannian optimization SIAM J. Sci. Comput. 38 S440-S460. MR3565571 Candès, E. J., Li, X., Ma, Y. and Wright, J. (2011). Robust Principal Component Analysis? J. ACM 58 11. MR2811000 Elsener and van de Geer/Robust Low-Rank Matrix Estimation 44 Candès, E. J. and Plan, Y. (2010). Matrix Completion with Noise Proceedings of the IEEE 98 925–936. Chandrasekaran, V., Sanghavi, S., Parrilo, P. A. and Willsky, A. S. (2011). Rank-sparsity incoherence for matrix decomposition. SIAM J. Optim. 21 572–596. MR2817479 Chen, Y., Jalali, A., Sanghavi, S. and Caramanis, C. (2013). Low-rank matrix recovery from errors and erasures. IEEE Trans. Inform. Theory 59 4324–4337. CVX Research, I. (2012). CVX: Matlab Software for Disciplined Convex Programming, version 2.0. http://cvxr.com/cvx. Foygel, R., Shamir, O., Srebro, N. and Salakhutdinov, R. R. (2011). Learning with the weighted trace-norm under arbitrary sampling distributions. Advances in Neural Information Processing Systems 2133–2141. Klopp, O., Lounici, K. and Tsybakov, A. B. (2016). Robust matrix completion. Probab. Theory Related Fields. 1–42 Koltchinskii, V., Lounici, K. and Tsybakov, A. B. (2011). Nuclear-norm penalization and optimal rates for noisy low-rank matrix completion. Ann. Statist. 39 2302–2329. MR2906869 Lafond, J. (2015). Low rank matrix completion with exponential family noise. J. Mach. Learn. Res.: Workshop and Conference Proceedings. COLT 2015 Proceedings 40 1–20. Lange, K. (2013). Optimization. Springer Texts Statist. Springer, New York. MR3052733 Ledoux, M. and Talagrand, M. (1991). Probability in Banach Spaces: Isoperimetry and Processes. Ergeb. Math. Grenzgeb. 23. Springer-Verlag, Berlin. MR1102015 Li, X. (2013). Compressed sensing and matrix completion with constant proportion of corruptions. Constr. Approx. 37 73–99. MR3010211 MovieLens 100k Dataset (1998). Available at http://grouplens.org/ datasets/movielens/100k/. MovieLens 1m Dataset (2003). Available at http://grouplens.org/ datasets/movielens/1m/. Negahban, S. and Wainwright, M. J. (2011). Estimation of (near) low-rank matrices with noise and high-dimensional scaling. Ann. Statist. 39 1069–1097. MR2816348 Negahban, S. and Wainwright, M. J. (2012). Restricted strong convexity and weighted matrix completion: Optimal bounds with noise. J. Mach. Learn. Res. 13 1665–1697. MR2930649 Parikh, N. and Boyd, S. (2014). Proximal Algorithms. Foundations and Trends in optimization 1 123–231. Rohde, A. and Tsybakov, A. B. (2011). Estimation of high-dimensional lowrank matrices. Ann. Statist. 39 887–930. MR2816342 Srebro, N., Rennie, J. and Jaakkola, T. S. (2005). Maximum-margin matrix factorization. Proceedings of the NIPS Conference 1329–1336. Vancouver, Canada. Srebro, N. and Shraibman, A. (2005). Rank, trace-norm and max-norm. In Elsener and van de Geer/Robust Low-Rank Matrix Estimation 45 Learning Theory 545–560. Springer. MR2203286 Tibshirani, R. (1996). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. Series B (Methodological) 267–288. MR1379242 Unlocbox (2016). Unlocbox: (Matlab convex optimization toolbox version 1.7.3). https://lts2.epfl.ch/unlocbox/. van de Geer, S. A. (2000). Applications of Empirical Process Theory 91. Cambridge University Press, Cambridge. MR1739079 van de Geer, S. (2001). Least squares estimation with complexity penalties. Math. Methods Statist. 10 355–374. MR1867165 van de Geer, S. (2016). Estimation and Testing under Sparsity: École d’Été de Probabilités de Saint-Flour XLV-2015. Lecture Notes in Mathematics. Springer. MR3526202 van der Vaart, A. W. and Wellner, J. A. (1996). Weak Convergence and Empirical Processes. Springer Series in Statistics, Springer-Verlag, New York. MR1385671 Watson, G. A. (1992). Characterization of the Subdifferential of some matrix norms. Linear Algebra and its Applications 170 33–45. MR1160950
10math.ST
arXiv:1710.10710v2 [cs.CV] 16 Nov 2017 On Pre-Trained Image Features and Synthetic Images for Deep Learning Stefan Hinterstoisser X Vincent Lepetit Université de Bordeaux Paul Wohlhart X [email protected] [email protected] [email protected] Kurt Konolige X [email protected] Abstract Deep Learning methods usually require huge amounts of training data to perform at their full potential, and often require expensive manual labeling. Using synthetic images is therefore very attractive to train object detectors, as the labeling comes for free, and several approaches have been proposed to combine synthetic and real images for training. In this paper, we show that a simple trick is sufficient to train very effectively modern object detectors with synthetic images only: We ’freeze’ the layers responsible for feature extraction to generic layers pre-trained on real images, and train only the remaining layers with plain OpenGL rendering. Our experiments with very recent deep architectures for object recognition (Faster-RCNN, R-FCN, MaskRCNN) and image feature extractors (InceptionResnet and Resnet) show this simple approach performs surprisingly well. Figure 1. We show that feature extractor layers from modern object detectors pre-trained on real images can be used on synthetic images to learn to detect objects in real images. The top-left image shows the CAD model we used to learn to detect the object in the three other images. 1. Introduction The capability of detecting objects in challenging environments is a key component for many computer vision and robotics task. Current leading object detectors—FasterRCNNs [19], SSD [13], RFCN [4], Yolo9000 [18]—all rely on convolutional neural networks. However, to perform at their best, they require huge amounts of labeled training data, which is usually time consuming and expensive to create. Using synthetic images is therefore very attractive to train object detectors, as the labeling comes for free. Unfortunately, synthetic rendering pipelines are usually unable to reproduce the statistics produced by their real-world counterparts. This is often referred to as the ’domain gap’ between synthetic and real data and the transfer from one to another usually results in deteriorated performance, as observed in [26] for example. Several approaches have tried to overcome this domain gap. For instance, [5, 7, 17] use synthetic images in addition to real ones to boost performance. While this usually results in good performance, it is still dependent on real world labeled data. Transfer learning approaches are also possible [21, 3, 6], however they also require real images of the objects to detect. [8, 1] create photo-realistic graphics renderings and [8, 1, 7, 27] compose realistic scenes which both shows to improve performance. Unfortunately, these strategies are usually difficult to engineer, need domain specific expertise and require some additional data such as illumination information and scene labeling to create realistic scenes. [26] uses ’domain randomization’ to narrow the gap. While this has shown very promising results, it 1 Proposal Generator Proposal Generator Objectness Classification Objectness Classification Box Regression (vgg, incep+on, resnet, etc) Box Regression (vgg, incep+on, resnet, etc) Box Classifier Feature Extractor Multiway Classification Box Classifier Feature Extractor Box Refinement Faster-RCNN Multiway Classification Box Refinement R-FCN Figure 2. The architectures of two recent object detectors with their feature extractors isolated as described in [12] (Figure taken from [12]). has mainly been demonstrated to work with simple objects and scenarios. Other works [22, 2] use Generative Adversarial Networks (GANs) to remove the domain gap, however, GANs are still very brittle and hard to train, and to our knowledge they have not been used for detection tasks yet. In this paper we consider a simple alternative solution. As shown by [12] and illustrated in Fig. 2, many of today’s modern feature extractors can be split into a feature extractor and some remaining layers that depend on the metaarchitecture of the detector. Our claim is twofold: a) the pre-trained feature extractors are already rich enough and do not need to be retrained when considering new objects to detect; b) when applied to an image synthetically generated using simple rendering techniques, the feature extractors work as a “projector” and output image features that are close to real image features. Therefore, by freezing the weights of feature extractor pre-trained on real data and by only adapting the weights of the remaining layers during training, we are able to train state-of-the-art object detectors purely on synthetic data. While using pre-trained layers for feature extraction is not new (for example, VGG [23] has been used extensively for this purpose), our contribution is therefore to show that this approach is also advantageous when training with synthetic data. We also show in this paper that this observation is fairly general and we give both qualitative and quantitative experiments for different detectors—FasterRCNN [19], RFCN [4] and Mask-RCNN [9]—and different feature extraction networks—InceptionResnet [25] and Resnet101 [10]. Furthermore, we show that different cameras have different image statistics that allow different levels of performance when re-trained on synthetic data. We will demonstrate that performance is significantly boosted for these cameras if our simple approach is applied. In the remainder of the paper we first discuss related work, describe how we generate synthetic data, demonstrate the domain gap between synthetic and real data, and show how to boost object detection by freezing the pre-trained feature extractor during training. Finally, we show qualita- tive and quantitative experiments. 2. Related Work Mixing real and synthetic data to improve detection performance is a well established process. Many approaches such as [5, 7, 24], to mention only very recent ones, have shown the usefulness of adding synthetic data when real data is limited. In contrast to [5, 7] which use real masked image patches, [24] uses 3D CAD models and a structurepreserving deformation pipeline to generate new synthetic models to prevent overfitting. However, while these approaches obtain better results compared to detectors trained on real data only, they still require real data. In order to avoid expensive labeling in terms of time and money, some approaches learn object detectors purely from synthetic data. For instance, a whole line of work uses photo-realistic rendering [1, 8] and complex scene composition [8, 1, 7, 27] to achieve good results, and [15] stresses the need for photo-realistic rendering. Some approaches even use physics engines to enable realistic placing of objects [14]. This requires significant resources and highly elaborate pipelines that are difficult to engineer and need domain specific expertise [20]. Furthermore, additional effort is needed to collect environment information like illumination information [1] to produce photo-realistic scenes. For real scene composition, one also needs to parse real background images semantically in order to place the objects meaningful into the scene. This usually needs manual post-processing or labeling which is both expensive and time consuming. While these graphics based rendering approaches already show some of the advantages of learning from synthetic data, they usually suffer from the domain gap between real and synthetic data. To address this, a new line of work [5, 7, 17] moves away from graphics based renderings to composing real images. The underlying theme is to paste masked patches of objects into real images, and thus reducing the dependence on graphics renderings. This approach has the advantage that the images of the objects are already in the right domain— the domain of real images—and thus, the domain gap be- tween image compositions and real images is smaller than the one of graphics based rendering and real images. While this has shown quite some success, the amount of data is still restricted to the number of images taken from the object in the data gathering step and therefore does not allow to come up with new views of the object. Furthermore, it is not possible to generate new illumination settings or proper occlusions since shape and depth are usually not available. In addition, this approach is dependent on segmenting out the object from the background which is prone to segmentation errors when generating the object masks. Recently, several approaches [22, 2] tried to overcome the domain gap between real and synthetic data by using generative adversarial networks (GANs). This way they produced better results than training with real data. However, GANs are hard to train and up to now, they have mainly shown their usefulness on regression tasks and not on detection applications. Yet another approach is to rely on transfer learning [21, 3, 6], to exploit a large amount of available data in a source domain, here the domain of synthetic images, to correctly classify data from the target domain, here the domain of real images, for which the amount of training data is limited. This is typically done by tighting two predictors together, one trained on the source domain, the other on the target domain or by training a single predictor on the two domains. This is a general approach as the source and target domains can be very different, compared to synthetic and real images, which are more related to each other. In this paper, we exploit this relation by applying the same feature extractor to the two domains. However, in contrast to [21, 3, 6] we do not need any real images of the objects of interest in our approach. 3. Method In this section, we will present our simple synthetic data generation pipeline and describe how we change existing state-of-the-art object detectors to enable them to learn from synthetic data. In this context, we will focus on object instance detection. Throughout this paper, we will mainly rely on Faster-RCNN [19] since it demonstrated the best detection performance among a whole family of object detectors as shown in [12]. However, in order to show the generability of our approach, we will also present additional quantitative and qualitative results of other detectors (RFCN [4] and Mask-RCNN [9]) in Section 4.7. 3.1. Synthetic Data Generation Pipeline Similar to [5], we believe that while global consistency can be important, local appearance—so called patch-level realism—is also important. The term patch-level realism refers to the observation that the content of the bounding box framing the rendered object looks realistic. This principle is an important assumption for our synthetic data generation pipeline, shown in Fig. 3. For each object, we start by generating a large set of poses uniformly covering the pose space in which we want to be able to detect the corresponding object. As in [11], we generate rotations by recursively dividing an icosahedron, the largest convex regular polyhedron. We substitute each triangle into four almost equilateral triangles, and iterate several times. The vertices of the resulting polyhedron give us then the two out-of-plane rotation angles for the sampled pose with respect to the coordinate center. In addition to these two out-of-plane rotations, we also use equally sampled in-plane rotations. Furthermore, we sample the scale logarithmically to guarantee an approximate linear change in pixel coverage of the reprojected object between consecutive scale levels. The object is rendered at a random location in a randomly selected background image using a uniform distribution. The selected background image is part of a large collection of highly cluttered real background images taken with the camera of choice where the objects of interest are not included. To increase the variability of the background image set, we randomly swap the three background image channels and randomly flip and rotate the images (0◦ , 90◦ , 180◦ and 270◦ ). We also tried to work without using real background images and experimented with backgrounds only exhibiting one randomly chosen color, however, that didn’t lead to good results. We use plain OpenGL with simple Phong shading [16] for rendering where we allow small random perturbations of the ambient, the diffuse and the specular parameters. We also allow small random perturbations of the light color. We add random Gaussian noise to the rendered object and blur it with a Gaussian kernel, including its boundaries with the adjacent background image pixels to better integrate the rendering with the background. We also experimented with different strategies for integrating the rendered object in images as [5], however this did not result in significant performance improvements. 3.2. Freezing a Pre-Trained Feature Extractor As shown in [12] and illustrated in Fig. 2, many state-ofthe-art object detectors including Faster-RCNN [19], MaskRCNN [9], and R-FCN [4] can be decoupled as a ’metaarchitecture’ and a feature extractor such as VGG [23], Resnet [10], or InceptionResnet [25]. While the meta-architecture defines the different modules and how they work together, the feature extractor is a deep network cut at some selected intermediate convolutional level. The remaining part can be used as part of the multi-way classification+localization of the object detector. As discussed in the introduction, for the feature extractor, we use frozen weights pre-learned on real images, to enable training the remaining part of the architecture on synthetic 3D Poses Random Light Color 3D CAD Model Large collection of highly textured background images (random channel swap and rotation applied) Random Illumination Random Noise Blurring Figure 3. Our synthetic data generation pipeline. For each generated 3D pose and object, we render the object over a randomly selected cluttered background image using OpenGL and the Phong illumination model [16]. We use randomly perturbed light color for rendering and add image noise to the rendering. Finally, we blur the object with a Gaussian filter. We also compute a tightly fitting bounding box using the object’s CAD model and the corresponding pose. eras, as the quality of the camera influences the recognition results as we will show. The rest of the section reports our experiments and the conclusions we draw from them. 4.1. Objects and 3D CAD models (a) Real Objects (b) 3D CAD Models Figure 4. (a) The real objects used in our experiments and (b) their CAD models. We chose our objects carefully to represent different colors and 3D shapes and to cover different fields of applications (industrial objects, household objects, toys). images only. In practice, we use the Google’s public available OpenSource version [12] of Faster-RCNN and RFCN, and our own implementation of Mask-RCNN. The ’frozen’ parts are taken according to [12], by training InceptionResnet and Resnet101 on a classification task on the ImageNetCLs dataset. We freeze InceptionResnet (v2) after the repeated use of block17 and right before layer Mixed 7a and Resnet101 after block3. All other remaining parts of the networks are not ’frozen’, meaning their weights are free to adapt when we train the detector on synthetic images. We evaluate this approach in the next section. 4. Experiments In this section, we first describe the dataset we created for these evaluations, made of synthetic and real images of 10 different objects. We also considered two different cam- As shown in Fig. 4, we carefully selected the objects we used in our experiments: We tried to represent different colors, textures (homogeneous color versus highly textured), 3D shapes and material properties (reflective versus nonreflective). Except for the mug and the bottle, the 3D shapes of the objects we selected can look very different from different views. We also tried to consider objects from different application fields (industrial objects, household objects, toys). For each real object we have a textured 3D CAD model at hand which we generated using our in-house 3D scanner. 4.2. Cameras We consider two cameras, an AsusXtionPROLive and a PtGreyBlackfly. For each camera, we generated a training dataset and an evaluation dataset. The training datasets consist of approximatively 20K and the evaluation datasets of approximatively 1K manually labeled real world images. Each sample image contains one of the 10 objects shown in Fig. 4 in challenging environments: heavy background clutter, illumination changes, etc. In addition, we made sure that each object is shown from various poses as this is very important for object instance detection. Furthermore, for each dataset all objects have the same amount of images. 4.3. Freezing the Feature Extractor Fig. 5 shows that when Faster-RCNN is trained on synthetic images and tested on real images, it performs signif- 1.0 0.6 0.4 0.20 0.2 0.15 0.0 InceptionResnet Resnet101 Prec [mAP] 0.8 synthetic re-trained synthetic frozen features real 0.10 0.00 0 20 40 60 80 100 120 140 Euclidean Distance of generated Image Features [from Real and Synthetic Images] Figure 6. Top: Two examples of pairs of a real image and a synthetic one for the same object under the same pose. Bottom: Distributions of the Euclidean distances between image features generated for the real images and the corresponding synthetic images. See text in Section 4.3 for details. 0.6 0.4 0.2 0.0 synthetic re-trained synthetic frozen features 0.05 (a) PtGreyBlackfly 1.0 Relative Frequency Prec [mAP] 0.8 synthetic re-trained synthetic frozen features real InceptionResnet Resnet101 (b) AsusXtionPROLive Figure 5. The effect of freezing the pre-trained feature extractor, for two different cameras. Training the feature extractors on synthetic images performs poorly, and totally fails in the case of the AsusXtionPROLive camera. When using feature extractors pretrained on real images without retraining them, the performances of detectors trained on synthetic data are almost as good as when training them on real data, except when ResNet101 is used with images from the AsusXtionPROLive camera. icantly worse than when trained on real data. By contrast, when we freeze the feature extractor’s weights during training to values pre-trained on real images, and only train the remaining parts of the detector, we get a significant performance boost. We even come close to detectors trained purely on real world data, as we typically obtained up to 95% of the performance when trained on synthetic data. To get a better intuition why freezing the feature extractor gives significant better results than retraining it on synthetic data, we performed the following experiment: We created 1000 image pairs with different objects under various poses. Each image pair consists of one image that shows the real object and of another image where we superpose a rendering of the object’s CAD model on top of the real image, under the same pose as the real object. The top of Fig. 6 shows two examples. We then compared the distributions of the Euclidean distances between image features generated for the real images and the corresponding synthetic images. As we can see at the bottom of Fig. 6, the distribution is much more clustered around 0 when the features are computed using a frozen feature extractor pre-trained on real images (red) compared to the distribution obtained when the pre-trained feature extractor is finetuned on synthetic images (blue). 4.4. Freezing the Feature Extractor at Different Layers We also performed experiments where we freeze the feature extractor at different intermediate layers i.e. layers lying between the input and the output layers of the feature extractor as specified in Section 3.2. As can be seen in Fig. 7, freezing the full feature extractor always performs best. For the AsusXtionPROLive camera, freezing the feature extractor on intermediate levels even results in a dramatic loss of performance. 4.5. On Finetuning the Feature Extractor One may wonder if the domain shift between synthetic and real images still leads to decreased performance after the detector was trained for some time with the pre-trained feature extractor frozen. One could argue that all remaining detector weights have already started to converge and therefore, the domain shift is far less influential. As a result, 1.0 0.8 0.6 Prec [mAP] Prec [mAP] 0.8 1.0 synthetic re-trained synthetic frozen features at layer Mixed_5b synthetic frozen features at layer Mixed_6a synthetic frozen features 0.4 0.2 0.0 synthetic re-trained synthetic frozen features after block1 synthetic frozen features after block2 synthetic frozen features 0.6 0.4 0.2 PtGrey 0.0 Asus Ptgrey a) InceptionResnet [25] Asus b) Resnet101 [10] Figure 7. We freeze features at different layers of InceptionResnet [25] and Resnet101 [10]. We can see that freezing the full feature extractor performs best (yellow). inc_1200K inc_900K inc_400K inc_frozen_features res_1200K res_900K res_400K res_frozen_features 0.7 Precision [mAP] 0.6 0.5 0.4 0.3 inc_1200K inc_900K inc_400K inc_frozen_features res_1200K res_900K res_400K res_frozen_features 0.6 0.5 0.4 0.3 0.2 0.2 0.1 0.1 0.0 0.7 Precision [mAP] 0.8 0 500000 1000000 Step 1500000 2000000 a) PtGreyBlackfly 0.0 0 500000 1000000 Step 1500000 2000000 b) AsusXtionPROLive Figure 8. Finetuning the feature extractor after 400K, 900K and 1200K steps where the pre-trained feature extractor was frozen for the PtGreyBlackfly and the AsusXtionPROLive cameras. We show results for the InceptionResnet [25] and Resnet101 [10] architectures. the frozen feature extractor could be unfrozen to finetune its weights to adapt to the learning task. However, as we show in Fig. 8, this is not true. Even after 1200K training steps where the feature extractor was frozen and the detection performance starts to plateau the detector’s performance degrades significantly if the frozen feature extractor is unfrozen and its weights are finetuned. Table 1 gives the corresponding numbers. 4.6. Ablation Experiments In the following experiments, we investigated the influence of the single steps in the image generation pipeline. For all these experiments we used InceptionResnet [25] as feature extractor. The feature extractor itself was frozen. We found out that blurring the rendered object and its adjacent image pixels gives a huge performance boost. Adding noise to the rendered object or enabling random light color did not give much improvement in performance and its influence depends on the camera used. As already mentioned, we also experimented with different blending strategies as in [5], that is using different blending options in the same dataset: no blending, Gaussian blurring and Poisson blending, however we could not find significant performance improvements. We also investigated what happens if we use the internal camera parameter of our target camera but a background dataset taken with another camera. As we can see in Fig. 9 results seem to stay approximately the same for the PtGreyBlackfly camera and seem to improve for the AsusXtionPROLive camera. The later seems reasonable since the background images taken with the PtGreyBlackfly camera are more cluttered and are showing more background variety than the background images taken with the AsusXtionPROLive camera. These results suggest that the camera images can be taken from an arbitrary source and we only have to make sure that a high amount of background variety is provided. 4.7. RFCN and MASK-RCNN To show the generality of our approach, we also performed several addition experiments. Fig. 10 shows the results for RFCN [4] trained only on synthetic data with the synthetic frozen 400K 900K 1200K Asus Prec [mAP] Prec [[email protected]] Prec [[email protected]] Acc [@100] .000/.000 .000/.000 .000/.000 .000/.010 .617/.171 .948/.385 .733/.130 .686/.256 .000/.000 .000/.000 .000/.000 .000/.000 .000/.000 .000/.000 .000/.000 .000/.000 .061/.006 .114/.016 .064/.004 .079/.007 .719/.681 .983/.988 .872/.844 .772/.742 PtGrey real Prec [mAP] Prec [[email protected]] Prec [[email protected]] Acc [@100] .374/.243 .537/.410 .431/.239 .461/.324 .725/.687 .971/.966 .886/.844 .771/.736 .426/.317 .606/.491 .495/.355 .483/.384 .514/.485 .717/.685 .593/.564 .577/.551 .709/.626 .936/.912 .835/.756 .768/.695 .764/.742 .987/.987 .908/.916 .808/.804 Table 1. Outcomes of all our experiments. We give numbers for InceptionResnet [25] / Resnet101 [10]. Except for the experiments with real data (last column), all experiments were performed on synthetic data only. We emphasized the best results trained on synthetic data. Prec [mAP] 0.8 0.6 w/o Postprocessing Noise Colored Light Noise & Colored Light Blur Blur & Noise Blur & Colored Light Blur & Noise & Colored Light Asus Background Images 1.0 0.8 Prec [mAP] 1.0 0.4 0.6 0.4 0.2 0.2 0.0 0.0 a) PtGreyBlackfly w/o Postprocessing Noise Colored Light Noise & Colored Light Blur Blur & Noise Blur & Colored Light Blur & Noise & Colored Light PtGrey Background Images b) AsusXtionPROLive Figure 9. Influences of the different building blocks for synthetic rendering for the PtGreyBlackfly and the AsusXtionPROLive cameras. Results were obtained with InceptionResnet [25] as the feature extractor. Blurring is clearly a useful yet simple operation to apply to the synthetic images to improve the results. 1.0 Prec [mAP] 0.8 synthetic re-trained synthetic frozen features real 0.6 0.4 0.2 0.0 RFCN + InceptionResnet Mask-RCNN + InceptionResnet Figure 10. Results using RFCN [4] on the PtGreyBlackfly dataset. Freezing the feature extractor boosts performance significantly on this method as well. We observe the same results if we train MaskRCNN on the AsusXtionPROLive dataset. feature extractor frozen and compares them with those using RFCN trained on real data and and those using RFCN re-trained on synthetic data. Freezing the feature extractor helps to unlock significant performance improvements also here. Fig. 10 also shows quantitative results of MaskRCNN [9] trained only on synthetic data with the feature extractor frozen. Similar to what we observed with FasterRCNN and RFCN, freezing the feature extractor significantly boosts the performance when trained on synthetic data. Fig. 12 shows that we are able to detect objects in highly cluttered environments under various poses and get reasonable masks. This result is especially important since it shows that exhaustive (manual) pixel labeling is made redundant by training from synthetic data. 4.8. Qualitative Results Fig. 11 shows some qualitative results on images exhibiting several of the 10 objects we considered in various poses with heavy background clutter and illumination changes. We use Faster-RCNN [19] with the InceptionRes- Figure 11. Results of Faster-RCNN trained on synthetic images only with the feature extractor frozen. The objects are detected in highly cluttered scenes and many different instances are available in one image. Note that the different objects are seen in different arbitrary poses. Figure 12. Results of Mask-RCNN [9] trained on synthetic images only with the feature extractor frozen. The images were taken with the AsusXtionPROLive camera in a highly cluttered environment under various poses. Figure 13. Objects with similar shapes and colors detected in challenging environments. The detector was trained on synthetic images only. net [25] as feature extractor and trained the rest of the network on synthetic images only. Fig. 12 shows results of Mask-RCNN [9] trained on synthetic images only. Fig. 13 shows some other objects trained with the method presented in this paper. 5. Conclusion We have shown that by freezing a pre-trained feature extractor we are able to train state-of-the-art object detectors on synthetic data only. The results are close to approaches trained on real data only. While we have demonstrated that object detectors re-trained on synthetic data lead to poor performances and that images from different cameras lead to different results, freezing the feature extractor always gives a huge performance boost. The results of our experiments suggest that simple rendering is sufficient to achieve good performances and that complicated scene composition does not seem necessary. Training from rendered 3D CAD models allows us to detect objects from all possible viewpoints which makes the need for a real data generation and expensive manual labeling pipeline redundant. Acknowledgments: The authors thank Google’s VALE team for tremendous support using the Google Object Detection API, especially Jonathan Huang, Alireza Fathi, Vivek Rathod, and Chen Sun. In addition, we thank Kevin Murphy, Vincent Vanhoucke, Konstantinos Bousmalis and Alexander Toshev for valuable discussions and feedback. References [1] H. A. Alhaija, S. K. Mustikovela, L. Mescheder, A. Geiger, and C. Rother. Augmented Reality Meets Deep Learning for Car Instance Segmentation in Urban Scenes. In British Machine Vision Conference, 2017. 1, 2 [2] K. Bousmalis, N. Silberman, D. Dohan, D. Erhan, and D. Krishnan. Unsupervised Pixel-Level Domain Adaptation with Generative Adversarial Networks. In Conference on Computer Vision and Pattern Recognition, 2017. 2, 3 [3] K. Bousmalis, G. Trigeorgis, N. Silberman, D. Krishnan, and D. Erhan. Domain separation networks. In Advances in Neural Information Processing Systems, 2016. 1, 3 [4] J. Dai, Y. Li, K. He, and J. Sun. R-FCN: Object Detection via Region-Based Fully Convolutional Networks. In Advances in Neural Information Processing Systems, 2016. 1, 2, 3, 6, 7 [5] D. Dwibedi, I. Misra, and M. Hebert. Cut, Paste and Learn: Surprisingly Easy Synthesis for Instance Detection. In arXiv Preprint, 2017. 1, 2, 3, 6 [6] Y. Ganin, E. Ustinova, H. Ajakan, P. Germain, H. Larochelle, F. Laviolette, M. Marchand, and V. Lempitsky. Domainadversarial training of neural networks. In Journal of Machine Learning Research, 2016. 1, 3 [7] G. Georgakis, A. Mousavian, A. C. Berg, and J. Kosecka. Synthesizing Training Data for Object Detection in Indoor Scenes. In Robotics: Science and Systems Conference, 2017. 1, 2 [8] A. Gupta, A. Vedaldi, and A. Zisserman. Synthetic Data for Text Localisation in Natural Images. In Conference on Computer Vision and Pattern Recognition, 2016. 1, 2 [9] K. He, G. Gkioxari, P. Dollár, and R. Girshick. Mask RCNN. In arXiv Preprint, 2017. 2, 3, 7, 8 [10] K. He, X. Zhang, S. Ren, and J. Sun. Deep Residual Learning for Image Recognition. In Conference on Computer Vision and Pattern Recognition, 2016. 2, 3, 6, 7 [11] S. Hinterstoisser, V. Lepetit, S. Ilic, S. Holzer, G. Bradski, K. Konolige, and N. Navab. Model Based Training, Detection and Pose Estimation of Texture-Less 3D Objects in Heavily Cluttered Scenes. In Asian Conference on Computer Vision, 2012. 3 [12] J. Huang, V. Rathod, C. Sun, M. Zhu, A. Korattikara, A. Fathi, I. Fischer, Z. Wojna, Y. Song, S. Guadarrama, and K. Murphy. Speed and Accuracy Trade-Offs for Modern Convolutional Object Detectors. In Conference on Computer Vision and Pattern Recognition, 2017. 2, 3, 4 [13] W. Liu, D. Anguelov, D. Erhan, C. Szegedy, S. E. Reed, C. Fu, and A. C. Berg. SSD: Single Shot Multibox Detector. In European Conference on Computer Vision, 2016. 1 [14] C. Mitash, K. E. Bekris, and A. Boularias. A Self-Supervised Learning System for Object Detection Using Physics Simulation and Multi-View Pose Estimation. In International Conference on Intelligent Robots and Systems, 2017. 2 [15] Y. Movshovitz-attias, T. Kanade, and Y. Sheikh. How Useful is Photo-Realistic Rendering for Visual Learning? In European Conference on Computer Vision, 2016. 2 [16] B. T. Phong. Illumination for Computer Generated Pictures. In Communications of the ACM, 1975. 3, 4 [17] M. Rad and V. Lepetit. Bb8: A Scalable, Accurate, Robust to Partial Occlusion Method for Predicting the 3D Poses of Challenging Objects Without Using Depth. In International Conference on Computer Vision, 2017. 1, 2 [18] J. Redmon and A. Farhadi. Yolo9000: Better, Faster, Stronger. In Conference on Computer Vision and Pattern Recognition, 2017. 1 [19] S. Ren, K. He, R. Girshick, and J. Sun. Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks. In Advances in Neural Information Processing Systems. 2015. 1, 2, 3, 7 [20] S. R. Richter, V. Vineet, S. Roth, and V. Koltun. Playing for Data: Ground Truth from Computer Games. In European Conference on Computer Vision, 2016. 2 [21] A. Rozantsev, M. Salzmann, and P. Fua. Beyond Sharing Weights for Deep Domain Adaptation. In Conference on Computer Vision and Pattern Recognition, 2017. 1, 3 [22] A. Shrivastava, T. Pfister, O. Tuzel, J. Susskind, W. Wang, and R. Webb. Learning from Simulated and Unsupervised Images through Adversarial Training. In Conference on Computer Vision and Pattern Recognition, 2017. 2, 3 [23] K. Simonyan and A. Zisserman. Very Deep Convolutional Networks for Large-Scale Image Recognition. In International Conference for Learning Representations, 2015. 2, 3 [24] H. Su, C. R. Qi, Y. Li, and L. J. Guibas. Render for CNN: viewpoint estimation in images using cnns trained with rendered 3d model views. In ICCV, 2015. 2 [25] C. Szegedy, S. Ioffe, V. Vanhoucke, and A. A. Alemi. Inception-V4, Inception-Resnet and the Impact of Residual Connections on Learning. In American Association for Artificial Intelligence Conference, 2017. 2, 3, 6, 7 [26] J. Tobin, R. Fong, A. Ray, J. Schneider, W. Zaremba, and P. Abbeel. Domain Randomization for Transferring Deep Neural Networks from Simulation to the Real World. In International Conference on Intelligent Robots and Systems, 2017. 1 [27] G. Varol, J. Romero, X. Martin, N. Mahmood, M. J. Black, I. Laptev, and C. Schmid. Learning from Synthetic Humans. In Conference on Computer Vision and Pattern Recognition, 2017. 1, 2
1cs.CV
Estimation of the Hurst and the stability indices of a H-self-similar stable process Thi To Nhu DANG∗, Jacques ISTAS† arXiv:1506.05593v3 [math.ST] 18 Oct 2017 October 19, 2017 Abstract In this paper we estimate both the Hurst and the stability indices of a H-self-similar stable process. More precisely, let X be a H-sssi (self-similar stationary increments) symmetric α-stable process. The process X is observed at points nk , k = 0, . . . , n. Our estimate is based on β-negative power variations with − 21 < β < 0. We obtain consistent estimators, with rate of convergence, for several classical H-sssi α-stable processes (fractional Brownian motion, well-balanced linear fractional stable motion, Takenaka’s process, Lévy motion). Moreover, we obtain asymptotic normality of our estimators for fractional Brownian motion and Lévy motion. Keywords: H-sssi processes; stable processes; self-similarity parameter estimator; stability parameter estimator. Contents 1 Introduction 2 2 Main results 3 3 Examples 3.1 Fractional Brownian motion . . . . . 3.2 SαS-stable Lévy motion . . . . . . . 3.3 Well-balanced linear fractional stable 3.4 Takenaka’s processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4 6 7 8 4 Proofs 4.1 Negative power expectation and auxiliary results 4.1.1 Auxiliary results . . . . . . . . . . . . . . 4.1.2 Proof of Lemma 4.1 . . . . . . . . . . . . 4.1.3 Proof of Theorem 4.1 . . . . . . . . . . . 4.1.4 Proof of Theorem 4.2 . . . . . . . . . . . 4.1.5 Proof of Lemma 4.2 . . . . . . . . . . . . 4.1.6 Proof of Lemma 4.3 . . . . . . . . . . . . 4.2 Proof of Theorem 2.1 . . . . . . . . . . . . . . . . 4.3 Proofs related to Section 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 8 9 10 10 13 19 19 19 23 . . . . . . . . . . motion . . . . . ∗ . . . . The university of Danang, University of Economics, 71 Ngu Hanh Son, Danang, Vietnam. E-mail: [email protected] Laboratoire Jean Kuntzmann, Université de Grenoble Alpes et CNRS, F-38000 Grenoble, France. E-mail: [email protected] † 1 5 Appendix 5.1 Auxiliary results related to Fractional Brownian motion . . . . . . . . . . . . . . . . . . . 5.2 Auxiliary results related to Takenaka’s process . . . . . . . . . . . . . . . . . . . . . . . . 5.3 Auxiliary results related to rate of convergence . . . . . . . . . . . . . . . . . . . . . . . . 31 31 35 36 References 37 1 Introduction Self-similar processes play an important role in probability because of their connection to limit theorems and they are widely used to model natural phenomena. For instance, persistent phenomena in internet traffic, hydrology, geophysics or financial markets, e.g., [9], [17], [21], are known to be self-similar. Stable processes have attracted growing interest in recent years: data with ”heavy tails” have been collected in fields as diverse as economics, telecommunications, hydrology and physics of condensed matter, which suggests using non-Gaussian stable processes as possible models, e.g., [21]. Self-similar α-stable processes have been proposed to model some natural phenomena with heavy tails, as in [21] and references therein. The estimation of various indices of H−sssi α−stable processes has been a problem studied since several decades ago and, even nowadays, it continues to be a challenge. In the case of fractional Brownian motion, the estimation of the self-similarity index H has attracted attention to many authors and many methods have been proposed for solving this problem. Among these, one can mention the quadratic variation method (see e.g. [6], [7], [9], [13]), the p-variation method (see e.g. [8], [18]), the wavelet coefficients method (see e.g. [1], [5], [14]), the log-variation method (see e.g. [9], [12]). Other references, like the works of J. Istas, recommend the use of complex variations for estimating the self-similarity index H of H−sssi processes, but not for estimating α, (see e.g. [11]). For linear fractional stable motions, strongly consistent estimators of the self-similarity index H, based on the discrete wavelet transform of the processes, have been proposed without requirement that α to be known, as in [2], [20], [23], [24]. Thus, regarding the estimation of the stability index α, in [3], the authors presented a wavelet estimator for linear fractional stable motions assuming that H is known. Recently, the corresponding estimation problem of the stability function and the localisability function for a class of multistable processes was considered in the discussion paper of R. Le Guével, see [15], based on some conditions that involve the consistency of the estimators. For linear multifractional stable motions, in [4], the authors presented strongly consistent estimators of the localisability function H(.) and the stability index α using wavelet coefficients when α ∈ (1, 2) and H(.) is a Hölder function smooth enough, with values in a compact subinterval [H, H] of (1/α, 1). The aim of this work is to construct consistent estimators of the self-similar index H and the stable index α of H-sssi, SαS-stable processes using a new framework. In the view of the fact that a stable random variable has a density function, β− negative power variations have expectations and covariances for −1/2 < β < 0. Our estimates are thus based on these variations. This new approach provides estimators of H and α without assumptions on the existence moments of the underlying processes. It also allows us to give an estimator for the self-similarity parameter H without assumption on α and vice versa, we can estimate the stability index α without assumption on H. In other words, using β− negative power variations (−1/2 < β < 0), one can obtain the estimators of H and α separately. We prove the consistency and rates of convergence of the proposed estimators for H and α for the underlying processes under an assumption on the series of covariances of β-negative power variations (−1/2 < β < 0). Then obtained results were illustrated by some classical examples: fractional Brownian motions, SαS-stable Lévy motions, well-balanced linear fractional stable motions and Takenaka’s processes. We then show that the asymptotic normality of our estimates can be ascertained for the proposed estimators when the underlying process is a fractional Brownian motion or an SαS-stable Lévy motion. The remainder part of this article is organized as follows: in the next section, we present the setting, the assumption and main results to construct the estimators of H and α. In Section 3, some classical examples for the obtained results in Section 2 are given: fractional Brownian motions, SαS−stable Lévy 2 motions, well-balanced linear fractional stable motions, Takenaka’s processes. In this Section, we also show the central limit theorem for the cases of the fractional Brownian motion and the SαS−stable Lévy motion. Finally, in Section 4, we gather all the proofs of the main results and of the illustrated examples: Subsection 4.1 contains auxiliary results on negative power variations which play an important role in the proofs in Subsection 4.2 of the main results and in the proofs in Subsection 4.3 of the results of four examples. 2 Main results Let us recall the definition of a H−sssi process and an α− stable process (see e.g., [21]): A real-valued process X (d) • is H-self-similar (H-ss) if for all a > 0, {X(at), t ∈ R} = aH {X(t), t ∈ R}, (d) • has stationary increments (si) if, for all s ∈ R, {X(t + s) − X(s), t ∈ R} = {X(t) − X(0), t ∈ R} (d) where = stands for equality of finite dimensional distributions. A random variable X is said to have a symmetric α-stable distribution (SαS) if there are parameters α ∈ (0, 2] and σ > 0 such that its characteristic function has the form: EeiθX = exp (−σ α | θ |α ) . When σ = 1, a SαS is said to be standard. Let X be a H-sssi, SαS random process with 0 < α ≤ 2. Let L ≥ 1, K ≥ 1 be fixed integers, a = (a0 , . . . , aK ) be a finite sequence with exactly L vanishing first moments, that is for all q ∈ {0, . . . , L}, one has K X kq ak = 0, k=0 K X k=0 kL+1 ak 6= 0 (1) with convention 00 = 1. For example, here we can choose K = L + 1 and (L + 1)! . k!(L + 1 − k)! ak = (−1)L+1−k (2) The increments of X with respect to the sequence a are defined by △p,n X = K X ak X( k=0 k+p ). n (3) We define now an estimator of H. Let β ∈ R, − 12 < β < 0, we set Vn (β) = n−K X 1 |△p,n X|β , n − K + 1 p=0 Wn (β) = nβH Vn (β). (4) (5) Notice that Vn (β) is the empirical mean of order β and Wn (β) is expected to converge to its mean. The estimator of H is defined by bn = H Vn/2 (β) 1 · log2 . β Vn (β) (6) We are now in position to define an estimator of α. We define first auxiliary functions ψu,v , hu,v , ϕu,v before introducing the estimator of α, where u > v > 0. Let ψu,v : R+ × R+ → R be the function defined by ψu,v (x, y) = −v ln x + u ln y + C(u, v), 3 (7)       v 1−u u 1−v where C(u, v) = u−v 2 ln(π) + u ln Γ(1 + 2 ) + v ln Γ( 2 ) − v ln Γ(1 + 2 ) − u ln Γ( 2 ) . Let hu,v : (0, +∞) → (−∞, 0) be the function defined by     u v hu,v (x) = u ln Γ(1 + ) − v ln Γ(1 + ) x x (8) We will prove later that hu,v is bijective. Let ϕu,v : R → [0, +∞) be the function defined by ϕu,v (x) = ( 0 h−1 u,v (x) if x ≥ 0 if x < 0 (9) where hu,v is defined as in (8). Let β1 , β2 be in R such that −1/2 < β1 < β2 < 0. The estimator of α is defined by α̂n = ϕ−β1 ,−β2 (ψ−β1 ,−β2 (Wn (β1 ), Wn (β2 ))) , (10) where ψu,v , ϕu,v are defined as in (7) and (9), respectively. With β ∈ (− 12 , 0) fixed, we will make the following assumption: There exist a sequence {bn , n ∈ N} and a constant C such that lim bn = 0, bn/2 = O(bn ) and n→+∞ lim sup n→+∞ 1 nb2n X k∈Z,|k|≤n |cov(|△k,1 X|β , |△0,1 X|β )| ≤ C 2 . (11) Remark 2.1. The assumption (11) is important to prove the consistency of the estimators of the selfsimilarity and the stability indices. We will see its role in the main theorem below. Now we are in position to present our main results for the estimation of H and α, based on the assumption (11). Theorem 2.1. Let X be a H-sssi, SαS random process that satisfies assumption (11). Also, let b n , α̂n be defined as in (6) and (10), respectively. β, β1 , β2 ∈ R, − 12 < β < 0, − 21 < β1 < β2 < 0 and H Then as n → +∞, one has P P bn − H → H, α̂n − → α, b n − H = OP (bn ), α̂n − α = OP (bn ), where OP is defined by: moreover H •Xn = OP (1) iff for all ǫ > 0, there exists M > 0 such that sup P(|Xn | > M ) < ǫ, n •Yn = OP (an ) means Yn = an Xn with Xn = OP (1). See Subsection 4.2 for the proof of Theorem 2.1. 3 Examples In this section, we study four classical examples: fractional Brownian motion, SαS-stable Lévy motion, well-balanced linear fractional stable motion, Takenaka’s process. For these, we will show in Section 4 that (11) is valid, so that the conclusion of Theorem 2.1 holds. We precise this theorem by providing the rate of convergence defined in (11) and a central limit theorem for the first two cases. 3.1 Fractional Brownian motion Definition 3.1. Fractional Brownian motion Fractional Brownian motion is a centered Gaussian process with covariance given by EX(t)X(s) = EX(1)2 {|s|2H + |t|2H − |s − t|2H }. 2 4 Fractional Brownian motion is a H-sssi 2-stable process (see, e.g., [9], p. 59). We will prove that the condition (11) is satisfied with bn = n−1/2 , then the results in Theorem 2.1 are obtained. Moreover, we can obtain the asymptotic normality of the estimators of the self-similarity index H and the stability index α = 2. Let X be a H fractional Brownian motion with H ∈ (0, 1). We first present the variances Ξ1 , Σ1 for the limit distributions of the central limit theorems for the estimators of H and α. We will mimic the Breuer-Major’s theorem (see e.g., Theorem 7.2.4 in [19]) to define these variances. For β ∈ R, −1/2 < β < 0, let us introduce the following function fβ (x) = △ X where Z0 = √ 0,1 var△0,1 X q β var△0,1 X (|x|β − E|Z0 |β ), (12) . Following Proposition 5.1 in Appendix, we can write fβ in terms of Hermite polynomials in a unique way X fβ (x) = fβ,q Hq (x), (13) q≥d where d is the Hermite rank of fβ and d ≥ 2, ρ(r) = P 2 < +∞. Let q!fβ,q q≥d K P ap ap′ |r + p − p′ |2H p,p′ =0 K P p,p′ =0 ρ1 (r) = K P p,p′ =0 2H ap ap′ |r + p − 2p′ |2H K P ap a |p − p′ p,p′ =0 P q≥d  P Γ1 =  q≥d 2 q!fβ,q 2 q!fβ,q and φ : R+ × R+ → R be defined by P r∈Z q≥d ρq1 (r) φ(x, y) = Then Ξ1 is defined by P ρq (r) r∈Z P , (14) ap ap′ |p − p′ |2H 2 P 2 q!fβ,q q≥d , (15) p′ |2H P r∈Z 2 q!fβ,q P ρq1 (r)      (16) ρq (r). r∈Z x 1 log2 . β y (17) Ξ1 = φ′ (x0 , y0 )Γ1 φ′ (x0 , y0 )t , (18) (x0 , y0 ) = (E|△0,1 X|β , E|△0,1 X|β ). (19) where To define Σ1 , let −1/2 < β1 < β2 < 0, following Proposition 5.1 in Appendix, we can write fβ1 , fβ2 in terms of Hermite polynomials in a unique way fβ1 (x) = X fβ1,q Hq (x), fβ2 (x) = X fβ2 ,q Hq (x) q≥d1 q≥d1 where d1 is the minimum of the Hermite ranks of fβ1 and fβ2 , d1 ≥ 2 and X q≥d q!fβ21 ,q < +∞, X q≥d 5 q!fβ22 ,q < +∞. (20) Let Σ1 = ∇ϕ−β1 ,−β2 ◦ψ−β1 ,−β2 (x1 , y1 )Γ2 ∇ϕ−β1 ,−β2 ◦ψ−β1 ,−β2 (x1 , y1 )t (21) where ψu,v , ϕu,v are defined by (7), (9) respectively, ∇ is the differential operator and (x1 , y1 ) = (E|△0,1 X|β1 , E|△0,1 X|β2 ), Γ2 = σβ21 = +∞ X q=d1 q!fβ21 ,q X ρ(k)q , σβ22 = k∈Z +∞ X (22) ! σβ21 ρβ1 ,β2 , ρβ1 ,β2 σβ22 q!fβ22,q q=d1 X ρ(k)q , ρβ1 ,β2 = k∈Z (23) +∞ X q!fβ1,q fβ2 ,q q=d1 X ρ(k)q . (24) k∈Z We can now state the following theorem, which precises the results for the estimation of H and α in the case of fractional Brownian motion. Theorem 3.1. Let X be a fractional Brownian motion. Then a) b n − H = OP (n−1/2 ), α̂n − 2 = OP (n−1/2 ), H b) √ b √ (d) (d) n(Hn − H) −−→ N1 (0, Ξ1 )), n(α̂n − 2) −−→ N1 (0, Σ1 ) as n → +∞, where Ξ1 , Σ1 are defined by (18) and (21), respectively. See Subsection 4.3 for the proof of Theorem 3.1. 3.2 SαS-stable Lévy motion Definition 3.2. SαS-stable Lévy motion A stochastic process {X(t), t ≥ 0} is called (standard) SαS-stable Lévy motion if X(0) = 0 (a.s.), X has independent increments and, for all 0 ≤ s < t < ∞ and for some 0 < α ≤ 2, X(t) − X(s) is a SαS random variable with characteristic function given by Eeiθ(X(t)−X(s)) = exp (−(t − s)|θ|α ) . The condition (11) is proved to be satisfied with bn = n−1/2 , then the results in Theorem 2.1 are ascertained. Similar to the case of fractional Brownian motion, we obtain the asymptotic normality of H and α. The variances Ξ2 , Σ2 for the limit distributions of the central limit theorems for the estimators of H and α are defined as follows. Let X be a SαS−stable Lévy motion, we define the variance for the limit distribution of the central limit theorem for the estimator of H by Ξ2 = φ′ (x0 , y0 )Γ3 φ′ (x0 , y0 )t , (25) where φ(x, y), (x0 , y0 ) are defined by (17), (19), respectively and Γ3 = ! σ12 σ1,2 , σ1,2 σ22 6 (26) σ12 = var|△0,1 X|β + cov(|△0,1 X|β , |△1,1 X|β ) +2 K−1 X p=1 +2  cov(|△0,1 X|β , |△2p,1 X|β ) + cov(|△0,1 X|β , |△2p+1,1 X|β ) K−1 X  cov(|△1,1 X|β , |△2p,1 X|β ) + cov(|△1,1 X|β , |△2p+1,1 X|β ) , p=1  σ22 = 2 var|△0,1 X|β + 2  K−1 X p=1  cov(|△0,1 X|β , |△p,1 X|β ) (27) (28)  σ1,2 = 2βH cov(|△0,2 X|β , |△0,1 X|β ) + cov(|△1,2 X|β , |△0,1 X|β ) K−1 X βH +2 p=1 K−1 X + 2βH p=1  cov(|△0,2 X|β , |△p,1 X|β ) + cov(|△1,2 X|β , |△p,1 X|β )  cov(|△0,1 X|β , |△2p,2 X|β ) + cov(|△0,1 X|β , |△2p+1,2 X|β ) (29) The variance for the limit distribution of the central limit theorem for the estimator of α is defined by Σ2 = ∇ϕ−β1 ,−β2 ◦ψ−β1 ,−β2 (x1 , y1 )Γ4 ∇ϕ−β1 ,−β2 ◦ψ−β1 ,−β2 (x1 , y1 )t (30) where ψu,v , ϕu,v , (x1 , y1 ) are defined as in (7), (9) and (22), respectively, Γ4 = σ12 = var|△0,1 X|β1 + 2 σ22 = var|△0,1 X|β2 + 2 K−1 X k=1 K−1 X k=1 σ1,2 ! σ12 σ1,2 , σ1,2 σ22 (31) cov(|△0,1 X|β1 , |△k,1 X|β1 ), (32) cov(|△0,1 X|β2 , |△k,1 X|β2 ) (33)  X 1 K−1 = cov(|△0,1 X| , |△0,1 X| ) + cov(|△0,1 X|β1 , |△k,1 X|β2 ) + cov(|△0,1 X|β2 , |△k,1 X|β1 ) . 2 k=1 β1 β2 (34) We now present the results on the asymptotic normality for the case of SαS-stable Lévy motion. Theorem 3.2. Let X be a SαS-stable Lévy motion. Then a) b n − H = OP (n−1/2 ), α̂n − α = OP (n−1/2 ) H b) √ √ (d) (d) b n − H) − n(H −→ N1 (0, Ξ2 )), n(α̂n − α) −−→ N1 (0, Σ2 ) as n → +∞, where Ξ2 , Σ2 are defined by (25) and (30), respectively. The proof of Theorem 3.2 is given in Subsection 4.3. 3.3 Well-balanced linear fractional stable motion Definition 3.3. Well-balanced linear fractional stable motion Let M be a SαS random measure, 0 < α ≤ 2, with Lebesgue control measure and consider X(t) = Z +∞ −∞ (| t − x |H−1/α − | x |H−1/α )M (dx), −∞ < t < +∞ 7 where 0 < H < 1, H 6= 1/α. The process X is called the well-balanced linear fractional stable motion. Then X is a H-sssi process (Proposition 7.4.2, [21]). Let bn =   n−1/2   n if H < L + 1 − αH−(L+1)α 4 if H > L + 1 − q    ln n if H = L + 1 − n 2 α 2 α 2 α. (35) It is clear that lim bn = 0 and bn/2 = O(bn ). We get the following results for the estimation of H and n→+∞ α. Theorem 3.3. Let {X(t)}t∈R be a well-balanced linear fractional stable motion with 0 < H < 1, H 6= 1/α and 0 < α < 2. Then for every β ∈ (−1/2, 0), Theorem 2.1 is true with bn defined by (35). See Subsection 4.3 for the proof of Theorem 3.3. 3.4 Takenaka’s processes Definition 3.4. Takenaka’s process Let M be a symmetric α− stable random measure (0 < α < 2) with control measure m(dx, dr) = r ν−2 dxdr, (0 < ν < 1). Let t ∈ R, set Ct = {(x, r) ∈ R × R+ , |x − t| ≤ r}, St = Ct ∆C0 where ∆ denotes the symmetric difference between two sets. Takenaka’s process is defined by X(t) = Z 1St (x, r)M (dx, dr). (36) R×R+ Following Theorem 4 in [25], the process X is ν/α−sssi. Let bn = n ν−1 2 . (37) We can now ascertain the following. Theorem 3.4. Let {Xt , t ∈ R} be a Takenaka’s process defined by (36). Then for every β, β ∈ (−1/2, 0), Theorem 2.1 is true with bn defined by (37). The proof of Theorem 3.4 is given in Subsection 4.3. 4 Proofs First, we give results on expectation of negative power variations of H-sssi, SαS random processes in Subsection 4.1. Then we apply these results in Subsection 4.2 to the estimation of H and α, in order to prove Theorem 2.1. Finally, we prove that Theorem 2.1 is true for four classical examples presented in Section 3. 4.1 Negative power expectation and auxiliary results Now we present some results on expectation of negative power variations of H-sssi, SαS random processes proved by using theory of distribution. These results are the tools to prove assumptions (11) for four examples in Section 3 and to prove the main result on the estimation for α. 8 4.1.1 Auxiliary results We start with the following lemma which confirms the existence of the expectation of β-negative power variation of a symmetric stable random variable when β ∈ C, Re(β) ∈ (−1, 0). Lemma 4.1. Let X be a SαS random variable, β ∈ C, Re(β) ∈ (−1, 0), then |E|X|β | < +∞. The proof of Lemma 4.1 is given in Subsection 4.1.2 The next two important results will be used to prove the condition (11) for our examples in next section. Theorem 4.1 gives a way to determine the expectation of β-negative power variation of a symmetric stable random variable whereas Theorem 4.2 helps to establish the inequality of (11) for illustrated examples. Let (S, µ) be a measure space, h, g ∈ Lα (S, µ) and M be a symmetric α-stable random measure on S with control measure µ, α ∈ (0, 2). Set U= Z h(s)M (ds), V = S Z g(s)M (ds). (38) S Let Cβ = 2β+1/2 Γ( β+1 2 ) (39) Γ(− β2 ) where β ∈ C such that Re(β) ∈ (−1, 0). Theorem 4.1. For β ∈ C, Re(β) ∈ (−1, 0), we have 1 E|U | = √ 2π β Z R iU y FT (y)Ee Cβ dy = √ 2π Z R EeiU y dy |y|β+1 (40) in the sense of distributions, where U, V are defined by (38), T = |x|β and FT is Fourier transform of T. See Subsection 4.1.3 for the proof of Theorem 4.1. Theorem 4.2. Assume that ||U ||αα = [U, V ]2 = Z S Z S |h(s)|α µ(ds) = 1, ||V ||αα = Z S |g(s)|α µ(ds) = 1 |h(s)g(s)|α/2 ≤ η < 1, where U, V are defined as in (38). Then for −1/2 < Re(β) < 0, we have β β E|U | |V | = Cβ Cβ Z 2π R2 EeixU +iyV |x|1+β |y|1+β dxdy. (41) Moreover, there exists a constant C(η) such that |cov(|U |β , |V |β )| ≤ C(η) Z S |h(s)g(s)|α/2 ds. (42) The proof of Theorem 4.2 is given in Subsection 4.1.4. The following two lemmas follow from Theorem 4.1 in which Lemma 4.2 provides an important formula to construct the estimator for α. 9 Lemma 4.2. Let X be a standard SαS variable with 0 < α ≤ 2 and β ∈ C, −1 < Re(β) < 0, then β 2β Γ( β+1 2 )Γ(1 − α ) . √ πΓ(1 − β2 ) E|X|β = (43) See Subsection 4.1.5 for the proof of Lemma 4.2. Lemma 4.3. Let X be a SαS process where 0 < α ≤ 2, β ∈ C, − 21 < Re(β) < 0, then E|△0,1 X|β 6= 0. See Subsection 4.1.6 for the proof of Lemma 4.3. Now we will give the proofs for the latter results. 4.1.2 Proof of Lemma 4.1 Since X is a SαS -stable random variable, X has a density function f (x) that is even and continuous on R. We first consider the case β ∈ R and −1 < β < 0. For −1 < β < 0, we can write: E|X|β = Z R We have A= Z |x|≤1 |x|β f (x)dx = Z |x|β f (x)dx + |x|≤1 β |x| f (x)dx ≤ sup |f (x)| |x|≤1 Z Z |x|≥1 |x|β f (x)dx := A + B. β |x|≤1 |x| dx < +∞, B = 2 Z∞ 1 xβ f (x)dx ≤ 2. It follows that E|X|β < +∞. For β ∈ C, −1 < Re(β) < 0, we have E|X|β = Z R |x|a+ib f (x)dx ≤ Z R |x|Re(β) f (x)dx < +∞. Then we obtain the conclusion. 4.1.3 Proof of Theorem 4.1 To prove Theorem 4.1, we start with the following lemma. Lemma 4.4. For all x ∈ R, β ∈ C, −1 < Re(β) < 0, let T (x) = |x|β . Then T has Fourier transform defined by Cβ (44) FT (y) = β+1 |y| in the sense of distributions, where Cβ is defined as in (39). Proof. For β ∈ C, −1 < Re(β) < 0, following example 5, §7, chapter VII of [22], then T is a distribution and it has Fourier transform FT (y) = C|y|−(β+1) , where C is a constant. We will find C using function 2 k(x) = e−x /2 . Since T ∈ L1loc (R) and k ∈ S(R), in the sense of distributions, we have hFT, ki = hT, Fki. On the other hand, 1 Fk(y) = √ 2π Z e−ixy e−x 2 /2 dx = e−y 2 /2 R then Z R β −x2 /2 |x| e dx = Z C|y|−(β+1) e−y R 10 2 /2 dy. By taking the change of variable, we obtain that Z R β −x2 /2 |x| e dx = 2 β+1 2 β+1 ), Γ( 2 It follows that C= From Lemma 4.4, we have FT (y) = Z |y|−(β+1) e−y R 2β+1/2 Γ( β+1 2 ) Cβ , |y|1+β Γ(− β2 ) 2 /2 β dy = 2−β/2 Γ(− ). 2 = Cβ . Γ( u+1 ) where f is the density function of U and Cu = 2u+1/2 Γ(−2u ) . 2 R Let ϕ be a non-negative, even function, ϕ ∈ C0∞ (R), suppϕ ⊂ [−1, 1], ϕ(y)dy = 1. Set ϕǫ (x) = R ϕ(x/ǫ) ǫ , we will prove that gǫ = F −1 f ∗ ϕǫ ∈ S(R). Indeed, let χ(x) be a function in C0∞ (R) such that χ(x) = 1 for |x| ≤ 1 and χ(x) = 0 for |x| ≥ 2. We can write the characteristic function corresponding with the density function f as √ α α e−σ |x| = 2πF −1 f (x) := g(x) = χ(x)g(x) + (1 − χ(x))g(x) := g1 (x) + g2 (x) and g ∗ ϕǫ (x) = g1 ∗ ϕǫ (x) + g2 ∗ ϕǫ (x). It is clearly that g1 ∈ L1 (R), g1 has compact support, ϕǫ ∈ C0∞ (R), so g1 ∗ ϕǫ ∈ S(R). We also have g2 ∗ ϕ ∈ S(R) since g2 and ϕǫ (x) are in S(R). Then we get gǫ ∈ S(R). We have √ Fgǫ (x) = 2πf (x)Fϕǫ (x). Since hT, Fgǫ i = hFT, gǫ i, we obtain Z √ 2π|x|β f (x)Fϕǫ (x)dx = Z R R = Z R FT (y)F −1 f ∗ ϕǫ (y)dy (45) F −1 f (y)FT ∗ ϕǫ (y)dy, (46) Here we used Fubini’s theorem since FT, F −1 f ∈ L1loc (R), ϕǫ ∈ C0∞ (R) and ϕǫ is an even function. Now we will find the limits of two sides of the equation (46) when ǫ → 0. We first consider the left hand side of (46). One has lim Fϕǫ (x) = lim ǫ→0 ǫ→0 Z R 1 √ e−itx ϕǫ (t)dt = lim ǫ→0 2π Z R ϕ(t/ǫ) 1 √ e−itx dt = lim ǫ→0 ǫ 2π R Z R 1 √ e−iǫux ϕ(u)du. 2π For x, u ∈ R, e−iǫux ϕ(u) → ϕ(u) when ǫ → 0, and |e−iǫux ϕ(u)| = ϕ(u), ϕ(u)du = 1, following Lebesgue R dominated convergence theorem, one gets lim Fϕǫ (x) = ǫ→0 Z R 1 1 √ ϕ(u)du = √ . 2π 2π 11 Therefore, for x 6= 0, √ 2π|x|β f (x)Fϕǫ (x) → 1 |x|β f (x)Fϕǫ (x) = √ |x|Re(β) f (x)| 2π 1 ≤ √ |x|Re(β) f (x) 2π √ 2π|x|β f (x) pointwise when ǫ → 0. We have Z e−itx Z 1 ϕ(u)du = √ |x|Re(β) f (x). 2π R R Moreover, applying Lemma 4.1, it follows that R R ϕ(t/ǫ) 1 dt| = √ |x|e(β) f (x) ǫ 2π Z e−iǫux ϕ(u)du R |x|Re(β) f (x)dx < ∞. Thus applying Lebesgue dominated convergence theorem, the left hand side of (46) converges to R R |x|Re(β) f (x)dx. Turning back to the right hand side of (46), since FT is continuous at y 6= 0 and FT ∈ L1loc (R), we get lim FT ∗ ϕǫ (y) = FT (y) ǫ→0 for y ∈ R∗ . It follows that lim F −1 f (y)FT ∗ ϕǫ (y) = F −1 f (y)FT (y) ǫ→0 pointwise almost everywhere. We have the following inequality on FT and ϕǫ . Lemma 4.5. There exists a constant C > 0 such that for all ǫ > 0, x 6= 0, we have |FT | ∗ ϕǫ (x) ≤ C|FT |(x). Proof. Since FT and ϕǫ are even functions, we just need to prove this lemma for x > 0. From the fact that ϕ has compact support, then there exists a constant C such that for all x > 0, ϕ(x) ≤ C 1[−1,1] (x). We consider first the case x > 2ǫ. One has |FT | ∗ ϕǫ (x) = Z C |FT |(y)ϕǫ (x − y)dy ≤ ǫ R x+ǫ Z x−ǫ |FT |(y)dy ≤ 2C|FT |(x − ǫ) ≤ 2C|FT |(x/2) = C1 |FT |(x). If x ≤ 2ǫ, then C |FT | ∗ ϕǫ (x) ≤ ǫ = x+ǫ Z x−ǫ 2C ǫ Z3ǫ 0 C |FT |(y)dy ≤ ǫ |Fβ | dy 1+Re(β) |y| = Z3ǫ −3ǫ |FT |(y)dy 1 C1 ≤ C2 |FT |(x). ǫ (3ǫ)Re(β) Applying Lemma 4.5, then we deduce that |F −1 f (y)FT ∗ ϕǫ (y)| ≤ C|F −1 f (y)||FT |(y) almost everywhere. But Z R |F −1 f (y)||FT |(y)dy = Z R α |Cβ | |Cβ | e−|y| √ dy = √ 1+Re(β) 2π |y| 2π Z R α e−|y| dy < ∞ |y|1+Re(β) since Re(β) ∈ (−1,R 0). Applying Lebesgue dominated convergence theorem again, the right hand side of (46) converges to F −1 f (y)FT (y)dy. So we get (40). R 12 4.1.4 Proof of Theorem 4.2 Let χ be in C0∞ (R), χ ≥ 0, χ(x) = 1 if x ∈ [−1, 1], suppχ ∈ [−2, 2]. For ǫ > 0, we define φǫ (x) = (1 − χ(x/ǫ))χ(ǫx). Let µ be the distribution of random vector (U, V ), then µ is a probability measure on R2 . Let T1 (x) = |x|β , T2 (x) = |y|β . Following Lemma 4.4, T1 , T2 are distributions and have Fourier transforms FT1 (y) = Cβ Cβ , , FT (x) = 2 |y|1+β |x|1+β respectively, in the sense of distributions, where Cu = 2u+1/2 Γ( u+1 ) 2 . Γ( −u ) 2 Set F1ǫ (x) = T1 (x)φǫ (x), F2ǫ (y) = T2 (y)φǫ (y). It is clearly that F1ǫ (x) ∈ S(R), F2ǫ (y) ∈ S(R). Then F1ǫ ⊗ F2ǫ (x, y) ∈ S(R2 ). It follows that Z R2 Z F1ǫ ⊗ F2ǫ (x, y)dµ(x, y) = R2 F −1 (dµ)(x, y)F(F1ǫ ⊗ F2ǫ )(x, y)dxdy. (47) Now we consider the right-hand side of (47). We have F(F1ǫ ⊗ F2ǫ )(x, y) = FF1ǫ ⊗ FF2ǫ (x, y). We can write x F1ǫ (x) = T1 (x)χ(ǫx) − T1 (x)χ(ǫx)χ( ). ǫ Set ψ(x) = Fχ(x). One has 1 1 1 1 1 FT1 ∗ ψǫ ∗ ψ1/ǫ = FT1 ∗ ( √ ψǫ ) − √ FT1 ∗ ( √ ψǫ ) ∗ ψ1/ǫ . FF1ǫ (x) = √ FT1 ∗ ψǫ − 2π 2π 2π 2π 2π We will use the following lemma. Lemma 4.6. Let ψ be a function in the Schwartz class, T (t) =| t |β where Re(β) ∈ (−1, 0). Then for all x 6= 0, there exists a constant C > 0 such that | T ∗ ψ(x) |≤ C | T (x) | . Proof. We denote C a running constant which may change from an occurrence to another occurrence. For ǫ > 0, set 1 x ψǫ (x) = ψ( ). ǫ ǫ We first prove that there exists a constant C > 0 such that for all ǫ > 0, | T ∗ ψǫ (x) |≤ C sup a>0 1 2a Let k(y) =| T (x − y) |, Iǫ = T ∗ ψǫ (x). Z x+a x−a By taking the change of variable u = yǫ , we obtain that Iǫ = has F (x) = 1 ǫ Z 0 ǫx | T (t) | dt. R k(ǫu)ψ(u)du. Set F (x) = R k(t)dt, F ′ (x) = k(ǫx). 13 Rx 0 k(ǫu)du, one Combining with the fact that lim F (x)ψ(x) = 0 and F (0) = 0, we deduce that x→∞ +∞ Z k(ǫu)ψ(u)du = Z +∞ ′ F (u)ψ(u)du = − 0 0 =− Since k(u) ≥ 0, it follows that 1 ǫu Zǫu 0 +∞ Z F (u)ψ ′ (u)du 0     1 Zǫu k(t)dt uψ ′ (u)du.   ǫu +∞ Z 0 0 k(t)dt ≤ sup a>0 1 a Z+a k(t)dt. −a We also have ψ is a function in the Schwartz class, then | +∞ Z 0 k(ǫu)ψ(u)du| ≤ | +∞ Z 0 1 uψ (u)du| sup a>0 a ′ We can get a similar bound for the integral | R0 Z +a −a 1 k(t)dt = C sup a>0 2a Z+a k(t)dt. −a k(ǫu)ψ(u)du|. Therefore we obtain −∞ 1 |Iǫ | ≤ C sup a>0 2a x+a Z x−a | T (t) | dt. Taking ǫ = 1, it follows that 1 | T ∗ ψ(x) |≤ C sup a>0 2a x+a Z x−a | T (t) | dt. Now we will prove that there exists a constant C > 0 such that for all a > 0, then 1 2a x+a Z x−a | T (t) | dt ≤ C|T (x)|. We first consider the case x > 0. If x > 2a, then 0 < x2 < x − a < x + a and T (t) decreases over [x − a, x + a]. We get 1 2a x+a Z x−a | T (t) | dt ≤ ≤ 1 (x + a − (x − a)) (x − a)Re(β) 2a (x/2)Re(β) = C | T (x) | . 2 If 0 < x ≤ 2a < 3a, then 1 2a x+a Z x−a 1 | T (t) | ≤ 2a = 1 a Z3a −3a Z 3a | T (t) | dt tRe(β) dt = 0 (3a)1+Re(β) a(1 + Re(β)) ≤ C(3a)Re(β) ≤ CxRe(β) = C|T (x)|. 14 For the case x < 0, if x ≤ −2a, then x − a < x + a < x/2 < 0, we obtain 1 2a x+a Z x−a (x + a − (x − a))|x + a|Re(β) 2a | T (t) | ≤ ≤| x/2 |Re(β) = C | T (x) | . If −2a < x < 0, then −3a < x − a < x + a < 3a, one gets 1 2a x+a Z x−a 1 | T (t) | ≤ 2a = 1 a Z3a −3a Z3a 0 | T (t) | dt tRe(β) ≤ C | x |Re(β) = C | T (x) | . One can therefore obtain the conclusion. Since ψǫ ∗ ψ1/ǫ ∈ S(R), following Lemma 4.6, we have |FT1 ∗ (ψǫ ∗ ψ1/ǫ )(x)| ≤ C|FT1 (x)|. Then, there exists a constant C > 0 such that |FF1ǫ (x)| ≤ C|FT1 (x)|. In a similar way, we also get |FF2ǫ (y)| ≤ C|FT2 (y)|. It follows that |F −1 (dµ)(x, y)F(F1ǫ ⊗ F2ǫ )(x, y)| ≤ C|F −1 (dµ)(x, y)||FT1 (x)FT2 (y)|. Let us recall that R R ψ(t) √ dt 2π = χ(0) = 1. We will use the two following lemmas to get lim FF1ǫ (x) = FT1 (x), lim FF2ǫ (y) = FT2 (y). ǫ→0 ǫ→0 (48) Lemma 4.7. Let T (x) =| x |β where Re(β) ∈ (−1, 0), ψ be a function in Schwartz class. Then almost everywhere, lim T ∗ ψ1/ǫ (x) = 0. ǫ→0 where ψ1/ǫ (x) = ǫψ(ǫx). Proof. Let x ∈ R, x 6= 0, we have T ∗ ψ1/ǫ (x) = Z R T (y)ǫψ(ǫ(x − y))dy = Z R | y |β ǫψ(ǫ(x − y))dy. By taking the change of variable t = ǫy, one gets | T ∗ ψ1/ǫ (x) |≤ Z R | t/ǫ |Re(β) | ψ(ǫx − t) | dt = ǫ−Re(β) Z R | t |Re(β) | ψ(ǫx − t) | dt. We write Z R Re(β) |t| | ψ(ǫx − t) | dt = Z1 −1 Re(β) |t| | ψ(ǫx − t) | dt + 15 Z |t|≥1 | t |Re(β) | ψ(ǫx − t) | dt := I1 + I2 . We consider I1 and I2 . Since ψ is a function in Schwartz class, one gets || ψ ||∞ < ∞, || ψ ||1 < ∞. Then I1 ≤ 2 || ψ ||∞ Z I2 = |t|≥1 Z1 tRe(β) dt = C < +∞. 0 | t |Re(β) | ψ(ǫx − t) | dt ≤ Z |t|≥1 | ψ(ǫx − t) | dt ≤|| ψ ||1 = C < +∞. Since then | T ∗ ψ1/ǫ (x) |≤ Cǫ−Re(β) → 0 as ǫ → 0. It follows that T ∗ ψ1/ǫ (x) → 0 almost everywhere as ǫ → 0. Lemma 4.8. Let ψ be a function in Schwartz class such that R R ψ(t)dt = 1, T (t) =| t |β where Re(β) ∈ (−1, 0). Then we have lim T ∗ ψǫ (x) = T (x) almost everywhere, where ψǫ (x) = ǫ→0 ψ(x/ǫ) ǫ . Proof. Let x ∈ R, x 6= 0, we consider I = T ∗ ψǫ (x) − T (x). Let us recall that Z Z ψǫ (t)dt = R Therefore I = R R ψ(t/ǫ) dt = ǫ R Z ψ(u)du = 1. R {T (x − y) − T (x)} 1ǫ ψ(y/ǫ)dy. Let θ > 0 be a constant. There exists 0 < δ <| x | such that for | y |≤ δ, we have | T (x−y)−T (x) |≤ Then | I |≤ Z |y|≤δ | T (x − y) − T (x) | θ I1 ≤ 2ǫ || ψ ||1 Z |y|≤δ | ψ(y/ǫ) | dy + ǫ θ | ψ(y/ǫ) | dy = 2ǫ || ψ ||1 Z | T (x − y) − T (x) | |y|≥δ Z |u|≤ǫδ θ 2||ψ||1 . | ψ(y/ǫ) | dy := I1 + I2 . ǫ θ ǫ | ψ(u) | du ≤ 2ǫ || ψ ||1 Z R ǫ | ψ(u) | du = θ . 2 Now we consider I2 . Since ψ is a function in Schwartz class, there exists a constant C > 0 such that for | t |≥ 1 then | ψ(t) |≤ tC2 . We choose ǫ > 0 such that δǫ ≥ 1. By taking the change of variable t = y/ǫ, we get Z I2 = |t|≥ δǫ = | T (x − ǫt) − T (x) || ψ(t) | dt ≤ Z |t|≥ δǫ ,|x−ǫt|≤1 | T (x − ǫt) || ψ(t) | dt + Z |t|≥ δǫ | T (x − ǫt) || ψ(t) | dt + Z |t|≥ δǫ ,|x−ǫt|≥1 Z |t|≥ δǫ | T (x) || ψ(t) | dt | T (x − ǫt) || ψ(t) | dt + Z |t|≥ δǫ | T (x) || ψ(t) | dt := J1 + J2 + J3 . We have J1 = Z |t|≥ δǫ ,|x−ǫt|≤1 | T (x − ǫt) || ψ(t) | dt ≤ C Z |x−ǫt|≤1 | T (x − ǫt) | (ǫ/δ)2 dt. By taking the change of variable u = ǫt − x, one gets Cǫ2 J1 ≤ 2 δ Z |u|≤1 | T (u) | du = C1 ǫ. ǫ 16 Here C1 is a constant depending on δ. Let us consider J2 . Since | T (t) |=| t |Re(β) and Re(β) ∈ (−1, 0), if | x − ǫt |≥ 1 we get | T (x − ǫt) |≤ 1. Moreover δ/ǫ ≥ 1, it follows that Z C ǫ J2 ≤ dt = C2 2 t δ |t|≥δ/ǫ where C2 is a constant depending on δ. Similarly, since δ/ǫ ≥ 1, we get J3 ≤| T (x) | Z |t|≥δ/ǫ C dt = C3 ǫ t2 where C3 is a constant depending on x, δ. So we get I2 ≤ Cǫ where C is a constant depending on x, δ. We can choose ǫ small enough to get I2 ≤ 2θ . Then for all θ > 0, there exists ǫ0 such that for all 0 < ǫ < ǫ0 , we have | I |≤ θ. Therefore we get the conclusion. From (48), one gets lim F(F1ǫ ⊗ F2ǫ )(x, y) = FT1 (x)FT2 (y) = ǫ→0 Cβ Cβ | x |1+β | y |1+β . ixU +iyV . We use Theorem 4.1, Lemma 4.1 and the following lemma to deduce Moreover F −1 (dµ)(x, y) = Ee 2π that Z Z |F −1 (dµ)(x, y)| EeixU +iyV dxdy = dxdy < +∞. | x |1+Re(β) | y |1+Re(β) 2π | x |1+Re(β) | y |1+Re(β) 2 2 R R Lemma 4.9. Set ixU +iyV MU,V (x, y) = Ee [U, V ]2 = Z S ixU − Ee iyV Ee ,I = Z | MU,V (x, y) | dxdy. | xy |1+Re(β) R2 |h(s)g(s)|α/2 ≤ η < 1, where U, V are defined as in Theorem 4.2. Then I ≤ C(η)[U, V ]2 < ∞, where the constant C(η) depends on η. Proof. We just need to consider the integral only over (0, +∞) × (0, +∞). We divide this domain into four regions (0, 1) × (0, 1), (0, 1) × (1, +∞), (1, +∞) × (0, 1), (1, +∞) × (1, +∞) and let I1 , I2 , I3 , I4 be the integrals over those domains, respectively. Over (0, 1) × (0, 1), by using inequality (3.4) in [20] we get I1 ≤ Z1 Z1 0 0 | MU,V (x, y) | dxdy ≤ 2 | xy |1+Re(β) Z1 Z1 (xy)α/2−1−Re(β) dxdy[U, V ]2 = C[U, V ]2 . 0 0 Over (1, +∞) × (1, +∞), by using inequality (3.6) in [20] and assumptions || U ||αα = 1, || V ||αα = 1, [U, V ]2 = Z S | f (s)g(s) |α/2 ≤ η < 1, we can bound the integral over this domain by I2 ≤ 2 +∞ Z +∞ Z α/2 (xy)α/2−1−Re(β) e−2(1−η)(xy) 1 1 17 dxdy[U, V ]2 . α/2 up to a constant depending on η by (xy)−p for arbitrarily large p > 0. Here we can bound e−2(1−η)(xy) So I2 ≤ C(η)[U, V ]2 . Over (0, 1) × (1, +∞), by using inequality (3.5) in [20] we obtain a bound I3 ≤ 2 Z1 +∞ Z α/2 −y α/2 )2 ≤2 Z Z1 +∞ α/2 −1)2 (xy)α/2−1−Re(β) e−(x 0 1 (xy)α/2−1−Re(β) e−(y 0 1 +∞ Z (xy)α/2−1−Re(β) e−(y ≤C 1 +∞ Z y α/2−1−Re(β) e−(y =C dxdy[U, V ]2 α/2 −1)2 α/2 −1)2 dxdy[U, V ]2 dxdy[U, V ]2 dy[U, V ]2 . 1 Since +∞ R 1 y α/2−1−Re(β) e−(y α/2 −1)2 dy < +∞, we get I3 ≤ C[U, V ]2 . A similar bound holds for I4 . Then we have the conclusion. By Lebesgue dominated convergence theorem, as ǫ → 0, the right-hand side of (47) converges to Cβ Cβ Z 2π R2 EeixU +iyV | x |1+β | y |1+β dxdy. Now we consider the left-hand side of (47). Since lim φǫ (x) = 1 for all x ∈ R, it follows ǫ→0 lim F1ǫ (x)F2ǫ (y) =| x |β | y |β ǫ→0 for all x 6= 0, y 6= 0. It is clear that | F1ǫ (x) |≤ C | x |Re(β) , | F2ǫ (y) |≤ C | y |Re(β) . Moreover Z R2 Re(β) |x| Re(β) |y| β β dµ(x, y) = E|U | |V | ≤ q E|U |2β E|V |2β < +∞ since Re(β) ∈ (−1/2, 0). We can therefore apply Lebesgue dominated convergence theorem for the left-hand side of (47). As ǫ → 0, it converges to Z R2 | x |β | y |β dµ(x, y) = E | U |β | V |β . This proves the result (41). Now we prove (42). Following Theorem 4.1 and (41), for −1/2 < Re(β) < 0, we get Cβ E|U | = √ 2π β E | U |β | V |β = Z R Cβ Cβ Z 2π Cβ Z EeiyV EeixU β √ dy dx, E | V | = | x |1+β 2π | y |1+β R2 R EeixU +iyV | x |1+β | y |1+β 18 dxdy. Then cov(| U |β , | V |β ) = E | U |β | V |β −E | U |β E | V |β = Cβ Cβ ≤| Cβ Cβ | Z EeixU +iyV − EeixU +iyV − EeixU EeiyV R2 | x |1+β | y |1+β dxdy EeixU EeiyV dxdy. | xy |1+Re(β) R2 Z Applying Lemma 4.9, we obtain (42). 4.1.5 Proof of Lemma 4.2 For the case α = 2, let Y be a standard S2S variable. Then for −1 < Re(β) < 0, we have 1 E|Y | = √ 2 π β +∞ Z −∞ β 2 − x4 |x| e +∞ Z 1 dx = √ π xβ e−x 2 /4 0 2β β+1 dx = √ · Γ( ). π 2 Let us now consider the case α 6= 2. Following (44) and Theorem 4.1, we have Cβ E|X| = √ 2π β Z R EeiXy Cβ dy = √ β+1 |y| 2π Z α e−|y| 2Cβ dy = √ β+1 |y| 2π R +∞ Z 0 α e−y dy. y β+1 By making the change of variable y α = t, then 2Cβ E|X| = √ 2π β +∞ Z t 0 2Cβ e dt = √ 2π −β/α−1 −t +∞ Z t √ 2Cβ Γ(−β/α) √ e dt = . α π −β/α−1 −t 0 Since Γ(x + 1) = xΓ(x), one gets E | X |β = 4.1.6 2β Γ( β+1 )Γ(1 − αβ ) . √ 2 πΓ(1 − β2 ) Proof of Lemma 4.3 From the fact that X is a SαS process, one can write △0,1 X = K X (d) ak X(k) = σY k=0 where σ > 0 and Y is a standard SαS random variable. Then E | △0,1 X |β = σ β E | Y |β . Following Theorem 4.1, since there doesn’t exist any x ∈ C such that Γ(x) = 0, we deduce that E | Y |β 6= 0. Thus E | △0,1 X |β 6= 0. 4.2 Proof of Theorem 2.1 Proof of Theorem 2.1. In this proof, we shall denote by C a generic constant which may change from occurrence to occurrence. We will prove that Wn (β) − E|△0,1 X|β = OP (bn ) where bn is defined by (11). Indeed, from Lemma 4.1, it follows that E|△0,1 X|β < +∞. Because of H-self similarity and stationary increment properties of X, one has △p,n X = K X k=0 ak X( K K K X k + p (d) X △0,1 X ak ak (d) X ak )= X(k + p) = (X(k + p) − X(p)) = X(k) = . H H H n n n n nH k=0 k=0 k=0 19 We get E|△p,n X|β = when n → ∞. We have (P) E|△0,1 X|β nβH and EWn (β) = E|△0,1 X|β . Now we will prove that Wn (β) −−→ E|△0,1 X|β E|Wn (β)|2 = n−K X n2βH E|△p,n X|β |△p′ ,n X|β . (n − K + 1)2 p,p′ =0 Moreover (d) |△p,n X|β |△p′ ,n X|β = | K X ak n k=0 1 = n | 2βH X(k + p)|β | H K X K X ak nH k=0 X(k + p′ )|β ap [X(k + p) − X(p′ )]|β | k=0 K X K X K X k=0 ak [X(k + p′ ) − X(p′ )]|β = 1 | ak X(k + p − p′ )|β | ak X(k)|β n2βH k=0 k=0 = 1 |△p−p′ ,1 X|β |△0,1 X|β . n2βH (d) It follows that E|△p,nX|β |△p′ ,n X|β = E|△k,1 X|β |△0,1 X|β E|△p−p′ ,1 X|β |△0,1 X|β = n2βH n2βH with k = p − p′ . Thus E|Wn (β)|2 = X 1 |k| )E|△k,1 X|β |△0,1 X|β . (1 − n − K + 1 |k|≤n−K n−K +1 One has E|Wn (β) − E|△0,1 X|β |2 = E|Wn (β)|2 − E|△0,1 X|β E|△0,1 X|β . On the other hand, since E|△k,1 X|β = E|△0,1 X|β and E|Wn (β) − E|△0,1 X|β |2 = 1 n−K+1 P |k|≤n−K (1 − |k| n−K+1 ) = 1, it follows that X 1 |k| )cov(|△k,1 X|β , |△0,1 X|β ). (1 − n − K + 1 |k|≤n−K n−K +1 (49) Using (49) and the assumption (11), one obtains lim sup n 1 E|Wn (β) − E|△0,1 X|β |2 ≤ Σ2 . b2n For all ǫ > 0, applying Markov’s inequality and using (49), we get Σ E|Wn (β) − E|△0,1 X|β |2 sup P (|Wn (β) − E|△0,1 X|β | > bn √ ) ≤ lim sup ≤ ǫ. 2 ǫ n n b2n Σǫ It follows that Wn (β) − E|△0,1 X|β = OP (bn ). (50) In a similar way, combining with the fact that bn/2 = O(bn ), one also has Wn/2 (β) − E|△0,1 X|β = OP (bn ). 20 (51) b n − H = OP (bn ). Now we will prove that H + + Let φ : R × R → R be defined by φ(x, y) = log2 x . y (52) b n − H = φ(W (β), Wn (β)). Then H n/2 We need the following lemma. Lemma 4.10. Let f : D ⊂ R2 → R, be differentiable at a constant vector (a, b) ∈ D. Let (Xn , Yn ) be P P random vectors whose ranges lie in D such that Xn − → a, Yn − → b and Xn − a = OP (bn ), Yn − b = OP (bn ) where {bn }n is a non-negative sequence and bn → 0 as n → +∞. Then f (Xn , Yn ) − f (a, b) = OP (bn ). Proof. Since f is differentiable at (a, b), we can write f (a + h1 , b + h2 ) = f (a, b) + h1 ∂f ∂f (a, b) + h2 (a, b) + o(||(h1 , h2 ||). ∂x ∂y as ||h|| = ||(h1 , h2 )|| → 0. ∂f By applying Lemma 2.12 in [26] for R(x, y) = f (a + x, b + y) − f (a, b) − x ∂f ∂x (a, b) − y ∂y (a, b) and the sequence random vector (Xn − a, Yn − b), we get ∂f ∂f (a, b) + (Yn − a) (a, b) + oP (||(Xn − a, Yn − b)||) ∂x ∂y = (Xn − a)OP (1) + (Yn − a)OP (1) + oP (||(Xn − a, Yn − b)||) f (Xn , Yn ) − f (a, b) = (Xn − a) = bn OP (1)OP (1) + bn OP (1)OP (1) + bn OP (1)oP (1) = bn OP (1) + bn OP (1) + bn oP (1) = bn OP (1) Applying Lemma 4.10 with f = φ and vector (E | △0,1 X |β , E | △0,1 X |β ), combining with (50), (51) b n − H = OP (bn ). and the fact that φ(E | △0,1 X |β , E | △0,1 X |β ) = 0, it follows that H (P) b n = H. Since lim bn = 0, it induces that lim H n→+∞ n→+∞ b n − α = OP (bn ), we first prove that To prove that α h−β1 ,−β2 (α) = ψ−β1 ,−β2 (E|△0,1 X|β1 , E|△0,1 X|β2 ) (53) where hu,v , ψu,v are defined by (8), (7), respectively. Indeed, since {Xt , t ∈ R} is a H-sssi SαS−stable process, there exists a constant σ > 0 such that △0,1 X = σY , where Y is the standard H-sssi, SαS random variable. For β1 , β2 ∈ R, −1/2 < β1 , β2 < 0, from Lemma 4.2, we have E|△0,1 X|β1 = σ β1 E|Y |β1 = σ β1 2β1 Γ( β12+1 )Γ(1 − √ πΓ(1 − β21 ) β1 α) . Thus  β1 E|△0,1 X| β2 =σ β1 β2 =σ β1 β2 2β1 Γ( β12+1 )Γ(1 − √ πΓ(1 − β21 ) β1 α) 2β2 Γ( β22+1 )Γ(1 − √ πΓ(1 − β22 ) β2 α) !β 2 . !β 1 . Similarly, we also get  β2 E|△0,1 X| β1 21 Moreover, from Lemma 4.3, E|△0,1 X|β 6= 0 for all −1/2 < β < 0, then it induces  E|△0,1 X|β1 β2 = β1 (E|△0,1 X|β2 ) π β1 −β2 2 β2 β1 β2 β1 +1 β2 2 )Γ ( 2 )Γ (1 − α ) . β1 β2 β1 β2 +1 β1 2 )Γ ( 2 )Γ (1 − α ) Γβ1 (1 − Γβ2 (1 − Taking the natural logarithm, we have β2 ln(E|△0,1 X|β1 ) − β1 ln(E|△0,1 X|β2 ) =   β1 − β2 β2 ln(π) + β1 ln Γ(1 − ) + 2 2     β1 + 1 β1 β2 ln Γ( ) + β2 ln Γ(1 − ) 2 α       β2 + 1 β2 β1 ) − β1 ln Γ(1 − ) . − β2 ln Γ(1 − ) − β1 ln Γ( 2 2 α It follows that     β2 β1 β2 ln Γ(1 − ) − β1 ln Γ(1 − ) =β2 ln(E|△0,1 X|β1 ) − β1 ln(E|△0,1 X|β2 ) α α     β2 β1 + 1 β2 − β1 ln(π) − β1 ln Γ(1 − ) − β2 ln Γ( ) + 2 2 2     β2 + 1 β1 ) + β2 ln Γ(1 − ) + β1 ln Γ( 2 2 or h−β1 ,−β2 (α) = ψ−β1 ,−β2 (E|△0,1 X|β1 , E|△0,1 X|β2 ). From the following lemma, we can deduce that hu,v is a strictly increasing function on (0, +∞) and lim hu,v (x) = 0, lim hu,v (x) = −∞. Moreover, there exists an inverse function x→+∞ x→0 h−1 u,v : (−∞, 0) → (0, +∞) which is continuous and on (−∞, 0). Lemma 4.11. Let 0 < v < u and gu,v : (0, +∞) → R be a function defined by gu,v (x) = u ln (Γ(1 + vx)) − v ln (Γ(1 + ux)) . Then gu,v is a strictly decreasing function on (0, +∞) and lim gu,v (x) = 0, lim gu,v (x) = −∞. x→0 x→+∞ Proof. We have ′ gu,v (x) = uv   Γ′ (1 + vx) Γ′ (1 + ux) Γ′ (1 + ux) Γ′ (1 + vx) − uv = uv − . Γ(1 + vx) Γ(1 + ux) Γ(1 + vx) Γ(1 + ux) Following Bohn-Mollerup’s theorem, Γ is a log-convex function. Let k(y) be defined by k(y) = ln Γ(y). ′ (y) Then k′′ (y) ≥ 0 for all y > 0. It follows that ψ(y) := k′ (y) = ΓΓ(y) is an increasing function. ′ ′ Since Γ(x + 1) = xΓ(x), we have Γ (x + 1) = Γ(x) + xΓ (x). We obtain ψ(x + 1) = Γ(x) + xΓ′ (x) 1 Γ′ (x + 1) = = + ψ(x). Γ(x + 1) xΓ(x) x We will prove that ψ increases strictly. Assume that there exist x0 , y0 such that 0 < x0 < y0 and ψ(x0 ) = ψ(y0 ), then ψ(x0 + 1) − ψ(y0 + 1) = 1 1 y 0 − x0 − = > 0. x0 y0 x0 y0 22 However, x0 + 1 < y0 + 1, then ψ(x0 + 1) ≤ ψ(y0 + 1) but this could not happen. Thus ψ is a strictly increasing function. ′ (1+vx) ′ (1+ux) We also have 1 < 1 + vx < 1 + ux, so ΓΓ(1+vx) − ΓΓ(1+ux) < 0. ′ It induces that gu,v (x) < 0 for all 0 < v < u and x > 0. This proves that gu,v (x) is a strictly decreasing function. It is clear that lim gu,v (x) = 0. Now we need to prove that lim gu,v (x) = −∞. x→+∞ x→0 Applying Stirling’s formula, we have 1 1 ln Γ(1 + z) = ln(zΓ(z)) = ln z + ln Γ(z) = (z + ) ln z − z + ln(2π) + O(z −1 ) 2 2 as z → +∞. Then   1 1 gu,v (x) = u (vx + ) ln(vx) − vx + ln(2π) + O((vx)−1 ) 2 2   1 1 −1 − v (ux + ) ln(ux) − ux + ln(2π) + O((ux) ) 2 2 u ln v − v ln u (u − v) ln(2π) u v u−v ln x + + + O( ) − O( ) = uv(ln v − ln u)x + 2 2 2 vx ux as x → +∞. Since 0 < v < u we deduce uv(ln v − ln u) < 0. Moreover lim ln x x→+∞ x = 0, it follows that lim gu,v (x) = −∞. x→+∞ Then since α ∈ (0, 2], we obtain that h−β1 ,−β2 (α) = ψ−β1 ,−β2 (E|△0,1 X|β1 , E|△0,1 X|β2 ) < 0. On the other hand ψ−β1 ,−β2 (Wn (β1 ), Wn (β2 )) = ψ−β1 ,−β2 (Vn (β1 ), Vn (β2 )). We deduce that α̂n − α = ϕ−β1 ,−β2 (ψ−β1 ,−β2 (Wn (β1 ), Wn (β2 ))) − h−1 −β1 ,−β2 (h−β1 ,−β2 (α)) = ϕ−β1 ,−β2 (ψ−β1 ,−β2 (Wn (β1 ), Wn (β2 ))) − ϕ−β1 ,−β2 (h−β1 ,−β2 (α)) = ϕ−β1 ,−β2 (ψ−β1 ,−β2 (Wn (β1 ), Wn (β2 ))) − ϕ−β1 ,−β2 (ψ−β1 ,−β2 (E|△0,1 X|β1 , E|△0,1 X|β2 )). Moreover, ϕ−β1 ,−β2 ◦ ψ−β1 ,−β2 is continuous and differentiable at x0 = (E|△0,1 X|β1 , E|△0,1 X|β2 ). (54) Combining with (50), (51), we apply Lemma 4.10, and get (P) b n = α. It also induces that lim α b n − α = OP (bn ). α n→+∞ 4.3 Proofs related to Section 3 Now we are in position to prove Theorems related to examples presented in Section 3. Proof of Theorem 3.1. a) From Lemma 5.2 in Appendix, the assumption (11) is satisfied. Then following Theorem 2.1, we have Ĥn − H = OP (n−1/2 ), α̂n − 2 = OP (n−1/2 ). 23 b) We now prove the asymptotic normality for the estimators of H and α. To prove converges to a normal distribution as n → +∞, we will first prove that √ n(Ĥn − H)  (d) √  n (Wn (β), Wn/2 (β)) − (E|△0,1 X|β , E|△0,1 X|β ) −−→ N2 (0, Γ1 ) (55) as n → +∞, where Γ1 is defined by (16). Then, we need to prove that for all a, b ∈ R, ab 6= 0, √ √ Vn := a n(Wn (β) − E|△0,1 X|β ) + b n(Wn/2 (β) − E|△0,1 X|β ) converges to G ∼ N1 (0, σ 2 ) as n → +∞, where σ 2 = (a2 + 2b2 ) X q!fq2 X r∈Z q≥d X ρq (r) + 2ab q!fq2 q≥d X (56) ρq1 (r), (57) r∈Z fq s, ρ, ρ1 are defined by(13), (14), (15), respectively. Since {Xt }t≥0 is a H-sssi process, for all n ∈ N∗ , we get  △0,n X, △1,n X, . . . , △n−K,nX, △0,n/2 X, △1,n/2 X, . . . , △n/2−K,n/2 X (d) =   1 △ X, △ X, . . . , △ X, △ X, △ X, . . . , △ X . 0,2 1,2 n−K,2 0,1 1,1 n/2−K,1 (n/2)H Moreover var△k,2 = √   var△0,1 X , var△k,1 X 22H = var△0,1 X. It follows that  n (Wn (β), Wn/2 (β)) − (E|△0,1 X|β , E|△0,1 X|β )  √ = n (d) = √   n/2−K X |△k,2 |β X |△k,1 |β (n/2)βH (n)βH n−K β − E|△ X| , − E|△0,1 X|β  0,1 n − K + 1 k=0 (n/2)βH n/2 − K + 1 k=0 (n/2)βH  n/2−K n−K X X 2βH 1 β β  n |△k,2 X| − E|△0,1 X| , |△k,1 X|β − E|△0,1 X|β  n − K + 1 k=0 n/2 − K + 1 k=0  √ √ n/2−K n−K X X n n (|Yk |β − E|Z0 |β ), (|Zl |β − E|Z0 |β ) = (var△0,1 X)β/2  n − K + 1 k=0 n/2 − K + 1 l=0    √ √ n/2−K n−K X X n n = fβ (Yk ), fβ (Zl ) n − K + 1 k=0 n/2 − K + 1 l=0 △ X where Yk = √ k,2 var△k,2 X △ X , Zl = √ l,1 var△l,1 X and fβ is defined by (12). We obtain that Yk ∼ N1 (0, 1), Zl ∼ N1 (0, 1), and E(△k,2 X△k′ ,2 X) EYk Yk′ = var△0,1 X 22H = K P p,p′ =0 ap ap′ |k − k′ + p − p′ |2H K P p,p′ =0 EYk Zl = E(△k,2 X△l,1 X) var△0,1 X 2H = K P p,p′ =0 ap ap′ |k − 2l + p − 2p′ |2H 2H K P p,p′ =0 EZl Zl′ = E(△l,1 X△ l′ ,1 var△0,1 X 2H X) = K P p,p′ =0 p,p′ =0 24 ap ap′ |p − p′ |2H ap ap′ |k − l + p − p′ |2H K P . ap ap′ |p − p′ |2H ap ap′ |p − p′ |2H , , Then EYk Yk′ = ρ(k − k′ ), EZl Zl′ = ρ(l − l′ ) and EYk Zl = ρ1 (k − 2l) where ρ, ρ1 are defined by (14), (15), respectively. As in the proof of Lemma 5.2 in Appendix, we can prove that for r big enough ρ(r)| ≤ C|r|2H−3 , |ρ1 (r)| ≤ C|r|2H−3 . (58) (d) We then mimic the proof of Theorem 7.2.4 in [19] to get Vn −−→ N1 (0, σ 2 ) as n → +∞, it follows (55). On the other hand, we have √ n(Ĥn − H) =  √ 1 Wn/2 (β) √  = n φ(Wn (β), Wn/2 (β)) − φ(E|△0,1 X|β , E|△0,1 X|β ) . n log2 β Wn (β) where φ is defined as in (17). Since φ is differentiable at (x0 , y0 ) = (E|△0,1 X|β , E|△0,1 X|β ), we can apply Theorem 3.1 in [10] to get √ (d) n(Ĥn − H) −−→ N1 (0, Ξ1 ) as n → +∞, where Ξ1 is defined by (18). Now we prove central limit theorem for the estimation of α. We will prove that  (d) √ n(Wn (β1 ) − E|△0,1 X|β1 ), n(Wn (β2 ) − E|△0,1 X|β2 )) −−→ N2 (0, Γ2 ) √ (59) as n → +∞, with Γ2 defined by (23). Since {Xt }t∈R is a H-sssi process, we have (d) (△0,n X, . . . , △n−K,n X) = 1 (△0,1 X, . . . , △n−K,1 X) . nH (60) On the other hand, var△k,1 X = var△0,1 X. Then we can write √  √ n(Wn (β1 ) − E|△0,n X|β1 ), n(Wn (β2 ) − E|△0,n X|β2 )) = √ n = √ (d) = r ! n−K n−K X |△k,1 X|β1 X |△k,1 X|β2 √ nβ1 H nβ2 H β1 n − E|△ X| − E|△0,1 X|β2 , 0,1 β H n − K + 1 k=0 n 1 n − K + 1 k=0 nβ2 H ! n−K X √ 1 |△k,1 X|β1 − E|△0,1 X|β1 , n n n − K + 1 k=0 n n−K +1 n−K X 1 |△k,1 X|β2 − E|△0,1 X|β2 n − K + 1 k=0 ! !! !! n−K n−K X X 1 1 √ fβ1 (Zk ), √ fβ (Zk ) . n − K + 1 k=0 n − K + 1 k=0 2 △ X where fβ1 and fβ2 are defined as in (12) and Zk = √ k,1 , Zk var△k,1 X +∞, Efβ22 (Z0 ) < ∼ N1 (0, 1). We have Efβ1 (Z0 ) = Efβ2 (Z0 ) = 0, Efβ21 (Z0 ) < +∞ and EZk Zl = ρ(k − l) where ρ is defined by (14). We mimic the proof of Theorem 7.2.4 of [19] to obtain that   √  √  a n Wn (β1 ) − E|△0,1 |β1 + b n Wn (β2 ) − E|△0,1 |β2 converges to N1 (0, σ 2 ) as n → +∞ for all a, b ∈ R, ab 6= 0, where σ 2 = +∞ P q=d ρ, hq , gq are defined by (14), (20) respectively. This proves (59). The function ϕ−β1 ,−β2 ◦ ψ−β1 ,−β2 : R+ × R+ → [0, +∞) is differentiable at (x1 , y1 ) = (E|△0,1 X|β1 , E|△0,1 X|β2 ), where ψu,v , ϕu,v are defined by (7), (9) respectively. We can therefore apply Theorem 3.1 of [10] to get the conclusion. 25 q!(ahq + bgq )2 P r∈Z ρ(r)q . Here Proof of Theorem 3.2. a) We will check the assumption (11). Let 0 ≤ l < k, k −l ≥ K, then △k,1 X = K P p=0 ap [X(k + p) − X(k)] and △l,1 X = K P p′ =0 ap′ [X(l + p′ ) − X(l)] . By the fact that {Xt }t≥0 has independent increments, we obtain that X(l + p′ ) − X(l), X(k + p) − X(k) are independent for all p, p′ = 0, . . . , K since 0 ≤ l ≤ l + p′ ≤ k ≤ k + p. It follows that △k,1 X and △0,1 X are independent for |k| ≥ K. Thus cov(| △k,1 X |β , | △0,1 X |β ) = 0. We deduce that X 1 C 1 X | cov(| △k,1 X |β , | △0,1 X |β ) |= | cov(| △k,1 X |β , | △0,1 X |β ) |= n k∈Z,|k|≤n n k∈Z,|k|≤K n where C is a positive constant. We thus get (11) with bn = n−1/2 and it follows that Ĥn − H = OP (n−1/2 ), α̂n − α = OP (n−1/2 ). b) To prove the asymptotic normality for the estimator of H, we first prove that for all n ∈ N, n > 2K,  √  n (Wn , Wn/2 ) − (E|△0,1 X|β , E|△0,1 X|β ) converges in distribution to a normal distribution as n → +∞. Since {Xt }t≥0 is a H-sssi process, one has  △0,n X, △1,n X, . . . , △n−K,nX, △0,n/2 X, △1,n/2 X, . . . , △n/2−K,n/2 X (d) =    1 △ X, △ X, . . . , △ X, △ X, △ X, . . . , △ X . 0,2 1,2 n−K,2 0,1 1,1 n/2−K,1 (n/2)H Moreover E|△0,1 X|β , E|△k,1 X|β = E|△0,1 X|β , 2βH var|△0,1 X|β , var|△k,1 X|β = var|△0,1 X|β . var|△k,2 |β = 22βH E|△k,2 |β = It follows that √ = n (d √ = n 2βH n−K+1 2βH n−K+1 n−K P p=0 n−K P  p=0    √  n Wn , Wn/2 − E|△0,1 X|β , E|△0,1 X|β 1 |△p,2 X)|β , n/2−K+1 △p,2 X)|β − n/2−K P p=0 △ X β | E| 20,1 H  , 1 n/2−K+1 Now we need to prove that for all a, b ∈ R, ab 6= 0,  √ Sn :=a n  |△p,1 X)|β ! − E|△0,1 X|β , E|△0,1 X|β n/2−K P p=0   |△p,1 X)|β    n−K X 2βH △0,1 X |△p,2 X)|β − E| H |β  n − K + 1 p=0 2  − E|△0,1 X|β !   ! .  n/2−K   X 1  |△p,1 X)|β − E|△0,1 X|β  +b n n/2 − K + 1 p=0 √ converges to a normal distribution when n → +∞. Let Zp := It follows that Sn = s  2βH a  |△2p,2 X|β + |△2p+1,2 X|β + b|△p,1 X|β . 2   n/2−K X n 1 p (Zp − EZp  + Un , n/2 − K + 1 n/2 − K + 1 p=0 26 (61) where  √     n−2K+1 n−K X  X △0,1 X β 2βH a n  1 − K △0,1 X β  β β |△p,2 X| − E| H | + Un = |△p,2 X| − E| H | n − K + 1 n − 2K + 2 p=0 2 2 p=n−2K+2 = Since √ 2βH a n n−K +1 K P k=0   1−K n − 2K + 2 n−2K+1 X n−K X Yp + p=0 p=n−2K+2  Yp  , Yp = |△p,2 X|β − E| △0,1 X β | . 2H ak = 0, one can write Zp = 2βH a 2 +b   K X k=0 K X  ak X( k=0  k + 2p ) − X(p) 2 β + K X ak X( k=0 β   k + 2p + 1 ) − X(p) 2 β   ak (X(k + p) − X(p)) . If p − p′ > K − 1, since X has independent increments and k + 2p′ k + 2p k + 2p + 1 ≤ p ≤ min{ , , k + p}, 2 2 2 k + 2p′ + 1 k + 2p k + 2p + 1 0 ≤ p′ ≤ ≤ p ≤ min{ , , k + p}, 2 2 2 k + 2p k + 2p + 1 0 ≤ p′ ≤ k + p′ ≤ p ≤ min{ , , k + p}, 2 2 0 ≤ p′ ≤ for all k = 0, . . . , K, it follows that Zp , Zp′ are independent. It induces that {Zp }p∈N is a (K−1)-dependent sequence of random variables. For l ∈ R fixed, we also have Zp+l    K k + 2(p + l) 2βH a  X ak X( ) − X(l) = 2 2 k=0 +b K X k=0 β + K X k=0 β ak   k + 2(p + l) + 1 X( ) − X(l) 2 β   ak (X(k + p + l) − X(l)) . On the other hand, since X has stationary increments and X(0) = 0 almost surely, we have (d) (X(t + l) − X(l))t∈R = (X(t))t∈R . (d) Then (Zp+l , p ∈ R) = (Zp , p ∈ R) or in another way, (Zp , p ∈ R) is stationary. It follows that {Zp }p∈N is a stationary (K − 1)-dependent sequence of random variables. From Theorem 2.8.1 in [16], we get   s n/2−K X 1 n p (Zp − EZp ) n/2 − K + 1 n/2 − K + 1 p=0 converges in distribution to a centered normal distribution with variance σ 2 = 2(varZ0 + 2 K−1 X cov(Z0 , Zk )) = a2 σ12 + b2 σ22 + 2abσ1,2 k=1 27 (62) (d) where σ12 , σ22 , σ1,2 are defined as in (27), (28), (29). We also have EYp = 0, EUn = 0, Yp = Y0 and EYp2 = EY02 for all p. Thus EUn2 = ≤ 22βH a2 n (n − K + 1)2 22βH+1 a2 n (n − K + 1)2 22βH+1 a2 n ≤ (n − K + 1)2 =  E    1−K n − 2K + 2) n−2K+1 X Yp + p=0  K)2 (1 − E (n − 2K + 2)2 n−2K+1 X p=0 n−K X p=n−2K+2 2 2 Yp   Yp  + E  n−K X p=n−2K+2 2   Yp   (1 − K)2 (n − 2K + 2)2 EY02 + (K − 1)2 EY02 (n − 2K + 2)2 ! 22βH+2 a2 (K − 1)2 n nC EY02 = . 2 (n − K + 1) (n − K + 1)2 It follows that EUn2 converges to 0 as n → +∞. Moreover EUn = 0, using Chebyshev’s inequality, we (P) obtain that Un −−→ 0 as n → +∞. Following Slutsky’s theorem, as n → +∞, Sn converges in distribution to a centered normal distribution with variance σ as in (61).  (d) √  We deduce that n (Wn , Wn/2 ) − (E|△0,1 X|β , E|△0,1 X|β ) → N2 (0, Γ3 ) where Γ3 is defined by (26). Since √ n(Ĥn − H) =  √ 1 Wn/2 √  n log2 = n φ(Wn (β), Wn/2 (β)) − φ(E|△0,1 X|β , E|△0,1 X|β ) β Wn (63) √ (d) where φ is defined by (17). Applying Theorem 3.1 of [10], we get n(Ĥ − H) → N1 (0, Ξ2 ) with Ξ2 defined by (25). We now prove the central limit theorem for the estimation of α in the case of SαS−stable Lévy motion.  √  We need to prove that for all n ∈ N, n > K, then n (Wn (β1 ), Wn (β2 )) − (E|△0,1 X|β1 , E|△0,1 X|β2 ) converges in distribution to a normal distribution as n → +∞. We consider   √  √  Sn = a n Wn (β1 ) − E|△0,1 X|β1 + b n Wn (β2 ) − E|△0,1 X|β2 for all a, b ∈ R, ab 6= 0. Since {Xt , t ∈ R} is a H self-similar process, we have √ n−K  X  n Sn = a(|△k,1 X|β1 − E|△k,1 X|β1 ) + b(|△k,1 X|β2 − E|△k,1 X|β2 ) . n − K + 1 k=0 √ n−K X n (Zk − EZk ) = n − K + 1 k=0 (d) where Zk = a|△k,1 X|β1 + b|△k,1 X|β2 . (64) Since {Xt , t ∈ R} has stationary increments, {Zk , k ∈ N} is stationary. Moreover, if k − k′ > K − 1, since {Xt , t ∈ R} has independent increments, then Zk , Zk′ are independent. We obtain that {Zk , k ∈ N} is a stationary (K − 1)-dependent sequence of random variables. Then applying Theorem 2.8.1 of [16], as n → +∞, Sn converges to a centered normal distribution with variance: 2 σ = varZ0 + 2 K−1 X k=0 28 cov(Z0 , Zk ). (65) We can write σ 2 in details 2 2 σ =a +b 2 β1 var|△0,1 X| β2 var|△0,1 X| +2 +2 K−1 X k=1 K−1 X k=1 " β1 β1 β2 β2 ! cov(|△0,1 X| , |△k,1 X| ) ! cov(|△0,1 X| , |△k,1 X| ) + 2ab  X 1 K−1 × cov(|△0,1 X| , |△0,1 X| ) + cov(|△0,1 X|β1 , |△k,1 X|β2 ) + cov(|△0,1 X|β2 , |△k,1 X|β1 ) 2 k=1 β1 β2 # = a2 σ12 + b2 σ22 + 2abσ1,2 , where σ12 , σ22 , σ1,2 are defined by (32), (33), (34) respectively.  (d) √  It follows that n (Wn (β1 ), Wn (β2 )) − (E|△0,1 X|β1 , E|△0,1 X|β2 ) → N2 (0, Γ4 ), where Γ4 defined by (31). The function ϕ−β1 ,−β2 ◦ ψ−β1 ,−β2 : R+ × R+ → [0, +∞) is differentiable at (x1 , y1 ) = (E|△0,1 X|β1 , E|△0,1 X|β2 ), where ψu,v , ϕu,v are defined by (7), (9) respectively. Then we apply Theorem 3.1 of [10] to get the conclusion. Proof of Theorem 3.3. Set f (t) = △k,1 X = and || △k,1 X ||αα = R R Z X K R j=0 PK k=0 ak |k H−1/α aj (| k + j − s | △k,1 X ||△k,1 X||α , H−1/α −|s| = Z R R f (s − k)M (ds) |f (u)|α du = ||△0,1 X||αα . then || Uk ||αα = 1 and Uk = (11) is satisfied. Therefore, we consider Sn = R R f (s−k) ||△k,1 X||α M (ds). k∈Z,|k|≤n We now prove that the assumption 1 X | cov(|△k,1 X|β , |△0,1 X|β )|. n k∈Z,|k|≤n Since ||△k,1 X||α = ||△0,1 X||α , it follows that X )M (ds) = Z | f (s − k) |α ds. By taking the change of variable u = s − k, we get ||△k,1 X||αα Let Uk = − t|H−1/α . For all k ∈ Z, one has |cov(|△k,1 X|β , |△0,1 X|β )| = ||△0,1 X||2β α X k∈Z,|k|≤n (66) |cov(|Uk |β , |U0 |β )|. Moreover [Uk , U0 ]2 = Z R f (s − k)f (s) ||△0,1 X||2α α/2 ds Together with Lemma 3.6 in [11], there exist k0 > 4K and 0 < η < 1 such that for all k ∈ Z, |k| > k0 ,one has [Uk , U0 ]2 ≤ η < 1. 29 Applying Theorem 4.2, there exists C(η) > 0 depending on η such that |cov(|Uk |β , |U0 |β )| ≤ C(η) Z |f (s − k)f (s)|α/2 ds R for all |k| > k0 . Then for n > k0 , one obtains that X k∈Z,|k|≤n X |cov(|Uk |β , |U0 |β )| = k∈Z,|k|≤k0 ≤C Because f (x) ∈ Lα (R, dx), one has Then Sn = C n P k∈Z,k0 <|k|≤n |k| X |cov(|Uk |β , |U0 |β )| + Z k∈Z,|k|≤k0 R R P . k∈Z,k0 <|k|≤n  −1   O(n ) αH−(L+1)α 2 O(n    ln n O( n X |f (s − k)f (s)|α/2 ds + C Since αH − (L + 1)α < 0, using Lemma 5.4 in Appendix, we also get Sn = |cov(|Uk |β , |U0 |β )| k∈Z,k0 <|k|≤n |k| αH−(L+1)α 2 . | f (s − k)f (s) |α/2 ds < +∞. k∈Z,|k|≤k0 R αH−(L+1)α 2 X ) ) if H < L + 1 − if H > L + 1 − if H = L + 1 − 2 α 2 α 2 α , where Sn is defined by (66). Applying Theorem 2.1, we have where bn is defined by(35). b n − H = OP (bn ), Wn (β) − E|△0,1 X|β = OP (bn ), H Proof of Theorem 3.4. We have +∞ Z Z △k,1 X = ||△k,1 X||αα 0 R +∞ Z Z = 0 R +∞ Z Z = 0 R K X ! ai 1Sk+i (x, r) M (dx, dr) i=0 | K X | K X ai 1Sk+i (x, r)|α (r ν−2 )α dxdr i=0 i=0 ai 1Si (x − k, r)|α (r ν−2 )α d(x − k)dr. By taking the change of variable u = x − k, one obtains that ||△k,1 X||αα Set Uk = Set △k,1 X ||△k,1 X||α In = = △k,1 X ||△0,1 X||α . X k∈Z,|k|≤n = +∞ Z Z 0 R | K X i=0 ai 1Si (u, r)|α (r ν−2 )α dudr = ||△0,1 X||αα . Obviously, ||Uk ||αα = 1. We now prove that the condition (11) is satisfied. |cov(|△k,1 X|β , |△0,1 X|β )| = ||△0,1 X||βα X k∈Z,|k|≤n |cov(|Uk |β , |U0 |β )|. For n > 2K, applying Lemma 5.3 in Appendix, one gets  In ≤ C   ≤C X k∈Z,|k|≤2K X k∈Z,|k|≤2K |cov(|Uk |β , |U0 |β )| + |cov(|Uk |β , |U0 |β )| + 30 X k∈Z,2K<|k|≤n X k∈Z,2K<|k|≤n  |cov(|Uk |β , |U0 |β )|  |k|ν−1  . Since 0 < ν < 1, one gets −1 < ν − 1 < 0. Following Lemma 5.4 in Appendix, one obtains X 1 |k|ν−1 = O(nν−1 ). n k∈Z,2K<|k|≤n Then we get the condition (11). Applying Theorem 2.1, we obtain that Wn (X) − E|△0,1 X|β = OP (bn ) and b n − H = OP (bn ), α̂n − α = OP (bn ) H where bn is defined as in (37). 5 Appendix We present here some technical results related to examples introduced in Section 3. 5.1 Auxiliary results related to Fractional Brownian motion We are in position to provide and prove some technical results related to fractional Brownian motion. These results are used to present the variances for the limit distributions of the central limit theorems for the estimators of H and α and to prove Theorem 3.1 in Subsection 4.3. Proposition 5.1. Let X be a H fractional Brownian motion with H ∈ (0, 1). For β ∈ R, −1/2 < β < 0, let fβ be defined as in (12), fβ = △ X where Z0 = √ 0,1 var△0,1 X q β var△0,1 X (|x|β − E|Z0 |β ) . Then fβ can be expanded in a unique way into series of Hermite polynomials fβ (x) = X fβ,q Hq (x) q≥d and P q≥d 2 < +∞, where d is the Hermite rank of f , moreover d ≥ 2. q!fβ,q β Proof. Since −1/2 < β < 0, one has √1 2π R fβ (x)e−x 2 /2 dx = 0 and R √1 2π R R fβ2 (x)e−x 2 /2 dx < +∞. Then following Proposition 1.4.2-(iv) in [19], we can write fβ in terms of Hermite polynomials in a unique way fβ (x) = X fβ,q Hq (x), q≥d where d ≥ 1 is the Hermite rank of fβ and Hq s are the Hermite polynomials. Moreover, it is clear that Z0 ∼ N (0, 1). From Proposition 2.2.1 in [19], we get E[Hp (Z0 )Hq (Z0 )] = ( 0 if p 6= q p! if p = q Then since H1 (x) = x, one has EH1 (Z0 )fβ (Z0 ) = EZ0 fβ (Z0 ) = fβ,1 EZ02 = fβ,1 . Combining with the fact that (var△0,1 X)β √ EH1 (Z0 )fβ (Z0 ) = 2π Z R x(|x|β − E|Z0 |β )e−x we deduce that fβ,1 = 0. It follows that d ≥ 2. Moreover, Efβ2 (Z0 ) 1 =√ 2π Z fβ2 (x)e−x R 31 2 /2 dx < +∞. 2 /2 dx = 0, On the other hand, Efβ2 (Z0 ) = X fβ,p fβ,q E[Hp (Z0 )Hq (Z0 )] = P 2 q!fβ,q . q≥d p,q≥d It follows that X 2 < +∞. q!fβ,q q≥d !! 1 ρ , | ρ |≤ 1. Then for each β ∈ C, Re(β) ∈ (−1/2, 0), Lemma 5.1. Let (U, V ) = N2 (0, 0), ρ 1 there exists a constant C > 0 such that ∀ | ρ |≤ 1, we have: (d) Proof. Let Σ = ! 1 ρ ρ 1 | cov(| U |β , | V |β ) |≤ Cρ2 . We have det(Σ) = 1 − ρ2 and Σ−1 = ! 1 ρ . The density function of ρ 1 1 1−ρ2 (U, V ): −1/2 f (x, y) =| 2πΣ | " !# 1 x exp − (xy)Σ−1 y 2  = (2π)2 detΣ −1/2  exp −  1 (x2 + y 2 − 2ρxy) . 2(1 − ρ2 ) We get  β β E |U | |V |  1 = 2π 1 − ρ2 E | U |β E | V |β = 1 2π p Z R2 Z   1 (x2 + y 2 − 2ρxy) dxdy | x | | y | exp − 2(1 − ρ2 ) β β R2 | x |β | y |β exp(− x2 + y 2 )dxdy 2 and cov(| U |β , | V |β ) = E(| U |β | V |β ) − E | U |β E | V |β = where Since 1 2π Z R2 | x |β | y |β exp(− x2 + y 2 )Aρ (x, y)dxdy 2 ! R R | x |β xe−x  1 ρ2 ρxy Aρ (x, y) = p exp − (x2 + y 2 ) exp 2 1−ρ 1 − ρ2 1 − ρ2 2 /2  − 1. dx = 0 we obtain that 1 cov(| U | , | V | ) = 2π β β Z R2 | x |β | y |β exp(− x2 + y 2 )Bρ (x, y)dxdy 2 with !  ρxy 1 ρ2 2 2 (x exp + y ) Bρ (x, y) = Aρ (x, y) − ρxy = p exp − 2 1−ρ 1 − ρ2 1 − ρ2 32  − 1 − ρxy. Using L’Hôpital rule, we get: ′ Bρ Bρ lim 2 = lim ρ→0 ρ ρ→0 2ρ ′ ′ Bρ = Aρ (x, y) − xy = h ρ(1 − ρ2 ) −3 2 !  ρ2 ρxy × exp − (x2 + y 2 ) exp 2 1−ρ 1 − ρ2 ′ lim ρ→0 Bρ = xy · lim ρ→0 2ρ h exp   − (x2 + y 2 )[2ρ(1 − ρ2 )−1 + 2ρ3 (1 − ρ2 )−2 ] + xy (1 − ρ2 )−1 + 2ρ2 (1 − ρ2 )−2  −ρ2 2 1−ρ2 (x + y2) + ρxy 1−ρ2 2ρ   − xy i (1 − ρ2 )−1 − 1 + i 1 1 − (x2 + y 2 ) := A + − (x2 + y 2 ). 2 2 Then we continue using L’Hôpital rule for the remaining limit: xy A= lim exp 2 ρ→0 " = −ρ2 ρxy (x2 + y 2 ) + 2 1−ρ 1 − ρ2 ! × 2ρ 2ρ3 2ρ 2 2 − (x + y ) + (1 − ρ2 )2 1 − ρ2 (1 − ρ2 )2 ! + xy x2 y 2 . 2 1 2ρ2 + 1 − ρ2 (1 − ρ)2 !# One has Bρ x2 y 2 + 1 − (x2 + y 2 ) = ρ→0 ρ2 2 !   ρxy ∂ 2 Bρ (x, y) ρ2 2 2 = Pρ (x, y)exp − (x + y ) exp . ∂ρ2 1 − ρ2 1 − ρ2 lim where Pρ (x, y) is a fourth degree polynomial that depends continuously on ρ. We also have ′ B0 (x, y) = 0, Bρ (x, y) |ρ=0 = 0. A Taylor expansion up to order 2 leads to !  ρ̃xy ρ̃2 (x2 + y 2 ) exp Bρ (x, y) = ρ Pρ̃ (x, y)exp − 1 − ρ̃2 1 − ρ̃2 2  with ρ̃ ∈ (0, ρ). On the compact set | ρ |≤ 1/2, the polynomial Pρ (x, y) can be bounded by a fourth degree polynomial P (x, y), for all x, y ∈ R, | Pρ (x, y) |≤| P (| x |, | y |) |. Moreover !  ρ̃xy ρ̃2 (x2 + y 2 ) exp exp − 1 − ρ̃2 1 − ρ̃2 But with | ρ̃ |≤ 1/2, we get | ρ̃ 1−ρ̃2 |≤ 2/3. So exp  ρ̃xy 1−ρ̃2   ≤ exp    ≤ exp 2|xy| 3   ρ̃xy . 1 − ρ̃2 . Thus  2 | xy | . | Bρ (x, y) |≤ ρ | P (| x |, | y |) | exp 3 2 Because the power function grows faster than the polynomial function, we have Z R2 Re(β) | xy |   x2 + y 2 2 | xy | exp(− )P (| x |, | y |) | exp dxdy < ∞. 2 3 So we have the conclusion. 33 Lemma 5.2. Let X be a fractional Brownian motion, β ∈ C, Re(β) ∈ (−1/2, 0). Then X k∈Z | cov(| △k,1 X |β , | △0,1 X |β ) |< +∞. Proof. We have cov(△k,1 X, △0,1 X) = − K K k2H X p − p′ 2H 1 X ap ap′ | k + p − p′ |2H = − ap ap′ | 1 + | . 2 p,p′ =0 2 p,p′ =0 k We just need to consider cov(△k,1 X, △0,1 X) when | k |≥ K. Since 1 + cov(△k,1 X, △0,1 X) = − Set g(x) = − If H = 1 2 p−p′ k ≥ 0, we get K k2H X p − p′ 2H ap ap′ (1 + ) . 2 p,p′ =0 k K 1 X ap ap′ (1 + (p − p′ )x)2H . 2 p,p′ =0 then g(x) = 0. If H 6= 12 , using Taylor expansion as x → 0, we get g′ (x) = −H K X p,p′ =0 ap ap′ (p − p′ )(1 + (p − p′ )x)2H−1 g′′ (x) = −H(2H − 1) K X p,p′ =0 ap ap′ (p − p′ )2 (1 + (p − p′ )x)2H−2 g(3) (x) = −H(2H − 1)(2H − 2) K X p,p′ =0 ap ap′ (p − p′ )3 (1 + (p − p′ )x)2H−3 . Thus g(0) = 0, g′ (0) = 0, g′′ (0) = 0, g(3) (0) = 0 and we obtain that g(x) = o(x3 ) as x → 0. It follows that cov(△k,1 X, △0,1 X) ∼ k2H · o( 1 ) ∼ o(k2H−3 ) k3 as k → +∞. We can apply similarly as k → −∞. Then there exists a constant C such that for all k, | k |≥ K and for all H ∈ (0, 1), | cov(△k,1 X, △0,1 X) |≤ C | k |2H−3 . For all k ∈ Z, we have  var△k,1 X = E  K X ap X(k + p) p=0 We now apply the Lemma 5.1 with U = √ K X p′ =0  ap′ X(k + p′ ) = − △k,1 X ,V var(△k,1 X)  It follows that =√ (67) K 1 X ap ap′ | p − p′ |2H . 2 p,p′ =0 △0,1 X . var(△0,1 X) Then  △k,1 X cov 2 (△k,1 X, △0,1 X) △0,1 X |β , | q cov | q . |β  ≤ C · var 2 △0,1 X var(△k,1 X)) var(△0,1 X)) cov(| △k,1 X |β , | △0,1 X |β ) ≤ Ccov 2 (△k,1 X, △0,1 X), ∀k, k ∈ Z. 34 Since H ∈ (0, 1), we get X k∈Z P | k |4H−6 < +∞. Applying inequality (67), we obtain k∈Z cov(| △k,1 X |β , | △0,1 X |β ) = X cov(| △k,1 X |β , | △0,1 X |β ) k∈Z,|k|<K X + cov(| △k,1 X |β , | △0,1 X |β ) k∈Z,|k|≥K ≤C 5.2 X k∈Z,|k|<K cov 2 (△k,1 X, △0,1 X) + C X k∈Z,|k|≥K | k |4H−6 < +∞. Auxiliary results related to Takenaka’s process Lemma 5.3. Let {Xt , t ∈ R} be a Takenaka’s process defined by (36). Then for β ∈ R, β ∈ (−1/2, 0) and |k| > 2K, we have cov(| △k,1 X |β , | △0,1 X |β ) ≤ Ckν−1 . Proof. One has △k,1 X = where fk = K P i=0 ai 1Sk+i = K P i=0 K X Z ai X(k + i) = i=0 K X ai 1Sk+i (x, r)M (dx, dr) i=0 R×R+ K P ai (1Ck+i − 1C0 )2 . From the fact that K X | fk | =| 1 − 21C0 || i=0 ai 1Ck+i |=| i=0 K X i=0 ai = 0 and | 1 − 21C0 |= 1, it induces ai 1Ck+i | . Therefore we have to estimate, as |k| → +∞, Ik = [△k,1 X, △0,1 X]2 = +∞ Z r ν−2 0 Z | fk (x, r)f0 (x, r) | dxdr. R We will find an upper bound for Ik when |k| ≥ 2K. If x > K + r then 1Ci (x, r) = 0 for all i = 0, . . . , K, thus f0 (x, r) = 0. If x < k − r, 1Ck+i (x, r) = 0 for all i = 0, . . . , K, it follows that fk (x, r) = 0. As a result, fk (x, r)f0 (x, r) = 0 for all x ∈ (−∞, k − r) ∪ (K + r, +∞). Let k > 2K. If r < k−K 2 ⇔ k − r > K + r then fk (x, r)f0 (x, r) = 0 for all x. Thus one gets Ik = Z R = Z R     k−K 2 Z r ν−2 | fk (x, r)f0 (x, r) | dr + 0 +∞ Z k−K 2 r ν−2 +∞ Z k−K 2 | fk (x, r)f0 (x, r) | drdx =   r ν−2 | fk (x, r)f0 (x, r) | dr   dx +∞ Z r ν−2 k−K 2 Z R | fk (x, r)f0 (x, r) | dxdr. Here we consider fk (x, r)f0 (x, r). Since k > 2K, then k + K − r ≤ k + r. For k + K − r ≤ x ≤ k + r, | x − k − i |≤ r for all i = 0, . . . , K, it follows that 1Ck+i (x, r) = 1 and fk (x, r) = K P i=0 ai = 0. Therefore fk (x, r)f0 (x, r) = 0 if x ∈ (−∞, k − r) ∪ (k + K − r, +∞). We also have | fk (x, r) |=| K X i=0 ai 1Ck+i (x, r) |≤ 35 K X i=0 | ai | for all k ∈ N. Thus Ik ≤ +∞ Z r ν−2 k−r k−K 2 ≤C k+K−r Z +∞ Z r ν−2 | fk (x, r)f0 (x, r) | dxdr k+K−r Z dxdr = C( k−r k−K 2 k − K ν−1 ) ≤ Ckν−1 2 k since k−K 2 ≥ 4 and 0 < ν < 1. Let k < −2K. If r < − k+K 2 ⇔ k + K + r < −r, then for all i = 1, . . . , K, 1Ck+i (x, r) = 0, ∀x ∈ (k + K + r, +∞), 1Ci (x, r) = 0, ∀x ∈ (−∞, −r). It follows that fk (x, r)f0 (x, r) = 0, for all x ∈ (−∞, −r) ∪ (k + K + r, +∞) = R. Therefore +∞ Z Ik = r ν−2 − k+K 2 Z R |fk (x, r)f0 (x, r)|dxdr For r > − k+K 2 , r > K − K/2 = K/2. We have fk (x, r)f0 (x, r) = 0 for all x ∈ (−∞, k − r) ∪ (k − r + K, k + r) ∪ (k + r + K, K + r) ∪ (K + r, +∞). It induces that Ik = +∞ Z r ν−2 − k+K 2 = +∞ Z − k+K 2 ≤C Z R   r ν−2  +∞ Z − k+K 2 |fk (x, r)f0 (x, r)|dxdr k−r+K Z k−r |fk (x, r)f0 (x, r)|dxdr + k+r+K Z k+r   |fk (x, r)f0 (x, r)|dxdr  r ν−2 dr ≤ C|k|ν−1 . Putting together with Theorem 4.2, for |k| > 2K we obtain that cov(| △k,1 X |β , | △0,1 X |β ) ≤ Ckν−1 . 5.3 Auxiliary results related to rate of convergence We present here a lemma used to determine rate of convergence in the proofs of Theorems 3.3 and 3.4. Lemma 5.4. For p < 0, let Sn = 1 n P p |k|≤n |k| , Sn = then lim Sn = 0. Moreover n→+∞  −1   O(n ) if p < −1 if − 1 < p < 0 if p = −1. O(np )   O( ln n ) n Proof. Set Sn = n 1X kp . n k=1 36 If p < −1, since R∞ xp dx < +∞, following the integral test for convergence, we get ∞ P kp < +∞. Then k=1 1 Sn = O(n−1 ). If −1 < p < 0, we take a constant ǫ such that 0 < ǫ < −p, then Sn = Since p + ǫ < 0, we get If p = −1, then Sn = 1 n n P k=1 n P k=1 1 k 1+ǫ 1 k n n n X k1+ǫ+p n1+ǫ+p 1X 1 1X p+ǫ ≤ = n . 1+ǫ n k=1 k1+ǫ n k=1 k1+ǫ k k=1 < +∞. Then Sn = O(np+ǫ ) for all 0 < ǫ < −p. Thus Sn = O(np ). = O( lnnn ). In all cases, we have lim Sn = 0. n→+∞ Acknowledgements The authors would like to thank Michel Zinsmeister for his helpful suggestions. References [1] P. Abry, L. Delbeke, and P. Flandrin. Wavelet-based estimators for the self-similarity parameter of α-stable processes. In IEEE International Conference on Acoustics, Speech and Signal Processing III, page 1581–1584. Az, USA: Phoenix, 1999. [2] P. Abry, B. Pesquet-Popescu, and M.S. Taqqu. Estimation ondelette des paramètres de stabilité et d’autosimilarité des processus α− stables autosimilaires. In 17ème Colloque sur le traitement du signal et des images, FRA, 1999. GRETSI, Group d’Etudes du Traitement du Signal 1999. [3] A. Ayache and J. Hamonier. Linear fractional stable motion: a wavelet estimator of the alpha parameter. Statistics and Probability Letters, 82(8):1569–1575, 2013. [4] A. Ayache and J. Hamonier. Linear multifractional stable motion: wavelet estimation of H(.) and α parameter. Lithuanian Mathematical Journal, 55(2):159–192, 2015. [5] J. M. Bardet and C. Tudor. A wavelet analysis of the Rosenblatt process: chaos expansion and estimation of the self-similarity parameter. Stochastic Processes and their Applications, 120(12):2331– 2362, 2010. [6] A. Benassi, P. Bertrand, S. Cohen, and J. Istas. Identification of the Hurst index of a step fractional Brownian motion. Stat. Inf. Stoc. Proc., 3(1):101–111, 2000. [7] A. Benassi, S. Cohen, and J. Istas. Identifying the multifractional function of a Gaussian process. Stat. and Proba. Letters, 39(4):337–345, 1998. [8] J. F. Coeurjolly. Estimating the parameters of a fractional Brownian motion by discrete variations of its sample paths. Stat. Inf. Stoc. Proc., 4(2):199–227, 2001. [9] S. Cohen and J. Istas. Fractional fields and applications. Springer-Verlag, Berlin, 2013. [10] D. Dacunha-Castelle and M. Duflo. Probabilités et Statistiques, volume 2. Masson, Paris, 1983. [11] J. Istas. Estimating self-similarity through complex variations. Electronic Journal of Statistics, 6:1392–1408, 2012. 37 [12] J. Istas. Manifold indexed fractional fields. ESAIM: Probability and Statistics, 16:222–276, 2012. [13] J. Istas and G. Lang. Quadratic variations and estimation of the Höder index of a Gaussian process. Ann. Inst. H. Poincaré Probab. Statist, 33(4):407–436, 1997. [14] C. Lacaux and J.-M. Loubes. Hurst exponent estimation of fractional Lévy motions. ALEA Lat. Am. J. Probab. Math. Stat., 3:143–161, 2007. [15] R. Le Guével. An estimation of the stability and the localisability functions of multistable processes. Electronic Journal of Statistics, 7:1129–1166, 2013. [16] E. L. Lehmann. Elements of large-sample theory. Springer-Verlag, New York, 1999. [17] J. H. McCulloch. Financial applications of stable distributions, volume 14. North-Holland, New York, in G. S. Maddala and C. R. Rao, Handbook of Statistics edition, 1996. [18] I. Nourdin, D. Nualart, and C. Tudor. Central and non-central limit theorems for weighted power variations of fractional Brownian motion. Ann. Inst. H. Poincaré Probab. Statist., 46(4):1055–1079, 2010. [19] I. Nourdin and G. Peccati. Normal approximations with Malliavin calculus: from Stein’s method to universality, volume 192. Cambridge University Press, Cambridge, 2012. [20] V. Pipiras, M. S. Taqqu, and P. Abry. Bounds for the covariance of functions of infinite variance stable random variables with applications to central limit theorems and wavelet-based estimation. Bernoulli, 13(4):1091–1123, 2007. [21] G. Samorodnitsky and M. S. Taqqu. Stable Non-Gaussian Random Processes. Chapmann and Hall, New York, 1994. [22] L. Schwartz. Théorie des distributions. Hermann, Paris, 1978. [23] S. Stoev, V. Pipiras, and M. S Taqqu. Estimation of the self-similarity parameter in linear fractional stable motion. Signal Processing, 82:1873–1901, 2002. [24] S. Stoev and M. S Taqqu. Asymptotic self-similarity and wavelet estimation for long-range dependent fractional autogressive intergrated moving average time series with stable inovations. Journal of Time Series Analysis, 26(2):211–249, 2005. [25] S. Takenaka. Integral-geometric construction of self-similar stable processes. Nagoya Math. J., 123:1–12, 1991. [26] A.W. Van Der Vaart. Asymptotic statistics. Cambrigde University Press, Cambridge, 2000. 38
10math.ST
arXiv:1408.3215v1 [cs.NE] 14 Aug 2014 Cortical Processing with Thermodynamic-RAM M. Alexander Nugent Timothy W. Molter M. Alexander Nugent Consulting, Santa Fe, NM, USA KnowmTech LLC, Albuquerque, NM, USA Xeiam LLC, Santa Fe, NM, USA Email: [email protected] M. Alexander Nugent Consulting, Santa Fe, NM, USA KnowmTech LLC, Albuquerque, NM, USA Xeiam LLC, Santa Fe, NM, USA Email: [email protected] Abstract—AHaH computing forms a theoretical framework from which a biologically-inspired type of computing architecture can be built where, unlike von Neumann systems, memory and processor are physically combined. In this paper we report on an incremental step beyond the theoretical framework of AHaH computing toward the development of a memristorbased physical neural processing unit (NPU), which we call Thermodynamic-RAM (kT-RAM). While the power consumption and speed dominance of such an NPU over von Neumann architectures for machine learning applications is well appreciated, Thermodynamic-RAM offers several advantages over other hardware approaches to adaptation and learning. Benefits include general-purpose use, a simple yet flexible instruction set and easy integration into existing digital platforms. We present a high level design of kT-RAM and a formal definition of its instruction set. We report the completion of a kT-RAM emulator and the successful port of all previous machine learning benchmark applications including unsupervised clustering, supervised and unsupervised classification, complex signal prediction, unsupervised robotic actuation and combinatorial optimization. Lastly, we extend a previous MNIST hand written digits benchmark application, to show that an extra step of reading the synaptic states of AHaH nodes during the train phase (healing) alone results in plasticity that improves the classifier’s performance, bumping our best F1 score up to 99.5%. I. I NTRODUCTION Because of its superior power, size and speed advantages over traditional von Neumann computing architectures, the biological cortex is one of Nature’s structures that humans are trying to understand and recreate in silicon form [1]–[4]. The cognitive ability of causal understanding that animals possess along with other higher functions such as motor control, reasoning, perception and planning are credited to different anatomical structures in the brain and cortex across animal groups [5]. While the overall architecture and neural topology of the cortex across the animal kingdom may be different, the common denominator is the neuron and its connections via synapses. In this paper, we present a general-purpose neural processing unit (NPU) hardware circuit we call ThermodynamicRAM that provides a physical adaptive computing resource to enable efficient emulation of functions associated with brains and cortex. The motivation for this work is to satisfy the need for a chip where processor and memory are the same physical substrate so that computations and memory adaptations occur together in the same location. For machine learning applications that intend to achieve the ultra-low power dissipation of biological nervous systems, the shuttling of bits back and forth between processor and memory grows with the size and complexity of the model. The low-power solution to machine learning occurs when the memory-processor distance goes to zero and the voltage necessary for adaption is reduced. This can only be achieved through intrinsically adaptive hardware. Other experts in the field have also expressed the need for this new type of computing. Traversa and Ventra recently introduced the idea of ‘universal memcomputing machines’, a general-purpose computing machine that has the same computational power as a non-deterministic Universal Turing Machine but also exhibiting intrinsic parallelization and information overhead [6]. Their proposed DCRAM and other similar solutions employ memristors, elements that exhibit the capacity for both memory and processing. They show that a memristor or memcapacitor can be used as a subcomponent for computation while at the same time storing a unit of data. A previous study by Thomas et al. also argued that the memristor can better be used to implement neuromorphic hardware than traditional CMOS electronics [7]. In recent years there has been an explosion of worldwide interest in memristive devices [8], their connection to biological synapses [9], [10], and use in alternative computing architectures [11]. Thermodynamic-RAM is adaptive hardware operating on the principles of ‘AHaH computing’ [12], a new computing paradigm where processor and memory are united. The fundamental building blocks it provides are ‘AHaH nodes’ and ‘AHaH synapses’ analogous to biological neurons and synapses respectively. An AHaH node is built up from one or more synapses, which are are implemented as differential memristor pairs. Spike streams asynchronously drive coactivation of synapses, and kT-RAM’s instruction set allows for specification of supervised or unsupervised adaptive feedback. The co-active synaptic weights are summed on the AHaH node’s output electrode as an analog sum of currents providing both a state and a magnitude. While reverse engineering the biological brain was not the starting point for developing AHaH computing, it is encouraging that the present design shares similarities with the cortex such as sparse spike data encoding and the capacity for continuous on-line learning. Much like a graphical processing unit (GPU) accelerates graphics, kT-RAM plugs into existing computer architectures to accelerate machine learning operations. This opens up the possibility to give computer hardware the ability to perceive and act on information flows without being explicitly programmed. In neuromorphic systems, there are three main specifications: the network topology, the synaptic values and the plasticity of the interconnections or synapses. Any generalpurpose neural processor must contend with the problem that hard-wired neural topology will restrict the available neural algorithms that can be run on the processor. In kT-RAM, the topology is defined in software, and this flexibility allows for it to be configured for different machine learning applications requiring different network topologies such as trees, forests, meshes, and hierarchies. Much like a central processing unit (CPU) carries out instructions of a computer program to implement any arbitrary algorithm, kT-RAM is also generalpurpose, in that it does not enforce a specific network topology. Additionally, a simple instruction set allows for various forms of synaptic adaptation, each useful within specific contexts. So far as we currently understand, the kT-RAM instruction set is capable of supporting universal machine learning functions. For an exhaustive introduction to AHaH computing, AHaH nodes, the AHaH rule, and the AHaH node as well as circuit simulation results, machine learning benchmark applications, and accompanying open source code, please refer to a previous paper entitled “AHaH computingFrom Metastable Switches to Attractors to Machine Learning” [12]. II. M ETHODS A. Architecture The architecture of Thermodynamic-RAM presented in this paper is a particular design that prioritizes flexibility and general utility above anything else, much in the same way that a CPU is designed for general purpose use. Different machine learning applications require different network topologies (the way in which neurons are connected to each other), and having a chip that can be configured for any desired network topology has the broadest general appeal across the field. Our kT-RAM design borrows heavily from commodity RAM using its form factor and the row and column address space mapping to specific bit cells as a basis to build upon. Converting RAM to kT-RAM requires the following steps: (1) the removal of the RAM reading circuitry, (2) minor design modifications of the RAM cells, (3) the addition of memristive synapses to the RAM cells, (4) the addition of H-Tree circuitry connecting the synapses (5) and the addition of driving and output sensing circuitry. Figure 1 shows an example of what kT-RAM would look like with its H-Tree sensing node on the top metal layers of the chip connecting all the underlying synapses located at each cell in the RAM array. While at first glance it appears like this architecture leads to one giant AHaH node per chip or core, the core can be partitioned into smaller AHaH nodes of arbitrary size by temporally partitioning sub portions of the tree (AHaH nodes A and B for example). All other synapses that are not included in the currently-focused AHaH node space are unaffected by any read or write operations as they are floating. In other words, so long as it is guaranteed that synapses assigned to a particular AHaH node are never co-activated Fig. 1. Thermodynamic-RAM utilizes standard RAM technology for synaptic activation over a two-dimensional address space (light gray-bordered cells). The fractal H-Tree wire (red) forms a common electrical node (y) for summing the synaptic weights of an AHaH node (neuron) and also for providing a learning/feedback signal. Here an 16 x 16 cell array is shown, but in practice a much larger array containing many thousands of synapses can be fabricated. AHaH node temporal partitioning is achieved by addressing different spaces at different points in time (AHaH nodes A and B). with other AHaH node partitions, these ‘virtual’ AHaH nodes can co-exist on the same physical core. Any desired network topology linking AHaH nodes together can be achieved by this temporal partitioning concept by utilizing standard RAM to store network topologies and core partitions. Software enforces the constraints, while the hardware remains flexible. It is worth mentioning that many real-world applications of machine learning do not cleanly fit within the idealized structure of a pure network. Rather, mixed computation and algorithms are often used. By pairing kT-RAM with a standard CPU and RAM, enormous flexibility in use is possible. Figure 2 shows a model of an AHaH node as implemented with switches and memristors. The AHaH node has one common node linking n synapses, with k active inputs and n − k inactive (floating) inputs at any given time. The individual gated switches for activating spike inputs are labeled S0 , S1 , · · · Sn . Each synapse is made up of two serially-connected memristors labeled M0 , M1 , · · · Mn . The driving voltage source for supervised and unsupervised learning is labeled F. The subscript values a and b indicate the positive and negative dissipative pathways, respectively. B. Thermodynamic-RAM Emulator The substantial cost of hardware, let alone the cost of new hybrid memristor-CMOS hardware, provides tremendous inhibitory pressure against the realization of an NPU. On the Application developers can commence with building a market for kT-RAM on existing hardware platforms (smart phones, servers, etc.) while hardware developers can work to build more accurate and detailed emulators. Importantly, hardware developers can look to the application developers to see where the application spaces actually are and what is, and is not, useful in the real world. Although memristive kT-RAM is the long term goal, multiple generations of pure digital kT-RAM emulators can be built, each offering various trade-offs in terms of bandwidth, memory and power. Through adherence to the kT-RAM instruction set, programs can be ported from one technology generation to another and multiple industry participants can coordinate their actions across the whole technology stack. Developments at the hardware level can be informed by the application level, where utility is demonstrated, and innovations at the hardware level can propagate back to the application level. C. Thermodynamic-RAM Instruction Set and Operation Fig. 2. An AHaH node is the basic building block of AHaH computing. Thermodynamic-RAM provides a physical substrate for forming AHaH nodes (neurons) made up of serially-connected memristor pairs (synapses). The individual neural inputs corresponding to an incoming sparse-encoded spike stream are activated using standard RAM address mapping. The common electrode labeled ‘y’ serves as both a node for summing the weights of the activated synapses and also for delivering learning feedback to the synapses. one hand an NPU design needs to justify its existence by demonstrating utility across one or more application spaces. On the other hand, one cannot develop applications without the hardware. We believe we have found a solution to this chickenand-egg problem in the form of a digital kT-RAM emulator. The AHaH node is very simple, and we have exploited this simplicity to create an efficient digital emulator. The digital emulator emulates simplified AHaH nodes where the memristors are represented as having a set of incremental conductance states. The ‘nibble core’, for example, treats each memristor as having 16 discrete states and can store a synapse with one byte. The ‘byte core’ models memristors as having 256 discrete states and can store a synapse with two bytes. The ‘float core’ uses floating-point precision and provides a point of correspondence to our analog emulator. The analog emulator is more computationally expensive to run as it emulates a circuit containing memristors which behave according to our ‘generalized metastable switch memristor model’ [12]. The memristors which we have previously applied our model to include the Ag-chalcogenide [13], AIST [14], GST [10], and WOx [15] devices. We have not changed the model’s parameters during the integration of the memristors into the analog emulator since our previous study [12]. Node voltages are solved using Kirchoff’s Current Law (KCL). RC delays and capacitive effects of switching have been ignored for now. It is worth noting that all above memristor devices have proven to produce similar performance scores on the benchmarks amenable to using the analog emulator. In general, as long as the memristor is incremental and its state change is voltage dependent, it should be a viable candidate for kT-RAM. As stated previously, Thermodynamic-RAM can be plugged into existing digital computing architectures. The envisioned hardware format is congruent with standard RAM chips and RAM modules and would plug into a motherboard in a variety of different ways. In general there are two main categories of integration. First, kT-RAM is tightly coupled with the CPU, on the CPU die itself or connected via the north bridge. In this case, the instruction set of the CPU would have to be modified to accommodate the new capabilities of kT-RAM. The CPU would communicate with the kT-RAM module in a similar manner as with normal RAM, over an address and data bus. Whereas normal RAM returns a block of bits, kT-RAM would return a digitized value of the AHaH node’s analog voltage on electrode y, shown in Figure 2. Alternatively, kT-RAM is loosely coupled as a peripheral device either connected via the PCI bus, the LPC bus, or via cables or ports to the south bridge. In these cases, no modification to the CPU’s instruction set would be necessary, as the interfacing would be implemented over the generic plug-in points of the south bus. As in the case with other peripheral devices, a device driver would need to be developed. Additional integration configurations are also possible. Given the above hardware integration, kT-RAM simply becomes an additional resource that software developers have access to via an API. Currently kT-RAM is implemented as an emulator running on von Neumann architecture. Later, when a chip is available, it will replace the emulator, and existing programs written against the API will not need to be rewritten to benefit from the accelerated capabilities offered by the new hardware. In any case, kT-RAM or emulated kT-RAM operates asynchronously. As new spikes arrive, the driver in control of kT-RAM is responsible for activating the correct synapses and providing an instruction pair for each AHaH node. The returned activation value can then be passed back to the program and used as needed. The following steps are carried out by the system to process spike streams: (1) sequentially load all active synapses TABLE I K T-RAM I NSTRUCTION 1: S ET Instruction Synapse Driving Voltage Feedback Voltage (F) FF Forward-Float None/Floating FH Forward-High −V FL Forward-Low +V FU Forward-Unsupervised −V if y ≥ 0 else +V FA Forward-Anti-Unsupervised +V if y ≥ 0 else −V FZ Forward-Zero 0 RF Reverse-Float None/Floating RH Reverse-High −V RL Reverse-Low +V RU Reverse-Unsupervised −V if y ≥ 0 else +V RA Reverse-Anti-Unsupervised +V if y ≥ 0 else −V RZ Reverse-Zero 0 corresponding to the spike pattern, (2) provide an instruction or instruction pair (read-write), (3) kT-RAM executes the supplied read instruction, (4) receive the AHaH node’s activation value (confidence) from kT-RAM and (5) kT-RAM executes the supplied write instruction (if provided). One can theoretically exploit the kT-RAM instruction set (Table I) however they wish. However, to prevent saturation of the memristors in a maximally- or minimally-conductive state, one must pair ‘forward’ instructions with ‘reverse’ instructions. For example, a forward-read operation F F should be followed by a reverse operation (RF , RH, RL, RZ, RA or RU ) and vise versa. The only way to extract state information is to leave the feedback voltage floating, and thus there are two possible read instructions: F F and RF . There is no such thing as a ‘non-destructive read’ operation in kT-RAM. Every memory access results in weight adaptation according to AHaH plasticity. By understanding how the AHaH rule works (AHaH computing), we can exploit the weight adaptations to create, among other things, ‘self-healing hardware’. D. Thermodynamic-RAM Classifier Figure 3 contains pseudo code demonstrating how to construct a multi-label online classifier in software by loading spikes and executing instructions in the kT-RAM instruction set. The network topology of the classifier is simply N AHaH nodes with M synapses, where N is the number of labels being classified and M is the number of unique spikes in the entire spike stream space. The active spikes S, a subset of M , is loaded onto each AHaH, and the execute method returns the voltage on the AHaH node’s output electrode, y. Although all the AHaH nodes may exist on the same physical chip and share the same output electrode, temporal partitioning, as described above, allows for a virtual separation of AHaH nodes. E. MNIST Benchmark The Mixed National Institute of Standards and Technology (MNIST) database [16] is a classic dataset in the machine learning community. It consists of 60,000 train and 10,000 test samples of handwritten digits, each containing a digit 0 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: procedure C LASSIFY(active spikes set S, truth labels set L) for Each AHaH Node N do KTRAM.loadSpikes(N , S) y ← KTRAM.execute(N , F F ) . forward read if supervised then if N ∈ L then KTRAM.execute(N , RH) else if y ≥ 0 then . false-positive KTRAM.execute(N , RL) else . true-negative KTRAM.execute(N , RF ) end if else . unsupervised KTRAM.execute(N , RF ) end if end for end procedure Fig. 3. A multi-label online linear classifier with confidence estimation can be easily constructed via calls to the kT-RAM instruction set. to 9 (10 classes). The 28 x 28 pixel grayscale images have been preprocessed to size-normalize and center the digits. Our approach to the MNIST benchmark is to couple decision trees acting as spike encoders to a back-end classifier. We have ported multiple variants of adaptive and nonadaptive decision trees, as well as the classifier, to the kTRAM emulator. For the work presented here we use both a simple non-adaptive and efficient decision tree to reduce the computational load as well as the same adaptive decision tree used in [12]. Our choice of the non-adaptive random decision tree is also motivated by the desire to isolate adaptation only to the classifier while studying the effects of healing. Previously, AHaH attractor states have been shown to be computationally complete [12], which means that a decision tree for spike encoding formed of AHaH nodes in various configurations is capable of performing a very large number of possible feature encodings. We have only just begun exploring the space. The classification procedure is to (1) spike-encode the data and (2) perform a multi-label classification of the resulting spike stream. The mechanisms of the spike encoding strongly effect the resulting classification performance, both in terms of error rate but also computational efficiency. The optimal spike encoding method is determined by the problem constraints. The encoding can be done automatically or manually. The former entails feature learning or selection, and the latter entails feature engineering. We first create binary representations of each image by thresholding pixels exceeding a value of ten. The output of this thresholding over an image patch of 8 x 8 pixels produces a spike stream with a space of 64 channels. This spike stream is in turn fed into a simple random spike decision tree, where each node in the tree is looking for the presence of a spike on one spike channel. The leaves of the decision tree encode features, and these ‘feature spike streams’ were joined with pooling coordinates to produce a final output spike stream that was fed to the classifier. Each spike in the final spike stream represents the presence of a feature in a non-overlapping pooling region (8 x 8 pixels). This architecture could be compared roughly to a simple convolutional neural network. The output of the classifier produces a list of AHaH node ‘activations’ in the form of voltages. The more positive the voltage, the more likely that it is correct. By increasing a confidence threshold, one can increase the classification precision at the expense of reducing recall. Since the choice of confidence threshold is arbitrary, we report here the peak F1 score. In the absence of any training labels, each AHaH node in the classifier receives an F F −RF instruction sequence, which amounts to a forward voltage to read the node state followed by a reverse voltage without feedback. This instruction sequence is carried out during the train phase of the classification and the RF operation is necessary to prevent the memristors from saturating. Depending on the initial state of the synapses and the evaluation voltage, the synapses will slightly adapt, meaning there is no possible way to perform a non-destructive read operation. While one might assume that a read operation which adapts the memristors’ state is detrimental, this adaptation actually improves the classifier’s performance indicating that a slight dose of online unsupervised learning occurs by just reading. This mechanism can be taken advantage of to further improve the results of the MNIST classification benchmark by performing a series of unsupervised classifications on subsets of the original spike stream during the training phase (healing). We extended the baseline classifier procedure as shown in Figure 3 so that during the train phase an extra classification was performed. For each training exemplar, the base supervised classification was performed followed by another classification with a randomly-chosen subset of the original spike stream’s activated spikes. We varied this amount from 0 to 100%. We also tested two variations of this, where the spike pattern subset was reclassified either via ‘unsupervised’ (F F −RF ) or ‘supervised’ (see Figure 3). Each configuration was repeated 10 times, and each experiment included 3 training epochs over a reduced set of 10,000 training and 1,000 test images. The reduced train and test set was motivated by the need to speed up total experiment time. As stated above, a non-adaptive spike encoder was used for this experiment in order to isolate the adaptive healing effects to only the classifier. As a final experiment, we repeated our original MNIST classification benchmark with the full train and test image set, an adaptive spike encoder, and the new healing method. signal prediction challenge, Breast Cancer Wisconsin, Reuters21578 Distribution 1.0, and Census Income classification benchmarks [17]. All benchmarks and challenges performed roughly the same as before using the kT-RAM emulator with the various core types. As expected, the low-resolution nibble and byte cores, while extremely fast, cause slight degradation of performance. This trade off was observed with the higher resolution core types as well, where their performance was better at the cost of longer processing times. The analog core, which models a particular Ag-chalcogenide memristor from Boise State University showed excellent congruence with previous benchmarks, and also exhibited the expected speed degradation given the extra complexity of the model. III. R ESULTS AND D ISCUSSION In this paper, we have proposed one possible hardware implementation of AHaH computing, which we call Thermodynamic-RAM or kT-RAM for short. While a detailed description of the chip design is beyond the scope of this paper, an overview of how standard RAM can be modified to create kT-RAM was given. Additionally, we described how kTRAM can be plugged into existing digital computing platforms Here, we report that all the benchmarks and challenges from the previous AHaH computing publication [12] were successfully re-evaluated using the kT-RAM emulator. The complete list includes visual clustering challenges, unsupervised robotic arm challenge, 64-city traveling-salesman problem, complex A. MNIST Benchmark As shown in Figure 4, the baseline classification F1 score for the non-adaptive spike encoder, without healing, and with 10,000 training images and 1,000 test images was 0.967. The degradation of F1 score is due to the reduced train-test set. It can been seen that reclassifying a subset of each exemplar’s spike set during the train phase (healing) improves the results beyond the baseline. Furthermore, the unsupervised version outperformed the supervised version. In general a percentage of active spikes used for the reclassification of 30% to 70% gave the best results. The kT-RAM classifier is therefore capable of self-optimizing its performance in an unsupervised way. Furthermore, this demonstrates that read operations do not adversely affect the classification performance but rather improve them. In other words, there is no need for a nondestructive read operation, which is commonly assumed by circuit designers. This opens up the possibility of ultra-low power adaptive circuitry, since adaptation can theoretically occur at low voltages and the circuit can heal itself from the damage that will occur due to thermal fluctuations. Repeating the MNIST classification benchmark on the full train and test dataset (60,000 and 10,000 images respectively) using our new kT-RAM emulator, the original adaptive spike encoder and healing yielded better performance than our previous results of 0.98 - 0.99 F1 score [12]. Using the adaptive encoder of [12] over 20 training epochs yielded an F1 score of 0.995, taking approximately 2.5 hours to train running on a 2012 MacBook Pro. These results show that our port of AHaH computing functional code over to our new kT-RAM emulator code did not degrade the outcome of the classifier. Just adding the healing mechanism significantly improved results. In addition, the experiment time actually decreased, indicating that our emulator is very efficient. IV. C ONCLUSION nodes (healing) alone results in plasticity that improves the classifier’s performance. Our previous best F1 score on the MNIST classification benchmark has been improved to 0.995. Note that it is not our intention to produce the absolute best MNIST benchmark performance and compete with established machine learning techniques. We are simply choosing a wide range of machine learning benchmarks and challenges to show utility of our proposed NPU. The advantage will be low-power adaptive hardware with a consistent API that can be used to solve numerous problems across the wide spectrum of the machine learning application space. What we are attempting to present is therefore not just a specific solution to a benchmark problem but rather that kT-RAM offers a path toward a new type of adaptive generic computing substrate. V. F UTURE W ORK Fig. 4. For each training exemplar in the MNIST classification benchmark, a non-adaptive spike encoder was used to generate a spike encoded input to the kT-RAM classifier. Random subsets of the original spike-encoded input (from 0% to 95%) were generated from the original spike pattern and reclassified (healing), either unsupervised (purple, dashed) or supervised (orange). Average baseline F1 score for 3 epochs was 0.967 (blue, dotted). The results demonstrate that the act of reading the synaptic states of AHaH nodes results in plasticity that improves the classifier’s performance on the test set. in a similar way as RAM and RAM modules. Whether kTRAM is integrated directly into a CPU’s die, or it is off-board as a peripheral device or anything in between, the kT-RAM instruction set provides a minimal and complete interface for integrating the chip into existing systems for accelerating machine learning tasks where large scale adaptive networks become a bottleneck in typical von Neumann architecture. Writing software to utilize kT-RAM will only require the addition of the kT-RAM API. Our kT-RAM emulator allows us to develop applications, demonstrate utility, and justify a large investment into chip development. When chips are available, existing applications using the emulator API will not have to be rewritten in order to take advantage of new hardware acceleration capabilities. In addition, we report that we have successfully ported all of our previous examples of AHaH machine learning capabilities to use our new kT-RAM emulator including classification, prediction, clustering, robotic control, and combinatorial optimization. All of these capabilities are are associated with biological cortex. The computing architecture in both cortex and kT-RAM is one in which the memory and processor are the same physical substrate. The temporal partitioning feature of the kT-RAM design presented allows for a general purpose chip where the network topology is configured in software rather than being ‘hard coded’ in the chip’s circuitry. The software procedure for implementing a classifier with kT-RAM and the instruction set was given as pseudo code, and it shows how the spike streams and truth labels (for supervised learning) are processed. Extending our previous MNIST hand written digit classification benchmark, it was shown that the act of reading the synaptic states of AHaH The classifier demonstration in this paper represents just one network topology and one basic capability of the cortex, but as mentioned, all the machine learning capabilities reported in a previous publication [12] have been successfully ported over to the kT-RAM emulator. Different topologies implemented by different procedures and via the described AHaH node temporal partitioning can be utilized for a wide range of cortical capabilities. Because the network topology is defined in software and not ‘hard-coded’ in kT-RAM circuitry, any topology can be created, explored and tested. This flexibility reminds one of the advantages and attractiveness of the CPU - it is a jack of all trades and master of none. This is not to say that kT-RAM could not be redesigned to an applicationspecific version, just as ASICs are optimized circuits that are designed to do one thing well. Substantial work remains in hardware design and fabrication and more generally in further developing AHaH computing. The simplicity of Thermodynamic-RAM, combined with the fact that we have demonstrated a number of machine learning capabilities leads us to conclude that this work will be well worth the effort. ACKNOWLEDGMENT The authors would like to thank the Air Force Research Labs in Rome, NY for their support under the SBIR/STTR programs AF10-BT31, AF121-049. R EFERENCES [1] B. McCormick, “Applying cognitive memory to cybersecurity,” in Network Science and Cybersecurity. Springer, 2014, pp. 63–73. [2] J. Navaridas, S. Furber, J. Garside, X. Jin, M. Khan, D. Lester, M. Luján, J. Miguel-Alonso, E. Painkras, C. Patterson et al., “SpiNNaker: Fault tolerance in a power-and area-constrained large-scale neuromimetic architecture,” Parallel Computing, vol. 39, no. 11, pp. 693–708, 2013. [3] B. V. Benjamin, P. Gao, E. McQuinn, S. Choudhary, A. R. Chandrasekaran, J. Bussat, R. Alvarez-Icaza, J. Arthur, P. Merolla, and K. Boahen, “Neurogrid: A mixed-analog-digital multichip system for large-scale neural simulations,” Proceedings of the IEEE, vol. 102, no. 5, pp. 699–716, 2014. [4] S. K. Esser, A. Andreopoulos, R. Appuswamy, P. Datta, D. Barch, A. Amir, J. Arthur, A. Cassidy, M. Flickner, P. Merolla et al., “Cognitive computing systems: Algorithms and applications for networks of neurosynaptic cores,” in Neural Networks (IJCNN), The 2013 International Joint Conference on. IEEE, 2013, pp. 1–10. [5] J. Dugas-Ford, J. J. Rowell, and C. W. Ragsdale, “Cell-type homologies and the origins of the neocortex,” Proceedings of the National Academy of Sciences, vol. 109, no. 42, pp. 16 974–16 979, 2012. [6] F. L. Traversa and M. Di Ventra, “Universal memcomputing machines,” arXiv preprint arXiv:1405.0931, 2014. [7] A. Thomas, “Memristor-based neural networks,” Journal of Physics D: Applied Physics, vol. 46, no. 9, p. 093001, 2013. [8] T. Prodromakis and C. Toumazou, “A review on memristive devices and applications,” in Electronics, Circuits, and Systems (ICECS), 2010 17th IEEE International Conference on. IEEE, 2010, pp. 934–937. [9] T. Chang, S.-H. Jo, and W. Lu, “Short-term memory to long-term memory transition in a nanoscale memristor,” ACS Nano, vol. 5, no. 9, pp. 7669–7676, 2011. [10] Y. Li, Y. Zhong, L. Xu, J. Zhang, X. Xu, H. Sun, and X. Miao, “Ultrafast synaptic events in a chalcogenide memristor,” Scientific Reports, vol. 3 doi:10.1038/srep01619, no. 1619, 2013. [11] F. C. Morabito, A. G. Andreou, and E. Chicca, “Neuromorphic engineering: from neural systems to brain-like engineered systems.” Neural Networks, vol. 45, pp. 1–3, 2013. [12] M. A. Nugent and M. T. W, “Ahah computing-from metastable switches to attractors to machine learning,” PLoS ONE, vol. 9, p. e85175, 02 2014. [13] A. S. Oblea, A. Timilsina, D. Moore, and K. A. Campbell, “Silver chalcogenide based memristor devices,” in Proc. 2010 IEEE International Joint Conference on Neural Networks (IJCNN), 2010, pp. 1–3. [14] J. J. Zhang, H. J. Sun, Y. Li, Q. Wang, X. H. Xu, and X. S. Miao, “AgInSbTe memristor with gradual resistance tuning,” Applied Physics Letters, vol. 102, no. 18, p. 183513, 2013. [15] T. Chang, S.-H. Jo, K.-H. Kim, P. Sheridan, S. Gaba, and W. Lu, “Synaptic behaviors and modeling of a metal oxide memristive device,” Applied Physics A, vol. 102, no. 4, pp. 857–863, 2011. [16] Y. LeCun and C. Cortes, “The mnist database of handwritten digits,” 1998. [17] K. Bache and M. Lichman, “UCI machine learning repository,” 2013. [Online]. Available: http://archive.ics.uci.edu/ml
9cs.NE
arXiv:1604.08435v1 [math.AC] 28 Apr 2016 Dissertation zur Erlangung des Doktorgrades (Dr. rer. nat.) des Fachbereichs Mathematik/Informatik der Universität Osnabrück Hilbert-Kunz functions of surface rings of type ADE vorgelegt von Daniel Brinkmann Osnabrück eingereicht: Mai 2013 veröffentlicht: August 2013 Betreuer: Prof. Dr. Holger Brenner Contents Introduction The goal of this thesis and a sketch of the most important ideas Summary of the thesis Acknowledgements Notations and conventions 5 5 10 15 15 Chapter 1. A survey on Hilbert-Kunz theory 1.1. The algebraic viewpoint of Hilbert-Kunz theory 1.2. The geometric viewpoint of Hilbert-Kunz theory 1.2.1. Generalities on vector bundles 1.2.2. Frobenius 1.2.3. Syzygy bundles 1.2.4. Stability 1.2.5. Relation to Hilbert-Kunz theory 1.2.6. Curves of degree three 1.3. Related invariants and further readings 1.3.1. Limit Hilbert-Kunz multiplicity 1.3.2. F-Signature 1.3.3. Further readings 17 17 31 31 33 34 37 40 42 44 44 46 46 Chapter 2. Examples of Hilbert-Kunz functions and Han’s δ function 2.1. Examples of Hilbert-Kunz functions 2.2. Han’s δ function 2.3. The behaviour of the Hilbert-Kunz multiplicity in families 2.3.1. The family F1 2.3.2. The family FU 2.3.3. The family FV 2.3.4. The family FW 49 49 55 67 68 70 72 73 Chapter 3. Matrix factorizations and representations as first syzygy modules 3.1. Properties of maximal Cohen-Macaulay modules 3.1.1. Maximal Cohen-Macaulay modules and Hilbert-Kunz theory 3.2. Generalities on matrix factorizations 3.3. Constructing isomorphisms of maximal Cohen-Macaulay modules 3.4. The case An with n ≥ 0 3.5. The case Dn with n ≥ 4 3.6. The case E6 3.7. The case E7 77 77 79 83 88 91 92 95 99 3 4 CONTENTS 3.8. The case E8 3.9. An idea of a purely algebraic construction of the isomorphisms 3.10. A comment on the graded situation 102 106 108 Chapter 4. The Hilbert-series of first syzygy modules of monomial ideals 4.1. A short exact sequence 4.2. Examples 4.2.1. The case An 4.2.2. The case Dn 4.2.3. The case E6 4.2.4. The case E7 4.2.5. The case E8 111 111 115 116 116 118 119 120 Chapter 5. Relations between the maximal Cohen-Macaulay modules 5.1. The Case An−1 with n ≥ 1 5.2. The Case Dn+2 with n ≥ 2 5.2.1. Pull-backs to At−1 with t|2n 5.2.2. Pull-backs to Dn/2+2 5.3. The Case E6 5.4. The Case E7 5.5. The Case E8 5.6. Overview 123 125 126 127 128 129 133 135 136 Chapter 6. The Hilbert-Kunz functions of surface rings of type ADE 6.1. The case An−1 with n ≥ 1 6.2. The case Dn+2 with n ≥ 2 6.3. The case E6 6.4. The case E7 6.5. The case E8 139 139 140 142 143 147 Chapter 7. Extensions and further examples 7.1. Hilbert-Kunz functions of E8 with respect to various ideals I , m 7.2. The Hilbert-Kunz function of A∞ 7.3. The Hilbert-Kunz function of D∞ 7.4. On the Hilbert-Kunz functions of two-dimensional Fermat rings 7.5. Open questions 7.5.1. Questions concerning rings of dimension two 7.5.2. Questions concerning rings of dimension at least three 151 151 153 155 158 166 166 169 Appendix A. 171 An implementation of Corollary 2.31 for CoCoA Appendix B. Computer computations to Chapter 5 B.1. Normal subgroups with GAP and rings of invariants with Singular B.2. Macaulay2 computations in the E6 -case B.3. Macaulay2 computations in the E8 -case 175 175 177 178 Bibliography 187 Introduction The goal of this thesis and a sketch of the most important ideas The starting point for Hilbert-Kunz theory was the paper “Characterizations of regular local rings of characteristic p” and its sequel “On Noetherian rings of characteristic p” by Kunz published 1969 resp. 1976 (cf. [Kun69] and [Kun76]). The central objects are the Hilbert-Kunz function and the Hilbert-Kunz multiplicity, which are defined in the case of affine k-algebras R := k[X1 , . . . , Xn ]/I in dependence on the classical Hilbert-Samuel multiplicity and function as   pe e HK(R, pe ) = dimk R/ X1 , . . . , Xnp  and HK(R, pe ) , e→∞ pe·dim(R) eHK (R) = lim where k denotes a field of characteristic p > 0 and dim(R) denotes the Krull dimension of R. For an (X1 , . . . , Xn )-primary ideal J := ( f1 , . . . , fm ), the Hilbert-Kunz function of R with respect to J and the Hilbert-Kunz multiplicity of R with respect to J are defined as   pe e HK(J, R, pe ) = dimk R/ f1 , . . . , fmp  resp. HK(J, R, pe ) . e→∞ pe·dim(R) eHK (R) = lim Seven years later, Monsky proved the existence of Hilbert-Kunz multiplicities in a more general situation (cf. [Mon83a, Theorem 1.8]). In the same paper the term “Hilbert-Kunz function” firstly appeared. Hilbert-Kunz theory has applications in Iwasawa theory as well as in tight closure theory (see for example [Mon83b] and [Hun96]). Initially, Kunz expected a relation to the resolution of singularities in positive characteristics (cf. the discussion after Example 4.3 of [Kun76]) but up to today there are no substantial results in this direction. Maybe the most central question in Hilbert-Kunz theory was whether Hilbert-Kunz multiplicities have to be rational or not. For long time the favourite answer was that they have to be rational (cf. [Mon83a]) and there were many results in this direction (e.g. [Bre06], [Eto02], [FT03], [HM93], [Sei97], [Tri05a] or [Wat00]). But 2008 Monsky came up with a conjecture whose correctness would imply the existence of a four-dimensional ring of characteristic two with irrational Hilbert-Kunz multiplicity (cf. [Mon08]). Extending the geometric approach to Hilbert-Kunz theory (cf. [Bre06] or [Tri05a]), Brenner recently proved the existence of irrational Hilbert-Kunz multiplicities in all characteristics (cf. [Bre13]). The goal of this thesis is to compute the Hilbert-Kunz functions of the surface rings • An := k[X, Y, Z]/(X n+1 − YZ) with n ≥ 0, • Dn := k[X, Y, Z]/(X 2 + Y n−1 + YZ 2 ) with n ≥ 4 • E6 := k[X, Y, Z]/(X 2 + Y 3 + Z 4 ), 5 6 INTRODUCTION • E7 := k[X, Y, Z]/(X 2 + Y 3 + YZ 3 ) and • E8 := k[X, Y, Z]/(X 2 + Y 3 + Z 5 ), where k denotes an algebraically closed field. These are called surface rings of type ADE. In characteristic zero surface rings of type ADE show up as quotient singularities of C2 and are unique up to isomorphism as it was shown by Klein (cf. [Kle86]) in 1886. This is also how they have share in string theory (cf. [Wit02]). Surface rings of type ADE were studied for example by du Val (cf. [dV34a], [dV34b], [dV34c]) and Brieskorn (cf. [Bri68]) and are sometimes called Kleinian or du Val singularities. Due to Artin (cf. [Art66]) they are exactly the rational double points. In positive characteristics Artin classified the rational double points of surfaces. In characteristics at least seven, these are exactly the surface rings of type ADE. In characteristics two, three and five all rational double points are given by surface rings of type ADE or certain deformations of them (cf. [Art77]). Note that the rational double points are exactly the simple surface singularities (cf. [Art77]). Due to Watanabe and Yoshida (cf. [WY00]) the Hilbert-Kunz multiplicity of the surface 1 , where G ( SL2 (C) is the group corresponding to rings of type ADE is known to be 2 − |G| the singularity in characteristic zero and under the additional assumption that the corresponding ring is F-rational (cf. [WY00]). Note that this assumption is satisfied in almost all characteristics. The Hilbert-Kunz function of the surface rings of type An is known due to Kunz (cf. [Kun76]) and the Hilbert-Kunz functions of surface rings of type E6 or E8 can be computed at least for explicitly given characteristic using the algorithm of Han and Monsky (cf. [HM93]). In general the Hilbert-Kunz function of surface rings R of type ADE has due to Huneke, McDermott and Monsky the shape HK(R, pe ) = eHK (R) · p2e + γ(pe ), where γ(pe ) is a bounded function (cf. [HMM04]). By a geometric approach of Brenner and Trivedi for two-dimensional standard-graded rings S one needs to control the Frobenius pull-backs of the cotangent bundle on C := Proj(S ), e.g. the sheaves    [pe ] ∼ , SyzS S + to compute the Hilbert-Kunz function of S (cf. [Bre06] or [Tri05a]). Unfortunately, surface rings of type ADE are not standard-graded. But we can associate to them the standard-graded rings S := k[U, V, W]/(F), where (F) is the image of the principal ideal defining a surface ring of type ADE under the map k[X, Y, Z] → k[U, V, W], X 7→ U deg(X) , Y 7→ V deg(Y) , Z 7→ W deg(Z) . Since the map R → S is a flat extension of Noetherian domains, one obtains HK((U deg(X) , V deg(Y) , W deg(Z) ), S , pe ) , [Q(S ) : Q(R)] where [Q(S ) : Q(R)] denotes the degree of the extension of the fields of fractions of R and S . The benefit of this approach is that we can use tools from algebraic geometry to compute ÄÄ ä ä HK U deg(X) , V deg(Y) , W deg(Z) , S , pe . HK(R, pe ) = THE GOAL OF THIS THESIS AND A SKETCH OF THE MOST IMPORTANT IDEAS 7 The disadvantage of this approach is that Proj(S ) is much more complicated then Proj(R), which is just P1k . This is because the quotient map A2k → Spec(R) induces a finite map P1k → Proj(R) of smooth projective curves. By Hurwitz’ formula the curve Proj(R) has genus zero, hence Proj(R)  P1k . To compute ÄÄ ä ä HK U deg(X) , V deg(Y) , W deg(Z) , S , pe , we need to control the OProj(S ) -modules corresponding to the S -modules Ä e eä e Ne := SyzS U deg(X)·p , V deg(Y)·p , W deg(Z)·p . To do so, we compute the R-modules Ä e e eä Me := SyzR X p , Y p , Z p and use our map η : R → S as follows. (i) The map η induces a map ϕ : Spec(S ) \ {S + } → Spec(R) \ {R+ }. pt pt pt (ii) The pull-back of g Me along ϕ is just › Ne , where g Me denotes the restriction to pt Spec(R) \ {R+ } of the sheaf on Spec(R) associated to Me and analogue for › Ne . pt pt (iii) The isomorphism ϕ∗ (g Me )  › Ne extends to a global isomorphism η(Me )  Ne . But how to compute the Me ? Since over two-dimensional rings first syzygy modules of homogeneous ideals are graded maximal Cohen-Macaulay modules, we will make use of the fact that the surface rings of type ADE are of finite graded Cohen-Macaulay type, meaning that there are up to degree shifts only finitely many isomorphism classes of indecomposable, graded maximal Cohen-Macaulay modules (cf. [Knö87] and [BGS87]). Representatives for the isomorphism classes are described in [KST07] using Eisenbud’s theory of matrix factorizations (cf. [Eis80]). In our situation, a matrix factorization is a pair (ϕ, ψ) of n × n matrices with coefficients in k[X, Y, Z] such that ϕ · ψ = ψ · ϕ = f · Id, where f is the generator of the principal ideal defining a surface ring R of type ADE. Then coker(ϕ) is a graded maximal Cohen-Macaulay R-module. Following the common strategy for classifications, we need an invariant that detects the isomorphism class of a given (indecomposable) graded maximal Cohen-Macaulay module and then compute the invariant for all R-modules Me . The first step is to find “good representatives” for the finitely many isomorphism classes of indecomposable, graded maximal Cohen-Macaulay modules. It is not surprising that the phrase “good representatives” means first syzygy modules of homogeneous ideals in our case. We will use sheaf-theoretic tools to find isomorphisms of the form coker(ϕ)  SyzR (Iϕ ), where the Iϕ are homogeneous ideals of R and (ϕ, ψ) runs through a complete list of matrix factorizations representing the isomorphism classes of indecomposable, graded maximal Cohen-Macaulay R-modules. To be more precise, we will show (in our situation) that for every matrix factorization (ϕ, ψ), where ϕ is a n × n-matrix and coker(ϕ) has rank r, there are r + 1 columns of ψ (!) such that on U := Spec(R) \ {R+ } those r + 1 columns 8 INTRODUCTION generate im(ψ) and on R they generate SyzR ( f1 , . . . , fr+1 ) for suitable homogeneous fi ∈ R. Therefore, we have the short exact sequence / 0 / ( f1 , . . . , fn )∼ |U ‡ / im(ψ)| U Or+1 U / 0, showing that the dual module im(ψ)∨ and SyzR ( f1 , . . . , fr+1 ) correspond on U. Since all rings in question are Gorenstein in codimension one, this isomorphism extends to a global isomorphism. It remains to observe im(ψ)  coker(ϕ). Since we have only a finite list of isomorphism classes, one might hope that they can be distinguished by their Hilbert-series. This is not true in general. But we will see that the Hilbert-series of a given (indecomposable) graded maximal Cohen-Macaulay R-module detects the isomorphism class of M up to dualizing, by which we mean that there is a graded maximal Cohen-Macaulay module N, having the same Hilbert-series as M, such that either M  N or M  N ∨ . We will prove a theorem which allows us to compute the Hilbert-series of the modules Me by reducing the computation to the computation of the Hilbert-series of first syzygy modules of homogeneous ideals in a polynomial ring in only two variables. The idea to this theorem was inspired by work of Brenner (cf. [Bre05b]). We will see that the Hilbert-series of Me is enough to detect its isomorphism class (up to dualizing) if R is of type An or E8 . In the other cases we need to show that the modules Me are indecomposable. This is done by using invariant theory. To be more precise, we will use the facts that the surface rings of type ADE are rings of invariants of k[x, y] under finite subgroups of SL2 (k) and that normal subgroups H ⊆ G induce maps ι : Spec(k[x, y]H ) → Spec(k[x, y]G ) resp. on the punctured spectra. The claimed result will follow by comparing (on the punctured spectra) the pull-backs of g Me along ι with the ∗ g Frobenius pull-backs of ι ( M0 ). From the indecomposability of the modules Me we will obtain a periodicity up to degree shift of the sequence Ä Ä e e SyzR X p , Y p , Z p e ää e∈N by which we mean that there exists an e0 such that  e+e0 SyzR X p e+e0 ,Yp e+e0 ,Zp  Ä e eä e  SyzR X p , Y p , Z p (me ) holds for all e ∈ N and suitable me ∈ Z. This leads to a periodicity up to degree shift of the sequence Ä Ä e e e ää SyzS U deg(X)·p , V deg(Y)·p , W deg(Z)·p e∈N . Putting everything together, we will be able to compute the Hilbert-Kunz functions of surface rings of type ADE. Theorem (cf. Theorem 6.1). The Hilbert-Kunz function of Dn+2 is given by (with n ≥ 2, q = pe and q ≡ r mod 2n, where r ∈ {0, . . . , 2n − 1})  2   2·q e 7−→  Ç   2− å 1 r + 1 r2 q2 − + 4n 2 4n if e ≥ 1, p = 2, otherwise. THE GOAL OF THIS THESIS AND A SKETCH OF THE MOST IMPORTANT IDEAS 9 Theorem (cf. Theorem 6.3). The Hilbert-Kunz function of E6 is given by  2   2·q Ç e 7−→    2− if e ≥ 1 and p ∈ {2, 3}, å 1 23 q2 − 24 24 otherwise. Theorem (cf. Theorem 6.5). The Hilbert-Kunz function of E7 is given by  2  2·q    Ç   if e ≥ 1 and p ∈ {2, 3}, å 1 2 47 e 7−→  2 − 48 q − 48  Ç å   1 71    q2 −  2− 48 48 if q mod 24 ∈ {±1, ±7}, otherwise. Theorem (cf. Theorem 6.7). The Hilbert-Kunz function of E8 is given by   2 · q2    Ç     if e ≥ 1 and p ∈ {2, 3, 5}, å 1 2 119 e 7−→  2 − 120 q − 120  Ç å   1 191    q2 −  2− 120 120 if q mod 30 ∈ {±1, ±11}, otherwise. Note that Seibert gave in [Sei97] an algorithm to compute Hilbert-Kunz functions of maximal Cohen-Macaulay rings and modules. Given a ring R := k[ f1 , . . . , fn ] ⊆ k[x, y], where k is a field of characteristic p > 0, the first step of this algorithm is to decompose R into indecomposable R p -modules, which gets very hard if the fi are not monomial. This is why we did not use this algorithm. For similar reasons it seems not practicable to count the monomials in k[X, Y, Z]/(F, X q , Y q , Z q ) directly if F is not binomial. Applying the developed methods in the case of Fermat rings R := k[X, Y, Z]/(X n + Y n + Z n ) and using work of Kaid, Kustin et al. and Trivedi (cf. [Kai09], [KRV12] resp. [Tri05b]), we will obtain results on the Hilbert-Kunz function of R as well as on the behaviour of the Frobenius pull-backs of the cotangent bundle on Proj(R). We say that a vector bundle S admits a (s, t)-Frobenius periodicity if there are s < t ∈ N such that Ft∗ (S)  F s∗ (S) holds up to degree shift. Theorem (cf. Theorem 7.17). Let C be the projective Fermat curve of degree n over an algebraically closed field of characteristic p > 0 with gcd(p, n) = 1. The bundle SyzC (X, Y, Z) admits a Frobenius periodicity if and only if Ç å 1 1 1 δ , , = 0. n n n Moreover, the length of this periodicity is bounded above by the order of p modulo 2n. Theorem (cf. Theorem 7.18). Let R := k[X, Y, Z]/(X n + Y n + Z n ) with an algebraically closed field k of characteristic p > 0 with gcd(p, n) = 1. Assume that SyzProj(R) (X, Y, Z) is strongly semistable and is not trivialized by the Frobenius. Let q = pe = nθ + r with θ, 10 INTRODUCTION r ∈ N and 0 ≤ r < n. Then    3n · q2 − 3n r2 + r3   if θ is even, 4 HK(R, q) =  4 3n 2 3n    · q − (n − r)2 + (n − r)3 if θ is odd. 4 4 These theorems generalize the result of Brenner and Kaid who obtained them under the condition p ≡ −1 modulo 2n (cf. [BK13]). Moreover, the last theorem recovers a result of Han and Monsky who proved that the Hilbert-Kunz function of a Fermat ring R has the shape eHK (R) · p2e + ∆e , where the function e 7→ ∆e is eventually periodic with non-positive values (cf. [HM93]). We will give examples showing that in every odd characteristic for every 1 ≤ l there exists a n ∈ N such that the bundle Syz(X, Y, Z) on the projective Fermat curve of degree n admits a (0, l)-Frobenius periodicity. In characteristic two only (1, 2)-Frobenius periodicities appear. Moreover, this happens only in the case n = 3. Summary of the thesis In the first chapter we will give a survey on Hilbert-Kunz theory. We divide this survey into three sections. In the first one we give the basic definitions and state various results as the existence of Hilbert-Kunz multiplicities, bounds for Hilbert-Kunz multiplicities, some classification results and the connection to tight closure theory. In the second section we explain the geometric approach to Hilbert-Kunz theory in graded dimension two by Brenner and Trivedi (cf. [Bre06] and [Tri05a]). This section will start with short discussions of vector bundles, Frobenius maps, syzygy bundles and various stability conditions for vector bundles. It will end with the classification of Hilbert-Kunz functions of the homogeneous coordinate rings of projective curves of degree three defined over algebraically closed fields of positive characteristic. In the third section we define the invariants limit Hilbert-Kunz multiplicity and F-signature which are strongly connected to Hilbert-Kunz multiplicities. At the end of the first chapter we give a list of further references related to Hilbert-Kunz theory. In the first section of the second chapter we compute some explicit examples of HilbertKunz functions with the help of the geometric approach. For example we will compute (cf. Example 2.6) the Hilbert-Kunz functions of the diagonal hypersurfaces R := k[X, Y, Z]/(X 2 + Y l + Z m ), Ä ä where l, m are positive integers such that the triple 12 , 1l , m1 does not satisfy the strict triangle inequality. The goal of the second section is to generalize a theorem of Monsky which connects the Hilbert-Kunz multiplicities of standard-graded quotients R := k[X, Y, Z]/(F), where F is a so-called regular, irreducible trinomial of degree d, with Han’s δ function. In this case regular means that the trinomial F = MX + MY + MZ satisfies degX (MX ) > d2 , degY (MY ) > d2 and degZ (MZ ) > d2 . Explicitly, Monsky showed Ç eHK 3d λ2 sα sβ sγ (X , Y , Z ), R = s2 + δ , , 4 4d λ λ λ s s s  å2 , SUMMARY OF THE THESIS 11 where s is a positive integer and α, β, γ, λ are natural numbers depending only on the exponents appearing in F (cf. [Mon06a, Theorem 2.3] or Corollary 2.30). Leaning on Monsky’s proof, we will show that a positively-graded analogue of Han’s δ function as well as    µ(l1 , . . . , ln ) := eHK x1l1 , . . . , xnln , R   for standard-graded domains R and homogeneous R+ -primary ideals x1l1 , . . . , xnln extend to continuous functions on [0, . . . , ∞)3 resp. [0, . . . , ∞)n . Theorem (cf. Theorem 2.29 resp. Corollary 2.31). With the previous notations we have eHK ÄÄ ä ä X a , Y b , Z c , k[X, Y, Z]/(F) Ç Ç åå d α(a, b, c) β(a, b, c) γ(a, b, c) 2 λ2 = · (2ab + 2ac + 2bc − a2 − b2 − c2 ) + δ , , , 4 4d λ λ λ where λ is a positive integer depending only on the exponents appearing in F and the abbreviations α(a, b, c), β(a, b, c), γ(a, b, c) denote natural numbers depending on a, b, c and the exponents in F. An explicit implementation of this Theorem for CoCoA can be found in the Appendix. Using a result of Watanabe and Yoshida (cf. [WY00, Theorem 2.7] or Theorem 1.21) on the behaviour of Hilbert-Kunz multiplicities under module-finite extensions of Noetherian local domains, the above result enables us to compute Hilbert-Kunz multiplicities of positively-graded quotients k[U, V, W]/(G) such that the image of G under the map k[U, V, W] −→ k[X, Y, Z], U 7→ X deg(U) , V 7→ Y deg(V) , W 7→ Z deg(W) is a regular, irreducible trinomial (cf. Remark 2.34). In particular, we recover Han’s result on the Hilbert-Kunz multiplicities of two-dimensional diagonal hypersurfaces Ä ä k[U, V, W]/ U d1 + V d2 + W d3 , with 2 ≤ di ∈ N (cf. [Han91, Theorem 2.30] or Corollary 2.36) and the result of Watanabe and Yoshida on the Hilbert-Kunz multiplicities of the surface rings of type ADE (cf. [WY00, Theorem 5.4], Theorem 1.26 or Example 2.38). In the third section of the second chapter we use Theorem 2.29 resp. Remark 2.34 to study the behaviour of the Hilbert-Kunz multiplicity in certain families of positivelygraded quotients k[U, V, W]/(G) of the form described above. Writing the trinomial G as G = MU + MV + MW , the families are definied by the condition that one of the exponents degU (MU ), degV (MV ), degW (MW ) is free and all other exponents in G are fixed. For a fixed family we will study the Hilbert-Kunz multiplicity for large values of the free exponent. We will see that in all cases the sequence of the Hilbert-Kunz multiplicities in such a family converges to the Hilbert-Kunz multiplicity of a binomial quotient ring, where the binomial is the deformation of the trinomial G obtained by leaving out the monomial with the free exponent. In the first section of Chapter 3 we give a brief overview of properties of maximal CohenMacaulay modules including a proof of the fact that the concepts maximal Cohen-Macaulay and reflexive coincide in normal domains of dimension two. We will demonstrate how 12 INTRODUCTION one might compute Hilbert-Kunz functions of two-dimensional rings of finite CohenMacaulay type with the help of the geometric approach. The example will be the n-th Veronese subring R of k[x, y], where k denotes an algebraically closed field of characteristic p > 0. We obtain (cf. Example 3.14) n + 1 Ä 2e 2 ä r(r + 1) · p −r +n· + r − n, 2 2 where r is the smallest non-negative representative of the class of pe in Z/(n). During this computation we will give a complete list of first syzygy modules of ideals representing the isomorphism classes of maximal Cohen-Macaulay R-modules, show how SyzR (R+ ) decomposes in this choice of representatives and explain the action of the Frobenius morphism on the Picard group. In Section 3.2 we will explain the notion of matrix factorizations developed by Eisenbud in [Eis80] and their connection to maximal Cohen-Macaulay modules over rings of the form S /( f ), where (S , m) is a local regular Noetherian ring and f ∈ m2 \ {0}. In Section 3.3 we will develop a sheaf-theoretic approach to compute first syzygy modules of ideals that are isomorphic to the maximal Cohen-Macaulay module defined by a fixed matrix factorization. For this approach we have to restrict to two-dimensional local rings which are Gorenstein in codimension one. In Sections 3.4-3.8 we use the approach from Section 3.3 to obtain a system of first syzygy modules of ideals representing the isomorphism classes of the indecomposable, maximal Cohen-Macaulay modules over the completions of the surface rings of type ADE. Each section ends with a theorem gathering the following informations. HK(R, pe ) = • A complete list of non-isomorphic first syzygy modules of ideals representing the isomorphism classes of non-free, indecomposable, maximal CohenMacaulay modules. • Representatives of the isomorphism classes of the dual modules. • The isomorphism classes of the corresponding determinant bundles on the punctured spectrum. • Ideals representing the isomorphism classes of the non-free, indecomposable, maximal Cohen-Macaulay modules of rank one. For example if R is the (X, Y, Z)-adic completion of E6 and U its punctured spectrum, the corresponding theorem is the following. Theorem (cf. Theorem 3.40). The pairwise non-isomorphic modules M1 = SyzR (X, Y, Z), M2 = SyzR (X, Y 2 , YZ, Z 2 ), M3 = SyzR (iX + Z 2 , Y 2 , YZ), M4 = SyzR (−iX + Z 2 , Y 2 , YZ), M5 = SyzR (−iX + Z 2 , Y), M6 = SyzR (iX + Z 2 , Y) SUMMARY OF THE THESIS 13 give a complete list of representatives of the isomorphism classes of indecomposable, nonfree, maximal Cohen-Macaulay modules. Moreover, M1 and M2 are selfdual, M3∨  M4 M3 |U resp. g M4 |U are g M5 |U resp. g M6 |U . For the rank and M5∨  M6 . The Determinants of g 2 one modules we have the isomorphisms M5  (iX + Z , Y) and M6  (−iX + Z 2 , Y). In Section 3.9 we discuss an idea how to avoid sheaves in the approach of Section 3.3 and give an example showing the disadvantages of this idea. In Section 3.10 we comment on the correpondence between the local and the graded situation. Especially, we will explain a theorem due to Auslander and Reiten saying that for a positively-graded ring R, where R0 is a perfect field, the isomorphism classes of indecomposable, graded maximal Cohen-Macaulay R-modules up to degree shift and the isomorphism classes of indecomposable, maximal Cohen-Macaulay R̂-modules coincide (cf. [AR89]). In Chapter 4 we want to find an easy way to compute the Hilbert-series of syzygy modules of the form Ma := SyzR (X a · V1 , . . . , X a · Vm , Vm+1 , . . . , Vm+l ), where R is a positively-graded ring of the form k[X, Y1 , . . . , Yn ]/(X d − F(Y1 , . . . , Yn )) and the Vi are monomials in the variables Y j . Inspired by Brenner’s work in [Bre05b], we will prove the following theorem. Theorem (cf. Theorem 4.5). Let a = d · q + r with q, r ∈ N and 0 ≤ r ≤ d − 1. We have a short exact sequence 0 −→ Ma+d−2r (s − α · r) −→ Mdq (s − α · r) ⊕ Mdq+d (s) −→ Ma (s) −→ 0 for all s ∈ Z, where α = deg(X). Note that the modules Mdq and Mdq+d in the middle spot are already defined over the polynomial ring k[Y1 , . . . , Yn ]. From this theorem we can compute the Hilbert-series of the R-modules Ma . Theorem (cf. Theorem 4.7). The Hilbert-series of Ma is given by H Ma (t) = (tα·r − tα·d ) · H Mdq (t) + (1 − tα·r ) H Mdq+d (t) . 1 − tα·d In the second section we compute for each isomorphism class of indecomposable, maximal Cohen-Macaulay modules over surface rings of type ADE the Hilbert-series of the representing first syzygy modules of ideals found in Chapter 3. Moreover, we discuss which splitting behaviours of a given maximal Cohen-Macaulay module M can be excluded by computing its Hilbert-series. In Chapter 5 we use the fact that the surface rings of type ADE defined over C are the rings of invariants of C[x, y] under actions defined by the finite subgroups of SL2 (C). If R is of type ADE over an algebraically closed field of characteristic p > 0 and G ( SL2 (C) is the corresponding group in characteristic zero with order invertible in k, it remains true that R is the ring of invariants of k[x, y] under the action of a finite subgroup G0 ( SL2 (k) with |G0 | = |G|. If H, G are finite subgroups of SL2 (k) such that H is a normal subgroup of G, then k[x, y]G is a subring of k[x, y]H , inducing a morphism ι : V → U, where V and 14 INTRODUCTION Ä ä Ä ä U are the punctured spectra of Spec k[x, y]H resp. Spec k[x, y]G . Fixing a surface ring of type ADE with corresponding group G and non-isomorphic, indecomposable, maximal Cohen-Macaulay modules M1 , . . . , Mn representing all isomorphism classes, we will compute the pull-backs of all the corresponding OU -modules under all maps ι as above. These explicit computations are done in Sections 5.1 to 5.5. In Section 5.6 we will gather the results of the previous sections and obtain the following lemma. Lemma (cf. Lemma 5.4). Let U be the punctured spectrum of a surface ring R of type D or E. Assume that the order Äof the group corresponding to the singularity is invertible in e e eä the ground field. Then SyzU X p , Y p , Z p is indecomposable for all e ∈ N. In Chapter 6 we compute the Hilbert-Kunz functions of the surface rings of type DE (and A). During these computations the whole strength of Theorem 4.7 becomes obvious. In the last chapter we discuss possible extensions of the approach using matrix factorizations. More explicitly, we compute the Hilbert-Kunz functions of E8 with respect to the ideals (X, Y, Z 2 ) and (X, Y 2 , YZ, Z 2 ) (cf. Examples 7.1 and 7.2) as well as the Hilbert-Kunz functions of A∞ := k[X, Y, Z]/(XY) and D∞ := k[X, Y, Z]/(X 2 Y − Z 2 ) (cf. Sections 7.2 and 7.3). We also compute for every isomorphism class of non-free, indecomposable, maximal Cohen-Macaulay modules over A∞ and D∞ a representing first syzygy module of an ideal and the corresponding Hilbert-series. In the fourth section we focuss on projective Fermat curves C of degree n with C := Proj(R) and R := k[X, Y, Z]/(X n + Y n + Z n ), where we assume k to be an algebraically closed field of characteristic p > 0 coprime to n. We start the section byÄa brief discussion e e eä of Kaid’s result on the strong Harder-Narasimhan filtration of SyzC X p , Y p , Z p for e  0 and the Hilbert-Kunz function of R in the case, where SyzC (X, Y, Z) is not strongly semistable. Since the vector bundle SyzC (X, Y, Z) is strongly semistable and is not trivialized by the Frobenius if and only if all quotients R/(X q , Y q , Z q ) have infinite projective dimension (cf. Corollary 7.11), we can use a theoremÄ of Kustin, äRahmati and Vraciu which gives the free resolution of the quotient Q := R/ X N , Y N , Z N if the projective dimension of Q is infinite (cf. [KRV12] or Theorem 7.15) to obtain Corollary (cf. äCorollary 7.16). Let N = θ · n + r with θ, r ∈ N and 0 ≤ r < n. Assume that Ä R/ X N , Y N , Z N has infinite projective dimension. Then Ä SyzR X , Y , Z N N N ä ( (m)  SyzR (X r , Y r , Z r ) SyzR (X n−r ,Y n−r if θ is even, ,Z n−r ) if θ is odd. holds for some m ∈ Z. This corollary is used to prove that Ç å 1 1 1 δ , , =0 n n n is sufficient for having a Frobenius periodicity of SyzProj(R) (X, Y, Z). Moreover, the corollary enables us to compute the Hilbert-Kunz function of R, provided SyzC (X, Y, Z) is strongly semistable and is not trivialized by the Frobenius. At the end we discuss the question which Frobenius periodicities the bundles SyzC (X, Y, Z) might admit. NOTATIONS AND CONVENTIONS 15 Finally, the last section of Chapter 7 is reserved for a discussion of open questions. We should mention that we used CoCoA for a numerical treatment of all explicit results on Hilbert-Kunz functions and multiplicities (of course only for small values of the various parameters). Acknowledgements First of all, my deepest thanks go to my supervisor Holger Brenner. Without our countless discussions it would not have been possible to write this thesis. I thank him for various usefull comments and his extraordinary patience during the last years. I would like to thank Tim Römer and Heinz Spindler for their great lectures on commutative algebra and algebraic geometry. Especially, because many of these courses were held in addition to their teaching duties. I thank Almar Kaid for several discussions on Hilbert-Kunz theory. These made the beginning of my Ph.D. studies easier. I am thankful to Axel Stäbler for very helpfull discussions on vector bundles and his usefull comments to my thesis. Special thanks go to Igor Burban who brought the theory of matrix factorizations to my attention and to Kevin Tucker who is responsible for the corollaries about the F-signature functions of the surface rings of type ADE. I thank Alessio Caminata for his corrections to my thesis as well as the whole institute of mathematics in Osnabrück for the great time I had in the last years. There was always a warm and familar working atmosphere. Finally my deep gratitude goes to my family and my friends for their support and patience. Notations and conventions During this thesis we will make use of the following notations and conventions. • N := {0, 1, 2, . . .} and N≥a := {a, a + 1, a + 2, . . .}. • All rings are assumed to be non-zero, commutative and Noetherian. Moreover, they have a unit element. • A standard-graded ring R is generated over R0 by finitely many elements of degree one. • A positively-graded ring R is generated over R0 by finitely many elements of positive degree. • A hypersurface denotes a quotient of a polynomial ring by a principal ideal. • Prime and maximal ideals are always proper ideals. • We denote by R̂ the m-adic completion of a local ring (R, m) or the R+ -adic completion of a graded ring. • If R → S is a homomorphism of rings and I ⊆ R an ideal, we denote by IS the ideal of S which is generated by the image of I. • Krull dimensions of rings and modules are denoted by dim(_). • If V is a k-vector space, its dimension is denoted by dimk (V). CHAPTER 1 A survey on Hilbert-Kunz theory This chapter is devoted to give an overview of Hilbert-Kunz theory. In the first section we will give the basic definitions and state some results. In the second section we will give a brief introduction to vector bundles and explain how they appear in Hilbert-Kunz theory. Finally, in section three we will define the related invariants limit Hilbert-Kunz multiplicity and F-signature and list up some further references. 1.1. The algebraic viewpoint of Hilbert-Kunz theory We start by gathering some properties of the length function λR . Proposition 1.1. Let (R, m), (S , n) be local rings, let M be a finitely generated R-module and N a finitely generated S -module. Then the following hold. (i) If R is a k-algebra with dimk (R/m) < ∞, then λR (M) · dimk (R/m) = dimk (M). (ii) If R → S is local and λR (M), λS (S /mS ) are finite, then λR (M) · λS (S /mS ) ≥ λS (S ⊗R M). Moreover, equality holds if the morphism is flat. (iii) Let R → S be local with λS (N) < ∞ and [S /n : R/m] < ∞. Then we have λR (N) = λS (N) · [S /n : R/m]. Proof. See Exercises 1.6 (d), 1.8 (b) and Lemma 1.36 (a) in Chapter 7 of [Liu06].  Definition 1.2. Let (R, m) be a local ring of characteristic p > 0. Let I = ( f1 , . . . , fm ) be an m-primary ideal and M a finitely generated R-module. The function HK(I, M, pe ) : N → N,   pe e e 7−→ λR M/ f1 , . . . , fmp  M  is called the Hilbert-Kunz function of M with respect to I. Remark 1.3. (i) Denote by F : R → R the Frobenius morphism r 7→ r p . Since this pe pe is a homomorphism and f1 , . . . , fm = Fe (I), it is immediately clear that the Hilbert-Kunz function only depends on I and not on the generators. This is not true for the so-called generalized Hilbert-Kunz function HK(I, M, n) : N → N, n 7−→ λR M/( f1n , . . . , fmn )M .  To show this, we compute the values for n = 2 with respect to two different representations of m in a ring of characteristic three. Let R := Z/(3)~X, Y, Z/(X 2 + Y 3 + Z 4 ), 17 18 1. A SURVEY ON HILBERT-KUNZ THEORY I = m and M = R. Choosing I = (X, Y, Z) we have R/(X 2 , Y 2 , Z 2 ) = Z/(3)~X, Y, Z/(X 2 , Y 2 , Z 2 ), which has length eight. But taking I = (X + YZ, Y, Z), we have R/((X + YZ)2 , Y 2 , Z 2 ) = Z/(3)~X, Y, Z/(X 2 , Y 2 , Z 2 , XYZ), which has length seven. (ii) Using Proposition 1.1, one can show that the Hilbert-Kunz function is independent under completion of R resp. taking the algebraic closure of R/m (compare [Kun69, Lemma 3.1]). Note that this proof also works for the generalized Hilbert-Kunz function. (iii) In view of the previous remark, the Hilbert-Kunz function of a positively-graded affine k-algebra, where k is a field and may assumed to be algebraically closed, is always the Hilbert-Kunz function of the R+ -adic completion of R. (iv) Assume that (R, m) is an integral domain of characteristic p > 0 with perfect residue class field. Denote by R1/q the ring of q-th roots of elements in R in an algebraic closure of the field of fractions of R. If R1/q is a finite R-module for all q = pe then we have by [Wat00, Remark 1.3] for any m-primary ideal I the isomorphism R/Fe (I)  R1/q /IR1/q . Notation 1.4. (i) If I = m, we will omit the ideal in our notation, hence HK(M, q) := HK(m, M, q). Moreover, we will call this function the Hilbert-Kunz function of M. (ii) We will also use the notation I [q] := Fe (I) with q = pe . Example 1.5. We will compute the generalized Hilbert-Kunz function of the surface rings of type An , given by R := k[X, Y, Z]/(X n+1 − YZ), with respect to the graded maximal ideal m = (X, Y, Z). We need to compute the length of R/(X m , Y m , Z m ) for all m ∈ N, which is the same as the dimension of the quotient as a k-vector space. For any m ∈ N, let m = l(n + 1) + r with l ∈ N and 0 ≤ r ≤ n. Counting the monomials in k[X, Y, Z]/(X m , Y m , Z m , X n+1 − YZ), we can always reduce the power of X to a number in {0, . . . , n} using the defining equation X n+1 = YZ. Since all monomials divisible by X m vanish, we obtain the equations Xm = .. . X m+n−r = X m+n−r+1 = .. . X m+n Xr Y lZl XnY lZl Y l+1 Z l+1 = 0    = 0  = 0   = X r−1 Y l+1 Z l+1 = 0 n + 1 − r equations   r equations   Since the powers of X are linearly independent, we see by the above equations that a monomial X h Y i Z j ∈ R/(X m , Y m , Z m ) is non-zero if and only if the exponents satisfy the following relations 1.1. THE ALGEBRAIC VIEWPOINT OF HILBERT-KUNZ THEORY 19 (i) If 0 ≤ h ≤ r − 1, then either 0 ≤ i ≤ l and 0 ≤ j ≤ m − 1 or l + 1 ≤ i ≤ m − 1 and 0 ≤ j ≤ l. (ii) If r ≤ h ≤ n, then either 0 ≤ i ≤ l − 1 and 0 ≤ j ≤ m − 1 or l ≤ i ≤ m − 1 and 0 ≤ j ≤ l − 1. Counting the number of triples (h, i, j) satisfying the above constraints, we get HK(R, m) = dimk (k[X, Y, Z]/(X m , Y m , Z m , X n+1 − YZ))     l−1 m−1 l m−1 m−1 l−1 m−1 l X X X XX X X X = (n + 1 − r)  1+ 1 + r  1+ 1 i=0 j=0 i=0 j=0 i=l j=0 i=l+1 j=0 = (n + 1 − r)(ml + (m − l)l) + r((l + 1)m + (m − (l + 1))(l + 1)) = (n + 1 − r)(2ml − l2 ) + r(2(l + 1)m − (l + 1)2 ) Ç Å ã å Ç ã Å ã2 å Å m−r 2 m−r m−r m−r − +1 − +1 + r 2m = (n + 1 − r) 2m n+1 n+1 n+1 n+1 ! 2m2 2rm m2 2rm r2 = (n + 1 − r) − − + − n + 1 n + 1 (n + 1)2 (n + 1)2 (n + 1)2 2m2 2n + 2 − 2r m2 − 2rm + r2 2m − 2r +r + m− −1 − n+1 n+1 (n + 1)2 n+1 2n + 1 2 2rn r2 = (n + 1 − r) m − m − (n + 1)2 (n + 1)2 (n + 1)2 Ç ! ! å 2r 2r 2 r2 2r 2n + 1 2 m + 2 − + − m − + −1 +r (n + 1)2 n + 1 (n + 1)2 n + 1 (n + 1)2 n + 1 ! 2n + 1 2 2rn 2r2 n 2r2 2r2 2r = m + − + + m + 2r − − 2 2 n+1 n + 1 (n + 1) n + 1 (n + 1) n+1 ! r2 r3 r3 2r2 + −r − + n + 1 (n + 1)2 (n + 1)2 n + 1 Ç å 1 r2 = 2− m2 + − r. n+1 n+1 Remark 1.6. Similarly to the last example Kunz computed in [Kun76, Example 4.3] the Hilbert-Kunz functions of binomial hypersurfaces of the form − R := k[X, Y1 , . . . , Yn ]/(X d − Y1a1 · . . . · Ynan ), where k is a field of characteristic p > 0 coprime to d ∈ N≥2 and a1 , . . . , an are natural P numbers with ai > 1. He obtains (compare with the introduction of [Mon83a])  Å ãã YÅ ai  d · 1− 1− if ai < d for all i ∈ {1, . . . , n}, d eHK (R) =  d otherwise. The first deep theorem in Hilbert-Kunz theory was the following. Theorem 1.7 (Kunz). Let (R, m) be a local ring of dimension d and positive characteristic p. The following statements are equivalent. 20 1. A SURVEY ON HILBERT-KUNZ THEORY (i) (ii) (iii) (iv) (v) R is regular. R is reduced and a flat R p -module. HK(R, p) = pd . e R is reduced and a flat R p -module for all e ∈ N. HK(R, pe ) = ped for all e ∈ N.  Proof. See [Kun69, Theorem 2.1, Theorem 3.3]. This theorem leads to the question how the quotient HK(I, M, pe )/ped behaves for large e. This question was answered by Monsky. Recall that for a set X and a function f : X → R, the set O( f ) consists of all functions g : X → R with the property that |g/ f | is bounded. Theorem 1.8 (Monsky). Let (R, m) be a local ring of positive characteristic p and dimension d. Let I be an m-primary ideal and M a finitely generated R-module. (i) There is a positive real constant c(M) such that Ä ä Ä ä λR M/I [q] M = c(M)qd + O qd−1 . (ii) If 0 → L → M → N → 0 is a short exact sequence of finitely generated Rmodules, then Ä ä Ä ä Ä ä Ä ä λR M/I [q] M = λR L/I [q] L + λR N/I [q] N + O qd−1 . Proof. See [Mon83a, Theorem 1.8].  Note that part (i) of this theorem ensures that the limit in the following definition exists. Definition 1.9. Let (R, m) be a local ring of positive characteristic p and dimension d. Let I be an m-primary ideal and M a finitely generated R-module. We call the limit HK(I, M, pe ) e→∞ ped lim the Hilbert-Kunz multiplicity of M with respect to I. We denote this limit by eHK (I, M) and set eHK (M) := eHK (m, M) for short. We will also call eHK (M) the Hilbert-Kunz multiplicity of M. Remark 1.10. We give a few remarks on results one obtains on the way to prove Theorem 1.8. The references are [Mon83a] and [Hun96]. (i) We have the inequalities (e(I) denotes the ordinary multiplicity of I) e(I) ≤ eHK (I, R) ≤ e(I). d! Hence, the Hilbert-Kunz multiplicity of R with respect to I equals the multiplicity of I if dim(R) ≤ 1 and generalizes it in higher dimensions. (ii) If I is generated by a system of parameters, one always has eHK (I, R) = e(I). 1.1. THE ALGEBRAIC VIEWPOINT OF HILBERT-KUNZ THEORY 21 (iii) The associativity formula holds for Hilbert-Kunz multiplicities, that is eHK (I, M) = X eHK (I, R/p) · λRp (Mp ). p∈Ass(M), dim(R/p)=dim(R) (iv) We have eHK (I, M) = 0 if and only if dim(M) < dim(R). (v) Two finitely generated R-modules have the same Hilbert-Kunz multiplicity with respect to the ideal I if their localizations at all minimal primes of maximal dimension are isomorphic. Hence, the Hilbert-Kunz multiplicity does not detect embedded primes. We give an example to the last remark. Example 1.11. Let p be a prime number, R := Z/(p)~X, Y, Z/(XZ, YZ) and M := R/(Z). There is only one minimal prime of maximal dimension of R, namely (Z). The localizations of R and M at (Z) are both isomorphic to the field of fractions of the ring R/(Z). Their Hilbert-Kunz functions are HK(M, pe ) = p2e and HK(R, pe ) = p2e + pe − 1 as one sees by counting monomials as in Example 1.5. This gives eHK (R) = eHK (M) = 1. Treating R and M as Z/(p)~X, Y, Z-modules, their Hilbert-Kunz functions are the same but their Hilbert-Kunz multiplicities are zero. The next example shows that the limit λR M/ f1n , . . . , fmn M lim , n→∞ ndim(R) sometimes called generalized Hilbert-Kunz multiplicity, does not exist even in easy cases.   Example 1.12. Let R := k[X, Y, Z]/(X + Y + Z), where k is any field of characteristic p > 0. Consider the sequence å Ç dimk (R/(X n , Y n , Z n )) . n2 n∈N The subsequence to indices of the form pe converges to 1, but the subsequence to indices of the form 2pe converges to 34 as one sees by counting monomials as in Example 1.5. By Theorem 1.7 one has that every regular local ring of positive characteristic has HilbertKunz multiplicity one. In fact, one can show in this situation that HK(I, R, pe ) = λR (R/I) · pe·dim(R) holds for any m-primary ideal (see [WY00, 1.4] and [BH98, Exercise 8.2.10]). By Example 1.11 the converse does not hold in general. One can only expect it to be true if there are no embedded primes. In fact this is - as for the Hilbert-Samuel multiplicity (see [Nag75]) - already enough. Theorem 1.13 (Watanabe, Yoshida). Let (R, m) be an unmixed local ring of positive characteristic. If R has Hilbert-Kunz multiplicity one, then R is regular. 22 1. A SURVEY ON HILBERT-KUNZ THEORY Proof. See [WY00, Theorem 1.5] or [HY02, Theorem 3.1] for an alternative proof.  If the ring has dimension zero, we always have I [q] M = 0 for q large enough. Therefore, all Hilbert-Kunz functions in these cases are eventually constant. Due to Monsky the structure of Hilbert-Kunz functions over one-dimensional rings is known completely. Theorem 1.14 (Monsky). Let (R, m) be a local ring of positive characteristic p and dimension one. Let I be an m-primary ideal and M a finitely generated R-module. There is a periodic function ϕ : N → N such that HK(I, M, pe ) = eHK (I, M) · pe + ϕ(e) for all e  0.  Proof. See [Mon83a, Theorem 3.11]. Remark 1.15. In [Kre07] the author gives an algorithm in the case of an one-dimensional, standard-graded, affine k-algebra R, where k is a finite field, that computes ϕ and a bound e0 ∈ N such that the above theorem holds for all e ≥ e0 . For the next theorems dealing with the structure of Hilbert-Kunz functions over normal domains, we need the divisor class group C(R) of R, which is the quotient of the group of Weil divisors by the normal subgroup of principal divisors. For a finitely generated Rmodule M, we choose a primary decomposition with quotients R/Pi . We attach to M the P divisor − P j , where P j runs through all Pi of height one (with repetitions) in the primary P decomposition. The image of − P j in C(R) is independent of the chosen decomposition and is denoted by c(M). Theorem 1.16 (Huneke, McDermott, Monsky). Let (R, m) be a local normal domain of positive characteristic p and dimension d. Let M and N be finitely generated, torsion-free R-modules of the same rank r. Then the following statements hold. Ä ä (i) If c(M) = 0, then HK(M, q) = r · HK(R, q) + O qÄd−2 .ä (ii) If c(M) = c(N), then HK(M, q) = HK(N, q) + O qd−2 .  Proof. See [HMM04, Theorem 1.4, Lemma 1.6]. Theorem 1.17 (Huneke, McDermott, Monsky). Let (R, m, k) be a local, excellent, normal domain of positive characteristic p, dimension d and with k perfect. Let I be an m-primary ideal and M a finitely generated R-module. Then there exists a constant β(I, M) ∈ R with Ä ä HK(I, M, q) = eHK (I, M) · qd + β(I, M) · qd−1 + O qd−2 . Proof. See [HMM04, Theorem 1.12].  Remark 1.18. (i) The numbers β(I, M) in the previous theorem can be computed using values of a homomorphism τ : C(R) → (R, +). If τ is constant zero (for example if C(R) is torsion), all β(I, M) are zero. An important example, where C(R) is torsion, is the case, where (R, m, k) is a complete, local, two-dimensional, 1.1. THE ALGEBRAIC VIEWPOINT OF HILBERT-KUNZ THEORY 23 normal domain and k is the algebraic closure of a finite field (cf. [HMM04, Lemma 2.1]). (ii) In the introduction of [HMM04] the authors briefly (non-)possible exÄ discuss ä d−2 tensions of the previous theorem to the O q -term. They point out that by an example in [HM93] the Hilbert-Kunz function of the ring R = Z/(5)[X, Y, Z, W]/(X 4 + Y 4 + Z 4 + W 4 ) is given by the formula 168 3e 107 e 5 − 3, 61 61 which shows that one cannot hope to have a constant factor in front of the qd−2 term, even for rings that are regular in codimension two. (iii) In [HY09, Corollary 2.5] the authors weaken the assumptions in the above theorem to an excellent, equidimensional, reduced ring such that the ideal of the singular locus has height at most two. (iv) In [CK13, Theorem 3.2] the authors weaken the assumptions in the previous theorem to an excellent, local ring with perfect residue class field such that all localizations at primes p of dimension d resp. d − 1 are fields resp. DVRs. Moreover, they argue with the Chow group instead of the divisor class group. (v) In [Con95] Contessa uses Koszul homology and the fact HK(R, 5e ) = Ä ä Ä Ä λR M/I [q] M = λR H0 I [q] ; M ää to compute Hilbert-Kunz functions of finitely generated modules over regular rings with algebraically closed residue class field with respect to ideals generated by a system of parameters. She shows that for a finitely generated torsionfree module M one has Ä ä HK(I, M, q) = rank(M) · qd + const · qd−2 + O qd−3 , where the constant is a non-negative real number, depending only on (M ∨ )∨ /M (see [Con95, Theorem 3.4]). In particular, the constant is zero if M is reflexive. The next two statements give bounds for Hilbert-Kunz functions (of rings). Lemma 1.19. Let (R, m, k) be a complete local ring of positive characteristic p and assume k to be algebraically closed. Then the inequalities y1 ,...,yd λR (R/(y1 , . . . , yd )) · q system of parameters min d ≥ HK(R, q) ≥ qd hold. Moreover, if R is Cohen-Macaulay, we have e(R) · qd ≥ HK(R, q) ≥ qd . Proof. See [Kun69, Proposition 3.2].  Theorem 1.20 (Watanabe, Yoshida / Huneke, Yao). Let (R, m) be a local ring of characteristic p > 0. Let I ⊆ J be ideals, where I is m-primary (and J = R is allowed). Then HK(I, R, q) ≤ HK(J, R, q) + λR (J/I) · HK(R, q). In particular, for J = R one has HK(I, R, q) ≤ λR (R/I) · HK(R, q). 24 1. A SURVEY ON HILBERT-KUNZ THEORY Proof. See [WY00, Lemma 4.2 (2)] for the analogue statement about the HilbertKunz multiplicities and [HY02, Lemma 2.1, Corollary 2.2 (1)] for the general case.  The next theorem shows how Hilbert-Kunz multiplicities behave under module-finite extensions of local domains. Theorem 1.21 (Watanabe, Yoshida). Let (R, m) ⊆ (S , n) be an extension of local domains of positive characteristic, where S is a finite R-module. Let I be an m-primary ideal of R. Then we have eHK (IS , S ) · [S /n : R/m] , eHK (I, R) = [Q(S ) : Q(R)] where Q(_) denotes the field of fractions. Proof. See [WY00, Theorem 2.7] resp. [WY05, Theorem 1.6].  Remark 1.22. Using Proposition 1.1, it follows easily that Theorem 1.21 holds even for the Hilbert-Kunz functions under the additional assumptions that R is an R/m-algebra and that the extension R ⊆ S is flat. Explicitly, we have (the numbers refer to Proposition 1.1) Ä λR R/I [q] Ä ä λS S /(IS )[q] = λS (S /mS ) Ä ä [q] · [S /n : R/m] (iii) λS S /(IS ) = λR (S /mS ) Ä ä [q] · [S /n : R/m] (i) λS S /(IS ) . = dimk (S /mS ) ä (ii) The denominator is the same as in the theorem, since dimk (S /mS ) = dimQ(R) (Q(R) ⊗k k ⊗R S ) = dimQ(R) Q(S ). Using Theorem 1.21 Brenner reproved a theorem in invariant theory of Smith. Theorem 1.23 (Smith / Brenner). Let B := k[X1 , . . . , Xn ] with an algebraically closed field k of positive characteristic p. Let G ( GL(n, k) be a finite subgroup and consider its natural linear action on B. Let A := BG and m := A+ . We set h := dimk (B/mB), where mB is the Hilbert ideal. Let R be one of the rings Am and d Am . Then the following statements hold. (i) h = |G| · eHK (R) ≥ |G|. (ii) Equality holds if and only if A is a polynomial ring. Proof. The original proof was given in [Smi03] and the alternative proof can be found in [Bre].  A second application of Theorem 1.21 is the computation of the Hilbert-Kunz multiplicities of surface rings with isolated singularities of type ADE. 1.1. THE ALGEBRAIC VIEWPOINT OF HILBERT-KUNZ THEORY 25 Definition 1.24. Let R := k[X, Y, Z]/(F), where k is a field. We say that R and Rb are surface rings of type An Dn E6 E7 E8 if F = X n+1 + YZ and n ≥ 0, if F = X 2 + Y n−1 + YZ 2 and n ≥ 4, if F = X 2 + Y 3 + Z 4 , if F = X 2 + Y 3 + YZ 3 , if F = X 2 + Y 3 + Z 5 . In any case a surface ring of type ADE has in almost all characteristics an isolated singularity at the origin and we refer to these singularities as singularities of type ADE. Remark 1.25. Recall that the surface rings C[X, Y, Z]/(F) of type ADE appear as rings of invariants of C[x, y] by the actions of the finite subgroups of SL2 (C). The groups corresponding to the singularities of type An , Dn , E6 , E7 resp. E8 are the cylic group with n + 1 elements, the binary dihedral group of order 4n − 8, the binary tetrahedral group of order 24, the binary octahedral group of order 48 resp. the binary icosahedral group of order 120. If k is algebraically closed of characteristic p > 0 the groups above can be viewed as finite subgroups of SL2 (k), provided their order is invertible in k. In these cases k[X, Y, Z]/(F) is again the ring of invariants of k[x, y] under the action of the corresponding group (cf. [LW12, Chapter 6, §2]). Now, we show how one might use Theorem 1.21 to compute the Hilbert-Kunz multiplicities of surface rings of type ADE. See [WY00, Theorem 5.4] for a stronger formulation of the next theorem. Theorem 1.26 (Watanabe, Yoshida). Let R be a surface ring of type ADE. Assume that k is algebraically closed and that the order of the corresponding group G is invertible modulo char(k) > 0. Then 1 eHK (R) = 2 − . |G| Proof. We prove the graded version of the statement. The proof carries over to the 1 . Let complete situation. Let R be of type An . Then Example 1.5 shows eHK (R) = 2 − n+1 R be of type Dn or E. Denote the corresponding group by G and let k[x, y] be the ring on which G acts. Then the extension Q(k[x, y]) : Q(R) has degree |G| (cf. [LW12, Proposition 5.4]). The ring R = k[x, y]G is generated as k-algebra by three invariant homogeneous polynomials X, Y, Z such that X 2 is a polynomial in Y and Z and such that deg(Y) · deg(Z) = 2 · |G| holds (cf. Chapter 5). Since k[x, y] is regular, we have eHK (I, k[x, y]) = λ(k[x, y]/I) for every (x, y)-primary ideal I. This shows eHK ((X, Y, Z), k[x, y]) = λ(k[x, y]/(X, Y, Z)) = λ(k[x, y]/(Y, Z)) − 1 = 2 · |G| − 1. By Theorem 1.21 we have eHK (R) = eHK ((X, Y, Z), k[x, y]) 1 = 2− . |G| |G|  26 1. A SURVEY ON HILBERT-KUNZ THEORY Keeping the assumptions that R is a Cohen-Macaulay local ring of dimension two, one can prove the inequality r+2 · e(R), eHK (R) ≥ 2r + 2 where r denotes the number of generators of m/J for a minimal reduction J of m (cf. [WY00, Lemma 5.5]). In [WY01b] the authors study the numbers eHK (I n , R) for mprimary ideals I. In particular, they show that for a local, two-dimensional, CohenMacaulay ring with algebraically closed residue class field one has e(R) 2 n eHK (mn , R) ≥ n + 2 2 (cf. and that this minimal bound is achieved for all n if and only if eHK (R) = e(R)+1 2 [WY01b, Theorem 2.5]). Moreover, they show that a local, two-dimensional, CohenMacaulay ring R with algebraically closed residue class field has minimal Hilbert-Kunz multiplicity (n = 1 in the above inequality) if and only if the associated graded ring of R is isomorphic to the e(R)-th Veronese subring of k[X, Y] (cf. [WY01b, Theorem 3.1]). One big class of rings in which Hilbert-Kunz functions and multiplicities are studied is the class of rings that arise from combinatorial problems. For example monoid and toric rings are studied in [Eto02] and [Wat00]. An explicit treatment of the two-dimensional toric case is done in [CH03]. In [WY00] and [EW03] the authors focus on Rees algebras. In [Eto00] (see also [EW03] and [BCP97]), Eto computes the Hilbert-Kunz multiplicity of Segre products of polynomial rings. The (generalized) Hilbert-Kunz functions of 2 × 2 determinantal rings (in m · n many variables) are studied in [MS12]. They obtain in the case m = 2 the following theorem (cf. [MS12, Theorem 4.4, Corollary 4.5]). Theorem 1.27 (Miller, Swanson). Let k be a field and R := k[Xi, j |i = 1, 2; j = 1, . . . , n]/I2 , where I2 is the ideal generated by the two-minors of the matrix (Xi j )i j . For any natural number m ∈ N we obtain (i) nmn+1 − (n − 2)mn n+m−1 HK(R, m) = +n 2 n+1 ! (ii) eHK (R) = n n + 2 (n + 1)! Remark 1.28. The above result was extended in [RS13] to the case R := k[Xi, j |i = 1, . . . , m; j = 1, . . . , n]/I2 . The structure of (generalized) Hilbert-Kunz functions for monomial rings and binomial hypersurfaces is studied in [Con96]. Theorem 1.29 (Conca). Let I be a monomial ideal in S = k[X1 , . . . , Xn ], where k is a field and let R = S /I. Then there is a polynomial PR (Y) ∈ Z[Y] of degree dim(R) with leading coefficient e(R) such that HK(R, m) = PR (m) for all m ∈ N that are at least the highest exponent appearing in the generators of I. 1.1. THE ALGEBRAIC VIEWPOINT OF HILBERT-KUNZ THEORY 27  Proof. See [Con96, Theorem 2.1]. Theorem 1.30 (Conca). Let R = k[X1 , . . . , Xn+m ]/(F), where k is a field and bm+1 bm+n · . . . · Xm+n F = X1a1 · . . . · Xmam − Xm+1 is a homogeneous binomial with maximal appearing exponent u. Then there exists a rational polynomial PR (Y, Z) ∈ Q[Y, Z] of degree n + m − 1 with leading coefficient C and an integer α ≥ 0 with HK(R, l) = PR (l, ε) for all l ≥ α and ε ≡ l (u) with ε ∈ {0, . . . , u − 1}. Moreover, we have C= m X n X (−1)i+ j sim (a)s jn (b) i=1 j=1 ij , (i + j − 1)ui+ j−1 with a = (a1 , . . . , am ), b = (bm+1 , . . . , bm+n ) and sαβ denotes the elementary symmetric polynomial of degree α in β indeterminates.  Proof. See [Con96, Theorem 3.1]. We now turn to the hypersurface case. Studying properties of the function DF : Nn → N, (a1 , . . . , an ) 7→ dimk (k[X1 , . . . , Xn ]/(X1a1 , . . . , X an , X1 + . . . + Xn )), Han and Monsky developed in [HM93] an algorithm to compute Hilbert-Kunz functions of diagonal hypersurfaces Ä ä k[X1 , . . . , Xn ]/ X d1 + . . . + X dn with d1 , . . . , dn ∈ N≥2 . In particular, they obtain the following result on the structure of Hilbert-Kunz functions in this case. Theorem 1.31 (Han, Monsky). Let R be a d-dimensional diagonal hypersurface over a field k of positive characteristic p. Then the following holds. (i) If char(k) = 2 or d = 2, we have HK(R, pe ) = eHK (R) · pde + ∆e , where e 7→ ∆e is eventually periodic. (ii) If char(k) ≥ 3 and d ≥ 3 there are integers µ ≥ 1 and 0 ≤ l ≤ p(d−2)µ such that HK(R, pe ) = eHK (R) · pde + ∆e , where ∆e+µ = l · ∆e for e  0. Moreover, ∆e ≤ 0 in any case. Proof. See [HM93, Theorem 5.7] and [HM93, Corollary 5.9]. See [CH98a, Theorem 1.1] for a different proof using the same tools.  28 1. A SURVEY ON HILBERT-KUNZ THEORY Remark 1.32. (i) The ideas of [HM93] are generalized in [CH98b] to hypersurfaces R = k[Xi, j |i = 1, . . . , m, j = 1, . . . , ti ]/( f ) with f= ti m Y X d Xi,i,j j . i=1 j=1 (ii) In her thesis [Cha93], Chang used the algorithm of Han and Monsky to compute the Hilbert-Kunz function of the Fermat-quartic R = Z/(p)[W, X, Y, Z]/(W 4 + X 4 + Y 4 + Z 4 ) for odd primes p. Explicitly, she obtains   2     3 HK(R, p ) =  e 8p2 + 8p + 12 3e 1 10p2 + 10p + 21 p − 2p2 + 2p + 1 3 2p2 + 2p + 1 ! 8p3 + 4p + 12 3e 1 10p3 + 11p + 21 p − 3 2p2 − p + 1 3 2p3 − p + 1 !  2     !Ç !Ç p+1 2 p−1 2 åe if p ≡ 1 (4), åe if p ≡ 3 (4). (iii) In his thesis [Che98], Chen remarks that there cannot be a numerical function of polynomial type having the Hilbert-Kunz multiplicity of the Fermat-quartic as leading coefficient. (iv) In the special case n = 2, the function DF is also known as Han’s δ-function, which we will study in more detail in Chapter 2. (v) For a hypersurface R, the sequence Ç HK(R, pe ) pe·dim(R) å e∈N is non-decreasing by [HM93, Theorem 5.8]. The special case of the Hilbert-Kunz multiplicities of d-dimensional Fermat-quadrics reappear as lower bounds for non-regular complete intersections. Theorem 1.33 (Enescu, Shimomoto). Let (R, m, k) be a local, non-regular, complete intersection of dimension d ≥ 2 with char(k) , 2. Then Ñ eHK (R) ≥ eHK k~X0 , . . . , Xd / Ñ d X éé Xi2 . i=0 Proof. This bound was conjectured in [WY05] and the d-dimensional case was proven in [ES05, Theorem 4.6].  Remark 1.34. In [GM10, Theorem 3.8] the authors showed that Ñ Ñ eHK k~X0 , . . . , Xd / Ñ d X i=0 ééé Xi2 char(k)=p tends to 1+ the coefficient of td−1 in the power series of sec(t) + tan(t) around zero as p goes to infinity. 1.1. THE ALGEBRAIC VIEWPOINT OF HILBERT-KUNZ THEORY 29 Recall that for regular rings one has HK(I, R, pe ) = λR (R/I) · pe·dim(R) (discussion before Theorem 1.13). This is generalized to complete intersections by the following theorem. Theorem 1.35 (Dutta, Miller). Let (R, m, k) be a local ring of dimension d which is a complete intersection and let M be a finitely generated R-module of finite length. Then the following statements hold. (i) We have λR (Fe (M)) ≥ λR (M) · ped for all e ∈ N. (ii) The sequence (λR (Fe (M)) · p−ed )e∈N is non-decreasing. (iii) The following statements are equivalent. (a) The module M has finite projective dimension. (b) We have λR (Fe (M)) = λR (M) · ped for all e ∈ N. (c) The limit lime→∞ λR (Fe (M)) · p−ed exists and equals λR (M). In particular, if I is an m-primary ideal such that the quotient R/I has finite projective dimension, one has HK(I, R, pe ) = λR (R/I) · ped . Proof. Part (i) and the implication (a) ⇒ (b) of (iii) can be found in [Dut83, Theorem 1.9]. For the other statements see [Mil00, Theorem 2.1].  An open question in Hilbert-Kunz theory is whether Hilbert-Kunz multiplicities are rational or not. Many experts thought for a long time Hilbert-Kunz multiplicities would always be rational (cf. [Mon83a]), since this was true in all explicit examples and in all cases, where the Hilbert-Kunz multiplicity was formulated in terms of a different theory as combinatorial algebra or vector bundles. This opinion has changed due to a conjecture of Monsky. Theorem 1.36 (Monsky). Let S := Z/(2)[X, Y, Z] and h := X 3 + Y 3 + XYZ ∈ S . Suppose that Monskys conjecture [Mon08, Conjecture 1.5] on the value of Ä Ä ä ä 1 Ä Ä Ä ää Ä Ä äää HK S / h2l+1 , 2e+1 − · HK S / h2l , 2e+1 + HK S / h2l+2 , 2e+1 2 e holds for all 0 ≤ l < 2 . Then the following statements hold. (i) Let 2e ≥ j. Then there are recursively defined integers v j and u j such that  7 j e j2    ·4 −  · 2e + u j if j ≡ 1 (3), 3 3 HK(S /(h ), 2 ) =   7 j e j2 e   · 4 − · 2 + v j if j ≡ 2 (3). 3 3 j e (ii) eHK (Z/(2)[X, Y, Z, U, V]/(UV + h)) = (iii) The number X n≥0 2n n !2 Ç 1 · 16 2 ån 4 5 √ . + 3 14 · 7 30 1. A SURVEY ON HILBERT-KUNZ THEORY is transcendental and a Q-linear combination of Hilbert-Kunz multiplicities of hypersurfaces in characteristic two. Proof. For (i) and (ii) see [Mon08, Theorem 1.9, Corollary 2.7]. The proof that the number in (iii) is transcendental (and exists) can be found in [Sch57] and the rest of the statement in [Mon09, Theorem 2.2].  Very recently, Brenner came up in [Bre13] with a quite explicit example that Hilbert-Kunz multiplicities might be irrational. Theorem 1.37 (Brenner). There exists a local domain whose Hilbert-Kunz multiplicity is irrational and there exists a three-dimensional hypersurface ring R = k[X, Y, Z, W]/(F), where F is homogeneous of degree 4 and k is an algebraically closed field of large characteristic, and an Artinian R-module M such that eHK (M) is irrational. At the end of this section we state some results on the interaction of Hilbert-Kunz multiplicities with the theory of tight closure. Definition 1.38. Let R be a ring of characteristic p > 0 and let I be an ideal of R. We say that x ∈ R belongs to the tight closure of I if cxq ∈ I [q] for a c in the complement of the minimal primes of R not depending on q and all large q. The tight closure of I is an ideal, which we denote by I ∗ and we say that I is tightly closed in the case I = I ∗ . The following theorem shows that the Hilbert-Kunz multiplicity measures the membership to the tight closure. Theorem 1.39 (Hochster, Huneke). Let (R, m) be a local ring of characteristic p > 0 and let I ⊆ J be m-primary ideals. Then I ∗ = J ∗ =⇒ eHK (I, R) = eHK (J, R). The converse holds, if R is quasi-unmixed and analytically unramified. Proof. See [Hun96, Theorem 5.4].  The previous theorem tells us that Hilbert-Kunz multiplicities behave to tight closure as Hilbert-Samuel multiplicities behave to integral closure. Definition 1.40. We call a ring R of characteristic p > 0 an F-rational ring if every ideal generated by parameters is tightly closed. The following lemma gives a criterion for Cohen-Macaulay rings of multiplicity two to be F-rational. Lemma 1.41. Let (R, m) be Cohen-Macaulay of positive characteristic with multiplicity two. Then R is F-rational if and only if eHK (R) < 2. Proof. See [WY00, 5.3].  1.2. THE GEOMETRIC VIEWPOINT OF HILBERT-KUNZ THEORY 31 In view of Theorem 1.21 we obtain the following corollary. Corollary 1.42. Let R be a surface ring of type ADE such that the order of the associated group is invertible in the ground field. Then R is F-rational. 1.2. The geometric viewpoint of Hilbert-Kunz theory In this section we introduce some basic notations concerning vector bundles, discuss briefly the different Frobenius morphisms appearing in algebraic geometry, focus a little more on syzygy bundles and different stability properties of vector bundles. We will often restrict ourselves to projective curves, since the definitions get much simpler in this situation. Thereafter we will explain the connection of the theory of vector bundles and Hilbert-Kunz theory. We will finish this section by a discussion of the Hilbert-Kunz functions of the homogeneous coordinate rings of elliptic curves and irreducible curves of degree three. 1.2.1. Generalities on vector bundles. Definition 1.43. Let X be a scheme. A (geometric) vector bundle of rank r over X is a scheme f : E → X together with an open covering {Ui }i∈I of X and isomorphisms Ψi : f −1 (Ui ) → ArUi such that for any i, j and for any open affine set V := Spec(A) ⊆ Ui ∩ U j the automorphism Ψ := Ψ j | f −1 (U j ) ◦ Ψ−1 i |ArV is given by an A-linear automorphism of A[X1 , . . . , Xr ]. Remark 1.44. (i) There is an equivalence of the categories of vector bundles over X and the category of locally free sheaves of constant (finite) rank over X. This equivalence attaches to a vector bundle of rank r its sheaf of sections, which carries a natural OX -module structure and is locally free of rank r. For the converse, attach to a locally free sheaf of rank r the relative spectrum of its symmetric algebra. This gives a vector bundle of rank r, whose sheaf of sections is the dual of the locally free sheaf we started with (cf. [Har87, Exercise II.5.18]). (ii) Note that the quotient of a vector bundle by a subbundle is again a vector bundle (cf. [Pot97, Proposition 1.7.1]). Hence an inclusion of locally free sheaves S ⊆ T yields by the above equivalence a closed immersion of vector bundles if and only if the quotient T /S is itself a locally free sheaf (cf. [GD61, Proposition 1.7.11]). Definition 1.45. Let E be a locally free sheaf of rank r on X. Then det(E) := r ^ E is called the determinant-bundle or determinant of E. Example 1.46. If L is an invertible sheaf, we have det(L) = L. By [Har87, Exercise II.5.16] determinants satisfy the following properties. 32 1. A SURVEY ON HILBERT-KUNZ THEORY Proposition 1.47. The situation is the same as in the previous definition. (i) Determinants are invertible. (ii) If r = 2, there is an isomorphism E  E∨ ⊗ det(E). (iii) If f : Y → X is a morphism of schemes and E a locally free OX -module of rank r, we have an isomorphism f ∗ (det(E))  det( f ∗ (E)). (iv) From a short exact sequence 0→F →E→G→0 of locally free sheaves, we obtain the isomorphism det(F ) ⊗ det(G)  det(E). Definition 1.48. Let E be a locally free sheaf of rank r on a smooth projective curve C. Then deg(E) := deg(det(E)) is called the degree of E, where the degree of the line bundle det(E) is the degree of the corresponding Weil divisor. If C is a projective curve with an ample invertible sheaf OC (1) the degree of C is defined as deg(C) := deg(OC (1)). Example 1.49. We have deg(OC (m)) = m · deg(OC (1)) = m · deg(C). Remark 1.50. (i) Note that one could also define the degree of E as χ(E) − r · χ(OX ) = χ(E) − r(1 − g), where χ denotes the Euler characteristic. This definition is equivalent to our by [Pot97, Theorem 2.6.9]. (ii) From the alternative definition it becomes clear that the degree is additive on short exact sequences (see [Mar81, Lemma 1.5 (2)]). (iii) By [Mar81, Lemma 1.5 (4)] we have the formula deg(E ⊗ F ) = rank(E) deg(F ) + rank(F ) deg(E). We close this subsection by stating two prominent theorems for locally free sheaves. Theorem 1.51 (Serre duality). Let X be a smooth projective variety of positive dimension V d defined over an algebraically closed field and let ωX := d ΩX be the canonical bundle on X. For every locally free sheaf E on X there are natural isomorphisms Hi (X, E)  Hd−i (X, E∨ ⊗ ωX )∗ for all i = 0, . . . , d, where ∗ denotes the dual vector space. Proof. See [Har87, Corollary III.7.7].  Theorem 1.52 (Riemann-Roch). Let C be a smooth projective curve of genus g defined over an algebraically closed field k and let E be a locally free sheaf on C. Then we have h0 (C, E) − h1 (C, E) = deg(E) + (1 − g) · rank(E), where hi (_) := dimk (Hi (_)). 1.2. THE GEOMETRIC VIEWPOINT OF HILBERT-KUNZ THEORY 33  Proof. See [Pot97, Theorem 2.6.9]. 1.2.2. Frobenius. In this section we define the (absolute) Frobenius morphism. Definition 1.53. Let X be a scheme over a field k of positive characteristic p. Then the map FX : X → X given by the identity on the topological spaces and the Frobenius homomorphism on the section rings, is called the (absolute) Frobenius. Note that we will write F instead of FX if we deal only with one scheme. Lemma 1.54. (i) Let g : X → Y be a morphism of schemes over Z/(p). Then the equality FY ◦ g = g ◦ FX holds. (ii) For x ∈ X, we have FX (x) = x. (iii) If all stalks of X are regular rings, then FX is flat. (iv) If X is integral and geometrically reduced, we have deg(FX ) = pdim(X) . Proof. See [Liu06, Lemma 3.2.22] for parts (i) and (ii). Part (iii) follows from Kunz’ Theorem 1.7. Part (iv) is Corollary 3.2.27 of [Liu06].  Since the absolute Frobenius acts by x 7→ x p on k, the morphism FX : X → X is k-linear if and only if k = Z/(p). In the general case, one obtains a k-linear morphism by the following construction. First, form the pull-back pr2 X (p) := X ×Spec(k) Spec(k) → Spec(k) with respect to the structure map f : X → Spec(k) and the absolute Frobenius FSpec(k) (see the diagram below). Secondly, one obtains by the universal property of pull-backs (and part (i) of the previous lemma) a morphism Frel : X → X (p) of varieties over k, which we call relative Frobenius or k- linear Frobenius. The following diagram shows all involved maps and schemes. X FX Frel ' X (p) f $  /) pr1 pr2 Spec(k) FSpec(k) / X  f Spec(k) If X is an affine variety Spec(k[T 1 , . . . , T n ]/I) over k, then the absolute Frobenius acts on OX by sending g ∈ k[T 1 , . . . , T n ]/I to g p , while the relative Frobenius acts on OX by raising only the (images of the) variables T i to their p-th power (compare [Lie13, Section 2.1]). See [Liu06, Section 3.2.4] for a more general definition of the absolute and relative Frobenius morphisms. Note that if k is perfect, then X and X (p) are isomorphic as schemes over k, since their structural morphisms differ only by an isomorphism. 34 1. A SURVEY ON HILBERT-KUNZ THEORY Definition 1.55. Let F : X → X be the absolute Frobenius morphism and G an OX -module. We call the pull-back F∗ (G) of G defined by the following diagram / F∗ (G)  X F / G  X the Frobenius pull-back of G. For line bundles the Frobenius pull-back is easy to compute. Lemma 1.56. If X is separable and k is algebraically closed, we have F∗ (L)  L p for every invertible sheaf L on X.  Proof. See [BK05, Lemma 1.2.6]. We end up this section by defining the Hasse invariant of elliptic curves (compare with [Har87, Chapter IV.4]). Let X be an elliptic curve over a perfect field k of positive characteristic p. Then the absolute Frobenius F : X → X induces a map H1 (F) : H1 (X, OX ) → H1 (X, OX ) on cohomology. This map fulfills H1 (F)(λ · a) = λ p · H1 (F)(a) for all λ ∈ k and a ∈ H1 (X, OX ). Since X is elliptic, we have dimk (H1 (X, OX )) = 1. Thus, the map H1 (F) has to be either 0 or bijective, since k is perfect. Definition 1.57. The Hasse invariant of X is zero if H1 (F) is the zero map and one if H1 (F) is bijective. 1.2.3. Syzygy bundles. In this subsection we will turn our attention to syzygy bundles, since they give a nice class of examples of vector bundles and because exactly these are the vector bundles that will appear in the application of vector bundles to Hilbert-Kunz theory. Definition 1.58. Let k be a field and R an affine k-algebra. Let f1 , . . . , fn ∈ R and X := Spec(R). (i) We call the kernel of the map f1 ,..., fn OnX −→ OX the sheaf of syzygies for f1 , . . . , fn and denote it by SyzX ( f1 , . . . , fn ). (ii) Let IZ be the ideal sheaf of the closed subscheme Z := V( f1 , . . . , fn ) ⊆ X. We call the short exact sequence f1 ,..., fn 0 −→ SyzX ( f1 , . . . , fn ) −→ OnX −→ IZ −→ 0 the presenting sequence of the sheaf of syzygies. 1.2. THE GEOMETRIC VIEWPOINT OF HILBERT-KUNZ THEORY 35 Definition 1.59. Let k be a field and R a standard-graded, affine k-algebra. Let f1 , . . . , fn ∈ R be homogeneous elements with deg( fi ) = di . Let Y := Proj(R). (i) We call the kernel of the map n M f1 ,..., fn OY (−di ) −→ OY i=1 the sheaf of syzygies for f1 , . . . , fn and denote it by SyzY ( f1 , . . . , fn ). (ii) Let IZ be the ideal sheaf of the closed subscheme Z := V+ ( f1 , . . . , fn ) ⊆ Y. We call the short exact sequence 0 −→ SyzY ( f1 , . . . , fn ) −→ n M f1 ,..., fn OY (−di ) −→ IZ −→ 0 i=1 the presenting sequence of the sheaf of syzygies. Note that in both situations the sheaf of syzygies SyzX ( f1 , . . . , fn ) resp. SyzY ( f1 , . . . , fn ) is nothing but the sheafification of the (graded) R-module SyzR ( f1 , . . . , fn ). Therefore we may define in the graded case for any m ∈ Z the sheaf of syzygies of total degree m of f1 , . . . , fn , denoted by SyzY ( f1 , . . . , fn )(m), as the sheafification of the R-module SyzR ( f1 , . . . , fn )(m). Note that the equality SyzY ( f1 , . . . , fn )(m) = SyzY ( f1 , . . . , fn ) ⊗ OY (m) holds, since R is standard-graded (for counter-examples in the non standard-graded case see for example [Dol82, Section 1.5]). Moreover, if R has dimension at least two and satisfies S 2 the sheaf SyzY ( f1 , . . . , fn )(m) encodes the homogeneous component of degree m of the R-module SyzR ( f1 , . . . , fn ). We get this homogeneous component back by taking global sections  Γ Y, SyzY ( f1 , . . . , fn )(m)  SyzR ( f1 , . . . , fn )m (cf. [Har87, Exercise III.3.5]). Example 1.60. Let R := k[X0 , . . . , Xn ] and Y := Proj(R) = Pnk . Then there is a short exact sequence (cf. [Har87, Theorem II.8.13]) X0 ,...,Xn 0 −→ ΩY/k −→ On+1 Y (−1) −→ OY −→ 0, which arises from the Euler sequence. This sequence is a presenting sequence of ΩY/k and of SyzY (X0 , . . . , Xn ), hence they are isomorphic and SyzY (R+ ) is nothing but the cotangent bundle on Y. If Y 0 ⊆ Y is a closed subvariety, the sheaf of syzygies SyzY 0 (X0 , . . . , Xn ) on Y 0 is just the restriction of the cotangent bundle ΩY/k to Y 0 . Recall some basic properties of syzygy modules. Lemma 1.61. Let R be a standard-graded, affine k-domain and let f, f1 , . . . , fn ∈ R be homogeneous and f non-zero. The following statements hold. (i) Let g1 , . . . , gm ∈ ( f1 , . . . , fn ) be homogeneous elements with g j = defines a graded R-module homomorphism (hi j )i j SyzR (g1 , . . . , gm ) −→ SyzR ( f1 , . . . , fn ). Pn i=1 hi j · fi . This 36 1. A SURVEY ON HILBERT-KUNZ THEORY (ii) The following isomorphism holds SyzR ( f f1 , . . . , f fn )  SyzR ( f1 , . . . , fn )(− deg( f )). (iii) If f, fn is an R-regular sequence, we have SyzR ( f f1 , . . . , f fn−1 , fn )  SyzR ( f1 , . . . , fn )(− deg( f )). (iv) If deg( f fi ) = deg( fn ) for some i ∈ {1, . . . , n − 1}, we have SyzR ( f1 , . . . , fn )  SyzR ( f1 , . . . , fn−1 , fn + f fi ). Proof. Since the parts (i), (ii) and (iv) are obvious, we only prove part (iii). Let (s1 , . . . , sn ) ∈ SyzR ( f f1 , . . . , f fn−1 , fn ) be a syzygy of total degree m. We obtain 0= n−1 X si f fi + sn fn ≡ sn fn modulo f. i=1 This forces sn ∈ ( f ), since fn is a non-zero divisor in R/( f ). But then (s1 , . . . , sn−1 , sn / f ) is a syzygy for f1 , . . . , fn of total degree m − deg( f ). On the other hand, if (t1 , . . . , tn ) is a syzygy for f1 , . . . , fn of total degree m0 , then (t1 , . . . , tn−1 , f tn ) is a syzygy for the elements f f1 , . . . , f fn−1 , fn of total degree m0 + deg( f ). These operations lead to two homomorphisms that are inverse to each other.  Proposition 1.62. Let k be an algebraically closed field and R a standard-graded kalgebra of dimension at least two and Y := Proj(R). Let f1 , . . . , fn ∈ R be homogeneous elements with deg( fi ) = di . Assume that at least one of the fi is a non-zero divisor. Then the following statements hold. (i) The rank of SyzY ( f1 , . . . , fn ) is n − 1. (ii) If the ideal generated by the fi is R+ -primary, then the morphism n M f1 ,..., fn OY (−di ) −→ OY i=1 is surjective and SyzY ( f1 , . . . , fn ) is locally free. (iii) The sheaf SyzY ( f1 , . . . , fn ) is locally free on U := D+ ( f1 , . . . , fn ) ⊆ Y. (iv) If Y is an irreducible curve and the ideal ( f1 , . . . , fn ) is R+ -primary, then Ñ det(SyzY ( f1 , . . . , fn )(m))  OY (n − 1)m − n X é di . i=1 In particular, we have deg(SyzY ( f1 , . . . , fn )(m)) = (n − 1)m − ni=1 di · deg(Y). (v) Let ϕ : R → S be a morphism of degree d of normal, standard-graded k-domains of dimension two. Let g : Y 0 := Proj(S ) → Y be the corresponding morphism of smooth projective curves. Then the following holds P g∗ (SyzY ( f1 , . . . , fn )(m))  SyzY 0 (ϕ( f1 ), . . . , ϕ( fn ))(dm).  1.2. THE GEOMETRIC VIEWPOINT OF HILBERT-KUNZ THEORY 37 (vi) Assume that char(k) = p > 0 and that Y is an irreducible curve. For the iterated pull-backs under the Frobenius, we have q Fe∗ (SyzY ( f1 , . . . , fn )(m))  SyzY ( f1 , . . . , fnq )(mq), where q = pe and e ∈ N. Proof. (i) Since f1 , . . . , fn contains a non-zero divisor, the rank of IZ (on every irreducible component of Y) is one. Since the rank is additive on short exact sequences, the statement follows from the presenting sequence of SyzY ( f1 , . . . , fn ). (ii) Since ( f1 , . . . , fn ) is R+ -primary, the ideal sheaf IZ is just OY . The supplement follows, since kernels of surjective maps between locally free sheaves are locally free. (iii) On the affine patches D+ ( fi ), the map OY (−d j )|D+ ( fi ) −→ SyzY ( f1 , . . . , fn )|D+ ( fi ) , M j∈{1,...,n}, j,i Ç (g1 , . . . , gi−1 , gi+1 , . . . , gn ) 7−→ g1 , . . . , gi−1 , − P å j∈{1,...,n}, j,i f j g j , gi+1 , . . . , gn fi is an isomorphism. (iv) By part (ii) the presenting sequence of SyzY ( f1 , . . . , fn ) ends in OY . We obtain det(SyzY ( f1 , . . . , fn )(m)) ⊗ OY (m)  det Ñ n M Ñ  OY é OY (m − di ) i=1 nm − n X é di . i=1 Tensoring with OY (−m) gives the result. The supplement is clear. (v) The statement follows by taking the pull-back of the presenting sequence of SyzY ( f1 , . . . , fn ) and by [Har87, Proposition II.6.9]. (vi) Similarly to (v), the statement follows by taking the Frobenius pull-back of the presenting sequence of SyzY ( f1 , . . . , fn ) using Lemma 1.56.  Remark 1.63. In the affine situation the analogues of parts (i), (iii), (v) and (vi) of the above proposition are still true. 1.2.4. Stability. An important property of vector bundles is the semistablility. It is essential to construct meaningfull moduli spaces (see [HL97]). Definition 1.64. Let C be a smooth projective curve defined over an algebraically closed deg(E) field and let E be a locally free OC -module. We call the quotient µ(E) := rank(E) the slope of the sheaf E. Definition 1.65. Let C be a smooth projective curve defined over an algebraically closed field and let E be a locally free OC -module. We call E semistable if for every locally free subsheaf 0 , F ( E the inequality µ(F ) ≤ µ(E) holds. We say that E is stable if the above inequality is always strict. 38 1. A SURVEY ON HILBERT-KUNZ THEORY Note that our definition of stability is due to Mumford (another not equivalent definition of stability using Euler characteristics is due to Gieseker). Example 1.66. Let C ( P2k be a smooth plane curve of degree at least two defined over an algebraically closed field k. Then ΩP2 /k |C is semistable as shown in [Bre05a, Proposition k 6.2] and [Tri05a, Corollary 3.5]. Proposition 1.67. Let C be a smooth projective curve defined over an algebraically closed field and let E, F be locally free OX -modules. The following statements hold. (i) Line bundles are stable. (ii) If E and F are semistable then E ⊕ F is semistable if and only if µ(F ) = µ(E). (iii) The OX -module E is (semi-)stable if and only if for every line bundle L the sheaf E ⊗ L is (semi-)stable. Proof. To prove (i) assume that the line bundle L is not semistable. Then there exists a line bundle E ( L with deg(E) > deg(L). The inclusion 0→E→L leads to the inclusion 0 → O → L ⊗ E∨ . Because O injects into L ⊗ E∨ its degree deg(L ⊗ E∨ ) = deg(L) − deg(E) has to be nonnegative contradicting deg(E) > deg(L). To prove part (ii) assume that E ⊕ F is semistable. Then E ⊕ 0 is a locally free subsheaf of E ⊕ F . The inequality µ(E ⊕ 0) = µ(E) ≤ µ(E ⊕ F ) is equivalent to µ(E) ≤ µ(F ). Replacing E by F gives µ(F ) ≤ µ(E), hence µ(E) = µ(F ). Now let µ(E) = µ(F ). It is easy to see that µ(E ⊕ F ) = µ(E) = µ(F ) holds. Assume that E ⊕ F is not semistable. Then there exists a locally free subsheaf G ( E ⊕ F with µ(G) > µ(E ⊕ F ). From the short exact sequence 0 → E → E⊕F → F → 0 we obtain locally free subsheaves G0 := ker(G → F ) and G00 := im(G → F ) of E resp. F and the short exact sequence (1.1) 0 → G0 → G → G00 → 0. If G0 = 0, we obtain the contradiction µ(F ) ≥ µ(G00 ) = µ(G) > µ(E ⊕ F ) = µ(F ). Similarly, if G00 = 0, one gets µ(E) > µ(E). If G0 and G00 are both non-zero, one obtains from (1.1) the contradiction max(µ(G0 ), µ(G00 )) ≥ µ(G) > µ(E ⊕ F ) = µ(E) = µ(F ) since E and F are semistable. To prove part (iii) fix a line bundle L. If 0 , F ( E contradicts (semi-)stability, then 0 , F ⊗ L ( E ⊗ L contradicts (semi-)stability. Similarly, if 0 , F 0 ( E ⊗ L contradicts (semi-)stability, then 0 , F 0 ⊗ L∨ ( E contradicts (semi-)stability.  1.2. THE GEOMETRIC VIEWPOINT OF HILBERT-KUNZ THEORY 39 Theorem 1.68 (Grothendiek). Let E be a vector bundle of rank r on P1k , where k is an algebraically closed field. Then there are uniquely determined integers a1 ≥ . . . ≥ ar with E r M i=1 OP1 (ai ). k Proof. See [HL97, Theorem 1.3.1].  Using this theorem and the last proposition, one gets immediately a classification of all (semi-)stable vector bundles on the projective line: Corollary 1.69. Let E be a vector bundle on P1k , where k is an algebraically closed field. Then E is semistable if and only if all ai in Grothendiecks Theorem are equal. Moreover, a vector bundle is stable if and only if it is a line bundle. The next theorem shows that one can find for a given vector bundle a filtration with semistable quotients. Theorem 1.70 (Harder, Narasimhan). Let C be a smooth projective curve. Then every locally free sheaf E over C has a unique filtration 0 = E0 ( E1 ( . . . ( Et = E satisfying the following properties (i) all quotients Ei /Ei−1 are semistable and (ii) the slopes µi := µ(Ei /Ei−1 ) form a strictly decreasing chain µ1 > . . . > µt . Proof. See [HN75, Lemma 1.3.7].  Definition 1.71. The filtration from the previous theorem is called Harder-Narasimhan filtration. The sheaf E1 in the filtration is called the maximal destabilizing subsheaf of E and the quotient E/Et−1 is called the minimal destabilizing quotient of E. The corresponding slopes µmax (E) := µ1 and µmin (E) := µt are called maximal slope resp. minimal slope of E. Working in positive characteristic, it is not true that Frobenius pull-backs of semistable vector bundles are again semistable. A counter example to this can be found on the curve C := Proj(k[X, Y, Z]/(X 4 + Y 4 + Z 4 )), where k is an algebraically closed field with char(k) = 3. Then SyzC (X, Y, Z) is semistable, but F∗ (SyzC (X, Y, Z)) is not as shown in [BK13, Example 3.1]. The following definition is due to Miyaoka (cf. [Miy87, Section 5]). Definition 1.72. Let C be a smooth projective curve over an algebraically closed field k of positive characteristic. A locally free sheaf E over C is called strongly semistable, if all its Frobenius pull-backs Fe∗ (E), e ≥ 0, are semistable. Definition 1.73. We call a Harder-Narasimhan filtration a strong Harder-Narasimhan filtration if all quotients are strongly semistable. 40 1. A SURVEY ON HILBERT-KUNZ THEORY The next theorem shows that for every locally free sheaf there is a Frobenius pull-back with a strong Harder-Narasimhan filtration. In fact the Frobenius pull-backs stabilize in a certain way (see the next remark for the precise statement). Theorem 1.74 (Langer). Let C be a smooth projective curve over an algebraically closed field k with char(k) = p > 0. For every locally free sheaf E there exists a (minimal) natural number e0 such that the Harder-Narasimhan filtration of Fe0 ∗ (E) is strong.  Proof. See [Lan04, Theorem 2.7]. Remark 1.75. Let 0 ( E1 ( . . . ( Et−1 ( Fe0 ∗ (E) be the strong Harder-Narasimhan filtration from Langers Theorem. Since Frobenius pull-backs respect inclusions and commute with quotients, the filtration 0 ( Fe−e0 ∗ (E1 ) ( . . . ( Fe−e0 ∗ (Et−1 ) ( Fe∗ (E) is a strong Harder-Narasimhan filtration for Fe∗ (E) for all e ≥ e0 . 1.2.5. Relation to Hilbert-Kunz theory. In this subsection we explain how the theory of vector bundles arises in Hilbert-Kunz theory. The next proposition will be crucial. Proposition 1.76. Let k be an algebraically closed field of positive characteristic p, let R be a standard-graded k-domain of dimension at least two satisfying S 2 and let Y = Proj(R). Let I = ( f1 , . . . , fn ) be an R+ -primary ideal with deg( fi ) = di . Then for every q = pe ≥ 1 and m ∈ Z the following formula holds Ä dimk R/I [q] ä = h0 (Y, OY (m)) − m n X q h0 (Y, OY (m − q · di )) + h0 (Y, SyzY ( f1 , . . . , fnq )(m)). i=1 Proof. Starting with the exact sequence q q n X f1 ,..., fn q q 0 −→ SyzY ( f1 , . . . , fn )(m) −→ OY (m − q · di ) −→ i=1 OY (m) −→ 0, we obtain by taking global sections the exact sequence (1.2) q q n X f1 ,..., fn q q 0 −→ Γ(Y, SyzY ( f1 , . . . , fn )(m)) −→ Rm−q·di −→ i=1 Rm , where Γ(Y, OY (l)) = Rl for any l ∈ Z, since III.3.5]). Ä äR satisfies S 2 (cf. [Har87, Ä Exercise ä Obviously, the image of the last map is I [q] m , hence we may add → R/I [q] m → 0 at the right hand side of (1.2). Computing the alternating sum of the k-vector space dimensions ä P Ä the sum m R/I [q] m is finite since I [q] is R+ -primary and it is exactly HK(I, R, q).  At this point we should mention that - although Proposition 1.76 holds for rings of higher dimension than two - there are no examples in dimension at least three in which the above proposition is helpfull. The reason for this is that second syzygy modules of quotients R/I do not behave well if dim(R) ≥ 3. In fact, the dim(R)-th syzygy modules of R/I are the correct modules to deal with. This is emphasized by a recent work of Brenner. Using more general tools from algebraic geometry than we presented, he was able to prove the following theorem (compare with [Bre13]). 1.2. THE GEOMETRIC VIEWPOINT OF HILBERT-KUNZ THEORY 41 Theorem 1.77 (Brenner). Let R be a standard-graded Cohen-Macaulay domain of dimension d + 1 ≥ 2 with an isolated singularity over an algebraically closed field k of positive characteristic p. Let Y := Proj(R) and let I ( R be an R+ -primary ideal. Let δ2 δ1 . . . → F2 → F1 → F0 → R/I → 0 (1.3) be a graded complex with Fi := j∈Ji R(−βi j ). Let SyzdR := ker(δd ). If the complex on Spec(R) \ {R+ } associated to (1.3) is exact, we have L HK(I, R, pe ) = X m∈N hd (Fe∗ (SyzdY )(m)) + d X Ñ (−1)d−1−i i=0 Ñ éé X X j∈Ji m∈N hd (OY (−βi j pe + m)) . In the next chapter we will give some examples how one can compute Hilbert-Kunz functions with Proposition 1.76. Starting with Proposition 1.76, using Langer’s Theorem 1.74 and properties of strongly semistable vector bundles, Brenner and Trivedi computed independently the Hilbert-Kunz multiplicity of two-dimensional, standard-graded, normal domains containing an algebraically closed field of positive characteristic. To state their result, we need some more notation. Notation 1.78. In the situation of Proposition 1.76 assume dim(R) = 2 and that Y is smooth. Then there exists by Langer’s Theorem 1.74 an e0 such that for every e ≥ e0 the e-th Frobenius pull-back of the sheaf SyzY ( f1 , . . . , fn ) has a strong Harder-Narasimhan filtration 0 = S0 ( S1 ( . . . ( St−1 ( St = Fe∗ (SyzY ( f1 , . . . , fn )). For i = 1, . . . , t, we define the numbers µ(Si /Si−1 ) and ri := rank(Si /Si−1 ). νi := − deg(Y) · pe Note that these numbers are independent of e by Remark 1.75. Theorem 1.79 (Brenner/Trivedi). In the situation of Proposition 1.76 assume dim(R) = 2 and that Y is smooth. Then the Hilbert-Kunz multiplicity of R with respect to I is given by Ñ é n t X deg(Y) X eHK (I, R) = · ri νi2 − d2j , 2 i=1 j=1 where the ri and νi are computed with respect to SyzY (I). Proof. See [Bre06, Theorem 3.6] for the general statement and [Tri05a, Theorem 4.12] for the case I = R+ .  We will state some generalizations of Theorem 1.79. Theorem 1.80 (Trivedi). Drop the assumption in Theorem 1.79 that Y is smooth. Then the inequality Ñ P é n n d 2 X deg(Y) i 2 i=1 eHK (I, R) ≥ − di 2 n−1 i=1 42 1. A SURVEY ON HILBERT-KUNZ THEORY holds. Equality holds if and only if the pull-back of SyzY (I) to the normalization of Y is strongly semistable. In particular, if Y is already smooth, equality holds if and only if SyzY (I) is strongly semistable.  Proof. See [Tri05b, Theorem 2.2]. Corollary 1.81. Let k be an algebraically closed field of positive characteristic p. Let R := k[X, Y, Z]/(F) be standard-graded with F irreducible and homogeneous of degree d such that C := Proj(R) is a smooth projective curve. Let I = ( f1 , f2 , f3 ) ( R be a homogeneous and R+ -primary ideal with all generators having the same degree a ≥ 1. Then the following statements hold. (i) If SyzC (I) is not semistable, then there exists an integer 0 < l ≤ ad with l ≡ ad (2) such that 3d 2 l2 ·a + . eHK (I, R) = 4 4d (ii) If SyzC (I) is semistable but not strongly semistable, then there exists an integer 0 < l ≤ d(d − 3) with l ≡ pad (2) such that eHK (I, R) = 3d 2 l2 ·a + , 4 4d · p2e where e ≥ 1 is such that Fe−1∗ (SyzC (I)) is semistable, but Fe∗ (SyzC (I)) is not. (iii) If SyzC (I) is strongly semistable, then 3d 2 ·a . eHK (I, R) = 4 Proof. For the case a = 1 see [Tri05a, Theorem 5.3] and [Bre06, Corollary 4.6]. For the general case see [Kai09, Corollary 1.4.9 (2), Proposition 1.4.11].  Theorem 1.82 (Brenner). In the situation of Theorem 1.79, the Hilbert-Kunz function of R with respect to I has the shape HK(I, R, pe ) = eHK (I, R) · p2e + γ(p, e), where γ(p, _) is a bounded function. Moreover, if k is the algebraic closure of a finite field, the function γ(p, _) is eventually periodic. Proof. See [Bre07, Theorem 6.1].  1.2.6. Curves of degree three. Using the just explained geometric approach, Brenner and Hein computed the Hilbert-Kunz function of the homogeneous coordinate ring R associated to a very ample line bundle OC (1) of an elliptic curve C over an algebraically closed field k. See [BH06, Corollary 4.6] for the case where SyzC ( f1 , . . . , fn ) is semistable and [BH06, Theorem 4.4] for the general case. In the same paper they also look more carefully at the case, where C is embedded by a complete linear system |OC (1)| into some projective space PkN . In [BH06, Theorem 5.2] they give a full discription of the Hilbert2 Kunz function of R. In particular, the Hilbert-Kunz multiplicity of R is eHK (R) = (N+1) 2N . We just state the explicit results of the Hilbert-Kunz functions in the cases N = 2, 3, 4, 1.2. THE GEOMETRIC VIEWPOINT OF HILBERT-KUNZ THEORY 43 given in [BH06, Corollaries 5.3-5.6]. Note that these results had already been proved in [FT03, Theorem 3.17]. Proposition 1.83. Let C be an elliptic curve over an algebraically closed field k of characteristic p > 0, embedded by a complete linear system into PkN . Then the Hilbert-Kunz function of the homogeneous coordinate ring R of C is given by the following formulas. (i) Let N = 2 and let h be the Hasse invariant of C. Then  9 2 5    q −    4 4 HKR (R, q) =  8 − h    9    q2 − h 4 if q is odd, if q = 2, otherwise, (ii)    8 q2 − 5   if N = 3 and p , 3, 3 HKR (R, q) =  3 25 2 17    q − if N = 4 and p , 2. 8 8 The Hilbert-Kunz functions of the homogeneous coordinate rings of curves of degree three have been studied by many authors using a whole bunch of different tools. In his thesis (cf. [Par94]), Pardue made a conjecture on the Hilbert-Kunz functions of the homogeneous coordinate rings of plane curves of degree three. This conjecture was proven case by case by different authors. We summarize the results and references. If C is an irreducible nodal cubic, Pardue showed in his thesis (cf. [Par94] and also [BC97, Theorem 3]) 7 1 HK(R, q) = q2 − q − D(q) 3 3 with D(q) = 53 , if q ≡ 2 (3) and D(q) = 1 otherwise. Using Burbans results from [Bur12] on the classification of Frobenius pull-backs of line bundles on plane rational nodal curves, Monsky showed in [Mon11], that the Hilbert-Kunz function of R with respect to an mprimary ideal I is of the form HK(I, R, q) = µq2 + αq + D(q), where µ and α are constants depending on the data of SyzC (I) and D(q) depends on these data and on the class of q modulo three. If C is cuspidal, we have 7 HK(R, 3e ) = 9e 3 and 7 4 HK(R, q) = q2 − 3 3 for p , 3 (see [Par94]). If C is smooth, the Hilbert-Kunz function of R was computed for odd characteristics in [BC97, Theorem 4] based on Geronimus’ formula for the determinant of a matrix, whose entries are Legendre polynomials. In characteristic two, one might use the algorithm from [HM93] if the Hasse invariant is zero. If the Hasse invariant is one, Monsky computed the Hilbert-Kunz function in [Mon97] using tools from invariant theory. 44 1. A SURVEY ON HILBERT-KUNZ THEORY 1.3. Related invariants and further readings In this section we want to discuss some invariants related to Hilbert-Kunz theory. We also give a list of references related to Hilbert-Kunz theory that have not been mentioned in this survey. 1.3.1. Limit Hilbert-Kunz multiplicity. The basic question in this subsection is whether one can define a “Hilbert-Kunz multiplicity” in characteristic zero. We have already defined the generalized Hilbert-Kunz function n 7→ λR (R/( f1n , . . . , fmn )R). From this definition one might get the idea to study the limit λR (R/( f1n , . . . , fmn )R) lim , n→∞ ndim(R) provided it exists. Consider for example R := Z[X, Y, Z]/(X + Y + Z). Then by [HM93, Theorem 2.14] we obtain 3n2 . dimQ (Q ⊗Z R/(X , Y , Z )) = 4 ' & n n n Dividing this number by n2 and taking the limit n → ∞, we get dimQ (Q ⊗Z R/(X n , Y n , Z n ) 3 lim = . n→∞ n2 4 But since Q ⊗Z R  Q[X, Y] is regular, we want the “Hilbert-Kunz multiplicity” to be one. Hence the above limit cannot be a good candidate. Definition 1.84. Let R be a positively-graded Z-domain and let I = ( f1 , . . . , fm ) be a homogeneous R+ -primary ideal. For a prime p let R p := R ⊗Z Z/(p) and denote by I p the extended ideal IR p . We call the limit (provided it exists) e∞ lim eHK (I p , R p ) HK (I, R) := p→∞ the limit Hilbert-Kunz multiplicity of R with respect to I. The existence of e∞ HK (m, R), where R is a diagonal hypersurface over Z was shown by Gessel and Monsky in [GM10]. To state their result, we need one more definition. Definition 1.85. Let d1 , . . . , d s be positive integers. For any integer λ we define Ç å s−1 ε1 εs (ε1 · . . . · ε s ) · + . . . + − 2λ d1 ds ,...,ε )∈{±1} s , X Cλ := (ε1 . s ε1 εs d1 +...+ d s >2λ P  s X di with positive inteTheorem 1.86 (Gessel, Monsky). Let R := Z[X1 , . . . , X s ]/ i=1 i Q gers di and let d := di . The limit Hilbert-Kunz multiplicity of R is given by e∞ HK (R) = d(21−s ) (s − 1)! Proof. See [GM10, Theorem 2.4]. Ñ · C0 + 2 é X Cλ . λ>0  1.3. RELATED INVARIANTS AND FURTHER READINGS 45 Another big class of rings for which the limit Hilbert-Kunz multiplicity is known to exist, is given by standard-graded, two-dimensional k-domains, where k is an algebraically closed field of characteristic zero. To state the theorem, we need to define spreads. Definition 1.87. Let R be a finitely generated, positively-graded, two-dimensional domain over an algebraically closed field k of characteristic 0 and let I be a homogeneous R+ -primary ideal. There exist a finitely generated Z-algebra A ⊆ k, a finitely generated, positively-graded algebra RA over A and a homogeneous ideal IA ( RA with RA ⊗A k = R and such that the following properties hold for all closed points s ∈ Spec(A) (i) the ring R s := RA ⊗A κ(s) is a finitely generated, positively-graded, two-dimensional domain over κ(s), (ii) the rings R s are normal, if R is and (iii) the ideal I s := im(IA ⊗A κ(s)) ( R s is homogeneous and (R s )+ -primary. We call the data (A, RA , IA ) a spread of the pair (R, I). Note that the spread (A, RA , IA ) can be chosen such that A contains a given finitely generated k-subalgebra A0 . Theorem 1.88 (Trivedi). Let R be a standard-graded, two-dimensional domain over an algebraically closed field k of characteristic 0. Let I ( R be a homogeneous R+ -primary ideal and let (A, RA , IA ) be a spread of the pair (R, I). Denote by s0 the generic point of Spec(A). Then the limit e∞ HK (I, R) = lim eHK (I s , R s ) s→s0 over the closed points s ∈ Spec(A) exists. Moreover, if I = ( f1 , . . . , fn ) with deg( fi ) = di , this limit equals deg(Proj(S )) 2 Ñ t X i=1 Ç ri µi deg(Proj(S )) å2 − n X é di2 , i=1 where S is the normalization of R and the numbers ri , µi are the ranks and slopes of the consecutive quotients of the bundles in the Harder-Narasimhan filtration of SyzProj(S ) (IS ).  Proof. See [Tri07, Theorem 2.4]. Trivedi remarks (cf. [Tri07, Remark 2.6]) that all eHK (I s , R s ) are bounded below by e∞ HK (I, R) and that equality holds for a closed point s ∈ Spec(A) if and only if the HarderNarasimhan filtration of SyzProj(Rs ) (I s ) is strong. At least in this situation, the limit Hilbert-Kunz multiplicity behaves to solid closure like the Hilbert-Kunz multiplicity to tight closure (cf. [Bre04, Theorem 3.3]). The result of Trivedi was recovered in [BLM12] for standard-graded, flat Z-domains R, where almost all fiber rings R p := R ⊗Z Z/(p) are geometrically normal, two-dimensional domains. Moreover, they show that in this situation, one does not have to compute all eHK (I p , R p ) to compute e∞ HK (I, R). In fact, one can skip the limit in the first number. Theorem 1.89 (Brenner, Li, Miller). In the above situation, one has [pe ]  e∞ HK (I, R) = lim p→∞ λR p R p /I p p2e  46 1. A SURVEY ON HILBERT-KUNZ THEORY for every fixed integer e ≥ 1. 1.3.2. F-Signature. In this subsection we will define the F-signature (function) and connect them to Hilbert-Kunz theory. For further properties of F-signature and explicit examples we refer to the literature. Definition 1.90. Let (R, m, k) be a reduced local ring of dimension d and characteristic p > 0. Assume that k is perfect and that R is F-finite (meaning that F : R → R is a finite map). For any e ∈ N denote by aq the maximal rank of a free submodule of R1/q . Then the function e 7→ Fsign (R, q) := aq is called the F-signature function of R. The limit Fsign (R, q) s(R) := lim e→∞ qd (provided it exists) is called the F-signature of R. The F-signature was firstly studied in [SdB97] and the existence was proven by Tucker in [Tuc12, Theorem 4.9]. Yao has shown in [Yao06, Proposition 4.1] that the F-signature of R is nothing but the minimal relative Hilbert-Kunz multiplicity of R, that is √ inf{eHK (I, R) − eHK (J, R)|I ( J, I = m, λR (J/I) = 1} and was defined in [WY04]. The following theorem gives a connection between the F-signature function and the Hilbert-Kunz function. Theorem 1.91 (Huneke, Leuschke). Let (R, m) be Gorenstein, let I be an m-primary ideal generated by a system of parameters and J := (I, y), where y ∈ R is a representative for the socle of R/I. We then get the equality Fsign (R, q) = HK(I, R, q) − HK(J, R, q). Proof. See [HL02, Theorem 11(2)].  1.3.3. Further readings. We give some more references on papers related to HilbertKunz theory that are not mentioned so far. (i) In [Fie00] Fields investigates the theory of quasi-polynomial functions to length functions of generalized Tor-modules. This theory has applications to HilbertKunz functions. (ii) More on Hilbert-Kunz functions of hypersurfaces can be found in [Che98], [Upa12a], [Upa12b], [Upa12c] and [Upa12d]. (iii) For more explicit examples of Hilbert-Kunz functions (in characteristic two) see [Mon98a], [Mon98b] and [Mon05]. (iv) The geometric approach to Hilbert-Kunz theory is used in [FT03] and [Mon07]. (v) For a deeper analysis of Han’s δ-function and similar functions, especially of their fractal structure, see [MT04], [MT06], [Tei02] and [Tei12]. (vi) More bounds for Hilbert-Kunz multiplicities can be found in [AE12], [AE08], [BE04], [CDHZ12] and [Tuc12]. 1.3. RELATED INVARIANTS AND FURTHER READINGS 47 (vii) For more on Frobenius functors and Frobenius pull-backs in higher dimensions see [Dut83], [Dut89], [Dut96], [Sei89] and [Tri12]. (viii) For some generalizations of Hilbert-Kunz functions and multiplicities for example to ideals that are not m-primary see [DS13], [EY11] and [EY]. (ix) More properties and explicit examples of F-signatures can be found in [AE05], [AL03], [Can12], [BST12a], [BST12b], [Kor11], [Sin05] and [SW11]. (x) More about tight and solid closure and their interactions with Hilbert-Kunz theory can be found for example in [HH90], [Hoc94], [Hun96], [Bre03], [Bre04] and [Bre08]. (xi) Results on the Hilbert-Kunz function of maximal Cohen-Macaulay modules can be found in [CK12], [Sei97] and [WY01a]. CHAPTER 2 Examples of Hilbert-Kunz functions and Han’s δ function In the first section we will discuss some examples of Hilbert-Kunz functions. The second section is devoted to a more detailed study of Han’s δ function and a generalization of a theorem due to Monsky. We will end section two by computing some examples of Hilbert-Kunz multiplicities with the help of this generalization. In the third section we will use this generalization to study the behaviour of the Hilbert-Kunz multiplicity in certain families of trinomial surface rings. 2.1. Examples of Hilbert-Kunz functions We fix some notations for the next two lemmata in which we will compute formulas for values of Hilbert-Kunz functions. These formulas will be used to compute HilbertKunz functions of explicit examples (cf. Example 2.6 as well as the computations in the Chapters 6 and 7). Let R := k[X, Y, Z]/(F) be a normal, standard-graded domain with an algebraically closed field k of prime characteristic p and deg(F) = d > 0. Moreover, we fix the R+ -primary ideal I := (X α , Y β , Z γ ) with α, β, γ ∈ N≥1 . Let Q : N3 → Z be the quadratic form defined as (n1 , n2 , n3 ) 7−→ 2(n1 n2 + n1 n3 + n2 n3 ) − n21 − n22 − n23 . Lemma 2.1. Let e ∈ N be such that (2.1) Ä ä SyzR I [q] = R(−n) ⊕ R(−l) for some n, l ∈ Z. Then the value at e of the Hilbert-Kunz function of R with respect to I is given by HK(I, R, pe ) = d · Q(α, β, γ) · p2e + d · |n − l|2 . 4 Note that the assumption (2.1) means that the quotient R/I [q] has finite projective dimen0 sion and this carries over to all quotients R/I [q ] for q0 ≥ q. Proof. Computing the degrees of the C := Proj(R)-bundles corresponding to the Rmodules in (2.1), one finds l + n = q(α + β + γ). Therefore, we can write l and n as (2.2) q(α + β + γ) ± |l − n| . 2 49 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION 50 Using Proposition 1.76 and Riemann-Roch 1.52, we obtain dimk (R/(X αq , Y βq , Z γq ))  = x→∞ lim + x X  0 h (OC (m)) − m=0 x X h0 (OC (m − l)) + x X x X  0 h (OC (m)) − m=0 x−l X h0 (OC (m)) + m=0 x X h0 (OC (m − γq)) m=0 h0 (OC (m − n)) x−αq X 0 h (OC (m)) − x−n X x−βq X 0 h (OC (m)) − m=0 x−γq X h0 (OC (m)) m=0  h0 (OC (m)) m=0  = x→∞ lim  x X x X  x−βq X h0 (OC (m)) − m=x−α·q+1  − h (OC (m − βq)) − 0  m=0 m=0 = x→∞ lim x X m=0  + h (OC (m − αq)) − 0 m=0 m=0 = x→∞ lim x X x−βq X m=x−l+1 h0 (OC (m)) − x X (dm + 1 − g) + h1 (OC (m)) − h (OC (m)) − (dm + 1 − g) − m=x−n+1 h0 (OC (m)) x−βq X 1 m=x−α·q+1 x−γq X  m=x−n+1 m=x−l+1 m=x−α·q+1 x−γq X (dm + 1 − g) m=x−l+1 x−γq X  h1 (OC (m)) , m=x−n+1 where g in the last equality denotes the genus of C. With the help of Equation (2.2) one sees that the various sums over dm + 1 − g sum up to the constant dQ(α, β, γ)q2 + d|l − n|2 . 4 Since both bounds of the sums over h1 (OC (m)) depend linearly on x and h1 (OC (m)) vanishes for large m by a theorem of Serre (cf. [Har87, Theorem III.5.2]) these sums have no share in the limit over x. All in all, the claim follows.  Lemma 2.2. Let e ∈ N be such that (2.3) Ä ä SyzR I [q]  SyzR (X a , Y b , Z c )(−n) for some n ∈ Z and some positive integers a, b, c such that at least one of the inequalities a < αq, b < βq, c < γq holds. Computing the degrees of the C := Proj(R)-bundles corresponding to the R-modules in (2.3), we find q(α + β + γ) − a − b − c . n= 2 With D := dimk (R/(X a , Y b , Z c )) the value at e of the Hilbert-Kunz function of R with respect to I is given by HK(I, R, pe ) = d · Q(α, β, γ) · p2e − d · Q(a, b, c) + D. 4 2.1. EXAMPLES OF HILBERT-KUNZ FUNCTIONS 51 Proof. From the presenting sequence of SyzC (X a , Y b , Z c )(m − n) we obtain h0 (C, SyzC (X a , Y b , Z c )(m − n)) = h0 (C, OC (m − n − a)) + h0 (C, OC (m − n − b)) + h0 (C, OC (m − n − c)) (2.4) − h0 (C, OC (m − n)) + dimk (R/(X a , Y b , Z c ))m−n . AsÄin the previous using Proposition 1.76, Riemann-Roch 1.52 and substituting ä example, ä Ä h0 C, SyzC I [q] (m) with the right hand side of (2.4), we get dimk (R/(X αq , Y βq , Z γq ))  = lim  x→∞ − x X h0 (OC (m)) − m=0 x X + h0 (OC (m − γq)) + h0 (OC (m − n − c)) − m=0 h0 (OC (m − n − a)) + x X h0 (OC (m − n − b)) m=0 x X  h0 (OC (m − n)) + D x X  0 h (OC (m)) − x−βq X 0 h (OC (m)) − m=0 m=0 x−n−a X x−αq X h0 (OC (m)) + x−n−b X h0 (OC (m)) + m=0 2 d · Q(α, β, γ) · q − d · Q(a, b, c) 4 0 h (OC (m) − x−γq X m=0 m=0 x−n−c X x−n X m=0 m=0 = h0 (OC (m − βq)) m=0  + x X m=0 m=0 = x→∞ lim h0 (OC (m − αq)) − m=0 x X m=0 x X x X h0 (OC (m)) − h0 (OC (m))  h0 (OC (m)) + D m=0 + D.  An important application of Lemma 2.2 is the case, where SyzProj(R) (X, Y, Z) admits a Frobenius periodicity. Definition 2.3. Let X be a scheme over an algebraically closed field k of characteristic p > 0. Let S be a vector bundle over X. Assume there are s < t ∈ N such that the Frobenius pull-backs Fe∗ (S) of S are pairwise non-isomorphic for 0 ≤ e ≤ t − 1 and Ft∗ (S)  F s∗ (S). We say that S admits a (s, t)-Frobenius periodicity. Finally, the bundle S admits a Frobenius periodicity if there are s < t ∈ N such that S admits a (s, t)-Frobenius periodicity. Remark 2.4. (i) By a result of Lange and Stuhler the vector bundles S admitting a (0, t)-Frobenius periodicity are exactly those which are étale trivializable (cf. [LS77, Satz 1.4]), where S is étale trivializable if there exists a finite étale, surjective morphism ϕ : D → C such that ϕ∗ (S) is trivial. (ii) If X is a projective scheme only bundles of degree zero might admit a Frobenius periodicity in the strong sence above. For bundles of non-zero degree we will use the following weaker definition of Frobenius periodicity. We say that S admits a (s, t)-Frobenius periodicity if 0 Fe∗ (S)  Fe ∗ (S)(m) and Ft∗ (S)  F s∗ (S)(n) 52 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION hold for all 0 ≤ e0 < e ≤ t − 1, all m ∈ Z and some n ∈ Z. Example 2.5. Let d ≥ 2 be an integer and let k be a field of characteristic p with p ≡ −1 (2d). Let Ä Ä ää C := Proj k[X, Y, Z]/ X d + Y d − Z d be the Fermat curve of degree d and S := SyzC (X, Y, Z). In this case Brenner and Kaid showed that S is always strongly semistable and admits a (0, 1)-Frobenius periodicity (cf. [BK13, Lemma 3.2, Theorem 3.4]). To be more precise, one has å Ç 3p − 3 ∗ . F (S)  S − 2 From this periodicity one can compute the Hilbert-Kunz function of R as (cf. [BK13, Corollary 4.1] or use Lemma 2.2 with α = β = γ = a = b = c = D = 1) 3d 2 3d HK(R, q) = ·q +1− . 4 4 In Chapter 7 we recover the periodicity by a different approach as in [BK13]. The isomorÄ 3p−3 ä ∗ phisms F (S)  S − 2 as well as the trivializing étale covers are computed explicitly in [Stä11]. Example 2.6. We are interested in the Hilbert-Kunz functions of the diagonal hypersurfaces of the form R := k[X, Y, Z]/(X 2 + Y l + Z m ), where k is an algebraically closed field of characteristic p > 0. With deg(X) = lm, deg(Y) = 2m and deg(Z) = 2l the ring R is homogeneous. Moreover, we assume l = 3 and m ≥ 6 or 4 ≤ l ≤ m. Note that l and m are chosen such that 1 1 1 (2.5) + + ≤ 1. 2 l m Ä ä The above inequality is equivalent to the condition that the triple 12 , 1l , m1 does not satisfy the strict triangle inequality. Since the map Ä R → S := k[U, V, W]/ U 2lm + V 2lm + W 2lm ä with X 7→ U lm , Y 7→ V 2m , Z 7→ W 2l is flat and the extension Ä ä k[U, V, W]/ U lm , V 2m , W 2l : k has degree 4l2 m2 (cf. [Mat05, Theorem 22.2]), we obtain ÄÄ ä HK U lm , V 2m , W 2l , S , q HK(R, q) = 4l2 m2 by Remark 1.22. Using the Lemmata 2.1 and 2.2, we obtain ä 2lm · Q(lm, 2m, 2l) · q2 + 2lm · δ2 4 · 4l2 m2 if SyzS (U lmq , V 2mq , W 2lq )  S (−n) ⊕ S (−n − δ) for some n, δ ∈ Z and (2.7) Ä ä 2lm · Q(lm, 2m, 2l) · q2 − 2lm · Q(lma, 2mb, 2lc) dimk S /(U a , V b , Z c ) HK(R, q) = + 4 · 4l2 m2 4l2 m2 (2.6) HK(R, q) = 2.1. EXAMPLES OF HILBERT-KUNZ FUNCTIONS 53 if SyzS (U lmq , V 2mq , W 2lq )  SyzS (U a , V b , W c )(−n) for some n ∈ Z and some a, b, c ∈ N such that at least one of the inequalities a < lmq, b < 2mq, c < 2lq holds. At first we present a geometric computation which will show that SyzS (U lmq , V 2mq , W 2lq ) gets free if q is large and the inequality (2.5) is strict. Afterwards, we turn to the algebraic situation to compute the values of the Hilbert-Kunz functions that are not covered by the geometric computation. The computation in the algebraic situation will recover the results from the geometric one. Denote by C the projective spectrum of S and assume that the inequality (2.5) is strict. This means that (0, W 2l , −V 2m ) is a syzygy for U lm , V 2m , W 2l of minimal possible degree 2(l+m).ÄTherefore, theävector bundle OC (−2(l+m)) is the maximal destabilizing subsheaf of SyzC U lm , V 2m , W 2l and we obtain the short exact sequence Ä ä 0 → OC (−2(l + m)) → SyzC U lm , V 2m , W 2l → OC (−lm) → 0. The e-th Frobenius pull-back of this sequence splits if Ext1 (OC (−lmpe ), OC (−2(l + m)pe ))  H1 (C, OC (−(2l + 2m − lm)pe ))  H0 (C, OC ((2l + 2m − lm)pe + 2lm − 3)) vanishes, where the last isomorphism is due to Serre duality with ωC  OC (2lm−3). Since 2m + 2l − lm < 0, the degree shift (2l + 2m − lm)pe + 2lm − 3 gets negative for large e such that OC ((2l + 2m − lm)pe + 2lm − 3) has no global sections. This shows (with q = pe ) SyzC (U lmq , V 2mq , W 2lq )  OC (−2(l + m)q) ⊕ OC (−lmq) for large e. We obtain the splitting SyzS (U lmq , V 2mq , W 2lq )  S (−2(l + m)q) ⊕ S (−lmq) of S -modules, showing ÄÄ ä ä 2lm · Q(lm, 2m, 2l) · q2 + 2lm · δ2 = 8l2 m2 q2 and 4 HK(R, q) = 2q2 HK U lm , V 2m , W 2l , S , q = 2lm−3 for all q bigger than ml−2m−2l . We now show by an algebraic computation that we always have a splitting SyzS (U lmq , V 2mq , W 2lq )  S (−2(l + m)q) ⊕ S (−lmq) if 2l + 2m < lm or 2l + 2m = lm and p . 1 (l). In the case p = 2, we have (for q ≥ 2) q U lmq = (V 2lm + W 2lm ) 2 = V lmq + W lmq . From this equality, we deduce that SyzS (U lmq , V 2mq , W 2lq ) is free. The generators are Ä ä −1, V (l−2)mq , W (m−2)lq and (0, W 2lq , −V 2mq ) of total degrees mlq and 2mq + 2lq. If q is divisible by l, we have q V 2mq = (−U 2ml − W 2ml ) l = −U 2mq − W 2mq . 54 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION From this equality we obtain with Lemma 1.61 SyzS (U lmq , V 2mq , W 2lq )  SyzS (U lmq , −U 2mq − W 2mq , W 2lq )  SyzS (U lmq , U 2mq , W 2lq )  SyzS (U (l−2)mq , 1, W 2lq )(−2mq)  (S (−(l − 2)mq) ⊕ S (−2lq))(−2mq)  S (−lmq) ⊕ S (−2mq − 2lq). Now we can assume that p is odd and that we can write q = ln + r with 1 ≤ r ≤ l − 1. Using U 2lm = −V 2lm − W 2lm , we get q−1 (2.8) U lmq = −U lm 2 X Ä ä q−1 ! q−1 q−1 2lmi 2lm 2 −i 2 2 . (−1) V W i i=0 The summands for i ≥ †q£ l = n + 1 are divisible by V 2mq and the summands with ú (m − 2)q − m i≤ 2m ü are divisible by W 2lq . We take a closer look at the bound for divisibility by W 2lq . (2.9) (m − 2)q − m (m − 2)(ln + r) − m = 2m 2m (ml − 2m − 2l)n + m(r − 1) − 2r = n+ . 2m If the numerator in the fraction in the last line is non-negative, all summands for indices i ≤ n in Equation (2.8) are divisible by W 2lq . Since all summands with index i ≥ n + 1 are multiples of V 2mq , we obtain U lmq ∈ (V 2mq , W 2lq ). As in the case p = 2, this implies SyzS (U lmq , V 2mq , W 2lq )  S (−lmq) ⊕ S (−2mq − 2lq). The number ml − 2m − 2l vanishes if and only if (l, m) ∈ {(3, 6), (4, 4)}, otherwise it is positive. The cases (l, m) = (3, 6) and (l, m) = (4, 4) will be discussed seperatedly, hence we assume ml − 2m − 2l ≥ 1. Starting with the case r = 1, we have to show (ml − 2m − 2l)n ≥ 2. From r = 1, we obtain n ≥ 1. If l is even, ml − 2l − 2m is even and the result follows. If l is odd, we get that n is even, since q is odd. Now let r > 1. To prove that the numerator in (2.9) is non-negative, it suffices to show m(r − 1) − 2r ≥ 0. This is true, because otherwise we obtain the contradiction m(r − 1) < 2r ⇐⇒ r < 1 + 2 ≤ 2, m−2 since m ≥ 4 in all cases. This argument is still valid in the cases (l, m) ∈ {(3, 6), (4, 4)}. Up to now, we found (except for the cases q odd with q ≡ 1 (l) and (l, m) ∈ {(3, 6), (4, 4)}) SyzS (U lmq , V 2mq , W 2lq )  S (−lmq) ⊕ S (−2mq − 2lq). 2.2. HAN’S δ FUNCTION 55 The Hilbert-Kunz function of R is given by Equation (2.6) as 2lm · Q(lm, 2l, 2m) · q2 + 2lm · (lm − 2m − 2l)2 · q2 16l2 m2 = 2q2 HK(R, q) = We only have to treat the cases q = nl + 1 for (l, m) ∈ {(3, 6), (4, 4)} with q odd. If p . 1 (l) we obtain a splitting SyzS (U lmp , V 2mp , W 2lp )  S (−lmp) ⊕ S (−2mp − 2lp), which carries over to all higher exponents of p. Hence, we may assume q = p with p = nl + 1. We start with the case (l, m) = (3, 6) and work with the grading deg(X) = 18, deg(Y) = 12 and deg(Z) = 6. With p = 3n + 1 only the summand for i = n in Equation (2.8) does not belong to the ideal (V 12p , W 6p ). The binomial coefficient of this summand is non-zero since all its factors are < p. This shows Ä SyzS (U 18p , V 12p , Z 6p )  SyzS U 18 V 12(p−1) W 6(p−1) , V 12p , W 6p ä  SyzS (U 18 , V 12 , W 6 )(−18(p − 1)). By Equation (2.7), we obtain 36 · Q(18, 12, 6) · q2 − 36 · Q(18, 12, 6) + 4 · 18 · 12 · 6 4 · 4 · 9 · 36 2 = 2q − 1. HK(R, q) = In the case (l, m) = (4, 4) we work with the grading deg(X) = 16, deg(Y) = deg(Z) = 8. Let q = 4n + 1. Arguing as in the case (l, m) = (3, 6) we may assume q = p and obtain SyzS (U 16p , V 8p , W 8p )  SyzS (U 16 , V 8 , W 8 )(−16(p − 1)). Using Equation (2.7) in this situation, we find again HK(R, q) = 2q2 − 1. All in all we have    1 HK(R, p ) =  e   2q2 − 1 2q2 if e = 0, if e > 0, p ≡ 1 (l) and (l, m) ∈ {(3, 6), (4, 4)}, else. Remark 2.7. The previous example covers all two-dimensional diagonal hypersurfaces of multiplicity two which are not of type An , E6 or E8 with one exceptional family. Namely the cases R := k[X, Y, Z]/(X 2 + Y 2 + Z l ) for l ≥ 2 and char(k) = 2 are not treated. In this case an easy calculation shows HK(R, 2e ) = 2 · 4e . 2.2. Han’s δ function In this section we introduce "Han’s δ function", which measures syzygy gaps in a polynomial ring in two variables. It was first studied by Han in her thesis [Han91]. We also give a result of Monsky, that allows us to compute Hilbert-Kunz multiplicities of certain curves in P2 with the help of this function. All statements are reproved in a slightly more general context to make them work in non-standard graded situations. 56 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION Let k denote an algebraically closed field of char k = p > 0 and let R = k[U, V], where U and V have the degrees a resp. b ∈ N≥1 . All polynomials are assumed to be (quasi-)homogeneous. Definition 2.8. Let F1 , F2 , F3 ∈ R be homogeneous and coprime. By Hilberts Syzygy Theorem we get a splitting SyzR (F1 , F2 , F3 )  R(−α) ⊕ R(−β) for some α ≥ β ∈ N. Let syzgap(F1 , F2 , F3 ) := α − β. Remark 2.9. Let I be the ideal generated by the Fi and di := deg(Fi ). Then by [KR05, Proposition 5.8.9] the Hilbert-series of R/I is HR/I (t) = ∞ X dimk ((R/I)i ) · ti = i=0 1 − td1 − td2 − td3 + tα + tβ . (1 − ta )(1 − tb ) Note that this is a polynomial, since we have dimk (R/I) < ∞ by the coprimeness of the Fi , hence dimk ((R/I)i ) = 0 for i  0. Proposition 2.10. With the previous notations we get the following formulas. (i) α + β = d1 + d2 + d3 . (ii) Let Q(r, s, t) := 2rs + 2rt + 2st − r2 − s2 − t2 . Then Q(d1 , d2 , d3 ) + syzgap(F1 , F2 , F3 )2 . 4ab Proof. Write P(t) for the numerator of H(R/I)(t). Differentiating both sides of P(t) = HR/I (t)(1 − ta )(1 − tb ) one gets dimk (R/I) = − d1 td1 −1 − d2 td2 −1 − d3 td3 −1 + αtα−1 + βtβ−1 =(HR/I (t))0 (1 − ta )(1 − tb ) − a · HR/I (t)(1 − ta−1 )(1 − tb ) − b · HR/I (t)(1 − ta )(1 − tb−1 ). The evaluation at 1 gives (i). Similarly, differentiating P(t) = HR/I (t)(1 − ta )(1 − tb ) twice and evaluating at 1 gives (ii). Note that (i) can be seen alternatively by the additivity of the degree of vector bundles.  The previous proposition gives syzgap(F1 , F2 , F3 ) = α − β = d1 + d2 + d3 − 2β, where β is the minimal degree of a non-trivial syzygy for I. This allows us to drop the coprimeness condition in the definition of syzgap. Definition 2.11. Let m(F1 , F2 , F3 ) be the minimal degree of a non-trivial syzygy for the ideal generated by F1 , F2 and F3 . Then define syzgap(F1 , F2 , F3 ) := d1 + d2 + d3 − 2 · m(F1 , F2 , F3 ). Some basic properties of syzgap are given in the next proposition. Proposition 2.12. With the previous notations and F ∈ R non-zero and homogeneous the following (in-)equalities hold. (i) syzgap(FF1 , FF2 , FF3 ) = deg(F) + syzgap(F1 , F2 , F3 ). 2.2. HAN’S δ FUNCTION 57 (ii) If F and F3 are coprime, we have syzgap(FF1 , FF2 , F3 ) = syzgap(F1 , F2 , F3 ). (iii) | syzgap(FF1 , F2 , F3 ) − syzgap(F1 , F2 , F3 )| ≤ deg(F). p p p (iv) syzgap(F1 , F2 , F3 ) = p · syzgap(F1 , F2 , F3 ).  Proof. See Propositions 2.12, 2.17, 2.19 resp. 2.16 of [Tei02]. We now specify the situation: Setup 2.13. Let k be an algebraically closed field of characteristic p > 0, let R := k[X, Y] equipped with the standard grading. For a1 , a2 , a3 , e ∈ N and q := pe set Ç å a1 a2 a3 δ , , := q−1 · syzgap(X a1 , Y a2 , (X + Y)a3 ). q q q Then Proposition 2.12 (iv) ensures, that this definition is independent of q and part (iii) gives the inequality Ç å Ç å a1 a2 a3 b1 b2 b3 δ , , , , −δ ≤ q−1 · k(a1 − b1 , a2 − b2 , a3 − b3 )k1 , q q q q q q where k_k1 denotes the taxicap distance. Therefore δ is Lipschitz and extends to a unique  t 3 −1 continuous function δ on [0, ∞) with δ q = q · δ(t) and |δ(t) − δ(s)| ≤ kt − sk1 . Our next goal is to explain how δ can be computed in this situation. We follow [Mon06b], which provides a simpler proof than [Han91]. Definition 2.14. Let ¶ Lodd := u ∈ N3 |u1 + u2 + u3 is odd © be the odd lattice. We are interested in the taxicap distance of elements of the form pts to Lodd , where s is an integer and t a three-tuple of non-negative real numbers. Note that for given pts there is at most one u ∈ Lodd satisfying t − u < 1. ps 1 Moreover, the only candidates for ui are the roundups and rounddowns of ptis . Definition 2.15. For s ∈ Z and t ∈ [0, ∞)3 we define     0   E s (t) :=     1− if there is no u ∈ Lodd with t −u ps if 1 t −u ps t −u ps < 1, 1 < 1. 1 Monsky has proved in [Mon06b, Lemma 21, Theorem 22] the following properties of the functions E s (t). Theorem 2.16 (Monsky). Let t = (t1 , t2 , t3 ) ∈ [0, ∞)3 . (i) If the ti do not satisfy the strict triangle inequality, say t1 ≥ t2 + t3 , then max s∈Z p s · E s (t) = t1 − t2 − t3 .  2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION 58 (ii) If the ti satisfy the strict triangle inequality, then either E s (t) = 0 for all s or there exists a maximal s with E s (t) , 0. Moreover, for this maximal s we have p s · E s (t) = maxr∈Z pr · Er (t) .  (iii) δ(t) = max s∈Z p s · E s (t) .  From this theorem one gets Han’s Theorem [Han91, Theorem 2.25 and Theorem 2.29]. Theorem 2.17 (Han). Let t = (t1 , t2 , t3 ) ∈ [0, ∞)3 . If the ti do not satisfy the strict triangle inequality (w.l.o.g. t1 ≥ t2 + t3 ), we have δ(t) = t1 − t2 − t3 . If the ti satisfy the strict triangle inequality and there are s ∈ Z and u ∈ Lodd with kp s t − uk1 < 1, then there is such a pair (s, u) with minimal s and with this pair (s, u) we get δ(t) =  1 · 1 − pst − u 1 . s p Otherwise, we have δ(t) = 0. Proof. If the ti do not satisfy the strict triangle inequality, the statement is immediate from Theorem 2.16 (i) and (iii). If the ti satisfy the strict triangle inequality, then by Theorem 2.16 (ii) there is a minimal s such that E−s (t) , 0 or all E s (t) vanish. Part (iii) gives the result.  Remark 2.18. At least if t is a triple of rational numbers, there is a finite range in which the s in Theorem 2.17 has to lie. Namely, if the ti do not satisfy the strict triangle inequality, one has pl El (t) = 0 for all l ≥ 32 · max(ti ) by [Mon06b]. This gives a lower bound for s. With ti := zi /ni , zi , ni ∈ N, the distance of t · pu for u ≥ 0 depends only on the residue classes of zi · pu modulo 2 · ni . With n := 2 · lcm(ti ), the series ((z1 · pu , z2 · pu , z3 · pu ))u∈N , where x := x mod n, is eventually periodic. The number of different values for the elements of this series gives an upper bound for s. Note that there is an explicit implementation of Han’s Theorem (for rational arguments) in Appendix A. Example 2.19. Let b ≤ a ∈ N≥2 with 2(a + b) ≥ ab and both prime to the odd prime p. For e ∈ N we set q := pe for short. We want to show Ç å 1 1 1 δ , , = 0. 2 a b The first step is to show that the s in Han’s Theorem 2.17 has to be positive. The nearest 1 1 1 elements in Lodd to ( 2q , aq , bq ) are (1, 0, 0), (0, 1, 0), (0, 0, 1) and (1, 1, 1). The first three 2.2. HAN’S δ FUNCTION 59 points give a taxicap distance of at least 1. For the point (1, 1, 1) we get 1 1 1 1− +1− +1− <1 2q aq bq 1 1 1 >2 ⇐⇒ + + 2q aq bq 2 2 ⇐⇒1 + + > 4q. a b Since a, b ≥ 2, this gives the contradiction 4q < 3. Therefore s > 0 in Theorem 2.17. Now consider the points ( q2 , qa , qb ) for q ≥ p. Since the first coordinate yields a summand p−1 p+1 1 2 in the taxicap distance to Lodd and we may choose 2 or 2 , we get that the taxicap distance of ( q2 , qa , qb ) to Lodd is exactly 12 plus the taxicap distance of ( qa , qb ) to N2 . The four points in N2 that we have to consider have the roundup or rounddown of qa in the first and of qb in the second component. Hence, the taxicap distance to N2 is of the form na + mb with 1 ≤ n < a and 1 ≤ m < b, since a and b are prime to p. If this taxicap distance is smaller than 21 , we get the contradiction ab ≤ a + b. 2 All in all, the taxicap distance of p s ( 12 , 1a , 1b ) to Lodd is greater than 1 for all s ∈ Z. Therefore δ is zero. nb + ma < Before we connect the δ function with Hilbert-Kunz multiplicities, we prove a computation rule for a non-standard graded analogue. Setup 2.20. Let k be an algebraically closed field of characteristic p > 0, let R := k[U, V] equipped with the positive grading deg(U) = a, deg(V) = b. Fix c, d ∈ N≥1 such that ac = bd. For a1 , a2 , a3 , c, d, e ∈ N with q := pe set Ç å a1 a2 a3 τ , , := q−1 · syzgap(U a1 , V a2 , (U c + V d )a3 ). q q q Again Proposition 2.12 (iv) ensures, that this definition is independent of q and part (iii) gives the inequality Ç å Ç a1 a2 a3 b1 b2 b3 τ , , −τ , , q q q q q q å ≤ q−1 · k(a1 − b1 , a2 − b2 , a3 − b3 )k1 . Therefore τ is Lipschitz and extends to a unique continuous function τ on [0, ∞)3 with τ( qt ) = q−1 · τ(t) and |τ(t) − τ(s)| ≤ kt − sk1 . Lemma 2.21. With the notations from Setup 2.20 and t ∈ [0, ∞)3 we have Å ã t1 t2 τ(t) = acδ , , t3 . c d Proof. For t ∈ N3 both sides multiply by p when t is replaced by pt. Since rationals of the form nc , nd are dense in [0, ∞), it suffices to prove the statement for t = (ct1 , dt2 , t3 ) pj pj with ti ∈ N. Let S be the standard-graded polynomial ring k[X, Y]. Consider the map 60 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION ϕ : S → R, X 7→ U c , Y 7→ V d , which is homogeneous of degree ac. Denote by ψ the induced map on the projective spectra. We obtain ψ∗ (SyzProj(S ) (X t1 , Y t2 , (X + Y)t3 ))   / SyzProj(R) (U ct1 , V dt2 , (U c + V d )t3 )   / ψ∗ (OProj(S ) (l) ⊕ OProj(S ) (l + δ))   OProj(R) (acl) ⊕ OProj(S ) (acl + acδ) for some l ∈ Z and δ = δ(t1 , t2 , t3 ). Now the claim follows, since we have the isomorphism SyzProj(R) (U ct1 , V dt2 , (U c + V d )t3 )  OProj(R) (m) ⊕ OProj(R) (m + τ) for some m ∈ Z and τ = τ(ct1 , dt2 , t3 ).  We now prove a slightly more general version of [Mon06a, Theorem 2.3] (see Corollary 2.30 below). We will skip the proofs that are still valid in our situation. Setup 2.22. Let R be a standard-graded domain of dimension d and J := (x1 , . . . , xn ) an  R+ -primary ideal with all xi non-zero and homogeneous. For l ∈ Nn let J(l) := x1l1 , . . . , xnln . We denote eHK (J(l), R) by µ(l). We will show that µ extends to a unique continuous function on [0, ∞)n with the property µ(pt) = pd · µ(t) (this is Remark 5 in the appendix of [Tei12] and we will lean on the proof given there in the case li = l1 for all i). Lemma 2.23. In the situation of Setup 2.22 let l ∈ Nn . If li ≥ 1, let l(i) := l − ei , where ei denotes the i-th canonical vector. Then Ä ä Ä µ(l) − µ l(i) = O (max(l j ))d−1 Ä ä ä Proof. The R-module J l(i) /J(l) is annihilated by xi , which gives it a natural S := R/xi -module structure. Therefore we get the inequality Ä Ä ä ä Ä Ä ä ä Ä ä λR J l(i) /J(l) = λS J l(i) S /J(l)S ≤ λS (S /J(l)S ) ≤ λS S /mn·max(l j ) . But the last length is for large max(l j ) given by a polynomial in max(l j ) of degree d − 1. By Theorem 1.20 we have Ä Ä µ(J(l)) − µ J l(i) ää Ä Ä ä ä Ä ä ≤ eHK (R) · λR J l(i) /J(l) = O (max(l j ))d−1 .  Lemma 2.24. The notations are the same as in Setup 2.22. Let I ( [0, 1]n be the set of all elements of the form ( aq11 , . . . , qann ), where the qi ≥ 1 are powers of p and the ai are natural numbers ≤ qi . Then µ : I → R is Lipschitz. Proof. Given two elements from I, we may expand each component by a power of p and end up with two elements of the form ql , mq , where l and m are n-tuples of natural 2.2. HAN’S δ FUNCTION 61 numbers ≤ q. |µ(l) − µ(m)| = |µ(l) − µ(l1 , . . . , ln−1 , mn ) + µ(l1 , . . . , ln−1 , mn ) − µ(l1 , . . . , ln−2 , mn−1 , mn ) + . . . + µ(l1 , m2 , . . . , mn ) − µ(m)| ≤ |µ(l) − µ(l1 , . . . , ln−1 , mn )| + |µ(l1 , . . . , ln−1 , mn ) − µ(l1 , . . . , ln−2 , mn−1 , mn )| + . . . + |µ(l1 , m2 , . . . , mn ) − µ(m)| = n X |µ(l1 , . . . , li , mi+1 , . . . , mn ) − µ(l1 , . . . , li−1 , mi , . . . , mn )|. i=1 Expanding the i-th summand in the same way (w.l.o.g. li ≥ mi ), the previous lemma gives the inequality |µ(l1 , . . . , li−1 , li , mi+1 , . . . , mn ) − µ(l1 , . . . , li−1 , mi , mi+1 , . . . , mn )| ≤ |µ(l1 , . . . , li−1 , li , mi+1 , . . . , mn ) − µ(l1 , . . . , li−1 , li − 1, mi+1 , . . . , mn )| + . . . + |µ(l1 , . . . , li−1 , mi + 1, mi+1 , . . . , mn ) − µ(l1 , . . . , li−1 , mi , mi+1 , . . . , mn )| ≤ |ln+1−i −m Xn+1−i |−1 Mi · max(l1 , . . . , li−1 , li − j, mi+1 , . . . , mn )d−1 j=0 ≤ Mi · max(l1 , . . . , li , mi+1 , . . . , mn )d−1 · |li − mi |, where Mi is the constant from the previous lemma. Summation over i yields |µ(l) − µ(m)| ≤ n · max{Mi } · (max{l1 , m1 , . . . , ln , mn })d−1 kl − mk1 . Dividing by qd gives Ç å Ç l m µ −µ q q å ≤ l m n · max{Mi } kl − mk1 = n · max{Mi } − q q q hence µ is Lipschitz on I with Lipschitz constant n · max{Mi }. , 1  Lemma 2.25. The notations are the same as in Setup 2.22. For t ∈ [0, ∞)n choose e ∈ N such that pe ≤ max(ti ) < pe+1 =: q. This gives qt ∈ [0, 1]n and we define µ(t) := qd · µ( qt ). Then µ(t) is continous. Proof. By the previous lemma we only have to take care of the "borders" pe . We have Ç å 1 1 ,..., = lim e µ(t) = q · µ max ti ↓p p p d Ç åd q p · eHK (R). For the "limit from below", we have to look for the limit t → (pe , . . . , pe ), t1 , . . . , tn < pe . This limit is Ç åd Ç åd q q lim µ(t) = · µ(1, . . . , 1) = · eHK (R). t→(pe ,...,pe ) p p e t1 ,...,tn <p  Next, we want to use the function µ to compute the Hilbert-Kunz multiplicities of certain hypersurfaces k[X, Y, Z]/(F) with respect to the ideals (X a , Y b , Z c ). This is a slight 62 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION generalization of Monsky’s result from [Mon06a], where he restricted himself to the case a = b = c. Definition 2.26. Let k be an algebraically closed field of characteristic p > 0. An irreducible, homogeneous (standard-graded) polynomial F ∈ k[X, Y, Z] of degree d is called regular if each of the points (1 : 0 : 0), (0 : 1 : 0), (0 : 0 : 1) has multiplicity < d2 on the projective curve defined by F. Otherwise we call F irregular. Monsky has shown in [Mon06a, Lemma 2.2] that regular, irreducible trinomials F = X a1 Y a2 Z a3 + X b1 Y b2 Z b3 + X c1 Y c2 Z c3 appear in two families: a1 a2 a3 b1 b2 b3 c1 c2 c3 0 0 > d2 type I > d2 0 > d2 d type II d 0 0 >2 0 > d2 An empty slot means, that there is no further restriction at the exponent (except making F homogeneous). The determinant of the matrix Ö è a1 b1 c1 a2 b2 c2 (2.10) a3 b3 c3 is dλ with 0 < λ ∈ N, because the rows sum up to (d, d, d). Construction 2.27. Given a regular, irreducible trinomial F, compute λ as above. Let A := k[r, s, t]/(rλ + sλ + tλ ). We denote by R, S , T the elements rλ , sλ , tλ of A. Let x, y, z be the elements rb3 sb2 , sc1 tc3 , ra1 ta2 if F is of type I and rc3 −b3 sc2 tb3 , sd , rb1 td−b1 if F is of type II. Now we show where the ring k[X, Y, Z]/(F) appears in these data. Let B := k[x, y, z] ⊆ A and consider the surjective map ϕ : k[X, Y, Z] → B, X 7→ x, Y 7→ y, Z 7→ z. Assume that F is of type I. Replacing the third row in (2.10) by the sum of all three rows, one finds λ = a1 b2 + a2 c1 − b2 c1 . Similarly, one obtains the equalities λ = b3 c1 + a1 c3 − a1 b3 and λ = b2 c3 + a2 b3 − a2 c3 . Then xa1 ya2 + yb2 zb3 + xc1 zc3 = (rb3 sb2 )a1 (sc1 tc3 )a2 + (sc1 tc3 )b2 (ra1 ta2 )b3 + (rb3 sb2 )c1 (ra1 ta2 )c3 = ra1 b3 sa1 b2 +a2 c1 ta2 c3 + ra1 b3 sb2 c1 tb2 c3 +a2 b3 + rb3 c1 +a1 c3 sb2 c1 ta2 c3 = ra1 b3 sb2 c1 ta2 c3 (sa1 b2 +a2 c1 −b2 c1 + tb2 c3 +a2 b3 −a2 c3 + rb3 c1 +a1 c3 −a1 b3 ) = ra1 b3 sb2 c1 ta2 c3 (rλ + sλ + tλ ) shows that ϕ factors through k[X, Y, Z]/(F). Since k[X, Y, Z]/(F) and B are two-dimensional domains they have to be isomorphic. A similar computation shows that B and k[X, Y, Z]/(F) are isomorphic if F is of type II. We also define the subrings B0 := k[R, S , T ] and C := k[xλ , yλ , zλ ] of A. Note that B0 is isomorphic to a polynomial ring in two variables. Monsky has shown that B0 and B are finite over C of ranks d resp. λ2 . 2.2. HAN’S δ FUNCTION 63 Definition 2.28. Let F = X a1 Y a2 Z a3 + X b1 Y b2 Z b3 + X c1 Y c2 Z c3 be regular and irreducible. For t = (t1 , t2 , t3 ) ∈ [0, ∞)3 set α0 (t) := t1 d − t1 b3 − t1 c2 − t2 c1 − t3 b1 , β0 (t) := t2 d − t2 c1 − t3 a2 − t1 c2 − t2 a3 , γ0 (t) := t3 d − t3 a2 − t1 b3 − t3 b1 − t2 a3 . Let α+ (t) := α0 (t) if α0 (t) is ≥ 0 and 0 otherwise. Similarly, α− (t) := −α0 (t) if α0 (t) < 0 and 0 otherwise. Do the same for β0 (t) and γ0 (t). After all these preparations set type I type II α(t) β(t) γ(t) α(t) β(t) γ(t) α+ (t) + γ− (t) β+ (t) + α− (t) γ+ (t) + β− (t) α+ (t) + β− (t) + γ− (t) β+ (t) γ+ (t) + α− (t) Theorem 2.29. For t = (t1 , t2 , t3 ) ∈ [0, ∞)3 we have Ç Ç λ2 α(t) β(t) γ(t) d , , δ µ(t) = · Q(t1 , t2 , t3 ) + 4 4d λ λ λ åå2 . Proof. Since both sides multiply by p2 , when t is replaced by pt and since rationals of the form nλ are dense in [0, ∞), it suffices to prove the statement for t = λ · (a, b, c) with pi natural numbers a, b, c. Therefore we have to show Ç Ç d · λ2 λ2 α(t) β(t) γ(t) µ(λ · (a, b, c)) = · Q(a, b, c) + , , δ 4 4d λ λ λ åå2 . Consider the ideal J := (xaλ , ybλ , zcλ ) of C. By Theorem 1.21 we have eHK (J,C) = eHK (JB, B) λ2 and eHK (J,C) = eHK (JB0 , B0 ) . d This yields λ2 λ2 · eHK (JB0 , B0 ) = · dimk (B0 /JB0 ), d d since B0 is regular (cf. [WY00, 1.4]). If F is of type I, we have eHK (JB, B) = JB0 = ((Rb3 S b2 )a , (S c1 T c3 )b , (Ra1 T a2 )c ). By Proposition 2.12 (ii) we have syzgap((Rb3 S b2 )a , (S c1 T c3 )b , (Ra1 T a2 )c ) = syzgap(Rab3 S ab2 −bc1 , T bc3 , Rca1 T ca2 ) = syzgap(S ab2 −bc1 , T bc3 , Rca1 −ab3 T ca2 ) = syzgap(S ab2 −bc1 , T bc3 −ca2 , Rca1 −ab3 ) Ç å α(t) β(t) γ(t) , , . =δ λ λ λ Note that we made some assumptions in this computation, for example ab2 ≥ bc1 in the first equality. We defined α, β and γ such that all cases that might appear in the above 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION 64 computation end up in δ Ä α(t) β(t) γ(t) λ , λ , λ ä . By Proposition 2.10 (ii) we have ä 1 Ä · Q(ad, bd, cd) + δ(ab2 − bc1 , bc3 − ca2 , ca1 − ab3 )2 4 Ç Ç åå ! α(t) β(t) γ(t) 2 1 2 = · d · Q(a, b, c) + δ , , . 4 λ λ λ dimk (B0 /JB0 ) = Multiplying by λd gives the result. If F is of type II we have 2 JB0 = (Rac3 −ab3 S ac2 T ab3 , S bd , Rcb1 T cd−cb1 ) and syzgap(JB0 ) = syzgap(Rac3 −ab3 S ac2 T ab3 , S bd , Rcb1 T cd−cb1 ) = syzgap(Rac3 −ab3 T ab3 , S bd−ac2 , Rcb1 T cd−cb1 ) = syzgap(Rac3 −ab3 , S bd−ac2 , Rcb1 T cd−cb1 −ab3 ) = syzgap(Rac3 −ab3 −cb1 , S bd−ac2 , T cd−cb1 −ab3 ) Ç å α(t) β(t) γ(t) =δ , , . λ λ λ As in the case where F is of type I we treated only one of the possible cases. Again all other cases end up in the same result by definition of α, β and γ. By Proposition 2.10 (ii) we have ä 1 Ä · Q(ad, bd, cd) + δ(ac3 − ab3 − cb1 , bd − ac2 , cd − cb1 − ab3 )2 4 Ç Ç åå ! 1 α(t) β(t) γ(t) 2 2 = · d · Q(a, b, c) + δ , , . 4 λ λ λ dimk (B0 /JB0 ) = λ2 d Multiplying by  gives the result. We obtain [Mon06a, Theorem 2.3] as a corollary. Corollary 2.30. Ç 3d λ2 (a1 + b2 − d)s (a1 + c3 − d)s (b2 + c3 − d)s µ(s, s, s) = s2 + δ , , 4 4d λ λ λ å2 . With t = (a, b, c) ∈ N3 in Theorem 2.29 one obtains Corollary 2.31. eHK ÄÄ ä ä Ç Ç d λ2 α(a, b, c) β(a, b, c) γ(a, b, c) X , Y , Z , k[X, Y, Z]/(F) = · Q(a, b, c)+ δ , , 4 4d λ λ λ a b c Remark 2.32. An explicit implementation of Corollary 2.31 is given in Appendix A. åå2 . 2.2. HAN’S δ FUNCTION 65 Corollary 2.33. Let N be the normalization of the projective curve V+ (F). Then the pull-back of SyzV+ (F) (X a , Y b , Z c ) to N is strongly semistable if and only if å Ç α(a, b, c) β(a, b, c) γ(a, b, c) , , = 0. δ λ λ λ Proof. By Theorem 1.80 the pull-back of SyzV+ (F) (X a , Y b , Z c ) to the normalization N is strongly semistable if and only if ÄÄ ä ä d (a + b + c)2 − a2 − b2 − c2 eHK X , Y , Z , k[X, Y, Z]/(F) = · 2 2 d = · Q(a, b, c). 4 The claim follows by comparing this Hilbert-Kunz multiplicity with Corollary 2.31. a b c !  Remark 2.34. Let R = k[U, V, W]/( f ) be positively-graded, such that the image F of f under the map k[U, V, W] −→ k[X, Y, Z], where U, V, W are mapped to X deg(U) , Y deg(V) , Z deg(W) becomes of type I or II. In this situation we can compute eHK ÄÄ ä ä X deg(U) , Y deg(V) , Z deg(W) , k[X, Y, Z]/(F) with Corollary 2.31. By Theorem 1.21 we have to divide this number by the degree of the extension Q(S ) : Q(R) to get eHK (R). This degree is nothing else but the product deg(U) · deg(V) · deg(W). In the next section we will use this remark to discuss the behaviour of the Hilbert-Kunz multiplicity, when one exponent in f tends to infinity and the others are constant. Definition 2.35. With the notations from the previous remark, we call the quasi-homogeneous trinomial f regular if the homogeneous trinomial F is regular. In [Han91, Theorem 2.30], Han computed the Hilbert-Kunz multiplicity of diagonal hypersurfaces of dimension two. In view of the last remark, we can compute them using Theorem 2.29. Corollary 2.36. The Hilbert-Kunz multiplicity of k[U, V, W]/(U d1 + V d2 + W d3 ) equals Ç 1 d1 d2 d1 d3 d2 d3 1 1 1 · 2d1 + 2d2 + 2d3 − − − + d1 d2 d3 · δ , , 4 d3 d2 d1 d1 d2 d3 Moreover, if the 1 di å2 ! . do not satisfy the strict triangle inequality, this is min {d1 , d2 , d3 }. Proof. The second statement is clear from the first. Let deg(U) = d2 d3 , deg(V) = d1 d3 and deg(W) = d1 d2 . Then we get d = d1 d2 d3 , α = d1 d22 d32 , β = d12 d2 d32 , γ = d12 d22 d3 and λ = d12 d22 d32 . Dividing eHK ÄÄ ä Ä X d2 d3 , Y d1 d3 , Z d1 d2 , k[X, Y, Z]/ X d + Y d + Z d by deg(U) · deg(V) · deg(W) = d12 d22 d32 , we get the result. ää  Definition 2.37. For any P, Q ∈ N \ {0, 1}, we say that k[U, V, W]/(U P + V Q + UVW) has a singularity of type T PQ∞ . 66 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION Example 2.38. We compute the Hilbert-Kunz multiplicities of R := k[U, V, W]/( f ) of type ADE and T PQ∞ . We will denote the degrees of U, V, W and f by a, b, c and d. An : Since we need a trinomial, we use f := U n+1 + V 2 + W 2 in this computation, hence we have to restrict to odd characteristics. The arguments of δ in Corollary 1 . It is easy to see δ = 0 if p is odd. This gives 2.36 are 12 , 12 and n+1 Ç å 1 4 1 eHK (R) = 2n + 10 − 2(n + 1) − = 2− . 4 n+1 n+1 Dn : Let f = U 2 + V n−1 + VW 2 with n ≥ 4 and a = n − 1, b = 2, c = n − 2. Then d = 2n − 2, F = X 2n−2 + Y 2n−2 + Y 2 Z 2n−4 , λ = 4(n − 1)(n − 2), α = 2(n − 1)(n − 2), β = 2(n − 1) and γ = 2(n − 1)(n − 2). The arguments of δ in Corollary 2.31 are 1 1 1 2 , 2(n−2) , 2 , hence δ = 0 as above (provided p is odd). We get Ä ä 2 · ((n − 1)(n − 2) + 2(2n − 3)) − ((n − 2)2 + 22 + (n − 1)2 ) eHK (R) = 2(n − 1)(n − 2) 1 . = 2− 4(n − 2) 2n−2 4   1 1 If p = 2, we have δ 21 , 2(n−2) , 12 = 2·(n−2) and eHK (R) = 2. 2 3 4 E6 : Let f = U + V + W . By Corollary 2.36 and Example 2.19 we get Ç 1 1 1 1 3 8 eHK (R) = 18 − − + 24 · δ , , 4 2 3 2 3 4 å2 ! = 2− 1 , 24 1 if p ≥ 5. If p ≤ 3, we have δ = 12 and eHK (R) = 2. 2 3 3 E7 : Let f = U + V + VW , a = 9, b = 6, c = 4 and d = 18. Then F = X 18 + Y 18 + Y 6 Z 12 , α = 6 · 18, β = 3 · 18, γ = 4 · 18 and λ = 12 · 18. The arguments of δ are 1 1 1 2 , 3 , 4 . By Example 2.19 we get δ = 0 if p ≥ 5 and eHK (R) = 18 4 Ä ä 2 · (9 · 6 + 9 · 4 + 6 · 4) − (92 + 62 + 42 ) 1 = 2− . 9·6·4 48 1 If p ≤ 3, we have δ = 12 and eHK (R) = 2. 2 3 5 E8 : Let f = U + V + W . By Corollary 2.36 and Example 2.19 for p ≥ 7 we get Ç 1 6 10 15 1 1 1 eHK (R) = 20 − − − + 30 · δ , , 4 5 3 2 2 3 5 å2 ! = 2− 1 . 120 1 If p ≤ 5, one gets δ = 30 and eHK (R) = 2. P Q T PQ∞ : Let f = U + V + UVW, a = Q, b = P, c = PQ − P − Q and d = PQ. To get c ≥ 1, we assume P + Q > 4. Then F = X PQ + Y PQ + X Q Y P Z PQ−P−Q , α = (Q − 2)PQ, β = (P − 2)PQ, γ = λ = (PQ − P − Q)PQ. Because (P − 2)(Q − 2) ≥ 0 ⇐⇒ P−2 Q−2 + ≤ 1, PQ − P − Q PQ − P − Q 2.3. THE BEHAVIOUR OF THE HILBERT-KUNZ MULTIPLICITY IN FAMILIES 67 we see that the arguments of δ do not satisfy the strict triangle inequality and hence eHK (R) = P+Q−4 3P2 Q2 − 4P2 Q − 4PQ2 + 4PQ = 3− PQ(PQ − P − Q) PQ − P − Q in all characteristics. Since 4 < P + Q and interval [2, 3) ∩ Q. P+Q−4 PQ−P−Q ≤ 1, this number is in the The computations in the ADE situation recover Theorem 1.26 with one exception: To compute the Hilbert-Kunz multiplicity of a surface ring of type An we had to restrict to odd characteristics, which is not necessary in Theorem 1.26 if n + 1 is odd. We always assumed that F is regular, meaning that all singularities of V+ (F) have multiplicity strictly smaller than d2 . The Hilbert-Kunz multiplicity of an irregular trinomial was computed by Trivedi in [Tri05b, Theorem 1.3]. Theorem 2.39 (Trivedi). Let C be a singular irreducible plane curve of degree d defined over an algebraically closed field of characteristic p > 0. Assume that C has a singular point of multiplicity r ≥ d2 . Let R be the homogeneous coordinate ring of C. Then eHK (R) = 3d (2r − d)2 + . 4 4d 2.3. The behaviour of the Hilbert-Kunz multiplicity in families of surface rings given by certain quasi-homogeneous trinomials In this section we want to apply Theorem 2.29 to study the behaviour of the Hilbert-Kunz multiplicity in families of surface rings defined by irreducible, regular, quasi-homogeneous trinomials (IRQT for short). To be more precise we study the Hilbert-Kunz multiplicity of rings R := k[U, V, W]/(F), where F is a trinomial of the type U a1 V a2 + V b2 W b3 + U c1 W c3 or U a1 + U b1 V b2 W b3 + V c2 W c3 , homogeneous of degree d with respect to some positive grading deg(U) = a, deg(V) = b, deg(W) = c and regular in the sense of Definition 2.37. Now we are interested in the behaviour of the Hilbert-Kunz multiplicity of R, when a1 , b2 or c3 grows. Definition 2.40. With the notations above let F1 (a2 , b1 , b3 , c2 , c3 ) be the family of IRQT of the form U L V a2 + V b2 W b3 + U c1 W c3 , FU (b1 , b2 , b3 , c2 , c3 ) be the family of IRQT of the form U L + U b1 V b2 W b3 + V c2 W c3 , FV (a1 , b1 , b3 , c2 , c3 ) be the family of IRQT of the form U a1 + U b1 V L W b3 + V c2 W c3 , FW (a1 , b1 , b2 , b3 , c2 ) be the family of IRQT of the form U a1 + U b1 V b2 W b3 + V c2 W L . We will write F1 , FU , FV , FW for short. In what follows, we will always assume that the arguments of δ in Corollary 2.31 do not satisfy the strict triangle inequality for L large enough. 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION 68 2.3.1. The family F1 . The trinomials U L V a2 + V b2 W b3 + U c1 W c3 are quasi-homogeneous in the grading a = b2 c3 − a2 c3 + a2 b3 b = (c3 − b3 )L + b3 c1 c = b2 L − b2 c1 + a2 c1 of degree d = b2 c3 L + a2 b3 c1 . Note that b2 > a2 and c3 > b3 give a, b > 0. Assume L > c1 to get c > 0. The regularity conditions aL, bb2 , cc3 > d/2 translate for large L to b2 c3 > 2a2 (c3 − b3 ) and c3 > 2b3 . We have (recall Definition 2.28) α0 = ad − acb3 − abc1 = ab(b2 − c1 ), β = bd − bca2 − abc1 = bc(c3 − a2 ), γ = cd − acb3 − bca2 = ac(L − b3 ). 0 0 Since γ0 is a degree two polynomial in L with leading coefficient (b2 −a2 )b2 c3 +a2 b2 b3 > 0 and α0 depends linearly on L, we get γ0 > 0 and α0 < γ0 for large L. α0 + + − − β0 + − + − α β γ α0 β0 γ0 α0 0 γ0 − β0 0 0 0 β −α γ0 0 −α0 γ0 − β0 δ·λ γ0 − α0 − β0 or β0 − α0 − γ0 γ0 − α0 − β0 or β0 − α0 − γ0 γ0 + α0 − β0 or β0 − α0 − γ0 γ0 + α0 − β0 or β0 − α0 − γ0 . Table 2.1. The table shows the possible values of δ · λ depending the signs of α0 , β0 . According to Table 2.1 the value of δ · λ in Theorem 2.29 has the shape γ0 − β0 − α0 or ±(β0 − γ0 − α0 ). In the first case we have δ · λ = cd − bd − ad + 2abc1 , which gives the Hilbert-Kunz multiplicity d · (2ab + 2ac + 2bc − a2 − b2 − c2 ) (cd − bd − ad + 2abc1 )2 + 4abc 4abcd 2 d abc1 c1 = + + · (c − b − a) c cd c d − ac1 abc21 bc1 = c1 + + − c cd c b3 − c3 b3 c21 a = c1 + c3 + c1 − . b2 b2 d eHK (R) = 2.3. THE BEHAVIOUR OF THE HILBERT-KUNZ MULTIPLICITY IN FAMILIES 69 In this case L occurs only in d, hence the Hilbert-Kunz multiplicity is increasing in L and 3 . tends to c1 + c3 + c1 b3b−c 2 Similarly, in the second case we have δ · λ = ±(bd − cd − ad + 2acb3 ) and a d + b3 (b − c) acb23 − adb3 + = b2 + b3 − b2 b3 . b bd d Here the Hilbert-Kunz multiplicity is increasing in L and tends to b2 + b3 . By the symmetry of the problem we get in the case b2 = L: b eHK (R) = c1 + c3 − c1 c3 in the cases λ · δ = ±(γ0 − β0 − α0 ) d c1 − a1 a22 c1 b − in the case λ · δ = α0 − β0 − γ0 eHK (R) = a1 + a2 + a2 c3 c3 d and in the case c3 = L: c eHK (R) = a1 + a2 − a1 a2 in the cases λ · δ = ±(α0 − β0 − γ0 ) d a2 − b2 a2 b23 c − in the case λ · δ = β0 − α0 − γ0 . eHK (R) = b2 + b3 + b3 a1 a1 d eHK (R) = Example 2.41. Consider the family (U L + V d2 + W d3 )L0 of polynomials defining diagonal hypersurfaces with d2 , d3 . The above computations show Äthat their ÄHilbert-Kunz ää multiplicity tends to min(d2 , d3 ) for L → ∞. This is exactly eHK k[V, W]/ V d2 + W d3 . We cannot apply the above computation in the case d2 = d3 , since then the triple L1 , d12 , d12 always satisfies the strict triangle inequality. Next, we prove that the limits for L → ∞ above appear as the Hilbert-Kunz multiplicity of a binomial hypersurface attached to the family F1 . Definition 2.42. We set limL→∞ F1 := V b2 W b3 + U c1 W c3 = W b3 (V b2 + U c1 W c3 −b3 ). Remark 2.43. By Theorem 1.8 (ii) and Remark 1.6 we have  c b3 −c3 1 + c3 + c1 b2 eHK k[U, V, W]/(W b3 · (V b2 + U c1 W c3 −b3 ) =  b2 + b3 Ä ä if c1 , c3 − b3 < b2 , otherwise. Lemma 2.44. We obtain the following limit behaviour of the Hilbert-Kunz multiplicity in the family F1 Ä ä Å ã lim eHK k[U, V, W]/(U V + V W + U W ) = eHK lim F1 . L a2 b2 b3 c1 c3 L→∞ L→∞ Proof. Since the two possible values for eHK (limL→∞ F1 ) coincide in the cases c1 = b2 and c3 − b3 = b2 , we may assume that both equations do not hold. Then we only have to show the equivalence δ · λ = γ0 − α0 − β0 ⇔ c1 , c3 − b3 < b2 . By Table 2.1 the condition δ · λ = γ0 − α0 − β0 is equivalent to the conditions that α0 and the leading coefficient of γ0 − β0 are positive. Now, the condition α0 > 0 gives b2 > c1 and LC(γ0 − β0 ) = b2 c3 (b2 + b3 − c3 ) > 0 gives b2 > c3 − b3 .  2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION 70 2.3.2. The family FU . The trinomials U L + U b1 V b2 W b3 + V c2 W c3 are quasi-homogeneous in the grading a = b2 c3 − b3 c2 b = (c3 − b3 )L − c3 b1 c = (b2 − c2 )L + b1 c2 of degree d = aL. Since c3 > b3 and b2 > c2 the degrees are positive. In this case the regularity conditions aL, bb2 , cc3 > d/2 translate to the condition b2 c3 + b3 c2 > max(2b2 b3 , 2c2 c3 ) for large values of L. We have α0 = ad − ac(b1 + b3 ) − abc2 , β0 = bd − abc2 , γ0 = cd − ac(b1 + b3 ). In this case β0 and γ0 are polynomials in L of degree two with positive leading coefficients and α0 depends linearly on L. Therefore we may assume L to be big enough such that β0 , γ0 ≥ 0 and α0 < β0 , γ0 . α0 + − α β γ α0 β0 γ0 0 β0 γ0 − α0 δ·λ γ0 − α0 − β0 or β0 − α0 − γ0 γ0 − α0 − β0 or − γ0 + α0 + β0 . Table 2.2. The table shows the possible values of δ · λ depending the sign of α0 . Thus, δ · λ has the shape ±(γ0 − β0 − α0 ) or β0 − γ0 − α0 . In the first case we have δ · λ = ±(cd − bd − ad + 2abc2 ), which gives the Hilbert-Kunz multiplicity d + c2 (c − b) abc22 − adc2 a + = c2 + c3 − c2 c3 . c cd d This is an increasing function in L, tending to c2 + c3 . Similarly, in the second case we have δ · λ = bd − cd − ad + 2ac(b1 + b3 ), which gives the Hilbert-Kunz multiplicity eHK (R) = d + (b1 + b3 )(b − c) ac(b1 + b3 )2 − ad(b1 + b3 ) + b bd 2 c2 − b2 b1 c3 c2 − b2 (b1 + b3 )2 b1 c2 ab3 + b21 c2 = b1 + b2 + b3 + b1 + + (b2 − c2 + )− . c 3 − b3 b c3 − b3 b L b eHK (R) = 2.3. THE BEHAVIOUR OF THE HILBERT-KUNZ MULTIPLICITY IN FAMILIES 71 −b2 . This function tends to b1 + b2 + b3 + b1 cc32 −b 3 Example 2.45. Consider the family (U L + UVW + W Q )L0 of T LQ∞ singularities. Since α = (Q − 2)LQ, β = (Q2 − Q)L2 − Q2 L and γ = (L − 2)LQ, we are in the second case above and see that the Hilbert-Kunz multiplicity is given by Ç 1 1 3− + 3−Q− Q−1 Q−1 å 1 . LQ − L − Q In particular, the Hilbert-Kunz multiplicity is constant for Q = 2 and strictly increasing in the cases Q ≥ 3. One question concerning the behaviour of the Hilbert-Kunz multiplicity as a function in L is left. Question 2.46. Assume that we are in the case δ · λ = bd − cd − ad + 2ac(b1 + b3 ). Are there Hilbert-Kunz functions that are (strictly) decreasing as functions in L? As in the case of the family F1 , the limit of the Hilbert-Kunz multiplicity for L → ∞ appears as Hilbert-Kunz multiplicity of an attached binomial hypersurface. Definition 2.47. Let limL→∞ FU := U b1 V b2 W b3 + V c2 W c3 = V c2 W b3 (U b1 V b2 −c2 + W c3 −b3 ). Remark 2.48. By Theorem 1.8 (ii) and Remark 1.6 we have Ä ä eHK k[U, V, W]/(V c2 W b3 · (U b1 V b2 −c2 + W c3 −b3 ))  b = c2 −b2 1 + b2 + b3 + b1 c3 −b3 c2 + c3 if b1 , b2 − c2 < c3 − b3 , otherwise. Lemma 2.49. The limit behaviour of the Hilbert-Kunz multiplicity in the family FU is given by Ä ä Å ã lim eHK k[U, V, W]/(U L + U b1 V b2 W b3 + V c2 W c3 ) = eHK lim FU . L→∞ L→∞ Proof. Since the two possible values of eHK (limL→∞ FU ) coincide in the cases b1 = c3 − b3 and b2 − c2 = c3 − b3 , we may assume that both equalities do not hold. According to Table 2.2 we have δ · λ = β0 − α0 − γ0 ⇔ α0 > 0 and max{β0 , γ0 } = β0 . The condition α0 > 0 is equivalent to b1 < c3 − b3 and the condition max{β0 , γ0 } = β0 is equivalent to the positivity of the leading coefficient of β0 − γ0 = a · (c2 + c3 − b2 − b3 )L2 + O(L).  2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION 72 2.3.3. The family FV . The trinomials U a1 + U b1 V L W b3 + V c2 W c3 are quasi-homogeneous in the grading a = c3 L − b3 c2 b = a1 c3 − a1 b3 − b1 c3 c = a1 L − a1 c2 + b1 c2 of degree d = aa1 . For L > c2 we get positive values for a and c. The condition b > 0 is non-trivial. For large L we get the condition (∗) a1 c3 > 2(a1 b3 + b1 c3 ) to get a regular polynomial. We have α0 = ad − ac(b1 + b3 ) − abc2 , β0 = bd − abc2 , γ0 = cd − ac(b1 + b3 ). In this case β0 depends only linearly on L and α0 , γ0 are O(L2 ). α0 + + + + − − − − β0 γ0 + + + − − + − − + + + − − + − − α α0 0 α − γ0 α0 − β 0 0 α − β0 − γ 0 0 −γ0 −β0 −β0 − γ0 β γ 0 β γ0 0 β 0 0 γ0 0 0 0 0 β γ − α0 β0 −α0 0 γ0 − α0 0 −α0 δ·λ or γ0 − α0 − β0 0 0 0 α − β − γ or β0 − α0 + γ0 α0 − β0 − γ0 or γ0 − α0 + β0 α0 − β0 − γ0 α0 + β0 − γ0 or γ0 − α0 − β0 α0 − β0 − γ0 or γ0 − α0 − β0 α0 − β0 − γ0 or γ0 − α0 + β0 α0 − β0 − γ0 or γ0 − α0 + β0 . α0 − β0 − γ0 Table 2.3. The table shows the possible values of δ · λ depending the signs of α0 , β0 , γ0 . As we can read off Table 2.3 the product δ · λ has always the shape ±(γ0 − β0 − α0 ) or ±(α0 − γ0 − β0 ). In the first case we have δ · λ = ±(cd − bd − ad + 2abc2 ). This gives the constant Hilbert-Kunz multiplicity d + c2 (c − a) abc22 − bdc2 c2 c3 + = c2 + c3 − . c cd a1 Similarly, in the second case we have δ · λ = ±(ad − cd − bd), which gives the constant Hilbert-Kunz multiplicity d eHK (R) = = a1 . a eHK (R) = 2.3. THE BEHAVIOUR OF THE HILBERT-KUNZ MULTIPLICITY IN FAMILIES 73 Definition 2.50. Let limL→∞ FV := U a1 + V c2 W c3 . Remark 2.51. By Theorem 1.8 (ii) and Remark 1.6 we have  c + c − c2 c3  2 3 a1 eHK k[U, V, W]/(U a1 + V c2 W c3 ) =  a1 if c2 , c3 < a1 , otherwise. Lemma 2.52. The limit behaviour of the Hilbert-Kunz multiplicity in the family FV is given by Ä ä ã Å lim eHK k[U, V, W]/(U + U V W + V W ) = eHK lim FV . b1 a1 L b3 c2 c3 L→∞ L→∞ Proof. We may assume c2 , c3 , a1 . Then Table 2.3 shows that δ · λ = ±(γ0 − α0 − β0 ) is equivalent to β0 > 0 and LC(γ0 − α0 ) > 0. The condition β0 > 0 gives a1 > c2 and LC(γ0 − α0 ) > 0 gives a1 > c3 .  2.3.4. The family FW . The trinomials U a1 + U b1 V b2 W b3 + V c2 W L are quasi-homogeneous in the grading a = b2 L − b3 c2 b = (a1 − b1 )L − a1 b3 c = (b2 − c2 )a1 + b1 c2 of degree d = aa1 . The inequalities a1 > b1 and b2 > c2 give b, c > 0. Assume L > b3 to get a positive. The regularity conditions give for large L the following conditions on the exponents a1 > 2b1 and a1 b2 > 2c2 (a1 − b1 ). We have α0 = ad − ac(b1 + b3 ) − abc2 , β0 = bd − abc2 , γ0 = cd − ac(b1 + b3 ). At first we note that the equivalence α0 < 0 ⇐⇒ c < 0 gives α0 ≥ 0. In this case γ0 depends linearly on L and α0 , β0 are polynomials in L of degree two. 74 2. EXAMPLES OF HILBERT-KUNZ FUNCTIONS AND HAN’S δ FUNCTION β0 γ0 + + + − − + − − α β γ 0 α β0 γ0 0 0 α −γ β0 0 α0 − β 0 0 γ0 0 0 0 α −β −γ 0 0 δ·λ or β0 − α0 − γ0 0 0 0 α − β − γ or β0 − α0 + γ0 α0 − β0 − γ0 or γ0 − α0 + β0 α0 − β0 − γ0 . α0 − β0 − γ0 Table 2.4. The table shows the possible values of δ · λ depending the signs of β0 , γ0 . Therefore δ · λ has the shape β0 − α0 − γ0 or ±(α0 − β0 − γ0 ). In the first case we have δ · λ = bd − cd − ad + 2ac(b1 + b3 ), giving d + (b1 + b3 )(b − a) ac(b1 + b3 )2 − cd(b1 + b3 ) + b bd Ç å b2 b3 1 a1 b2 b3 b1 c + b3 c = b1 + b2 + b3 − + (a1 − b1 − b3 ) − b3 c2 − a1 − b1 b a1 − b1 a1 Ç å b2 b3 1 b1 c2 b1 b2 = b1 + b2 + b3 − + (a1 − b1 − b3 )2 − a1 − b1 b a1 a1 − b1 eHK (R) = b3 as Hilbert-Kunz multiplicity. It tends to b1 + b2 + b3 − ab12−b . Treating eHK (R) as a function 1 in L, it is either constant or strictly increasing. It cannot be strictly decreasing, since b2 would have to be negative, which is equivalent to −b1 c2 ≥ then the term ba1 1c2 − ab11−b 1 a1 · (b2 − c2 ) > 0. In the second case we have δ · λ = ±(ad − cd − bd) and get the constant Hilbert-Kunz multiplicity d eHK (R) = = a1 . a We give two examples showing that both possibilities, eHK (R) constant or strictly inreasing in L, appear in the case δ · λ = β0 − α0 − γ0 . Example 2.53. With F := U 5 + UV 3 + W L we have a = 3L, b = 4L, c = 15 and d = 15L. Since α0 = 45L2 − 45L, β0 = 60L2 and γ0 = 180L, we have β0 − α0 − γ0 ≥ 0 for L ≥ 15, hence we are in the first case of the above computation and the Hilbert-Kunz multiplicity of R is given by Ç å 1 2 3 3 eHK (R) = 4 + ·4 · − = 4− , 4L 4 L which is strictly increasing in L. Example 2.54. Now consider F := U 5 + UV 3 W 4 + W L . In this case we have a = 3L, b = 4L − 20, c = 15 and d = 15L. This gives α0 = 45L2 − 225L, β0 = 60L2 − 300L and γ0 = 0. Therefore β0 − α0 − γ0 ≥ 0 for L ≥ 5 and we are again in the first case of the above computation. Now, the Hilbert-Kunz multiplicity of R is given by eHK (R) = 8 − 12 = 5. 4 Definition 2.55. Let limL→∞ FW := U a1 + U b1 V b2 W b3 = U b1 (U a1 −b1 + V b2 W b3 ). 2.3. THE BEHAVIOUR OF THE HILBERT-KUNZ MULTIPLICITY IN FAMILIES 75 Remark 2.56. By Theorem 1.8 (ii) and Remark 1.6 we have Ä ä  b b2 b3 1 + b2 + b3 − a1 −b1 if b2 , b3 < a1 − b1 , otherwise. eHK k[U, V, W]/(U b1 · (U a1 −b1 + V b2 W b3 )) =  a1 Lemma 2.57. The limit behaviour of the Hilbert-Kunz multiplicity in the family FW is given by ä Ä Å ã lim eHK k[U, V, W]/(U a1 + U b1 V b2 W b3 + V c2 W L ) = eHK lim FW . L→∞ L→∞ Proof. We may assume b2 , b3 , a1 − b1 . According to Table 2.4 we have δ · λ = β0 − α0 − γ0 ⇔ β0 , γ0 > 0 and max{α0 , β0 } = β0 . The condition γ0 > 0 is equivalent to b3 < a1 − b1 and the condition max{α0 , β0 } = β0 is equivalent to the positivity of the leading coefficient of β0 − α0 = a1 · (b1 + b2 − a1 )L2 + O(L).  The results in this section lead to the following questions. Question 2.58. What do the limits of the Hilbert-Kunz multiplicities tell us about the families of singularities? Question 2.59. Fix F ∈ k[X1 , . . . , Xn ] and a1 , . . . , an−1 ∈ N. Under which conditions does the equality Ä Ä an−1 L Xn lim eHK k[X1 , . . . , Xn ]/ F + X1a1 · . . . · Xn−1 ää L→∞ = eHK (k[X1 , . . . , Xn ]/(F)) hold? Does it even hold for the Hilbert-Kunz functions? Examples for which the limit behaviour holds for the Hilbert-Kunz functions are the diagonal hypersurfaces Rl,m := k[X, Y, Z]/(X 2 + Y l + Z m ) with 21 + 1l + m1 ≤ 1. For those we have the equality lim HK(Rl,m ) = HK(k[X, Y, Z]/(X 2 + Y l )). m→∞ Further examples for which the limit behaviour from the question holds for the HilbertKunz functions are given in Sections two and three of Chapter seven. CHAPTER 3 Matrix factorizations and representations as first syzygy modules of ideals In this chapter we want to introduce the theory of matrix factorizations, their connection to maximal Cohen-Macaulay modules over hypersurfaces and explain how one gets with their help isomorphisms of maximal Cohen-Macaulay modules with "nice" first syzygy modules of ideals. 3.1. Properties of maximal Cohen-Macaulay modules In this section we state some important properties of maximal Cohen-Macaulay modules. Definition 3.1. Let R be a ring and M a finitely generated R-module. We call M a maximal Cohen-Macaulay R-module, if M = 0 or depthRm (Mm ) = dim(Mm ) = dim(Rm ) holds for all maximal ideals m of R. We say that R is Cohen-Macaulay if R is maximal Cohen-Macaulay as an R-module. Remark 3.2. An equivalent definition of the maximal Cohen-Macaulay property using Grothendieck’s vanishing theorem (cf. [BH98, Theorem 3.5.7]) is that HimRm (Mm ) = 0 holds for all 0 ≤ i ≤ dim(Rm ) − 1 and all maximal ideals m of R. Example 3.3. We give some examples. (i) If dim(R) = 0, we have 0 ≤ depthRm (Mm ) ≤ dim(Rm ) = 0 for all m ∈ Spec(R), giving that every finitely generated R-module is maximal Cohen-Macaulay. (ii) Regular rings are Cohen-Macaulay and every maximal Cohen-Macaulay Rmodule M is free, since Mm has finite projective dimension and this is proj. dimRm (Mm ) = depthRm (Rm ) − depthRm (Mm ) = 0 by the Auslander-Buchsbaum formula. (iii) If (R, m) has dimension one and at least one non-zero divisor, then a finitely generated R-module M is maximal Cohen-Macaulay if and only if it is torsionfree. That is because m and all its powers contain a non-zero divisor, giving the inclusion H0m (M) ⊆ T(M), where T(M) denotes the torsion-submodule of M. For the other inclusion, note that T(M) is Artinian because R is one-dimensional, hence T(M) = H0m (T(M)) ⊆ H0m (M). 77 78 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES Definition 3.4. Let (R, m) be a Cohen-Macaulay local ring. We say that R has an isolated singularity if Rp is regular for all p ∈ Spec(R) \ {m}. We can characterize the property of having an isolated singularity by the structure of the maximal Cohen-Macaulay modules. Lemma 3.5. Let (R, m) be a Cohen-Macaulay local ring. The following are equivalent. (i) The ring R has an isolated singularity. (ii) All maximal Cohen-Macaulay R-modules are locally free on the punctured spectrum of R. Proof. The implication (i) ⇒ (ii) is clear since the property maximal Cohen-Macaulay localizes (cf. [BH98, Theorem 2.1.2]). See [Yos90, Lemma 3.3] for the converse.  Maximal Cohen-Macaulay modules appear in a natural way as kernels in free resolutions as the following proposition shows. Proposition 3.6. Let (R, m) be a Cohen-Macaulay ring and Fn−1 → Fn−2 → . . . → F1 → F0 an exact sequence of free R-modules. If n ≥ dim(R), then ker(Fn−1 → Fn−2 ) is maximal Cohen-Macaulay. Proof. See [Yos90, Proposition 1.4].  Definition 3.7. Let R be a ring and M an R-module. Let M ∨ := HomR (M, R). The module M ∨∨ is called the reflexive hull of M. We say that M is reflexive if the natural map M −→ M ∨∨ m 7−→ evm is an isomorphism. Note that reflexive hulls are torsion-free, since HomR (M, N) is torsion-free if N is. They appear for example as modules of sections of certain sheaves over the punctured spectrum. We give the precise statement. Lemma 3.8. Let (R, m) be a reduced, two-dimensional Cohen-Macaulay ring. Let M be a f the O finitely generated, torsion-free R-module. We denote by M Spec(R) -module associated to M and we set U := Spec(R) \ {m}. If R is Gorenstein in codimension one, we have the isomorphism f )  M ∨∨ . Γ(U, M| U Proof. See Propositions 3.7 and 3.10 of [BD08].  Lemma 3.9. Let (R, m) be a reduced, two-dimensional Cohen-Macaulay ring which is Gorenstein in codimension one. Then kernels of maps between finitely generated reflexive modules are again reflexive. 3.1. PROPERTIES OF MAXIMAL COHEN-MACAULAY MODULES 79 Proof. Let 0 → K → M1 → M2 be an exact sequence of finitely generated R-modules with M1 and M2 reflexive. From this sequence, we obtain the commutative diagram / 0 / K  0 / ‹ ) Γ(U, K |U / M1  / Γ(U, g M1|U ) M2   / Γ(U, g M2|U ), ‹ )  K ∨∨ , since K - as a submodule of a which induces an isomorphism K  Γ(U, K |U torsion-free module - is itself torsion-free.  Our next goal is to show that for a two-dimensional normal domain maximal CohenMacaulay is equivalent to reflexive. For this we will need the following proposition. Proposition 3.10. Let R be a ring and M a finitely generated R-module. Then M is reflexive if and only if (i) Mp is reflexive for all p ∈ Spec(R) with depthRp (Rp ) ≤ 1 and (ii) depthRp (Mp ) ≥ 2 for all p ∈ Spec(R) with depthRp (Rp ) ≥ 2. Proof. See [BH98, Proposition 1.4.1].  Theorem 3.11. Let R be a two-dimensional normal domain and M a finitely generated R-module. Then M is maximal Cohen-Macaulay if and only if it is reflexive. Proof. We give the proof of [Kar09, Proposition 1.28]. First assume that M is maximal Cohen-Macaulay. Then M satisfies condition (ii) of Proposition 3.10. Since R is normal, we have depthRp (Rp ) ≤ 1, whenever dim(Rp ) ≤ 1 by Serre’s criterion. Since Rp is regular for those primes, the localization Mp is free, hence reflexive. Note that this part of the proof does not need the condition dim(R) = 2. For the contrary, let M be reflexive. Then, since R is normal, by condition (ii) of Proposition 3.10, the modules Mp are maximal Cohen-Macaulay for all p ∈ Spec(R) such that dim(Rp ) = 2. The modules Mp for dim(Rp ) = 0 are of course maximal Cohen-Macaulay. For the primes p with dim(Rp ) = 1, the modules Mp are reflexive, hence torsion-free, hence maximal Cohen-Macaulay.  Definition 3.12. Let R be a ring. We say that R is of finite Cohen-Macaulay type if there are only finitely many isomorphism classes of indecomposable, maximal CohenMacaulay modules. 3.1.1. Maximal Cohen-Macaulay modules and Hilbert-Kunz theory. Theorem 3.13 (Seibert). Let (R, m, k) be a local ring of dimension d and characteristic p > 0. Assume that R is of finite Cohen-Macaulay type and that R p is a finite R-module. (i) If R is Cohen-Macaulay, then eHK (R) ∈ Q. (ii) If N is maximal Cohen-Macaulay, then eHK (N) ∈ Q. Proof. See [Sei97, Theorem 4.1].  80 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES Moreover, Seibert gives an algorithm to compute the Hilbert-Kunz functions in these cases. For example he obtains HK(N, pe ) = 2pe , if e ≥ 1 for all maximal Cohen-Macaulay modules N over R := k~X, Y/(X n + Y 2 ), where n ≥ 3 is odd (cf. [Sei97, Example 5.1]) and HK(R, pe ) = 2p3e − 1, HK(K, pe ) = 2p3e + 1, HK(U, pe ) = 4p3e + 4 for all e ≥ 0, where R is the second Veronese subring of k~X, Y, Z (with char(k) > 2) and K, U are representatives for the isomorphism classes of the non-free, indecomposable, maximal Cohen-Macaulay modules with K = (XY, Y 2 , YZ)R (this is the canonical module) and Ö è XY U = K 3 /R Y 2 YZ (cf. [Sei97, Example 5.2]). Let k be an algebraically closed field of prime characteristic such that n ∈ N≥2 is invertible in k. Recall that the n-th Veronese subring R of k[X, Y] is the ring of invariants under the action X 7→ ε · X, Y 7→ ε · Y, where ε denotes a primitive n-th root of unity. The group acting on k[X, Y] is isomorphic to Z/(n). Since Z/(n) is commutative, all irreducible representations are one-dimensional and there are exactly n different equivalence classes (cf. [Dor71, Theorem 8.1]). By the correspondence between irreducible representations of the acting group and the indecomposable, maximal Cohen-Macaulay modules over the ring of invariants (cf. [LW12, Corollary 6.4]), we obtain that the n-th Veronese subring of k[X, Y] has up to isomorphism exactly n different indecomposable, maximal CohenMacaulay modules of rank one and none of higher rank. This shows that the Picard group of the punctured spectrum of R is isomorphic to Z/(n). In the next example we want to demonstrate how one can make use of the finite Cohen-Macaulay type in the application of Proposition 1.76. Example 3.14. Let S := k[X, Y] and R its n-th Veronese subring, hence R is generated as k-algebra by the monomials Zi := X i Y n−i . To compute the Hilbert-Kunz function of R, we have to control the Frobenius pull-backs of Syz(Z0 , . . . , Zn ) on the punctured spectrum of R. Since SyzR (Z0 , . . . , Zn ) is the second syzygy module of the quotient R/(Z0 , . . . , Zn ), it is maximal Cohen-Macaulay. Since this module has rank n, it has to split into n indecomposable, maximal Cohen-Macaulay modules of rank one. Our first goal is to describe these indecomposable modules as syzygy modules of two-generated monomial ideals. To compute generators for syzygy modules of monomial ideals of R, we will work over the factorial domain S as follows. Let P := SyzR (F1 , . . . , Fm ) be a syzygy module of a P monomial ideal in R and let (A1 , . . . , Am ) ∈ P. Then treat the relation A j · F j = 0 over S , meaning that we write the monomials F j in the variables X and Y. Then one can cancel P the common multiple of the F j , written in X, Y. The result is a relation A j ·G j (X, Y) = 0, where the G j ∈ S are coprime. From this relation one can compute the A j (as elements in 3.1. PROPERTIES OF MAXIMAL COHEN-MACAULAY MODULES 81 R), using the fact that k[X, Y] is factorial. Let i < j ∈ {0, . . . , n} and let (A, B) ∈ SyzR (Zi , Z j ). Then AZi + BZ j = 0 ⇔ AX i Y n−i = −BX j Y n− j ⇔ AY j−i = −BX j−i ⇔ (A, B) = C(X j−i , −Y j−i ) for some C ∈ k[X, Y]. Since A is an element in R, its degree as element in S is na for some a ∈ N. Therefore, the degree of C is na + i − j. If a ≥ 2 we see that A and B have a common factor in R, hence if (A, B) ∈ SyzR (Zi , Z j ) is of minimal degree, the degree of A ∈ S has to be n. But then the possibilities for C of minimal degree are the monomials of degree n − j + i. Hence, the R-modules SyzR (Zi , Z j ) are (minimally) generated by n − j + i + 1 elements. Explicitely, one has ÆÇ å Ç å Ç å Ç Z j−i Z Zn−1 Zn , j−i+1 , . . . , , −Z0 −Z1 −Zn− j+i−1 −Zn− j+i SyzR (Zi , Z j ) = å∏ . This shows SyzR (Zi , Z j )  SyzR (Zl , Zm ) ⇐⇒ |i − j| = |l − m|. Therefore, it is possible to distinguish the different indecomposable, maximal CohenMacaulay modules by their number of generators. Moreover, this shows that the number of generators of a maximal Cohen-Macaulay module of rank r is bounded above by n · r, since it has to split into a direct sum of r indecomposable, maximal Cohen-Macaulay modules of rank one and each of these has at most n generators. For i ∈ {0, . . . , n − 1} let {(si,1 , si+1,1 ), . . . , (si,n , si+1,n )} be a system of generators of SyzR (Zi , Zi+1 ). These give elements (0, . . . , 0, si, j , si+1, j , 0, . . . , 0) ∈ SyzR (Z0 , . . . , Zn ). We want to show that (3.1) {(0, . . . , 0, si, j , si+1, j , 0, . . . , 0)|1 ≤ j ≤ n, 0 ≤ i ≤ n − 1} generates SyzR (Z0 , . . . , Zn ). Since all si, j have degree one we have to show that the elements in (3.1) are linear independent. Assuming the contrary, there are i0 ∈ {0, . . . , n − 1}, j0 ∈ {1, . . . , n} such that  (3.2) 0 .. .    0  .   .   .    0  .   .   .               0   0   0         s   s     i0 , j0  X  i0 , j  X  ti,i   =   + , λ · j  si0 +1, j0   si0 +1, j      j, j0   i,i0 ti,i+1   0   0   0         .   .   .   .   .   .   .   .   .  0 0 0 82 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES where λ j ∈ k and for each i the element (0, . . . , 0, ti,i , ti,i+1 , 0, . . . , 0) is a linear combination of the elements (0, . . . , 0, si, j , si+1, j , 0, . . . , 0) for j ∈ {1, . . . , n}. Computing the first i0 components of the right hand side in Equation (3.2) (note that the summands for i ≥ i0 + 1 are not necessary), we obtain the following system of linear equations ti0 −1,i0 + j, j0 λ j · si0 , j = si0 , j0 ti0 −1,i0 −1 + ti0 −2,i0 −1 = 0 .. . P ti0 −l,i0 −l + ti0 −l−1,i0 −l = 0 .. . t1,1 + t0,1 = 0 t0,0 = 0. Since t0,0 = 0 and t0,0 Z0 + t0,1 Z1 = 0, we obtain t0,1 = 0. Solving the above linear equation P system from the bottom, we obtain the contradiction si0 , j0 = j, j0 λ j · si0 , j . This shows that the n · n elements from (3.1) are part of a minimal system of generators of SyzR (Z0 , . . . , Zn ). Since this module is maximal Cohen-Macaulay of rank n, it has at most n · n generators. All in all, we obtain SyzR (Z0 , . . . , Zn )  n−1 M SyzR (Zi , Zi+1 ). i=0 For i ∈ N write i = n · q + r with q ∈ N and r ∈ {0, . . . , n − 1}. Let (A, B) ∈ SyzR (Z0i , Z1i ). Then AZ0i + BZ1i = 0 AY ni = −BX i Y (n−1)i ⇔ AY i = −BX i ⇔ ⇔ (A, B) = C(X i , −Y i ) for some C ∈ k[X, Y]. An argumentation as above shows that the possibilities for C of minimal degree are the monomials of degree n − r. This shows that SyzR (Z0i , Z1i ) has n − r + 1 generators and hence SyzR (Z0i , Z1i )  SyzR (Z0 , Zr )(m)  SyzR (Z0r , Z1r )(l) for some m, l ∈ Z. All in all, we obtain for every m ∈ Z Ç SyzR (Z0i , . . . , Zni )(m)  SyzR (Z0r , . . . , Znr ) å i−r m − (n + 1) . n If the characteristic of k is p and i = pe , we obtain from Proposition 1.76 as in Example 2.2 by using deg(Proj(R)) = n (cf. [Har87, Exercise I.7.1]) the formula HK(R, q) = with Dr := dimk R/ Z0r , . . . , Znr .  n+1 2 2 · (q − r ) + Dr , 2 3.2. GENERALITIES ON MATRIX FACTORIZATIONS 83 Next, we give an explicit formula for Dr . Of course, we have (3.3) Dr = r X dimk R/ Z0r , . . . , Znr i=0  i+ X dimk R/ Z0r , . . . , Znr  i. i≥r+1 Since monomials in R of degree i correspond to monomials in k[X, Y] of degree ni, the first sum above equals r X (ni + 1) − (n + 1) = n · i=0 r(r + 1) + r − n. 2 We will show that the second summand in (3.3) vanishes by showing that a monomial in R of degree r + 1 has a factor of the form Z rj for some j. Let M ∈ R be a monomial of degree r + 1. This means that M = X i Y n(r+1)−i ∈ k[X, Y] for some i ∈ {0, . . . , n(r + 1)}. Assume that i ∈ [ar, (a + 1)r) for some a ∈ N. We obtain M = X i Y n(r+1)−i = X i−ar+ar Y nr+n−i+ar−ar = X ar Y nr−ar X i−ar Y ar+n−i = Zar X i−ar Y ar+n−i , showing that all monomials in Rr+1 vanish modulo (Z0r , . . . , Znr ). Finally, under the assumption gcd(p, n) = 1 the Hilbert-Kunz function of R is given by n + 1 Ä 2e 2 ä r(r + 1) HK(R, pe ) = · p −r +n· + r − n, 2 2 where r is the smallest non-negative representative of the class of pe in Z/(n). 3.2. Generalities on matrix factorizations Let (S , m, k) be a regular local ring, f ∈ m2 \ {0} and let R := S /( f ). The starting point for the theory of matrix factorizations is the observation that by the Auslander-Buchsbaum formula every maximal Cohen-Macaulay R-module M has - viewed as a S -module - a free resolution of length one: ϕ 0 → S n → S n → M → 0. Because ϕ is injective and f · S n is contained in the image of ϕ, one can construct a linear map ψ : S n → S n satisfying ϕ ◦ ψ = f · Id. Composing this equation from the right by ϕ and using again that ϕ is injective, one gets ψ ◦ ϕ = f · Id. This motivates the following definition. Definition 3.15. For a given non-zero f ∈ m2 , a pair of n × n-matrices (ϕ, ψ) over S with ϕ ◦ ψ = ψ ◦ ϕ = f · Idn is called a matrix factorization for f of size n. A matrix factorization (ϕ, ψ) is called reduced if all entries are non-units. Example 3.16. The pairs ( f, 1) and (1, f ) are non-reduced matrix factorizations for f of size one. If f = g · h with g, h ∈ m, then (g, h) and (h, g) are reduced matrix factorizations for f of size one. We denote the set of matrix factorizations for f by MFS ( f ). The following two definitions will enrich its structure to an additive category. 84 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES Definition 3.17. Let (ϕ1 , ψ1 ) and (ϕ2 , ψ2 ) be two matrix factorizations for f of size n resp. m. A morphism from (ϕ1 , ψ1 ) to (ϕ2 , ψ2 ) is a pair of m × n-matrices (α, β) over S such that the following diagram commutes ψ1 Sn  α / ψ2 Sm / Sn  ϕ1 β / Sm ϕ2 / Sn  α S m. We call (ϕ1 , ψ1 ) and (ϕ2 , ψ2 ) equivalent if there is a morphism (α, β) between them, where α and β are isomorphisms. We will denote a morphism (α, β) from (ϕ1 , ψ1 ) to (ϕ2 , ψ2 ) by (α, β) : (ϕ1 , ψ1 ) → (ϕ2 , ψ2 ). Remark 3.18. Note that the commutativity of the second square is enough: Multiplying ψ2 α by f · Id from the right gives (ψ2 α)( f · Id) =(ψ2 α)(ϕ1 ψ1 ) =ψ2 (αϕ1 )ψ1 =ψ2 (ϕ2 β)ψ1 =(ψ2 ϕ2 )(βψ1 ) =( f · Id)(βψ1 ). Definition 3.19. Let (ϕ1 , ψ1 ) and (ϕ2 , ψ2 ) be two matrix factorizations for f of size n resp. m. We define their direct sum as åå å Ç ÇÇ ψ1 0 ϕ1 0 . , (ϕ1 , ψ1 ) ⊕ (ϕ2 , ψ2 ) := 0 ψ2 0 ϕ2 Definition 3.20. A matrix factorization (ϕ, ψ) is called indecomposable if it is not equivalent to a direct sum of matrix factorizations. Example 3.21. Let f = X 2 + Y 3 + YZ 2 . Assume that the ground field is not of characteristic two and contains i. Then (ϕ0 , ϕ0 ), (ϕ1 , ϕ1 ) and (ϕ2 , ϕ2 ) with á ϕ0 = Ç −X Y 2 YZ 0 Y X 0 −Z Z 0 X Y 0 −YZ Y 2 −X å ë Ç , å X iY 2 + YZ X −iY 2 + YZ ϕ1 = and ϕ2 = Z − iY −X Z + iY −X are matrix factorizations for f . In this case (α, −α) : (ϕ0 , ϕ0 ) −→ (ϕ1 , ϕ1 ) ⊕ (ϕ2 , ϕ2 ) with á α= i 0 0 −1 0 −1 −i 0 −i 0 0 −1 0 −1 i 0 is an equivalence of matrix factorizations for f . ë 3.2. GENERALITIES ON MATRIX FACTORIZATIONS 85 Since f · S n ⊆ ϕ(S n ), the cokernel of ϕ is annihilated by f and therefore an R-module. Taking the sequence of maps and modules ϕ ψ ϕ . . . −→ S n −→ S n −→ S n −→ coker(ϕ) −→ 0 modulo f , gives a two-periodic free resolution of coker(ϕ) as an R-module. Because of this, coker(ϕ) is isomorphic to all of its 2i-th syzygy modules that are maximal CohenMacaulay by Proposition 3.6 if 2i is at least dim(R). All in all we get a functor coker((ϕ, ψ)) := coker(ϕ) : MFS ( f ) −→ C(R), where C(R) denotes the category of maximal Cohen-Macaulay R-modules. As described at the beginning of this section, we have a functor Γ : C(R) −→ MFS ( f ) as well. Theorem 3.22 (Eisenbud). The maps coker and Γ induce a bijection between the sets of reduced matrix factorizations for f up to equivalence and non-free, maximal CohenMacaulay R-modules up to isomorphism. Moreover, this bijection respects direct sums. Proof. See [Eis80, Corollary 6.3].  Remark 3.23. Note that the non-reduced matrix factorizations ( f, 1) and (1, f ) of f are mapped under coker to R resp. 0. Using the above theorem one can show that any matrix factorization (ϕ, ψ) is equivalent to a direct sum of matrix factorizations of the form L L (ϕ0 , ψ0 ) ⊕ai=1 ( f, 1) ⊕bi=1 (1, f ), where the natural numbers a, b are uniquely determined and (ϕ0 , ψ0 ) is reduced and unique up to equivalence (cf. [Yos90, Remark 7.5]). Theorem 3.22 generalizes to certain quotients of categories given by the following construction. Construction 3.24. Let A be an Abelian category and B a subclass of objects of A. For any A, B ∈ A, we define B(A, B) ⊆ HomA (A, B) as the set of morphisms that factor through direct sums of objects in B. In fact, B(A, B) is a normal subgroup of HomA (A, B). We define the category A/B, whose objects are the objects of A, but the morphisms from A to B are given by the quotient HomA/B (A, B) := HomA (A, B)/B(A, B). Definition 3.25. Let MFS ( f ) := MFS ( f )/{(1, f ), ( f, 1)} be the category of equivalence classes of reduced matrix factorizations and C(R) := C(R)/{R} the category of isomorphism classes of non-free maximal Cohen-Macaulay R-modules. Now Theorem 3.22 generalizes as follows. Theorem 3.26 (Eisenbud). The functors coker and Γ induce an equivalence of the categories MFS ( f ) and C(R). Proof. See [Yos90, Theorem 7.4].  Remark 3.27. If f is prime and (ϕ, ψ) is a matrix factorization for f of size n, then there is a unit u ∈ S and a number m ∈ {0, . . . , n} such that det(ϕ) = u · f m and det(ψ) = u−1 · f n−m . In this case coker(ϕ) has rank m and coker(ψ) has rank n − m as R-modules. This can be seen by localizing at the prime ideal ( f ). Since S ( f ) is a discrete valuation ring, the map 86 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES ϕ( f ) on the localization is equivalent to the map f · Idm ⊕ Idn−m . Obviously, coker(ϕ( f ) ) has rank m over the field Q(R)  S ( f ) / f S ( f ) . Note that m ∈ {1, . . . , n − 1}, if (ϕ, ψ) is reduced. Compare with [Eis80, Proposition 5.6]. The next lemma describes the connection of a maximal Cohen-Macaulay R-module and its dual in terms of matrix factorizations. Ä ä Lemma 3.28. Given a matrix factorization (ϕ, ψ) for f , the pair ϕT , ψT is again a matrix factorization for f . Moreover, we have Ä ä coker ϕT  (coker(ϕ))∨ . Proof. The first statement is clear. For a matrix M over S , we denote the matrix over R given by taking every entry from M modulo f by M. Applying Hom(_, R) to ϕ Rn −→ Rn −→ coker(ϕ) −→ 0, produces the exact sequence Ä ϕT ä 0 −→ (coker(ϕ))∨ −→ Rn −→ Rn −→ coker ϕT −→ 0. This shows Ä ä  T coker ϕT  Rn / ker ψ Ä   T  im ψ  Ä ä  ker ϕT  (coker(ϕ))∨ . ä Since coker(ϕ) and coker ϕT have a natural R-module structure, they identify with the Ä ä T  R-modules coker(ϕ) resp. coker ϕ . Due to Yoshino (cf. [Yos98]), there is the notion of the tensor product of matrix factorizations for power series in disjoint sets of variables. Definition 3.29. Let (ϕ f , ψ f ) be a matrix factorization for f in k~X1 , . . . , Xr  of size n and (ϕg , ψg ) a matrix factorization for g in k~Y1 , . . . , Y s  of size m. Then ÇÇ ˆ g , ψg ) := (ϕ f , ψ f )⊗(ϕ å Ç ϕ f ⊗ idm idn ⊗ϕg ψ f ⊗ idm − idn ⊗ϕg , − idn ⊗ψg ψ f ⊗ idm idn ⊗ψg ϕ f ⊗ idm åå is a matrix factorization for f + g in k~X1 , . . . , Xr , Y1 , . . . , Y s  of size 2nm. If (α, β) : (ϕ1 , ψ1 ) → (ϕ2 , ψ2 ) is a morphism in MF( f ), then ÇÇ ˆ g , ψg ) B (α, β)⊗(ϕ å Ç α ⊗ idm 0 β ⊗ idm 0 , 0 β ⊗ idm 0 α ⊗ idm åå ˆ g , ψg ) to (ϕ2 , ψ2 )⊗(ϕ ˆ g , ψg ) in MF( f +g). Similarly, if (γ, δ) : is a morphism from (ϕ1 , ψ1 )⊗(ϕ (ϕ3 , ψ3 ) → (ϕ4 , ψ4 ) is a morphism in MF(g), then ÇÇ ˆ δ) B (ϕ f , ψ f )⊗(γ, å Ç idn ⊗γ 0 idn ⊗δ 0 , 0 idn ⊗δ 0 idn ⊗γ åå ˆ 3 , ψ3 ) to (ϕ f , ψ f )⊗(ϕ ˆ 4 , ψ4 ) in MF( f + g). is a morphism from (ϕ f , ψ f )⊗(ϕ 3.2. GENERALITIES ON MATRIX FACTORIZATIONS 87 Example 3.30. Let d1 , d2 , d3 ∈ N≥2 . Then for each 1 ≤ a ≤ d1 − 1 the pair (X a , X d1 −a ) is a reduced matrix factorization for X d1 . Similarly, (Y b , Y d2 −b ) and (Z c , Z d3 −c ) with 1 ≤ b ≤ d2 − 1, 1 ≤ c ≤ d3 − 1 are reduced matrix factorizations for Y d2 resp. Z d3 . With these matrix factorizations we can construct matrix factorizations for X d1 + Y d2 and for X d1 + Y d2 + Z d3 . For given a, b, c as above, we get ˆ b , Y d2 −b ))⊗(Z ˆ c , Z d3 −c ) ((X a , X d1 −a )⊗(Y ÇÇ = áá = å Ç X d1 −a −Y b Xa Yb , Y d2 −b X a −Y d2 −b X d1 −a åå Xa Yb Zc 0 d −b d −a −Y 2 X 1 0 Zc −Z d3 −c 0 X d1 −a −Y b d −c 0 −Z 3 Y d2 −b X a ˆ c , Z d3 −c ) ⊗(Z ë á d1 −a X , Ä Y d2 −b Z d3 −c 0 ä −Y b −Z c 0 a X 0 −Z c 0 Xa Yb d −c d −b Z 3 −Y 2 X d1 −a ëë . Denote the result by (ϕ, ψ). Then (ϕ, ψ) and ϕT , ψT are equivalent. Let Ç Ä ä å 0 −1 η := . 1 0 Then (α, α) : (ϕ, ψ) −→ ϕT , ψT given by Ç 0 η α= η 0 å is an equivalence of matrix factorizations. Note that the corresponding modules coker(ϕ) have rank two by Remark 3.27, since det(ϕ) = (X d1 + Y d2 + Z d3 )2 . This tensor product behaves much better than the tensor product of modules. Theorem 3.31 (Yoshino). With the previous notations ˆ g , ψg ) : MF( f ) −→ MF( f + g) _⊗(ϕ is an exact functor. Moreover, if (ϕg , ψg ) is reduced, this functor is faithful. Proof. See [Yos98, Lemmata 2.8 and 2.11].  Remark 3.32. In Chapter 3 of [Yos98] Yoshino discusses how the indecomposability of matrix factorizations behaves under tensor products. If char(k) , 2, then by [Yos98, Example 3.8] the matrix factorizations computed in Example 3.30 are indecomposable if and only if at most one of the following equalities holds: 2a = d1 , 2b = d2 , 2c = d3 . Yoshino found also the following decomposition behaviour. Lemma 3.33. Suppose char(k) , 2 and i ∈ k. For matrix factorizations (ϕ, ϕ) of size n and ˆ ψ) decomposes as the direct sum (ξ, ζ) ⊕ (ζ, ξ) (ψ, ψ) of size m the tensor product (ϕ, ϕ)⊗(ψ, with (ξ, ζ) = (ϕ ⊗ idm −i(idn ⊗ψ), ϕ ⊗ idm +i(idn ⊗ψ)). Proof. See [Yos98, Lemma 3.2].  88 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES Ä 0ä 0 Ä 0 0 0ä Example 3.34. Consider the matrix factorizations X d1 , X d1 for X 2d1 and Y d2 , Y d2 for 0 Y 2d2 . Then Ä 0 0ä Ä 0ä 0 Ä 0 0 0ä 0 Ä 0 0 0 0ä X d1 , X d1 ⊗ˆ Y d2 , Y d2  X d1 − iY d2 , X d1 + iY d2 ⊕ X d1 + iY d2 , X d1 − iY d2 . If we are in the case a = d10 = d1 /2 and b = d20 = d2 /2 of Example 3.30, ÄÄ 0ä 0 Ä 0 0 ää X d1 , X d1 ⊗ˆ Y d2 , Y d2 Ä ⊗ˆ Z c , Z d3 −c ä splits by Remark 3.32 (or Theorem 3.31) as the tensor products of the two direct summands above with (Z c , Z d3 −c ). 3.3. Constructing isomorphisms between maximal Cohen-Macaulay modules and first syzygy modules of ideals In this section we construct isomorphisms between maximal Cohen-Macaulay modules and first syzygy modules of ideals over rings of dimension two. To be more precise, given a full set M1 , . . . , Mn of representatives for the isomorphism classes of indecomposable, maximal Cohen-Macaulay R-modules, we want to find for each i non-zero elements F1 , . . . , Fm ∈ R such that Mi  SyzR (F1 , . . . , Fm ). This has to be possible, since first syzygy modules of ideals are second syzygy modules of quotient rings. From now on we assume that f is irreducible, that R = S /( f ) is a local Cohen-Macaulay normal domain of dimension two and that R has no singularities outside the origin. In this situation all maximal Cohen-Macaulay modules are locally free on the punctured spectrum of R (cf. Lemma 3.5). We will denote the punctured spectrum of R by U. Now we describe a way to find a representation of a maximal Cohen-Macaulay module, given by a matrix factorization, as a syzygy bundle on U. At the end of the chapter we discuss an algebraic approach to find an isomorphism between maximal Cohen-Macaulay modules and first syzygy modules of ideals that reflects the main idea of restricting ϕ to a submodule of lower rank better than the rather sheaf-theoretic approach. We will see that this algebraic approach does not work very properly. Construction 3.35. For a (reduced) matrix factorization (ϕS , ψS ) of size n, we have a two periodic free resolution of M := coker(ϕS ) as R-module: ψ ϕ ψ ϕ . . . −→ Rn −→ Rn −→ Rn −→ Rn −→ M −→ 0, where ϕ and ψ arise from ϕS and ψS by taking their entries modulo f . Note that we can identify M with coker(ϕ). Therefore we get M  Rn / im(ϕ)  Rn / ker(ψ)  im(ψ). Later we will see that in the case of rank one modules the isomorphism M  im(ψ) is already enough to describe M as a syzygy module. For any subset J of {1, . . . , n} we denote by ψ J the matrix obtained from ψ by keeping all columns whose index belongs to J (and deleting those with index in J C ). 3.3. CONSTRUCTING ISOMORPHISMS OF MAXIMAL COHEN-MACAULAY MODULES 89 ‡ If coker(ϕ)  im(ψ) has rank m as an R-module, the sheaf im(ψ)| U gives a locally free OU -module of rank m. Therefore a representing first syzygy module of an ideal has to be a syzygy module of an (m + 1)-generated ideal. ‡ Suppose that we can choose a J ⊆ {1, . . . , n} of cardinality m + 1 such that im(ψ)| U and · 1 J F B im(ψ )|U are isomorphic as sheavesÄof O ä U -modules , where the isomorphism is the J map induced by the natural inclusion im ψ ⊆ im(ψ). A necessary condition for this is that the matrix ψ J has full rank - namely m - in every non-zero point. Otherwise there · J ) has rank at most m − 1. would be at least one point u ∈ U such that the stalk im(ψ u ‡ Since im(ψ)| U comes from a maximal Cohen-Macaulay R-module, it is locally free as OU -module, giving that ψJ Om+1 U −→ F −→ 0 is a surjection of locally free OU -modules of ranks m + 1 and m. Therefore the kernel L has to be locally free of rank one. This gives an isomorphism L ⊗ det(F )  OU of the determinants (cf. Proposition 1.47 (iv)). We distinguish whether the determinant of F is trivial or not. Case 1. Assume det(F )  OU . Then the line bundle L has to be trivial. Hence (3.4) ψJ η 0 −→ OU −→ Om+1 U −→ F −→ 0 is a short exact sequence and η has to be the multiplication by a vector (G1 , . . . ,Gm+1 )T with Gi ∈ R. But then Sequence (3.4) is exactly the dual of the presenting sequence of SyzU (G1 , . . . ,Gm+1 ), hence there is an isomorphism SyzU (G1 , . . . ,Gm+1 )  F ∨ . Moreover, the ideal generated by the Gi has to be m-primary, since the determinant of the syzygy bundle is trivial. Note that this case cannot appear if F has rank one. Case 2. Now assume that L is a non-trivial line bundle, hence det(F )  L∨ . Dualizing the sequence 0 → L → Om+1 U → F → 0 yields (3.5) (ψ J )T ∨ 0 −→ F ∨ −→ Om+1 U → L −→ 0. Since L∨ is a line bundle it corresponds to a Cartier divisor D. There is a finite cover (Ui ) of U such that D|Ui is principal, say D|Ui = (hi ). The multiplication with the common denominator of the hi defines an embedding of L∨ into OU . With this embedding, we can extend Sequence (3.5) to (3.6) (ψ J )T µ 0 −→ F ∨ −→ Om+1 U −→ OU −→ T −→ 0, where T is a non-zero torsion sheaf and the map µ is the multiplication by a row vector (G1 , . . . ,Gm+1 ). In this case, Sequence (3.6) is the presenting sequence of the syzygy bundle SyzU (G1 , . . . ,Gm+1 ), where the ideal (G1 , . . . ,Gm+1 ) is not m-primary, since T is non-zero. 1Note that we have no argument why this should be possible, but it works in all examples. 90 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES In both cases the column vector (G1 , . . . ,Gm+1 )T generates the kernel of ψÄJ . äIn order to compute the Gi , we only need to find an element (F1 , . . . , Fm+1 )T ∈ ker ψ J . Then (F1 , . . . , Fm+1 )T is just a mutiple of (G1 , . . . ,Gm+1 )T and equality (up to multiplication by a unit) holds if we can prove that the Fi are coprime. For example this condition is automatically fullfilled if the ideal generated by the Fi is m-primary. Anyway, the syzygy modules of the two ideals are isomorphic. All in all, our task is to find a vector (F1 , . . . , Fm+1 )T in the kernel of ψ J . This gives an isomorphism f∨  F ∨  Syz (F , . . . , F M m+1 ). U 1 Since we have the isomorphisms Ä ä Ä ä M ∨  coker(ϕ)∨  coker ϕT  im ψT , we will apply this construction to ψ, if coker(ϕ) is selfdual, or to ψT , if coker(ϕ) is not selfdual. In both cases we end up with an isomorphism f  Syz (F , . . . , F M m+1 ). U 1 Remark 3.36. Since the underlying ring R is a two-dimensional normal domain the isomorphisms of OU -modules constructed above, extend to isomorphisms of R-modules, since all involved modules are reflexive (cf. [BD08, Lemma 3.6]). We will illustrate this construction by an explicit computation. Example 3.37. In Example 3.30 we found the matrix factorizations áá (ϕ, ψ) := Xa Yb Zc 0 d −b d −a −Y 2 X 1 0 Zc −Z d3 −c 0 X d1 −a −Y b 0 −Z d3 −c Y d2 −b X a ë á d1 −a X , −Y b −Z c 0 a X 0 −Z c 0 Xa Yb Z d3 −c −Y d2 −b X d1 −a Y d2 −b Z d3 −c 0 ëë for X d1 + Y d2 + Z d3 with 1 ≤ a ≤ d1 − 1, 1 ≤ b ≤ d2 − 1 and 1 ≤ c ≤ d3 − 1. The corresponding modules coker(ϕ) have rank two and are selfdual, hence we can apply the above construction to ψ. The computations á Y d2 −b · Xa −Y b Xa 0 d Z 3 −c á − X d1 −a · Yb ë −Y b Xa 0 d Z 3 −c á + Z d3 −c · Xa ë −Z c 0 Xa −Y d2 −b á + Z d3 −c · Yb 0 −Z c Yb X d1 −a ë á d −a ë X 1 = ë Y d2 −b Z d3 −c 0 , á d −a ë X 1 = Y d2 −b Z d3 −c 0 ‡ ∨ is locally generated by the columns two, three and four. Now we have show that im(ψ)| U to find three non-zero elements F1 , F2 and F3 such that (F1 , F2 , F3 )T belongs to the kernel of ψ{2,3,4} . The first row (−Y b , −Z c , 0) of ψ{2,3,4} gives the relation −Y b · F1 − Z c · F2 = 0 from which we conclude (since Y b and Z c are coprime in R) that F1 = Z c ·G and F2 = −Y b ·G for some 3.4. THE CASE An WITH n ≥ 0 91 non-zero G ∈ R. From the second row (X a , 0, −Z c ) we get the relation Z c · X a ·G − Z c · F3 = 0. This gives F3 = X a · G. Looking at the relations given by the rows three and four of ψ{2,3,4} , we see that G can be chosen as one. We get the isomorphism Â{2,3,4} ∨ ‡ ∨  im(ψ im(ψ)| )|U  SyzU (Z c , −Y b , X a ), U extending to the global isomorphism im(ψ)∨  SyzR (Z c , −Y b , X a ). In fact, one can delete any column from ψ, giving the isomorphisms im(ψ)∨  SyzR (Z c , −Y b , X a )  SyzR (Z c , X d1 −a , Y d2 −b )  SyzR (Y b , X d1 −a , −Z d3 −c )  SyzR (X a , −Y d2 −b , −Z d3 −c ). In all four cases the ideal (F1 , F2 , F3 ) is m-primary, hence (F1 , F2 , F3 )T generates the „ kernel of ψ J and det(coker(ϕ)| U ) is always trivial. In the next sections we give a complete list of representatives of reduced, indecomposable matrix factorizations up to equivalence in the ADE case and compute first syzygy modules of ideals isomorphic to the maximal Cohen-Macaulay modules given by the matrix factorizations. Proofs for the completeness of the lists of matrix factorizations can be found in [KST07] and [LW12, Chapter 9, §4]. We use their enumeration of the matrix factorizations, which corresponds to the enumeration of the corresponding Dynkin-diagrams. In all cases the matrices are various 2n × 2n- matrices and the corresponding modules have rank n. Note that for an R-module M we will denote the corresponding OSpec(R) -module again by M. 3.4. The case An with n ≥ 0 Let k be an algebraically closed field of odd characteristic not dividing n + 1 and let R := k~X, Y, Z/(X n+1 + YZ) with maximal ideal m. Denote by U := Spec(R) \ {m} the punctured spectrum of R. The category of reduced, indecomposable matrix factorizations up to equivalence has the objects (ϕm , ψm ) for m ∈ {1, . . . , n} with ÇÇ (ϕm , ψm ) = å Ç Y X n+1−m Z X n+1−m , m m X −Z X −Y åå . We always have rank(coker(ϕm )) = 1. The modules SyzR (Y, X n+1−m ) and SyzR (X m , −Z) are generated by the columns of ψm , hence they are isomorphic to coker(ϕm ). Note that (ψm , ϕm )  (ϕn+1−m , ψn+1−m ) by the morphism ÇÇ å Ç 0 1 0 −1 , −1 0 1 0 åå 92 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES and coker(ϕm )∨ = coker(ϕn+1−m ), because (ϕTm , ψTm ) = (ϕn+1−m , ψn+1−m ). Hence, the Picardgroup of R is isomorphic to Z/(n + 1). Since the OU -modules SyzU (X m , Z) are line bundles, they have a description as the line bundle of a reflexive ideal. From the short exact sequence of OU -modules 0 → SyzU (X m , Z) → O2U → (X m , Z)|U → 0, we get by taking determinants (X m , Z)|U  SyzU (X m , Z)∨  SyzU (X m , Y). Taking global sections Γ(U, _) gives the isomorphism SyzR (X m , Y)  (X m , Z)∨∨ . It remains to compute the reflexive hulls of the ideals (X m , Z). The reflexive hull of a finitely generated module over a normal ring is the intersection over all localizations of that module at primes of height one (cf. the corollary to Theorem 1 in Chapter VII, §4, no. 2 of [Bou89]). All (X m , Z) have exactly one minimal prime (of height one), namely (X, Z), hence we get (X m , Z)∨∨ = { f ∈ R| f ∈ (X m , Z)R(X,Z) } = { f ∈ R| f ∈ (X m )R(X,Z) }, where the last equality holds, since Y gets invertible and Z = −X n+1 /Y ∈ (X m )R(X,Z) . We show by induction on m, that the ideals (X m , Z) are reflexive. This is clear for m = 1, since (X, Z) is a prime ideal of height one. Let m > 1 and assume (X l , Z)∨∨ = (X l , Z) for all l < m. The inclusion (X m , Z) ⊆ (X m , Z)∨∨ is clear. Let f ∈ (X, Z), such that f ∈ (X m )R(X,Z) . Then there are a, b ∈ R with f = aX + bZ. Since bZ ∈ (X m )R(X,Z) , this gives f − bZ = aX ∈ (X m )R(X,Z) . From this we deduce a ∈ (X m−1 )R(X,Z) , which means a ∈ (X m−1 , Z) by the induction hypothesis. Theorem 3.38. The pairwise non-isomorphic modules Mm := SyzR (X m , Z) for m = 1, . . . , n give a complete list of representatives of the isomorphism classes of indecomposable, ∨  M non-free, maximal Cohen-Macaulay modules. Moreover, we have Mm n+1−m and m Mm  (X , Y). 3.5. The case Dn with n ≥ 4 Let k be an algebraically closed field of odd characteristic not dividing n − 2, let R := k~X, Y, Z/(X 2 + Y n−1 + YZ 2 ) with maximal ideal m. Denote by U := Spec(R) \ {m} the punctured spectrum of R. In this case the category of reduced, indecomposable matrix factorizations up to equivalence has n objects (ϕi , ψi ), i ∈ {1, . . . , n}, given by Ç å X Y n−2 + Z 2 ϕ1 = ψ1 = , Y −X 3.5. THE CASE Dn WITH n ≥ 4 Ç 93 å X Y(iY (n−2)/2 + Z) ϕn−1 = ψn−1 = Z − iY (n−2)/2 −X and Ç å X Y(−iY (n−2)/2 + Z) ϕn = ψn = Z + iY (n−2)/2 −X Ç å Ç å if n is even, X + iY (n−1)/2 YZ , ϕn−1 = Z −X + iY (n−1)/2 X − iY (n−1)/2 YZ ψn−1 = Z −X − iY (n−1)/2 (ϕn , ψn ) =(ψn−1 , ϕn−1 ) if n is odd. and Independent of the parity of n we have á ϕm = ψ m = 0 YZ Y m/2 −X Y n−1−m/2 −Z Y m/2 X 0 −YZ 0 X −X 0 Z Y n−1−m/2 ë if m ∈ {2, . . . , n − 2} is even, and á ϕm = ψ m = Y n−1−(m−1)/2 YZ 0 X 0 −Z 0 X Y n−2−(m−1)/2 −YZ Y (m+1)/2 −X −X Y (m−1)/2 Z 0 ë if m ∈ {2, . . . , n − 2} is odd. The corresponding modules coker(ϕm ) have rank one for m ∈ {1, n − 1, n} and rank two otherwise. Moreover, coker(ϕ1 ) is selfdual, but coker(ϕn−1 ) and coker(ϕn ) are selfdual only when n is even. For n odd they are dual to each other. In any case the equivalences are given by (α, −α) with Ç å 0 −1 α := . 1 0 The modules coker(ϕm ) are selfdual, since (η, ξ) : (ϕm , ψm ) −→ (ϕTm , ψTm ) with Ç å −α 0 η=ξ= 0 α Ç α 0 η = −ξ = 0 α if m is even and å if m is odd are equivalences of matrix factorizations. This shows that the Picard-group of R is isomorphic to Z/(2) × Z/(2) if n is even and isomorphic to Z/(4) if n is odd. We now compute representing first syzygy modules of ideals. In the rank one case we only have to look at the columns of ψ j . The columns of ψ1 generate the modules SyzR (−Y, X) and SyzR (X, Y n−2 + Z 2 ). Similarly, for n even we get Ä Ä ää Ä Ä ää coker(ϕn−1 )  SyzR (−iY (n−2)/2 + Z, −X)  SyzR X, Y Z + iY (n−2)/2 coker(ϕn )  SyzR (iY (n−2)/2 + Z, −X)  SyzR X, Y Z − iY (n−2)/2 and 94 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES and for n odd we get Ä ä Ä ä coker(ϕn−1 )  SyzR −Z, X + iY (n−1)/2 coker(ϕn )  SyzR −Z, X − iY (n−1)/2  SyzR (X − iY (n−1)/2 , YZ) and  SyzR (X + iY (n−1)/2 , YZ). The ideals (X, Y), (X, Z ± iY (n−2)/2 ) and (X ± iY (n−1)/2 , Z) are prime ideals of height one, hence reflexive and we get the ideal representations coker(ϕ1 )  (X, Y), coker(ϕn−1 )  (X, Z − iY (n−2)/2 ) and coker(ϕn )  (X, Z + iY (n−2)/2 ) if n is even, coker(ϕn−1 )  (Z, X − iY (n−2)/2 ) and coker(ϕn )  (Z, X + iY (n−2)/2 ) if n is odd. Dealing with the rank two case, we have to omit one column from ψm (we can work with ψm instead of ψTm , since coker(ϕm ) is selfdual) such that the rank of the OU -module corresponding to the image of the reduced matrix remains two. If we erase the first or fourth column in ψm for m even, the two-minors of the new matrix vanish in the point (0, 0, 1) ∈ U. Hence, we cannot omit these columns, since we would get a sheaf whose rank in (0, 0, 1) would be at most one. The following computation shows, that we can omit the second column of ψm and still have a generating set for im(ψm )|U : á Y m/2 · X YZ Y n−1−m/2 X 0 á Y m/2 · Z ë á m/2 ë Y − YZ · X + Y n−1−m/2 = á m/2 ë Y ë −X 0 Z −Z 0 X X · Z −Z 0 X = á ë á ë 0 −X Y m/2 −YZ 0 −X Y m/2 −YZ . The rows of ψ{1,3,4} generate the R-module SyzR (−X, Z, Y n−1−m/2 ), hence we get an isom morphism of this syzygy module with coker(ϕm ). If we choose the coefficients YZ Y n−1−m/2 − ,− ,0 X X ! and X Y n−1−m/2 , 0, − Z Z ! on D(X) resp. D(Z) for the columns one, two, four, we see that we can leave out the third column. Then the rows of ψ{1,2,4} generate SyzR (Y m/2 , −Z, X), which gives an isomorm phism of this syzygy module with coker(ϕm ). Both syzygy modules are syzygy modules of m-primary ideals, hence the determinant of coker(ϕm )|U is trivial. Now, only the case where m is odd is left. As in the case where m is even, erasing the first or fourth column in ψm gives a matrix with all two-minors vanishing in the point (0, 0, 1) ∈ U. Again we may omit the second or the third column, where the corresponding coefficients are given in the table below (each row of the table is a syzygy for the columns 3.6. THE CASE E6 95 of ψm on the local piece D(X) or D(Z)). 1 D(X) − Y n−1− m−1 2 X 2 3 4 −1 0 Y n−1− Z −1 YZ X − XZ m+1 − Y X2 −1 0 D(Z) 0 −1 D(X) − YZ X 0 D(Z) X Z − m−1 Y 2 Z m−1 2 The rows of ψ{1,3,4} generate SyzR (YZ, X, Y (m+1)/2 ) and the rows of ψ{1,2,4} generate the m m n−1−(m−1)/2 module SyzR (Y , X, −YZ). The ideals are not m-primary, hence the determinant of D B coker(ϕm )|U is not trivial. Since the R-module coker(ϕm ) is selfdual, the determinant D has to be selfdual, too. Hence, if n is odd, we get directly D  coker(ϕ1 )|U . If n is even, we need to compute the reflexive hull of (X, Y (m+1)/2 , YZ). This ideal has only the minimal prime (X, Y). Since in the localization at (X, Y) the equality (X, Y (m+1)/2 , YZ)(X,Y) = (X, Y)(X,Y) holds, the reflexive hull of (X, Y (m+1)/2 , YZ) is (X, Y) and we obtain D  coker(ϕ1 )|U . Theorem 3.39. The pairwise non-isomorphic modules M1 = SyzR (X, Y), Mm = SyzR (X, Y m/2 , Z) if m ∈ {2, . . . , n − 2} is even, Mm = SyzR (X, Y (m+1)/2 , YZ) if m ∈ {2, . . . , n − 2} is odd, Mn−1 = SyzR (X, Z − iY (n−2)/2 ) and Mn = SyzR (X, Z + iY (n−2)/2 ) if n is even, or Mn−1 = SyzR (Z, X + iY (n−1)/2 ) and Mn = SyzR (Z, X − iY (n−1)/2 ) if n is odd give a complete list of representatives of the isomorphism classes of indecomposable, nonfree, maximal Cohen-Macaulay modules. Moreover, these modules are selfdual with the ∨  M if n is odd. The determinants of M exception Mn−1 n n−1 |U and Mn |U are M1 |U . For the rank one modules we have the isomorphisms M1  (X, Y), Mn−1  (X, Z − iY (n−2)/2 ) and Mn  (X, Z + iY (n−2)/2 ) if n is even and Mn−1  (Z, X − iY (n−1)/2 ) and Mn  (Z, X + iY (n−1)/2 ) if n is odd. 3.6. The case E6 Let k be an algebraically closed field of characteristic at least five, let R := k~X, Y, Z/(X 2 + Y 3 + Z 4 ) 96 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES with maximal ideal m. Denote by U := Spec(R) \ {m} the punctured spectrum of R. In this case the category of reduced, indecomposable matrix factorizations up to equivalence has six objects, which are given by Ç −Z 2 + iX Y ϕ5 = ψ6 = 2 2 Y Z + iX á ϕ1 = ψ1 = á ϕ3 = ψ4 = á ϕ4 = ψ3 = å Ç å −Z 2 − iX Y ϕ6 = ψ5 = , 2 2 Y Z − iX and −X 0 Y 2 Z 3 0 −X Z −Y Y Z3 X 0 Z −Y 2 0 X ë , −Z 2 + iX 0 YZ Y 2 −YZ Z + iX Y 2 0 0 Y iX Z 2 Y −YZ Z 3 iX ë −Z 2 − iX 0 YZ Y 2 2 −YZ Z − iX Y 0 0 Y −iX Z Y2 −YZ Z 3 −iX , ë , −iX −Z 2 YZ 0 Y2 0 −Z 2 −iX 0 0 0 Y       0  0 −iX −Y 0 Z , ϕ2 =   0 2 3 YZ −Y −iX Z 0       Y 0 0 Z −iX 0  0 Y2 Z3 0 YZ 2 −iX   iX −Z 2 YZ 0 Y2 0 −Z 2 iX 0 0 0 Y      0  0 iX −Y 0 Z  , ψ2 =  2 3 YZ −Y iX Z 0  0     Y 0 0 Z iX 0  0 Y2 Z3 0 YZ 2 iX   where coker(ϕ j ) has rank one for j ∈ {5, 6}, rank two for j ∈ {1, 3, 4} and rank three for j = 2. At first we clarify the dualities. The modules coker(ϕ5 ) and coker(ϕ6 ) are dual to each other by the equivalence (α, −α) : (ϕ5 , ψ5 ) → (ϕT6 , ψT6 ) with Ç å 0 −1 α= . 1 0 Since the Picard-group of R is given by the isomorphism classes of R, coker(ϕ5 ) and coker(ϕ6 ), it is isomorphic to Z/(3). The modules coker(ϕ3 ) and coker(ϕ4 ) are dual to each other by the equivalence (η, −η) : (ϕ3 , ψ3 ) → (ϕT4 , ψT4 ) with Ç å −α 0 . η= 0 −α 3.6. THE CASE E6 97 The modules coker(ϕ1 ) and coker(ϕ2 ) are the only modules of rank two resp. three left, hence they are selfdual. Now we compute representations as first syzygy modules of ideals. By looking at the columns of ψ5 and ψ6 (since they give modules of rank one) we get coker(ϕ5 )  SyzR (Y 2 , iX + Z 2 )  SyzR (Z 2 − iX, −Y) coker(ϕ6 )  SyzR (Y 2 , Z 2 − iX)  SyzR (Z 2 + iX, −Y) The two ideals (±iX + Z 2 , Y) are prime ideals of height one, hence reflexive. We obtain the ideal representations coker(ϕ5 )  (Z 2 + iX, Y) coker(ϕ6 )  (Z 2 − iX, Y). Dealing with the matrix factorizations (ϕ j , ψ j ) corresponding to modules of rank two, we have to delete one column from ψ j . Since (ϕ1 , ψ1 ) is equivalent to the matrix factorization from Example 3.30 with the values a = b = c = 1 and di = 1 + i for the parameters, we get the following representations as first syzygy modules of m-primary ideals: coker(ϕ1 )  SyzR (X, Y 2 , Z 3 )  SyzR (X, Y, Z)  SyzR (X, Y, Z 3 )  SyzR (X, Y 2 , Z). Fix a point of the form (x, 0, z) ∈ U, hence either ix + z2 = 0 or ix − z2 = 0. Deleting the first column from ψ4 , all two-minors of the reduced matrix vanish iff z2 + ix = 0. If z2 = ix generate SyzR (F1 , F2 , F3 ), we must have F3 = −Z · F2 by the first and the rows of ψ{2,3,4} 4 row. The third row gives the condition 0 = Y · F1 + (iX − Z 2 ) · F2 = Y · F1 , hence F1 = 0. This is a contradiction, since SyzR (0, F2 , F3 ) splits. Deleting the second column from ψ4 or the first column from ψ3 if ix = −z2 or the second column from ψ3 if ix = z2 , one gets similar contradictions. By deleting the third columns we get isomorphisms im(ψ3 )  SyzR (−iX + Z 2 , YZ, −Y 2 ) and im(ψ4 )  SyzR (iX + Z 2 , YZ, −Y 2 ). Deleting the fourth columns we get the isomorphisms im(ψ3 )  SyzR (iXZ − Z 3 , iXY, Y 2 ) and im(ψ4 )  SyzR (iXZ + Z 3 , iXY, −Y 2 ). Since coker(ϕ3 ) and coker(ϕ4 ) are dual to each other, we get the isomorphisms coker(ϕ3 )  SyzR (iX + Z 2 , YZ, −Y 2 )  SyzR (iXZ + Z 3 , iXY, −Y 2 ), coker(ϕ4 )  SyzR (−iX + Z 2 , YZ, −Y 2 )  SyzR (iXZ − Z 3 , iXY, Y 2 ), 98 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES where the appearing ideals are not m-primary. The ideals (±iX + Z 2 , Y 2 , YZ) have only one minimal prime, namely (±iX + Z 2 , Y). Since in the localization at (iX + Z 2 , Y) the equality (iX + Z 2 , Y 2 , YZ)(iX+Z 2 ,Y) = (iX + Z 2 , Y)(iX+Z 2 ,Y) holds (and similarly for the negative sign), the minimal primes have to be the reflexive hulls. Hence, we obtain det(coker(ϕ3 )|U )  coker(ϕ5 )|U det(coker(ϕ4 )|U )  coker(ϕ6 )|U . Considering ψ2 we have to erase two columns, since coker(ϕ2 ) has rank three. Not all choices of two columns are possible, since there are choices {m, l} such that all threeminors of the matrix ψ{1,...,6}\{m,l} vanish. The non-possible choices {m, l} for columns of ψ2 and points showing that these choices are not possible are given in the next table. deleted columns point {1, 2} ∨ {3, 6} ∨ {4, 5} (i, 0, 1) {1, 5} ∨ {2, 6} ∨ {3, 4} (i, 1, 0) {1, 4} ∨ {1, 6} ∨ {4, 6} (0, −1, 1). Deleting all other pairs of columns is possible and yields isomorphisms im(ψ2 )  SyzR (F1 , . . . , F4 ), where the polynomials are given as follows deleted columns F1 F2 F3 F4 1, 3 Y 2 −iXZ Z 2 −iXY 2, 3 Y2 Z3 −iX YZ 2 3 iXY −Z −Y 2 iXZ 2 2, 4 YZ −iX −Y 2 Z3 2, 5 3, 5 Z2 iX −YZ −Y 2 iXZ Z 3 −Y 2 −iXY. 5, 6 Note that all the ideals (F1 , F2 , F3 , F4 ) are m-primary. Theorem 3.40. The pairwise non-isomorphic modules M1 = SyzR (X, Y, Z), M2 = SyzR (X, Y 2 , YZ, Z 2 ), M3 = SyzR (iX + Z 2 , Y 2 , YZ), M4 = SyzR (−iX + Z 2 , Y 2 , YZ), M5 = SyzR (−iX + Z 2 , Y), M6 = SyzR (iX + Z 2 , Y) give a complete list of representatives of the isomorphism classes of indecomposable, nonfree, maximal Cohen-Macaulay modules. Moreover, M1 and M2 are selfdual, M3∨  M4 and M5∨  M6 . The Determinants of M3 |U resp. M4 |U are M5 |U resp. M6 |U . For the rank one modules we have the isomorphisms M5  (iX + Z 2 , Y) and M6  (−iX + Z 2 , Y). 3.7. THE CASE E7 99 3.7. The case E7 Let k be an algebraically closed field of characteristic at least five, let R := k~X, Y, Z/(X 2 + Y 3 + YZ 3 ) with maximal ideal m. Denote by U := Spec(R) \ {m} the punctured spectrum of R. In this case the category of reduced, indecomposable matrix factorizations up to equivalence has seven objects, which are given by Ç å X Y ϕ7 = ψ7 = , 2 3 Y + Z −X á ϕ1 = ψ1 = á ϕ4 = ψ4 = á ϕ6 = ψ6 = X 0 −Y 2 Z 0 X YZ 2 Y −Y Z −X 0 YZ 2 Y 2 0 −X −X Z 2 0 YZ X −Y 2 0 −Y −X Y 2 0 YZ 2 Y 0 Z X ë , ë X 0 −YZ Y 0 X Y 2 Z2 −Z 2 Y −X 0 Y 2 YZ 0 −X , ë , −X Z 2 YZ 0 Y2 0  YZ X 0 0 0 −Y       0  0 X −Y 0 Z  , ϕ2 = ψ2 =  2 2 −X YZ 0   0 −YZ −Y     Y 0 0 Z X 0  0 −Y 2 YZ 2 0 Y 2 Z −X   −X 0 YZ 0 0 Y −YZ 2 2 X 0 −Z −Y 0     2  Z 0 X −Y YZ 0 , ϕ5 = ψ5 =   0 −YZ −Y 2 −X 0 0      0 −Y 0 0 −X −Z  Y2 0 0 YZ −YZ 2 X   −X 0 YZ −Z 2 0 0 Y2 0  0 −X 0 Z2 0 0 0 Y     2 2 Z  Z X 0 0 −Y 0 0    0 2 YZ 0 X −Y 0 0 0   , ϕ3 = ψ3 =    0 0 0 −Y −X 0 0 Z    0 2 2 2 0 −Y 0 0 −X YZ Z      2  Y 0 0 0 −Z Z X 0 0 Y2 0 0 YZ 2 0 0 X   100 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES where coker(ϕ j ) has rank one for j = 7, rank two for j ∈ {1, 4, 6}, rank three for j ∈ {2, 5} and rank four for j = 3. Since there is only one non-trivial isomorphism class of indecomposable, maximal Cohen-Macaulay modules of rank one, the Picard-group of R is isomorphic to Z/(2). Again we start by computing the dual modules. Clearly, coker(ϕ7 ) and coker(ϕ3 ) are selfdual. We will see that all other modules are selfdual, too. Let Ç å 0 1 α := . −1 0 The morphisms (αi , βi ) : (ϕi , ψi ) → (ϕTi , ψTi ) given by å Ç α 0 , α1 = β1 = 0 α Ç å Ç å −α 0 α4 = −β4 = , 0 α α 0 α6 = β6 = , 0 −α Ö α2 = −β2 = Ö α5 = −β5 = α 0 0 0 α 0 0 0 α è , è α 0 0 0 α 0 0 0 −α are equivalences of matrix factorizations. Computing representations as first syzygy modules of ideals, we start again with the rank one case. The columns of ψ7 generate SyzR (X, Y) and SyzR (Y 2 + Z 3 , −X). Therefore coker(ϕ7 ) is isomorphic to both of these syzygy modules. In the rank two cases, we have to delete one column from the matrices ψ j . Deleting the second or fourth column from ψ1 , we get a matrix with vanishing two-minors in (0, 0, 1). By deleting the first resp. the third column, we get isomorphisms coker(ϕ1 )  SyzR (X, Z, Y 2 )  SyzR (Z, Y, −X). Deleting the second or fourth column from ψ4 , we get a matrix with vanishing two-minors in (0, 0, 1). By deleting the first resp. the third column, we get isomorphisms coker(ϕ4 )  SyzR (Y 2 , X, −YZ 2 )  SyzR (−X, YZ, Y 2 ). Note that both ideals are not m-primary (since {X, Y} is not a system of parameters). Deleting the first or fourth column from ψ6 , we get a matrix with vanishing two-minors in (0, 0, 1). By deleting the second resp. the third column, we get isomorphisms coker(ϕ6 )  SyzR (X, −Z 2 , Y 2 )  SyzR (Y, Z 2 , −X). We now deal with the rank three cases. To represent coker(ϕ2 ), we have to erase two columns from ψ2 . If one of those two is an even column, we get a matrix with all threeminors vanishing in (0, 0, 1). In (1, −1, 0) all three-minors of the matrix obtained from ψ2 3.7. THE CASE E7 101 by deleting the columns one and five vanish. Deleting the columns one and three resp. three and five, we obtain the isomorphisms coker(ϕ2 )  SyzR (Y 2 , XZ, −Z 2 , XY)  SyzR (Z 2 , X, −YZ, −Y 2 ). Similarly, to represent coker(ϕ5 ), we have to erase two columns from ψ5 . If one of those two is the column one, four or six, we get a matrix with all three-minors vanishing in (0, 0, 1). Deleting the columns two and three, all three-minors vanish in (0, −1, −1) and all three-minors vanish in (1, −1, 0), when erasing the columns two and five. In this case we get only an isomorphism by deleting the columns three and five: coker(ϕ5 )  SyzR (Y 2 , −XZ, YZ 2 , XY). The ideal is not m-primary (since {XZ, Y} is not a system of parameters). The last module to consider is coker(ϕ3 ) of rank four, hence we have to omit three columns in ψ3 . The following choices of columns are not possible, since all four-minors of the resulting matrix vanish in the given point (a question mark indicates an arbitrary choice) deleted columns point 4, ?, ? (0, 0, 1) 8, ?, ? (0, 0, 1) 1, 2, ? (0, 0, 1) 5, 6, ? (0, 0, 1) 1, 7, ? (1, −1, 0) 3, 6, ? (1, −1, 0) 2, 5, ? (0, −1, −1). The other four possibilities ((1,3,5), (2,3,7), (2,6,7) and (3,5,7)) give the isomorphisms coker(ϕ3 )  SyzR (−XY, Y 2 Z, −XZ 2 , Z 3 , Y 3 )  SyzR (YZ 2 , −XY, Y 2 + Z 3 , Z 4 , XZ 2 )  SyzR (XZ 2 , −Z 4 , Y 3 , XY, −Y 2 Z 2 )  SyzR (Z 3 , −Y 2 − Z 3 , −XZ, −YZ 2 , −XY). Note that the second ideal is not monomial. Multiplying all generators by Y yields a monomial ideal and changes the syzygy module only by an isomorphism. Theorem 3.41. The pairwise non-isomorphic modules M1 = SyzR (X, Y, Z), M2 = SyzR (X, Y 2 , YZ, Z 2 ), M3 = SyzR (XY, XZ, Y 2 , YZ 2 , Z 3 ), M4 = SyzR (X, Y 2 , YZ), M5 = SyzR (XY, XZ, Y 2 , YZ 2 ), M6 = SyzR (X, Y, Z 2 ), M7 = SyzR (X, Y) 102 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES give a complete list of representatives of the isomorphism classes of indecomposable, nonfree, maximal Cohen-Macaulay modules. Moreover, all M j are selfdual and det(M j |U )  M7 |U for j ∈ {4, 5, 7}. The rank one module M7 is isomorphic to the ideal (X, Y). 3.8. The case E8 Let k be an algebraically closed field of characteristic at least seven, let R := k~X, Y, Z/(X 2 + Y 3 + Z 5 ) with maximal ideal m. Denote by U := Spec(R) \ {m} the punctured spectrum of R. In this case the category of reduced, indecomposable matrix factorizations up to equivalence has eight objects, given by á X 0 Y Z 4 0 X Z −Y 2 Y 2 Z −X 0 Z 4 −Y 0 −X ϕ1 = ψ1 = á X 0 Y Z2 3 0 X Z −Y 2 Y 2 Z 2 −X 0 Z 3 −Y 0 −X ϕ8 = ψ8 = ë , ë , X −Z 2 YZ 0 −Y 2  3 −X 0 0 0 −Z   0 0 −X Y 0 ϕ2 = ψ2 =   0 2 X 4 −YZ Y Z    −Y 0 0 Z −X 0 Y 2 Z 4 0 −YZ 3  −X 0 0 Z2 0  YZ 3 X −Z 0 −Y 2   2  0 −Z −X Y 0 ϕ6 = ψ6 =   Z3 2 0 Y X −YZ 2    0 −Y 0 0 −X Y2 0 −YZ 2 0 Z4   0 Y   Z , 0   0 X  Y 0   0 , 0   Z X −X 0 −YZ Z 2 0 0 Y2 0  0 −X Z3 0 0 0 0 Y     2  0  Z X 0 0 −Y 0 0    Z 3 YZ 2 0 X −Y 0 0 0   ϕ3 = ψ3 =  , 3 Z   0 0 0 −Y −X 0 Z    0 0 −Y 2 0 0 −X 0 Z 2      2  Y 0 0 0 Z −Z X 0  0 Y2 0 0 0 Z3 0 X   3.8. THE CASE E8 103 X 0 0 0 −Z 3 0 0 −Y 2  YZ −X 0 0 0 Z Y2 0      2 3  0  0 −X Z 0 Y −Z 0    0 2 2 0 0 X −Y 0 0 Z    , ϕ7 = ψ7 =  −Z 2 0 0 −Y −X 0 0 0     0 Z3 Y 2 0 YZ 2 X 0 0       0 Y −Z 2 0 0 0 X Z  −Y 2 0 0 Z3 0 0 0 −X   X 0 YZ 0 0 −Z 2 Z 3 0 −Y 2 0  0 −X 0 0 0 0 0 −Z 2 0 Y     2  0 0 −X Z 0 0 0 Y 0 0    0 X 0 0 −Y 2 0 0 0 YZ Z 3     2 3  0 Z 0 0 X −Y 0 0 Z 0  , ϕ4 = ψ4 =  3 0 0 0 −Y 2 −X 0 0 0 Z2 −Z     0  0 0 −Y 0 0 −X 0 0 Z    0 3 2 2 −Z Y 0 0 0 YZ X 0 0      −Y 0 0 0 Z2 0 0 Z −X 0  0 Y 2 YZ 2 0 0 0 Z4 0 0 X   −X 0 0 0 0 0 0 Z2 0 0 0 Y  0 −X −YZ 3 2 2 0 0 0 Z −Z 0 0 Y 0     2 3  0  0 X 0 0 −Z 0 0 Z −Y 0 0    YZ 3 2 0 0 X −Z 0 0 0 −Y 0 0 0     2  0  0 0 −Z −X 0 0 Y 0 0 0 0    0 3 2 2 2 0 −Z 0 0 −X −Y 0 0 0 YZ Z    , ϕ5 = ψ5 =   Z2 Z2  0 0 0 −Y X 0 0 0 0 0    Z3 2 2 0 0 0 Y 0 0 X −YZ 0 0 0      0  0 0 −Y 0 0 0 0 −X 0 0 Z    0 2 3 2 4 0 −Y −Z 0 0 YZ 0 0 −X −Z 0     2  0 Y 0 0 Z 0 0 0 0 −Z X 0 Y2 0 0 0 −YZ 2 0 0 0 Z4 0 0 X   where coker(ϕ j ) has rank two for j ∈ {1, 8}, rank three for j ∈ {2, 6}, rank four for j ∈ {3, 7}, rank five for j = 4 and rank six for j = 5. Since there are no non-trivial modules of rank one, the Picard-group of R is trivial and all syzygy modules will be syzygy modules of m-primary ideals. Note that (ϕ1 , ψ1 ) and (ϕ8 , ψ8 ) are equivalent to the matrix factorizations from Example 3.30 with d1 = 2, d2 = 3, d3 = 5, a = b = 1 and c = 1 resp. c = 3. We get the isomorphisms coker(ϕ1 )  SyzR (X, Y, Z)  SyzR (X, Y 2 , Z 4 )  SyzR (X, Y 2 , Z)  SyzR (X, Y, Z 4 ), 104 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES coker(ϕ8 )  SyzR (X, Y, Z 2 )  SyzR (X, Y 2 , Z 3 )  SyzR (X, Y 2 , Z 2 )  SyzR (X, Y, Z 3 ). Now we Äshowäthat all other modules coker(ϕ j ) are selfdual. This is obvious for j = 4, 5. 0 1 . Then the morphisms (α , β ) : (ϕ , ψ ) −→ (ϕT , ψT ) given by Let α := −1 j j j j j j 0 Ö α2 = −β2 = Ö α6 = −β6 = è α 0 0 0 α 0 0 0 α −α 0 0 0 α 0 0 0 α á α3 = β3 = −α 0 0 0 á α7 = −β7 = , è , ë 0 0 0 α 0 0 0 −α 0 0 0 −α α 0 0 0 0 −α 0 0 0 0 α 0 0 0 0 −α , ë are equivalences of matrix factorizations. We continue with the computations of representations as syzygy modules. Considering ψ2 and ψ6 we have to delete two columns. The following choices {l, m} are not possible, since they give matrices with all three-minors vanishing in the given point: point deleted columns from ψ2 deleted columns from ψ6 (0, 1, −1) {1, 4} ∨ {1, 6} ∨ {4, 6} {2, 4} ∨ {2, 6} ∨ {4, 6} (1, −1, 0) {1, 5} ∨ {2, 6} ∨ {3, 4} {1, 6} ∨ {2, 5} ∨ {3, 4} (1, 0, −1) {1, 2} ∨ {3, 6} ∨ {4, 5} {1, 4} ∨ {2, 3} ∨ {5, 6}. All other choices give isomorphisms coker(ϕ2 )  SyzR (F1 , F2 , F3 , F4 ) with deleted columns 1, 3 2, 3 2, 4 2, 5 3, 5 5, 6 F1 F2 F3 F4 2 2 Y −XZ −Z XY 2 4 Y −Z X YZ 3 4 XY Z −Y 2 XZ 3 YZ −X Y 2 Z4 Z2 X YZ −Y 2 4 XZ −Z Y 2 XY 3.8. THE CASE E8 105 and coker(ϕ6 )  SyzR (F1 , F2 , F3 , F4 ) with deleted columns F1 F2 F3 2 1, 2 −Y −XY Z 3 1, 3 Y 2 YZ 2 X 3 1, 5 Z X −Y 2 3, 5 −X YZ Z3 4 3, 6 Z XY XZ 2 4, 5 Y2 XZ −Z 3 F4 XZ 2 −Z 4 YZ 2 Y2 −Y 2 XY. We get isomorphisms coker(ϕ3 )  SyzR (F1 , . . . , F5 ) with deleted columns F1 F2 F3 F4 F5 1, 3, 5 XY −Y 2 Z XZ 2 Z3 X2 1, 5, 8 XZ 3 X 2 −YZ 4 −XY 2 −Y 2 Z 2, 4, 7 Y 2 Z −XY Z4 −X 2 XZ 3 2 4 2, 5, 7 XZ Y −Z XY −YZ 3 3, 5, 7 Z3 Y2 XZ YZ 2 XY 3 2 2 2 4, 6, 7 YZ X −XZ −Y Z −XY 2 . We can represent coker(ϕ7 ) as SyzR (F1 , . . . , F5 ) with deleted columns F1 F2 F3 F4 F5 2 2 2 4 1, 2, 3 −X XY −Y Z Z −XZ 3 1, 3, 7 Z 4 −XY Y2 XZ 2 −YZ 3 2 2 4 2, 3, 4 X −XZ YZ Y 2 Z −XY 2 3, 5, 7 Y 2 −XZ −YZ 2 Z4 XY 2 4 2 5, 6, 7 XY Y Z −Z −XZ X2 3 4 2 2 2 6, 7, 8 XZ YZ Y Z XY X2. In all other cases the resulting matrix has vanishing four-minors in (at least) one of the “test points” (0, 1, −1), (1, 0, −1) and (1, −1, 0). Similarly, we have coker(ϕ4 )  SyzR (F1 , . . . , F6 ) with deleted columns 1, 2, 3, 5 1, 2, 3, 6 1, 2, 4, 6 1, 2, 5, 7 1, 3, 5, 7 3, 5, 7, 9 3, 5, 9, 10 3, 6, 9, 10 6, 7, 8, 9 F1 F2 F3 F4 F5 F6 −XY 2 Z6 −X 2 XYZ 2 YZ 3 XZ 4 −Y 4 Z6 −XY 2 Y 3 Z 2 −XZ 3 Y 2Z4 Y4 XZ 4 Y 2Z3 XY 3 −X 2 Z XY 2 Z 2 2 3 4 −X XZ YZ XY 2 Y 2Z XYZ 2 X2 −XYZ −Y 2 Z 2 XZ 3 Z4 −XY 2 Z4 XY −Y 2 Z XZ 2 YZ 3 −Y 3 3 4 2 6 3 −XZ YZ XY Z −Y −XYZ 2 Y 2 Z 3 XZ 4 X2Y −Z 6 −XY 2 −X 2 Z 2 4 2 3 −YZ XY XZ X 2 Z −Y 2 Z 2 X 2 Y. In all other cases the resulting matrix has vanishing five-minors in one of the test points. 106 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES Finally, we can represent coker(ϕ5 ) as SyzR (F1 , . . . , F7 ) with deleted columns F1 1, 3, 4, 6, 11 −X 2 Z 2 1, 3, 5, 6, 11 −XZ 4 1, 3, 5, 7, 11 −YZ 4 1, 3, 7, 9, 11 Y 2Z2 1, 7, 9, 10, 11 XYZ 2 2, 3, 5, 7, 9 −XY 2 2, 3, 5, 7, 12 Y 2Z4 3, 5, 7, 9, 11 X2 7, 8, 9, 10, 11 Y4 F2 F3 F4 F5 F6 F7 −Y 4 XZ 4 −XY 3 Y 2 Z 3 YZ 6 XY 2 Z 2 −Y 4 Z6 −Y 3 Z 2 −XY 2 −XYZ 3 Y 2 Z 4 XY 2 −Z 6 XYZ 2 X2 −Y 2 Z 3 −XZ 4 3 2 4 2 XZ X YZ −XY −Z 6 XYZ 2 Z 6 −Y 2 Z 3 −XY 2 XZ 4 Y4 −Y 3 Z 2 Y 3 Z −XYZ 2 Y 2 Z 3 XZ 4 Z5 Y4 3 6 2 2 4 2 3 XY YZ XY Z −Y X Z XZ 4 Z 5 −XYZ −Y 2 Z 2 −XZ 3 YZ 4 −XY 2 YZ 5 −XZ 4 XY 2 Z −Y 2 Z 3 −X 2 Z 2 XY 3 . In all other cases the resulting matrix has vanishing six-minors in one of test points. Theorem 3.42. The pairwise non-isomorphic modules M1 = SyzR (X, Y, Z), M2 = SyzR (X, Y 2 , YZ, Z 2 ), M3 = SyzR (XY, XZ, Y 2 , YZ 2 , Z 3 ), M4 = SyzR (XY, XZ 2 , Y 3 , Y 2 Z, YZ 3 , Z 4 ), M5 = SyzR (XY 2 , XYZ 2 , XZ 4 , Y 4 , Y 3 Z, Y 2 Z 3 , Z 5 ), M6 = SyzR (X, Y 2 , YZ, Z 3 ), M7 = SyzR (XY, XZ, Y 2 , YZ 2 , Z 4 ), M8 = SyzR (X, Y, Z 2 ) give a complete list of representatives of the isomorphism classes of indecomposable, non-free, maximal Cohen-Macaulay modules. Moreover, all M j are selfdual. 3.9. An idea of a purely algebraic construction of the isomorphisms In this section we explain an idea how to find the isomorphisms from the previous sections with purely algebraic methods. Given a matrix factorization (ϕ, ψ) of size n and rank m, we want an isomorphism from coker(ϕ) to SyzR (I), where I := (F1 , . . . , Fm+1 ) is an ideal (with unknown generators). Let f : Rm+1 −→ R be the map h(F1 , . . . , Fm+1 )T , _i. Our goal is to find the Fi . Since we want to restrict the map ϕ to Rm+1 , the idea is to factor f as f = p ◦ ϕ ◦ ι with linear maps ι : Rm+1 −→ Rn and p : Rn −→ R. We restrict ourselves to inclusions ι that send the standard base vectors of Rm+1 to (pairwise different) standard base vectors of Rn . To simplify notation, lets assume im(ι) = Rm+1 × {0}n−m−1 . In this case ιT is right-inverse to ι, giving pϕ = f ιT . But f ιT is f on the first m + 1 components and zero on the last n − 1 − m components. Therefore p has to be a syzygy for the last n − 1 − m columns of ϕ and for the first m + 1 columns of ϕ we get pϕc,i = fi , where ϕc,i denotes the i-th column of ϕ 3.9. AN IDEA OF A PURELY ALGEBRAIC CONSTRUCTION OF THE ISOMORPHISMS 107 (i ∈ {1, . . . , m + 1}). From the commutative diagram / 0 / 0 / ker(ϕ) / ker( f ) ϕ Rn / Rn p ιT  f Rm+1 /  R we get an induced map ker(ϕ) −→ ker( f ), which is in fact an inclusion. Then one has to show that this inclusion is surjective, which is equivalent to the condition that ker(ϕ) −→ ker( f ) splits, since ker(ϕ) is indecomposable and has the same rank as ker( f ). Example 3.43. Let R := k[X, Y, Z]/(X d1 + Y d2 + Z d3 ) with di ∈ N≥2 and consider the matrix á ϕ= Xa Yb Zc 0 d −b d −a 2 1 −Y X 0 Zc −Z d3 −c 0 X d1 −a −Y b d −c 0 −Z 3 Y d2 −b X a from Example 3.30. Choosing p := (1, 0, 0, 0) and á ι := 1 0 0 0 0 1 0 0 ë ë 0 0 1 0 , we get pϕι = (X a , Y b , Z c ). Therefore we get the inclusion ker(ϕ) −→ SyzR (X a , Y b , Z c ). We have to show that this map splits. That means we have to show that every (A, B,C) ∈ SyzR (X a , Y b , Z c ) extends uniquely to an element s ∈ ker(ϕ), which has to be of the form (A, B,C, D), since ιT (s) = (A, B,C) (this already shows that there is at most one extension). Multiplying AX a + BY b + CZ c = 0 by −Y d2 −b gives − AX a Y d2 −b − BY d2 − CY d2 −b Z c =0 ⇐⇒ − AX a Y d2 −b + B(X d1 + Z d3 ) − CY d2 −b Z c =0 ⇐⇒X a (−AY d2 −b + BX d1 −a ) − Z c (−BZ d3 −c + CY d2 −b ) = 0. Since X a and Z c are coprime in R this gives −AY d2 −b + BX d1 −a = −Z c D and − BZ d3 −c + CY d2 −b = −X a D for some D ∈ R. Similarly, multiplying AX a + BY b + CZ c = 0 by −Z d3 −c gives − AX a Z d3 −c − BY b Z d3 −c − CZ d3 =0 ⇐⇒ − AX a Y d2 −b + BY b Z d3 −c + C(X d1 + Y d2 ) =0 ⇐⇒X a (−AY d2 −b + CX d1 −a ) + Y b (−BZ d3 −c + CY d2 −b ) =0 ⇐⇒X a (−AY d2 −b + CX d1 −a ) − X a Y b D = 0. The last line is equivalent to −AY d2 −b + CX d1 −a = Y b D, since X a is a non-zero divisor. Now we can extend (A, B,C) ∈ SyzR (X a , Y b , Z c ) uniquely to (A, B,C, D) ∈ ker(ϕ). 108 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES Note that ϕ and ϕι had the same rank in this example. But this is not true in general. Example 3.44. Let R := k[X, Y, Z]/(X 2 + Y n−1 + YZ 2 ) and consider á ϕm := −X 0 Z Y n−1−m/2 0 YZ Y m/2 −X Y n−1−m/2 −Z Y m/2 X 0 −YZ 0 X ë for m even. In this case we may choose p to be either (1, 0, 0, 0) or (0, 0, 0, 1). In these cases ι is the map (r1 , r2 , r3 ) 7→ (0, r1 , r2 , r3 ) resp. (r1 , r2 , r3 ) 7→ (r1 , r2 , r3 , 0). For the first pair (p, ι) we get pϕm ι = (−X, Y n−1−m/2 , −Z) and for the second pair we get pϕm ι = (Z, Y m/2 , X). In both cases we already saw that ker(ϕm )  coker(ϕm ) is isomorphic to the first syzygy modules of these ideals. But the rank of ϕm ι in the point (0, 0, 1) is only one for both choices. Choosing ι to embed R3 inside R4 outside the second resp. the third component (in these cases the rank of ϕm ι would be two in every point), one gets f = (−X, YZ, Y m/2 ) resp. f = (Y n−1−m/2 , −YZ, X), whose first syzygy modules are not isomorphic to ker(ϕm ): In the first case we have to find a B which extends (0, Y m/2−1 , −Z) to (0, B, Y m/2−1 , −Z) ∈ ker(ϕm ). The third row of ϕm gives the condition BY m/2 + Y m/2−1 X = 0, which is equivalent to X = −BY. This is a contradiction. Similarly, if the syzygy (Z, Y n−2−m/2 , 0) in the second case would extend to (Z, Y n−2−m/2 ,C, 0) ∈ ker(ϕm ), the second row of ϕm gives −XY n−2−m/2 + CY n−1−m/2 = 0, which is equivalent to X = CY. The last example already showed that this approach causes a lot of troubles: (i) There is no canonical choice for ι. Even the ranks of ϕ and ϕι might be different in some points. (ii) To find p one has to find a simultaneous syzygy for up to five column vectors of length up to twelve. (iii) Even if one finds possible maps ι and p, the induced inlusion ker(ϕ) −→ SyzR ( f ) might not be surjective. All those disadvantages have analogues in the geometric approach from the third section. But in the geometric approach these analogues are advantages (at least in all our explicit examples): (i) For every choice of columns such that the rank of the reduced matrix remains the same, one gets a representation. (ii) The generators of the ideal can be computed from the rows of the reduced matrices. (iii) There are no “false friends“, meaning that everything that looks like a solution is in fact a solution. 3.10. A comment on the graded situation Since we want to use the results from this chapter to control the Frobenius pull-backs of the sheaves SyzC (X, Y, Z), where C B Proj(R), we need a graded version of our results. Therefore we summarize briefly Chapter 15 of [Yos90] (the original paper is [AR89]). 3.10. A COMMENT ON THE GRADED SITUATION 109 Let R be a positively-graded, Cohen-Macaulay ring with R0 = k a field. Denote by m the graded maximal ideal and by R̂ the m-adic completion of R. We will need the following categories. symbol objects morphisms grC(R) finitely generated graded R-modules degree-preserving homomorphisms grM(R) graded maximal C-M R-modules degree-preserving homomorphisms C(R̂) finitely generated R̂-modules homomorphisms M(R̂) maximal C-M R̂-modules homomorphisms We say that R is of finite graded Cohen-Macaulay type if there are - up to degree shift - only finitely many isomorphism classes of graded, indecomposable, non-free, maximal Cohen-Macaulay modules. The goal is to find a relation between the (graded) indecomposable, maximal Cohen-Macaulay modules over R and over R̂. Recall that taking the m-adic completion −̂ is a functor from grM(R) to M(R̂) that restricts to a functor from grC(R) to C(R̂). We get the following lemma (cf. [Yos90, Lemma 15.2]). Lemma 3.45. (i) If M ∈ grM(R) is indecomposable, then M̂ ∈ M(R̂) is indecomposable. (ii) If M, N ∈ grM(R) are indecomposable such that M̂  N̂ in M(R̂), then M  N in grM(R) up to degree shift. An immediate consequence of the previous lemma is, that R is of finite graded CohenMacaulay type if R̂ is of finite Cohen-Macaulay type. Moreover, the graded analogous of the Theorems 3.38 - 3.42 still give a full list of representatives of the isomorphism classes of graded, indecomposable, non-free, maximal Cohen-Macaulay R-modules. But so far we might have repetitions in the lists. At least if R0 = k is perfect, we can get rid of this. First we need a definition. Definition 3.46. (i) We call a finitely generated R̂-module M graduable if there exists a finitely generated graded R-module A such that   M. (ii) An R̂-homomorphism f : M → N with M, N graduable is called a graduable homomorphism if there is a graded homomorphism of finitely generated graded R-modules A, B, such that the following diagram of R̂-modules and homomorphisms commutes. M  N /  f  /   ĝ B̂. The next theorem, proven by Auslander and Reiten, gives the promised converse. Theorem 3.47 (Auslander, Reiten). Suppose R0 = k is perfect. If R is of finite graded Cohen-Macaulay type, then R̂ is of finite Cohen-Macaulay type. Moreover, in this case all maximal Cohen-Macaulay R̂-modules are graduable. Proof. See [Yos90, Theorem 15.14].  110 3. MATRIX FACTORIZATIONS AND REPRESENTATIONS AS FIRST SYZYGY MODULES As a consequence of the last theorem, we obtain that the following definition makes sence. Definition 3.48. Let S = k[X1 , . . . , Xm ] be positively-graded with k a perfect field. Let f ∈ S +2 be homogeneous of degree d. Then a graded matrix factorization for f of size m is a pair of m × m matrices ϕ, ψ with entries in S , such that ϕ ◦ ψ = ψ ◦ ϕ = f · idm and the morphisms given by ϕ resp. ψ are homogeneous of degree zero resp. d. A morphism from a matrix factorization into another is again a pair of matrices (α, β) such that the corresponding diagram commutes and the morphism given by α and β are homogeneous of degree zero. By Theorem 3.47, the isomorphisms coker(ϕ)  SyzR (F1 , . . . , Fm+1 ) of (ungraded) Rmodules constructed in the last sections, are graduable in the sence that they hold in the graded situation up to a degree shift. But this shift cannot be computed with the definition of a graded matrix factorization, since the modules coker(ϕ) have no “natural” grading. We illustrate this by an example. Example 3.49. Consider the hypersurface R := k[X, Y, Z]/(X n + YZ) of type An−1 with n ≥ 1, graded by deg(X) = 2 and deg(Y) = deg(Z) = n. Let S := k[X, Y, Z]. From the matrix factorizations ÇÇ å Ç åå Y X n−m Z X n−m (ϕm , ψm ) = , m X m −Z X −Y we obtained the isomorphisms coker(ϕm )  SyzR (X m , −Z)  SyzR (Y, X n−m ). (3.7) For all η ∈ Z the sequence ψm ϕm S (−η − 2m + n) ⊕ S (−η) −→ S (−η − 2m + 2n) ⊕ S (−η + n) −→ S (−η − 2m + n) ⊕ S (−η) shows that (ϕm , ψm ) are graded matrix factorizations for X n + YZ. Reducing the above sequence by X n + YZ, we obtain the short exact sequence 0 → im(ψm ) → R(−η − 2m + n) ⊕ R(−η) → im(ϕm ) → 0. The presenting sequences of the syzygy modules in (3.7) are / 0 0 / / SyzR (X m , −Z) SyzR (Y, X n−m ) / / R(−2m) ⊕ R(−n) R(−n) ⊕ R(−2n + 2m) / (X m , Z) / 0, (Y, X n−m ) / 0. Choosing η = n, we obtain coker(ϕm )  SyzR (X m , −Z) as graded modules and coker(ϕm )  SyzR (Y, X n−m ) is an isomorphism of graded modules, if we choose η = 2n − 2m. Since every value of η is as good as any other, the ungraded isomorphisms coker(ϕ)  SyzR (F1 , . . . , Fm+1 ) have no natural graded analogues. CHAPTER 4 The Hilbert-series of first syzygy modules of certain monomial ideals in N-graded rings of the form k[X, Y1 , . . . , Yn ]/(X d − F(Y1 , . . . , Yn )) The main results of this chapter are the Theorems 4.5 and 4.7, which allow us to compute the Hilbert-series of certain syzygy modules. In the second section we will compute the Hilbert-series of the syzygy modules representing the isomorphism classes of the non-free, indecomposable, maximal Cohen-Macaulay modules over surface rings of type ADE. We will see that in many cases these Hilbert-series carry enough information to detect the isomorphism class of a given indecomposable, maximal Cohen-Macaulay module. It contains also enough information to exclude many possible splitting behaviours of a given maximal Cohen-Macaulay module. Note that we will always work with the description of the Hilbert-series as rational functions und call these rational functions again Hilbert-series. 4.1. A short exact sequence The goal of this section is to provide an invariant for the modules SyzR (F1 , . . . , Fn ) from Theorems 3.38-3.42. This invariant should be efficiently computable for the modules q q SyzR (F1 , . . . , Fn ) at least in the case where n = 3 and the Fi are monomials. One idea was to use the Hilbert-series as invariant. But how to compute it for various powers pe of various primes? The solution to this question was inspired by a work of Brenner who showed that on a standard-graded projective curve C := Proj(R) with R := k[X, Y, Z]/(X d − F(Y, Z)) all generators of SyzC (X a , Y b , Z c ) (with a, b, c ∈ N≥1 ) come from (P1k )2 = (Proj(k[Y, Z]))2 (cf. [Bre05b, Lemma 1.1]). We give the precise statement. Lemma 4.1. Let k be a field and let F(Y, Z) ∈ k[Y, Z] be a homogeneous polynomial of degree d. Assume that the projective curve C := Proj(k[X, Y, Z]/(X d − F(Y, Z))) is smooth. Let a, b, c ∈ N≥1 and let a = dq + r with 0 ≤ r < d and q ∈ N. Then there exists for every m ∈ Z a surjective morphism SyzC (F q , Y b , Z c )(m − r) ⊕ SyzC (F q+1 , Y b , Z c )(m) → SyzC (X a , Y b , Z c )(m). Let k be a field and R := k[X, Y1 , . . . , Yn ]/(X d − F(Y1 , . . . , Yn )) with deg(X) = α, deg(Yi ) = βi and F homogeneous of degree dα (d, n, α, βi ∈ N≥1 ). Let V1 , . . . , Vm+l be monomials in the Yi with m, l ≥ 1 and let a ∈ N≥1 . The goal of this section is to compute the Hilbert-series of R-modules of the form SyzR (X a · V1 , . . . , X a · Vm , Vm+1 , . . . , Vm+l ). 111 112 4. HILBERT-SERIES OF FIRST SYZYGY MODULES OF MONOMIAL IDEALS Definition 4.2. With the previous notations we define for j ∈ N the module S j := SyzR (F j · V1 , . . . , F j · Vm , Vm+1 , . . . , Vm+l ). Lemma 4.3. Let a = d · q + r with 0 ≤ r ≤ d − 1 and q ∈ N. Then the homogeneous map ϕ s : Sq (s − α · r) ⊕ Sq+1 (s) −→ SyzR (X a · V1 , . . . , X a · Vm , Vm+1 , . . . , Vm+l )(s), which sends ( f1 , . . . , fm+l ), (g1 , . . . , gm+l ) to ( f1 + X d−r · g1 , . . . , fm + X d−r · gm , X r · fm+1 + gm+1 , . . . , X r · fm+l + gm+l ) is surjective for all s ∈ Z. Proof. We check that the restriction of ϕ s to each direct summand is well-defined. Let ( f1 , . . . , fm+l ) ∈ Sq (s − α · r). The computation f1 · X a · V1 + . . . + fm · X a · Vm + X r · fm+1 · Vm+1 + . . . + X r · fm+l · Vm+l = X r · ( f1 · X dq · V1 + . . . + fm · X dq · Vm + fm+1 · Vm+1 + . . . + fm+l · Vm+l ) = X r · ( f1 · F q · V1 + . . . + fm · F q · Vm + fm+1 · Vm+1 + . . . + fm+l · Vm+l ) =0 shows that the restriction of ϕ s to Sq (s − α · r) is well-defined (it has the correct degree, since every summand of the term in brackets in the last line is homogeneous of degree s − α · r and X r has degree α · r). Now let (g1 , . . . , gm+l ) ∈ Sq+1 (s). In this case we compute X d−r · g1 · X a · V1 + . . . + X d−r · gm · X a · Vm + gm+1 · Vm+1 + . . . + gm+l · Vm+l = g1 · F q+1 · V1 + . . . + gm · F q+1 · Vm + gm+1 · Vm+1 + . . . + gm+l · Vm+l = 0, which shows that the restriction of ϕ s to Sq+1 (s) is well-defined (it has the correct degree, since every summand in the last line has degree s). We now check the surjectivity. Let h := (h1 , . . . , hm+l ) ∈ SyzR (X a · V1 , . . . , X a · Vm , Vm+1 , . . . , Vm+l )(s). We write hi := hi,0 + hi,1 X + . . . + hi,d−2 X d−2 + hi,d−1 X d−1 with hi, j ∈ k[Y1 , . . . , Yn ] for i = 1, . . . , m + l and j = 0, . . . , d − 1. From the equation h1 · X a · V1 + . . . + hm · X a · Vm + hm+1 · Vm+1 + . . . + hm+l · Vm+l = 0 we get a system of equations by considering the k[Y1 , . . . , Yn ]-coefficients corresponding to X j for j = 0, . . . , d − 1. Explicitly, these equations are 0 = h1,σ( j) · X σ( j) · X a · V1 + . . . + hm,σ( j) · X σ( j) · X a · Vm (4.1) + hm+1, j · X j · Vm+1 + . . . + hm+l, j · X j · Vm+l , where σ( j) ∈ {0, . . . , d − 1} with σ( j) ≡ j − r modulo d. Since we have h= d−1 X j=0 (h1,σ( j) · X σ( j) , . . . , hm,σ( j) · X σ( j) , hm+1, j · X j , . . . , hm+l, j · X j ), 4.1. A SHORT EXACT SEQUENCE 113 we may assume h to be one of those summands for a fixed j, hence h := (h1,σ( j) · X σ( j) , . . . , hm,σ( j) · X σ( j) , hm+1, j · X j , . . . , hm+l, j · X j ). We will show that h comes either from Sq (s − α · r) or from Sq+1 (s). For j < r, we have σ( j) = j−r +d. Factoring out X j in equation (4.1) and using X a = F q X r , we get 0 = X j · (h1,σ( j) · X d−r · X r · F q · V1 + . . . + hm,σ( j) · X d−r · X r · F q · Vm + hm+1, j · Vm+1 + . . . + hm+l, j · Vm+l ) = X j · (h1,σ( j) · F q+1 · V1 + . . . + hm,σ( j) · F q+1 · Vm + hm+1, j · Vm+1 + . . . + hm+l, j · Vm+1 ). This shows that X j (h1,σ( j) , . . . , hm,σ( j) , hm+1, j , . . . , hm+l, j ) belongs to Sq+1 (s). Under ϕ s it is mapped to h. For j ≥ r, we have σ( j) = j − r. Again by using X a = F q X r , we get from equation (4.1) 0 = h1,σ( j) · X σ( j) · X r · F q · V1 + . . . + hm,σ( j) · X σ( j) · X r · F q · Vm + hm+1, j · X σ( j)+r · Vm+1 + . . . + hm+l, j · X σ( j)+r · Vm+l = X r · (h1,σ( j) · X σ( j) · F q · V1 + . . . + hm,σ( j) · X σ( j) · F q · Vm + hm+1, j · X σ( j) · Vm+1 + . . . + hm+l, j · X σ( j) · Vm+l ). This shows that X σ( j) · (h1,σ( j) , . . . , hm,σ( j) , hm+1, j , . . . , hm+l, j ) belongs to Sq (s − α · r). Under ϕ s it is mapped to h.  Lemma 4.4. The homogeneous map ψ s : SyzR (X a+d−2r · V1 , . . . , X a+d−2r · Vm , Vm+1 , . . . , Vm+l )(s − α · r) −→ Sq (s − α · r) ⊕ Sq+1 (s), which sends (h1 , . . . , hm+l ) to (X d−r · h1 , . . . , X d−r · hm , hm+1 , . . . , hm+l ), (−h1 , . . . , −hm , −X r · hm+1 , . . . , −X r · hm+l ) is injective for all s ∈ Z. Proof. Clearly, these maps are injective, provided they exist. The power X a+d−2r is well-defined, since a + d − 2r = dq + r + d − 2r = dq + d − r is positive for r < d. Let h := (h1 , . . . , hm+l ) ∈ SyzR (X a+d−2r · V1 , . . . , X a+d−2r · Vm , Vm+1 . . . , Vm+l )(s − α · r). Then the first component of the image of h satisfies X d−r · h1 · F q · V1 + . . . + X d−r · hm · F q · Vm + hm+1 · Vm+1 + . . . + hm+l · Vm+l =h1 · X a+d−2r · V1 + . . . + hm · X a+d−2r · Vm + hm+1 · Vm+1 + . . . + hm+l · Vm+l = 0. The second component of the image of h satisfies (use F q = X a−r ) − h1 · F q+1 · V1 − . . . − hm · F q+1 · Vm − X r · hm+1 · Vm+1 − . . . − X r · hm+l · Vm+l = − X r · (h1 · X a+d−2r · V1 + . . . + hm · X a+d−2r · Vm + hm+1 · Vm+1 + . . . + hm+l · Vm+l ) = 0.  114 4. HILBERT-SERIES OF FIRST SYZYGY MODULES OF MONOMIAL IDEALS Theorem 4.5. For all s ∈ Z we have a short exact sequence 0 −→ SyzR (X a+d−2r · V1 , . . . , X a+d−2r · Vm , Vm+1 , . . . , Vm+l )(s − α · r) ψs −→ Sq (s − α · r) ⊕ Sq+1 (s) ϕs −→ SyzR (X a · V1 , . . . , X a · Vm , Vm+1 , . . . , Vm+l )(s) −→ 0. Proof. By the two previous lemmatas we only have to check the exactness at the middle spot. At first we show ϕ s ◦ ψ s = 0. With h := (h1 , . . . , hm+l ) ∈ SyzR (X a+d−2r · V1 , . . . , X a+d−2r · Vm , Vm+1 , . . . , Vm+l )(s − α · r) we have ϕ s (ψ s (h)) = ϕ s ((X d−r · h1 , . . . , X d−r · hm , hm+1 , . . . , hm+l ), (−h1 , . . . , −hm , −X r · hm+1 , . . . , −X r · hm+l )) = (X d−r · h1 + X d−r · (−h1 ), . . . , X d−r · hm + X d−r · (−hm ), X r · hm+1 + (−X r · hm+1 ), . . . , X r · hm+l + (−X r · hm+l )) = (0, . . . , 0). Let t := ( f1 , . . . , fm+l ), (g1 , . . . , gm+l ) ∈ ker ϕ s . This yields fi + X d−r gi = 0 for all i = 1, . . . , m X r fi + gi = 0 for all i = m + 1, . . . , m + l and we get t = (−X d−r g1 , . . . , −X d−r gm , fm+1 , . . . , fm+l ), (g1 , . . . , gm , −X r fm+1 , . . . , −X r fm+l ) = ψ s (−g1 , . . . , −gm , fm+1 , . . . , fm+l ).  Remark 4.6. Note that the syzygy modules Sq and Sq+1 appearing in the middle spot are already defined over k[Y1 , . . . , Yn ]. If n = 2 they split by Hilberts syzygy theorem as a direct sum of m + l − 1 (degree shifted) copies of R. Theorem 4.7. Let M := SyzR (X a · V1 , . . . , X a · Vm , Vm+1 , . . . , Vm+l ). Then the Hilbert-series of M is given by H M (t) = (tα·r − tα·d ) · HSq (t) + (1 − tα·r ) HSq+1 (t) . 1 − tα·d Proof. Let a0 := a + d − 2r = dq + d − r, r0 := d − r and 0 0 M 0 := SyzR (X a · V1 , . . . , X a · Vm , Vm+1 , . . . , Vm+l ). Since a0 + d − 2r0 = a, Theorem 4.5 yields H M (t) = tα·r HSq (t) + HSq+1 (t) − tα·r H M 0 (t) H M 0 (t) = tα·r HSq (t) + HSq+1 (t) − tα·r H M (t). 0 0 Substituting H M 0 (t) in the first formula and solving for H M (t) gives the result.  4.2. EXAMPLES 115 4.2. Examples Using the representation of the isomorphism classes of indecomposable, non-free, maximal Cohen-Macaulay modules over surface rings of type ADE as first syzygy modules of ideals from Chapter 3, Theorem 4.7 enables us to compute their Hilbert-series if the ideal in the representation is monomial. If the ideal in the representation is not monomial, we compute the Hilbert-series of the syzygy module directly, using the short exact sequences 0 → SyzR (F1 , . . . , Fm+1 ) → 0 → (F1 , . . . , Fm+1 ) → Lm+1 i=1 R(− deg(Fi )) → (F1 , . . . , Fm+1 ) → 0, R → R/(F1 , . . . , Fm+1 ) → 0. From these sequences one obtains Ñ (4.2) HSyzR (F1 ,...,Fm+1 ) (t) = m+1 X é tdeg(Fi ) − 1 · HR (t) + HR/(F1 ,...,Fm+1 ) (t). i=1 We start with a few remarks on the expected structure of the Hilbert-series. This structure is given by the following lemma (cf. [BH98, Exercise 4.4.12]). Lemma 4.8. Let R be a positively-graded algebra over a field k. Let M , 0 be a finitely generated R-module and S a graded Noether normalization of R/ Ann(M) generated by elements of degree a1 , . . . , ad with d = dim(M). Then the following holds. (i) There is a polynomial Q(t) ∈ Z[t, t−1 ] such that Q(t) . ai i=1 (1 − t ) H M (t) = Qd (ii) We have Q(1) = rankS (M) > 0. (iii) If M is Cohen-Macaulay, the coefficients of Q(t) are non-negative. Since the modules in question are maximal Cohen-Macaulay, the coefficients in Q(t) will be non-negative and d = 2. Since Ann(M) = 0 in all cases, the Noether normalization S of R/ Ann(M) is in fact a Noether normalization of R. This can be chosen to be generated by two parameters from R. Since the equation of the An singularities is isomorphic to X 2 + Y 2 + Z n+1 = 0 (if char(k) , 2), we may choose Y, Z as a parameter system in all cases. Then the rank of R over S is two (since R  S [X]/(X 2 + F(Y, Z))) and we get Q(1) = rankS (M) = 2 · rankR (M). We will always express the Hilbert-series as a rational function, since the explicit descriptions as power series are not very enlighting. Note that the isomorphisms M  SyzR (F1 , . . . , Fn ) from Chapter 3 are only isomorphisms of R-modules. By Theorem 3.47, these isomorphisms extend after a degree shift to isomorphisms of graded R-modules, say M(−l)  SyzR (F1 , . . . , Fn ) as graded R-modules for some l ∈ Z. In this situation, we have H M (t) = tl · HSyzR (F1 ,...,Fn ) (t). Note that we will always compute the Hilbert-series of the syzygy module. 116 4. HILBERT-SERIES OF FIRST SYZYGY MODULES OF MONOMIAL IDEALS 4.2.1. The case An . Let R := k[X, Y, Z]/(X n+1 −YZ) with deg(X) = 2, deg(Y) = deg(Z) = n + 1 and n ≥ 0. For any i ∈ {1, . . . , n}, let Mi := SyzR (X i , Z) (compare Theorem 3.38). With the notations from Theorem 4.7, we have a = i and d = 2n + 2. In all cases for i, we get q = 0 and r = i. Hence the syzygy modules S 0 and S 1 are SyzR (1, Z) resp. SyzR (YZ, Z) for all i. They are free with basis (Z, −1) resp. (1, −Y) of total degrees n + 1 and 2n + 2. By Theorem 4.7 we get (t2i − t2(n+1) )tn+1 + (1 − t2i )t2n+2 (1 − t2 )(1 − tn+1 )2 t2i+n+1 + t2n+2 = (1 − t2 )(1 − tn+1 ) Note that all these Hilbert-series are different. Since the Hilbert-series of a free R-module of rank one is given by H Mi (t) = 1 + tn+1 1 − t2n+2 l , = t · (1 − t2 )(1 − tn+1 )2 (1 − t2 )(1 − tn+1 ) we see that the Hilbert-series of the Mi is different from the Hilbert-series of a free Rmodule, since the difference of the exponents in the numerator is |n + 1 − 2i| for Mi and n + 1 for R(−l). Therefore, the Hilbert-series of a maximal Cohen-Macaulay module of rank one tells us not to which isomorphism class the module belongs, since in this situation the dual modules SyzR (X i , Z) and SyzR (X i , Y) have the same Hilbert-series. In such a situation we will simply say that the Hilbert-series detects the isomorphism class up to dualizing. Note that we have a homogeneous isomorphism HR(−l) (t) = tl · SyzR (X j , Y) ⊕ Syz(X j , Z) −→ SyzR (X j , Y, Z), ((A, B), (C, D)) 7−→ (A + C, B, D), for all j ∈ N, which gives directly the Hilbert-series of SyzR (X j , Y, Z) as HSyzR (X j ,Y,Z) (t) = HSyzR (X j ,Y) (t) + HSyzR (X j ,Z) (t)   t2n+2 + t2 j+n+1   2 ·   (1 − t2 )(1 − tn+1 ) =   2j  2·t · if 1 ≤ j ≤ n and 1 + tn+1 otherwise. (1 − t2 )(1 − tn+1 ) 4.2.2. The case Dn . Let R := k[X, Y, Z]/(X 2 + Y n−1 + YZ 2 ) with n ≥ 4 and the degrees of the variables are deg(X) = n − 1, deg(Y) = 2, deg(Z) = n − 2. According to Theorem 3.39 let M1 := SyzR (X, Y), M j := SyzR (X, Y j/2 , Z) if j ∈ {2, . . . , n − 2} is even, M j := SyzR (X, Y ( j+1)/2 , YZ) if j ∈ {2, . . . , n − 2} is odd, Mn−1 := SyzR (X, Z − iY (n−2)/2 ) and Mn := SyzR (X, Z + iY (n−2)/2 ) if n is even, or 4.2. EXAMPLES 117 Mn−1 := SyzR (Z, X + iY (n−1)/2 ) and Mn := SyzR (Z, X − iY (n−1)/2 ) if n is odd. Using Theorem 4.7, we get H M1 (t) = = H M j (t) = = H M j (t) = = (tn−1 − t2n−2 ) · t2 + (1 − tn−1 )t2(n−1) (1 − tn−1 )(1 − tn−2 )(1 − t2 ) tn+1 + t2n−2 , (1 − tn−2 )(1 − t2 ) (tn−1 − t2n−2 )(t j + tn−2 ) + (1 − tn−1 )(t2(n−1) + tn−2+ j ) (1 − tn−1 )(1 − tn−2 )(1 − t2 ) tn+ j−2 + tn+ j−1 + t2n−3 + t2n−2 if j is even, (1 − tn−2 )(1 − t2 ) (tn−1 − t2n−2 )(t j+1 + tn ) + (1 − tn−1 )(t2(n−1) + tn+ j−1 ) (1 − tn−1 )(1 − tn−2 )(1 − t2 ) tn+ j−1 + tn+ j + t2n−2 + t2n−1 if j is odd. (1 − tn−2 )(1 − t2 ) To compute the Hilbert-series of Mn−1 and Mn , we use Formula (4.2). Since the quotients  R/ X, Z ± iY n−2  2  and R/ Z, X ± iY n−1  2 are isomorphic to k[Y] as graded R-modules, we obtain for j ∈ {n − 1, n} Ä ä H M j (t) = tn−1 + tn−2 − 1 · = 1 − tn−2 1 + tn−1 + (1 − t2 )(1 − tn−2 ) (1 − t2 )(1 − tn−2 ) t2n−3 + t2n−2 . (1 − tn−2 )(1 − t2 ) Moreover, we have HR(−l) (t) = tl · 1 + tn−1 . (1 − t2 )(1 − tn−2 ) The Hilbert-series can distinguish the class of M1 from the classes of Mn−1 and Mn if and only if n ≥ 5, since in these cases the difference of the exponents in the numerator of H M1 (t) is at least two, while the difference in H Mn−1 (t) and H Mn (t) is one. Moreover, the Hilbert-series can distinguish the classes of the Mm with m ∈ {2, . . . , n − 2}. Let M be a maximal Cohen-Macaulay module of rank two, whose Hilbert-series is tl · H M j (t) with 2 ≤ j ≤ n−2 and l ∈ Z. If n = 4, we cannot say anything about the direct sum decomposition of M - except that it has no free direct summands. For n ≥ 5 the module M might have M1 as a direct summand only for j = 2. In this case we get M  M1 (−l − 1) ⊕ M1 (−l). We cannot exclude a splitting of M into degree shifted copies of Mn−1 and Mn only by looking at the Hilbert-series. But we know at least that M has no free direct summands. 118 4. HILBERT-SERIES OF FIRST SYZYGY MODULES OF MONOMIAL IDEALS 4.2.3. The case E6 . Let R := k[X, Y, Z]/(X 2 + Y 3 + Z 4 ) with deg(X) = 6, deg(Y) = 4 and deg(Z) = 3. We define the modules M1 := SyzR (X, Y, Z), M2 := SyzR (X, Y 2 , YZ, Z 2 ), M3 := SyzR (iX + Z 2 , Y 2 , YZ), M4 := SyzR (−iX + Z 2 , Y 2 , YZ), M5 := SyzR (−iX + Z 2 , Y), M6 := SyzR (iX + Z 2 , Y). Using Theorem 4.7, we get t7 + t9 + t10 + t12 , (1 − t4 )(1 − t3 ) t10 + t11 + 2t12 + t13 + t14 H M2 (t) = . (1 − t4 )(1 − t3 ) H M1 (t) = To compute the Hilbert-series of the M j , j ∈ {3, 4, 5, 6}, we use Formula (4.2). For j = 3, 4 the quotient R/(±iX + Z 2 , Y 2 , YZ) is isomorphic as a graded R-module to k[Z] ⊕ Y · k and for j = 5, 6 there is an isomorphism R/(±iX + Z 2 , Y)  k[Z] as graded R-modules. Hence we obtain Ä ä H M3 (t) = H M4 (t) = t8 + t7 + t6 − 1 · 1 + t6 1 − t4 + + t4 (1 − t4 )(1 − t3 ) (1 − t4 )(1 − t3 ) t11 + t12 + t13 + t14 , (1 − t4 )(1 − t3 ) Ä ä 1 − t4 1 + t6 H M5 (t) = H M6 (t) = t6 + t4 − 1 + (1 − t4 )(1 − t3 ) (1 − t4 )(1 − t3 ) t10 + t12 = . (1 − t4 )(1 − t3 ) = For completeness, the Hilbert-series of a free R-module is given by HR(−l) (t) = tl · 1 + t6 . (1 − t4 )(1 − t3 ) In this case the Hilbert-series can distinguish the class of M1 from the classes of M3 and M4 . Let M be a maximal Cohen-Macaulay module, whose Hilbert-series is tl · H Mi (t) for some l ∈ Z and some i ∈ {1, . . . , 6}. Then M has no free direct summands. Moreover, only 4.2. EXAMPLES 119 the following splittings are possible (with ε ∈ {3, 4} and δ, δ0 ∈ {5, 6}) i=1: M  Mδ (−l − 3) ⊕ Mδ0 (−l), i=2: M  Mε (−l) ⊕ Mδ (−l) or  Mε (−l + 1) ⊕ Mδ (−l − 2), i ∈ {3, 4} : M  Mδ (−l − 1) ⊕ Mδ0 (−l − 2). 4.2.4. The case E7 . Let R := k[X, Y, Z]/(X 2 + Y 3 + YZ 3 ) with deg(X) = 9, deg(Y) = 6 and deg(Z) = 4. We want to compute the Hilbert-series of the modules M1 := SyzR (X, Y, Z), M2 := SyzR (X, Y 2 , YZ, Z 2 ), M3 := SyzR (XY, XZ, Y 2 , YZ 2 , Z 3 ), M4 := SyzR (X, Y 2 , YZ), M5 := SyzR (XY, XZ, Y 2 , YZ 2 ), M6 := SyzR (X, Y, Z 2 ), M7 := SyzR (X, Y) appearing in Theorem 3.41. These are t10 + t13 + t15 + t18 , (1 − t6 )(1 − t4 ) t14 + t16 + t17 + t18 + t19 + t21 H M2 (t) = , (1 − t6 )(1 − t4 ) t18 + t19 + t20 + 2t21 + t22 + t23 + t24 H M3 (t) = , (1 − t6 )(1 − t4 ) t16 + t18 + t19 + t21 H M4 (t) = , (1 − t6 )(1 − t4 ) t19 + t20 + t21 + t22 + t23 + t24 , H M5 (t) = (1 − t6 )(1 − t4 ) t14 + t15 + t17 + t18 H M6 (t) = , (1 − t6 )(1 − t4 ) t15 + t18 H M7 (t) = , (1 − t6 )(1 − t4 ) 1 + t9 HR(−l) (t) = tl · . (1 − t6 )(1 − t4 ) H M1 (t) = The Hilbert-series can distinguish the indecomposable, maximal Cohen-Macaulay modules. Given a maximal Cohen-Macaulay module M, whose Hilbert-series is tl · H Mi (t) for some l ∈ Z and some i ∈ {1, . . . , 6}, we cannot exclude a splitting of M into (various) degree shifted copies of M7 only by looking at H M (t). But we see that M cannot have free 120 4. HILBERT-SERIES OF FIRST SYZYGY MODULES OF MONOMIAL IDEALS direct summands and if rank(M) ≥ 3 there are a lot of possible splittings excluded by the Hilbert-series. We list all possible splittings including at least one module of rank at least two. i = 2 : M  M4 (−l + 2) ⊕ M7 (−l − 3) or  M4 (−l) ⊕ M7 (−l + 1), i = 3 : M  M4 (−l − 5) ⊕ M4 (−l − 6) or  M6 (−l − 7) ⊕ M6 (−l − 9) or  M5 (−l − 2) ⊕ M7 (−l − 9) or  M5 (−l − 3) ⊕ M7 (−l − 6), i = 5 : M  M4 (−l − 3) ⊕ M7 (−l − 5) or  M6 (−l − 5) ⊕ M7 (−l − 6) or  M6 (−l − 6) ⊕ M7 (−l − 4). Negatively spoken, for i = 2 the module M cannot have M1 or M6 as a direct summand, for i = 3 the modules M1 and M2 cannot appear as direct summands of M and for i = 5 again M1 is not a direct summand of M. 4.2.5. The case E8 . Let R := k[X, Y, Z]/(X 2 + Y 3 + Z 5 ) with deg(X) = 15, deg(Y) = 10 and deg(Z) = 6. As in the E7 case all modules from Theorem 3.42 M1 := SyzR (X, Y, Z), M2 := SyzR (X, Y 2 , YZ, Z 2 ), M3 := SyzR (XY, XZ, Y 2 , YZ 2 , Z 3 ), M4 := SyzR (XY, XZ 2 , Y 3 , Y 2 Z, YZ 3 , Z 4 ), M5 := SyzR (XY 2 , XYZ 2 , XZ 4 , Y 4 , Y 3 Z, Y 2 Z 3 , Z 5 ), M6 := SyzR (X, Y 2 , YZ, Z 3 ), M7 := SyzR (XY, XZ, Y 2 , YZ 2 , Z 4 ), M8 := SyzR (X, Y, Z 2 ) are syzygy modules of monomial ideals. Using Theorem 4.7, we compute their Hilbertseries as t16 + t21 + t25 + t30 , (1 − t10 )(1 − t6 ) t27 + t31 + t32 + t35 + t36 + t40 H M2 (t) = , (1 − t10 )(1 − t6 ) t28 + t31 + t32 + t33 + t35 + t36 + t37 + t40 H M3 (t) = , (1 − t10 )(1 − t6 ) t34 + t36 + t37 + t38 + t39 + t40 + t41 + t42 + t43 + t45 H M4 (t) = , (1 − t10 )(1 − t6 ) H M1 (t) = 4.2. EXAMPLES 121 t46 + t47 + t48 + t49 + t50 + 2t51 + t52 + t53 + t54 + t55 + t56 , (1 − t10 )(1 − t6 ) t26 + t28 + t30 + t31 + t33 + t35 , H M6 (t) = (1 − t10 )(1 − t6 ) t31 + t32 + t34 + t35 + t36 + t37 + t39 + t40 H M7 (t) = , (1 − t10 )(1 − t6 ) t22 + t25 + t27 + t30 , H M8 (t) = (1 − t10 )(1 − t6 ) 1 + t15 l HR(−l) (t) = t · . (1 − t10 )(1 − t6 ) We see that the Hilbert-series of a given indecomposable, maximal Cohen-Macaulay module detects its isomorphism class. Let M be a maximal Cohen-Macaulay module, whose Hilbert-series is tl · H Mi (t) for some fixed i and l ∈ Z. Then M has no free direct summands. For i ∈ {1, 2, 4, 6, 8} the module M cannot split and we get M  Mi (−l). For i = 3 the only possible splitting is M  M8 (−l − 6) ⊕ M8 (−l − 10), for i = 7 only M  M8 (−l − 9) ⊕ M8 (−l − 10) is possible and for i = 5 there is only the possible splitting M  M6 (−l − 19) ⊕ M6 (−l − 20). H M5 (t) = CHAPTER 5 Relations between the maximal Cohen-Macaulay modules over surface rings of type ADE Considering the surface rings of type ADE as rings of invariants under finite subgroups of SL2 (k), we get ringinclusions among them by the actions of normal subgroups. Especially, we are interested in the pull-backs of the maximal Cohen-Macaulay modules along these inclusions. From these pull-backs we will deduce that the Frobenius pull-backs of Syz(m) over surface rings of type DE are indecomposable for almost all primes. During this chapter the surface rings of type ADE are named by their type of singularity, e.g. E8 := k[X, Y, Z]/(X 2 − Y 3 − 1728Z 5 ) (we use the hypersurface equations as they arise directly from the computation of the rings of invariants) and the corresponding punctured spectra get the same name but with curly letters, e.g. E8 := Spec(E8 ) \ {m}. For a module M we will denote the restriction of its sheafification to the punctured spectrum by M. We use the generators of the finite subgroups of SL2 (C), given in [BD08]. Note that these representations are well-defined in positive characteristics, if the group order is invertible. To get explicit generators of the normal subgroups, one might use [GAP12] and [DGPS12] to compute the corresponding rings of invariants (see Appendix B.1 for the computations). Let us very briefly recall some facts from invariant theory. If G is a group, acting on a ring R by ringautomorphisms and H is a normal subgroup of G, the ring of invariants RG Ä ä H and one has RG = RH G/H (cf. [Bre12, is a subring of RH , the quotient G/H acts on R Ä ä Ä ä Proposition 5.1 (3)]). Let X := Spec RG and Y = Spec RH (or the punctured resp. projective spectra). The inclusion RG ,→ RH induces a morphism ι : Y → X. Given an OX -module F , its pull-back ι∗ (F ) is an OY -module. If R = k[x, y] and G ( SL2 (k) finite, we want to understand what happens to the sheaves associated to the indecomposable, non-free, maximal Cohen-Macaulay modules under these pull-backs. For this purpose let i : R := k[x, y]G = k[U, V, W]/H1 (U, V, W) ,→ S := k[x, y]H = k[X, Y, Z]/H2 (X, Y, Z) be an inclusion between two (different) surface rings of type ADE, where H is a normal subgroup of G. This inclusion is given by sending U, V, W to homogeneous polynomials in the variables X, Y, Z and induces a morphism ι : S := Spec(S ) \ {(X, Y, Z)} −→ R := Spec(R) \ {(U, V, W)}. Let M := SyzR (F1 , . . . , Fm+1 ) be one of the indecomposable, non-free, maximal CohenMacaulay R-modules from Theorem 3.38-3.42. We obtain from Proposition 1.62 the isomorphism ι∗ (M)  SyzS (i(F1 ), . . . , i(Fm+1 )). 123 124 5. RELATIONS BETWEEN THE MAXIMAL COHEN-MACAULAY MODULES Now, the OS -module SyzS (i(F1 ), . . . , i(Fm+1 )) has to be the sheaf associated to a (not necessarily indecomposable) maximal Cohen-Macaulay S -module N and we want to have an explicit description of N. To get this description, we do the following manipulations on P := SyzS (i(F1 ), . . . , i(Fm+1 )) (cf. Lemma 1.61). Step 1: If the i(F j ) have a common factor A, replace all i(F j ) by i(F j )/A, which changes P only by an isomorphism. Step 2: If B is a common factor of i(F1 ), . . . , i(Fˇ j ), . . . , i(Fm+1 ) and the ideal (B, i(F j )) is (X, Y, Z)-primary, replace all i(Fk ), k , j, by i(Fk )/B, which changes P again only by an isomorphism. In both steps, we allow also to replace i(F j ) by i(F j ) + G · i(Fl ) for G ∈ S and j , l or by a constant multiple λ · i(F j ) with λ ∈ k× . In surprisingly many cases, we end up with an syzygy module appearing explicitly in Theorem 3.38-3.42 (or in a syzygy module that appeared in the computations in Chapter 3 as an alternative description). If this is not the case, we compute generators for P and look for relations among these generators. These relations will detect the module P∨ . To compute generators for P, we will work over the factorial domain k[x, y] (the ring on which the group acts) as follows. P Let (A1 , . . . , Am+1 ) ∈ P. Then treat the relation A j ·i(F j ) = 0 over k[x, y], meaning that we write the polynomials i(F j ) in the variables x, y. Then one can again cancel the common P multiple of the i(F j ), written in x, y. The result is a relation A j · G j (x, y) = 0, where the G j are coprime. From this relation one can compute the A j (as elements in S !), using the fact that k[x, y] is factorial. We give an example. Example 5.1. Let S = k[X, Y, Z]/(X 5 − YZ) with X = xy, Y = x5 and Z = y5 . Consider (A1 , A2 ) ∈ P := SyzS (X 6 , Y 2 ). Substituting X = xy and Y = x5 in the relation A1 · X 6 + A2 · Y 2 = 0, one obtains A1 · x6 y6 + A2 · x10 = 0, which is equivalent to (5.1) A1 · y6 + A2 · x4 = 0. Since k[x, y] is factorial, there has to be a B ∈ k[x, y] such that (5.2) (A1 , A2 ) = (−x4 , y6 ) · B. For all choices of B, the tuple (A1 , A2 ) in (5.2) solves (5.1). On the other hand, for each (A1 , A2 ) ∈ P, there has to be a B ∈ k[x, y], such that (5.2) holds. All in all, to compute S -module generators for P, we only have to compute the polynomials B ∈ k[x, y] with the property that −x4 · B and y6 · B are polynomials in xy, x5 , y5 . Obviously, B = x and B = y4 have this property and are minimal with respect to this property, in the sence that every homogeneous monomial B0 < k having this property, has to be a multiple of either x or y4 . This shows that P is generated by (−x4 , y6 ) · x = (−Y, XZ) and (−x4 , y6 ) · y4 = (−X 4 , Z 2 ). Since P does not appear in Theorem 3.38, we compute relations among the two generators. Since X · (−X 4 , Z 2 ) − Z · (−Y, XZ) = 0, we obtain P  SyzS (X, Z)∨  SyzS (X, Y). Of course, the computation gets much more complicated for higher ranks or if the polynomials X = X(x, y), Y = Y(x, y), Z = Z(x, y) have high degrees or are not monomial. For this 5.1. THE CASE An−1 WITH n ≥ 1 125 reason, we stop in the exceptional cases E6 , E7 , E8 after Step 2 and compute generators for the obtained syzygy modules with Macaulay2 [GS].   Z/(4n) : O t|4n / / D2n+2 _ D2n O A4n−1 _  q , Z/(t) O r ? # t|2n t|2n $ ?  Z/(2n) : O 2|t  / ?  Dn+2  Dn  / A _ ; t−1  - A2n−1 _  q , Z/(2)m  r t|4n 2|t #  2|n 2|n $ ? Z/(4)    / D2   / T _  EO 6   / D4   / ;A D 1  - A3 2 ? I O E7 E8 Table 5.1. Inclusions of the finite subgroups (up to conjugation) of SL2 (C) (left part) and of the corresponding rings of invariants (right part). All direct inclusions in the left part are inclusions of normal subgroups. 5.1. The Case An−1 with n ≥ 1 Consider natural numbers t and n, where t is a divisor of n. LetÄ ε be äa primitive n-th root of unity. On k[x, y] the group action of Z/(n), generated by 0ε ε0−1 , has the invariants Ä än/t , has the U := xy, V := xn , W := yn and the group action of Z/(t), generated by 0ε ε0−1 t t invariants X := xy, Y := x , Z := y . Since Z/(t) is a normal subgroup of Z/(n), invariant theory tells us that An−1 is a subring of At−1 , where the inclusion is given by U 7→ X, V 7→ Y n/t , W 7→ Z n/t , because the equalities U = X, V = Y n/t , W = Z n/t hold in k[x, y]. In the grading (2, t, t) resp. (2, n, n) on At−1 resp. An−1 the inclusion is homogeneous. Denote the inclusion by ϕt . The goal is to find an easier description of the module on the right hand side in the isomorphism ϕ∗t (SyzAn−1 (U l , V))  SyzAt−1 (X l , Y n/t ). Lemma 5.2. Let l ∈ {1, . . . , n − 1} with l = at + r and 0 ≤ r ≤ t − 1. Let m ≥ a + 1. There is an isomorphism SyzAt−1 (X l , Y m )  SyzAt−1 (X r , Y). Proof. Let (A, B) ∈ SyzAt−1 (X l , Y m ). Then over k[x, y] the relation A · X l + B · Y m = 0 becomes A · (xy)l + B · xtm = 0, which is equivalent to A · yat+r + B · xt(m−a−1)+t−r = 0. 126 5. RELATIONS BETWEEN THE MAXIMAL COHEN-MACAULAY MODULES We obtain the existence of a C ∈ k[x, y] such that (A, B) = (xt(m−a−1) xt−r , −yat yr ) · C. Since A and B belong to At−1 , all possibilities for C are At−1 -combinations of xr and yt−r . We obtain ÆÇ m−a å Ç t−r m−a−1 å∏ X ·Y Y l m . , SyzAt−1 (X , Y ) = r a −X · Z −Z a+1 Since the generators fullfill the relation å Ç å Ç X t−r · Y m−a−1 Y m−a = 0, + Xr · −Z · r a −X · Z −Z a+1 we get the isomorphisms Ä ä∨ SyzAt−1 (X l , Y m )  SyzAt−1 (X r , Z)  SyzAt−1 (X r , Y).  Since l ≤ n − 1 = we obtain Ä n t ä − 1 · t + t − 1, we have a ≤ nt − 1, hence by applying the above lemma, with r ∈ {0, . . . , t − 1}. SyzAt−1 (X l , Y n/t )  SyzAt−1 (X r , Y) Remark 5.3. Using ideals to represent the indecomposable, maximal Cohen-Macaulay An−1 -modules, we have by Theorem 3.38 the isomorphism ϕ∗t ((U l , W))  (X r , Z). 5.2. The Case Dn+2 with n ≥ 2 Ä ä The binary dihedral group Dn is generated by ζ := 0ε ε0−1 , where ε is a primitive 2n-th Ä ä 0 1 . The generating invariants are root of unity and τ := −1 0 X := xy(x2n − y2n ), Y := x2 y2 and Z := x2n + y2n , fullfilling the equation X 2 + 4Y n+1 − YZ 2 = 0. If n is odd, the normal subgroups of Dn are exactly the normal subgroups of < ζ >. If n is even there are two additional normal subgroups. The first one is generated by τ and ζ 2 . The second normal subgroup is generated by ζτ and ζ 2 (cf. [DI09, Lemma 4.3]). These two last groups lead to the same rings of invariances as a direct computation shows. This ring is a Dn/2+2 -singularity. Recall from Theorem 3.39 that M1 = SyzDn+2 (X, Y), Å ã n , 2 Ç å n+1 m M2m−1 = SyzDn+2 (X, Y , YZ) with 2 ≤ m ≤ , 2 Mn+1 = SyzDn+2 (X, Z − 2Y n/2 ) (with n even), M2m = SyzDn+2 (X, Y m , Z) with 1 ≤ m ≤ Mn+2 = SyzDn+2 (X, Z + 2Y n/2 ) (with n even), 5.2. THE CASE Dn+2 WITH n ≥ 2 Mn+1 = SyzDn+2 (X + 2iY n+1 2 127 , Z) (with n odd), n+1 2 Mn+2 = SyzDn+2 (X − 2iY , Z) (with n odd) is a complete list of generators for the isomorphism classes of indecomposable, non-free, maximal Cohen-Macaulay modules. 5.2.1. Pull-backs to At−1 with t|2n. It is enough to deal with the pull-backs to A2n−1 , because every pull-back from Dn+2 to At−1 (with t|2n) factors through A2n−1 . The pullback is induced by the map ϕ : k[X, Y, Z]/(X 2 + 4Y n+1 − YZ 2 ) −→ k[R, S , T ]/(T 2n − RS ), given by X 7→ T (R − S ), Y 7→ T 2 , Z 7→ R + S , where T = xy, R = x2n , S = y2n . Except for the modules Mn+1 and Mn+2 , applying the steps 1 and 2 from the strategy described at the beginning of this chapter is already enough to compute the pull-backs. ϕ∗ (M1 ) = ϕ∗ (SyzDn+2 (X, Y))  SyzA2n−1 (T R − T S , T 2 )  SyzA2n−1 (R − S , T )  OA2n−1 , ϕ∗ (M2m ) = ϕ∗ (SyzDn+2 (X, Y m , Z))  SyzA2n−1 (T R − T S , T 2m , R + S )  SyzA2n−1 (R − S , T 2m−1 , R + S )  SyzA2n−1 (R, S , T 2m−1 )  SyzA2n−1 (R, T 2m−1 ) ⊕ SyzA2n−1 (S , T 2m−1 ), ϕ∗ (M2m−1 ) = ϕ∗ (SyzDn+2 (X, Y m , YZ))  SyzA2n−1 (T R − T S , T 2m , T 2 R + T 2 S )  SyzA2n−1 (R − S , T 2m−1 , T R + T S )  SyzA2n−1 (R − S , T 2m−2 , R + S )  SyzA2n−1 (R, S , T 2m−2 )  SyzA2n−1 (R, T 2m−2 ) ⊕ SyzA2n−1 (S , T 2m−2 ). For i = n+1 and i = n+2 we have ϕ∗ (Mi )  SyzA2n−1 (T n , R), independently of the cardinality of n. We only compute ϕ∗ (Mn+1 ) in the two cases corresponding to the the cardinality of n. To compute ϕ∗ (Mn+2 ) one has only to change some signs. Let n be even. In this case we get   n  ϕ∗ (Mn+1 ) = ϕ∗ SyzDn+2 X, Z − 2Y 2  SyzA2n−1 (T R − T S , R + S − 2T n )  SyzA2n−1 (R − S , R + S − 2T n )  SyzA2n−1 (R − S , R − T n ). 128 5. RELATIONS BETWEEN THE MAXIMAL COHEN-MACAULAY MODULES For (A, B) ∈ SyzA2n−1 (R − S , R − T n ) the corresponding relation over k[x, y] is equivalent to A · (xn + yn ) + B · xn = 0. This gives (A, B) = (−xn , xn + yn ) ·C with C ∈ k[x, y]. The minimal possibilities for C are xn and yn , giving the generators s1 := (−R, R + T n ) and s2 := (−T n , T n + S ) with the relation T n · s1 − R · s2 = 0. The claim follows, since the syzygy module of (T n , R) is selfdual. Now let n be odd. In this case we obtain ϕ∗ (Mn+1 ) = ϕ∗ (SyzDn+2 (X + 2iY n+1 2 , Z))  SyzA2n−1 (T R − T S + 2iT n+1 , R + S )  SyzA2n−1 (R − S + 2iT n , R + S )  SyzA2n−1 (R + iT n , R + S ). Taking a syzygy (A, B) ∈ SyzA2n−1 (R + iT n , R + S ), the corresponding relation over k[x, y] is equivalent to A · xn + B · (xn − iyn ) = 0. This gives (A, B) = (xn − iyn , −xn ) · C with C ∈ k[x, y]. The minimal possibilities for C are again xn and yn , giving the generators s1 := (R − iT n , −R) and s2 := (T n − iS , −T n ) with the relation T n · s1 − R · s2 = 0. 5.2.2. Pull-backs to Dn/2+2 . Consider the map ψ : k[X, Y, Z]/(X 2 + 4Y n+1 − YZ 2 ) → k[R, S , T ]/(R2 + 4S 2 +1 − S T 2 ), n given by X 7→ RT , Y 7→ S , Z 7→ T 2 − 2S n/2 , where R = xy(xn − yn ), S = x2 y2 , T = xn + yn . For all pull-backs the steps 1 and 2 from the beginning of this chapter are enough to detect the isomorphism classes of the pull-backs. ψ∗ (M1 )  SyzD n +2 (RT, S ) 2  SyzD n +2 (R, S ), 2 n  ψ (M2m )  SyzD n +2 RT, S m , T 2 − 2S 2 ∗ 2  SyzD n +2 (RT, S m , T 2 ) 2  SyzD n +2 (R, S m , T ), 2 ψ (M2m−1 )  SyzD n +2 RT, S m , S T 2 − 2S 2 +1 n  ∗ 2  SyzD n +2 (RT, S m , S T 2 ) 2  SyzD n +2 (R, S m , S T ), 2 n  ψ (Mn+1 )  SyzD n +2 RT, T 2 − 4S 2 ∗ 2  n  SyzD n +2 R, T 2 − 4S 2 2  SyzD n +2 (R, S ), 2  5.3. THE CASE E6 129 ψ∗ (Mn+2 )  SyzD n +2 (RT, T 2 ) 2  SyzD n +2 (R, T ) 2  OD n +2 . 2 5.3. The Case E6 The binary tetrahedral group T of order 24 is generated by σ, τ and µ, where Ç å i 0 , σ= 0 −i Ç å 0 1 , τ= −1 0 Ç 1 ε7 ε7 µ= √ 5 2 ε ε å with a primitive eighth root of unity ε. The generating invariants are X := x12 − 33x8 y4 − 33x4 y8 + y12 , Y := x8 + 14x4 y4 + y8 , Z := x5 y − xy5 , hence the equation of the E6 -singularity is X 2 − Y 3 + 108X 4 = 0. There are two normal subgroups of T. The first one is generated by σ and τ and the ring of invariants is a D4 -singularity. The second one is generated by τ2 and the ring of invariants is an A1 -singularity. Recall from Theorem 3.40 that M1 = SyzE6 (X, Y, Z), M2 = SyzE6 (X, Y 2 , YZ, Z 2 ), √ M3 = SyzR (iX + 6 3Z 2 , Y 2 , YZ), √ M4 = SyzR (−iX + 6 3Z 2 , Y 2 , YZ), √ M5 = SyzR (−iX + 6 3Z 2 , Y), √ M6 = SyzR (iX + 6 3Z 2 , Y) is a complete list of representatives of the isomorphism classes of indecomposable, nonfree, maximal Cohen-Macaulay modules. We consider the map ψ : k[X, Y, Z]/(X 2 − Y 3 + 108Z 4 ) −→ k[U, V, W]/(UV − W 2 ), that is given by X 7→ U 6 − 33U 2 W 4 − 33V 2 W 4 + V 6 , Y 7→ U 4 + V 4 + 14W 4 , A direct computation shows that ψ is the composition (A3 → A1 ) ◦ (D4 → A3 ) ◦ (E6 → D4 ). Therefore, it is enough to compute the pull-backs to D4 . Z 7→ (U 2 − V 2 )W. 130 5. RELATIONS BETWEEN THE MAXIMAL COHEN-MACAULAY MODULES To reduce the number of generators of the syzygy modules corresponding to the pullbacks of Mi , i ≥ 3, we first prove the isomorphisms M5 ⊕ M6  L := SyzE6 (X, Y, Z 2 ) and M3 ⊕ M4  N := SyzE6 (XY, XZ, Y 2 , YZ 2 , Z 3 )  SyzE6 (XY, XZ 2 , Y 3 , Y 2 Z, Z 3 ) (for later use). The proofs use matrix factorizations. To avoid ugly constant coefficients in the matrices, we turn back to the equation X 2 + Y 3 + Z 4 = 0 for these√proofs. Note that under this isomorphism, we only have to change the coefficients 6 3 in M3 , . . . , M6 into 1. The matrix factorization ÇÇÇ −Z 2 Y Y 2 Z2 åå ÇÇ −Z 2 Y Y 2 Z2 , ååå ˆ X) ⊗(X, splits by Lemma 3.33 as (ϕ5 , ψ5 ) ⊕ (ϕ6 , ψ6 ). Obviously, the module given by this matrix factorization is selfdual. Computing the tensor product and deleting the first column (in the second matrix), one obtains the claimed isomorphism.     XE4 η XE4 η Let Ω = with η −XE4 , η −XE4 á −Z 2 0 YZ Y 2 −YZ Z Y2 0 0 Y 0 Z Y 2 −YZ Z 3 0 η= Because the map Ä E8 , Ä 0 E ää 4 E4 0 ë . ˆ X) → Ω : (η, η)⊗(X, is an isomorphism of matrix factorizations, we see by Lemma 3.33 that Ω splits as (ϕ3 , ψ3 ) ⊕ (ϕ4 , ψ4 ). Again coker(Ω) is selfdual and deleting the columns one, three and seven from the second matrix of Ω, the rows of the reduced matrix generate the module SyzE6 (−XZ, XY, Y 2 , −Z 3 , YZ 2 ). For the other isomorphism delete the columns two, three and five. Now, we compute the pull-backs to D4 . The computations are done with Macaulay2 (with coefficients in Z) and can be found in Appendix B.2. The map ϕ : k[X, Y, Z]/(X 2 − Y 3 + 108Z 4 ) −→ k[U, V, W](U 2 + 4V 3 − VW 2 ) is given by X 7→ W 3 − 36V 2 W, Y 7→ W 2 + 12V 2 , Z 7→ U. Therefore, the pull-back ϕ∗ (SyzE6 (X, Y, Z))  SyzD4 (W 3 − 36V 2 W, W 2 + 12V 2 , U) is generated by Ö s1 := 0 −U 12V 2 + W 2 è Ö , s2 := −V −2VW 3UW è Ö , s3 := W 2 12V − W 2 36UV è Ö , s4 := −U −3UW 4W 3 è . 5.3. THE CASE E6 131 The total degrees of these generators are seven, eight, eight and nine. Since there are no elements of degree one and two and s2 and s3 are linearly independent, all generators are necessary. We have the following global relations among these generators −3U · s1 + W · s2 + V · s3 = 0, −4UW · s1 + 4V 2 · s2 + VW · s3 + U · s4 = 0, (12V 2 − 4W 2 ) · s1 + U · s3 + W · s4 = 0. The second and third relation show that we can ommit the fourth generator locally on the covering D(U) ∪ D(W) = D4 . Then the first relation gives the isomorphism ϕ∗ (SyzE6 (M1 ))  SyzD4 (U, V, W). The pull-back ϕ∗ (M5 ⊕ M6 )  ϕ∗ (L)  ϕ∗ (SyzE6 (X, Y, Z 2 ))  SyzD4 (W 3 − 36V 2 W, W 2 + 12V 2 , U 2 ) is generated by Ö s1 := V 2VW −3W è Ö , s2 := W 2 −W + 12V 2 36V Ö è , s3 := 0 U2 −12V 2 − W 2 Ö è , s4 := U2 0 2 36V W − W 3 è Because s1 and s2 are linearly independent and of the same (minimal) total degree, both are necessary as generators. The relations 1 1 s3 = (W · s1 − V · s2 ) and s4 = ((W 2 − 12V 2 ) · s1 + 2VW · s2 ) 3 3 show that s1 and s2 generate the whole module if the characteristic is not three, hence M5 and M6 become trivial after the pull-back. To get the pull-back of M2 we compute ϕ∗ (SyzE6 (X, Y 2 , YZ, Z 2 ))  SyzD4 (W 3 − 36V 2 W, W 4 + 24V 2 W 2 + 144V 4 , UW 2 + 12UV 2 , U 2 ). A set of generators for SyzD4 (W 3 − 36V 2 W, W 4 + 24V 2 W 2 + 144V 4 , UW 2 + 12UV 2 , U 2 ) is given by s1 := (0, 0, −U, 12V 2 + W 2 ), s2 := (0, −U, 12V 2 + W 2 , 0), s3 := (2VW, V, 3U, −6W 2 ), s4 := (12V 2 − W 2 , W, 0, −72VW), s5 := (UV, 0, 2VW, −3UW), s6 := (UW, U, −2W 2 , 36UV), s7 := (−U 2 , 0, −3UW, 4W 3 ). Because we can write 3 · s7 = 6W · s1 − W · s2 + V · s3 , we can omit s7 as a generator (since char(k) , 3). The remaining generators are linearly independent and have total degree ten . 132 5. RELATIONS BETWEEN THE MAXIMAL COHEN-MACAULAY MODULES or eleven. Since there are no elements of degree one, all of them are necessary to generate the module. We have the relations U · (−6s1 − s3 ) + V · (s2 + 2s6 ) = 0, U · (6s1 − 2s3 + s4 ) + (W − 2V) · (−2s2 + 6s5 + s6 ) = 0, U · (−6s1 + 2s3 + s4 ) + (W + 2V) · (2s2 − 6s5 + s6 ) = 0. Since the characteristic of our base field is at least five, the module generated by s1 , . . . , s6 is isomorphic to the module generated by the elements in the brackets. We get ϕ∗ (M2 )  SyzD4 (U, V) ⊕ SyzD4 (U, W − 2V) ⊕ SyzD4 (U, W + 2V). Generators of ϕ∗ (M3 ⊕ M4 )  ϕ∗ (N) = ϕ∗ (SyzE6 (XY, XZ, Y 2 , YZ 2 , Z 3 )) are given by s1 := (0, 0, 0, −U, W 2 + 12V 2 ), s2 := (−U, 12V 2 + W 2 , 0, 0, 0), s3 := (V, 0, 2VW, −3W, 0), s4 := (W, 0, −W 2 + 12V 2 , 36V, 0), s5 := (0, 0, U 2 , −12V 2 − W 2 , 0), s6 := (0, 2VW, UV, 3U, −6W 2 ), s7 := (U, −2W 2 , UW, 0, −72VW), s8 := (0, UV, 0, 2VW, −3UW), s9 := (0, UW, 0, 12V 2 − W 2 , 36UV), s10 := (0, −U 2 , 0, −3UW, 4W 3 ), s11 := (−U 2 W, 3UW 3 , 0, −2W 4 + 27U 2 V, 81U 3 ). The equations 3 · s5 = −W · s3 + V · s4 , 3 · s10 = 6W · s1 + V · (s2 + s7 ) − W · s7 , s11 = −27UV · s1 + UW · s2 − 12VW · s8 + 2W 2 · s9 show that s5 , s10 and s11 can be omitted (since char(k) , 3). The remaining generators are linearly independent and have total degrees twelve, thirteen or fourteen. The only possibility to have one generator to much, is an equation of the form a14 = V · b12 + W · c12 , where a14 , b12 and c12 are linear combinations of the generators of total degree given by the index. It’s easy to verify that there is no such equation. 5.4. THE CASE E7 133 Moreover, if char(k) ≥ 5, we can omit s8 and s9 on the covering D(U) ∪ D(W) as the following relations show 3U · s8 = 3VW · s1 − V 2 · s2 − UV · s3 + 2VW · s6 , W · s8 = −3U · s1 + V · s9 , 6U · s9 = (18W 2 − 72V 2 ) · s1 − UW · s3 + UV · s4 + (3W 2 − 12V 2 ) · s6 , 6W · s9 = (2W 2 − 12V 2 ) · s3 + VW · s6 − 3U · s7 . Finally, we have W · (6s1 + s6 ) − U · s3 + V · s7 = 0, W · (2S 2 + s6 ) + U · s4 − 12V · s6 = 0, showing ϕ∗ (M3 ⊕ M4 )  SyzD4 (U, V, W)2 . 5.4. The Case E7 The binary octahedral group O of order 48 is generated by σ, τ, µ and κ, where Ç å i 0 σ= , 0 −i Ç å 0 1 τ= , −1 0 Ç å 1 ε7 ε7 , µ= √ 5 2 ε ε Ç å ε 0 κ= , 0 ε7 where ε is again a primitive eighth root of unity. The generating invariants are X := x17 y − 34x13 y5 + 34x5 y13 − xy17 , Y := x10 y2 − 2x6 y6 + x2 y10 , Z := x8 + 14x4 y4 + y8 . The equation of an E7 -singularity is given by X 2 + 108Y 3 − YZ 3 = 0. There are three normal subgroups of O. The first one is generated by σ and τ, which is isomorphic to D2 and has D4 as ring of invariants. The second normal subgroup is T =< σ, τ, µ >, since κ2 = σ. The corresponding ring of invariants is an E6 -singularity. The third normal subgroup is generated by τ2 with ring of invariants A1 . Recall from Theorem 3.41 that there are seven classes of non-free, indecomposable, maximal Cohen-Macaulay modules and represantatives are given by M1 = SyzE7 (X, Y, Z), M2 = SyzE7 (X, Y 2 , YZ, Z 2 ), M3 = SyzE7 (XY, XZ, Y 2 , YZ 2 , Z 3 ), M4 = SyzE7 (X, Y 2 , YZ), M5 = SyzE7 (XY, XZ, Y 2 , YZ 2 ), M6 = SyzE7 (X, Y, Z 2 ), M7 = SyzE7 (X, Y). 134 5. RELATIONS BETWEEN THE MAXIMAL COHEN-MACAULAY MODULES Note that we only need to compute their pull-backs to E6 , since the maps D4 → E7 and A1 → E7 factor through E6 . The map η : k[X, Y, Z]/(X 2 + 108Y 3 − YZ 3 ) −→ k[U, V, W]/(U 2 − V 3 + 108W 4 ) is given by X 7→ UW, Y 7→ W 2 , Z 7→ V. With l ∈ {1, 2} we get η∗ (SyzE7 (X, Y, Z l ))  SyzE6 (UW, W 2 , V l )  SyzE6 (U, W, V l )  SyzE6 (U, V, W), showing η∗ (M1 )  η∗ (M6 )  SyzE6 (U, V, W). Similarly, one has η∗ (SyzE7 (M4 ))  SyzE6 (UW, W 4 , VW 2 )  SyzE6 (U, W 3 , VW)  SyzE6 (U, W 2 , V) √ √  SyzE6 (iU + 6 3W 2 , V) ⊕ SyzE6 (−iU + 6 3W 2 , V), where the last isomorphism is one of those, we have computed at the beginning of this section. The pull-back η∗ (SyzE7 (X, Y))  SyzE6 (U, W) is free. We have the isomorphisms η∗ (M2 ) = η∗ (SyzE7 (X, Y 2 , YZ, Z 2 ))  SyzE6 (UW, W 4 , VW 2 , V 2 )  SyzE6 (U, V 2 , VW, W 3 )  SyzE6 (U, V 2 , VW, W 2 ) and η∗ (M5 ) = η∗ (SyzE7 (XY, XZ, Y 2 , YZ 2 ))  SyzE6 (UW 3 , UVW, W 4 , V 2 W 2 )  SyzE6 (UW 2 , UV, W 3 , V 2 W)  SyzE6 (UW, UV, W 2 , V 2 )  SyzE6 (U, V 2 , VW, W 2 ). The last module to consider is M3 . The pull-back splits by the following computation η∗ (SyzE7 (XY, XZ, Y 2 , YZ 2 , Z 3 ))  SyzE6 (UW 3 , UVW, W 4 , V 2 W 2 , V 3 )  SyzE6 (UW 2 , UV, W 3 , V 2 W, V 3 ) √ √  SyzE6 (iU + 6 3W 2 , V 2 , VW) ⊕ SyzE6 (−iU + 6 3W 2 , V 2 , VW), where the last isomorphism is one of those, we have seen at the beginning of this section. 5.5. THE CASE E8 135 5.5. The Case E8 The binary icosahedral group I of order 120 has two generators ϕ and ψ with Ç ϕ=− ε3 0 0 ε2 å and 1 ψ= √ 5 Ç −ε + ε4 ε2 − ε3 ε2 − ε3 ε − ε4 å , where ε is a primitive fifth root of unity. The generating invariants are X := x30 + 522x25 y5 − 10005x20 y10 − 10005x10 y20 − 522x5 y25 + y30 , Y := x20 − 228x15 y5 + 494x10 y10 + 228x5 y15 + y20 , Z := x11 y + 11x6 y6 − xy11 . An E8 -singularity is given by the equation X 2 − Y 3 − 1728Z 5 = 0. The only normal subgroup of I is Z/2, generated by ϕ5 . The corresponding map ι : k[X, Y, Z]/(X 2 − Y 3 − 1728Z 5 ) → k[R, S , T ]/(RS − T 2 ) is given by X 7→ R15 + 522R10 T 5 − 10005R5 T 10 − 10005S 5 T 10 − 522S 10 T 5 + S 15 , Y 7→ R10 − 228R5 T 5 + 494T 10 + 228S 5 T 5 + S 10 , Z 7→ R5 T − S 5 T + 11T 6 . There are eight isomorphism classes of non-free, indecomposable, maximal Cohen-Macaulay modules, represented by (cf. Theorem 3.42) M1 = SyzE8 (X, Y, Z), M2 = SyzE8 (X, Y 2 , YZ, Z 2 ), M3 = SyzE8 (XY, XZ, Y 2 , YZ 2 , Z 3 ), M4 = SyzE8 (XY, XZ 2 , Y 3 , Y 2 Z, YZ 3 , Z 4 ), M5 = SyzE8 (XY 2 , XYZ 2 , XZ 4 , Y 4 , Y 3 Z, Y 2 Z 3 , Z 5 ), M6 = SyzE8 (X, Y 2 , YZ, Z 3 ), M7 = SyzE8 (XY, XZ, Y 2 , YZ 2 , Z 4 ), M8 = SyzE8 (X, Y, Z 2 ). Since there are only the indecomposable, maximal Cohen-Macaulay modules A1 and SyzA1 (R, T ) on A1 , we only need the minimal numbers of generators of ι∗ (SyzE8 (Mi )) to understand its splitting behaviour. Explicitely, the module A1 is one-generated, while SyzA1 (R, T ) is two-generated. Now, a maximal Cohen-Macaulay A1 -module of rank r, that is minimally generated by µ elements, has exactly µ − r direct summands isomorphic to SyzA1 (R, T ) and 2r − µ free direct summands. Therefore, we only explain the Macaulay2 computation, given in Appendix B.3. 136 5. RELATIONS BETWEEN THE MAXIMAL COHEN-MACAULAY MODULES First consider the ring A := Z[R, S , T ]/(RS − T 2 ). Since the syzygy modules, we are interested in, have far to many generators, when working over A, we also work over B := Q[R, S , T ]/(RS − T 2 ). The Macaulay2 command for the canonical inclusion A ,→ B is map(B,A) and for a matrix M over A the command map(B,A)**M treats M as a matrix over B. We denote the A-matrix, whose columns generate ι∗ (SyzE8 (Mi )) with coefficients in Z by Si and the corresponding B-matrix by Ti (cf. B.3 up to i21). Using mingens image Ti, we produce matrices M1, . . . , M8, such that the columns of Mi and Ti generate the same module, but the Mi have less columns than the Ti (cf. B.3 i22-i29). In B.3 i30-i37 we compute the canonical map from image Ti to image Mi. The outputs are matrices, whose j − th column contains the coefficients necessary to write the j − th column of Ti in terms of the columns of Mi. Working in positive characteristic, we may use the Mi instead of the Ti, whenever all the coefficients are well-defined. We always have to invert two and three, which is no problem, since our characteristic has to be at least seven to write down the generators of the group I. In the case of T3 we additionally need to invert five and seven and for T5 we have to invert five and 59. The computations with coefficients in Z/(p), p ∈ {7, 59} are done in B.3 i38-i43. In all cases we end up with a matrix Mi, whose columns generate ι∗ (SyzE8 (Mi )). For each i these generators are linearly independent and have the same total degree, hence they give a minimal system of generators. The final results are gathered together in Table 5.5. 5.6. Overview We end this section with an overview. The modules in the columns are modules over the scheme in the head-spot of the column. The rows tell us to which module the module in the first column pulls back. Dn+2 M1 M2m M2m−1 Mn+1 , n even Mn+2 , n even Mn+1 , n odd Mn+2 , n odd A2n−1 At−1 , t|2n Dn/2+2 , (n even) OA2n−1 OAt−1 M1 M2m−1 ⊕ M2(n−m)+1 Mr ⊕ Mt−r , r = 2m − 1 mod t M2m M2m−2 ⊕ M2(n−m)+2 Mr ⊕ Mt−r , r = 2m − 2 mod t M2m−1 Mn Mr , r = n mod t M1 Mn Mr , r = n mod t ODn/2+2 Mn Mr , r = n mod t − Mn Mr , r = n mod t − Table 5.2. The table shows the pull-back behaviour of the Mi on Dn+2 . In the third column of Table 5.2 the number r is the minimal non-negative integer satisfying the modulo condition. 5.6. OVERVIEW E6 M1 M2 M3 M4 M5 M6 137 D4 A1 M2 M21 M1 ⊕ M3 ⊕ M4 O3A1 M2 M21 M2 M21 OD4 OA1 OD4 OA1 Table 5.3. The table shows the pull-back behaviour of the Mi on E6 . E7 M1 M2 M3 M4 M5 M6 M7 E6 D4 M1 M2 M2 M1 ⊕ M3 ⊕ M4 M3 ⊕ M4 M22 M5 ⊕ M6 D24 M2 M1 ⊕ M3 ⊕ M4 M1 M2 E6 D4 A1 M21 O3A1 M41 O2A1 O3A1 M21 OA1 Table 5.4. The table shows the pull-back behaviour of the Mi on E7 . E8 M1 M2 M3 M4 M5 M6 M7 M8 A1 M21 O3A1 M41 O5A1 M61 O3A1 O4A1 M21 Table 5.5. The table shows the pull-back behaviour of the Mi on E8 . Using these direct computations, we can show that the Frobenius pull-backs of the syzygy modules of the maximal ideals stay indecomposable in almost all characteristics if the singularity is of type D or E. Lemma 5.4. Let U be the punctured spectrum of a surface ring R of type D or E and let F : U → U be the (restricted) Frobenius morphism. Assume that the order of the group corresponding to the singularity is invertible in the ground field. Then Fe∗ (SyzU (m)) is indecomposable for all e ∈ N. Proof. Recall from Chapter 3 that SyzU (m) is isomorphic to M2 if R is of type D and M1 if R is of type E. Assume first that R is of type D2n+2 or E. If Fe∗ (SyzU (m)) splits 138 5. RELATIONS BETWEEN THE MAXIMAL COHEN-MACAULAY MODULES for some e ≥ 1, its pull-back to A1 (along the morphism ι, induced by the inclusion into A1 ) gets trivial, since all line bundles pull back to the structure sheaf by Tables 5.2 - 5.5. But the pull-back of SyzU (m) along ι is non-trivial (in fact, it is always M21 by the direct computations) and its Frobenius pull-backs stay non-trivial in odd characteristics. This gives a contradiction, since the two types of pull-backs commute. Assume that R is of type Dn+2 with n odd. Since Fe∗ (SyzU (m)) might split as Mn+1 ⊕ Mn+2 and both pull back to M1 on A1 , the argument above gives no contradiction. In this case, we have to compare the pull-backs to An−1 . Then all line bundles from Dn+2 pull back to the structure sheaf of An−1 , but ι∗ (M2 )  M1 ⊕ Mn−1 . The Frobenius pullbacks on the right hand side do not get trivial, since n is invertible modulo p. Moreover, if R is of type D, the Frobenius pull-backs of M2 are again of the form M2m , since the M2m−1 get trivial after pulling them back to A1 .  By the previous lemma all Frobenius pull-backs of SyzU (m) are again indecomposable of rank two. Since in all cases det(Fe∗ (SyzU (m)))  OU , we obtain directly Fe∗ (SyzU (m))  SyzU (m) if R is of type E6 , since in this case there is only one rank two module, whose representation is a syzygy module of an m-primary ideal. In the next chapter we will see that Lemma 5.4 leads always to a (0, e0 )-Frobenius periodicity Fe0 ∗ (SyzU (m))  SyzU (m). For example if R is of type E7 or E8 , the length e0 of this periodicity is - depending on the characteristic - one or two. CHAPTER 6 The Hilbert-Kunz functions of surface rings of type ADE In this chapter we compute the Hilbert-Kunz functions of surface rings of type ADE. We recall very briefly the situation. Let R := k[U, V, W]/( f ) be a surface ring of type ADE with deg(U) = α, deg(V) = β, deg(W) = γ and let S := k[X, Y, Z]/(F) be the associated standard-graded ring. Denote their projective spectra by CR resp. CS and their punctured spectra by R resp. S. Then by Remark 1.22 the Hilbert-Kunz function of R is the HilbertKunz function of S with respect to the ideal (X α , Y β , Z γ ) divided by α · β · γ, since the map R → S , sending U, V and W to X α , Y β resp. Z γ , is flat by [Mat05, Theorem 22.2] and the extension Q(S ) : Q(R) has degree α · β · γ. In the standard-graded situation we may use the geometric approach of Brenner/ Trivedi, which is possible, if we find for each q = pe an isomorphism of the form SyzS (X α·q , Y β·q , Z γ·q )  SyzS (X a , Y b , Z c )(n), where the vector (a, b, c) and the degree shift n ∈ Z depend on q and at least one of the inequalities α · q < a, β · q < b, γ · q < c holds. In each case we will show that there exists a finite list of triples (a0 , b0 , c0 ) such that there are isomorphisms Ä 0 0 0ä SyzR (U q , V q , W q )  SyzR U a , V b , W c (m) for some m ∈ Z and for all q. These isomorphisms induce isomorphisms in the standardgraded case of the desired form. After all we use the formula HK(R, q) (6.1) 0 0 0 d · Q(α, β, γ) · q2 − d · Q(a0 · α, b0 · β, c0 · γ) + 4 · dimk (S /(X a ·α , Y b ·β , Z c ·γ )) = , 4·α·β·γ with d = deg( f ) and Q(r, s, t) = 2(rs + rt + st) − r2 − s2 − t2 from Lemma 2.2 (together with Remark 1.22). In small characteristics, it happens sometimes that the syzygy modules SyzR (U q , V q , W q ) split as R(−m + δ) ⊕ R(−m) for some m, δ ∈ Z. In those cases the Hilbert-Kunz function can be computed by the formula (cf. Lemma 2.1 and Remark 1.22) (6.2) HK(R, q) = d · Q(α, β, γ) · q2 + d · δ2 . 4·α·β·γ 6.1. The case An−1 with n ≥ 1 Let R := k[U, V, W]/(U n − VW) with deg(U) = 2, deg(V) = n, deg(W) = n and char(k) = p n. In Chapter 3 we saw that we may choose SyzR (U, V) as generator of the Picard group of R. The e-th Frobenius pull-back is just the q-th tensor power, which is isomorphic to 139 140 6. THE HILBERT-KUNZ FUNCTIONS OF SURFACE RINGS OF TYPE ADE the tensor power of order q modulo n, hence SyzR (U q , V q )  SyzR (U r , V) with r ≡ q mod n, r ∈ {1, . . . , n − 1}, by Lemma 5.2. Using the isomorphism SyzR (U r , V, W)  SyzR (U r , V) ⊕ SyzR (U r , W)  SyzR (U r , V) ⊕ SyzR (U n−r , V)∨ , we find SyzR (U q , V q , W q )  SyzR (U r , V, W)(m) for some m ∈ Z. This yields with Formula (6.1) 2n · Q(2, n, n) · q2 − 2n · Q(2r, n, n) + 8rn2 8n2 (8n − 4)q2 − 8rn + 4r2 +r = 4n Ç å 1 2 r2 = 2− q −r+ . n n HKR (R, q) = Note that we can define all appearing syzygy modules in the case p|n as well. Since the computations in Section 4.1 are correct in all characteristics, the above computation of the Hilbert-Kunz function remains correct in the case p|n, if we would know that our list of maximal Cohen-Macaulay modules is complete. By a theorem of Herzog (cf. [LW12, Theorem 6.3]) we only need that R is a direct summand of the polynomial ring k[u, v], on which the group Z/(n) acts, to have an one to one correspondence between indecomposable, maximal Cohen-Macaulay R-modules and direct summands of k[u, v] as an R-module. Leuschke and Wiegand point out in [LW12, Remark 6.22] that R is a direct summand of k[u, v] and that the direct summands of k[u, v] as an R-module are the same as in the nonmodular case (meaning that the algebraic definition is the same, although the modules in the modular case might not come from representations of the group Z/n). Therefore, the formula above is a full description of the Hilbert-Kunz function (compare with Example 1.5 or Remark 1.6). By Theorem 1.91, the F-signature function of R is given by 1 2 r2 Fsign (R, q) = · q + r − . n n 6.2. The case Dn+2 with n ≥ 2 Let R := k[U, V, W]/(U 2 + V n+1 + VW 2 ) with deg(U) = n + 1, deg(V) = 2, deg(W) = n and char(k) = p - 4n. Recall from Chapter 5 that there is an embedding ϕ : R −→ A2n−1 := k[X, Y, Z]/(X 2n − YZ) 6.2. THE CASE Dn+2 WITH n ≥ 2 141 with the following pull-back behaviour R M1 M2m M2m−1 Mn+1 Mn+2 A2n−1 OA2n−1 N2m−1 ⊕ N2(n−m)+1 N2m−2 ⊕ N2(n−m)+2 Nn Nn , where the Ni are the Mi on A2n−1 from Chapter 5. By Lemma 5.4 we have Fe∗ (SyzR (m)) = Fe∗ (M2 )  M2m (6.3) for all e ∈ N and m = m(q) ∈ {1, . . . , n2 }. The parameter m = m(q) can be computed by considering the pull-back via ϕ: M2 pulls back to N1 ⊕ N2n−1 on A2n−1 . The e-th Frobenius pull-back of this module is Nr ⊕ N2n−r with r ≡ q mod 2n (and 1 ≤ r ≤ 2n − 1). If r ≤ n − 1, only Mr+1 pulls back to Nr ⊕ N2n−r via ϕ. If r ≥ n, only M2n−r−1 pulls back to Nr ⊕ N2n−r via ϕ. But in Chapter 3 we saw that Mr+1 and M2n−r−1 are isomorphic (on R). We find SyzR (U q , V q , W q )  SyzR (U, V (r+1)/2 , W), where r ≡ q mod 2n with 1 ≤ r ≤ 2n − 1. This isomorphism induces a global isomorphism SyzR (U q , V q , W q )  SyzR (U, V (r+1)/2 , W)(m), for some m ∈ Z. Using Formula (6.1), we get (2n + 2) · Q(n + 1, 2, n) · q2 − (2n + 2) · Q(n + 1, r + 1, n) + 4(r + 1)(n2 + n) 8(n2 + n) (8n − 1)q2 − 4nr − 4n + r2 r + 1 = + 4n 2 Ç å 2 1 r+1 r = 2− q2 − + . 4n 2 4n HK(R, q) = Dealing with characteristics dividing 4n, the computations in Section 4.2 (and 4.1) still hold if p is odd. By a similar argument as in the previous section (just change the groups, the references are the same) the indecomposable, maximal Cohen-Macaulay modules (defined algebraically) are the same in the modular and the non-modular case. To get a full description of the Hilbert-Kunz function, we only need to take a closer look at the case p = 2. In this case the ring Dn+2 in Section 4.2 is not a Dn+2 -singularity, since it is a binomial hypersurface. 142 6. THE HILBERT-KUNZ FUNCTIONS OF SURFACE RINGS OF TYPE ADE Let q = 2e with e ≥ 1. Using Lemma 1.61, we obtain q SyzR (U q , V q , W q )  SyzR ((V n+1 + VW 2 ) 2 , V q , W q ) q q  SyzR (V (n+1)· 2 + V 2 W q , V q , W q ) q  SyzR (V 2 W q , V q , W q ) q  SyzR (V 2 , V q , 1)(−nq) q  SyzR (1, V 2 , 1)(−(n + 1)q)  R(−(n + 1)q) ⊕ R(−(n + 2)q). Using Formula (6.2), we get Q(n + 1, 2, n) · 4e + 4e = 2 · 4e . HK(R, 2 ) = 4n e Theorem 6.1. The Hilbert-Kunz function of Dn+2 is given by (with n ≥ 2, q = pe and r ≡ q mod 2n for 0 ≤ r ≤ 2n − 1)  2   2·q e 7−→  Ç   2− å if e ≥ 1, p = 2, 1 r + 1 r2 + otherwise. q2 − 4n 2 4n Using Theorem 1.91, one obtains Corollary 6.2. The F-signature function of R is given by if e ≥ 1, p = 2,   0 Fsign (R, q) =  1 2 r + 1 r2  ·q + − otherwise. 4n 2 4n 6.3. The case E6 Let R := k[U, V, W]/(U 2 +V 3 +W 4 ) with deg(U) = 6, deg(V) = 4, deg(W) = 3 and char(k) = p ≥ 5. The Frobenius pull-backs of SyzR (U, V, W) are indecomposable by Lemma 5.4. Since they have rank two and trivial determinant, we obtain a (0, 1)-Frobenius periodicity, extending globally to Ç å Ç å 13 SyzR (U , V , W )  SyzR (U, V, W) − · (p − 1) . 2 p p p Iterating yields the isomorphism 13 SyzR (U , V , W )  SyzR (U, V, W) − · (q − 1) 2 q q q 6.4. THE CASE E7 143 for all q and we get (with Formula (6.1)) 12 · Q(6, 4, 3) · q2 − 12 · Q(6, 4, 3) + 12 · 24 12 · 24 2 47 · q − 47 + 24 = 24å Ç 1 23 = 2− q2 − . 24 24 HK(R, q) = It remains to compute the Hilbert-Kunz function in characteristics two and three. Let p = 2. For q ≥ 2 we have by using Lemma 1.61 q  SyzR (U q , V q , W q ) = SyzR V q , W q , (V 3 + W 4 ) 2 = SyzR (V q , W q , V 3q 2 + W 2q )  SyzR (V q , W q , W 2q )  SyzR (V q , 1, W q )(−3q)  R(−6q) ⊕ R(−7q). Using Formula (6.2), we get HK(R, q) = 12 · Q(6, 4, 3) · q2 + 12 · q2 = 2 · q2 . 4·6·4·3 The analogue computation for p = 3 and q ≥ 3 gives HK(R, q) = 2 · q2 . Theorem 6.3. The Hilbert-Kunz function of E6 is given by  2   2·q Ç e 7−→    2− å if e ≥ 1 and p ∈ {2, 3}, 1 23 otherwise. q2 − 24 24 From this we get by Theorem 1.91 the F-signature function. Corollary 6.4. The F-signature function of R is given by   0 if e ≥ 1 and p ∈ {2, 3}, Fsign (R, q) =  1 2 23  ·q + otherwise. 24 24 6.4. The case E7 Let R := k[U, V, W]/(U 2 + V 3 + VW 3 ) with deg(U) = 9, deg(V) = 6, deg(W) = 4 and let char(k) = p ≥ 5. We get from Lemma 5.4 that the Frobenius pull-backs of SyzR (U, V, W) stay indecomposable and have to be isomorphic to either SyzR (U, V, W) or SyzR (U, V, W 2 ). Recall from Chapter 4 that the Hilbert-series can distinguish these two classes. The 144 6. THE HILBERT-KUNZ FUNCTIONS OF SURFACE RINGS OF TYPE ADE Hilbert-series of the corresponding R-modules are given by t10 + t13 + t15 + t18 HSyzR (U,V,W) (t) = (1 − t6 )(1 − t4 ) t14 + t15 + t17 + t18 HSyzR (U,V,W 2 ) (t) = . (1 − t6 )(1 − t4 ) With the help of Theorem 4.7 and Han’s Theorem 2.17 we compute the Hilbert-series of SyzR (U p , V p , W p ) and SyzR (U p , V p , W 2p ). In the first case we need to compute the degrees of the generators of Å SyzR V p , W p , (V 3 + VW 3 ) p−1 2 Å ã SyzR V p , W p , (V 3 + VW 3 ) and p+1 2 ã . We have the isomorphisms Å SyzR V p , W p , (V 3 + VW 3 ) p−1 2 SyzR V p , W p , (V 3 + VW 3 ) p+1 2 Å ã ã Å  SyzR V Å  SyzR V p+1 2 , W p , (V 2 + W 3 ) p−1 2 p−1 2 , W p , (V 2 + W 3 ) p+1 2 ã (−3(p − 1)) and ã (−3(p + 1)). Their syzygy gaps are given by Ç p+1 p p−1 12 · δ , , 4 3 2 (6.4) å Ç resp. å p−1 p p+1 12 · δ , , . 4 3 2 Similarly, in the second case the syzygy gaps of the corresponding S j from Theorem 4.7 are given by Ç p + 1 2p p − 1 12 · δ , , 4 3 2 (6.5) å Ç resp. å p − 1 2p p + 1 , , 12 · δ . 4 3 2 The various arguments of δ do not satisfy the strict triangle inequality if and only if p ≤ 9 p p+1 and the arguments are p−1 4 , 3 , 2 . In this case we have 12 · δ = 9 − p. In all other cases the s in Han’s Theorem has to be non-negative. For s = 0, p = 12l + r, r ∈ {1, 5, 7, 11} and p 3 as second argument, the values of 12 · δ are given in Table 6.1. r +, l even +, l odd −, l even −, l odd 1 2 2 8 4 5 2 2 4 8 7 8 4 2 2 11 4 8 2 2. Table 6.1. The table shows the values of (6.4) for all primes p ≥ 5 depending on their decomposition as p = 12l + r. The sign in the headline is the same as in the first argument of (6.4). With 2p 3 as second argument, the values of 12 · δ are given in Table 6.2. 6.4. THE CASE E7 145 r +, l even +, l odd −, l even −, l odd 1 2 2 4 8 2 2 8 4 5 7 4 8 2 2 8 4 2 2. 11 Table 6.2. The table shows the values of (6.5) for all primes p ≥ 5 depending on their decomposition as p = 12l + r. The sign in the headline is the same as in the first argument of (6.5). Computing the Hilbert-series, we find  p−1   t19· 2 · HSyzR (U,V,W) (t) HSyzR (U p ,V p ,W p ) (t) =  19· p−1 2 −2 HSyzR (U p ,V p ,W 2p ) (t) =  23· p−1 2 +2 t  p−1   t23· 2 t if p mod 24 ∈ {±1, ±7}, · HSyzR (U,V,W 2 ) (t) if p mod 24 ∈ {±5, ±11}, · HSyzR (U,V,W 2 ) (t) if p mod 24 ∈ {±1, ±7}, · HSyzR (U,V,W) (t) if p mod 24 ∈ {±5, ±11}. For the higher pull-backs we get Ç å  19(q − 1)     SyzR (U, V, W) − 2 q q q å Ç SyzR (U , V , W )   19(q − 1)  2   Syz (U, V, W ) − +2 R 2 if q mod 24 ∈ {±1, ±7}, if q mod 24 ∈ {±5, ±11}. Therefore, the Hilbert-Kunz function is given by (use Formula (6.1)) 18 · Q(9, 6, 4) · q2 − 18 · Q(9, 6, 4) + 18 · 48 18 · 48 2 95 · q − 95 + 48 = 48å Ç 1 47 = 2− q2 − , 48 48 HK(R, q) = if q mod 24 ∈ {±1, ±7} and (again with Formula (6.1)) 18 · Q(9, 6, 4) · q2 − 18 · Q(9, 6, 8) + 18 · 96 18 · 48 2 95 · q − 167 + 96 = 48 Ç å 1 71 = 2− q2 − , 48 48 HK(R, q) = if q mod 24 ∈ {±5, ±11}. 146 6. THE HILBERT-KUNZ FUNCTIONS OF SURFACE RINGS OF TYPE ADE Now let p = 2 and q ≥ 2. Then (by Lemma 1.61) Å Ä SyzR (U , V , W )  SyzR V , W , V + VW q q q Å q q  SyzR V , W , V q q Å 3 3q 2 q 2 Å q q  q äq ã +V W  SyzR V q , W q , V 2 W  SyzR V 2 , W q , W 3 3q 2 3q 2 2 3q 2 ã ã ã (−3q) q  SyzR V 2 , 1, W 2 (−7q)  R(−9q) ⊕ R(−10q). The corresponding value of the Hilbert-Kunz function is 2 · q2 by Formula (6.2). For p = 3 and q ≥ 3 we have (with Lemma 1.61) q SyzR (U q , V q , W q )  SyzR (U q , (U 2 + VW 3 ) 3 , W q )  SyzR (U q , U 2q 3 q + V 3 W q, W q) 2q  SyzR (U q , U 3 , W q ) q  SyzR (U 3 , 1, W q )(−6q)  R(−9q) ⊕ R(−10q). Again we get HK(R, q) = 2 · q2 . Theorem 6.5. The Hilbert-Kunz function of E7 is given by   2 · q2    Ç     å if e ≥ 1 and p ∈ {2, 3}, 1 2 47 q − if q mod 24 ∈ {±1, ±7}, e 7−→  48 48  Ç å   71 1    q2 − otherwise.  2− 48 48 2− Reformulating the cases in the above theorem in terms of p, one obtains the function  2  2·q    Ç   å if e ≥ 1 and p ∈ {2, 3}, 1 2 71 e 7−→  2 − 48 q − 48 if p mod 24 ∈ {±5, ±11} and e is odd,  Ç å   47 1    q2 − otherwise.  2− 48 48 By using Theorem 1.91, we can compute the F-signature function. 6.5. THE CASE E8 147 Corollary 6.6. The F-signature function of R is given by   0      1 if e ≥ 1 and p ∈ {2, 3}, 2 47 Fsign (R, q) =  48 · q + 48 if q mod 24 ∈ {±1, ±7},    1 2 71    ·q + otherwise. 48 48 6.5. The case E8 Let R := k[U, V, W]/(U 2 + V 3 + W 5 ) with deg(U) = 15, deg(V) = 10, deg(W) = 6 and let char(k) = p ≥ 7. By Lemma 5.4 the Frobenius pull-back of SyzR (U, V, W) is either SyzR (U, V, W) or SyzR (U, V, W 2 ). Moreover, their classes can be distinguished by the Hilbert-series. We have t16 + t21 + t25 + t30 (1 − t10 )(1 − t6 ) t22 + t25 + t27 + t30 HSyzR (U,V,W 2 ) (t) = . (1 − t10 )(1 − t6 ) HSyzR (U,V,W) (t) = We compute the Hilbert-series of SyzR (U p , V p , W p ) and SyzR (U p , V p , W 2p ), using Theorem 4.7 and Han’s Theorem 2.17. In the first case we need to compute Ç p p p∓1 30 · δ , , 3 5 2 (6.6) å and in the second case we are interested in the numbers å Ç p 2p p ∓ 1 , , . (6.7) 30 · δ 3 5 2 Note that for primes at most 13 the numbers 3p , 5p and p+1 2 do not satisfy the strict triangle inequality, in these cases we get 30 · δ = 15 − p. In all other cases the s in Han’s Theorem is non-negative. With s = 0, p = 30l + r and r ∈ {1, 7, 11, 13, 17, 19, 23, 29} one gets for 30 · δ with 5p as second argument the values shown in Table 6.3 and with 2p 5 as second argument the values are given in Table 6.4. Computing the Hilbert-series, we find  p−1   t31· 2 HSyzR (U p ,V p ,W p ) (t) =  t  p−1   t37· 2 HSyzR (U p ,V p ,W 2p ) (t) =  · HSyzR (U,V,W) (t) 31· p−1 2 −3 if p mod 30 ∈ {±1, ±11}, · HSyzR (U,V,W 2 ) (t) if p mod 30 ∈ {±7, ±13}, · HSyzR (U,V,W 2 ) (t)  t37· p−1 2 +3 · H SyzR (U,V,W) (t) if p mod 30 ∈ {±1, ±11}, if p mod 30 ∈ {±7, ±13}. 148 6. THE HILBERT-KUNZ FUNCTIONS OF SURFACE RINGS OF TYPE ADE r −, l odd −, l even +, l odd +, l even 1 14 4 4 14 8 2 2 8 7 11 4 14 14 4 2 8 8 2 13 17 2 8 8 2 4 14 14 4 19 23 8 2 2 8 14 4 4 14 29 Table 6.3. The table shows the values of (6.6) for all primes p ≥ 7 depending on their decomposition as p = 30l + r. The sign in the headline is the same as in the last argument of (6.6). r −, l odd −, l even +, l odd +, l even 1 8 2 2 8 7 14 4 4 14 11 2 8 8 2 13 4 14 14 4 . 17 4 14 14 4 19 2 8 8 2 23 14 4 4 14 29 8 2 2 8 Table 6.4. The table shows the values of (6.7) for all primes p ≥ 7 depending on their decomposition as p = 30l + r. The sign in the headline is the same as in the last argument of (6.7). For the higher pull-backs we get å Ç  31(q − 1)     SyzR (U, V, W) − 2 q q q Ç å SyzR (U , V , W )   31(q − 1)  2   Syz (U, V, W ) − +3 R 2 if q mod 30 ∈ {±1, ±11}, if q mod 30 ∈ {±7, ±13}. Using Formula (6.1), the Hilbert-Kunz function is given by 30 · Q(15, 10, 6) · q2 − 30 · Q(15, 10, 6) + 30 · 120 30 · 120 239 · q2 − 239 + 120 = 120 Ç å 1 119 = 2− q2 − , 120 120 HK(R, q) = 6.5. THE CASE E8 149 if q mod 30 ∈ {±1, ±11} and 30 · Q(15, 10, 6) · q2 − 30 · Q(15, 10, 12) + 30 · 240 30 · 120 2 239 · q − 431 + 240 = 120 å Ç 191 1 q2 − , = 2− 24 120 if q mod 30 ∈ {±7, ±13}. In characteristics two, three and five, all Frobenius pull-backs split and one obtains (similarly to the computations for E6 ) HKR (R, q) = 2 · q2 (with q > 1). HK(R, q) = Theorem 6.7. The Hilbert-Kunz function of E8 is given by   2 · q2    Ç     å if e ≥ 1 and p ∈ {2, 3, 5}, 1 2 119 e 7−→  2 − 120 q − 120 if q mod 30 ∈ {±1, ±11},  Ç å   1 191    otherwise. q2 −  2− 120 120 Reformulating the cases in the above theorem in terms of p, one obtains the function   2 · q2    Ç     å if e ≥ 1 and p ∈ {2, 3, 5}, 1 2 191 q − if p mod 30 ∈ {±7, ±13} and e is odd, e 7−→  120 120  Ç å   1 119    otherwise. q2 −  2− 120 120 With the help of Theorem 1.91 one gets the F-signature function. 2− Corollary 6.8. The F-signature function of R is given by  0 if e ≥ 1 and p ∈ {2, 3, 5},        1 2 119 Fsign (R, q) =  120 · q + 120 if q mod 30 ∈ {±1, ±11},    1 191    · q2 + otherwise. 120 120 In any case the Hilbert-Kunz functions of surface rings of type ADE have (at least for 1 p ≥ 7) a periodic O(1)-term. One possible value of this term is always 1 − |G| . It is not known whether the other possible values of the O(1)-term can be expressed in terms of invariants of the corresponding groups. Another question is whether the length of the Frobenius periodicity of Syz(m) is encoded in properties of the group G. CHAPTER 7 Extensions and further examples In this chapter we want to discuss further examples of the methods developed so far. More explicitly, we will compute the Hilbert-Kunz function of a surface ring of type E8 with respect to different ideals I , m and the Hilbert-Kunz functions of the degenerations A∞ := k[X, Y, Z]/(XY) and D∞ := k[X, Y, Z]/(X 2 Y − Z 2 ) of the singularities of type An and Dn . In the fourth section we will combine our approach with a theorem of Kustin, Rahmati and Vraciu to compute the Hilbert-Kunz functions of the homogeneous coordinate ring of Fermat curves under the condition that Syz(m) is strongly semistable on the projective spectrum. Finally, in section five we will state some open questions and discuss possible generalizations of various theorems. 7.1. Hilbert-Kunz functions of E8 with respect to various ideals I , m In this section we will demonstrate how the developed methods are helpfull to compute the Hilbert-Kunz function of E8 with respect to the ideals (X, Y, Z 2 ) resp. (X, Y 2 , YZ, Z 2 ). Example 7.1. Let k be an algebraically closed field of characteristic p ≥ 7, R := k[X, Y, Z]/(X 2 + Y 3 + Z 5 ), U := Spec(R) \ {(X, Y, Z)} and I := (X, Y, Z 2 ). By Lemma 5.4 the Frobenius pull-backs of SyzU (I) are indecomposable, hence of the form SyzU (I) or SyzU (X, Y, Z) by Theorem 3.42. By the explicit computations of the Hilbert-series of SyzR (X p , Y p , Z p ) and SyzR (X p , Y p , Z 2p ) in Section 6.5 we obtain Ç å  37(q − 1)  2  if q mod 30 ∈ {±1, ±11},   SyzR (X, Y, Z ) − 2 q q 2q Ç å SyzR (X , Y , Z )   37(q − 1)    SyzR (X, Y, Z) − −3 if q mod 30 ∈ {±7, ±13}. 2 Using Lemma 2.2 and Remark 1.22 one obtains that HK(I, R, q) is given by 30 · Q(15, 10, 12) · q2 − 30 · Q(15, 10, 6c) + c, 4 · 15 · 10 · 6 where c ∈ {1, 2} such that SyzR (X q , Y q , Z 2q )  SyzR (X, Y, Z c )(m) for some m ∈ Z. All in all, the function Ä ä 71 2 119  3 +  120 ä q − 120 Ä e 7−→  3 + Ä   3+ 71 2 120 ä q − 71 2 120 q − 191 120 191 120 if p mod 30 ∈ {±7, ±13} and e is odd, if p mod 30 ∈ {±7, ±13} and e is even, if p mod 30 ∈ {±1, ±11} is the Hilbert-Kunz function of R with respect to I. 151 152 7. EXTENSIONS AND FURTHER EXAMPLES Example 7.2. Let k, R and U be as in the previous example and I := (X, Y 2 , YZ, Z 2 ). Then SyzR (I) is the module M2 from Theorem 3.42. Since there are no non-trivial line bundles on U the Frobenius pull-backs of SyzU (I) either stay indecomposable or become free. In the case where SyzU (I [q] ) is indecomposable for some q it has to be isomorphic to either SyzU (I) or SyzU (X, Y 2 , YZ, Z 3 ), since these are representatives for the two indecomposable vector bundles of rank three (cf. Theorem 3.42). Which of the possibilities is true can be checked by the Hilbert-series. In view of Theorem 4.7 we need to compute the degree of the generators of S q−1 := SyzR (X q−1 , Y 2q , Y q Z q , Z 2q ) and S q+1 := SyzR (X q+1 , Y 2q , Y q Z q , Z 2q ) to compute the Hilbert-series of SyzR (X q , Y 2q , Y q Z q , Z 2q ). Since there is no effective way to compute these we restrict to p = 7. An explicit computation using CoCoA shows that S 7−1 is generated by elements of degree 140, 142 and 144, while S 7+1 is generated by elements of degree 150, 152 and 154. This shows HSyzR (X 7 ,Y 14 ,Y 7 Z 7 ,Z 14 ) (t) = t124 HSyzR (X,Y 2 ,YZ,Z 3 ) (t). (7.1) The module SyzR (X 6 , Y 14 , Y 7 Z 7 , Z 21 ) is generated by elements of degree 152, 156 and 160 and the module SyzR (X 8 , Y 14 , Y 7 Z 7 , Z 21 ) is generated by elements of degree 162, 166 and 170. This gives HSyzR (X 7 ,Y 14 ,Y 7 Z 7 ,Z 21 ) (t) = t135 HSyzR (X,Y 2 ,YZ,Z 2 ) (t). (7.2) Combining (7.1) and (7.2) one finds Ä 7e SyzR X , Y 2·7e 7e 7e ,Y Z ,Z ä 2·7e 2 3 R (X, Y , YZ, Z )(−21q + 23)  SyzR (Y, Y 2 , YZ, Z 2 )(−21q + 21)   Syz if e is odd, if e is even. With the help of the standard-graded ring S := k[U, V, W]/(U 30 + V 30 + W 30 ) and the map R → S , X 7→ U 15 , Y 7→ V 10 , Z 7→ W 6 , we can compute ÄÄ ä HK U 15 , V 20 , V 10 W 6 , W 12 , S , 7e ä as in Lemma 2.2. Let q := 7e , a ∈ {2, 3}, n := 21q − 17 − 2a and  2700 D := dimk (S /(U 15 , V 20 , V 10 W 6 , W 6a ) =  3600 if a = 2, if a = 3, where a and n are chosen such that SyzR (X q , Y 2q , Y q Z q , Z 2q )  SyzR (X, Y 2 , YZ, Z a )(−n). 7.2. THE HILBERT-KUNZ FUNCTION OF A∞ With these preparations we obtain ÄÄ ä 153 ä HK U 15 , V 20 , V 10 W 6 , W 12 , S , q  = x→∞ lim − + x X  0 h (OC (m)) − m=0 x X m=0 x X x X 0 h (OC (m − 15q)) − m=0 x X h0 (OC (m − 16q)) − h0 (OC (m − n − 20)) + x X h0 (OC (m − 20q)) m=0 x X h0 (OC (m − 12q)) + m=0 m=0 − x X x X h0 (OC (m − n − 15)) m=0 h0 (OC (m − n − 16)) + m=0 x X h0 (OC (m − n − 6a)) m=0  h0 (OC (m − n)) + D m=0  = lim  x→∞ − x X h0 (OC (m)) − m=0 x−12q X h0 (OC (m)) − h0 (OC (m)) + x−n−15 X h0 (OC (m)) − m=0 x−n X h0 (OC (m) − x−16q X m=0 h0 (OC (m)) + x−n−20 X m=0 x−n−6a X x−20q X m=0 m=0 + x−15q X h0 (OC (m)) m=0 h0 (OC (m)) + m=0 x−n−16 X h0 (OC (m)) m=0  h0 (OC (m)) + D m=0 = 30 · (149q + 12a − 102a + 7) + D. 2 2 Since the degree of the extension Ä ä k[U, V, W]/ U 15 , V 10 , W 6 : k is 15 · 10 · 6 = 302 we obtain  30 · 149 · 49e − 2130 HK(IS , S , 7e ) =  30 · 149 · 49e − 1770 if e is odd, if e is even and  71 149    · 49e −  if e is odd, 30 30 HK(I, R, 7 ) =    149 · 49e − 59 if e is even.  30 30 By Theorem 1.80 we see that the vector bundle SyzProj(S ) (IS ) is strongly semistable. e 7.2. The Hilbert-Kunz function of A∞ In this and the following section we will compute the Hilbert-Kunz functions of the rings A∞ and D∞ . These examples will show, that we (at least in these cases) can drop the assumptions (i) isolated singularity, (ii) normal domain, (iii) finite Cohen-Macaulay type, 154 7. EXTENSIONS AND FURTHER EXAMPLES (iv) there are finitely many isomorphism classes of indecomposable vector bundles on the punctured spectrum. Note that we discussed the idea to contsruct first syzygy modules of ideals representing the indecomposable, maximal Cohen-Macaulay modules only under the assumption of a normal ring. The condition normal was only required to ensure that there has to be such a representation. If the ring is not normal, first syzygy modules of ideals are still reflexive, but they might not be maximal Cohen-Macaulay. We choose the standard-grading for the ring A∞ := k[X, Y, Z]/(XY). Theorem 7.3 (Burban, Drozd). The indecomposable, non-free, maximal Cohen-Macaulay A∞ -modules are described up to isomorphism (and degree shift) by the following matrix factorizations of XY (i) (X, Y) and (Y, X), (ii) åå å Ç åå ÇÇ å Ç ÇÇ Y Zn X −Z n X −Z n Y Zn , , and , 0 X 0 Y 0 Y 0 X for all n ≥ 1. Moreover, the modules corresponding to the matrix factorizations in (i) are the two components of the normalization k[X, Z] × k[Y, Z] of A∞ and are not locally free on the punctured spectrum of A∞ . The modules corresponding to the matrix factorizations in (ii) are locally free of rank one on the punctured spectrum.  Proof. See [BD08, Theorem 5.3 and Remark 5.5]. The syzygy modules SyzA∞ (X) and SyzA∞ (Y) correspond to the matrix factorizations in (i). Obviously, they are selfdual. The syzygy modules SyzA∞ (Y, Z n ) and SyzA∞ (X, −Z n ) correspond to the matrix factorizations in (ii). They are dual to each other, since ÇÇ (α, α) : Ä ä å Ç Y 0 X 0 , n Z X −Z n Y åå ÇÇ → å Ç X −Z n Y Zn , 0 Y 0 X åå , with α := 01 −1 0 is an equivalence of matrix factorizations. Using Formula (4.2) on page 115, one obtains 1+t , HA∞ (t) = (1 − t)2 t2 HSyzA∞ (X) (t) = HSyzA∞ (Y) (t) = , (1 − t)2 t2 + tn+1 HSyzA∞ (Y,Z n ) (t) = HSyzA∞ (X,−Z n ) (t) = . (1 − t)2 In this case the Hilbert-series of a maximal Cohen-Macaulay module that is locally free on the punctured spectrum can detect its isomorphism class up to dualizing with one exception. Namely, the modules SyzA∞ (X, Z 2 ), SyzA∞ (Y, Z 2 ) and A∞ (−2) have the same Hilbert-series. 7.3. THE HILBERT-KUNZ FUNCTION OF D∞ 155 From the splitting SyzA∞ (X, Y, Z) = SyzA∞ (X, Z) ⊕ SyzA∞ (Y, Z), we deduce the splittings SyzA∞ (X q , Y q , Z q ) = SyzA∞ (X q , Z q ) ⊕ SyzA∞ (Y q , Z q ), where by the symmetry of the problem SyzA∞ (X q , Y q , Z q ) is either free or of the form SyzA∞ (X, Z n )(m) ⊕ SyzA∞ (Y, Z n )(m) for some n ∈ N and some m ∈ Z. All in all, we see that it is enough to detect the isomorphism class of SyzA∞ (X q , Z q ) up to dualizing. By Formula (4.2) on page 115, we have (2tq − 1)(1 − t2 ) + Hk[X,Y,Z]/(X q ,Z q ,XY) (t). (1 − t)3 With M := k[X, Y, Z]/(X q , Z q ) one has by [KR05, Proposition 5.2.16] (7.3) HSyzA∞ (X q ,Z q ) (t) = Hk[X,Y,Z]/(X q ,Z q ,XY) (t) = H M/(XY)M (t) = H M (t) − t2 H M/(0:M (XY)) (t) = H M (t) − t2 H M/(X q−1 )M (t) (1 − tq )2 2 (1 − tq−1 )(1 − tq ) −t · . (1 − t)3 (1 − t)3 Substituting Equation (7.4) in Equation (7.3), one obtains = (7.4) HSyzA∞ (X q ,Z q ) (t) = 2 q+1 tq+1 + t2q q−1 t + t = t · . (1 − t)2 (1 − t)2 If q , 2, this gives directly SyzA∞ (X q , Z q )  SyzA∞ (X, Z q )(−q + 1) or SyzA∞ (X q , Z q )  SyzA∞ (Y, Z q )(−q + 1). In the case q = 2, we might have SyzA∞ (X 2 , Z 2 )  A∞ (−3). But SyzA∞ (X 2 , Z 2 ) is obviously not free. All in all, we see SyzA∞ (X q , Y q , Z q ) = SyzA∞ (X, Y, Z q ) and get by Lemma 2.2 2 · Q(1, 1, 1) · q2 − 2 · Q(1, 1, q) + 4q = 2q2 − q. 4 Comparing this result with Example 1.5, we see HK(A∞ , q) = HK(A∞ , q) = lim HK(An , q). n→∞ 7.3. The Hilbert-Kunz function of D∞ For the ring D∞ := k[X, Y, Z]/(X 2 Y − Z 2 ) we choose the grading deg(X) = deg(Y) = 2 and deg(Z) = 3. Theorem 7.4 (Burban, Drozd). The indecomposable, non-free, maximal Cohen-Macaulay D∞ -modules are described up to isomorphism (and degree shift) by the following matrix factorizations of X 2 Y − Z 2 156 7. EXTENSIONS AND FURTHER EXAMPLES (i) ÇÇ å Ç Z XY −Z XY , X Z X −Z åå , (ii) ÇÇ 2 X Z å Ç Y −Z Z , Y −Z X 2 åå , (iii) áá Z XY 0 −Y n+1 X Z Yn 0 0 0 Z XY 0 0 X Z ë á −Z −XY 0 Y n+1 X Z Yn 0 0 0 −Z −XY 0 0 X Z , ëë , for all n ≥ 1 and (iv) áá Z XY −Y n 0 X Z 0 Yn 0 0 Z XY 0 0 X Z ë á , −Z −XY −Y n 0 X Z 0 −Y n 0 0 −Z −XY 0 0 X Z ëë , for all n ≥ 1. Moreover, all corresponding modules are selfdual, the module corresponding to the matrix factorization (i) has rank one, it is the normalization of D∞ and is not locally free on the punctured spectrum. The modules corresponding to the matrix factorizations (ii), (iii) and (iv) are locally free on the punctured spectrum and have rank one in case (ii) and rank two in the cases (iii) and (iv). Proof. See [BD08, Theorem 5.7 and Remark 5.9].  Corresponding first syzygy modules of ideals are given by (i) (ii) (iii) (iv) SyzD∞ (X, Z) in case (i), SyzD∞ (Z, Y) in case (ii), SyzD∞ (Y n+1 , −XY, Z) in case (iii) and SyzD∞ (Y n , −Z, X) in case (iv), where one has to remove the second column in the second matrices to get the representations (iii) and (iv). Although we do not need the Hilbert-series of the above modules to compute the HilbertKunz function of D∞ , we compute them for completeness, using Theorem 4.7. They are 7.3. THE HILBERT-KUNZ FUNCTION OF D∞ 157 given by 1 + t3 , (1 − t2 )2 t5 + t6 HSyzD∞ (X,Z) (t) = , (1 − t2 )2 t5 + t6 , HSyzD∞ (Z,Y) (t) = (1 − t2 )2 t6 + t7 + t2n+4 + t2n+5 HSyzD (Y n+1 ,−XY,Z) (t) = and ∞ (1 − t2 )2 t5 + t6 + t2n+2 + t2n+3 n HSyzD∞ (Y ,−Z,X) (t) = . (1 − t2 )2 One should mention the phenomenon that we have two indecomposable, maximal CohenMacaulay D∞ -modules with the same Hilbert-series, but one is locally free on the punctured spectrum, while the other one is not. To compute the Hilbert-Kunz function of D∞ , we start with the case p = 2 and q ≥ 2. Using Lemma 1.61, we obtain HD∞ (t) = q  SyzD∞ (X q , Y q , Z q )  SyzD∞ X q , Y q , X q Y 2 q   SyzD∞ 1, Y q , Y 2 (−2q) q    SyzD∞ 1, Y 2 , 1 (−3q)  D∞ (−3q) ⊕ D∞ (−4q). Using Formula (6.2) on page 139, one gets 6 · Q(2, 2, 3) · 4e + 6 · 4e = 2 · 4e . 48 If p is odd and q > 1, we get by Lemma 1.61 HK(D∞ , 2e ) = Å SyzD∞ (X q , Y q , Z q )  SyzD∞ X q , Y q , ZX q−1 Y Å  SyzD∞ X, Y , ZY Å  SyzD∞ X, Y q q+1 2 q−1 2 q−1 2 ã ã (−2(q − 1)) ã , Z (−3(q − 1)). Using Formula (6.1) on page 139, one obtains 6 · Q(2, 2, 3) · q2 − 6 · Q(2, q + 1, 3) + 24 · (q + 1) 1 = 2 · q2 − · (q + 1). 48 2 To stay in our approach, we compute the Hilbert-series of SyzD∞ (X q , Y q , Z q ) to identify its isomorphism class. By Theorem 4.7, we have HK(D∞ , q) = HSyzD∞ (X q ,Y q ,Z q ) (t) = (t3 − t6 ) HSyzD ∞ (X q ,Y q ,Z q−1 ) (t) + (1 − t3 ) HSyzD ∞ (X 1 − t6 q ,Y q ,Z q+1 ) (t) . 158 7. EXTENSIONS AND FURTHER EXAMPLES It is not hard to see that ±Ö SyzD∞ (X q , Y q , Z q−1 ) = ±Ö SyzD∞ (X q , Y q , Z q+1 ) = Y q−1 è 2 0 −X Yq −X q 0 Ö X q−1 q+1 −Y 2 , è Ö , èª 0  D∞ (−3q + 1) ⊕ D∞ (−4q + 2), q+1 èª XY 2 0 −1  D∞ (−4q) ⊕ D∞ (−3q − 3). Therefore, t3q+2 + t3q+3 + t4q + t4q+1 (1 − t2 )2 t5 + t6 + tq+3 + tq+4 = t3q−3 · . (1 − t2 )2 HSyzD∞ (X q ,Y q ,Z q ) (t) = Since the Hilbert-series of an indecomposable, maximal Cohen-Macaulay D∞ -module, which is locally free on the punctured spectrum, detects its isomorphism class, we obtain Å SyzD∞ (X q , Y q , Z q )  SyzD∞ X, Y q+1 2 ã , Z (−3q + 3), provided we can show that the module in question is indecomposable, since from the Hilbert-series and the fact that SyzD∞ (X q , Y q , Z q ) is locally free on the punctured spectrum, the splitting SyzD∞ (X q , Y q , Z q )  SyzD∞ (Z, Y)(−3q + 3) ⊕ SyzD∞ (Z, Y)(−4q + 5) is still possible. A comparison with Theorem 6.1 yields HK(D∞ , q) = n→∞ lim HK(Dn , q). 7.4. On the Hilbert-Kunz functions of two-dimensional Fermat rings In this section we want to compute the Hilbert-Kunz functions of the Fermat rings R := k[X, Y, Z]/(X n + Y n + Z n ), where k is algebraically closed of positive characteristic p with gcd(p, n) = 1, under the condition that SyzC (X, Y, Z) is strongly semistable on C := Proj(R). For this computation we need a result of [KRV12]. For completeness, we explain how Kaid computed in his thesis (cf. [Kai09]) the values of the Hilbert-Kunz function of R for large q if SyzC (X, Y, Z) is not strongly semistable. We start with the case, where SyzC (X, Y, Z) is not strongly semistable. Recall that this is equivalent to å Ç 1 1 1 ,0 δ , , n n n by Corollaries 2.33 and 2.36. 7.4. ON THE HILBERT-KUNZ FUNCTIONS OF TWO-DIMENSIONAL FERMAT RINGS 159 ä Ä Theorem 7.5 (Kaid). Assume gcd(p, n) = 1. If δ n1 , 1n , 1n , 0 and s is the integer of Han’s Theorem 2.17, then F s∗ (SyzC (X, Y, Z)) is not semistable. Let p s = nl + r with l ∈ N and 0 ≤ r ≤ n − 1. Then the Frobenius pull-back F s∗ (SyzC (X, Y, Z)) has a strong HarderNarasimhan filtration given by åå Ç Ç å å Ç Ç l l s∗ s → F (SyzC (X, Y, Z)) → OC n l + 1 + − 3p → 0, 0 → OC −n l + 1 + 2 2 if l is even and Ç Ç ú üå å Ç Ç ú üå å l l s∗ s 0 → OC −n l + − 3r → F (SyzC (X, Y, Z)) → OC n l + + 3r − 3p → 0, 2 2 if l is odd. Moreover, under the additional assumption gcd(p, n) = 1 this filtration is minimal for p ≥ d − 3 and s ≥ 1 in the sense that F s−1∗ (SyzC (X, Y, Z)) is semistable. Proof. At first one needs to prove that the inclusions in the above sequences are nontrivial. This is done in [Kai09, Lemma 4.2.8]. In the second step one has to show that the kernels above are in fact the maximal destabilizing subbundles. This is done in [Kai09, Theorem 4.2.12] by computing the degree of the maximal destabilizing subbundles. The supplement is proven in [Kai09, Theorem 4.2.12] by using Corollary 1.81.  Remark 7.6. In the situation of Theorem 7.5, one has Ç s s så p p p , , , Lodd < 1 n n n 1 by assumption. If l is even, this distance is achieved for Ç¢ s • ¢ s • ¢ s •å p p p , , ∈ Lodd , n n n showing 3r > 2n. Similarly, if l is odd one obtains 3r < n. From Theorem 7.5 one obtains the Hilbert-Kunz function of R for large q. Theorem 7.7 (Kaid). In the situation of Theorem 7.5 one has HK(R, pe ) = eHK (R)p2e for all e  0. Proof. By Theorem 7.5 we have a short exact sequence 0 → OC (α) → F s∗ (SyzC (X, Y, Z)) → OC (β) → 0. Since this is the strong Harder-Narasimhan filtration of F s∗ (SyzC (X, Y, Z)), we obtain by Remark 1.75 the strong Harder-Narasimhan filtrations 0 → OC (α · pt ) → F s+t∗ (SyzC (X, Y, Z)) → OC (β · pt ) → 0. These sequences split, whenever Ä ä Ä ä Ext1 OC (β · pt ), OC (α · pt )  H1 C, OC ((α − β) · pt ) vanishes. Using Serre duality and ωC  OC (n − 3) (cf. [Har87, Example II.8.20.3]), we have to show that OC ((2n − 3r) · pt + n − 3) if l is even or OC ((3r − n) · pt + n − 3) if l is odd 160 7. EXTENSIONS AND FURTHER EXAMPLES have no global sections. This is true if (2n − 3r) · pt + n − 3 resp. (3r − n) · pt + n − 3 is negative. In view of Remark 7.6 this happens for t big enough. In particular, we must have t ≥ 1. Note that t = 1 is enough in the cases p > n − 3. Then one can compute the Hilbert-Kunz function for large e with the help of Lemma 2.1. See [Kai09, Corollary 4.2.17] for the complete proof.  Example 7.8. Let p = 5 and n = 6. Then s = 1 in Han’s Theorem 2.17 and by Theorem 7.5 the strong Harder-Narasimhan filtration of F∗ (SyzC (X, Y, Z)) is given by 0 → OC (−6) → SyzC (X 5 , Y 5 , Z 5 ) → OC (−9) → 0. Taking the t-th Frobenius pull-back of this sequence, the resulting sequence splits if −3 · 5t + 3 < 0 ⇔ t ≥ 1. Explicitly, we have Fe∗ (SyzC (X, Y, Z))  OC (−6 · 5e−1 ) ⊕ OC (−9 · 5e−1 ) for e ≥ 2. By Theorem 7.7 and Corollary 2.36 the Hilbert-Kunz function of R for e ≥ 2 is given by 126 e ·5 . HK(R, 5e ) = eHK (R) · 5e = 25 Ä ä Example 7.9. Let p = 3 and n = 7. Then δ 17 , 17 , 17 = have the strong Harder-Narasimhan filtration 1 63 with s = 2. By Theorem 7.5 we 0 → OC (−13) → F2∗ (SyzC (X, Y, Z)) → OC (−14) → 0. Since −3t + 4 < 0 ⇔ t ≥ 2, the e-th Frobenius pull-backs of SyzC (X, Y, Z) split as Ä ä Ä OC −13 · pe−2 ⊕ OC −14 · pe−2 ä for e ≥ 4. By Theorem 7.7 and Corollary 2.36 we have 427 e HK(R, 3e ) = eHK (R) · 3e = ·3 81 for e ≥ 4. The other values are HK(R, 30 ) = 1, HK(R, 31 ) = 27, HK(R, 32 ) = 419 and HK(R, 33 ) = 3843 by an explicit computation with CoCoA. Moreover, another explicit computation shows SyzR (X 9 , Y 9 , Z 9 )  SyzR (X 5 , Y 5 , Z 5 )(−6) and SyzR (X 27 , Y 27 , Z 27 )  R(−39) ⊕ R(−42). We now turn to the case, where SyzC (X, Y, Z) is strongly semistable. Lemma 7.10. If p is odd, the bundle SyzC (X, Y, Z) is not strongly semistable if and only if there is a q = pe such that SyzC (X q , Y q , Z q )  OC (l1 ) ⊕ OC (l2 ) holds for some l1 , l2 ∈ Z. Proof. Let SyzC (X, Y, Z) be strongly semistable and assume that SyzC (X q , Y q , Z q )  OC (l1 ) ⊕ OC (l2 ) for some q. Since SyzC (X q , Y q , Z q ) is semistable, we must have l1 = l2 . Computing the degrees of the vector bundles SyzC (X q , Y q , Z q ) and OC (l)2 , one obtains the contradiction −3nq = 2nl. If SyzC (X, Y, Z) is not strongly semistable, then by the proof of Theorem 7.7 the bundles SyzC (X q , Y q , Z q ) split as OC (l1 ) ⊕ OC (l2 ) for all large q.  7.4. ON THE HILBERT-KUNZ FUNCTIONS OF TWO-DIMENSIONAL FERMAT RINGS 161 Corollary 7.11. If p is odd, the bundle SyzC (X, Y, Z) is strongly semistable if and only if all quotients R/(X q , Y q , Z q ) have infinite projective dimension. Proof. For a fixed q the quotient R/(X q , Y q , Z q ) has finite projective dimension if and only SyzR (X q , Y q , Z q ) is free if and only if SyzC (X q , Y q , Z q )  OC (l1 ) ⊕ OC (l2 ) for some l1 , l2 ∈ Z.  Remark 7.12. Note that Lemma 7.10 and Corollary 7.11 hold in characteristic two under the further assumption that SyzC (X, Y, Z) is not trivialized by the Frobenius. In [KRV12] the authors study on Fermat rings R of degree n the minimal projective resolution of the quotients Ä ä R/ X N , Y N , Z N depending on N and n. In particular they have shown the following. Theorem 7.13 (Kustin, Rahmati, Vraciu). Let R = k[X, Y, Z]/(X n + Y n + Z n ), where k denotes a field of characteristic p ≥ 0 and n ∈ N≥1 . For a given integer N ≥ 1 the quotient R/(X N , Y N , Z N ) has finite projective dimension as R-module if and only if one of the following conditions is satisfied (i) n|N, (ii) p = 2 and n ≤ N, (iii) p is odd and there exist positive integers J and e with J odd such that  e−1  3  e N Jp − <  p 3−1 n   pe +1 e 3 if p = 3, if pe ≡ 1 mod 3, if pe ≡ 2 mod 3  Proof. See [KRV12, Theorem 6.3]. Moreover, Kustin, Rahmati and Vraciu computed the minimal graded free resolution of R/(X N , Y N , Z N ) if this quotient has infinite projective dimension. Definition 7.14. Let r and s be positive integers with r + s = n. Then we define á ϕr,s := 0 Z r −Y r X s −Z r 0 Xr Y s r r Y −X 0 Zs −X s −Y s −Z s 0 ë . Note that ϕr,s ϕ s,r = −(X n + Y n + Z n ) Id4 , hence (ϕr,s , ϕ s,r ) are matrix factorizations for −(X n + Y n + Z n ). They are equivalent to the matrix factorizations from Example 3.30 with di = n and a = b = c = r. This gives the (ungraded) isomorphisms coker(ϕr,s )  SyzR (X r , Y r , Z r ). Theorem 7.15 (Kustin, Rahmati, Vraciu). Let N = θ · n + r with θ ∈ N and r ∈ {1, . . . , n − 1}. Assume that Ä ä Q := R/ X N , Y N , Z N 162 7. EXTENSIONS AND FURTHER EXAMPLES has infinite projective dimension. If θ = 2 · η − 1, then the homogenous minimal free resolution of Q is given by ... ϕr,n−r / F3 ϕn−r,r / F2 ϕr,n−r / / / R(−N)3 F1 R with F1 := R(−3ηn + n − r)3 ⊕ R(−3ηn + 2n − 3r), F2 := R(−3ηn + n − 2r)3 ⊕ R(−3ηn), F3 := R(−3ηn − r)3 ⊕ R(−3ηn + n − 3r). If θ = 2 · η, then the homogenous minimal free resolution of Q is given by ... ϕn−r,r / F3 ϕr,n−r / F2 ϕn−r,r / F1 / / R(−N)3 R with F1 := R(−3ηn − 2r)3 ⊕ R(−3ηn − n), F2 := R(−3ηn − n − r)3 ⊕ R(−3ηn − 3r), F3 := R(−3ηn − n − 2r)3 ⊕ R(−3ηn − 2n). Proof. The statement follows from [KRV12, Theorem 3.5] combined with [KRV12, Theorems 5.14 and 6.1].  Corollary 7.16. Under the hypothesis of Theorem 7.15, we have Ä ä  coker(ϕ SyzR X N , Y N , Z N (m)   if θ is even, coker(ϕn−r,r ) if θ is odd, r,n−r )  Syz  R (X SyzR r, Y r, Zr) (X n−r , Y n−r , Z n−r ) if θ is even, if θ is odd. for some m ∈ Z. In [BK13] the authors proved that SyzC (X, Y, Z) admits a (0, 1)-Frobenius periodicity if p ≡ −1 (2n) (cf. Example 7.20). The last corollary was the last ingredient necessary to generalize this result. Theorem 7.17. Let C be the projective Fermat curve of degree n over an algebraically closed field of characteristic p > 0 with gcd(p, n) = 1. The bundle SyzC (X, Y, Z) admits a Frobenius periodicity if and only if Ç å 1 1 1 = 0. δ , , n n n Moreover, the length of this periodicity is bounded above by the order of p modulo 2n. Proof. If SyzC (X, Y, Z) admits a Frobenius periodicity, it has to be strongly semistable. If it is strongly semistable we have to distinguish two cases. If SyzC (X, Y, Z) is trivialized by the Frobenius (which might only happen if p = 2 by Lemma 7.10), we have of course a Frobenius periodicity. Otherwise, we obtain a Frobenius periodicity by Corollary 7.16, 7.4. ON THE HILBERT-KUNZ FUNCTIONS OF TWO-DIMENSIONAL FERMAT RINGS 163 which can be applied by Corollary 7.11 (resp. Remark 7.12). The supplement follows  since the isomorphism class of SyzR (X q , Y q , Z q ) depends on r and the parity of q−r n . This result enables us to compute the Hilbert-Kunz function of R, if SyzC (X, Y, Z) is strongly semistable. If SyzC (X, Y, Z) is trivialized by the Frobenius, we can use Lemma 2.1 to obtain HK(R, 2e ) = 3n · 4e−1 for e  0. Theorem 7.18. Let R := k[X, Y, Z]/(X n + Y n + Z n ) with an algebraically closed field k of characteristic p > 0 coprime to n. Assume that SyzC (X, Y, Z) is strongly semistable and not trivialized by the Frobenius. Let q = pe = nθ + r with θ ∈ N and 0 ≤ r < n. Then  3n 2 3n 2 3    ·q − r +r  if θ is even, 4 HK(R, q) =  4 3n 2 3n    · q − (n − r)2 + (n − r)3 if θ is odd. 4 4 Proof. If SyzC (X, Y, Z) is strongly semistable, the quotients R/(X q , Y q , Z q ) have infinite projective dimension and their resolutions are given by Theorem 7.15. Now combine Corollary 7.16 with Lemma 2.2.  Example 7.19. Let pÄ ≡ 1 (2n). We have always pe = nθ + 1 for some even θ. An easy ä 1 1 1 computation shows δ n , n , n = 0. By Corollary 7.16, we have Ç 3 SyzR (X , Y , Z )  Syz(X, Y, Z) − · (q − 1) 2 q q å q for all q, hence SyzC (X, Y, Z) admits a (0, 1)-Frobenius periodicity. With Theorem 7.18 we obtain 3n 2 3n HK(R, q) = ·q +1− . 4 4 Example 7.20. Let p ≡ −1 (2n). We have pe = nθ + n − 1 for some oddÄ θ if e is ä odd and pe = nθ + 1 for some even θ if e is even. Again, it is easy to show δ 1n , 1n , 1n = 0. By Corollary 7.16, we have Ç 3 SyzR (X , Y , Z )  Syz(X, Y, Z) − · (q − 1) 2 q q å q for all q, hence SyzC (X, Y, Z) admits a (0, 1)-Frobenius periodicity. With Theorem 7.18 we obtain 3n 2 3n ·q +1− . HK(R, q) = 4 4 This recovers Theorem 3.4 and Corollary 4.1 of [BK13]. Example 7.21. Let n = 5. If p ≡ ±1 (10), the Hilbert-Kunz function of R was computed in the two previous examples and is given by HK(R, q) = 15 2 11 ·q − . 4 4 164 7. EXTENSIONS AND FURTHER EXAMPLES In this case we can also compute the Hilbert-Kunz function for p ≡ ±3 (10). If p ≡ 3 (10), we have pe = 5θ + r, where (θ, r) is of the form   (even, 3)     (odd, 4) if e ≡ 1 (4), if e ≡ 2 (4), (θ, r) =  (odd, 2) if e ≡ 3 (4),     (even, 1) if e ≡ 0 (4). If p ≡ 7 (10), we have pe = 5θ + r, where (θ, r) is of the form   (odd, 2)    (odd, 4) if e ≡ 1 (4), if e ≡ 2 (4), (θ, r) =  (even, 3) if e ≡ 3 (4),     (even, 1) if e ≡ 0 (4). It easy to check that δ Ä 1 1 1 5, 5, 5 ä = 0 in both cases. From Corollary 7.16 we obtain Ç å  3  3 3 3    SyzR (X , Y , Z ) − 2 · (q − 3) e∗ Ç å F (SyzC (X, Y, Z))   3    Syz (X, Y, Z) − · (q − 1) R 2 if e is odd, if e is even. Since the Hilbert-series −3t6 + t5 − t3 + 3t2 HSyzR (X,Y,Z) (t) = , (1 − t)3 −t9 − 3t8 + 3t6 + t5 HSyzR (X 3 ,Y 3 ,Z 3 ) (t) = (1 − t)3 do not differ by a factor tl , the R-modules SyzR (X, Y, Z) and SyzR (X 3 , Y 3 , Z 3 ) are not isomorphic, hence SyzC (X, Y, Z) admits a (0, 2)-Frobenius periodicity. The Hilbert-Kunz function of R is given by  15 2 27    ·q −  if e is odd, 4 HK(R, q) =  4 15 2 11    ·q − if e is even. 4 4 Example 7.22. Let p = 37 and n = 14. Then pe = 14 · θ + r with    (even, 9) if e ≡ 1 (3), (θ, r) = (odd, 11) if e ≡ 2 (3),   (even, 1) if e ≡ 0 (3). 7.4. ON THE HILBERT-KUNZ FUNCTIONS OF TWO-DIMENSIONAL FERMAT RINGS 165 This gives the Hilbert-Kunz function  243 21   · 372e −    2  2   21 135 HK(R, 37e ) =  · 372e −  2 2     21 19   · 372e − if e ≡ 1 (3), if e ≡ 2 (3), if e ≡ 0 (3). 2 2 In this example, we see directly that we have a (0, 3)-Frobenius periodicity ä Ä F3∗ (SyzC (X, Y, Z))  SyzC (X, Y, Z) − 32 · (q − 1) . The next examples deal with the question which Frobenius periodicities of the bundles SyzC (X, Y, Z) can be achieved. A sufficient condition for having a Frobenius periodicity is (cf. Theorem 7.17) Ç å 1 1 1 δ , , = 0, n n n  e e e which is equivalent to the condition that the distances of all triples ve := pn , pn , pn to Lodd are at least one. Let pe = θe · n + re with θe , re ∈ N and 0 ≤ re < n. The nearest element to ve in Lodd is given by the component-wise round-up of ve if θe is even and by the component-wise round-down of ve if θe is odd. This leads to the conditions Å ã re 3· 1− ≥ 1 if θe is even, 2 · n ≥ 3 · re if θe is even, n ⇔ re 3 · re ≥ n if θe is odd. 3· ≥ 1 if θe is odd. n Example 7.23. Let p be odd, l ∈ N, l ≥ 0 and n = (7.5)  0 · n + pe    Ä pl+1 +1 2 . For 0 ≤ e ≤ 2l + 2 we have if 0 ≤ e ≤ l, ä pe =  2 · pe−l−1 − 1 · n + n − pe−l−1 if l + 1 ≤ e ≤ 2l + 1,  Ä ä   2 · pl+1 − 2 · n + 1 if e = 2l + 2. 0 0 This shows that pe is of the form even · n + pe or odd ·Än + n −äpe for some 0 ≤ e0 ≤ l. Since 0 2n = pl+1 + 1 ≥ 3pe for all 0 ≤ e0 ≤ l, we see that δ 1n , 1n , 1n = 0. By Corollary 7.16 we find the isomorphism Ç å Å 0 0 0ã 3 e∗ pe pe pe e e0 − · (p − p ) F (SyzC (X, Y, Z))  SyzC X , Y , Z 2 0 0 with e ≡ e mod l + 1 and e ∈ {0, . . . , l}. Since the Hilbert-series e e e 3 · t2p − 3 · tn+p + tn − t3p HSyzR (X pe ,Y pe ,Z pe ) (t) = (1 − t)3 for e ∈ {0, . . . , l} do not differ by a factor ta , a ∈ Z, the R-modules are non-isomorphic. All in all, we found a (0, l + 1)-Frobenius periodicity. The Hilbert-Kunz function is given by 0ä 0 3n Ä 2e HK(R, pe ) = · p − p2e + p3e 4 with e ≡ e0 mod l + 1 and e0 ∈ {0, . . . , l}. 166 7. EXTENSIONS AND FURTHER EXAMPLES Example 7.24. Let p = 2 and n = 3. Then 2e is of the form even Ä · n + ä2 or odd · n + 1. e Since 2 · n = 3 · 2 ≥ 3 · 2 for 0 ≤ e ≤ 1 and 3 · 1 = n, we see that δ n1 , 1n , 1n = 0. Applying Corollary 7.16, we find the isomorphism ( SyzC (X, Y, Z) if e = 0, e∗ Ä äÄ ä F (SyzC (X, Y, Z))  SyzC X 2 , Y 2 , Z 2 −3(pe−1 − 1) if e ≥ 1. Since the Hilbert-series of SyzR (X, Y, Z) and SyzR (X 2 , Y 2 , Z 2 ) are given by 3t4 − 3t5 + t3 − t6 3t2 − 3t4 + t3 − t3 and , (1 − t)3 (1 − t)3 we see that the two modules are non-isomorphic. We obtain a (1, 2)-Frobenius periodicity. By Theorem 7.18 the Hilbert-Kunz function is given by  1 HK(R, 2e ) =  9 · 22e−2 − 1 if e = 0, if e ≥ 1. Example 7.25. Let p = 2 and 2l ≤ n < 2l+1 , hence n = 2l + x with 1 ≤ x < 2l . We want to show that SyzC (X, Y, Z) admits a äFrobenius periodicity on the smooth curve C if and only Ä 1 1 1 if n = 3. Since we need δ n , n , n = 0, we must have 2n = 2l+1 + 2x ≥ 3 · 2l ≥ 3 · 2e for all 0 ≤ e ≤ l. This is equivalent to x ≥ 2l−1 . Since 2l+1 = n+2l − x with 0 < 2l − x < 2l < n, we need that the inequality 3 · (2l − x) ≥ n holds. This is equivalent to x ≤ 2l−1 , hence n = 2l + 2l−1 = 3 · 2l−1 . Because of the assumption gcd(2, n) = 1, only the case n = 3 is left. From the Examples 7.24 - 7.25 we obtain the following corollary. Corollary 7.26. Let p = 2. The bundle SyzC (X, Y, Z) admits a Frobenius periodicity on the smooth curve C if and only if n = 3. 7.5. Open questions At the end, we gather some open questions related to topics of this thesis. 7.5.1. Questions concerning rings of dimension two. In Chapter 3 we used some sheaf-theoretic methods to compute from a given matrix factorization (ϕ, ψ) a first syzygy module of an ideal such that this module is isomorphic to the cokernel of the matrix factorization. At some point in Construction 3.35 we used the phrase “Suppose that we can choose a J ⊆ {1, . . . , n}...”, where J was the set of indices of the columns of ψ we had to keep. In general, it is not understood under which circumstances this J has to exist. Question 7.27. Are there necessary (and sufficient) conditions (on the hypersurface R) ensuring that the set J exists? Another question is what happens to morphisms between matrix factorizations under this construction. Question 7.28. Is it possible to make the construction in Chapter 3 categorical? 7.5. OPEN QUESTIONS 167 Another related question is whether sheaf-theoretic tools are necessary or not. Question 7.29. Is there a completely algebraic way to obtain first syzygy modules of ideals from a given matrix factorization? In Chapter 5 we computed the pull-backs of the indecomposable, maximal Cohen-Macaulay modules over surface rings of type ADE along the inclusions induced by normal subgroups. From these computations we obtained that the Frobenius pull-backs of SyzR (m), where R is of type D or E, are indecomposable. This approach is quite complicated and works only in this very special situation. This leads to the following question. Question 7.30. Is there a (numerical) invariant of vector bundles, which measures the splitting behaviour? We turn back to the Fermat rings R = k[X, Y, Z]/(X n + Y n + Z n ) with an algebraically closed field k of characteristic p > 0. In the case where S := SyzProj(R) (X, Y, Z) is not strongly semistable, we saw in Theorem 7.5 that the strong Harder-Narasimhan filtration of F s∗ (S), where s ≥ 0 comes from Han’s Theorem, is of the form 0 → OProj(R) (l1 ) → F s∗ (S) → OProj(R) (l2 ) → 0 for some l1 , l2 ∈ Z. In the proof of Theorem 7.7 we saw that there is a t ∈ N such that the t-th Frobenius pull-back of the above sequence splits. In this situation we can compute HK(R, pe ), when pe < n or e ≥ s + t. Question 7.31. Let C be a projective Fermat curve of degree n, let s be the integer from Han’s Theorem and t be minimal such that F s+t∗ (SyzC (m))  OC (m1 ) ⊕ OC (m2 ) for some m1 , m2 ∈ Z. Find a way to compute HK(R, pe ) in the cases n < pe ≤ p s+t−1 . Question 7.32. The situation is the same as in the previous question. Is it possible that SyzR (m[q] ) splits as a direct sum of two non-free R-modules of rank one? The next questions deal with general diagonal hypersurfaces of dimension two. We denote by R the standard-graded Fermat ring of degree n and by C its projective spectrum. We will denote by S a general diagonal hypersurface with exponent-triple (d1 , d2 , d3 ) ∈ N3≥2 and by D its projective spectrum. Example 7.33. Han computed HK(S , 3e ) in her thesis [Han91], where S is the diagonal hypersurface with exponent-triple (5, 8, 8). The Hilbert-Kunz multiplicity is 24 5 and the Ä ä 19 81 1 1 1 e tail of HK(S , 3 ) is − 5 if e is even and − 5 if e is odd. Since δ 5 , 8 , 8 = 0, we know by Corollary 2.33 that SyzC (X 8 , Y 5 , Z 5 ) is strongly semistable on the projective Fermat curve of degree 40. A direct computation using CoCoA shows   SyzD (X 3 , Y 3 , Z 3 )(−9q + 27)      7 7  if e  1 (4), SyzD (X, Y , Z )(−9q + 39) if e  2 (4),  SyzD (X 3 , Y 5 , Z 5 )(−9q + 37)      if e  3 (4), if e  0 (4). Fe∗ (SyzD (X, Y, Z))   SyzD (X, Y, Z)(−9q + 9) 168 7. EXTENSIONS AND FURTHER EXAMPLES This shows that there is a (0, e0 )-Frobenius periodicity F4∗ (SyzD (X, Y, Z))  SyzD (X, Y, Z)(m) for some m ∈ Z of length e0 ≤ 4. Computing the Hilbert-series of the corresponding S -modules, one sees that they do not differ by a factor tm , hence they cannot be isomorphic and the periodicity has exactly length four. Using Formula 6.1 on page 139, we recover Han’s result. With 3e = 5θ + r, θ ∈ N, r ∈ {0, . . . , 4}, the tuple (θ, r) is cyclic of the form (even, 1), (even, 3), (odd, 4), (even, 2) and with 3e = 8θ0 + r0 , θ0 ∈ N, r0 ∈ {0, . . . , 7}, the tuple (θ0 , r0 ) is cyclic of the form (even, 1), (even, 3), (odd, 1), (odd, 3) for e ≥ 0. Hence, we obtain in this case (for some m ∈ Z)   Syz e∗ F (SyzD (X, Y, Z))(m)   D (X r 0 0 , Y r , Zr ) 0 if θ and θ0 are even, 0 SyzD (X 5−r , Y 8−r , Z 8−r ) if θ and θ0 are odd, which has a similar shape as Corollary 7.15. The surface rings of type An (in odd characteristics), E6 and E8 are other diagonal hypersurfaces and we saw that the corresponding δ vanishes in all characteristics coprime to the degree of the defining polynomial. In these cases we saw that the modules Syz(X q , Y q , Z q ) satisfy isomorphisms similar to Corollary 7.15. For 1 ≤ ai ≤ di − 1 we define the matrix factorizations (ϕa1 ,a2 ,a3 , ψa1 ,a2 ,a3 ) with á ϕa1 ,a2 ,a3 := X a1 Y a2 Z a3 0 d −a d −a 2 2 1 1 −Y X 0 Z a3 d −a d −a −Z 3 3 0 X 1 1 −Y a2 0 −Z d3 −a3 Y d2 −a2 X a1 á d1 −a1 X ψa1 ,a2 ,a3 := Y d2 −a2 Z d3 −a3 0 −Y a2 −Z a3 0 a X 1 0 −Z a3 0 X a1 Y a2 Z d3 −a3 −Y d2 −a2 X d1 −a1 ë ë . Assume that Q := k[X, Y, Z]/(X N , Y N , Z N , X d1 +Y d2 +Z d3 ) has infinite projective dimension as S := k[X, Y, Z]/(X d1 +Y d2 +Z d3 )-module. Let N := di θi +ri with θi ∈ N and 0 ≤ ri ≤ di −1. Let Ai := ri if θi is even and Ai := di − ri if θi is odd. Question 7.34. Is it true that the minimal S -free resolution of Q is given by ϕA1 ,A2 ,A3 ψA1 ,A2 ,A3 ϕA1 ,A2 ,A3 . . . −→ S 4 −→ S 4 −→ S 4 −→ S 3 −→ S up to the degree shifts necessary to make the resolution homogeneous? Example 7.35. Consider R := k[X, Y, Z]/(X 12 + Y 12 + Z 12 ) and I := (X 4 , Y 4 , Z 3 ) in characteristic five. Then å Ç 1 1 4 4 3 , , = · , δ 12 12 12 12 5 hence s = 1 in Han’s Theorem and SyzC (I) is not strongly semistable. A direct computation shows that the minimal degree of a generator of SyzR (X 20 , Y 20 , Z 15 ) is 27 and that we have a splitting SyzR (X 100 , Y 100 , Z 75 )  R(−135) ⊕ R(−140). 7.5. OPEN QUESTIONS 169 This gives for e ≥ 2 2928 · 25e and 25 61 HK(k[X, Y, Z]/(X 3 + Y 3 + Z 4 ), 5e ) = · 25e 25 by Lemma 2.1. In the cases E6 and E8 we had in the characteristics two, three (and five) a splitting for e ≥ 1. In these cases one has δ , 0 and s = 1. HK(I, R, 5e ) = Question 7.36. Assume δ for large e? Ä a b c n, n, n ä , 0. Do the modules SyzR (X aq , Y bq , Z cq ) become free Equivalently, one could ask the following question. Question 7.37. Assume δ large e?  1 1 1 d1 , d2 , d3  , 0. Do the modules SyzS (m[q] ) become free for 7.5.2. Questions concerning rings of dimension at least three. As soon as the dimension of R grows, there are very few explicit examples of Hilbert-Kunz multiplicities and Hilbert-Kunz functions. One might hope to use Knörrer’s periodicity (cf. [Yos90, Theorem 12.10]) to obtain the Hilbert-Kunz function of T := k[U1 , . . . , Un , X, Y, Z]/ Ñ n X é Ui2 + F(X, Y, Z) , i=1 where F is of type ADE. Recall that Knörrer’s periodicity says that the categories MF(R) and MF(S ) with R = k[X1 , . . . , Xn ]/(G), S = k[U, V, X1 , . . . , Xn ]/(U 2 + V 2 +G) and char(k) , ˆ + iV, U − iV). In general first syzygy modules of 2 are equivalent via the functor _⊗(U ideals are not (maximal) Cohen-Macaulay, but maybe they appear in the two periodic free resolutions coming from the matrix factorizations in which case they would be (even maximal) Cohen-Macaulay. This does not happen. We prove this for SyzT (m), where F is of type E6 . We have ((n + 1)t6 + t4 + t3 − 1)(1 − t12 ) +1 (1 − t6 )n+1 (1 − t4 )(1 − t3 ) ((n + 1)t6 + t4 + t3 − 1)(1 + t6 ) + (1 − t6 )n (1 − t4 )(1 − t3 ) = . (1 − t6 )n (1 − t4 )(1 − t3 ) HSyzT (m) (t) = If SyzT (m) would be Cohen-Macaulay, all coefficients in the numerator of its Hilbertseries have to be positive (cf. Lemma 4.8). The numerator’s leading term is (−1)n t6n+7 , which is negative for n odd. If n is even, the second highest term of (1 − t6 )n (1 − t4 )(1 − t3 ) is −t6n+4 , which does not cancel with a term from ((n + 1)t6 + t4 + t3 − 1)(1 + t6 ). This shows that one needs to work with syzygy modules of higher order. Question 7.38. Is it possible to compute from a given matrix factorization a higher order syzygy module of an ideal which is isomorphic to the cokernel of the matrix factorization? APPENDIX A An implementation of Corollary 2.31 for CoCoA We give an implementation of Corollary 2.31 in CoCoA. Function A.1. An implementation of the floor function for Q∈ Q. Define Floor(Q) M:=Num(Q); N:=Den(Q); If Mod(M,N)=0 Then Return M/N; Else I:=0; While I<=M/N Do I:=I+1; EndWhile; Return I-1; EndIf; EndDefine; Function A.2. An implementation of the ceil function for Q∈ Q. Define Ceil(Q) M:=Num(Q); N:=Den(Q); If Mod(M,N)=0 Then Return M/N; Else I:=M; While I>=M/N Do I:=I-1; EndWhile; Return I+1; EndIf; EndDefine; Function A.3. This function returns for a list L∈ ([0, . . . , ∞) ∩ Q)3 the minimal distance to the lattice Lodd . Define DistLodd(L) Lodd:=[[Floor(L[1]),Floor(L[2]),Floor(L[3])], [Floor(L[1]),Floor(L[2]),Ceil(L[3])],[Floor(L[1]),Ceil(L[2]),Floor(L[3])], [Floor(L[1]),Ceil(L[2]),Ceil(L[3])],[Ceil(L[1]),Floor(L[2]),Floor(L[3])], [Ceil(L[1]),Floor(L[2]),Ceil(L[3])],[Ceil(L[1]),Ceil(L[2]),Floor(L[3])], [Ceil(L[1]),Ceil(L[2]),Ceil(L[3])]]; Dist:=[]; For I:=8 To 1 Step -1 Do If IsEven(Sum(Lodd[I])) Then Remove(Lodd,I); Else Append(Dist,Abs(L[1]-Lodd[I][1])+Abs(L[2]-Lodd[I][2])+Abs(L[3]-Lodd[I][3])); EndIf; EndFor; Return Min(Dist); EndDefine; 171 172 A. AN IMPLEMENTATION OF COROLLARY 2.31 FOR COCOA Function A.4. This function computes a lower bound for the s in Han’s Theorem. The argument P is a prime number and the argument T is a list of three non-negative rational numbers. Define Lower(P,T) M:=Max(T); L:=0; If 3/2*M<=1 Then While P^L>=3/2*M Do L:=L-1; EndWhile; L:=L+1; Else While P^L<3/2*M Do L:=L+1; EndWhile; EndIf; Return L; EndDefine; Function A.5. This function computes an upper bound for the s in Han’s Theorem. The argument P is a prime number and the argument T is a list of three non-negative rational numbers. Define Upper(P,T) U:=1; Residues:=[]; M:=2*LCM(Den(T[1]),Den(T[2]),Den(T[3])); A:=[Mod(P*Num(T[1]),M),Mod(P*Num(T[2]),M),Mod(P*Num(T[3]),M)]; While Not (A IsIn Residues) Do Append(Residues,A); U:=U+1; A:=[Mod(P^U*Num(T[1]),M),Mod(P^U*Num(T[2]),M),Mod(P^U*Num(T[3]),M)]; EndWhile; Return U-1; EndDefine; Function A.6. This function computes the characteristic P value of Han’s δ function of the list T of three non-negative rational numbers. Define Delta(P,T) If 2*Max(T)>=Sum(T) Then Return 2*Max(T)-Sum(T); EndIf; L:=Lower(P,T); U:=Upper(P,T); For S:=L To U Do D:=DistLodd(P^S*T); If D<1 Then Return (1-D)/P^S; EndIf; EndFor; Return 0; EndDefine; Function A.7. This function is the final implementation of Corollary 2.31. Within the notation of this Corollary, the argument Exp is a 3 × 3 matrix whose i-th row consists of A. AN IMPLEMENTATION OF COROLLARY 2.31 FOR COCOA 173 the exponents in the i-th summand of the trinomial F. The argument P is a prime number, the argument T is the list [a, b, c] and Type denotes the type of F, hence 1 or 2. Define HKMTri(Exp,P,T,Type) D:=Sum(Exp[1]); Alphap:=T[1]*(D-Exp[2][3]-Exp[3][2])-T[2]*Exp[3][1]-T[3]*Exp[2][1]; Betap:=T[2]*(D-Exp[3][1]-Exp[1][3])-T[1]*Exp[3][2]-T[3]*Exp[1][2]; Gammap:=T[3]*(D-Exp[1][2]-Exp[2][1])-T[1]*Exp[2][3]-T[2]*Exp[1][3]; If Alphap>=0 Then Alphau:=Alphap; Alphad:=0; Else Alphau:=0; Alphad:=-Alphap; EndIf; If Betap>=0 Then Betau:=Betap; Betad:=0; Else Betau:=0; Betad:=-Betap; EndIf; If Gammap>=0 Then Gammau:=Gammap; Gammad:=0; Else Gammau:=0; Gammad:=-Gammap; EndIf; If Type=1 Then Alpha:=Alphau+Gammad; Else Alpha:=Alphau+Betad+Gammad; EndIf; If Type=1 Then Beta:=Betau+Alphad; Else Beta:=Betau; EndIf; If Type=1 Then Gamma:=Gammau+Betad; Else Gamma:=Gammau+Alphad; EndIf; Lam:=Det(Mat(Exp))/D; Q:=2*(T[1]*T[2]+T[1]*T[3]+T[2]*T[3])-T[1]^2-T[2]^2-T[3]^2; Return D*Q/4+(Lam)^2/(4*D)*(Delta(P,[Alpha/Lam,Beta/Lam,Gamma/Lam]))^2; EndDefine; APPENDIX B Computer computations to Chapter 5 We give the computer computations needed for the argumentation in Chapter 5. We print only those output lines that are necessary for the arguments. B.1. Normal subgroups with GAP and rings of invariants with Singular In this section we compute explicit generators for the normal subgroups of T, O and I (with their embeddings into SL2 (k) as given in Chapter 5, whenever the generators are defined in k2×2 ). Moreover, we use Singular to compute the invariants of k[x, y] under these normal subgroups, where we work over the smallest finite extensions of Q we need to define the generators over k. For these computations one needs the library finvar. We compute the normal subgroups of T with GAP. gap> o:=[[E(4),0],[0,-E(4)]]; [ [ E(4), 0 ], [ 0, -E(4) ] ] gap> t:=[[0,1],[-1,0]]; [ [ 0, 1 ], [ -1, 0 ] ] gap> w:=Sqrt(2); E(8)-E(8)^3 gap> m:=[[E(8)^7/w,E(8)^7/w],[E(8)^5/w,E(8)/w]]; [ [ 1/2-1/2*E(4), 1/2-1/2*E(4) ], [ -1/2-1/2*E(4), 1/2+1/2*E(4) ] ] gap> NormalSubgroups(Group(o,t,m)); [ Group([ [ [ E(4), 0 ], [ 0, -E(4) ] ], [ [ 0, 1 ], [ -1, 0 ] ], [ [ 1/2-1/2*E(4), 1/2-1/2*E(4) ], [ -1/2-1/2*E(4), 1/2+1/2*E(4) ] ] ]), Group([ [ [ 0, E(4) ], [ E(4), 0 ] ], [ [ E(4), 0 ], [ 0, -E(4) ] ], [ [ -1, 0 ], [ 0, -1 ] ] ]), Group([ [ [ -1, 0 ], [ 0, -1 ] ] ]), Group([ ]) ] Then Singular gives the corresponding rings of invariants. The three output lines give the primary invariants (prim), the secondary invariants (sec) and the indecomposable, secondary invariants (irrsec). Then k[x, y]G is a finitely generated module over k[prim] with module generators sec. As a k-algebra k[x, y]G is generated by prim and irrsec. > ring R=(0,Q),(x,y),lp;minpoly=rootofUnity(8); > number w=Q-Q^3; > w; (-Q3+Q) > matrix o[2][2]=Q2,0,0,-Q2; > matrix t[2][2]=0,1,-1,0; > matrix m[2][2]=Q7/w,Q7/w,Q5/w,Q/w; 175 176 B. COMPUTER COMPUTATIONS TO CHAPTER 5 > print(invariant_ring(o,t,m)); x5y-xy5,x8+14*x4y4+y8 1,x12-33*x8y4-33*x4y8+y12 x12-33*x8y4-33*x4y8+y12 > print(invariant_ring(o,o*t)); x2y2,x4+y4 1,x5y-xy5 x5y-xy5 The normal subgroups of O are given by gap> k:=[[E(8),0],[0,E(8)^7]]; [ [ E(8), 0 ], [ 0, -E(8)^3 ] ] gap> NormalSubgroups(Group(o,t,m,k)); [ Group([ [ [ E(4), 0 ], [ 0, -E(4) ] ], [ [ 0, 1 ], [ -1, 0 ] ], [ [ 1/2-1/2*E(4), 1/2-1/2*E(4) ], [ -1/2-1/2*E(4), 1/2+1/2*E(4) ] ], [ [ E(8), 0 ], [ 0, -E(8)^3 ] ] ]), Group([ [ [ -1/2-1/2*E(4), 1/2-1/2*E(4) ], [ -1/2-1/2*E(4), -1/2+1/2*E(4) ] ], [ [ 0, E(4) ], [ E(4), 0 ] ], [ [ E(4), 0 ], [ 0, -E(4) ] ], [ [ -1, 0 ], [ 0, -1 ] ] ]), Group([ [ [ 0, E(4) ], [ E(4), 0 ] ], [ [ E(4), 0 ], [ 0, -E(4) ] ], [ [ -1, 0 ], [ 0, -1 ] ] ]), Group([ [ [ -1, 0 ], [ 0, -1 ] ] ]), Group([ ]) ] The rings of invariants are > matrix k[2][2]=Q,0,0,Q7; > print(invariant_ring(o,t,m,k)); x8+14*x4y4+y8,x10y2-2*x6y6+x2y10 1,x17y-34*x13y5+34*x5y13-xy17 x17y-34*x13y5+34*x5y13-xy17 > print(invariant_ring(o,o*t,k*k*k*k*k*k*k*m*k*o*o*o)); x5y-xy5,x8+14*x4y4+y8 1,x12-33*x8y4-33*x4y8+y12 x12-33*x8y4-33*x4y8+y12 We compute the normal subgroups of I. gap> w:=Sqrt(5); E(5)-E(5)^2-E(5)^3+E(5)^4 gap> o:=[[-E(5)^3,0],[0,-E(5)^2]]; [ [ -E(5)^3, 0 ], [ 0, -E(5)^2 ] ] gap> t:=[[(-E(5)+E(5)^4)/w,(E(5)^2-E(5)^3)/w], [(E(5)^2-E(5)^3)/w,(E(5)-E(5)^4)/w]]; [ [ -1/5*E(5)-2/5*E(5)^2+2/5*E(5)^3+1/5*E(5)^4, 2/5*E(5)-1/5*E(5)^2+1/5*E(5)^3-2/5*E(5)^4 ], [ 2/5*E(5)-1/5*E(5)^2+1/5*E(5)^3-2/5*E(5)^4, 1/5*E(5)+2/5*E(5)^2-2/5*E(5)^3-1/5*E(5)^4 ] ] gap> NormalSubgroups(Group(o,t)); [ Group([ ]), <group of 2x2 matrices of size 2 in characteristic 0>, <group of 2x2 matrices of size 120 in characteristic 0> ] B.2. MACAULAY2 COMPUTATIONS IN THE E6 -CASE 177 The ring of invariants is given by > ring R=(0,Q),(x,y),lp;minpoly=rootofUnity(5); > matrix o[2][2]=-Q3,0,0,-Q2; > number w=Q-Q2-Q3+Q4; > matrix t[2][2]=(-Q+Q4)/w,(Q2-Q3)/w,(Q2-Q3)/w,(Q-Q4)/w; > print(invariant_ring(o,t)); x11y+11*x6y6-xy11,x20-228*x15y5+494*x10y10+228*x5y15+y20 1,x30+522*x25y5-10005*x20y10-10005*x10y20-522*x5y25+y30 x30+522*x25y5-10005*x20y10-10005*x10y20-522*x5y25+y30 B.2. Macaulay2 computations in the E6 -case + M2.exe --no-readline --print-width 79 Macaulay2, version 1.4 with packages: ConwayPolynomials, Elimination, IntegralClosure, LLLBases, PrimaryDecomposition, ReesAlgebra, TangentCone i1 : A=ZZ[U,V,W]/(U^2+4*V^3-V*W^2) i2 : X=W^3-36*V^2*W i3 : Y=W^2+12*V^2 i4 : Z=U i5 : S1=mingens image syz gens ideal(X,Y,Z) o5 = {3} | 0 -V W -U | {2} | -U -2VW 12V2-W2 -3UW | {1} | 12V2+W2 3UW 36UV 4W3 | 3 o5 : Matrix A 4 <--- A i6 : S2=mingens image syz gens ideal(X,Y^2,Y*Z,Z^2) o6 = {3} {4} {3} {2} | | | | 0 0 -U 12V2+W2 0 -U 12V2+W2 0 4 o6 : Matrix A 2VW V 3U -6W2 12V2-W2 W 0 -72VW UV 0 2VW -3UW UW U -2W2 36UV -U2 0 -3UW 4W3 | | | | 7 <--- A i7 : N=mingens image syz gens ideal(X*Y,X*Z,Y^2,Y*Z^2,Z^3) o7 = {5} | 0 -U V W 0 0 U 0 0 0 {4} | 0 12V2+W2 0 0 0 2VW -2W2 UV UW -U2 {4} | 0 0 2VW 12V2-W2 U2 UV UW 0 0 0 {4} | -U 0 -3W 36V -12V2-W2 3U 0 2VW 12V2-W2 -3UW {3} | 12V2+W2 0 0 0 0 -6W2 -72VW -3UW 36UV 4W3 --------------------------------------------------------------------------U2W | 3UW3 | 0 | -2W4+27U2V | 178 B. COMPUTER COMPUTATIONS TO CHAPTER 5 81U3 | 5 o7 : Matrix A 11 <--- A i8 : L=mingens image syz gens ideal(X,Y,Z^2) o8 = {3} | V W 0 U2 | {2} | 2VW 12V2-W2 U2 0 | {2} | -3W 36V -12V2-W2 36V2W-W3 | 3 o8 : Matrix A 4 <--- A B.3. Macaulay2 computations in the E8 -case + M2.exe --no-readline --print-width 79 Macaulay2, version 1.4 with packages: ConwayPolynomials, Elimination, IntegralClosure, LLLBases, PrimaryDecomposition, ReesAlgebra, TangentCone i1 : A=ZZ[R,S,T]/(T^2-R*S) i2 : X=R^15+522*R^10*T^5-10005*R^5*T^10-10005*S^5*T^10-522*S^10*T^5+S^15 i3 : Y=R^10-228*R^5*T^5+494*T^10+228*S^5*T^5+S^10 i4 : Z=R^5*T-S^5*T+11*T^6 i5 : S1=mingens image syz gens ideal(X,Y,Z) i6 : S2=mingens image syz gens ideal(X,Y^2,Y*Z,Z^2) i7 : S3=mingens image syz gens ideal(X*Y,X*Z,Y^2,Y*Z^2,Z^3) i8 : S4=mingens image syz gens ideal(X*Y,X*Z^2,Y^3,Y^2*Z,Y*Z^3,Z^4) i9 : S5=mingens image syz gens ideal(X*Y^2,X*Y*Z^2,X*Z^4,Y^4,Y^3*Z,Y^2*Z^3,Z^5) i10 : S6=mingens image syz gens ideal(X,Y^2,Y*Z,Z^3) i11 : S7=mingens image syz gens ideal(X*Y,X*Z,Y^2,Y*Z^2,Z^4) i12 : S8=mingens image syz gens ideal(X,Y,Z^2) i13 : B=QQ[R,S,T]/(T^2-R*S) i14 : T1=map(B,A)**S1 i15 : T2=map(B,A)**S2 i16 : T3=map(B,A)**S3 i17 : T4=map(B,A)**S4 i18 : T5=map(B,A)**S5 B.3. MACAULAY2 COMPUTATIONS IN THE E8 -CASE 179 i19 : T6=map(B,A)**S6 i20 : T7=map(B,A)**S7 i21 : T8=map(B,A)**S8 i22 : M1=mingens image T1 o22 = {15} | R -S {10} | -R6+11S4T2-66RT5 S6-11R4T2-66ST5 {6} | 12S9T-684R6T4+2052S4T6+2964RT9 12R9T+684S6T4-2052R4T6+2964ST9 ------------------------------------------------------------------------T -T | -R5T+11S5T-66T6 -11R5T+S5T-66T6 | 12S10-684R5T5+2052S5T5+2964T10 12R10-2052R5T5+684S5T5+2964T10 | 3 o22 : Matrix B 4 <--- B i23 : M2=mingens image T2 o23 = {15} | -5R5T-5S5T R6-11S4T2+66RT5 {20} | -T -R {16} | 6R5-6S5+216T5 60S4T-180RT4 {12} | 3240R5T4-3240S5T4-9360T9 72S9-864R6T3+9072S4T5+8424RT8 ------------------------------------------------------------------------S6-11R4T2-66ST5 | -S | -60R4T-180ST4 | 72R9+864S6T3-9072R4T5+8424ST8 | 4 o23 : Matrix B 3 <--- B i24 : M3=mingens image T3 o24 = {25} | -9T2 -9T2 {21} | -4R5T+104S5T+756T6 -104R5T+4S5T+756T6 {20} | -35R5T2-55S5T2+110T7 -55R5T2-35S5T2-110T7 {22} | 48R5+168S5-2160T5 168R5+48S5+2160T5 {18} | 64800S5T4+93600T9 64800R5T4-93600T9 ------------------------------------------------------------------------ST RT 4S6+16R4T2-84ST5 -4R6-16S4T2-84RT5 3S6T+7R4T3+22ST6 3R6T+7S4T3-22RT6 -24R4T-432ST4 -24S4T+432RT4 2880S6T3-10080R4T5+18720ST8 2880R6T3-10080S4T5-18720RT8 ------------------------------------------------------------------------R2 -S2 -60S3T3+180R2T4 -60R3T3-180S2T4 -R7+11S3T4-66R2T5 S7-11R3T4-66S2T5 216S3T2-288R2T3 -216R3T2-288S2T3 288S8T-576R7T2+26208S3T6+14976R2T7 288R8T+576S7T2-26208R3T6+14976S2T7 ------------------------------------------------------------------------3RT -3ST | 180 B. COMPUTER COMPUTATIONS TO CHAPTER 5 -2R6-158S4T2+408RT5 -R6T+31S4T3-176RT6 528S4T-504RT4 720S9+60480S4T5+28080RT8 5 o24 : Matrix B -2S6-158R4T2-408ST5 S6T-31R4T3-176ST6 -528R4T-504ST4 720R9-60480R4T5+28080ST8 | | | | 8 <--- B i25 : M4=mingens image T4 o25 = {25} | 5R5T2+5S5T2 2S6T+8R4T3+33ST6 {27} | -12R5-12S5 36R4T-252ST4 {30} | T2 ST {26} | 6R5T-6S5T-84T6 3S6+27R4T2-18ST5 {28} | 720T4 -72R4-576ST3 {24} | 7776R5T3-7776S5T3-22464T8 864S6T2-22464R4T4+33696ST7 -------------------------------------------------------------------------2R6T-8S4T3+33RT6 R7-11S3T4+66R2T5 -36S4T-252RT4 -216S3T2+288R2T3 -RT -R2 3R6+27S4T2+18RT5 60S3T3-180R2T4 -72S4+576RT3 576S3T-288R2T2 864R6T2-22464S4T4-33696RT7 864S8-864R7T+56160S3T5+11232R2T6 ------------------------------------------------------------------------S7-11R3T4-66S2T5 | -216R3T2-288S2T3 | -S2 | -60R3T3-180S2T4 | -576R3T-288S2T2 | 864R8+864S7T-56160R3T5+11232S2T6 | 6 o25 : Matrix B 5 <--- B i26 : M5=mingens image T5 o26 = {35} | S8+3R7T-39S3T5-143R2T6 R8-3S7T+39R3T5-143S2T6 25R5T3+25S5T3 {37} | 0 0 0 {39} | 0 0 0 {40} | -S3+3R2T -R3-3S2T 5T3 {36} | -6R7-294S3T4+84R2T5 -6S7-294R3T4-84S2T5 42R5T2-42S5T2-288T7 {38} | -720S3T2-1440R2T3 -720R3T2+1440S2T3 -72R5+72S5+1008T5 {30} | 0 0 0 ------------------------------------------------------------------------9R6T2+41S4T4-176RT7 -6R6+306S4T2+684RT5 -720S4+1440RT3 5RT2 -8R6T-152S4T3+42RT6 -216S4T-1512RT4 509760S9T4-976320R6T7+5088960S4T9+2790720RT12 ------------------------------------------------------------------------9S6T2+41R4T4+176ST7 -6S6+306R4T2-684ST5 -720R4-1440ST3 5ST2 B.3. MACAULAY2 COMPUTATIONS IN THE E8 -CASE 181 8S6T+152R4T3+42ST6 216R4T-1512ST4 509760R9T4+976320S6T7-5088960R4T9+2790720ST12 ------------------------------------------------------------------------50S5T3-275T8 -150R5T+150S5T+2100T6 -18000T4 5T3 -83R5T2-167S5T2-288T7 228R5+372S5+1008T5 108000R10T3-108000S10T3-12312000R5T8-12312000S5T8 ------------------------------------------------------------------------574S6T2+976R4T4+2211ST7 -1071S6+1521R4T2-15894ST5 -1080R4+125280ST3 155ST2 -342S6T+2352R4T3-8433ST6 -3924R4T+27468ST4 764640S11T2+88633440S6T7+79535520R4T9+4186080ST12 ------------------------------------------------------------------------574R6T2+976S4T4-2211RT7 -1071R6+1521S4T2+15894RT5 -1080S4-125280RT3 155RT2 342R6T-2352S4T3-8433RT6 3924S4T+27468RT4 764640R11T2-88633440R6T7-79535520S4T9+4186080RT12 -------------------------------------------------------------------------7S7T-43R3T5-198S2T6 -360R3T3+720S2T4 864R3T+2592S2T2 -5S2T -12S7-168R3T4-108S2T5 -288R3T2+2016S2T3 5184S12T-616896R8T5-580608S7T6+6697728R3T10-3348864S2T11 -------------------------------------------------------------------------7R7T-43S3T5+198R2T6 -360S3T3-720R2T4 864S3T-2592R2T2 -5R2T 12R7+168S3T4-108R2T5 288S3T2+2016R2T3 5184R12T-616896S8T5+580608R7T6-6697728S3T10-3348864R2T11 ------------------------------------------------------------------------R7T+49S3T5-264R2T6 720S3T3-360R2T4 2592S3T+864R2T2 5R2T -6R7-234S3T4+504R2T5 -1584S3T2-288R2T3 5184S13-580608S8T5-616896R7T6-3348864S3T10+6697728R2T11 -------------------------------------------------------------------------S7T-49R3T5-264S2T6 | -720R3T3-360S2T4 | -2592R3T+864S2T2 | -5S2T | 182 B. COMPUTER COMPUTATIONS TO CHAPTER 5 -6S7-234R3T4-504S2T5 | -1584R3T2+288S2T3 | 5184R13+580608R8T5-616896S7T6-3348864R3T10-6697728S2T11 | 7 o26 : Matrix B 12 <--- B i27 : M6=mingens image T6 o27 = {15} | S8+3R7T-39S3T5-143R2T6 R8-3S7T+39R3T5-143S2T6 25R5T3+25S5T3 {20} | -S3+3R2T -R3-3S2T 5T3 {16} | -6R7-294S3T4+84R2T5 -6S7-294R3T4-84S2T5 42R5T2-42S5T2-288T7 {18} | -720S3T2-1440R2T3 -720R3T2+1440S2T3 -72R5+72S5+1008T5 ------------------------------------------------------------------------| | | | 4 o27 : Matrix B 3 <--- B i28 : M7=mingens image T7 o28 = {25} | -S3-2R2T -R3+2S2T 5RT2 {21} | 4R7-104S3T4-156R2T5 4S7-104R3T4+156S2T5 4R6T-104S4T3-156RT6 {20} | S8-2R7T-84S3T5+77R2T6 R8+2S7T+84R3T5+77S2T6 15R6T2+35S4T4-110RT7 {22} | -480S3T3-360R2T4 480R3T3-360S2T4 -24R6+144S4T2+576RT5 {24} | -288S3T-2016R2T2 288R3T-2016S2T2 -288S4-2016RT3 ------------------------------------------------------------------------5ST2 | -4S6T+104R4T3-156ST6 | 15S6T2+35R4T4+110ST7 | -24S6+144R4T2-576ST5 | -288R4+2016ST3 | 5 o28 : Matrix B 4 <--- B i29 : M8=mingens image T8 o29 = {15} | -R4+7ST3 -S4-7RT3 {10} | R9+17S6T3+119R4T5+187ST8 S9-17R6T3-119S4T5+187RT8 {12} | -24S6T+624R4T3-936ST6 24R6T-624S4T3-936RT6 -------------------------------------------------------------------------R3T+7S2T2 -S3T-7R2T2 | R8T+17S7T2+119R3T6+187S2T7 S8T-17R7T2-119S3T6+187R2T7 | -24S7+624R3T4-936S2T5 24R7-624S3T4-936R2T5 | 3 o29 : Matrix B 4 <--- B i30 : inducedMap(image M1,image T1) o30 = {16} | 1 0 0 0 {16} | 0 1 0 0 | | B.3. MACAULAY2 COMPUTATIONS IN THE E8 -CASE 183 {16} | 0 0 1 1/12 | {16} | 0 0 0 1/12 | o30 : Matrix i31 : inducedMap(image M2,image T2) o31 = {21} | 1 0 0 -1/6R -1/6S -1/6T -1/36T | {21} | 0 1 0 1/6T 0 1/6S 1/72S | {21} | 0 0 1 0 1/6T 0 1/72R | o31 : Matrix i32 : inducedMap(image M3,image T3) o32 = {27} {27} {27} {27} {27} {27} {27} {27} | | | | | | | | 1 0 0 0 0 0 0 0 19/180 1/180 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 -3/10 0 0 1/10 0 0 0 3/10 0 0 0 0 1/10 17/48R 0 0 11/80T 0 0 1/60T 0 -11/168S 0 409/280T 0 0 0 0 1/60T 409/1800T 1/1800T 0 0 0 0 1/60S 0 97/900T 1/300T 0 0 0 0 1/720S 1/720R | | | | | | | | o32 : Matrix i33 : inducedMap(image M4,image T4) o33 = {32} | 1 0 0 0 0 -5/3T 5/6T -1/3S 1/3R 0 0 -1/12R -1/12S {32} | 0 1 0 0 0 -2/3R 1/4R -8/3T 0 0 -2/3S 0 -5/6T {32} | 0 0 1 0 0 -7/3S -11/12S 0 -8/3T 2/3R 0 5/6T 0 {32} | 0 0 0 1 0 0 0 0 0 1/3T 0 1/12S 0 {32} | 0 0 0 0 1 0 0 0 0 0 1/3T 0 1/12R ------------------------------------------------------------------------23/24RT -29/24ST -3/8T2 167/144T2 RT2 9/2R3T-13/2S2T2 | 25/72R2 -3/8T2 -11/72RT 91/216RT 5/3S3+1/3R2T 3/2R4+227/6ST3 | 7/24T2 29/72S2 -13/24ST 125/216ST 14/3T3 13/6S3T+61/6R2T2 | 1/72ST 0 1/72S2 1/864S2 5/3ST2 -85/6RT3 | 0 1/72RT 0 1/864R2 -10/3S2T -155/6T4 | o33 : Matrix i34 : inducedMap(image M5,image T5) o34 = {43} {43} {43} {43} {43} {43} {43} {43} {43} {43} {43} {43} | | | | | | | | | | | | 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 -1/25 0 0 1/25 0 0 0 0 0 0 0 0 0 0 -31/295 0 1/295 0 0 0 0 0 0 0 0 -31/295 0 0 0 1/295 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1/6 1/6 0 0 0 0 0 0 0 0 0 -1/6 0 0 1/6 3/2T 1/2S 0 0 0 0 0 0 0 0 0 0 1/2R -3/2T 0 0 0 0 0 0 0 0 0 0 0 0 59/375T -1/30S 1/30R -59/375T 0 0 0 0 0 0 184 B. COMPUTER COMPUTATIONS TO CHAPTER 5 ------------------------------------------------------------------------0 0 0 0 -T T -1/3R 0 0 0 0 0 0 -1/3S 1/3S T 0 0 -1/2S -41/150T 1/18S 1/18R 0 0 0 -13/72R 13/72S 0 29/120S 0 -119/1770T 1/2R -1/3R 0 1/6T 0 1/2T -1/120R -119/1770T 0 0 0 1/3S 0 -1/6T 0 1/25T 0 0 0 0 0 0 0 0 0 1/2655T 0 0 0 0 0 0 0 0 0 1/2655T 0 0 0 0 0 0 0 0 0 0 0 -1/18T 0 0 0 0 0 0 1/6T 1/18T 0 0 0 0 0 0 0 0 1/18T 0 1/72S 0 0 0 0 0 0 0 1/18T 0 1/72R ------------------------------------------------------------------------ST 0 0 0 -20T3 1/3S2 0 0 0 35/6ST2 -47/720RT 19/144ST -7841/54000T2 53/540T2 3/2S3+13/6R2T -10139/42480T2 1/144S2 151/720ST -181/1440ST 0 1/720R2 233/42480T2 13/720RT -11/1440RT 0 0 0 -191/2250T2 19/540T2 0 0 -73/15930T2 0 0 0 -17/15930T2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1/432ST 0 1/432S2 1/5184S2 0 0 1/432RT 0 1/5184R2 0 -------------------------------------------------------------------------2R3T-7/2S2T2 893/72T4 -823/48RT3 | 10/3S3T-15/2R2T2 -823/48ST3 -893/72T4 | 109/15T4 -233/720S3T-773/720R2T2 233/720R3T-773/720S2T2 | 3/2R4-3ST3 11/80S4+1171/80RT3 -37/240S3T+1637/240R2T2 | 3/2S4+3RT3 -37/240R3T-1637/240S2T2 -11/80R4+1171/80ST3 | -3/5T4 0 0 | 0 0 0 | 0 0 0 | 0 0 2183/144T4 | 0 2183/144T4 0 | 0 -649/48T4 0 | 0 0 649/48T4 | o34 : Matrix i35 : inducedMap(image M6,image T6) o35 = {23} | 1 0 0 3/2T 1/2R -5/6R2 -5/2ST -5/6RT -5/2T2 -20T3 {23} | 0 1 0 1/2S -3/2T 5/2RT -5/6S2 5/2T2 -5/6ST 35/6ST2 {23} | 0 0 1 0 0 1/3ST 1/3RT 1/3S2 1/3R2 3/2S3+13/6R2T -------------------------------------------------------------------------35/6RT2 7/72R3T2+23/36S2T3 | -20T3 7/72S3T2-23/36R2T3 | 3/2R3-13/6S2T 1/72R5-1/72S5+53/36T5 | o35 : Matrix i36 : inducedMap(image M7,image T7) B.3. MACAULAY2 COMPUTATIONS IN THE E8 -CASE 185 o36 = {28} | 1 0 0 0 -3/2T 3/4R 0 27/8T2 -39/8RT 1/4R2 5/24R2T {28} | 0 1 0 0 3/4S 3/2T 0 39/8ST 27/8T2 1/2RT -5/24RT2 {28} | 0 0 1 0 -1/4R 0 7/4S 1/8RT -7/8R2 1/2S2 1/24R3-1/12S2T {28} | 0 0 0 1 0 -1/4S -3/4R -7/8S2 -1/8ST -5/4T2 5/24T3 ------------------------------------------------------------------------5/24ST2 5/24RT2 5/24T3 -5/8T4 5/24S2T -5/24T3 5/24ST2 -5/6ST3 5/24T3 -1/12S3+1/24R2T 5/24RT2 -1/24S4-17/24RT3 -1/24S3-1/12R2T 5/24ST2 -1/12R3-1/24S2T 7/24R3T+1/4S2T2 ------------------------------------------------------------------------5/6RT3 -5/72R3T3+5/96S2T4 | -5/8T4 5/72S3T3+5/96R2T4 | -7/24S3T+1/4R2T2 1/288S6-1/48R4T2+1/12ST5 | -1/24R4+17/24ST3 1/288R6-1/48S4T2-1/12RT5 | o36 : Matrix i37 : inducedMap(image M8,image T8) o37 = {19} {19} {19} {19} | | | | 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 0 0 1/2S -17/2T 0 0 17/2T 1/2R -493/24RT2 -3757/24ST2 221/24S3 -29/24R3 | | | | o37 : Matrix i38 : C=ZZ/(7)[R,S,T]/(T^2-R*S) i39 : T3=map(C,A)**S3 i40 : M3=mingens image T3 o40 = {25} | -2T2 -2T2 -2ST -2RT R2 {21} | 3R5T-S5T R5T-3S5T -S6+3R4T2 R6-3S4T2 3S3T3-2R2T4 {20} | S5T2-2T7 R5T2+2T7 S6T-2ST6 R6T+2RT6 -R7-3S3T4-3R2T5 {22} | -R5+3T5 -S5-3T5 -R4T+3ST4 -S4T-3RT4 -S3T2-R2T3 {18} | S5T4+3T9 R5T4-3T9 S6T3+3ST8 R6T3-3RT8 S8T-2R7T2+3R2T7 -------------------------------------------------------------------------S2 -3RT 3ST | 3R3T3+2S2T4 2R6-3S4T2-2RT5 2S6-3R4T2+2ST5 | S7+3R3T4-3S2T5 R6T-3S4T3+RT6 -S6T+3R4T3+ST6 | R3T2-S2T3 -3S4T 3R4T | R8T+2S7T2+3S2T7 S9-3RT8 R9-3ST8 | 5 o40 : Matrix C 8 <--- C i41 : D=ZZ/(59)[R,S,T]/(T^2-R*S) i42 : T5=map(D,A)**S5 i43 : M5=mingens image T5 o43 = {35} | S8+3R7T+20S3T5-25R2T6 R8-3S7T-20R3T5-25S2T6 R5T3+S5T3 {37} | 0 0 0 {39} | 0 0 0 186 B. COMPUTER COMPUTATIONS TO CHAPTER 5 {40} | -S3+3R2T -R3-3S2T 12T3 {36} | -6R7+S3T4+25R2T5 -6S7+R3T4-25S2T5 -29R5T2+29S5T2+5T7 {38} | -12S3T2-24R2T3 -12R3T2+24S2T3 16R5-16S5+12T5 {30} | 0 0 0 ------------------------------------------------------------------------14S6T2-28R4T4+5ST7 -14R6T2+28S4T4+5RT7 -18S5T3-19T8 -29S6+4R4T2-2ST5 29R6-4S4T2-2RT5 -5R5T+5S5T+11T6 R4+2ST3 -S4+2RT3 -10T4 -25ST2 25RT2 10T3 19S6T+7R4T3+26ST6 19R6T+7S4T3-26RT6 11R5T2+20S5T2+14T7 -18R4T+8ST4 -18S4T-8RT4 -16R5-23S5+10T5 S6T7-12R4T9+18ST12 R6T7-12S4T9-18RT12 R10T3-S10T3+4R5T8+4S5T8 -------------------------------------------------------------------------2S6T2-11R4T4-20ST7 -2R6T2-11S4T4+20RT7 -3S6+21R4T2-19ST5 -3R6+21S4T2+19RT5 4R4+18ST3 4S4-18RT3 -19ST2 -19RT2 -24S6T-21R4T3+5ST6 24R6T+21S4T3+5RT6 26R4T-5ST4 -26S4T-5RT4 S11T2-R9T4+7R4T9+13ST12 R11T2-S9T4-7S4T9+13RT12 ------------------------------------------------------------------------23S7T-2R3T5+10S2T6 23R7T-2S3T5-10R2T6 -14R3T3+28S2T4 -14S3T3-28R2T4 10R3T-29S2T2 10S3T+29R2T2 8S2T 8R2T -28S7+21R3T4-16S2T5 28R7-21S3T4-16R2T5 -23R3T2-16S2T3 23S3T2-16R2T3 S12T-R8T5+6S7T6-6R3T10+3S2T11 R12T-S8T5-6R7T6+6S3T10+3R2T11 ------------------------------------------------------------------------22R7T+16S3T5-26R2T6 -22S7T-16R3T5-26S2T6 | 28S3T3-14R2T4 -28R3T3-14S2T4 | -29S3T+10R2T2 29R3T+10S2T2 | -8R2T 8S2T | -14R7-15S3T4-4R2T5 -14S7-15R3T4+4S2T5 | 21S3T2-23R2T3 21R3T2+23S2T3 | S13+6S8T5-R7T6+3S3T10-6R2T11 R13-6R8T5-S7T6+3R3T10+6S2T11 | 7 o43 : Matrix D 12 <--- D Bibliography [AE05] I. M. Aberbach and F. Enescu. The structure of F-pure rings. Math. Z., 240(4):791–806, 2005. [AE08] I. M. Aberbach and F. Enescu. Lower Bounds for Hilbert-Kunz Multiplicities in Local Rings of Fixed Dimension. Michigan Math. J., 57:1–16, 2008. [AE12] I. M. Aberbach and F. Enescu. New estimates of Hilbert-Kunz multiplicities for local rings of fixed dimension. to appear in Nagoya Math. J., arXiv:1101.5078v4, 2012. [AL03] I. M. Aberbach and G. J. Leuschke. The F-signature and strong F-regularity. Math. Res. Lett., 10(1):51–56, 2003. [AR89] M. Auslander and I. Reiten. Cohen-Macaulay modules for graded Cohen-Macaulay rings and their completions. In Commutative Algebra, Lecture Notes in Math., pages 21–31. Springer, 1989. [Art66] M. Artin. On isolated rational singularities of surfaces. Amer. J. Math., 88:129–136, 1966. [Art77] M. Artin. Coverings of the Rational Double Points in Characteristic p. In W. Baily and T. Shioda, editors, Complex analysis and algebraic geometry, pages 11–22, Cambridge, 1977. Cambridge University Press. [BC97] R.-O. Buchweitz and Q. Chen. Hilbert-Kunz functions of cubic curves and surfaces. J. Algebra, 197(1):246–267, 1997. [BCP97] R.-O. Buchweitz, Q. Chen, and K. Pardue. Hilbert-Kunz functions. preprint, 1997. [BD08] I. Burban and Y. Drozd. Maximal Cohen-Macaulay modules over surface singularities. In Trends in representation theory of algebras and related topics, EMS Ser. Congr. Rep., pages 101–166, Zürich, 2008. EMS. [BE04] M. Blickle and F. Enescu. On rings with small Hilbert-Kunz multiplicity. Proc. AMS, 132(9):2505–2509, 2004. [BGS87] R.-O. Buchweitz, G.-M. Greuel, and F.-O. Schreyer. Cohen-Macaulay modules on hypersurface singularities II. Invent. Math., 88:165–182, 1987. [BH98] W. Bruns and J. Herzog. Cohen-Macaulay rings, volume 39 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge, UK, 1998. [BH06] H. Brenner and G. Hein. Restriction of the cotangent bundle to elliptic curves and Hilbert-Kunz functions. Manuscripta Math., 119(1):17–36, 2006. [BK05] M. Brion and S. Kumar. Frobenius splitting methods in geometry and representation theory. Number 231 in Progress in Mathematics. Birkhäuser, 187 188 Bibliography [BK13] [BLM12] [Bou89] [Bre] [Bre03] [Bre04] [Bre05a] [Bre05b] [Bre06] [Bre07] [Bre08] [Bre12] [Bre13] [Bri68] [BST12a] [BST12b] [Bur12] [Can12] Boston, 2005. H. Brenner and A. Kaid. An explicit example of Frobenius periodicity. J. Pure Appl. Algebra, 217(8):1412–1420, 2013. H. Brenner, J. Li, and C. Miller. A direct limit for limit Hilbert-Kunz multiplicity for smooth projective curves. J. Algebra, 372:488–504, 2012. N. Bourbaki. Commutative algebra, Chapters 1-7. Springer, Berlin, 1989. H. Brenner. A Hilbert-Kunz proof of a theorem in invariant theory. in preparation. H. Brenner. The theory of tight closure from the viewpoint of vector bundles, 2003. Habilitationsschrift, Ruhr-Universität Bochum. H. Brenner. A characteristic zero Hilbert-Kunz criterion for solid closure in dimension two. Math. Res. Lett., 11:563–574, 2004. H. Brenner. Computing the tight closure in dimension two. Math. Comp., 74(251):1495–1518, 2005. H. Brenner. On a problem of Miyaoka. In B. Moonen, R. Shoof, and G. Geer, editors, Number fields and function fields - two parallel worlds, number 239 in Progress in Mathematics, pages 51–59. Birkhäuser Boston, 2005. H. Brenner. The rationality of the Hilbert-Kunz multiplicity in graded dimension two. Math. Ann., 334(1):91–110, 2006. H. Brenner. The Hilbert-Kunz function in graded dimension two. Comm. Algebra, 35(10):3199–3213, 2007. H. Brenner. Tight closure and vector bundles. In Three lectures on commutative algebra, volume 42 of Univ. Lecture Ser., pages 1–71. AMS, Providence, RI, 2008. H. Brenner. Invariantentheorie, 2012. Lecture held at the Universität Osnabrück in the winter term 2012. Available under http://de.wikiversity.org/wiki/Kurs: Invariantentheorie_(Osnabrück_2012-2013). H. Brenner. Irrational Hilbert-Kunz multiplicities. preprint, arXiv:1305.5873, 2013. E. Brieskorn. Rationale Singularitäten komplexer Flächen. Invent. Math., 4:336–358, 1968. M. Blickle, K. Schwede, and K. Tucker. F-Signature of pairs and the asymptotic behavior of Frobenius splittings. Adv. Math., 231(6):3232–3258, 2012. M. Blickle, K. Schwede, and K. Tucker. F-Signature of pairs: Continuity, p-fractals and minimal log discrepancies. to appear in J. LMS, arXiv:1111.2762v2, 2012. I. Burban. Frobenius morphism and vector bundles on cycles of projective lines. Comm. Algebra, 40(8):2983–2988, 2012. E. Canton. Relating F-signature and F-splitting ratio of pairs using left-derivatives. preprint, arXiv:1206.4293v4, 2012. Bibliography 189 [CDHZ12] O. Celikbas, H. Dao, C. Huneke, and Y. Zhang. Bounds on the Hilbert-Kunz multiplicity. Nagoya Math. J., 205:149–165, 2012. [CH98a] L. Chiang and Y. C. Hung. On Hilbert-Kunz function and representation ring. Bull. Inst. Math. Acad. Sinica, 26(1):1–32, 1998. [CH98b] L. Chiang and Y. C. Hung. On Hilbert-Kunz functions of some hypersurfaces. J. Algebra, 199:499–527, 1998. [CH03] S. Choi and S. Hong. The Hilbert-Kunz multiplicity of two-dimensional toric rings. J. Korean Math. Soc., 40(2):169–177, 2003. [Cha93] S. T. Chang. The asymptotic behaviour of Hilbert-Kunz functions and their generalizations. PhD thesis, University of Michigan, 1993. [Che98] Q. Chen. Hilbert-Kunz multiplicity of plane curves and a conjecture of K. Pardue. PhD thesis, University of Toronto, 1998. [CK12] C-Y. Jean Chan and K. Kurano. The cone spanned by maximal Cohen-Macaulay modules and an application. preprint, arXiv:1211.4016v1, 2012. [CK13] C-Y. Jean Chan and K. Kurano. Hilbert-Kunz functions over rings regular in codimension one. preprint, arXiv:1301.5278v1, 2013. [CoC] CoCoATeam. CoCoA: a system for doing Computations in Commutative Algebra. Available at http://cocoa.dima.unige.it. [Con95] M. Contessa. On the Hilbert-Kunz function and Koszul homology. J. Algebra, 175:757–766, 1995. [Con96] A. Conca. Hilbert-Kunz function of monomial ideals and binomial hypersurfaces. Manuscripta Math., 90:287–300, 1996. [DGPS12] W. Decker, G.-M. Greuel, G. Pfister, and H. Schönemann. Singular 3-1-5 — A computer algebra system for polynomial computations. 2012. http://www.singular.uni-kl.de. [DI09] I. V. Dolgachev and V. A. Iskovskikh. Finite subgroups of the plane Cremona group. In Algebra, arithmetic, and geometry: in honor of Yu. I. Manin, Vol. I, volume 269 of Progr. Math., pages 443–548. Birkhäuser Boston, 2009. [Dol82] I. Dolgachev. Weighted projective varieties. In Group actions and vector fields, volume 956 of Lecture Notes in Math., pages 34–71, Berlin, 1982. Springer. [Dor71] L. Dornhoff. Group representation theory. Part A: Ordinary representation theory, volume 7 of Pure and Applied Mathematics. Dekker, New York, 1971. [DS13] H. Dao and I. Smirnov. On generalized Hilbert-Kunz function and multiplicity. preprint, arXiv:1305.1833, 2013. [Dut83] S. P. Dutta. Frobenius and multiplicities. J. Algebra, 85:424–448, 1983. [Dut89] S. P. Dutta. Ext and Frobenius. J. Algebra, 127:163–177, 1989. [Dut96] S. P. Dutta. Ext and Frobenius, II. J. Algebra, 186:724–735, 1996. [dV34a] P. du Val. On isolated singularities of surfaces which do not affect the conditions of adjunction. I. Proc. Camb. Philos. Soc., 30(4):453–459, 1934. [dV34b] P. du Val. On isolated singularities of surfaces which do not affect the conditions of adjunction. II. Proc. Camb. Philos. Soc., 30(4):460–465, 1934. 190 Bibliography [dV34c] P. du Val. On isolated singularities of surfaces which do not affect the conditions of adjunction. III. Proc. Camb. Philos. Soc., 30(4):483–491, 1934. [Eis80] D. Eisenbud. Homological algebra on a complete intersection, with an application to group representations. Trans. Amer. Math. Soc., 260(1):35–64, 1980. [ES05] F. Enescu and K. Shimomoto. On the upper semi-continuity of the Hilbert-Kunz multiplicity. J. Algebra, 285(1):222–237, 2005. [Eto00] K. Eto. Hilbert-Kunz multiplicity of the Segre product of polynomial rings. Rep. Res. Nippon Inst. Tech., 30:317–327, 2000. [Eto02] K. Eto. Multiplicity and Hilbert-Kunz multiplicity of monoid rings. Tokyo J. Math., 25(2):241–245, 2002. [EW03] K. Eto and K.-i. Watanabe. Notes on Hilbert-Kunz multiplicity of Rees algebras. Comm. Algebra, 31(12):5943–5976, 2003. [EY] N. Epstein and Y. Yao. Unmixed Hilbert-Kunz multiplicity. in preparation. [EY11] N. Epstein and Y. Yao. Some extensions of Hilbert-Kunz multiplicity. preprint, arXiv:1103.4730v1, 2011. [Fie00] J. Bruce Fields. Length functions determined by killing powers of several ideals in a local ring. PhD thesis, University of Michigan, 2000. [FT03] N. Fakhruddin and V. Trivedi. Hilbert-Kunz functions and multiplicities for full flag varieties and elliptic curves. J. Pure Appl. Algebra, 181(1):23–52, 2003. [GAP12] The GAP Group. GAP – Groups, Algorithms, and Programming, Version 4.5.6, 2012. [GD61] A. Grothendieck and J. Dieudonné. Eléments de géométrie algébrique II. Inst. Hautes Études Sci. Publ. Math., 8:5–222, 1961. [GM10] I. M. Gessel and P. Monsky. The limit as p -> infinity of the Hilbert-Kunz P multiplicity of xidi . preprint, arXiv:1007.2004v1, 2010. [GS] Daniel R. Grayson and Michael E. Stillman. Macaulay2, a software system for research in algebraic geometry. Available at http://www.math.uiuc.edu/Macaulay2/. [Han91] C. Han. The Hilbert-Kunz function of a diagonal hypersurface. PhD thesis, Brandeis University, 1991. [Har87] R. Hartshorne. Algebraic geometry, volume 52 of Graduate Texts in Mathematics. Springer, New York, 1987. [HH90] M. Hochster and C. Huneke. Tight closure, invariant theory and the Briançon-Skoda theorem. J. Amer. Math. Soc., 3:31–116, 1990. [HL97] D. Huybrechts and M. Lehn. The geometry of moduli spaces of sheaves, volume E31 of Aspects of Mathematics. Vieweg, Braunschweig, 1997. [HL02] C. Huneke and G. J. Leuschke. Two theorems about maximal Cohen-Macaulay modules. Math. Ann., 324(2):391–404, 2002. [HM93] C. Han and P. Monsky. Some surprising Hilbert-Kunz functions. Math. Z., 214:119–135, 1993. Bibliography 191 [HMM04] C. Huneke, M. A. McDermott, and P. Monsky. Hilbert-Kunz functions for normal rings. Math. Res. Lett., 11:539–546, 2004. [HN75] G. Harder and M. S. Narasimham. On the cohomology groups of moduli spaces of vector bundles on curves. Math. Ann., 212:215–248, 1975. [Hoc94] M. Hochster. Solid closure. Contemp. Math., 159:103–172, 1994. [Hun96] C. Huneke. Tight closure and its applications. AMS, Providence, RI, 1996. [HY02] C. Huneke and Y. Yao. Unmixed local rings with minimal Hilbert-Kunz multiplicity are regular. Proc. AMS, 130:661–665, 2002. [HY09] M. Hochster and Y. Yao. Second coefficients of Hilbert-Kunz functions for domains. preprint, available on the second author’s homepage, 2009. [Kai09] A. Kaid. On semistable and strongly semistable syzygy bundles. PhD thesis, University of Sheffield, 2009. [Kar09] N. Karroum. MCM-einfache Moduln. PhD thesis, Ruhr-Universität Bochum, 2009. [Kle86] F. Klein. Vorlesungen über das Ikosaeder und die Auflösung der Gleichungen vom 5ten Grade. Teubner, 1886. [Knö87] H. Knörrer. Cohen-Macaulay modules on hypersurface singularities I. Invent. Math., 88:153–164, 1987. [Kor11] M. Von Korff. F-Signature of affine toric varieties. preprint, arXiv:1110.0552v2, 2011. [KR05] M. Kreuzer and L. Robbiano. Computational Commutative Algebra 2. Springer, Berlin, 2005. [Kre07] M. Kreuzer. Computing Hilbert-Kunz functions of 1-dimensional graded rings. Univ. Iagellonicae Acta Math., 45:81–95, 2007. [KRV12] A. R. Kustin, H. Rahmati, and A. Vraciu. The resolution of the bracket powers of the maximal ideal in a diagonal hypersurface ring. J. Algebra, 369:256–321, 2012. [KST07] H. Kajiura, K. Saito, and A. Takahashi. Matrix factorization and representations of quivers. II: Type ADE case. Adv. Math., 211(1):327–362, 2007. [Kun69] E. Kunz. Characterizations of regular local rings of characteristic p. Amer. J. Math., 91(3):772–784, 1969. [Kun76] E. Kunz. On Noetherian rings of characteristic p. Amer. J. Math., 98(4):999–1013, 1976. [Lan04] A. Langer. Semistable sheaves in positive characteristic. Ann. of Math. (2), 159:251–276, 2004. [Lie13] C. Liedtke. Algebraic surfaces in positive characteristic. In F. Bogomolov, B. Hassett, and Y. Tschinkel, editors, Birational Geometry, Rational Curves, and Arithmetic. Springer, 2013. [Liu06] Q. Liu. Algebraic geometry and arithmetic curves, volume 6 of Oxford Graduate Texts in Mathematics. Oxford University Press, Oxford, UK, 2006. [LS77] H. Lange and U. Stuhler. Vektorbündel auf Kurven und Darstellungen der algebraischen Fundamentalgruppe. Math. Zeitschrift, 156:77–83, 1977. 192 Bibliography [LW12] G. J. Leuschke and R. Wiegand. Cohen-Macaulay Representations, volume 181 of Mathematical Surveys and Monographs. AMS, Providence, RI, 2012. [Mar81] M. Maruyama. The theorem of Grauert-Mülich-Spindler. Math. Ann., 255:317–333, 1981. [Mat05] H. Matsumura. Commutative Ring Theory. Number 8 in Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge, UK, 2005. [Mil00] C. Miller. A Frobenius characterization of finite projective dimension over complete intersections. Math. Z., 233:127–136, 2000. [Miy87] Y. Miyaoka. The Chern classes and Kodaira dimension of a minimal variety. In Algebraic Geometry, Sendai 1985, volume 10 of Adv. Stud. Pure Math., pages 449–476, Amsterdam, 1987. North-Holland. [Mon83a] P. Monsky. The Hilbert-Kunz function. Math. Ann., 263:43–49, 1983. [Mon83b] P. Monsky. p-Ranks of Class Groups in Zdp -Extensions. Math. Ann., 263:509–514, 1983. [Mon97] P. Monsky. The Hilbert-Kunz function of a characteristic 2 cubic. J. Algebra, 197:268–277, 1997. [Mon98a] P. Monsky. The Hilbert-Kunz functions in a family: Line-s4 quartics. J. Algebra, 208:359–371, 1998. [Mon98b] P. Monsky. The Hilbert-Kunz functions in a family: Point-s4 quartics. J. Algebra, 208:343–358, 1998. [Mon05] P. Monsky. On the Hilbert-Kunz function of zd − p4 (x, y). J. Algebra, 291:350–372, 2005. [Mon06a] P. Monsky. The Hilbert-Kunz multiplicity of an irreducible trinomial. J. Algebra, 304:1101–1107, 2006. [Mon06b] P. Monsky. Mason’s theorem and syzygy gaps. J. Algebra, 303:373–381, 2006. [Mon07] P. Monsky. Hilbert-Kunz functions for irreducible plane curves. J. Algebra, 316:326–345, 2007. [Mon08] P. Monsky. Rationality of Hilbert-Kunz multiplicities: A likely counterexample. Michigan Math. J., 57:605–613, 2008. [Mon09] P. Monsky. Transcendence of some Hilbert-Kunz multiplicities (modulo a conjecture). preprint, arXiv:0908.0971v1, 2009. [Mon11] P. Monsky. Hilbert-Kunz theory for nodal cubics, via sheaves. J. Algebra, 346(1):180–188, 2011. [MS12] L. E. Miller and I. Swanson. Hilbert-Kunz functions of 2 × 2 determinantal rings. to appear in Illinois J. Math., arXiv:1206.1015v2, 2012. [MT04] P. Monsky and P. Teixeira. p-Fractals and power series I - Some 2 variable results. J. Algebra, 280(2):505–536, 2004. [MT06] P. Monsky and P. Teixeira. p-Fractals and power series II - Some applications to Hilbert-Kunz theory. J. Algebra, 304:237–255, 2006. [Nag75] M. Nagata. Local rings. Krieger, Huntington, NY, 1975. [Par94] K. Pardue. Nonstandard Borel-fixed ideals. PhD thesis, Brandeis University, 1994. Bibliography 193 [Pot97] J. Le Potier. Lectures on vector bundles, volume 54 of Cambridge Studies in Advanced Mathematics. Cambridge University Press, Cambridge, UK, 1997. [RS13] M. Robinson and I. Swanson. Explicit Hilbert-Kunz functions of 2 × 2 determinantal rings. preprint, arXiv:1304.7274, 2013. [Sch57] T. Schneider. Einführung in die transzendenten Zahlen. Springer, Berlin, 1957. [SdB97] K. E. Smith and M. Van den Bergh. Simplicity of rings of differential operators in prime characteristic. Proc. London Math. Soc. (3), 75(1):32–62, 1997. [Sei89] G. Seibert. Complexes with Homology of Finite Length and Frobenius Functors. J. Algebra, 125:278–287, 1989. [Sei97] G. Seibert. The Hilbert-Kunz function of rings of finite Cohen-Macaulay type. Arch. Math. (Basel), 69:286–296, 1997. [Sin05] A. K. Singh. The F-Signature of an affine semigroup ring. J. Pure Appl. Algebra, 196(2):313–321, 2005. [Smi03] L. Smith. A modular analog of a theorem of R. Steinberg on coinvariants of complex pseudoreflection groups. Glasgow Math. J., 45:69–71, 2003. [Stä11] A. Stäbler. An explicit example of a family of trivialising étale covers. preprint, arXiv:1111.2131v1, 2011. [SW11] A. Sannai and K.-i. Watanabe. F-Signature of graded Gorenstein rings. J. Pure Appl. Algebra, 215(9):2190–2195, 2011. [Tei02] P. Teixeira. p-Fractals and Hilbert-Kunz series. PhD thesis, Brandeis University, 2002. [Tei12] P. Teixeira. Syzygy gap fractals I. some structural results and an upper bound. J. Algebra, 350(1):132–162, 2012. [Tri05a] V. Trivedi. Semistability and Hilbert-Kunz multiplicities for curves. J. Algebra, 284:627–644, 2005. [Tri05b] V. Trivedi. Strong semistability and Hilbert-Kunz multiplicity for singular plane curves. Contemp. Math., 390:165–173, 2005. [Tri07] V. Trivedi. Hilbert-Kunz multiplicity and reduction mod p. Nagoya Math. J., 185:123–141, 2007. [Tri12] V. Trivedi. Frobenius pull-backs of vector bundles in higher dimensions. Proc. Indian Acad. Sci., 122(4):615–628, 2012. [Tuc12] K. Tucker. F-Signature exists. Invent. Math., 190(3):743–765, 2012. [Upa12a] S. Upadhyay. An algorithm for the HK function for disjoint-term trinomial hypersurfaces. preprint, arXiv:1204.5417v1, 2012. [Upa12b] S. Upadhyay. The Hilbert-Kunz function for binomial hypersurfaces. preprint, arXiv:1101.5936v2, 2012. [Upa12c] S. Upadhyay. Irrational HK multiplicities are possible for trinomial hypersurfaces. preprint, arXiv:1211.7244v1, 2012. [Upa12d] S. Upadhyay. A rank computation problem related to the HK function of trinomial hypersurfaces. preprint, arXiv:1210.2885v1, 2012. [Wat00] K.-i. Watanabe. Hilbert-Kunz multiplicity of toric rings. Proc. Inst. Nat. Sci., 35:173–177, 2000. [Wit02] E. Witten. Singularities in String Theory. Proceedings of the ICM, 1:495–504, 2002. [WY00] K.-i. Watanabe and K.-i. Yoshida. Hilbert-Kunz multiplicity and an inequality between multiplicity and colength. J. Algebra, 230:295–317, 2000. [WY01a] K.-i. Watanabe and K.-i. Yoshida. Hilbert-Kunz multiplicity, McKay correspondence and good ideals in two-dimensional rational singularities. Manuscripta Math., 104:275–294, 2001. [WY01b] K.-i. Watanabe and K.-i. Yoshida. Hilbert-Kunz multiplicity of two-dimensional local rings. Nagoya Math. J., 162:87–110, 2001. [WY04] K.-i. Watanabe and K.-i. Yoshida. Minimal relative Hilbert-Kunz multiplicity. Illinois J. Math., 48(1):273–294, 2004. [WY05] K.-i. Watanabe and K.-i. Yoshida. Hilbert-Kunz multiplicity of three-dimensional local rings. Nagoya Math. J., 177:47–75, 2005. [Yao06] Y. Yao. Observations on the F-signature of local rings of characteristic p. J. Algebra, 299:198–218, 2006. [Yos90] Y. Yoshino. Cohen-Macaulay Modules over Cohen-Macaulay Rings, volume 146 of Lon. Mat. Soc. LNS. Cambridge University Press, Cambridge, UK, 1990. [Yos98] Y. Yoshino. Tensor products of matrix factorizations. Nagoya Math. J., 152:39–56, 1998.
0math.AC
Cross-validation estimation of covariance parameters under fixed-domain asymptotics F. Bachoc∗1 , A. Lagnoux1 , and T.M.N. Nguyen1 arXiv:1610.02872v2 [math.ST] 25 Jul 2017 1 Institut de Mathématiques de Toulouse, Université Paul Sabatier, France 118 route de Narbonne, 31062 TOULOUSE Cedex 9 {francois.bachoc,agnes.lagnoux,thi_mong_ngoc.nguyen}@math.univtoulouse.fr July 26, 2017 Abstract We consider a one-dimensional Gaussian process having exponential covariance function. Under fixed-domain asymptotics, we prove the strong consistency and asymptotic normality of a cross validation estimator of the microergodic covariance parameter. In this setting, Ying [40] proved the same asymptotic properties for the maximum likelihood estimator. Our proof includes several original or more involved components, compared to that of Ying. Also, while the asymptotic variance of maximum likelihood does not depend on the triangular array of observation points under consideration, that of cross validation does, and is shown to be lower and upper bounded. The lower bound coincides with the asymptotic variance of maximum likelihood. We provide examples of triangular arrays of observation points achieving the lower and upper bounds. We illustrate our asymptotic results with simulations, and provide extensions to the case of an unknown mean function. To our knowledge, this work constitutes the first fixed-domain asymptotic analysis of cross validation. Keywords: Kriging, cross validation, strong consistency, asymptotic normality, spatial sampling, fixed-domain asymptotics 1 Introduction Kriging [35, 28] consists in inferring the values of a Gaussian random field given observations at a finite set of observation points. It has become a popular method for a large range ∗ Corresponding author. [email protected], Institut de Mathématiques de Toulouse, Université Paul Sabatier, 118 route de Narbonne, 31062 TOULOUSE Cedex 9 1 of applications, such as geostatistics [25], numerical code approximation [29, 30, 8] and calibration [27, 9] or global optimization [20]. Before Kriging can be applied, a covariance function must be chosen. The most common practice is to statistically estimate the covariance function, from a set of observations of the Gaussian process, and to plug [35, Ch.6.8] the estimate in the Kriging equations. Usually, it is assumed that the covariance function belongs to a given parametric family (see [1] for a review of classical families). In this case, the estimation boils down to estimating the corresponding covariance parameters. For covariance parameter estimation, maximum likelihood (ML) is the most studied and used method, while cross validation (CV) [36, 43, 5] is an alternative technique. CV has been shown to have attractive properties, compared to ML, when the parametric family of covariance functions is misspecified [5, 7]. There is a fair amount of literature on the asymptotic properties of ML. In this regard, the two main frameworks are increasing-domain and fixed-domain asymptotics [35, p.62]. Under increasing-domain asymptotics, the average density of observation points is bounded, so that the infinite sequence of observation points is unbounded. Under fixed-domain asymptotics, this sequence is dense in a bounded domain. Consider first increasing-domain asymptotics. Generally speaking, for all (identifiable) covariance parameters, the ML estimator is consistent and asymptotically normal under some mild regularity conditions. The asymptotic covariance matrix is equal to the inverse of the (asymptotic) Fisher information matrix. This result was first shown in [24], and then extended in different directions in [12, 13, 31, 6, 16]. The situation is significantly different under fixed-domain asymptotics. Indeed, two types of covariance parameters can be distinguished: microergodic and non-microergodic parameters [18, 35]. A covariance parameter is microergodic if, for two different values of it, the two corresponding Gaussian measures are orthogonal, see [18, 35]. It is non-microergodic if, even for two different values of it, the two corresponding Gaussian measures are equivalent. Non-microergodic parameters cannot be estimated consistently, but have an asymptotically negligible impact on prediction [32, 33, 34, 42]. On the other hand, it is at least possible to consistently estimate microergodic covariance parameters, and misspecifying them can have a strong negative impact on prediction. Under fixed-domain asymptotics, there exist results indicating which covariance parameters are microergodic, and providing the asymptotic properties of the corresponding ML estimator. Most of these available results are specific to particular covariance models. In dimension d = 1 when the covariance model is exponential, only a reparameterized quantity obtained from the variance and scale parameters is microergodic. It is shown in [40] that the ML estimator of this microergodic parameter is strongly consistent and asymptotically normal. These results are extended in [11], by taking into account measurement errors, and in [10], by taking into account both measurement errors and an unknown mean function. When d > 1 and for a separable exponential covariance function, all the covariance parameters are microergodic, and the asymptotic normality of the ML estimator is proved in [41]. Other results in this case are also given in [37, 2]. Consistency of ML is shown as well in [23] for the scale parameters of the Gaussian covariance function and in [22] for all the covariance parameters of the separable Matérn 3/2 covariance function. Finally, for 2 the entire isotropic Matérn class of covariance functions, all parameters are microergodic for d > 4 [3], and only reparameterized parameters obtained from the scale and variance are microergodic for d 6 3 [42]. In [21], the asymptotic normality of the ML estimators for these microergodic parameters is proved, from previous results in [14] and [39]. Finally we remark that, beyond ML, quadratic variation-based estimators have also been extensively studied, under fixed-domain asymptotics (see for instance [19]). In contrast to ML, CV has received less theoretical attention. Under increasing-domain asymptotics, the consistency and asymptotic normality of a CV estimator is proved in [6]. Also, under increasing-domain asymptotics, it is shown in [7] that this CV estimator asymptotically minimizes the integrated square prediction error. To the best of our knowledge, no fixed-domain asymptotic analysis of CV exists in the literature. In this paper, we provide a first fixed-domain asymptotic analysis of the CV estimator minimizing the CV logarithmic score, see [28] Equation (5.11) and [43]. We focus on the case of the one-dimensional exponential covariance function, which was historically the first covariance function for which the asymptotic properties of ML were derived [40]. This covariance function is particularly amenable to theoretical analysis, as its Markovian property yields an explicit (matrix-free) expression of the likelihood function. It turns out that the CV logarithmic score can also be expressed in a matrix-free form, which enables us to prove the strong consistency and asymptotic normality of the corresponding CV estimator. We follow the same general proof architecture as in [40] for ML, but our proof, and the nature of our results, contain several new elements. In terms of proofs, the random CV logarithmic score, and its derivatives, have more complicated expressions than for ML. [This is because the CV logarithm score is based on the conditional distributions of the observations, from both their nearest left and right neighbors, while the likelihood function is solely based on the nearest left neighbors. See Lemma 3.1 and Lemma 1 in [40] for details.] As a consequence, the computations are more involved, and some other tools than in [40] are needed. In particular, many of our asymptotic approximations rely on Taylor expansions of functions of several variables (where each variable is an interpoint distance going to zero, see the proofs for details). In contrast, only Taylor approximations with one variable are needed in [40]. In addition, we use central limit theorems for dependent random variables, while only independent variables need to be considered in [40]. The nature of our asymptotic normality result also differs from that in [40]. In this reference, the asymptotic variance does not depend on the triangular array of observation points. On the contrary, in our case, different triangular arrays of observation points can yield different asymptotic variances. We exhibit a lower and an upper bound for these asymptotic variances, and provide examples of triangular arrays reaching them. The lower bound is in fact equal to the asymptotic variance of ML in [40]. Interestingly, the triangular array given by equispaced observation points attains neither the lower nor the upper bound. It is also pointed out in [6] that equispaced observation points need not provide the smallest asymptotic variance for covariance parameter estimation. Finally, the fact that the asymptotic variance is larger for CV than for ML is a standard finding in the well-specified case considered here, where the covariance function of 3 the Gaussian process does belong to the parametric family of covariance functions under consideration. In contrasts, as mentioned above, CV has attractive properties compared to ML when this well-specified case does not hold [5, 7]. The rest of the paper is organized as follows. In Section 2, we present in more details the setting and the CV estimator under consideration. In Section 3, we give our strong consistency result for this estimator. In Section 4, we provide the asymptotic normality result, together with the analysis of the asymptotic variance. In Section 5, we present numerical experiments, illustrating our theoretical findings. In Section 6, we extend the results of Sections 3 and 4 to the case of an unknown mean function. In Section 7, we give a few concluding remarks. All the proofs are postponed to Section 8. 2 The context and the cross-validation estimators We consider a centered Gaussian process Y on [0, 1] with covariance function K0 (t1 , t2 ) = σ02 exp{−θ0 |t1 − t2 |} for some fixed and unknown parameters θ0 > 0 and σ02 > 0. This process is commonly known as the Ornstein-Uhlenbeck process. It satisfies the following stochastic differential equation, called the Langevin’s equation, p dY (t) = −θ0 Y (t)dt + 2θ0 σ0 dB(t), where (B(t))t denotes a standard Brownian motion process. The Ornstein-Uhlenbeck process has been widely used to model physical, biological, social, and many other phenomena. It also possesses many useful mathematical properties that simplify the analysis. We introduce the parametric set of covariance functions {Kθ,σ2 , a 6 θ 6 A, b 6 σ 2 6 B} for some fixed 0 < a 6 A < +∞ and 0 < b 6 B < +∞ where Kθ,σ2 (t1 , t2 ) = σ 2 exp{−θ|t1 − t2 |}. For any n ∈ N, we consider a design of observation points {s1 , ..., sn }. Without loss of generality, we may assume that 0 = s1 < ... < sn = 1. Similarly as in [40], there is no need to assume that the sequences of observation points are nested. We consider the vector of observations at locations s1 , ..., sn , (Y (s1 ), . . . , Y (sn ))0 . Now let ∆i := si − si−1 , for i = 2, ..., n, and yi := Y (si ), for i = 1, ..., n. For ease of redaction, we do not mention in si and ∆i the dependency in n. We define Rθ as the variance-covariance matrix of (y1 , ..., yn )0 under covariance function Kθ,1 ,   n P −θ ∆i e−θ∆2 · · · e i=2   1 n   P −θ ∆i   −θ∆ i=3  e 2  1 ··· e Rθ :=  . .. .. ..   .. . . . .     n n P P −θ ∆i −θ ∆i e i=2 e i=3 ··· 1 4 From [4], we have  1 1−e−2θ∆2 R−1 θ  −e−θ∆2  −2θ∆ 2  1−e  = 0  ..  .  −e−θ∆2 1−e−2θ∆2 1 e−2θ∆3 + 1−e −2θ∆3 1−e−2θ∆2 ... .. . ··· 0 ··· ... 0 ... ... 0 0 .. .      . 0  −e−θ∆n  1−e−2θ∆n  e−2θ∆n 1 + 1−e −2θ∆n 1−e−2θ∆n−1 −e−θ∆n 1−e−2θ∆n (1) 1 1−e−2θ∆n We now address the CV estimators of θ0 and σ02 considered in [28, 43]. Let Ŷθ,−i (si ) = Eθ,σ2 (Y (si )|Y (s1 ), ..., Y (si−1 ), Y (si+1 ), ..., Y (sn )), where the conditional expectation Eθ,σ2 is calculated assuming that Y is centered and has covariance function Kθ,σ2 . We remark that Ŷθ,−i (si ) does not depend on σ 2 . We define similarly 2 σ̂θ,σ 2 ,−i (si ) = Varθ,σ 2 (Y (si )|Y (s1 ), ..., Y (si−1 ), Y (si+1 ), ..., Y (sn )). Then, the CV estimators are given by (θ̂, σ̂ 2 ) ∈ argmin Sn (θ, σ 2 ), a6θ6A,b6σ 2 6B where Sn (θ, σ 2 ) = n X i=1 " (yi − Ŷθ,−i (si ))2 2 log(σ̂θ,σ 2 ,−i (si )) + 2 σ̂θ,σ 2 ,−i (si ) # (2) is the logarithmic score. The rationale for minimizing the logarithmic score is that log(2π)+ (yi −Ŷθ,−i (si ))2 2 log(σ̂θ,σ is equal to −2 times the conditional log-likelihood of yi , 2 ,−i (si )) + σ̂ 2 (si ) θ,σ 2 ,−i given (y1 , ..., yi−1 , yi+1 , ..., yn )0 , with covariance parameters θ, σ 2 . The term cross-validation underlines the fact that we consider leave-one-out quantities. As already known [18, 40, 42], it is not possible to consistently estimate simultaneously θ0 and σ02 (the ML estimator of θ0 is a non-degenerate random variable, even if (Y (t))t∈[0,1] is observed continuously [44]), but it is possible to consistently estimate θ0 σ02 . As a consequence, we have considered three different cases, as in [40]. (i) Set σ 2 = σ12 in (2) with σ12 > 0 being a predetermined constant and consider the CV estimator θ̂1 of θ1 = θ0 σ02 /σ12 that minimizes (2) with σ 2 = σ12 . (ii) Set θ = θ2 in (2) with θ2 > 0 being a predetermined constant and consider the CV estimator σ̂22 of σ22 = θ0 σ02 /θ2 that minimizes (2) with θ = θ2 . (iii) Consider the estimator θ̂σ̂ 2 of θ0 σ02 , where θ̂ and σ̂ 2 are the CV estimators of θ0 and σ02 . Ying [40] considers the ML estimators of θ and σ 2 and establishes their consistency and asymptotic normality. We carry out a similar asymptotic analysis for the above CV estimators. More precisely, we prove that θ̂σ̂ 2 (resp. θ̂1 and σ̂22 ) converges almost surely 5 to θ0 σ02 (resp. θ1 and σ22 ) in the next section. √In section 4, we establish that, for a se√ 2 2 2 quence τ which is lower and upper-bounded, ( n/[θ τ ])( θ̂ − θ ), ( n/[σ 1 n 1 1 2 τn ])(σ̂2 − σ2 ) √ n and ( n/[θ0 σ02 τn ])(θ̂σ̂ 2 − θ0 σ02 ) all converge in distribution to a standard Gaussian random variable. We remark that the asymptotic variance τn2 depends on how the underlying design points {s1 , ..., sn } are chosen. On the contrary, considering the ML estimators [40], the asymptotic variance is the same for any triangular array of design points. 3 Consistency In this section, we establish the strong consistency of the CV estimator θ̂σ̂ 2 of θ0 σ02 described in the previous section. In that view, we consider Sn (θ, σ 2 ) defined by (2). As done in [40], we base our analysis on the Markovian property of the Ornstein-Uhlenbeck process in order to handle the fact that, as n increases, the observed sample (y1 , . . . , yn )0 becomes more and more correlated. We have X (R−1 )ij θ Ŷθ,−i (si ) = − yj (3) (R−1 θ )ii j=1,...,n; j6=i and σ2 , (R−1 θ )ii from [43, 5, 15]. Then, using Equation (1), we get the following lemma after some tedious computations. 2 σ̂θ,σ 2 ,−i (si ) = Lemma 3.1 (Logarithmic score). With Sn (θ, σ 2 ) as in (2), we have Sn (θ, σ 2 ) = n log(σ 2 ) + log(1 − e−2θ∆2 ) + log(1 − e−2θ∆n )   n−1 (y1 − e−θ∆2 y2 )2 (yn − e−θ∆n yn−1 )2 X 1 e−2θ∆i+1 + 2 + − log + −2θ∆i σ (1 − e−2θ∆2 ) σ 2 (1 − e−2θ∆n ) 1 − e 1 − e−2θ∆i+1 i=2  2  e−θ∆i e−θ∆i+1 n−1  −2θ∆i+1 X y + y i−1 i+1 −2θ∆ −2θ∆ 1 1 e i i+1 1−e yi − 1−e  . + 2 + −2θ∆i+1 −2θ∆ −2θ∆ i i+1 1 e σ i=2 1 − e 1−e + −2θ∆ −2θ∆ 1−e i 1−e i+1 Based on Lemma 3.1, we prove the following theorem in Section 8.2. Theorem 3.2 (Consistency). Assume that lim sup max ∆i = 0. n→+∞ i=2,...,n (4) Let J = [a, A] × [b, B], where a, A, b and B are fixed and have been defined in the previous section. Assume that there exists (θ̃, σ̃ 2 ) in J so that θ̃σ̃ 2 = θ0 σ02 . Define (θ̂, σ̂ 2 ) ∈ J as a solution of Sn (θ̂, σ̂ 2 ) = min Sn (θ, σ 2 ). 2 (θ,σ )∈J 6 (5) Then (θ̂, σ̂ 2 ) exists and a.s. θ̂σ̂ 2 → θ0 σ02 . (6) In particular, let σ12 > 0 and θ2 > 0 be predetermined constants satisfying σ02 θ0 /σ12 ∈ [a, A] and σ02 θ0 /θ2 ∈ [b, B]. Define θ̂1 ∈ [a, A] and σ̂22 ∈ [b, B] as solutions of Sn (θ̂1 , σ12 ) = min Sn (θ, σ12 ) (7) Sn (θ2 , σ̂22 ) = 2min Sn (θ2 , σ 2 ). (8) θ∈[a,A] and σ ∈[b,B] a.s. a.s. Then θ̂1 → θ1 := σ02 θ0 /σ12 and σ̂22 → σ22 := σ02 θ0 /θ2 . Remark 3.3. It is worth remarking that the asymptotically preponderant terms in Lemma 3.1 are the same as those obtained in the context of ML estimation (see [40] and Section 8.2 for more details). 4 Asymptotic normality Once the consistency has been established, the natural question of the convergence speed arises. We address this point in this section. We first provide a central limit result in the following theorem. Theorem 4.1 (Central Limit Theorem). Consider the same notation and assumptions as in Theorem 3.2. Assume further that either aB < θ0 σ02 ; Ab > θ0 σ02 or aB > θ0 σ02 ; Ab < θ0 σ02 hold. Then the estimators are asymptotically normal. More precisely, we have √ n D (θ̂σ̂ 2 − θ0 σ02 ) −−−→ N (0, 1). (9) 2 n→∞ θ0 σ0 τn Also, when (σ02 θ0 )/σ12 ∈ (a, A) we have √ n D (θ̂1 − θ1 ) −−−→ N (0, 1). n→∞ θ1 τn Finally, when (σ02 θ0 )/θ2 ∈ (b, B) we have √ n 2 D (σ̂ − σ22 ) −−−→ N (0, 1). 2 n→∞ σ2 τn 2 (10) (11) The quantity τn2 depends on how the underlying design points {s1 , . . . , sn } have been chosen. More precisely, " # 2 n−1  X 2 ∆ ∆ ∆ ∆ i+1 i−1 i i+1 τn2 = + +2 . (12) n i=3 ∆i + ∆i+1 ∆i + ∆i−1 (∆i + ∆i+1 )2 7 Remark 4.2. The condition aB < θ0 σ02 ; Ab > θ0 σ02 or aB > θ0 σ02 ; Ab < θ0 σ02 ensures that (∂/∂θ)Sn (θ̂, σ̂ 2 ) or (∂/∂σ 2 )Sn (θ̂, σ̂ 2 ) will be equal to zero for n large enough almost surely, by applying Theorem 3.2. This is used in the proof of Theorem 4.1. A similar assumption is made in [40], where the parameter domain for (θ, σ 2 ) is (0, ∞) × [b, B] or [a, A] × (0, ∞). In the following proposition, we show that the quantity τ√n2 in Theorem 4.1 is lower and upper bounded, so that the rate of convergence is always n in this theorem. Proposition 4.3. We have, for any choice of the triangular array of design points {s1 , ..., sn } satisfying (4), 2 6 lim inf τn2 6 lim supτn2 6 4. n→∞ (13) n→∞ Remark 4.4. 1. The asymptotic variance of the limiting distribution of θ̂σ̂ 2 − θ0 σ02 can be easily estimated. By the previous proposition, this asymptotic variance is 2 always larger than the one of the ML estimator. Indeed, with θ̂M L and σ̂M L the ML √ D 2 2 2 2 estimators of θ and σ we have ( n/[θ0 σ0 ])(θ̂M L σ̂M L − θ0 σ0 ) −−−→ N (0, 2), see [40]. n→∞ This fact is quite expected as ML estimates usually perform best when the covariance model is well-specified, as is the case here. 1 2. As one can check easily, the regular design ∆i ≡ n−1 for all i = 2, . . . , n, does not yield the limiting variance of the ML estimator. Instead, we have τn2 →n→∞ 3 for this design. However, in Proposition 4.5, we exhibit a particular design realizing the limiting variance of the ML estimator: lim τn2 = 2. n→∞ In fact, the bounds in (13) are sharp as shown in the following proposition. Proposition 4.5. (i) Let {s1 , . . . , sn } be such that s1 = 0, for i = 2, ..., n − 1, ( (1 − γn ) n2 if i is even, ∆i = 2γn if i is odd, n where γn ∈ (0, 1), and ∆n = 1 − Pn−1 i=2 ∆i . Then, taking γn = 1/n, we get τn2 → 4. n→∞ (ii) Let {s1 , . . . , sn } and 0 < α < 1 be such that s1 = 0, ∆i = 1/(i !) for i = bnα c + 1, . . . , n n n X X and ∆2 = · · · = ∆bnα c ≡ (1 − rn )/(bnα c − 1) with rn := ∆i . Then ∆i = 1 and i=bnα c+1 i=2 τn2 → 2. n→∞ Remark 4.6. Intuitively, in Proposition 4.5 (ii), ∆i+1 will be much smaller than ∆i for i+1 i ∆i+1 most of the indices i, so that the quantities ∆i∆+∆ and (∆∆i +∆ 2 in (12) will be negligible. i+1 i+1 ) We refer to the proof of Proposition 4.5 for further details. 8 5 Numerical experiments We illustrate Theorem 4.1 by a Monte Carlo simulation. We set θ0 = 3 and σ02 = 1 and we consider three sample size values, n = 12, 50, 200. For the sample size n = 12, we address three designs {s1 , ..., sn }. The first one is the ‘minimal’ design given by Proposition 4.5 (ii) with α = 0.5, which asymptotically achieves the minimal estimation variance. The second one is the ‘regular’ design given by {s1 , ..., sn } = {0, 1/(n − 1), ..., 1}. The third one is the ‘maximal’ design given by Proposition 4.5 (i) with γn = 1/n, which asymptotically achieves the maximal estimation variance. These three designs are show in Figure 1. For the sample sizes n = 50 and n = 200, the ‘minimal’ design is not amenable to numerical computation anymore, as the values of ∆i become too small; so that we only address the ‘regular’ and ‘maximal’ designs. ● 0.0 ● 0.2 0.4 ● 0.6 0.8 ●● ● 1.0 0.0 ● ● 0.2 ● ● ● 0.4 ● ● 0.6 ● ● 0.8 ● ● 1.0 ●● 0.0 ●● 0.2 ●● 0.4 ●● ●● 0.6 ● 0.8 ● 1.0 Figure 1: Plot of the points {s1 , ..., sn } for the ‘minimal’, ‘regular’ and ‘maximal’ designs of the numerical experiments for n = 12 (from left to right). For the ‘minimal’ design, nine points form a dense cluster around one and the asymptotic variance of the CV estimator is 2 (Proposition 4.5 (i)), for the ‘regular’ design, the asymptotic variance is 3, and for the ‘maximal’ design, the asymptotic variance is 4 (Proposition 4.5 (ii)). For a given configuration of n and a given design {s1 , ..., sn }, we repeat N = 2.000 data generations and estimations. That is, we independently sample N Gaussian vectors of size n with zero mean vector and covariance matrix [σ02 e−θ0 |si −sj | ]16i,j6n . For each of these Gaussian vectors, we compute the CV estimators θ̂ and σ̂ 2 , with parameter space [0.1, 10] × [0.3, 30], so that we consider case (9) of Theorem 4.1. The computation of θ̂ and σ̂ 2 is not challenging since, from Lemma 3.1, the logarithmic score Sn (θ, σ 2 ) can be computed quickly, with a O(n) complexity. [For more general covariance functions, the computation of CV or ML criteria is more costly, with a O(n3 ) complexity.] The criterion Sn is minimized over (θ, σ 2 ) by repeating the Broyden–Fletcher–Goldfarb–Shanno (BFGS) algorithm, with several starting points for (θ, σ 2 ), and by keeping the value of (θ, σ 2 ) with smallest logarithmic score, over all the repetitions. The R software was used, with the optim function. [We remark that, for fixed θ, one could find an explicit expression of σ̂ 2 (θ) ∈ argminσ2 >0 Sn (θ, σ 2 ) (see also [5] for a different CV criterion). Hence, it would be possible to minimize the profile logarithmic score minσ2 >0 Sn (θ, σ 2 ) over θ only. As 9 mentioned earlier, this improvement is not needed here, since the criterion Sn (θ, σ 2 ) can be computed quickly.] √ For the N values of (θ̂, σ̂ 2 ), we compute the N values of ( n/[θ0 σ02 ])(θ̂σ̂ 2 − θ0 σ02 ). In Figure 2, we report the histograms of these latter N values, for the seven configurations under consideration. In addition, we report the probability density functions of the seven corresponding Gaussian distributions with mean 0 and variance τn2 , to which the histograms converge when n → ∞, in view of Theorem 4.1. In Figure 2, we observe that, for n = 12, the asymptotic Gaussian distributions are already reasonable approximations of the empirical histograms. For n = 50, the asymptotic distributions become very close to the histograms, and for n = 200 the asymptotic distributions are almost identical to the histograms. Hence, the convergence in distribution of Theorem 4.1 provides a good approximation of the finite sample situation already for small to moderate n. The case n = 12 illustrates the benefit of the ‘minimal’ design for estimation, as 2 the histogram is most concentrated around zero for this design. Similarly, the value of τ12 is the smallest for this design, compared to the ‘regular’ and ‘maximal’ designs. For n = 50 and 200, we also observe that the estimation is more accurate for the ‘regular’ design than for the ‘maximal’ design, which also confirms Remark 4.4 and Proposition 4.5. Finally, we have obtained similar conclusions for the case where either θ0 or σ02 is known in the computation of θ̂, σ̂ 2 (cases of (10) and (11)). We do not report the corresponding results for concision. 6 Extension to regression models In this section, we extend Theorems 3.2 and 4.1 to the case of regression models. We assume that, instead of Y , we observe the Gaussian process Z defined by Z(t) = β01 f1 (t) + ... + β0p fp (t) + Y (t). In the definition of Z, β 0 = (β01 , ..., β0p )0 ∈ Rp is fixed and unknown and, for k = 1, ..., p, fk : [0, 1] → R is a known function. Hence, we estimate jointly (θ, σ 2 , β 00 ) from the observation vector z = (z1 , ..., zn )0 , with zi = Z(si ). −1 0 −1 Let F be the n × p matrix [fj (si )]i=1,...,n,j=1,...,p . Then β̂ = (F 0 R−1 θ F ) F Rθ z is the best linear unbiased predictor of β 0 given z, under covariance function Kθ,σ2 for all σ 2 , see e.g. [30]. We now address CV estimation. Let f i = (f1 (si ), ..., fp (si ))0 , let z −i = (z1 , ..., zi−1 , zi+1 , ..., zn )0 , let F −i be the matrix obtained by removing line i of F , and let Rθ,−i be the (n − 1) × (n − 1) matrix obtained by removing line and column i of Rθ . Then, for all σ 2 , −1 −1 0 β̂ −i = (F 0−i R−1 θ,−i F −i ) F −i Rθ,−i z −i is the best linear unbiased predictor of β 0 given z −i , under covariance function Kθ,σ2 . We also let r θ,−i = (Kθ,1 (si , s1 ), ..., Kθ,1 (si , si−1 ), Kθ,1 (si , si+1 ), ..., Kθ,1 (si , sn ))0 . Then, from e.g. [30], Ẑθ,−i (si ) = f 0i β̂ −i + r 0θ,−i R−1 (14) θ,−i (z −i − F −i β̂ −i ) is the best linear unbiased predictor of zi given z −i . We let h i2  2 σ̌θ,σ2 ,−i (si ) = Eθ,σ2 Ẑθ,−i (si ) − Z(si ) . 10 −5 0 5 0.3 0.0 0.1 0.2 0.3 0.2 0.1 0.0 0.0 0.1 0.2 0.3 0.4 n=12, maximal 0.4 n=12, regular 0.4 n=12, minimal 10 −5 0 5 −5 0 5 10 0.3 0.2 0.1 0.0 0.0 0.1 0.2 0.3 0.4 n=50, maximal 0.4 n=50, regular 10 −5 0 5 10 −5 5 10 0.3 0.2 0.1 0.0 0.0 0.1 0.2 0.3 0.4 n=200, maximal 0.4 n=200, regular 0 −5 0 5 10 −5 0 5 10 Figure 2: Illustration of Theorem 4.1. Histograms of N = 2.000 independent realizations of √ ( n/[θ0 σ02 ])(θ̂σ̂ 2 − θ0 σ02 ), together with the corresponding asymptotic Gaussian probability density functions with mean 0 and variances τn2 (red lines). The sample size is n = 12 (top row), n = 50 (middle row) and n = 200 (bottom row). For the top row, the designs are the ‘minimal’ design (left), achieving the smallest asymptotic variance; the ‘regular’ design (middle), with equispaced observation points; and the ‘maximal’ design (right), achieving the largest asymptotic variance. For the middle and bottom rows, the designs are the ‘regular’ design (left) and the ‘maximal’ design (right). Then, the CV estimator of (θ, σ 2 ) we shall study in this section is (θ̌, σ̌ 2 ) ∈ argmina6θ6A,b6σ2 6B S̄n (θ, σ 2 ) 11 with S̄n (θ, σ 2 ) = n X i=1 " # 2 (z − Ẑ (s )) i θ,−i i 2 log(σ̌θ,σ . 2 ,−i (si )) + 2 σ̌θ,σ 2 ,−i (si ) We remark that [43] suggests to use a similar CV criterion, with the notable difference that β̂ −i is replaced by β̂ in (14). The benefit of the CV predictor (14), compared to that considered in [43], is that, in (14), no use of zi is made at all for predicting zi . In [15], the following relations are shown, extending those of Section 3. We have Ẑθ,−i (si ) = − X (Q− )ij θ zj − (Q ) ii θ j=1,...,n; j6=i and 2 σ̌θ,σ 2 ,−i (si ) = σ2 , (Q− θ )ii (15) 0 −1 −1 −1 −1 0 −1 with Q− θ = Rθ − Rθ F (F Rθ F ) F Rθ . Based on the two displays above, and again using the explicit matrix inverse in (1), we are able to prove the consistency and asymptotic normality of θ̌σ̌ 2 where the asymptotic distribution is identical to that of Section 4. Theorem 6.1 (Consistency). Assume that lim sup max ∆i = 0 and that there exists (θ̃, σ̃ 2 ) n→+∞ i=2,...,n 2 θ0 σ02 . in J so that θ̃σ̃ = Assume also that f1 , ..., fp are twice continuously differentiable and are linearly independent on [0, 1]. Then (θ̌, σ̌ 2 ) exists and a.s. θ̌σ̌ 2 → θ0 σ02 . (16) Theorem 6.2 (Central Limit Theorem). Assume that the conditions of Theorem 6.1 hold and that aB > θ0 σ02 and Ab < θ0 σ02 . Then, with τn as in (12), we have √ n D (θ̌σ̌ 2 − θ0 σ02 ) −−−→ N (0, 1). (17) 2 n→∞ θ0 σ0 τn In Theorems 6.1 and 6.2, the twice differentiability condition for f1 , ..., fp is mostly technical, and could be replaced by a continuous differentiability condition, at the price of more technical proofs. [We remark that Theorems 6.1 and 6.2 apply in particular to polynomial functions f1 , ..., fp which are widely considered, for instance in the framework of computer experiments [30].] As remarked in [40], when f1 , ..., fp are continuously differentiable, the parameter β 0 is non-microergodic and can not be consistently estimated. Finally, assume now that f1 , ..., fp satisfy the conditions given in Theorem 3 (ii) in [40]. Then, one can show from the proof of this theorem that, for any sequence or random variables (θ̄, σ̄ 2 ) ∈ J (and in particular for ( θ̌, σ̌ 2 )), the estimator β̂ = β̂(θ̄) given above is consistent and asymptotically normal, with asymptotic distribution given in (4.5) in [40]. In this setting, it would be interesting to study the joint asymptotic distribution of (θ̌, σ̌ 2 , β̂). 12 7 Concluding remarks We have proved the consistency and asymptotic normality of the CV estimator of the microergodic√parameter θ0 σ02 , based on the logarithmic score. While the ML asymptotic 2 2 variance of ( n/[θ0 σ02 ])(θ̂M L σ̂M L − θ0 σ0 ) is 2 for any triangular array of observation points, the corresponding CV asymptotic variance is simply bounded between 2 and 4, those bounds being tight. The triangular array we exhibit, achieving the asymptotic variance 2 for CV, is based on some ratios between interpoint distances (of the form (si+1 −si )/(sj+1 − sj )) going to zero as n → ∞, which makes it too challenging to simulate numerically for large n. It would be interesting to find the smallest possible asymptotic variance for CV, when the ratios between interpoint distances are bounded away from zero. One interesting agenda for future research would be to extend this asymptotic analysis of CV in the other settings where such an analysis was possible for ML. These settings include the case of measurement errors for the exponential covariance function in dimension one [11, 10], the case of the separable exponential covariance function in higher dimension [41] (consistency and asymptotic normality), of the separable Matérn 3/2 covariance function [22] (consistency) and of the Gaussian covariance function [23] (consistency). In these references, tractable approximations of the inverse covariance matrices are provided, which could also be exploited in the case of CV. Finally, using techniques which are more spectral in nature, [14, 21, 39] prove central limit theorems for the ML estimation of the microergodic parameter in the isotropic Matérn model. An extension to CV would also be valuable. 8 8.1 Proofs Notation and auxiliary results Remind that ∆i = si − si−1 and introduce Wi := [yi − e−θ∆i yi−1 ] and its normalized version W i := [yi − e−θ∆i yi−1 ]/[σ 2 (1 − e−2θ∆i )]1/2 for i = 2, . . . , n (the dependency in n is not mentioned in Wi and W i to lighten notation). When (θ, σ 2 ) = (θ0 , σ02 ), the random variables will be denoted Wi,0 and W i,0 . By the Markovian and Gaussian properties of Y , it follows that for each i > 2, W i,0 is independent of {yj , j 6 i − 1}. Therefore, {W i,0 , 2 6 i 6 n} is an i.i.d. sequence of random variables having the standard normal distribution N (0, 1). It is convenient to have short expressions for terms that converge in probability to zero. We follow [38]. The notation oP (1) (respectively OP (1)) stands for a sequence of random variables that converges to zero in probability (resp. is bounded in probability) as n → ∞. More generally, for a sequence of random variables Rn , P Xn = oP (Rn ) means Xn = Yn Rn with Yn → 0 Xn = OP (Rn ) means Xn = Yn Rn with Yn = OP (1). 13 For deterministic sequences Xn and Rn , the stochastic notation reduce to the usual o and O. Throughout the paper, by K, we denote a generic constant (i.e. K may or may not be the same at different occurrences) that does not depend on (Y, θ, σ 2 , n). We also denote by δn and δ̄n two sequences of random variables satisfying sup |δn | = OP (1) (θ,σ 2 )∈J and sup |δ̄n | = o(n), a.s. (θ,σ 2 )∈J The definition of δn and δ̄n may change from one line to the other. Similarly, we denote by δi,n a triangular array of deterministic scalars satisfying |δi,n | 6 K. sup n∈N,i=1,...,n (θ,σ 2 )∈J The definition of δi,n may change from one line to the other, and possibly also in different occurrences within the same line. We also use several times that, n−1 X ∆i = 1, (18) i=2 sup |Y (t)| < +∞ a.s. (19) t∈[0,1] Before turning to the proof of Theorems 3.2 and 4.1, we state five auxiliary lemmas that will be required in the sequel. Lemma 8.1. (i) Let λi > 0, i = 1, 2 be fixed. Then as x → 0, λ1 1 − e−λ1 x = + O(x). −λ x 1−e 2 λ2 (ii) Let λ > 0 be fixed. Then as x, y → 0, x+y 1 − e−λx = (1 + O(x + y)). −λy 1−e y Lemma 8.2. For any constant δ > 0, there exists a constant η > 0 such that 1 + e−λy inf (x − 1 − log x) > η. |x−1|>δ x>0 (20) Lemma 8.3. Suppose that for each n, the random variables Z, Z1,n , . . . , Zn,n are independent and identically distributed and centered. Suppose also that for some t > 0 and p > 0, E[exp{t|Z|p }] < ∞. Then for all α > 0, a.s sup |Zk,n | = o(nα ) (21) 16k6n n X Zk,n = o(n(1/2)+α ). k=2 14 (22) The proof of Lemma 8.1 is direct and these of Lemmas 8.2 and 8.3 can be found in [40]. Lemma 8.4. Let for any i ∈ {2, ..., n − 1}, ηi = ∆i+1 (1 + δi,n (∆i + ∆i+1 )) ∆i + ∆i+1 τi = ∆i (1 + δi,n (∆i + ∆i+1 )) . ∆i + ∆i+1 and Then sup (i) (θ,σ 2 )∈J sup (ii) (θ,σ 2 )∈J sup (iii) (θ,σ 2 )∈J sup (iv) (θ,σ 2 )∈J Pn−1 ηi Wi,0 yi = OP (1); Pn−1 ηi Wi yi = OP (1); Pn−1 τi Wi+1,0 yi−1 = OP (1); Pn−1 τi Wi+1 yi−1 = OP (1). i=2 i=2 i=2 i=2 Proof of Lemma 8.4. We only prove (iii) and (iv), the proof of (i) and (ii) being similar. (iii) We have n−1 X τi Wi+1,0 yi−1 6 i=2 n−1 X i=2 Using the fact that ∆i ∆i +∆i+1 n−1 X ∆i Wi+1,0 yi−1 + K ∆i |Wi+1,0 yi−1 | =: L1 + L2 . ∆i + ∆i+1 i=2 6 1 and that for i 6= j, E[Wi+1,0 yi−1 Wj+1,0 yj−1 ] = 0, we get E[L21 ] 6 n−1 X 2 2 E[Wi+1,0 yi−1 ] i=2 n−1 X 6K = n−1 X 2 2 E[yi−1 ]E[Wi+1,0 ] i=2 (1 − e −2θ0 ∆i+1 )6K i=2 n−1 X ∆i+1 = O(1), i=2 using the fact that Wi+1,0 and yi−1 are independent and a Taylor expansion of ∆i+1 7→ 1 − e−2θ0 ∆i+1 . Now, by Cauchy-Schwarz, E(|L2 |) 6K n−1 X ∆i E(|Wi+1,0 ||yi−1 |) 6 K i=2 n−1 X i=2 15 q q 2 2 ∆i E(Wi+1,0 ) E(yi−1 ) = O(1). Hence, since L1 and L2 do not depend on θ and σ 2 , we have sup Pn−1 (θ,σ 2 )∈J i=2 τi Wi+1,0 yi−1 = OP (1). (iv) Now, we use the decomposition Wi+1 = Wi+1,0 + (e−θ0 ∆i+1 − e−θ∆i+1 )yi (23) to get n−1 X τi Wi+1 yi−1 = n−1 X τi Wi+1,0 yi−1 + n−1 X i=2 i=2 6 n−1 X τi Wi+1,0 yi−1 + i=2 τi (e−θ0 ∆i+1 − e−θ∆i+1 )yi yi−1 i=2 n−1 X τi |e−θ0 ∆i+1 − e−θ∆i+1 ||yi yi−1 |. i=2 The first sum is OP (1) by (iii). The second sum is OP (1) by using the fact that supt∈[0,1] Y 2 (t) < ∞ a.s. and |τi ||e−θ0 ∆i+1 − e−θ∆i+1 | sup 6 K. ∆i+1 n∈N,i=2,...,n−1,(θ,σ 2 )∈J Pn−1 Hence sup i=2 τi Wi+1 yi−1 = OP (1). (θ,σ 2 )∈J We can show, after some tedious but straightforward calculations, the following Taylor expansions. Lemma 8.5. Let αi := (σ 2 (1 − e−2θ∆i ))−1 , αi,0 := (σ02 (1 − e−2θ0 ∆i ))−1 , ∆i+1 ∆i−1 qi := + , ∆i + ∆i+1 ∆i + ∆i−1 Ai := αi + αi+1 e−2θ∆i+1 , 1 e−2θ∆i + , Ai Ai−1 Ci := (αi αi+1 e−θ∆i+1 )/Ai , Bi := for i = 2, ..., n, for i = 2, ..., n, (25) for i = 3, ..., n − 1, (26) for i = 2, ..., n − 1, (27) for i = 3, ..., n − 1, (28) for i = 2, ..., n − 1. (29) Let αi0 = ∂αi /∂θ, A0i = ∂Ai /∂θ, Bi0 = ∂Bi /∂θ and Ci0 = ∂Ci /∂θ. Note that we have   αi αi+1 A0i e−θ∆i+1 0 0 0 Ci = αi αi+1 + αi αi+1 − αi αi+1 ∆i+1 − . Ai Ai 16 (24) (30) We have, αi − sup n∈N,i=2,...,n, (θ,σ 2 )∈J sup n∈N,i=2,...,n, (θ,σ 2 )∈J αi2 = sup n∈N,i=2,...,n−1, (θ,σ 2 )∈J sup 1 4σ 4 θ2 ∆2i 1 Ai − 2 2σ θ  1 − 2 2 2σ θ  A0i n∈N,i=2,...,n−1, (θ,σ 2 )∈J αi0 − 1 2σ 2 θ∆i 1 2σ 2 θ2 ∆i + δi,n 1 1 + ∆i ∆i+1 1 1 + ∆i ∆i+1 6K (31) 6K (32) 1 ∆i  (33) 6K (34) 6K (35)  1 ∆i ∆i+1 A0i = + δi,n Ai θ ∆i + ∆i+1 1 αi Bi0 = − qi + δi,n (∆i−1 + ∆i + ∆i+1 ) θ 1 αi0 Bi = qi + δi,n (∆i−1 + ∆i + ∆i+1 ) θ 1 1 6 K. sup Ci0 − 2 2 2σ θ ∆i + ∆i+1 n∈N,i=2,...,n−1, (36) (37) (38) (39) (θ,σ 2 )∈J 8.2 Proof of Theorem 3.2 The existence of θ̂ and σ̂ 2 is a consequence of the fact that Sn is a continuous function defined on a compact set. Now, it suffices to show (16) since θ̂1 → θ1 (resp. σ̂22 → σ22 ) is a particular case of (16) with b = B = σ12 (resp. a = A = θ2 ). Moreover, in view of (5), the result (16) holds if we can show that for every ε > 0, a.s. inf eσ {Sn (θ, σ 2 ) − Sn (θ, e2 )} → ∞ (θ,σ 2 )∈J, eσ 2 |>ε |θσ 2 −θe (40) eσ eσ 2 = θ0 σ 2 . where (θ, e2 ) ∈ J can be any non-random vector such that θe 0 eσ Let us compute the difference Sn (θ, σ 2 ) − Sn (θ, e2 ) and determine the preponderant terms. After some computations, we naturally have yi −  αi e−θ∆i yi−1 + αi+1 e−θ∆i+1 yi+1 1 = αi Wi − αi+1 e−θ∆i+1 Wi+1 , Ai Ai 17 (41) where αi and Ai have already been defined in Equations (24) and (27). Hence, from Lemma 3.1, Sn (θ, σ 2 ) =n log(σ 2 ) + log(1 − e−2θ∆2 ) + log(1 − e−2θ∆n ) − n−1 X log σ 2 Ai  (42) i=2 −θ∆2 2 Wn2 − e−2θ∆n ) y2 ) (y1 − e + 2 2 −2θ∆ 2) σ (1 − e σ (1 n−1 X 1 2 + αi Wi − αi+1 e−θ∆i+1 Wi+1 . Ai i=2 + (43) (44) In the following, we prove that the terms in (43) and those obtained by developing (44), except one, are o(n) uniformly in (θ, σ 2 ) ∈ J, a.s. More precisely, we establish the following lemma (see the proof in Section 8.3). Lemma 8.6. One has 2 2 Sn (θ, σ ) =n log(σ ) + log(1 − e −2θ∆2 −2θ∆n ) + log(1 − e )− n−1 X log σ 2 Ai  i=2 + n−1 X 2 αi2 Bi Wi,0 + δ̄n . i=3 As a consequence, we find that, n−1   1 − e−2θ∆2 1 − e−2θ∆n X σ2 2 e e − log Ai /Ai + log + log Sn (θ, σ ) − Sn (θ, σ e ) =n log e 2 e n 1 − e−2θ∆ 1 − e−2θ∆ σe2 2 i=2 + n−1  X  ei W 2 + δ̄n αi2 Bi − α ei2 B i,0 (45) i=3 ei and A ei are the analogs of αi , Bi and Ai defined in Equations (24), (27) where α ei , B and (28) with θ = θe and σ 2 = σ e2 . More precisely,h they are naturally defined by α ei = i e e e i+1 1 e−2θ∆i 2 −2θ∆i −1 e −θ∆ e (e σ (1 − e )) , Ai = α ei + α ei+1 e and Bi = Ae + Ae . i i−1 eσ eσ 2 = θ0 σ 2 and making some more Using the fact that (θ, e2 ) has been chosen such as θe 0 computations, we get the following lemma (see the proof in Section 8.3). Lemma 8.7. Uniformly in (θ, σ 2 ) ∈ J, a.s.   2 2 θ σ θ σ 0 0 0 0 2 2 eσ + o(n). Sn (θ, σ ) − Sn (θ, e )=n − 1 − log θσ 2 θσ 2 18 Hence by Lemma 8.7, a.s. 2 eσ {Sn (θ, σ ) − Sn (θ, e )} > inf  θ0 σ02 θ0 σ02 n + o(n) − 1 − log θσ 2 θσ 2  2 (θ,σ 2 )∈J, eσ 2 |>ε |θσ 2 −θe inf (θ,σ 2 )∈J, eσ 2 |>ε |θσ 2 −θe (46) which by Lemma 8.2, for every ε > 0, is strictly positive, for n large enough, a.s. Then the proof of Theorem 3.2 is now complete. 8.3 Proofs of the lemmas of Section 8.2 Proof of Lemma 8.6. (i) First, we study the terms in (43). We have, from (31) 2 2 y1 − e−θ∆2 y2 y1 − e−θ∆2 y2 6K 2 σ 2 (1 − e−2θ∆2 ) σ0 (1 − e−2θ0 ∆2 ) 2 2 y1 − e−θ0 ∆2 y2 e−θ0 ∆2 − e−θ∆2 6K 2 +K 2 y2 σ0 (1 − e−2θ0 ∆2 ) σ0 (1 − e−2θ0 ∆2 ) 2 2 6 K sup W̄i,0 + K∆2 sup Y 2 (t) 26i6n (47) t∈[0,1] = o(n) a.s. (48) from Lemma 8.3. The random variable Wn2 /(σ 2 (1 − e−2θ∆n )) can be treated in the same manner leading to the same result. (ii) Second, we turn to the term in (44) that we aim at approximating by a sum of independent random variables. In this goal, we first show the relation 2 2 + 2[e−θ0 ∆i − e−θ∆i ]yi−1 Wi,0 . Wi2 = Wi,0 + [e−θ0 ∆i − e−θ∆i ]2 yi−1 (49) Hence, by (49), one has n−1 X 2 1 αi Wi − αi+1 e−θ∆i+1 Wi+1 Ai i=2 = = = n−1 2 X α i i=2 n−1 X i=3 n−1 X i=3 + Ai αi2 Wi2 + n−1 2 X αi+1 e−2θ∆i+1 i=2  Ai 2 Wi+1 −2 n−1 X αi αi+1 e−θ∆i+1 i=2 Ai Wi Wi+1  n−1 X 1 e−2θ∆i α22 2 αn2 e−2θ∆n 2 2 + Wi + W + Wn − 2 Ci Wi Wi+1 Ai Ai−1 A2 2 An−1 i=2 2 αi2 Bi Wi,0 + n−1 X αi2 Bi (e−θ0 ∆i − 2 e−θ∆i )2 yi−1 i=3 α22 2 αn2 e−2θ∆n 2 W + Wn − 2 A2 2 An−1 +2 n−1 X αi2 Bi (e−θ0 ∆i − e−θ∆i )Wi,0 yi−1 i=3 n−1 X Ci Wi Wi+1 i=2 =:Σ1 + Σ2 + 2Σ3 + T2 + Tn − 2Σ4 , (50) 19 where αi , Ai , Bi and Ci have been defined in (24), (27), (28) and (29). We prove that all the previous terms are o(n), uniformly in θ and σ 2 a.s, except Σ1 that still appears in the expression of Sn (θ, σ 2 ) in Lemma 8.6. α2 A2 • Term T2 : For n large enough, since 6 1, we get α22 2 W 6 α2 W22 . A2 2 |T2 | = Hence, we can show sup |T2 | = o(n) a.s. in the same way as for (47). (θ,σ 2 )∈J αn e−2θ∆n An−1 • Term Tn : For n large enough, since |Tn | = 6 1, we get αn2 e−2θ∆n 2 Wn 6 αn Wn2 . An−1 Hence, we can show sup |Tn | = o(n) a.s. in the same way as for (47). (θ,σ 2 )∈J • Term Σ2 : The deterministic quantity αi (e−θ0 ∆i ∆i − e−θ∆i )2 is bounded for n large enough, −2θ∆ uniformly in (θ, σ 2 ) ∈ J (trivial inequalities and (31)) while Aαii 6 1 and αiAe i−1 i 6 1. Then, we are led to n−1 n−1 X X αi 2 −θ0 ∆i −θ∆i 2 2 2 αi Bi (e −e ) yi−1 = ∆i αi Bi (e−θ0 ∆i − e−θ∆i )2 yi−1 ∆i i=3 i=3 2 6 K sup Y (t) t∈[0,1] n−1 X ∆i = K sup Y (t)2 i=3 t∈[0,1] from which, by (19), we deduce sup Σ2 = o(n) a.s. (θ,σ 2 )∈J • Term Σ3 : By the Cauchy-Schwarz inequality, |Σ3 | 6 n−1 X αi4 2 −θ0 ∆i Bi (e − e−θ∆i )2 α i,0 i=3 !1/2 n−1 X !1/2 2 2 W i,0 yi−1 . (51) i=3 As already mentioned, the deterministic term αi −θ0 ∆i (e − e−θ∆i )2 ∆i is bounded uniformly in (θ, σ 2 ) ∈ J. Furthermore, αi /αi,0 is bounded uniformly in (θ, σ 2 ) ∈ J from (31). Finally, αi2 Bi2 6 Kαi2 (1/αi )2 = K. Hence the first term on the right-hand side P 2 of (51) is bounded uniformly in (θ, σ 2 ) ∈ J. Now Lemma 8.3 yields that n−1 i=3 (W i,0 − 1) = Pn−1 2 o(n(1/2)+α ) a.s. for any α > 0 leading to i=3 W i,0 = O(n) a.s and !1/2 !1/2 n−1 n−1 X X 2 2 2 yi−1 W i,0 6 sup Y 2 (t) W i,0 = O(n1/2 ) a.s. i=3 t∈[0,1] i=3 20 As a consequence, sup |Σ3 | = O(n1/2 ) a.s. and naturally sup |Σ3 | = o(n) a.s. (θ,σ 2 )∈J (θ,σ 2 )∈J • Term Σ4 : Using the trivial equality ab = ab − a0 b0 + a0 b0 = a0 b0 + a0 (b − b0 ) + b(a − a0 ), one gets Wi Wi+1 = [yi − e−θ∆i yi−1 ][yi+1 − e−θ∆i+1 yi ] = [yi − e−θ0 ∆i yi−1 ][yi+1 − e−θ0 ∆i+1 yi ] + [yi − e−θ0 ∆i yi−1 ](e−θ0 ∆i+1 − e−θ∆i+1 )yi + [yi+1 − e−θ∆i+1 yi ](e−θ0 ∆i − e−θ∆i )yi−1 = Wi,0 Wi+1,0 + (e−θ0 ∆i+1 − e−θ∆i+1 )Wi,0 yi + (e−θ0 ∆i − e−θ∆i )Wi+1 yi−1 . (52) Thus Σ4 rewrites n−1 X Ci Wi,0 Wi+1,0 + i=2 n−1 X Ci (e−θ0 ∆i+1 − e−θ∆i+1 )Wi,0 yi + n−1 X i=2 Ci (e−θ0 ∆i − e−θ∆i )Wi+1 yi−1 . (53) i=2 We can show that Ci 1/2 1/2 αi,0 αi+1,0 √ σ02 θ0 ∆i ∆i+1 = 2 2 + δi,n (∆i + ∆i+1 ). σ θ ∆i + ∆i+1 Hence the first random variable of (53) rewrites sup (θ,σ 2 )∈J n−1 X Ci Wi,0 Wi+1,0 = sup (θ,σ 2 )∈J i=2 n−1 X Ci W i,0 W i+1,0 1/2 1/2 i=2 αi,0 αi+1,0 n−1 X √ n−1 2 X σ0 θ0 ∆i ∆i+1 6 sup W i,0 W i+1,0 + δi,n (∆i + ∆i+1 )|W i,0 W i+1,0 | 2 2 (θ,σ 2 )∈J i=2 σ θ ∆i + ∆i+1 i=2 n−1 n−1 √ X X ∆i ∆i+1 6K W i,0 W i+1,0 + δi,n (∆i + ∆i+1 )|W i,0 W i+1,0 | ∆i + ∆i+1 i=2 i=2 n−1 √ X ∆i ∆i+1 =K W i,0 W i+1,0 + δ̄n , ∆i + ∆i+1 i=2 from (21). Now, we have n−1 √ X ∆i ∆i+1 W i,0 W i+1,0 ∆i + ∆i+1 i=2 √ ∆i ∆i+1 6 W i,0 W i+1,0 + ∆ + ∆ i i+1 i=2,...,n−1 i odd X 21 √ ∆i ∆i+1 W i,0 W i+1,0 . ∆ + ∆ i i+1 i=2,...,n−1 i even X In each of the two sums above, the summands constitute two triangular arrays of independent random variables. Thus, applying Theorem Pn−1 2.1 in [17] with an = n, each of the two sums is a o(n) a.s. Hence finally sup i=2 Ci Wi,0 Wi+1,0 = o(n) a.s. (θ,σ 2 )∈J Let us now address the second term in (53) that by the Cauchy-Schwarz inequality is bounded from above by n−1 X Ci2 −θ0 ∆i+1 − e−θ∆i+1 )2 (e α i,0 i=2 !1/2 n−1 X !1/2 2 yi2 W i,0 = o(n) a.s. i=2 where the last equality comes from similar computations as from the term Σ3 above, and from the fact that sup sup sup n∈N 26i6n−1 (θ,σ 2 )∈J Ci2 (e−θ0 ∆i+1 − e−θ∆i+1 )2 6 K. αi,0 ∆i+1 The third term in the right-hand side of (53) yields sup (θ,σ 2 )∈J sup (θ,σ 2 )∈J n−1 X i=2 n−1 X Ci (e−θ0 ∆i − e−θ∆i )Wi+1 yi−1 6 −θ0 ∆i Ci (e −θ∆i −e n−1 X )Wi+1,0 yi−1 + sup (θ,σ 2 )∈J i=2 Ci (e−θ0 ∆i − e−θ∆i )2 yi yi−1 . (54) i=2 Since trivially Ci (e−θ0 ∆i −e−θ∆i ) = δi,n , the second term in (54) is bounded by K O(1) a.s. The first term in (54) is bounded by K n−1 X |Wi+1,0 yi−1 | 6 K sup |Y (t)| t∈[0,1] i=2 n−1 X Pn−1 i=2 ∆i |yi yi−1 | = −1/2 |W̄i+1,0 |αi,0 i=2 v v u n−1 u n−1 uX uX −1 t 2 W̄i+1,0 t αi,0 6 K sup |Y (t)| t∈[0,1] √ = O( n) a.s. i=2 i=2 P 2 since n−1 i=2 W̄i+1,0 = O(n) a.s. has been shown when handling Σ3 after (51). One may conclude that sup Σ4 = o(n) a.s. The proof of Lemma 8.6 is then complete. (θ,σ 2 )∈J Proof of Lemma 8.7. We address each of the terms in (45). • Using Lemma 8.1(i), we get that sup log θ∈[a,A] 1 − e−2θ∆2 e 2 1 − e−2θ∆ 22 = O(1). −2θ∆n In the same way, supθ∈[a,A] log 1−e = O(1). e n 1−e−2θ∆ • We have, using Lemmas 8.1 (i) and (ii), " !#  e i+1 −2θ∆ −2θ∆i+1 1 e e 1 ei ) = log log(Ai /A + + / e i e i+1 1 − e−2θ∆i 1 − e−2θ∆i+1 1 − e−2θ∆ 1 − e−2θ∆ !# "   e e i −2θ∆i −2θ∆ 1 − e−2θ∆i 1 − e 1 − e e = log + log 1 + e−2θ∆i+1 / 1 + e−2θ∆i+1 e i+1 1 − e−2θ∆i 1 − e−2θ∆i+1 1 − e−2θ∆ = log θe + δi,n (∆i + ∆i+1 ). θ Thus, by summation we have, sup n−1 X log θ∈[a,A] i=2 Ai θe − n log = O(1) = o(n). θ Ãi • We want to show that sup (θ,σ 2 )∈J n−1 X 2 αi2 Bi Wi,0 −n i=3 θ0 σ02 = o(n) a.s. θσ 2 By (28), one has n−1 X n−1 n−1 X X αi2 1 2 αi2 e−2θ∆i 2 = W i,0 + W i,0 αi,0 Ai αi,0 Ai−1 i=3 i=3 i=3  n−2  2 2 X αi+1 α2 αi 1 2 e−2θ∆i+1 2 α2 e−2θ∆3 2 2 = W i,0 + W i+1,0 + 3 W3,0 + n−1 Wn−1,0 . α A α A A A i,0 i i+1,0 i 2 n−1 i=3 2 αi2 Bi Wi,0 Then we use (31) to develop αi /αi,0 (respectively αi+1 /αi+1,0 ) and Lemma 8.1 (ii) to develop αi /Ai (respectively αi+1 e−2θ∆i+1 /Ai ). We get θ0 σ02 ∆i+1 αi2 1 = + δi,n (∆i + ∆i+1 ) αi,0 Ai θσ 2 ∆i + ∆i+1 (55) 2 αi+1 e−2θ∆i+1 θ0 σ02 ∆i = + δi,n (∆i + ∆i+1 ). 2 αi+1,0 Ai θσ ∆i + ∆i+1 (56) In addition, we easily show, as in (47), that sup (θ,σ 2 )∈J 23 α23 e−2θ∆3 2 W3,0 A2 = o(n) a.s. and that α2n−1 2 Wn−1,0 An−1 sup (θ,σ 2 )∈J n−1 X = o(n) a.s. Then,  X n−2  2 n−2 2 X αi+1 θ0 σ02 αi 1 2 e−2θ∆i+1 2 θ0 σ02 −n 2 = W i,0 + W i+1,0 − + δ̄n 2 θσ α A α A θσ i,0 i i+1,0 i i=3 i=3 i=3   n−2  2 n−2  2 −2θ∆ 2 X X i+1 αi+1 e αi 1 2 θ0 σ0 ∆i ∆i+1 2 = W i,0 + W i+1,0 − + + δ̄n 2 α A α A θσ ∆ + ∆ ∆ + ∆ i,0 i i+1,0 i i i+1 i i+1 i=3 i=3 6 2 αi2 Bi Wi,0 n−2 n−2 2 X X αi+1 αi2 1 θ0 σ 2 ∆i+1 e−2θ∆i+1 θ0 σ 2 ∆i 2 2 − 2 02 − 2 02 W i,0 + W i+1,0 αi,0 Ai θ σ ∆i + ∆i+1 αi+1,0 Ai θ σ ∆i + ∆i+1 i=3 i=3 + 6K n−2 n−2 θ0 σ02 X ∆i+1 θ0 σ02 X ∆i 2 2 (W − 1) + (W i,0 i+1,0 − 1) + |δ̄n | θσ 2 i=3 ∆i + ∆i+1 θσ 2 i=3 ∆i + ∆i+1 n−2 n−2 X X 2 2 (∆i + ∆i+1 )W i+1,0 + |δ̄n | (∆i + ∆i+1 )W i,0 + K i=3 i=3 + θ0 σ02 θσ 2 (57) n−2 X i=3 n−2 θ0 σ02 X ∆i+1 ∆i 2 2 (W i,0 − 1) + (W i+1,0 − 1) . 2 ∆i + ∆i+1 θσ i=3 ∆i + ∆i+1 Let us show that the terms in the right-hand side of (57) are a.s. o(n). We have n−2 X 2 (∆i + ∆i+1 )W i,0 6 K i=3 sup i=3,...,n−2 2 W i,0 6 1 + sup i=3,...,n−2 a.s. from Lemma 8.3. Similarly n−2 X 2 (∆i + ∆i+1 )W i+1,0 = o(n) i=3 a.s. Also, using theorem 2.1 in [17] with an = n, we have n−2 X i=3 a.s. and n−2 X i=3 ∆i+1 2 (W i,0 − 1) = o(n) ∆i + ∆i+1 ∆i 2 (W i+1,0 − 1) = o(n) ∆i + ∆i+1 a.s. Hence finally sup (θ,σ 2 )∈J n−1 X 2 αi2 Bi Wi,0 −n i=3 24 2 |W i,0 − 1| = o(n), θ0 σ02 = o(n) a.s. θσ 2 • We can now conclude the proof. We have   θ0 σ02 σ2 θ0 σ02 θ̃ θ0 σ02 σ2θ Sn (θ, σ ) − Sn (θ̃, σ̃ ) = n log 2 − n log + n 2 − n + δn = n log 2 + − 1 + δn , σ̃ θ θσ σ0 θ0 θσ 2 θ̃σ˜2 2 2 by reminding that θ̃σ˜2 = θ0 σ02 . The proof of Lemma 8.7 is thus complete. 8.4 Proof of Theorem 4.1 Let us first prove (9) in the case aB < θ0 σ02 ; Ab > θ0 σ02 . We shall then discuss the other cases at the end. In that view, let ψ(θ, σ 2 ) = ∂ Sn (θ, σ 2 ). ∂θ (58) Then from Theorem 3.2, a.s. for n large enough, θ̂ ∈ (a, A). Thus a.s. for n large enough (θ̂, σ̂ 2 ) satisfies ψ(θ̂, σ̂ 2 ) = 0. We shall approximate ψ(θ, σ 2 ) uniformly in (θ, σ 2 ) ∈ J. Starting from (42), (43), (44) and (50) we can write ψ(θ, σ 2 ) = where ◦ Σ01 = ∂ Σ ∂θ 1 = 2∆2 e−2θ∆2 2∆n e−2θ∆n 2∆2 e−θ∆2 y2 (y1 − e−θ∆2 y2 ) + + 1 − e−2θ∆2 1 − e−2θ∆n σ 2 (1 − e−2θ∆2 ) 2∆2 e−2θ∆2 (y1 − e−θ∆2 y2 )2 2∆n e−θ∆n yn−1 Wn 2∆n e−2θ∆n Wn2 − + − σ 2 (1 − e−2θ∆2 )2 σ 2 (1 − e−2θ∆n ) σ 2 (1 − e−2θ∆n )2 n−1 X A0i − + Σ01 + Σ02 + 2Σ03 + T20 + Tn0 − 2Σ04 A i i=2 n−1 X 2 αi Di Wi,0 ; i=3 ◦ Σ02 = ∂ Σ ∂θ 2 = n−1 X   2 αi Di (e−θ0 ∆i − e−θ∆i ) + 2αi Bi ∆i e−θ∆i yi−1 (e−θ0 ∆i − e−θ∆i ); i=3 n−1 X   αi Di (e−θ0 ∆i − e−θ∆i ) + αi Bi ∆i e−θ∆i Wi,0 yi−1 ; i=3   0 2∆2 e−θ∆2 y1 W2 W22 2 2 A2 ∂ 0 0 +α − W2 2 ; ◦ T2 = ∂θ T2 = 2α2 α2 A2  2 A2 A2  0 −2θ∆n A α e n n−1 0 −θ∆n ∂ 0 ◦ Tn = ∂θ Tn = (2αn − 2αn ∆n − αn )Wn + 2αn ∆n e yn−1 Wn ; An−1 An−1 n−1 n−1 n−1 X X X 0 −θ∆i ∂ 0 ◦ Σ4 = ∂θ Σ4 = Ci Wi Wi+1 + Ci ∆i e Wi+1 yi−1 + Ci ∆i+1 e−θ∆i+1 Wi yi ◦ Σ03 = ∂ Σ ∂θ 3 = i=2 i=2 i=2 where Ci0 is the derivative of Ci w.r.t. θ defined in (30) and Di := 2αi0 Bi + αi Bi0 , for i = 3, . . . , n − 1. (59) First, we consider the terms Σ01 and Σ04 in the following lemma (proved in Section 8.6). 25 Lemma 8.8. We have Σ01 = n−1 θ0 σ02 X 2 qi W i,0 + δn 2 2 θ σ i=3 and Σ04 n−1 √ θ0 σ02 X ∆i ∆i+1 = 2 2 W i,0 W i+1,0 + δn , θ σ i=3 ∆i + ∆i+1 where qi and Ci0 have been defined in (26) and (30). Now we prove that the remaining terms in ψ(σ 2 , θ) are OP (1), uniformly in (θ, σ 2 ) ∈ J, at Pn−1 the exception of i=2 A0i /Ai , leading to the following lemma (proved in Section 8.6). Lemma 8.9. We obtain √  n−1  θ0 σ02 X ∆i ∆i+1 n 2 ψ(θ, σ ) = 2 2 qi W i,0 − 2 W i,0 W i+1,0 − + δn . θ σ i=3 ∆i + ∆i+1 θ 2 Since θ̂2 σ̂ 2 ψ(θ̂, σ̂ 2 ) = 0 with probability going to 1, and since we can show that n + O(1), we have 2 n(θ̂σ̂ − θ0 σ02 ) = θ0 σ02 n−1  X 2 qi (W i,0 i=3 √  ∆i ∆i+1 − 1) − 2 W i,0 W i+1,0 + OP (1). ∆i + ∆i+1 We want to establish a Central Limit Theorem for √ 2 Pn−1 √ i=3 qi = (60) n(θ̂σ̂ 2 − θ0 σ02 ). In that view, we define ∆i ∆i+1 Xi := qi (W i,0 − 1) − 2 ∆i +∆i+1 W i,0 W i+1,0 and we apply Theorem 2.1 in [26] for weakly dependent variables (since Xi is not necessarily independent with Xi−1 and Xi+1 but is independent with Xk for |i − k| > 2). Note that we can show easily that τn2 = 1 n Var( Pn−1 i=3 Xi ), and assume √ (θ̂σ̂ 2 − θ0 σ02 ) D n 6 → N (0, 1). θ0 σ02 τn n→∞ By Proposition 4.3, we can extract a subsequence n so that τ2n → τ 2 with τ 2 ∈ [2, 4] n→∞ and so that √ (θ̂σ̂ 2 − θ0 σ02 ) D n 6 → N (0, 1). θ0 σ02 τεn n→∞ 26 √  The triangular array Xi / εn i=3,...,εn −1 satisfies the conditions of [26, Theorem 2.1], thus we obtain n −1 1 X D Xi → N (0, τ 2 ). √ n→∞ n i=3 Now, from (60),   εn −1 εn −1 εn −1 √ (θ̂σ̂ 2 − θ0 σ02 ) 1 X 1 X 1 1 1 X Xi Xi = + o (1) = + − n Xi + oP (1). √ √ √ P θ0 σ02 τεn n i=3 τεn n i=3 τ τn τ n i=3 Since √1 n Pεn −1 i=3 Xi = OP (1) and  1 τn − 1 τ  = o(1), we get by Slutsky’s lemma √ (θ̂σ̂ 2 − θ0 σ02 ) D → N (0, 1), n n→∞ θ0 σ02 τεn which is contradictory and ends the proof of (9). Now (10) is under consideration only when b = B = σ12 and so when aB < θ0 σ02 ; Ab > θ0 σ02 . Thus (10) is a special case of (9). Now, when aB > θ0 σ02 ; Ab < θ0 σ02 , we have almost surely for n large enough (∂/∂σ 2 )Sn (θ̂, σ̂ 2 ) = 0, so that the estimator σ̂22 can be expressed explicitly, by differentiating the terms in (42), (43) and (44) w.r.t. σ 2 . Hence, (9) can be proved in the case aB > θ0 σ02 ; Ab < θ0 σ02 by using identical techniques as in the case aB < θ0 σ02 ; Ab > θ0 σ02 . We omit the details to save space. Finally, (11) is under consideration only when a = A = θ2 and so when aB > θ0 σ02 ; Ab < θ0 σ02 . Thus (11) is a special case of (9). 8.5 Proof of Propositions 4.3 and 4.5 Proof of Proposition 4.3. We have τn2  n−1  2X 2 ∆i ∆i+1 = q +2 . n i=3 i (∆i + ∆i+1 )2 ∆i−1 ∆i+1 , note that = 1 − ai−1 and qi = ∆i + ∆i+1 ∆i + ∆i−1 ai + 1 − ai−1 . First, we have after some trivial computations, (i) Upper bound for τn2 . Let ai = n−1 τn2 2X = [(ai + 1 − ai−1 )2 + 2ai (1 − ai )] n i=3 n−1 2X = (1 + 2ai − 2ai ai−1 ) + o(1) n i=3 62 + 4m + o(1), 27 (61) n−1 1 X where m := ai . n − 3 i=3 Also, since for k = 2, ..., n − 1, 0 6 ak 6 1, we have 1 + 2(1 − ai−1 )ai 6 3 − 2ai−1 . Thus, from (61), n−1 τn2 6 2X (3 − 2ai−1 ) + o(1) = 6 − 4m + o(1). n i=3 Finally, τn2 6 min (2 + 4m, 6 − 4m) + o(1). Since sup min (2 + 4m, 6 − 4m) = 4, τn2 6 m∈[0,1] 4 + o(1). n−1 1X ∆i ∆i+1 Note that qi = 1 + o(1). Since > 0, we get n i=3 (∆i + ∆i+1 )2 τn2 . (ii) Lower bound for n−1 2X 2 q >2 τn2 > n i=3 i n−1 1X qi n i=3 !2 + o(1) = 2 + o(1). Proof of Proposition 4.5. (i) After some computation, we have τn2 =4γn2 − 4γn + 4 + o(1). Since γn = 1/n, then τn2 → 4. n→∞ (ii) We have 2 τn2 6 n n−1 X i=bnα c+2  i 1 + i+2 i+1 2 2(i + 1) + (i + 2)2 ! + o(1) 6 2 + o(1). As a consequence, this particular design realizes τn2 = 2 + o(1) by (62). 8.6 Proofs of the lemmas of Section 8.4 Proof of Lemma 8.8. (i) From (37) and (38), n−1 Σ01 = n−1 X αi 1 X αi 2 2 qi W i,0 + δi,n (∆i−1 + ∆i + ∆i+1 )W i,0 θ i=3 αi,0 αi,0 i=3 where qi has been defined in (26). By (31), we have αi θ0 σ 2 = 2 02 + δi,n ∆i . αi,0 σ θ 28 (62) 2 Moreover, since E[W i,0 ] = 1, one clearly has n−1 X αi 2 δi,n (∆i−1 + ∆i + ∆i+1 )W i,0 = OP (1) αi,0 i=3 that leads to the desired result. P 0 (ii) Now we study the first sum of Σ04 that rewrites n−1 i=2 Ci (Mi,1 + Mi,2 + Mi,3 ) using (52) and where Ci0 has been defined in (30) and  W i,0 W i+1,0   Mi,1 := α1/2 α1/2 i,0 i+1,0 Mi,2 := (e−θ0 ∆i+1 − e−θ∆i+1 )Wi,0 yi    Mi,3 := (e−θ0 ∆i − e−θ∆i )Wi+1 yi−1 . • First, we consider n−1 X Ci0 Mi,1 . By (39) and (31) we can show i=2 Ci0 1/2 1/2 αi,0 αi+1,0 √ θ0 σ02 ∆i ∆i+1 = 2 2 + δi,n (∆i + ∆i+1 ). θ σ ∆i + ∆i+1 Furthermore we have " E n−1 X # δi,n (∆i + ∆i+1 )W i,0 W i+1,0 6K i=2 =K n−1 X i=2 n−1 X q 2 2 (∆i + ∆i+1 ) E[W i,0 ]E[W i+1,0 ] (∆i + ∆i+1 ) 6 K. i=2 Thus n−1 X Ci0 i=2 αi,0 αi+1,0 1/2 Hence 1/2 n−1 X W i,0 W i+1,0 Ci0 Mi,1 i=2 n−1 √ θ0 σ02 X ∆i ∆i+1 = 2 2 W i,0 W i+1,0 + δn . θ σ i=2 ∆i + ∆i+1 n−1 √ θ0 σ02 X ∆i ∆i+1 = 2 2 W i,0 W i+1,0 + δn . θ σ i=2 ∆i + ∆i+1 • Second, one clearly has n−1 X Ci0 Mi,2 i=2 Hence sup (θ,σ 2 )∈J Pn−1 i=2 n−1 θ − θ0 X ∆i+1 = 2 2 (1 + δi,n (∆i + ∆i+1 ))Wi,0 yi . 2θ σ i=2 ∆i + ∆i+1 Ci0 Mi,2 = OP (1) by Lemma 8.4 (i). 29 • Third, we get n−1 X Ci0 Mi,3 i=2 and sup (θ,σ 2 )∈J Pn−1 i=2 n−1 θ − θ0 X ∆i = 2 2 (1 + δi,n (∆i + ∆i+1 )) Wi+1 yi−1 2θ σ i=2 ∆i + ∆i+1 Ci0 Mi,3 = OP (1) by Lemma 8.4 (iv). (iii) We now consider the second and third sums in Σ04 . Using (31) and (34), we can show Ci ∆i e−θ∆i = 1 ∆i (1 + δi,n (∆i + ∆i+1 )) 2θσ 2 ∆i + ∆i+1 and Ci ∆i+1 e−θ∆i+1 = ∆i+1 1 (1 + δi,n (∆i + ∆i+1 )). 2 2θσ ∆i + ∆i+1 Hence by Lemma 8.4 (iv) and (ii), sup (θ,σ 2 )∈J n−1 X Ci (∆i e−θ∆i Wi+1 yi−1 + ∆i+1 e−θ∆i+1 Wi yi ) = i=2 OP (1). Proof of Lemma 8.9. • We have sup a6θ6A 2∆2 e−2θ∆2 2∆n e−2θ∆n = O(1). + 1 − e−2θ∆2 1 − e−2θ∆n • For n large enough, sup (θ,σ 2 )∈J 2∆2 e−θ∆2 y2 [y1 − e−θ∆2 y2 ] 6 K sup |y2 ||y1 − e−θ∆2 y2 | 6 K sup Y (t)2 = OP (1). 2 −2θ∆ 2 σ (1 − e ) a6θ6A t∈[0,1] 2 + (e−θ0 ∆i − e−θ∆i )yi−1 Wi + Wi,0 (e−θ0 ∆i − e−θ∆i )yi−1 we can eas• Using Wi2 = Wi,0 −2θ∆2 −θ∆2 y )2 2∆n e−θ∆n yn−1 Wn 1 −e 2 ily show sup 2∆2 e σ2 (1−e(y−2θ∆ = O (1), sup = OP (1) and P 2 2) σ 2 (1 − e−2θ∆n ) (θ,σ 2 )∈J (θ,σ 2 )∈J sup (θ,σ 2 )∈J 2∆n e−2θ∆n Wn2 σ 2 (1−e−2θ∆n )2 = OP (1). • Term Σ02 : First, using (37), (38) and the definition (26) of qi , the deterministic quantity Di is bounded uniformly in (θ, σ 2 ) ∈ J, and so is (e−2θ0 ∆i − e−2θ∆i )2 αi /∆i from (31). By (19), we are led to sup (θ,σ 2 )∈J n−1 X i=3 ∆i αi −θ0 ∆i 2 (e − e−θ∆i )2 yi−1 Di = OP (1). ∆i 30 Similarly, n−1 X sup (θ,σ 2 )∈J 2 = OP (1) and thus 2αi2 Bi ∆i e−θ∆i (e−θ0 ∆i − e−θ∆i )yi−1 i=3 sup |Σ02 | = (θ,σ 2 )∈J OP (1). • Term Σ03 : First, from (37), (38) and (31), we have αi Di (e−θ0 ∆i − e−θ∆i ) − sup n∈N,i=2,...,n−1,(θ,σ 2 )∈J θ − θ0 qi 6 K. 2σ 2 θ2 Hence, proceeding as in the proof of Lemma 8.4, we can show sup (θ,σ 2 )∈J n−1 X αi Di (e−θ0 ∆i − e−θ∆i )Wi yi−1 = OP (1). i=3 Second, we can show sup n∈N,i=3,...,n−1,(θ,σ 2 )∈J αi2 Bi ∆i e−θ∆i 1 − 2 2σ θ  ∆i+1 ∆i−1 + ∆i + ∆i+1 ∆i + ∆i−1  6 K. Hence we can show n−1 X sup (θ,σ 2 )∈J αi2 Bi ∆i e−θ∆i Wi,0 yi−1 = OP (1), i=3 as in the proof of Lemma 8.4. Hence finally, sup Σ03 = OP (1). (θ,σ 2 )∈J • Term T20 : From (27), we have |T20 | 6 2|α20 |W22 + |α2 |∆2 e−θ∆2 |y1 | + W22 |A02 |. We can show sup (|α20 |W22 + W22 |A02 |) = OP (1) (θ,σ 2 )∈J 2 by using W22 = W2,0 + (e−θ0 ∆2 − e−θ∆2 )y1 W2 + W2,0 (e−θ0 ∆2 − e−θ∆2 )y1 . Finally, sup |α2 |∆2 e−θ∆2 = OP (1), which finally shows sup |T20 | = OP (1). (θ,σ 2 )∈J (θ,σ 2 )∈J • Term Tn0 : Using (31), (34) and (35), we get sup |2αn ∆n | 6 K sup |2αn ∆n e−2θ∆n | 6 K. and (θ,σ 2 )∈J (θ,σ 2 )∈J −2θ∆n Moreover, one has | αnAe n−1 | 6 1. Finally, we have sup Wn2 = OP (1) and sup |yn−1 Wn | = (θ,σ 2 )∈J OP (1). Hence, in order to show sup (θ,σ 2 )∈J |Tn0 | = OP (1) it remains to show 31 (θ,σ 2 )∈J sup |αn0 Wn2 | = (θ,σ 2 )∈J sup |(A0n−1 /An−1 )αn Wn2 | = (θ,σ 2 )∈J − e−θ∆n )yn−1 Wn + Wn,0 (e−θ0 ∆n − n−1 X A0i OP (1) and 2 OP (1). This is shown by using Wn2 = Wn,0 + (e−θ0 ∆n e−θ∆n )yn−1 . • Term i=2 Ai : By (36), n−1 X A0 i i=2 Ai = n + δn . θ Finally, n−1 n−1 √ X n ∆i ∆i+1 θ0 σ02 X 2 qi W i,0 − 2 W i,0 W i+1,0 − + δn ψ(σ , θ) = 2 2 θ σ i=3 ∆i + ∆i+1 θ i=3 2 using Lemma 8.8. 8.7 Proof of Theorems 6.1 and 6.2 In this section and the next one, we let ||A|| denote the largest singular value of a matrix A and ||v|| denote the Euclidean norm of a vector ||v||. Finally, for k ∈ {1, ..., p}, we let f (k) = (fk (s1 ), ..., fk (sn ))0 . We first provide a decomposition of S̄n in the following lemma. Lemma 8.10. We have S̄n (θ, σ 2 ) = Sn (θ, σ 2 ) − r1 (θ) + r2 (θ) + 2r3 (θ) − r4 (θ) , σ2 with r1 (θ) = n X    ¯−i − log (R−1 , log (R−1 θ )ii −  θ )ii i=1 n X 2 r2 (θ) = (R−1 θ )ii −i , r3 (θ) = i=1 n X (Rθ−1 )ii −i (yi − Ŷθ,−i (si )), i=1 r4 (θ) = −i = ¯−i = n X ¯−i (yi − Ŷθ,−i (si ) + −i )2 , i=1 [f 0i − r 0θ,−i R−1 θ,−i F −i ](β 0 − β̂ −i ), −1 −1 0 −1 0 ei,n Rθ F (F 0 R−1 θ F ) F Rθ ei,n , where ei,n is the i-th base column vector of Rn . We remark that rk (θ) does not depend on σ 2 for k = 1, ..., 4. 32 We now show that, in Lemma 8.10, the term Sn only, corresponding to the zero-mean case, is preponderant. Lemma 8.11. With the notation of Lemma 8.10, we have for k = 1, ..., 4 sup |rk (θ)| = O(1) a.s. θ∈[a,A] Because of Lemmas 8.10 and 8.11, we have a.s. sup S̄n (θ, σ 2 ) − Sn (θ, σ 2 ) = O(1). (θ,σ 2 )∈J Hence Theorem 6.1 follows from (46). Also, from Lemmas 3.1, 8.10 and 8.11, we have S̄n (θ, σ 2 ) = n log(σ 2 ) + log(1 − e−2θ∆2 ) + log(1 − e−2θ∆n )   n−1 X 1 e−2θ∆i+1 − log + − r1 (θ) −2θ∆i −2θ∆i+1 1 − e 1 − e i=2 ( 1 (y1 − e−θ∆2 y2 )2 (yn − e−θ∆n yn−1 )2 + + 2 σ (1 − e−2θ∆2 ) (1 − e−2θ∆n )    e−θ∆i n−1 −2θ∆ X i+1 −2θ∆i yi−1 + e 1 1−e yi − + + 1 1 − e−2θ∆i 1 − e−2θ∆i+1 −2θ∆ + i=2 1−e i 2 e−θ∆i+1 y 1−e−2θ∆i+1 i+1  −2θ∆i+1 e 1−e−2θ∆i+1 ) + δn (θ) , where δn (θ) does not depend on σ 2 and satisfies supa6θ6A |δn (θ)| = OP (1). Since θ̌σ̌ 2 → θ0 σ02 a.s. from Theorem 6.1, and since aB > θ0 σ02 ; Ab < θ0 σ02 , we have [∂/∂σ 2 ]S¯n (θ̌, σ̌ 2 ) = 0 for n large enough almost surely. Hence we obtain for n large enough almost surely, ( (y1 − e−θ̌∆2 y2 )2 (yn − e−θ̌∆n yn−1 )2 + (1 − e−2θ̌∆2 ) (1 − e−2θ̌∆n ) " # e−θ̌∆i n−1 −2θ̌∆i+1 y + X −2θ̌∆i i−1 1 e yi − 1−e + + 1 1 − e−2θ̌∆i 1 − e−2θ̌∆i+1 + i=2 1 n − 4 0 = 2 σ̌ σ̌ 1−e−2θ̌∆i 2 e−θ̌∆i+1 y i+1 1−e−2θ̌∆i+1  e−2θ̌∆i+1 1−e−2θ̌∆i+1 ) + δn (θ̌) . As noted at the end of the proof of Theorem 4.1, using identical techniques as for proving Theorem 4.1, one can finish the proof of Theorem 6.2. 8.8 Proofs of the lemmas in Section 8.7 Proof of Lemma 8.10. We have, with y −i = (y1 , ..., yi−1 , yi+1 , ..., yn )0 , Z(si ) − Ẑθ,−i (si ) = yi + f 0i β 0 − f 0i β̂ −i − r 0θ,−i R−1 θ,−i (y −i + F −i β 0 − F −i β̂ −i ) 0 −1 0 = yi − r 0θ,−i R−1 θ,−i y −i + (f i − r θ,−i Rθ,−i F −i )(β 0 − β̂ −i ) = yi − Ŷθ,−i (si ) + −i . 33 Also −1 −1 0 −1 −1 0 0 −1 0 −1 (Q− ¯−i . θ )ii = ei,n Rθ ei,n − ei,n Rθ F (F Rθ F ) F Rθ ei,n = (Rθ )ii −  Then, from (15), " # 2 (z − Ẑ (s )) i θ,−i i 2 S̄n (θ, σ 2 ) = log(σ̌θ,σ 2 ,−i (si )) + 2 σ̌θ,σ 2 ,−i (si ) i=1    n n X 1 1 X − 2 = n log(σ ) + log + 2 (Qθ )ii [yi − Ŷθ,−i (si ) + −i ]2 − σ i=1 (Qθ )ii i=1 n X = Sn (θ, σ 2 ) − n n X    1 X −1 2 −1 (Rθ )ii −i log (R−1 ) −  ¯ − log((R ) ) + −i θ ii θ ii 2 σ i=1 i=1 n n 2 X −1 1 X + 2 (R )ii −i (yi − Ŷθ,−i (si )) − 2 ¯−i (yi − Ŷθ,−i (si ) + −i )2 σ i=1 θ σ i=1 = Sn (θ, σ 2 ) − r1 (θ) + r2 (θ) + 2r3 (θ) − r4 (θ) . σ2 Before proving Lemma 8.11, we state and prove some intermediary results. Lemma 8.12. We have ||F 0 R−1 θ y|| 6 K sup |Y (t)|. t∈[0,1] Proof of Lemma 8.12. From (1) we have, with k = 1, ..., p and with f = (f1 , ..., fn )0 = f (k) , 0 −1 [F 0 R−1 θ y]k = f Rθ y n n X X 1 1 e−θ∆i e−θ∆i = f y + f y − f y − fi−1 yi 1 1 n n i i−1 1 − e−2θ∆2 1 − e−2θ∆n 1 − e−2θ∆i 1 − e−2θ∆i i=2 i=2  n−1  X 1 e−2θ∆i+1 + + fi y i 1 − e−2θ∆i 1 − e−2θ∆i+1 i=2 = f1 y1 − f2 y1 e−θ∆2 − f1 y2 e−θ∆2 + f2 y2 1 − e−2θ∆2 n X fi yi − fi yi−1 e−θ∆i − fi−1 yi e−θ∆i + e−2θ∆i fi−1 yi−1 + 1 − e−2θ∆i i=3 = a1 + n X mi , i=3 34 say. We have, using (31), and that fk is continuously differentiable,    1 a1 = + δ1,n f1 y1 (1 − e−θ∆2 ) + (f1 − f2 )y1 e−θ∆2 + y2 f2 (1 − e−θ∆2 ) + e−θ∆2 y2 (f2 − f1 ) 2θ∆2 1 f1 − f2 (f1 y1 + y2 f2 ) + (y1 − y2 ) + δ1,n ∆2 sup |Y (t)| = 2 2θ∆2 t∈[0,1] and   −2θ∆i  fi − e−θ∆i fi−1 e fi−1 − e−θ∆i fi = yi + yi−1 1 − e−2θ∆i 1 − e−2θ∆i     fi − fi−1 + fi−1 (1 − e−θ∆i ) fi−1 (e−2θ∆i − e−θ∆i ) + (fi−1 − fi )e−θ∆i = yi + yi−1 1 − e−2θ∆i 1 − e−2θ∆i fi − fi−1 1 + (yi − yi−1 )fi−1 + δi,n ∆i sup |Y (t)|. = (yi − yi−1 ) 2θ∆i 2 t∈[0,1]  mi Hence, using that fk is continuously differentiable, f 0 R−1 θ y = f1 − f2 1 (f1 y1 + y2 f2 ) + (y1 − y2 ) + δ1,n ∆2 sup |Y (t)| 2 2θ∆2 t∈[0,1] ! fi − fi−1 1 + (yi − yi−1 ) + (yi − yi−1 )fi−1 + δi,n ∆i sup |Y (t)| 2θ∆i 2 t∈[0,1] i=3  n−1  n−1 X 1X fi − fi−1 (yi − yi−1 ) + = δ1,n sup |Y (t)| + (yi − yi−1 ) fi−1 .(63) 2θ∆i 2 i=3 t∈[0,1] i=3 n X The absolute value of first sum in (63) is equal to, after a summation by part, and using that fk is twice continuously differentiable,   n−1 X fi+1 − fi fi − fi−1 − yi − + δn,n sup |Y (t)| 2θ∆i+1 2θ∆i t∈[0,1] i=3 n−1 1 X 6 yi (f 0 (si ) + δi,n ∆i+1 − f 0 (si ) + δi,n ∆i ) + δn,n sup |Y (t)| 2θ i=3 t∈[0,1] = δn,n sup |Y (t)|. t∈[0,1] The second sum in (63) is equal to, using that fk is continuously differentiable, n−1 X (yi fi−1 − yi−1 fi−2 + yi−1 (fi−2 − fi−1 )) = δn,n sup |Y (t)|. t∈[0,1] i=3 Hence |f 0 R−1 θ y| 6 K sup |Y (t)|. t∈[0,1] 35 Lemma 8.13. We have, for k = 1, ..., p, ( K(∆i + ∆i+1 ) when i 6∈ {1, n} (k) −1 |e0i,n Rθ f | 6 . K when i ∈ {1, n} Proof of Lemma 8.13. Let f = (f1 , ..., fn )0 = f (k) . i) When i ∈ / {1, n}, from (1), e0i,n R−1 θ f = = = = e−θ∆i 1 e−2θ∆i+1 e−θ∆i+1 fi−1 + fi + fi − fi+1 − 1 − e−2θ∆i 1 − e−2θ∆i 1 − e−2θ∆i+1 1 − e−2θ∆i+1 fi (1 − e−θ∆i ) + e−θ∆i (fi − fi−1 ) fi (e−2θ∆i+1 − e−θ∆i+1 ) + (fi − fi+1 )e−θ∆i+1 + 1 − e−2θ∆i 1 − e−2θ∆i+1 0 0 fi f (si ) fi f (si ) + + δi,n ∆i − − + δi,n ∆i+1 2 2θ 2 2θ δi,n (∆i + ∆i+1 ), where we have used (31) and that f is twice continuously differentiable. ii) Similarly, e01,n R−1 θ f = f (0) f 0 (0) − + δ1,n ∆2 . 2 2θ and e0n,n R−1 θ f f (1) f 0 (1) + + δn,n ∆n . = 2 2θ Lemma 8.14. We have F 0 R−1 θ F = I f + W (θ) with supθ∈[a,A] ||W (θ)|| →n→∞ 0 and with I f the p × p matrix defined by 1 [I f ]kl = fk (0)fl (0)+ 2θ Z 1 θ fk0 (t)fl0 (t)dt+ 0 2 Z 1 0 1 fk (t)fl (t)dt+ 2 Z 1 (fk0 (t)fl (t)+fk (t)fl0 (t))dt. 0 Furthermore, I f is invertible. Proof of Lemma 8.14. Let k, l ∈ {1, ..., p} and let g = fk , h = fl , g = (g1 , ..., gn )0 = f (k) 36 and h = (h1 , ..., hn )0 = f (l) . From (1), we have, 0 −1 [F 0 R−1 θ F ]kl = g Rθ h n n X X g1 h1 gn hn e−θ∆i e−θ∆i = + − g h − gi−1 hi i i−1 1 − e−2θ∆2 1 − e−2θ∆n 1 − e−2θ∆i 1 − e−2θ∆i i=2 i=2  n−1  X e−2θ∆i+1 1 + + gi hi 1 − e−2θ∆i 1 − e−2θ∆i+1 i=2  ! n gi − e−θ∆i gi−1 hi − e−θ∆i hi−1 g1 h1 − e−θ∆2 (g2 h1 + g1 h2 ) + g2 h2 X + = 1 − e−2θ∆2 1 − e−2θ∆i i=3 = (g1 − g2 )(h1 − h2 ) + θ∆2 (g2 h1 + g1 h2 ) + δ1,n ∆22 2θ∆2 + δ1,n ∆22 n  X 1 + (gi − gi−1 )(hi − hi−1 ) + gi−1 (1 − e−θ∆i )hi−1 (1 − e−θ∆i ) (64) −2θ∆i 1 − e i=3  +gi−1 (1 − e−θ∆i )(hi − hi−1 ) + (gi − gi−1 )hi−1 (1 − e−θ∆i ) , where we have used (31). Since fk and fl are continuously differentiable we have (g1 − g2 )(h1 − h2 ) + θ∆2 (g2 h1 + g1 h2 ) = g(0)h(0) + δ1,n ∆2 . 2θ∆2 + δ1,n ∆22 Also, the element i of the sum in (64) is equal to 1 1 1 (gi − gi−1 ) θ (hi − hi−1 ) + gi−1 hi−1 ∆i + gi−1 (hi − hi−1 ) + hi−1 (gi − gi−1 ) + δi,n ∆2i 2θ ∆i 2 2 2 1 0 θ 1 1 = g (si )h0 (si )∆i + g(si−1 )h(si−1 )∆i + g(si )h0 (si )∆i + h(si )g 0 (si )∆i + δi,n ∆2i , 2θ 2 2 2 since f is twice continuously differentiable. Hence we have g 0 R−1 θ h = g(0)h(0) + δ1,n ∆2    n  X 1 0 θ 1 0 1 0 0 2 + ∆i g (si )h (si ) + g(si−1 )h(si−1 ) + g (si )h(si ) + g(si )h (si ) + δi,n ∆i 2θ 2 2 2 i=3 = [I f ]kl + w(θ), where supθ∈[a,A] |w(θ)| →n→∞ 0, by dominated convergence. Finally, we have, for λ1 , ..., λp ∈ R, !2 !2 Z 1 p p p p X X X X √ 1 1 √ λk λl [If ]kl = λk fk (0) + λk fk0 (t) + θ λk fk (t) dt. 2 0 θ k=1 k,l=1 k=1 k=1 Pp Pp Pp 0 Hence, if λ λ [I ] = 0, then λ f (0) = 0 and for all t ∈ [0, 1], k l f kl k k k,l=1 k=1 k=1 λk fk (t) = Pp −θ k=1 λk fk (t) so that, by linear independence, λ1 = ... = λp = 0. Hence I f is invertible. 37 Lemma 8.15. We have max sup |yi − Ŷθ,−i (si )| 6 K sup |Y (t)|. i=1,...,n a6θ6A t∈[0,1] Proof of Lemma 8.15. For i 6∈ {1, ..., n}, using (41), 1 (αi Wi − αi+1 e−θ∆i+1 Wi+1 ) Ai = δi,n Wi + δi,n Wi+1 = δi,n sup |Y (t)|. yi − Ŷθ,−i (si ) = t∈[0,1] Also y1 − Ŷθ,−1 (s1 ) = y1 − e−θ∆2 y2 = δ1,n sup |Y (t)| t∈[0,1] and similarly yn − Ŷθ,−n (sn ) = δn,n supt∈[0,1] |Y (t)|. We now prove Lemma 8.11. Proof of Lemma 8.11. • Term r1 (θ):  n n X  X   −1 −1 log 1 − r1 (θ) = log (Rθ )ii − ¯−i − log((Rθ )ii ) = = = i=1 n X i=1 n X i=1 log 1 −  i=1 ! −1 0 −1 0 −1 0 −1 (ei,n Rθ F )(F Rθ F ) (F Rθ ei,n ) (R−1 θ )ii δi,n log 1 − (R−1 θ )ii ¯−i (R−1 θ )ii   , from Lemmas 8.13 and 8.14. 1 1 Now, from (1), for i = 2, . . . , n, we have supθ (R−1 = δi,n ∆i and supθ (R−1 = δ1,n ∆2 . )ii )11 θ θ Pn Hence r1 (θ) = log (1 − δ1,n ∆2 ) + i=2 log (1 − δi,n ∆i ) so that supθ∈[a,A] |r1 (θ)| is bounded as n → ∞. • Term r2 (θ): (k) For k ∈ N, let f −i be obtained by removing component i of f (k) . We observe that fk (si ) − (k) r 0θ,−i R−1 θ,−i f −i can be interpreted as a leave-one-out prediction error for a n-dimensional observation vector equal to f (k) . Hence from (3), n X 2 r2 (θ) = (R−1 θ )ii −i i=1 p = " n X X k,l=1 i=1 1  −1  (β 0 − β̂ −i )k (β 0 − β̂ −i )l (Rθ )ii 38  (k) e0i,n R−1 θ f #   −1 (l) 0 ei,n Rθ f . For i ∈ {1, ..., n}, one can show that Lemmas 8.12 and 8.14 remain true with F , Rθ , y replaced by F −i , Rθ,−i , y −i . In addition, these (modified) lemmas can be shown to be uniform over i = 1, ..., n. As a consequence, we have, for i = 1, . . . , n, −1 −1 0 ||β̂ −i − β 0 || = ||(F 0−i R−1 θ,−i F −i ) F −i Rθ,−i y −i || 6 K sup |Y (t)|. (65) t∈[0,1] Also, since from (1) maxi=1,...,n n X 1 (R−1 θ )ii i=1 1 (R−1 θ )ii 6 K, we have (k) (l) e0i,n R−1 6K+ e0i,n R−1 θ f θ f n−1 X δi,n (∆i + ∆i+1 )2 , i=2 from Lemma 8.13. Hence, we have r2 (θ) 6 K sup Y (t)2 K+ t∈[0,1] n−1 X ! (∆i + ∆i+1 )2 . i=2 Hence finally, sup |r2 (θ)| is a.s. bounded as n → ∞. θ∈[a,A] • Term r3 (θ): r3 (θ) = n X (R−1 θ )ii −i (yi − Ŷθ,−i (si )) i=1 p n XX (k) −1 0 (R−1 = θ )ii (β 0 − β̂ −i )k [fk (si ) − r θ,−i Rθ,−i f −i ](yi − Ŷθ,−i (si )). k=1 i=1 (k) We make the same observation on fk (si ) − r 0θ,−i R−1 θ,−i f −i as for r2 (θ). Hence we have r3 (θ) = p n X X (k) (β 0 − β̂ −i )k (e0i,n R−1 )(yi − Ŷθ,−i (si )). θ f k=1 i=1 Hence, from (65) and Lemmas 8.13 and 8.15, we have |r3 (θ)| 6 p n−1 X X k=1 ! δi,n (∆i + ∆i+1 ) sup Y (t)2 ! + δ1,n sup Y (t)2 . t∈[0,1] i=2 t∈[0,1] Hence, r3 (θ) is almost surely bounded as n → ∞. • Term r4 (θ): From Lemmas 8.13 and 8.14, we have for i ∈ {2, ..., n − 1}, ¯−i 6 K(∆i + ∆i+1 )2 and for i ∈ {1, n}, ¯−i 6 K. Hence |r4 (θ)| 6 K(y1 − Ŷθ,−1 (s1 ) + −1 )2 + K(yn − Ŷθ,−n (sn ) + −n )2 n−1 X + (∆i + ∆i+1 )2 (yi − Ŷθ,−i (si ) + −i )2 i=2 n−1 X 6 K sup Y (t) + K (∆i + ∆i+1 )2 sup Y (t)2 , 2 t∈[0,1] i=2 39 t∈[0,1] using also Lemma 8.15, and remarking that the previous treatment of r2 (θ) implies that 2−i 6 K supt∈[0,1] Y (t)2 . Hence r4 (θ) is a.s. bounded as n → ∞. Acknowledgements We are grateful to Jean-Marc Azais, for constructive discussions on the topic of this manuscript. This work was partly funded by the ANR project PEPITO. We thank the associate editor and two referees, whose suggestions lead to a broader scope and an improved presentation of the manuscript. References [1] P. Abrahamsen. A review of Gaussian random fields and correlation functions. Technical report, Norwegian computing center, 1997. [2] M. Abt and W. J. Welch. Fisher information and maximum-likelihood estimation of covariance parameters in Gaussian stochastic processes. The Canadian Journal of Statistics, 26:127–137, 1998. [3] E. Anderes. On the consistent separation of scale and variance for Gaussian random fields. The Annals of Statistics, 38:870–893, 2010. [4] A. B. Antognini and M. Zagoraiou. Exact optimal designs for computer experiments via Kriging metamodelling. Journal of Statistical Planning and Inference, 140:2607– 2617, 2010. [5] F. Bachoc. Cross validation and maximum likelihood estimations of hyper-parameters of Gaussian processes with model mispecification. Computational Statistics and Data Analysis, 66:55–69, 2013. [6] F. Bachoc. Asymptotic analysis of the role of spatial sampling for covariance parameter estimation of Gaussian processes. Journal of Multivariate Analysis, 125:1–35, 2014. [7] F. Bachoc. Asymptotic analysis of covariance parameter estimation for Gaussian processes in the misspecified case. To appear in Bernoulli, 2017. [8] F. Bachoc, K. Ammar, and J.M. Martinez. Improvement of code behavior in a design of experiments by metamodeling. Nuclear science and engineering, 183(3):387–406, 1016. [9] F. Bachoc, G. Bois, J. Garnier, and J.M Martinez. Calibration and improved prediction of computer models by universal Kriging. Nuclear Science and Engineering, 176(1):81–97, 2014. 40 [10] C-H. Chang, H-C. Huang, and C-K. Ing. Mixed domain asymptotics for a stochastic process model with time trend and measurement error. Bernoulli, 23(1):159–190, 2017. [11] H-S. Chen, D. G. Simpson, and Z. Ying. Infill asymptotics for a stochastic process model with measurement error. Statistica Sinica, 10:141–156, 2000. [12] N. Cressie and S.N. Lahiri. The asymptotic distribution of REML estimators. Journal of Multivariate Analysis, 45:217–233, 1993. [13] N. Cressie and S.N. Lahiri. Asymptotics for REML estimation of spatial covariance parameters. Journal of Statistical Planning and Inference, 50:327–341, 1996. [14] J. Du, H. Zhang, and V. S. Mandrekar. Fixed-domain asymptotic properties of tapered maximum likelihood estimators. The Annals of Statistics, 37:3330–3361, 2009. [15] O. Dubrule. Cross validation of Kriging in a unique neighborhood. Mathematical Geology, 15:687–699, 1983. [16] R. Furrer, F. Bachoc, and J. Du. Asymptotic properties of multivariate tapering for estimation and prediction. Journal of Multivariate Analysis, 149:177–191, 2016. [17] T-C. Hu and R.L. Taylor. On the strong law for arrays and for the bootstrap mean and variance. International Journal of Mathematics and Mathematical Sciences, 20(2):375–382, 1997. [18] I.A. Ibragimov and Y.A. Rozanov. Gaussian Random Processes. Springer-Verlag, New York, 1978. [19] J. Istas and G. Lang. Quadratic variations and estimation of the local Hölder index of a Gaussian process. Annales de l’Institut Henri Poincaré, 33:407–436, 1997. [20] D.R. Jones, M. Schonlau, and W.J. Welch. Efficient global optimization of expensive black box functions. Journal of Global Optimization, 13:455–492, 1998. [21] C. G. Kaufman and B. A. Shaby. The role of the range parameter for estimation and prediction in geostatistics. Biometrika, 100:473–484, 2013. [22] W-L. Loh. Fixed-domain asymptotics for a subclass of Matérn-type Gaussian random fields. The Annals of Statistics, 33:2344–2394, 2005. [23] W-L. Loh and T-K. Lam. Estimating structured correlation matrices in smooth Gaussian random field models. The Annals of Statistics, 28:880–904, 2000. [24] K. V. Mardia and R. J. Marshall. Maximum likelihood estimation of models for residual covariance in spatial regression. Biometrika, 71:135–146, 1984. 41 [25] G. Matheron. La Théorie des Variables Régionalisées et ses Applications. Fasicule 5 in Les Cahiers du Centre de Morphologie Mathématique de Fontainebleau. Ecole Nationale Supérieure des Mines de Paris, 1970. [26] M. H. Neumann. A central limit theorem for triangular arrays of weakly dependent random variables, with applications in statistics. ESAIM: Probability and Statistics, 17:120–134, 2013. [27] R. Paulo, G. Garcia-Donato, and J. Palomo. Calibration of computer models with multivariate output. Computational Statistics and Data Analysis, 56:3959–3974, 2012. [28] C.E. Rasmussen and C.K.I. Williams. Gaussian Processes for Machine Learning. The MIT Press, Cambridge, 2006. [29] J. Sacks, W.J. Welch, T.J. Mitchell, and H.P. Wynn. Design and analysis of computer experiments. Statistical Science, 4:409–423, 1989. [30] T.J. Santner, B.J. Williams, and W.I. Notz. The Design and Analysis of Computer Experiments. Springer, New York, 2003. [31] B. A. Shaby and D. Ruppert. Tapered covariance: Bayesian estimation and asymptotics. Journal of Computational and Graphical Statistics, 21(2):433–452, 2012. [32] M.L. Stein. Asymptotically efficient prediction of a random field with a misspecified covariance function. The Annals of Statistics, 16:55–63, 1988. [33] M.L. Stein. Bounds on the efficiency of linear predictions using an incorrect covariance function. The Annals of Statistics, 18:1116–1138, 1990. [34] M.L. Stein. Uniform asymptotic optimality of linear predictions of a random field using an incorrect second-order structure. The Annals of Statistics, 18:850–872, 1990. [35] M.L. Stein. Interpolation of Spatial Data: Some Theory for Kriging. Springer, New York, 1999. [36] S. Sundararajan and S.S. Keerthi. Predictive approaches for choosing hyperparameters in Gaussian processes. Neural Computation, 13:1103–1118, 2001. [37] A. W. van der Vaart. Maximum likelihood estimation under a spatial sampling scheme. The Annals of Statistics, 24(5):2049–2057, 1996. [38] A. W. van der Vaart. Asymptotic statistics, volume 3 of Cambridge Series in Statistical and Probabilistic Mathematics. Cambridge University Press, Cambridge, 1998. [39] D. Wang and W-L. Loh. On fixed-domain asymptotics and covariance tapering in Gaussian random field models. Electronic Journal of Statistics, 5:238–269, 2011. 42 [40] Z. Ying. Asymptotic properties of a maximum likelihood estimator with data from a Gaussian process. Journal of Multivariate Analysis, 36:280–296, 1991. [41] Z. Ying. Maximum likelihood estimation of parameters under a spatial sampling scheme. The Annals of Statistics, 21:1567–1590, 1993. [42] H. Zhang. Inconsistent estimation and asymptotically equivalent interpolations in model-based geostatistics. Journal of the American Statistical Association, 99:250– 261, 2004. [43] H. Zhang and Y. Wang. Kriging and cross validation for massive spatial data. Environmetrics, 21:290–304, 2010. [44] H. Zhang and D. L. Zimmerman. Towards reconciling two asymptotic frameworks in spatial statistics. Biometrika, 92:921–936, 2005. 43
10math.ST
arXiv:1704.00026v3 [cs.NE] 13 Jun 2017 Upper Bounds on the Runtime of the Univariate Marginal Distribution Algorithm on OneMax∗ Carsten Witt DTU Compute Technical University of Denmark 2800 Kgs. Lyngby Denmark June 15, 2017 Abstract A runtime analysis of the Univariate Marginal Distribution Algorithm (UMDA) is presented on the OneMax function for wide ranges of the parameters µ and λ. If µ ≥ c log n for some constant c > 0 and λ = (1 + Θ(1))µ, a general bound O(µn) on the expected runtime is obtained. This bound crucially assumes that all marginal √ probabilities of the algorithm are confined to the interval [1/n, 1 − 1/n]. If µ ≥ c′ n log n for a constant c′ > 0 and λ = (1 + Θ(1))µ, the behavior of the √ algorithm changes and the bound on the expected runtime becomes O(µ n), which typically even holds if the borders on the marginal probabilities are √ omitted. The results supplement the recently derived lower bound Ω(µ n + n log n) by Krejca and Witt (FOGA √ 2017) and turn out as tight for the two very different choices µ = c log n and µ = c′ n log n. They also improve the previously best known upper bound O(n log n log log n) by Dang and Lehre (GECCO 2015). 1 Introduction Estimation-of-distribution algorithms (EDAs, [15]) are randomized search heuristics that have emerged as a popular alternative to classical evolutionary algorithms like Genetic Algorithms. In contrast to the classical approaches, EDAs do not store explicit populations of search points but develop a probabilistic model of the fitness function to be optimized. Roughly, this model is built by sampling a number of search points from the current model and updating it based on the structure of the best samples. Although many different variants of EDAs (cf. [12]) and many different domains are possible, theoretical analysis of EDAs in discrete search spaces often considers runtime ∗ An extended abstract of this report will appear in the proceedings of the 2017 Genetic and Evolutionary Computation Conference (GECCO 2017). 1 analysis over {0, 1}n . The simplest of these EDAs have no mechanism to learn correlations between bits. Instead, they store a Poisson binomial distribution, i. e., a probability vector p of n independent probabilities, each component pi denoting the probability that a sampled bit string will have a 1 at position i. The first theoretical analysis in this setting was conducted by Droste [6], who analyzed the compact Genetic Algorithm (cGA), an EDA that only samples two solutions in each iteration, on linear functions. Papers considering other EDAs, like, e. g., analysis of an iteration-best Ant Colony Optimization (ACO) algorithm by Neumann et al. [21] followed. Recently, the interest in the theoretical runtime analysis of EDAs has increased [5, 10, 9, 26, 14]. Most of these works derive bounds for a specific EDA on the popular OneMax function, which counts the number of 1s in a bit string and is considered to be one of the easiest functions with a unique optimum [25, 28]. In this paper, we follow up on recent work on the Univariate Marginal Distribution Algorithm (UMDA [20]) on OneMax. The UMDA is an EDA that samples λ solutions in each iteration, selects µ < λ best solutions, and then sets the probability pi (hereinafter called frequency) to the relative occurrence of 1s among these µ individuals. The algorithm has already been analyzed some years ago for several artificially designed example functions [2, 1, 3, 4]. However, none these papers considered the most fundamental benchmark function in theory, the OneMax function. In fact, the runtime analysis of the UMDA on the simple OneMax function has turned out to be rather challenging; the first such result, showing the upper bound O(n log n log log n) on its expected runtime for certain settings of µ and λ, was not published until 2015 [5]. Very recently, this result was supplemented by a general √ lower bound of the kind Ω(µ n + n log n) [14], proving that the UMDA cannot be more efficient than simple evolutionary algorithms on this function, at least if λ = (1+Θ(1))µ. As upper and lower bounds were apart by a factor of Θ(log log n), it was an open problem to determine the asymptotically best possible runtime of the UMDA on OneMax. In this paper, we close this gap and show that the UMDA can optimize OneMax in expected time O(n log n) for two very different, carefully chosen values of µ, always assuming that λ = (1 + Θ(1))µ. In fact, we obtain two general upper bounds depending √ on µ. If µ ≥ c n log n, where c is a sufficiently large constant, the first upper bound √ is O(µ n). This bound exploits that all pi move more or less steadily to the largest possible value and that there are no frequencies that ever drop below 1/4. Around µ = √ Θ( n log n), there is a phase transition in the behavior of the algorithm. With smaller µ, the stochastic movement of the frequencies is more chaotic and many frequencies will hit the lowest possible value during the optimization. Still, the expected optimization time is O(µn) for µ ≥ c′ log n and a sufficiently large constant c′ > 0 if all frequencies are confined to the interval [1/n, 1 − 1/n], as typically done in EDAs. If frequencies are allowed to drop to 0, the algorithm will typically have infinite optimization time below √ the phase transition bound µ ∼ n log n, whereas it typically will be efficient above. Interestingly, Dang and Lehre [5] used µ = Θ(ln n), i. e., a value below the phase transition to obtain their O(n log n log log n) bound. This region turns out to be harder 2 to analyze than the region above the phase transition, at least with our techniques. However, our proof also follows an approach being widely different from [5]. There the so-called level based theorem, a very general upper bound technique, is applied to track the stochastic behavior of the best-so-far OneMax-value. While this gives a rather short and elegant proof of the upper bound O(n log n log log n), the generality of the technique does not give much insight into how the probabilities pi of the individuals bits develop over time. We think that it is crucial to understand the working principles of the algorithm thoroughly and present a detailed analysis of the stochastic process at bit level, as also done in many other runtime analyses of EDAs [10, 9, 26, 14]. This paper is structured as follows: in Section 2, we introduce the setting we are going to analyze and summarize some tools from probability theory that are used throughout the paper. In particular, a new negative drift theorem is presented that generalizes previous formulations by making milder assumptions on steps in the direction of the drift than on steps against the drift. In the section, we also give a detailed analysis of the update rule of the UMDA, which results in a bias of the frequencies pi towards higher values. These techniques are presented for the OneMax-case, but contain some general insights that may be useful in analyses of different fitness functions. In Section 3, we √ prove the upper bound for the case of µ above the phase transition point Θ( n log n). The case of µ below this point is dealt with in Section 4. We finish with some conclusions. The appendix gives a self-contained proof of the new drift theorem. Independent, related work. Very recently, Lehre and Nguyen [16] independently √ obtained the upper bound O(µn) for c log n ≤ µ = O( n) using a refined application of the level-based method. Our approach also covers larger µ (but requires λ = µ(1+Θ(1))) and is technically different. 2 Preliminaries We consider the so-called Univariate Marginal Distribution Algorithm (UMDA [20]) in Algorithm 1 that maximizes the pseudo-Boolean function f . Throughout this paper, we have f := OneMax, where, for all x = (x1 , . . . , xn ) ∈ {0, 1}n , OneMax(x) = n X xi . i=1 Note that the unique maximum is the all-ones bit string. However, a more general version can be defined by choosing an arbitrary optimum a ∈ {0, 1}n and defining, for all x ∈ {0, 1}n , OneMaxa (x) = n − dH (x, a), where dH (x, a) denotes the Hamming distance of the bit strings x and a. Note that OneMax1n is equivalent to the original definition of OneMax. Our analyses hold true for any function OneMaxa , with a ∈ {0, 1}n , due to symmetry of the UMDA’s update rule. We call bit strings individuals and their respective OneMax-values fitness. The UMDA does not store an explicit population but does so implicitly, as usual in EDAs. For each of the n different bit positions, it stores a rational number pi , which 3 Algorithm 1: Univariate Marginal Distribution Algorithm (UMDA); algorithm   UMDA∗ is obtained if the line indexed R is omitted. t ← 0, pt,1 ← pt,2 ← · · · ← pt,n ← 12 ; while termination criterion not met do Pt ← ∅; for j ∈ {1, . . . , λ} do for i ∈ {1, . . . , n} do (j) xt,i ← 1 with prob. pt,i , (j) xt,i ← 0 with prob. 1 − pt,i ; (j) Pt ← Pt ∪ {xt }; (1) (µ) Sort individuals in P descending by fitness (such that f (xt ) ≥ · · · ≥ f (xt )), breaking ties uniformly at random; for i ∈ {1, . . . , n} do Pµ x (j) pt+1,i ← j=1µ t,i ;   R Restrict pt+1,i to be within [ n1 , 1 − n1 ]; t ← t + 1; we call frequency, determining how likely it is that a hypothetical individual would have a 1 at this position. In other words, the UMDA stores a probability distribution over {0, 1}n . The starting distribution is the uniform distribution. In each so-called generation t, the UMDA samples λ individuals such that each individual has a 1 at position i, where i ∈ {1, . . . , n} with probability pt,i , independent of all the other frequencies. Thus, individuals are sampled according to a Poisson binomial distribution with probability vector (pt,i )i∈{1,...,n} . After sampling λ individuals, µ of them with highest fitness are chosen, breaking ties uniformly at random (so-called selection). Then, for each position, the respective frequency is set to the relative occurrence of 1s in this position. That is, if the chosen µ best individuals have x 1s among them, the frequency pi will be updated to x/µ for the next iteration. Note that such an update allows large jumps like, e. g., from (µ − 1)/µ to 1/µ. If a frequency is either 0 or 1, it cannot change anymore since then all values at this position will be either 0 or 1. To prevent the UMDA from getting stuck in this way, we narrow the interval of possible frequencies down to [1/n, 1 − 1/n] and call 1/n and 1 − 1/n the borders for the frequencies. Hence, there is always a chance of sampling 0s and 1s for each position. This is a common approach used by other EDAs as well, such as the cGA or ACO algorithms (cf. the references given in the introduction). We also consider a variant of the UMDA called UMDA∗ where the borders are not used. That algorithm will typically not have finite expected runtime; however, it might still 4 be efficient with high probability if it is sufficiently unlikely that frequencies get stuck at bad values. Overall, we are interested in upper bounds on the UMDA’s expected number of function evaluations on OneMax until the optimum is sampled; this number is typically called runtime. Note that this equals the expected number of generations until the optimum is sampled times λ. In all of our analyses, we assume that λ = (1 + β)µ for some constant β > 0 and use µ and λ interchangeably in asymptotic notation. Of course, we could also choose λ = ω(µ) but then each generation would be more expensive. Choosing λ = Θ(µ) lets us basically focus on the minimal number of function evaluations per generation, as µ of them are at least needed to make an update. 2.1 Useful Tools from Probability Theory In our analyses, we often approximate sums of random variables, which are independent but not necessarily identically distributed, by the normal distribution through the central limit theorem (CLT). The following lemma describes sufficient conditions for such approximations to be sufficiently exact, along with a bound on the approximation error. Lemma 1 (CLT with Lyapunov condition, Berry-Esseen inequality [8, p. 544]). Let X1 , . . . , Xm be a sequence of independent random variables, each with finite expected value µi and variance σi2 . Define s2m := m X σi2 and Cm m 1 X := (Xi − µi ) . sm i=1 i=1 If there exists a δ > 0 such that lim m→∞ m 1 X s2+δ m i=1   E |Xi − µi |2+δ = 0 (assuming all the 2 + δth moments to be defined), then Cm converges in distribution to a standard normally distributed random variable. Moreover, the approximation error is bounded as follows: for all x ∈ R,  Pm 3 i=1 E |Xi − µi | |Pr(Cm ≤ x) − Φ(x)|≤ C · s3m where C is an absolute constant and Φ(x) denotes the cumulative distribution function of the standard normal distribution. We will use the following estimates for Φ(x). More precise formulas exist, but they do not yield any benefit in our analysis. 5 Lemma 2 ([7, p. 175], [27]). For any x < 0,   x2 x2 1 1 1 1 1 − − 3 √ e− 2 ≤ Φ(x) ≤ − √ e− 2 . x x x 2π 2π If −1 ≤ x < 0, 1 1 Φ(x) ≥ + √ 2 2π  x3 x− 3  . An approximation of the binomial distribution by the normal distribution will often be used to bound the probability of a tail from below. To bound it from above, many classical techniques such as Chernoff-Hoeffding bounds exist. The following version, which includes knowledge of the variance, is particularly handy to use. Lemma 3 ([18]). If X1 , . . . , Xn are independent, and Xi − E(Xi ) ≤ b for i ∈ {1, . . . , n}, then for X := X1 + · · · + Xn and any d ≥ 0 it holds − Pr(X − E(X) ≥ d) ≤ e d2 2σ 2 (1+δ/3) , where σ 2 := Var(X) and δ := bd/σ 2 . The following lemma describes a result regarding the Poisson binomial distribution which we find very intuitive. However, as we did not find a sufficiency related result in the literature, we give a self-contained proof here. Lemma 4. Let X1 , .P . . , Xn be independent P Poisson trials. Denote pi = P Pr(Xi = 1) for n n 2 i ∈ {1, . . . , n}, X := i=1 Xi , µ := E(X) = i=1 pi and σ := Var(X) = ni=1 pi (1−pi ). Given two constants ℓ, u ∈ (0, 1] such that ℓ + u < 1, let kℓ := min{i | Pr(X ≤ i) ≥ ℓ} and ku := max{i | Pr(X ≥ i) ≥ u}. Then it holds Pr(X = k) = Ω(min{1, 1/σ}) for all k ∈ {kℓ , . . . , ku }, Proof. We first note that kℓ ≤ ku . This holds since by assumption Pr(X < kℓ ) < ℓ and Pr(X > ku ) < u, hence Pr(kℓ ≤ X ≤ ku ) ≥ 1 − ℓ − u > 0, using ℓ + u < 1. If kℓ > ku happened, we would obtain a contradiction. We first handle the case σ = o(1) separately. Since X takes only integral values, this implies Pr(X < [E(X)]) = o(1) and Pr(X > [E(X)]) = o(1), where [r] denotes the integer closest to r. Since ℓ and u are positive constants, it immediately follows that kℓ = ku = [E(X)] and Pr(X = kℓ ) = Ω(1). In the following, we assume σ = Ω(1) and distinguish between the cases kℓ ≤ ⌊E(X)⌋ and kℓ > ⌊E(X)⌋. Assume first kℓ ≤ ⌊E(X)⌋. We start by proving Pr(X = kℓ ) = Ω(1). To this end, we recall the unimodality of the Poisson-binomial distribution function, more precisely Pr(X = i) ≤ Pr(X = i + 1) for i ≤ ⌊E(X)⌋ − 1 and Pr(X = i) ≥ Pr(X = i + 1) for i ≥ ⌈E(X)⌉ [24]. Hence, denoting α := Pr(X = kℓ ), we have Pr(X = i) ≤ α for all i ≤ kℓ . It follows Pr(X ≤ kℓ − ℓ/(2α)) ≥ ℓ/2 = Ω(1) since Pr(X ≤ kℓ ) ≥ ℓ by definition. We remark (but do not use) that this also implies a lower bound on kℓ . p Var(X) = If α = o(1/σ) held, the fact Pr(X ≤ kℓ − ℓ/(2α)) = Ω(1) would imply p Ω(1/α) = ω(σ), contradicting our assumption Var(X) = σ. Hence, Pr(X = kℓ ) = 6 Ω(1/σ). Again using the monotonicity of the Poisson-binomial distribution, we have Pr(X = i) = Ω(1/σ) for all i ∈ {kℓ , . . . , ⌊E(X)⌋}. To show Pr(X = i) = Ω(1/σ) for all i ∈ {⌈E(X)⌉, . . . , ku }, we apply the argumentation in a symmetrical way, using that Pr(X ≥ ku ) = Ω(1) and that Pr(X = i) ≥ Pr(X = i + 1) for i ≥ ⌈E(X)⌉. We are left with the case kℓ > ⌊E(X)⌋. Recall that ku ≥ kℓ . Moreover, Pr(X ≥ ku ) = Ω(1) by assumption. Similarly to the previous paragraph, if Pr(X = ku ) = α for some α = o(1/σ) then we would obtain a contradiction to the given σ. So, Pr(X = ku ) = Ω(1/σ). Now, again using the monotonicity, Pr(X = i) ≥ Pr(X = ku ) for all i ∈ {kℓ , . . . , ku − 1}, hence Pr(X = i) = Ω(1/σ) for all i ∈ {kℓ , . . . , ku }. As mentioned, we will study how the frequencies associated with single bits evolve over time. To analyze the underlying stochastic process, the following theorem will be used. It generalizes the so-called simplified drift theorem with scaling from [22]. The crucial relaxation is that the original version demanded an exponential decay w. r. t. jumps in both directions, more precisely the second condition below was on Pr(|Xt+1 − Xt | ≥ jr). We now only have sharp demands on jumps in the undesired direction while there is a milder assumption (included in the first item) on jumps in the desired direction. The proof of the theorem is given in the appendix. Theorem 1 (Generalizing [22]). Let Xt , t ≥ 0, be real-valued random variables describing a stochastic process over some state space, adapted to a filtration Ft . Suppose there exist an interval [a, b] ⊆ R and, possibly depending on ℓ := b − a, a drift bound ǫ := ǫ(ℓ) > 0, a typical forward jump factor κ := κ(ǫ) ≥ 1 as well as a scaling factor r := r(ℓ) > 0 such that for all t ≥ 0 the following three conditions hold: 1. E((Xt+1 − Xt ) · 1{Xt+1 − Xt ≤ κǫ}) | Ft ; a < Xt < b) ≥ ǫ, 2. Pr(Xt+1 − Xt ≤ −jr | Ft ; a < Xt ) ≤ e−j for all j ∈ N, 3. λℓ ≥ 2 ln(4/(λǫ)), where λ := min{1/(2r), ǫ/(17r 2 ), 1/(κ2 ǫ)}. Then for T ∗ := min{t ≥ 0 : Xt ≤ a | F0 ; X0 ≥ b} it holds that Pr(T ∗ ≤ eλℓ/4 ) = O(e−λℓ/4 ). To derive upper bounds on hitting times for optimal state, drift analysis is used, in particular in scenarios where the drift towards the optimum is not homogeneous with respect to place. Such a drift is called variable in the literature. A clean form of a variable drift theorem, generalizing previous formulations from [13] and [19], was presented in [23]. The following formulation has been proposed in [17]. Theorem 2 (Variable Drift, Upper Bound). Let (Xt )t∈N0 , be a stochastic process, adapted to a filtration Ft , over some state space S ⊆ {0} ∪ [xmin , xmax ], where xmin > 0, Let h(x) : [xmin , xmax ] → R+ be a monotone increasing function such that 1/h(x) is integrable on [xmin , xmax ] and E(Xt − Xt+1 | Ft ) ≥ h(Xt ) if Xt ≥ xmin . Then it holds for the first hitting time T := min{t | Xt = 0} that Z X0 1 xmin E(T | F0 ) ≤ + dx. h(xmin ) xmin h(x) 7 Finally, we need the following lemma in our analysis of the impact of the so-called 2nd-class individuals in Section 2.2. Its statement is very specific and tailored to our applications. Roughly, the intuition is to show that E(min{C, X}) is not much less than min{C, E(X)} for X ∼ Bin(D, p) and D ≥ C. Lemma 5. Let X be binomially distributed with parameters D and p. Let C ∈ {1, . . . , D}. Then E(min{C, X}) ≥ min{Cp + γp(1 − p)(D − C), C(1/2 + p/2)} for some constant γ > 0. Proof. First we note that Var(X) = Dp(1 − p). We denote f (X) = min{C, X} and note that our aim is to compute E(f (X)). Obviously, E(f (X)) ≤ C. We distinguish two cases with respect to p. If p ≤ (C/2+D/2)/D, then E := E(X) = Dp ≤ C/2 + D/2, Var(X) ≤ D(1 − E/D) = D − E, so by Chebyshev’s inequality √ √   4 D−E D−E . ≤ Pr(X ≥ E + (D − E)/2) = Pr X ≥ E + 2 D−E Note that D − E ≥ D − (C/2 + D/2) = D/2 − C/2. We get Pr(X ≥ E + (D − E)/2) ≤ 8 16 = . D/2 − C/2 D−C To relate E(X) to E(f (X)), we note that all outcomes X ≤ E + (D − E)/2 are weighted by a factor at most (E + (D − E)/2)/C ≤ (C/4 + 3D/4)/C larger in the first than in the second expectation. The remaining outcomes are weighted by a factor at most D/C higher. Noting that E(X) = Cp + (D − C)p, we obtain   16 C C 16 · 1− E(f (X)) ≥ E(X) + E(X) C/4 + 3D/4 D−C DD−C    16 C · 1− ≥ Cp + (D − C)p C + 3(D − C)/4 D−C ≥ Cp + γp(D − C) for some sufficiently small constant γ > 0 if D−C ≥ κ for some sufficiently large constant κ. Hence, we have E(f (X)) ≥ Cp + γp(D − C) in this case. If p ≥ (C/2 + D/2)/D then, using E := E(X) = pD, we obtain Var(X) ≤ D(1 − E/D) = D − E. By Chebyshev’s inequality, we have Pr(X ≤ C) ≤ Pr(X ≤ E − (E − C)) ! p Var(X)(E − C) D−E √ ≤ ≤ Pr X ≤ E(X) − . (E − C)2 D−E 8 Under the condition X ≤ C, the expected value is at least the same as if we only had C trials. Hence,     1 D−E Cp D−E + C 1 − + C 1 − ≥ E(f (X)) ≥ Cp (E − C)2 (E − C)2 2 2   p 1 =C + , 2 2 using E − C ≥ D − E and bounding (D − E)/(E − C)2 ≤ 1/2 if E − C is not too small. We have E − C ≥ (D − C)/2 ≥ κ/2, so it suffices to choose the constant κ sufficiently large to obtain E(f (X)) ≥ C(1/2 + p/2) in this case. If D − C is not sufficiently large for the above estimations to hold, we argue more directly. Let D − C ≤ κ for some constant κ > 0. We study the first C trials, denoted by Y ∼ Bin(C, p), and apply the law of total probability w. r. t. the events Y = C and Y < C. If the first C trials yields less than C successes then at least one more success of probability p among the remaining D − C trials will be taken into account before the minimum takes effect. Hence, E(f (X)) = CpC + (1 − pC )(E(Y | Y < C) + p)   E(Y · 1{Y < C}) C C +p = Cp + (1 − p ) Pr(Y < C) = Cp + p(1 − pC ) ≥ Cp + p(1 − p) since p ≤ 1 and C ≥ 1. Hence, E(f (X)) ≥ Cp + p(1 − p)(D − C)/(2κ) ≥ Cp + γp(1 − p)(D −C) for some sufficiently small constant γ > 0, so the statement holds also if D −C is bounded from above by a constant. 2.2 On the Stochastic Behavior of Frequencies To bound the expected runtime of UMDA and UMDA∗ , it is crucial to understand how the n frequencies associated with the bits evolve over time. The symmetry of the fitness function OneMax implies that each frequency evolves in the same way, but not necessarily independently of the others. Intuitively, many frequencies should be close to their upper border for making it sufficiently likely to sample the optimum, i. e., the all-ones string. To understand the stochastic process on a frequency, it is useful to consider the UMDA without selection for a moment. More precisely, assume that each of the λ offspring has the same probability of being selected as one of the µ individuals determining the frequency update. Then the frequency describes a random walk that is a martingale, i. e., in expectation it does not change. With OneMax, individuals with higher value are more likely to be among the µ updating individuals. However, since only the accumulated number of one-bits matters for selection, a single frequency may still decrease even if the step leads to an increase of the best-so-far seen OneMax value. We will spell out the bias due to selection in the remainder of this section. 9 We consider an arbitrary but fixed bit position j and denote by pt := pt,j its frequency at time t. Moreover, let Xt , where 0 ≤ Xt ≤ µ, be the number of ones 1−1/n among the µ offspring selected to compute pj . Then pt = cap1/n (Xt /µ), where caphℓ (a) := max{min{a, h}, l} caps frequencies at their borders. Consider the fitness of all individuals sampled during one generation of the UMDA w. r. t. n − 1 bits, i. e., all bits but bit j. Assume that the individuals are sorted in levels decreasingly by their fitness; each individual having a unique index. Level n − 1 is called the topmost, and level 0 the lowermost. Let w+ be the level of the individual with rank µ, and let w− be the level of the individual with rank µ + 1. Since bit j has not been considered so far, its OneMax-value can potentially increase each individual’s level by 1. Now assume that w+ = w− + 1. Then, individuals from level w− can end up with the same fitness as individuals from level w+ , once bit j has been sampled. Thus, individuals from level w+ were still prone to selection. Among the µ individuals chosen during selection, we distinguish between two different types: 1st-class and 2nd-class individuals. 1st-class individuals are those which have some many 1s at the n − 1 other bits such that they had to be chosen during selection no matter which value bit j has. The remaining of the µ individuals are the 2nd-class individuals; they had to compete with other individuals for selection. Therefore, their bit value j is biased toward 1 compared to 1st-class individuals. Note that 2nd-class individuals can only exist if w+ ≤ w− + 1, since in this case, individuals from level w− can still be as good as individuals from level w+ after sampling bit j. ∗ Given Xt , let Ct+1 denote the number of 2nd-class individuals in generation t + 1. Note that the number of 1s of 1st-class individuals during generation t + 1 follows a ∗ 1st-class binomial distribution with success probability Xt /µ. Since we have µ − Ct+1 ∗ individuals, the distribution of the number of 1s of these follows Bin(µ − Ct+1 , Xt /µ). We proceed by analyzing the number of 2nd-class individuals and how they bias the number of 1-bits, leading to Lemma 6 below. The underlying idea is that both the number of 2nd-class individuals is sufficiently large and that at the same time, these 2nd-class individuals were selected from an even larger set to allow many one-bits to be gained at the considered position j. This requires a careful analysis of the level where the rank-µ individual ends up. For i ∈ {0, . . . , n − 1}, let Ci denote the cardinality of level i, i. e., the number of individuals in level i during an arbitrary generation of the UMDA, and let C≥i = Pn−1 C . Let M denote the index of the first level from the top such that the number a a=i of sampled individuals is greater than µ when including the following level, i.e., M := max{i | C≥i−1 > µ}. Note that M can never be 0, and only if M = n − 1, CM can be greater than µ. Due to the definition of M , if M 6= n − 1, level M − 1 contains the individual of rank µ + 1, so level M − 1 contains the cut where the best µ out of λ offspring are selected. Individuals in levels at least M + 1 are definitely 1st-class individuals since they still will have rank at least µ even if the bit j sampled last turns out as 0. 2nd-class individuals, if any, have to come from levels M , M − 1 and M − 2. Individuals from level M may still 10 be selected (but may also not) for the µ updating individuals even if bit j turns out as 0. To obtain a pessimistic bound the bias introduced by 2nd-class individuals, we concentrate on level M − 1. Note that all individuals from level M − 1 sampling bit j as 1 will certainly be selected unless the µ − C≥M remaining slots for the µ best are filled up. We call the individuals from levels M − 1 2nd-class candidates and denote their ∗ ∗ := CM −1 . By definition, Dt+1 ≥ µ − C≥M , and we want to show that number by Dt+1 ∗ Dt+1 is expected to be larger than µ − C≥M . That is, we expect to have more 2nd-class candidates in level M − 1 than can actually be selected as 2nd-class individuals. We now present the lemma that summarizes crucial properties of the distribution of 1st-class and 2nd-class individuals and candidates along with the number of one-bits sampled in them. We write X ≻ Y to denote that X is stochastically at least as large as Y . P Lemma 6. Let σt2 := ni=1 pt,i (1 − pt,i ) be the sampling variance of the UMDA. Then ∗ ∗ 1. Ct+1 ≻ Bin(Θ(µ), Θ(1/σt )), implying E(Ct+1 | σt ) = Ω(µ/σt ). ∗ ∗ ∗ ∗ | σt ) = Ω(µ/σt ). − Ct+1 ≻ Bin(Θ(µ), Θ(1/σt )), implying E(Dt+1 − Ct+1 2. Dt+1 ∗ , X /µ) + min{C ∗ , Bin(D ∗ , X /µ)}. 3. Xt+1 ∼ Bin(µ − Ct+1 t t t+1 t+1 4. E(Xt+1 | Xt , σt ) = Xt + Ω((µ/σt )(Xt /µ)(1 − Xt /µ)). 5. If pt ≤ 1 − c/n, where c > 0 is a sufficiently large constant, then E(pt+1 | pt , σt ) = pt + Ω(pt (1 − pt )/σt ). Proof. We first analyze the distribution of C ∗ := µ − C≥M , which as outlined above, ∗ . To this end, we carefully investigate and then reformulate is a lower bound on Ct+1 the stochastic process generating the λ individuals (before selection), restricted to n − 1 bits. Each individual is sampled by a Poisson binomial distribution for a vector of probabilities p′t = (p′t,1 , . . . , p′t,n−1 ) obtained from the frequency vector of the UMDA by leaving the entry belonging to bit j out (i. e., p′t = (pt,1 , . . . , pt,j−1 , pt,j+1 , . . . , pt,n ). Counting its number of 1s, each of the λ individuals then falls into some level i, where 0 ≤ i ≤ n − 1, with some probability qi depending on the vector p′t . Since the individuals are created independently, the number of individuals in level i is binomially distributed with parameters n − 1 and qi . Next, we take an alternative view on the process putting individuals into levels, using the principle of deferred decisions. We imagine that the process first samples all individuals in level 0 (through λ trials, all of which either hit the level or not), then (using the trials which did not hit level 0) all individuals in level 1, . . . , up to level n − 1. The number of individuals C0 in level 0 is still binomially distributed with parameters λ and q0 . However, after all individuals in level 0 have been sampled, the distribution changes. We have λ − C0 trials left, each of which can hit one of the levels 1 to n − 1. In particular, such a trial will hit level 1 with probability q1 /(1 − q0 ), by the definition of conditional probability since level 0 is excluded. This holds independently for all of the λ − C0 trials so that C1 follows a binomial distribution with parameters λ − C0 and 11 q1 /(1 − q0 ). Inductively, also all Ci for i > 1 are binomially distributed; e. g., Cn−1 is distributed with parameters λ − Cn−2 − · · · − C0 and 1. Note that this model of the sampling process can also be applied for any other permutation of the levels; we will make use of this fact. Recall that our aim is to analyze C ∗ . Formally, by applying the law of total probability, its distribution looks as follows for k ∈ {0, . . . , λ}: Pr(C ∗ ≥ k) = n−1 X i=1 Pr(M = i) · Pr(µ − C≥i ≥ k | M = i) . (1) We will bound the last expression from below by omitting all terms where Pr(M = i) is small. Let X be the number of 1s in a single individual sampled in the process of creating the λ offspring (without conditioning on certain levels being hit). The expected number of one-bits follows a Poisson binomial distribution with vector p′t . We define   1 L := min i | Pr(X ≤ i) ≥ 2 + 2β and  U := max i | Pr(X ≥ i) ≥ β 2 + 2β  . 1 1+β λ = µ β λ= than 1+β By Chernoff bounds, the number of individuals sampled above U is less than with probability 1 − e−Ω(λ) , and the number sampled below L is also less λ − µ with probability 1 − e−Ω(λ) . Then the µ-th ranked individual will be within Z := [U, L] with constant probability, which means that Pr(M ∈ Z) = Ω(1). Without further mention, such constant probabilities will be incorporated in the lower bounds on success probabilities derived below, using the law of total probability. Coming back to Equation (1), it is now sufficient to bound Pr(µ − C≥i ≥ k | M = i) by the distribution function belonging a binomial distribution for all i ∈ Z. We reformulate the underlying event appropriately. Here we note that (µ − C≥i ≥ k) | (M = i) is equivalent to (C≤i−1 ≥ λ − µ + k) | (M = i), where C≤i = definition of M , this is also equivalent to Pi j=0 Cj , and, using the (C≤i−1 ≥ λ − µ + k) | (C≤i−2 < λ − µ). We now use the above-mentioned view on the stochastic process and assume that levels 0 to i − 2 have been sampled and a number of experiments in a binomial distribution is carried out to determine the individuals from level i − 1. Hence, given some C≤i−2 = a < λ − µ, our event is equivalent to that the event  E ∗ := Ci−1 ≥ (λ − µ − a) + k | (Ci−2 = a) ∩ (Ci−1 ≥ λ − µ − a) 12 happens. Recall from our model that Ci−1 follows a binomial distribution with λ − a trials and with a certain success probability s. The number of trials left after having sampled levels 0, . . . , i − 2 is at least µ since a < λ − µ. Regarding s, note that it denotes the probability to sample an individual with i − 1 1s, given that it cannot have less than i − 1 1s. By omitting this condition, we clearly do not increase the probability. Hence, we pessimistically assume that s = Pr(X = i − 1). We now apply Lemma 4, using ℓ := 1/(2 + 2β) and u := β/(2 + 2β), in accordance with the above definition of L and U . Hence, every level in Z is hit with probability Ω(1/σt ). Therefore, since there are at least Ω(µ) trials left, the event Ci−1 ≥ (λ − µ − a) + k, conditioned on (Ci−2 = a) ∩ (Ci−1 ≥ λ − µ − a) is at least as likely as obtaining at least k successes in Ω(µ) trials with success probability Ω(1/σt ) each. Here we handle the condition by assuming that Ci−1 already contains λ−µ−a samples and that afterwards the remaining ∗ ≥ C ∗ ≻ Bin(Θ(µ), Θ(1/σt )). Using the individuals in Ci−1 are sampled. Hence, Ct+1 properties of the binomial distribution we obtain E(C ∗ ) = Ω(µ/σt ), which proves the first item of the lemma. We now use a dual line of argumentation to analyze CM −1 and prove the second item of the lemma. The aim is to show that C≥M −1 ≻ µ + Bin(Θ(µ), Θ(1/σt )). We take the same view on the stochastic process as above but imagine now that the levels are sampled in the order from n − 1 down to 0. Conditioning on that levels n − 1, . . . , M have been sampled, level M − 1 is still hit by λ − µ = Ω(µ) samples of success probability Ω(1/σt ) each since by definition less than µ samples fall into levels n − 1, . . . , M . Using the same ∗ ∗ arguments as above, C≥M −1 ≻ µ + Bin(Θ(µ), Θ(1/σt )). Observing that Dt+1 − Ct+1 = ∗ ∗ ∗ C≥M −1 − µ since trivially Ct+1 ≤ µ, we obtain Dt+1 − Ct+1 ≻ Bin(Θ(µ), Θ(1/σt )). ∗ ) = Ω(µ/σ ) 2nd-class individuals, and an additional number Altogether, we have E(Ct+1 t ∗ ∗ of E(Dt+1 − Ct+1 ) = Ω(µ/σt ) samples that are 2nd-class candidates but not individuals. This proves the second item of the lemma. To prove the third and fourth item, we essentially show that the expected overhang in candidates allows a bias in the frequency, as detailed in the following. In each of the ∗ 2nd-class candidates, bit j is sampled as 1 with probability Xt /µ. Only an expected Dt+1 ∗ 2nd-class individuals, are selected constant fraction of the candidates, namely the Ct+1 for the best µ offspring determining the next frequency. As observed above, the number ∗ of ones in the 1st-class individuals is binomially distributed with parameters µ − Ct+1 and Xt /µ. Hence, we obtain for the number of one-bits in the µ selected offspring that ∗ ∗ ∗ Xt+1 ∼ Bin(µ − Ct+1 , Xt /µ) + min{Ct+1 , Bin(Dt+1 , Xt /µ)}, which represents the third item of the lemma. To determine the expected value, we use Lemma 5. Hence, the expected value of the minimum is at least the minimum of ∗ Ct+1 Xt Xt ∗ ∗ + γ(Dt+1 − Ct+1 ) µ µ and ∗ Ct+1  1 Xt + 2 2µ 13  . If the minimum is taken on the first expression, we have an expected value E(Xt+1 | ∗ , D ∗ ) of at least Xt , Ct+1 t+1   Xt Xt ∗ ∗ Xt + γ(Dt+1 − Ct+1 ) 1− , µ µ ∗ ∗ are still random. If it is on the second term, we obtain an expected and Dt+1 where Ct+1 value of     1 Xt 1 Xt ∗ ∗ ∗ Xt + Ct+1 + − = Xt + Ct+1 . Xt − Ct+1 µ 2 2µ 2 2µ Altogether, ∗ ∗ ∗ E(Xt+1 | Xt ) = Xt + Ω(min{E(Ct+1 ), E(Dt+1 − Ct+1 )}(Xt /µ)(1 − Xt /µ)), ∗ ∗ ) = Ω(µ/σ ) and E(D ∗ which, as both E(Ct+1 t t+1 − Ct+1 ) = Ω(µ/σt ), implies E(Xt+1 | Xt ) = Xt + Ω((µ/σt )(Xt /µ)(1 − Xt /µ)), which proves the fourth item of the lemma. To conclude on the expected value of pt+1 , we recall from Algorithm 1 that pt+1 := 1−1/n cap1/n Xt+1 /µ. Using our assumption pt ≤ 1 − c/n we get 1 − Xt /µ ≥ c/n. Hence, as hitting the upper border changes the frequency by only at most 1/n and the lower border can be ignored here, we also obtain E(pt+1 | pt ) ≥ pt + Ω((1/σt )pt (1 − pt )) if c is large enough to balance the implicit constant in the Ω. This proves the fifth item. We note that parts of the previous proof are strongly inspired by [14]; in particular, the modeling of the stochastic process and the definition of M are almost literally taken from that paper. However, as [14] is concerned with lower bounds on the runtime, it bounds the number of 2nd-class individuals from above and needs a very different argumentation in the core of its proofs. 3 Above the phase transition We now prove our main result for the case of large λ. It implies an O(n log n) runtime √ behavior if µ = c n log n. √ Theorem 3. Let λ = (1 + β)µ for an arbitrary constant β > 0 and let µ ≥ c n log n for some sufficiently large constant c > 0. Then with probability Ω(1), the optimization √ time of both UMDA and UMDA∗ on OneMax is bounded from above by O(λ n). For UMDA, also the expected optimization time is bounded in this way. The proof of Theorem 3 follows a well-known approach that is similar to techniques partially independently proposed in several previous analyses of EDAs and of ant colony optimizers [21, 9, 26]. Here we show that the approach also works for the UMDA. Roughly, a drift analysis is performed with respect to the sum of frequencies. In 14 Lemma 6, we have already established a drift of frequencies towards higher values. Still, there are random fluctuations (referred to as genetic drift in [26]) of frequencies that may lead to undesired decreases towards 0. The proof of Theorem 3 uses that under the condition on µ, typically all frequencies stay sufficiently far away from the lower border; more precisely, no frequency drops below 1/4. Then the drift is especially beneficial. The following lemma formally shows that, if µ is not too small, the positive drift along with the fine-grained scale imply that the frequencies will generally move to higher values and are unlikely to decrease by a large distance. Using the lemma, we will ′ ′ obtain a failure probability of O(n−cc ) within ncc generations, which can subsume any polynomial number of steps by choosing c large enough. Lemma 7. Consider an arbitrary bit and let pt be its frequency at time t. Suppose that √ µ ≥ c n log n for a sufficiently large constant c > 0. For T := min{t ≥ 0 | pt ≤ 1/4} it ′ ′ then holds Pr(T ≤ ecc log n ) = O(e−cc log n ), where c′ is another positive constant. Proof. The aim is to apply Theorem 1. We consider the frequency pt,i associated with the considered bit and its distance Xt := µpt,i from the lower border. By initialization of the UMDA, X0 = µ/2. Note that Xt is a process on {µ/n, 1, 2, . . . , µ − 1, µ(1 − 1/n)}. In the notation of the drift theorem, we set [a, b] := [µ/4, µ/2], hence ℓ = µ/4. Next we establish the three conditions. First, we observe that E(Xt+1 − Xt | Xt ) = √ √ Ω(Xt (1 − Xt /µ)/ n) (Lemma 6 along with the trivial bound E(σt ) = O( n)) for Xt ∈ √ √ {1, . . . , µ}. The bound is Ω(µ/ n) for Xt ∈ [a, b], hence we will set ǫ′ := cµ/ n for some constant c > 0. Hereinafter, we will omit the conditions Xt ; a < Xt < b from the expected values. To establish the first condition of the drift theorem, we need to show that the expected value is “typical”; formally, we will find a not too large κ such that  ǫ′ E (Xt+1 − Xt ) · 1{Xt+1 − Xt ≤ κǫ′ /2} ≥ . 2 Then the first condition is established with ǫ := ǫ′ /2. We show the equivalent claim that E((Xt+1 − Xt ) · 1{Xt+1 − Xt > κǫ}) ≤ ǫ′ /2 when κ is chosen as a sufficiently large constant. To see this, we recall from the third item of Lemma 6 that Xt+1 is the sum of two random variables Z1 ∼ Bin(µ − C ∗ , Xt /µ) and Z2 ∼ min{C ∗ , Bin(D ∗ , Xt /µ)} for some random variables C ∗ and D ∗ which, by the first two items of the lemma, themselves dominate binomial distributions with parameters √ Θ(µ) and Θ(1/ n). Since the lower bound E(Xt+1 − Xt ) ≥ ǫ′ derived from Lemma 6 assumes the case of a binomial distribution for both C ∗ and D ∗ as a worst case, we ignore the stochastic dominance and are altogether confronted with binomial distributions only. In fact, for the range Xt ∈ [µ/4, µ/2] considered here, we have in the notation of Lemma 5 for p = Xt /µ both p ∈ [Ω(1), 1 − Ω(1)] and 1 − p ∈ [Ω(1), 1 − Ω(1)]. Thus, applying Lemma 5 in the same way as in the proof of Lemma 6 we get E(Xt+1 | Xt ) ≥ Xt + γ ′ p(1 − p) min{D ∗ − C ∗ , C ∗ } for a sufficiently small constant γ ′ > 0. Hence, using p(1 − p) = Θ(1), the drift is proportional to either the cardinality of D ∗ − C ∗ or of C ∗ , both of which (pessimisticaly) follow 15 √ a binomial distribution with parameters Θ(µ) and Θ(1/ n). Hence, w. l. o. g. we assume hereinafter that Xt+1 = Z3 + Z4 , where Z3 ∼ Bin(µ, Xt /µ) and Z4 ∼ Bin(C ∗ , Xt /µ). To show the claim, we exploit that Z3 + Z4 with constant probability is at least the expected value E(Z3 + Z4 ). First, we note that E(Z3 ) = Xt . Moreover, it is easy to see that Pr(Z3 ≥ E(Z3 )) = Ω(1). This holds since Xt ∈ [µ/4, µ/2] so the distribution of Z3 can be approximated by a normal distribution. Similarly, we obtain Pr(Z4 ≥ E(Z4 )) = √ Ω(1) as also Z4 can be approximated by a Normal distribution due to µ = Ω( n log n) √ and 1/σt = Ω(1/ n). If both Z3 ≥ E(Z3 ) and Z4 ≥ E(Z4 ), then one the one hand, Xt+1 − Xt is clearly non-negative, and on the other hand, the outcome of Z4 is at least C ∗ Xt /µ. Both events together happen with probability Ω(1) each, which just reduces the original bound E(Xt+1 −Xt | Xt ) by at most a constant factor. Hence, now it suffices to show that  E(C ∗ ) E C ∗ 1{C ∗ ≥ κE(C ∗ )} ≤ 2 ∗ (analogously w. r. t. D ) to establish our claim that  ǫ′ E (Xt+1 − Xt ) · 1{Xt+1 − Xt > κǫ} ≤ . 2 Note that E(C ∗ ) = Ω(log n) due to our assumption on µ. Hence, by Chernoff bounds, Pr(C ∗ ≥ P kE(C ∗ )) = e−Ω(k) for all k being bigger than some constant. Using the identity E(X) = x≥0 Pr(X ≥ x) for random variables X with non-negative integer values, we conclude E(C ∗ · 1{C ∗ ≥ κE(C ∗ )}) ≤ E(C ∗ )/2 as desired, given that κ is a sufficiently large constant; analogously w. r. t. D ∗ . This proves the claim and establishes the first condition of the drift theorem. To show the second condition, recall from Section 2.2 that Xt+1 stochastically dominates Bin(µ, Xt /µ). Hence, to analyze steps where Xt+1 < Xt , we may pessimistically assume the martingale case, where Xt+1 follows this binomial distribution, and obtain   Xt µ Xt 2 1− ≤ , ς := Var(Xt − Xt+1 | Xt ) = µ µ µ 4 √ so ς = Θ( µ). Using Lemma 3 with d = jς and b = 1, we get Pr(Xt+1 − Xt ≤ −jς) ≤ 2 √ e−Ω(min{j ,j}). Hence, we can work with some r = c′′′ µ for some sufficiently large constant c′′′ > 0 and satisfy the second condition on jumps that decrease the state. The third condition is also easily verified but requires a distinction according to the √ √ mutual relation of ℓ, ǫ, r and κ. We recall that ℓ = Θ(µ), ǫ = Θ(µ/ n), r = Θ( µ) and √ √ √ κ = Θ(1). We note that ℓ/r 2 = Θ(1/ n), 1/r = Θ(1/ µ) and 1/ǫ = Θ( n/µ). Hence, if µ = o(n), then by definition, λ equals ǫ/(17r 2 ) and λℓ = Ω(c log n) by our assumption √ µ ≥ c n log n from the lemma. By choosing c large enough, we obtain ǫℓ ≥ 2 ln(4r 2 /(17ǫ2 )) 17r 2 √ since the right-hand side is at most 2 ln(Θ( n)) and satisfy the third condition. If √ √ √ √ µ = Ω(n), then λ = Ω(min{1/ µ, n/µ}) = Ω( n/µ) and already λℓ = Ω( n). Hence, 16 in any case, the drift theorem implies that the first hitting time of states less than a, starting from above b is at least ec log n with probability at least 1 − e−c log n , if n is large enough. Proof of Theorem 3. We use a similar approach and partially also similar presentation of the ideas as in [26]. Following [21, Theorem 3] we show that, starting with a setting √ where all frequencies are at least 1/2 simultaneously, with probability Ω(1) after O( n) generations either the global optimum has been found or at least one frequency has dropped below 1/4. In the first case we speak of a success and in the latter of a failure. √ The expected number of generations until either a success or a failure happens is O( n). With respect to UMDA, we can use the success probability Ω(1) to bound the expected optimization time. We choose a constant γ > 3. According to Lemma 7, the probability of a failure in altogether nγ generations is at most n−γ , provided the constant c in √ the condition µ ≥ c n log n is large enough. In case of a failure we wait until all frequencies simultaneously reach values at least 1/2 again and then repeat the arguments from the preceding paragraph. It is easy to show via additive drift analysis for the UMDA (not the UMDA∗ ) that the expected time for one frequency to reach the upper border is always bounded by O(n3/2 ), regardless of the initial probabilities. This holds since by Lemma 6 there is always an additive drift of Ω(pt,i (1 − pt,i )/σt ) = Ω(1/(nσt )) = Ω(1/n3/2 ). By standard arguments on independent phases, the expected time until all frequencies have reached their upper border at least once is O(n3/2 log n). Once a frequency reaches the upper border, we apply a straightforward modification of Lemma 7 to show that the probability of a frequency decreasing below 1/2 in time nγ is at most n−γ (for large enough c). The probability that there is a frequency for which this happens is at most n−γ+1 by the union bound. If this does not happen, all frequencies attain value at least 1/2 simultaneously, and we apply our above arguments again. As the probability of a failure is at most n−γ+1 , the expected number of restarts is O(n−γ+1 ) and the expected time until all bits recover to values at least 1/2 only leads to an additional term of n−γ+1 · O(n3/2 log n) ≤ o(1) (as n−γ ≤ n−3 ) in the expectation. We now only need to √ show that after O( n) generations without failure the probability of having found the all-ones string is Ω(1). P In the rest of this proof, we consider the potential function φt := n − 1 − ni=1 pt,i , which denotes the total distance of the frequencies from the upper border 1 − 1/n. For simplicity, for the moment we assume that no frequency is greater than 1 − c/n, where c is the constant from Lemma 6. Using Lemma 6 and the linearity of expectation, we obtain for some constant γ > 0 the drift E(φt − φt+1 | φt ) = n X (pt+1,i − pt,i ) i=1 n X (pt,i + γpt,i (1 − pt,i )/σt − pt,i ) = γσt , = i=1 17 P since ni=1 pt,i (1 − pt,i ) = σt2 . Using our assumption pt,i ≥ 1/4, we obtain the lower bound v v u n u n uX uX t E(φt − φt+1 | φt ) ≥ γ pt,i (1 − pt,i ) ≥ γ t (1 − pt,i )/4, i=1 i=1 √ which equals γ φt /2. Now consider the frequencies that are greater than 1 − c/n and fix an arbitrary one of them. The underlying bit is set to 0 in a selected offspring with probability at most c/n since conditioning on being selected cannot make the probability bigger. Hence, we expect no more than µc/n selected offspring sampling a 0, which implies an expected decrease of the frequency by at most (µc/n)/µ = c/n. As there are at most n frequencies greater than 1 − c/n, this amounts to a total drift of no less than −c causes by these frequencies. In total, we bound the drift by √ √ p γ φt γ φt −c≥ =: h(φt ). E(φt − φt+1 | φt ; φt ≥ 8/(cγ)) ≥ 4 8 By the variable drift theorem (Theorem 2) with drift function h(φt ), maximum n and minimum xmin = 8/(cγ), the expected number of generations until the φ-value is at most 8/(cγ) is at most Z n Z n √ dx xmin dx 8/(cγ) √ + + ≤ p = O( n) h(xmin ) γ 8/(cγ)/8 8/(cγ) γ x/8 xmin h(x) √ since both c and γ are constant. Hence, by Markov’s inequality, O( n) generations, √ amounting to O(λ n) function evaluations, suffice with probability Ω(1) to reach φt ≤ 8/(cγ) = O(1). It is easy to see that φt = O(1) implies an at least constant probability of sampling the all-ones string (assuming that all pt,i are at least 1/4). Hence, the √ optimum is sampled in O( n) generations with probability Ω(1), which, as outlined above, proves the first statement of the lemma and also the statement on UMDA’s expected runtime. 4 Below the phase transition √ Theorem 3 crucially assumes that µ ≥ c n log n for a large constant c > 0. As described above, the UMDA shows a phase transition between unstable and stable behavior at the √ threshold Θ( n log n). While above the threshold, the frequencies typically stay well focused on their drift towards the upper border and do not drop much below 1/2, the √ opposite is the case if µ < c′ n log n for a sufficiently small constant c′ > 0. Krejca and Witt [14] have shown for this regime that with high probability nΩ(1) frequencies will walk to the lower border before the optimum is found, resulting in a coupon collector effect and therefore the lower bound Ω(n log n) on the runtime. It also follows directly from their results (although this is not made explicit) that UMDA∗ will in this regime 18 with high probability have infinite optimization time since nΩ(1) frequencies will get √ stuck at 0. Hence, in the regime µ = Θ( n log n), the UMDA∗ turns from efficient with at least constant probability to inefficient with overwhelming probability. √ Interestingly, the value Θ( n log n) has also been derived in [26] as an important parameter setting w. r. t. the update strengths called K and 1/ρ in the simple EDAs cGA and 2-MMASib , respectively. Below the threshold value, lower bounds are obtained through a coupon collector argument, whereas above the threshold, the runtime √ √ is O(K n) (and O((1/ρ) n) since frequencies evolve smoothly towards the upper border. The UMDA and UMDA∗ describe the same threshold behavior, even at the same threshold points. The EDAs considered in [26] use borders 1/n and 1 − 1/n for the frequencies in the same way as the UMDA. The only upper bounds on the runtime are obtained for √ update strengths greater than c n log n. Below the threshold, no conjectures on upper bounds on the runtime are stated; however, it seems that the authors do not see any benefit in smaller settings of the parameter since they recommend always to choose values above the threshold. Surprisingly, this does not seem to be necessary if the borders [1/n, 1 − 1/n] are used. With respect to the UMDA, we will show that even for logarithmic µ it has polynomial expected runtime, thanks to the borders, while we already know that UMDA∗ will fail. We also think that a similar effect can be shown for the EDAs in [26]. √ We now give our theorem for the UMDA with small µ. If µ = Ω( n log n), it is weaker than Theorem 3, again underlining the phase transition. The proof is more involved since it carefully has to bound the number of times frequencies leave a border state. Theorem 4. Let λ = (1 + β)µ for an arbitrary constant β > 0 and µ ≥ c log n for a sufficiently large constant c > 0 as well as µ = o(n). Then the expected optimization time of UMDA on OneMax is O(λn). For UMDA∗ , it is infinite with high probability √ if µ < c′ n log n for a sufficiently small constant c′ > 0. Proof. The second statement can be derived from [14], as discussedPabove. We now focus on the first claim, reusing the potential function φt = n − 1 − ni=1 pt,i from the proof of Theorem 3. Let k denote the number of frequencies below 1 − c/n for the c from Lemma 6, w. l. o. g., these are the frequencies associated with bits 1, . . . , k. The last n − k bits are actually at 1 − 1/n since 1/µ = ω(n) by assumption. They are set to 0 with probability at most 1/n in each of the selected offspring, amounting to a total expected loss of at most 1. Similarly as in the proof of Theorem 3, we compute the drift E(φt −φt+1 ≥ k X 1 (pt+1,i − pt,i ) − (n − k) | φt ) ≥ n i=1 k X i=1 (pt,i + γpt,i (1 − pt,i )/σt − pt,i ) − 1 19 =q Pk − pt,i ) −1 Pk ((n − k)/n)(1 − 1/n) + i=1 pt,i (1 − pt,i ) γ i=1 pt,i (1 (2) where the last equality Pkjust used the definition of σt . We now distinguish two cases depending on V ∗ := i=1 pt,i (1 − pt,i ), the total variance w. r. t. the bits not at the ∗ ′ upper border. If V ≥ c for some sufficiently large constant c′ > 0, we obtain √ and therefore γV ∗ ≥ 2, 1+V∗ γV ∗ γV ∗ √ E(φt − φt+1 | φt ) ≥ √ − 1 ≥ ≥1 1+V∗ 2 1+V∗ from (2). If V ∗ < c′ , we will show by advanced arguments that the bits that have reached the upper border can almost√be ignored and that the drift with respect to the other bits is still in the order Ω(V ∗ / 1 + V ∗ ). Using this (so far unproven) statement, we apply variable drift (Theorem 2) with xmin = 1/µ (since each pi,t = i/µ for some i ∈ {1, . . . , µ − 1} if it is not at a border) and √ h(x) := min{1, c′′ x/ 1 + x} √ for some constant c′′ . Let x∗ be the point where 1 = c′′ x∗ / 1 + x∗ and note that x∗ = Θ(1). We obtain the upper bound p Z n Z x∗ √ Z n (1/µ) 1 + 1/µ 1 dx xmin 1+x + dx = + dx + ′′ ′′ h(xmin ) c /µ c x 1/µ h(x) x∗ 1 1/µ on √ the expected number √ of generations. Since the anti-derivative of ln( 1 + x − 1) − ln( 1 + x + 1), the bound can be simplified to √ √ 1 + x/x is 2 1 + x+ O(1) + O(log µ) + O(n) = O(n) using µ = o(n). This corresponds to an expected runtime √ of O(λn). ∗ We still have to show that we have a drift of Ω(V / 1 + V ∗ ) if V ∗ ≤ c′ . Actually, we will consider a phase of n2 generations and show that the claim holds with high probability throughout the phase. We then show that under this assumption the optimum is sampled with probability Ω(1) in the phase. In case of a failure, we repeat the argumentation and get an expected number of O(1) repetitions, altogether an expected runtime of O(λn). Another important fact we will use concerns the drift statement E(pt+1,i − pt,i | pi , σt ) = Ω(pi (1 − pi )/σt ). Above we bounded σt in some deterministic way, but in fact we only need to bound σt in expectation. Since the function σt 7→ 1/σt is convex, we have by Jensen’s inequality E(1/σt ) ≥ 1/E(σt ), implying E(pt+1,i − pt,i | pi ) = Ω(pi (1 − pi )/E(σt )). We have seen above that frequencies at the upper border may contribute negative to the drift of the φt -value. Hence, to show the claim that the potential also decreases when 20 V ∗ ≤ c′ , we will analyze an arbitrary but fixed frequency and prove that it is likely to stay in the vicinity of the upper border once having been there. Let us for the moment assume that we always have E(σt ) = O(1) in a phase of n2 generations. We claim that this actually happens with probability at least 1/2, a proof for this will be given below. In case of a failure, we repeat the argumentation. We consider a frequency i and its distance Xt := µpt,i from the lower border from the first time on where pt,i = 1 − 1/n. The aim is to show the following: when the Xt -value drops below 3/4µ for the first time, it will with probability 1 − e−Ω(µ) increase to at least 3/4µ again before it drops below µ/2. We do not apply Theorem 1 to show this (although this would be possible) but use a more direct and somewhat simpler argumentation based on the analysis of the sampling process. Recalling from Section 2.2 that Xt+1 is obtained by summing up the number of ones sampled in both the 1st-class individuals and the 2nd-class individuals at generation t + 1. Denote by D ∗ the number of 2nd-class candidates and by C ∗ the number of 2nd-class individuals as in Lemma 6. From the lemma we obtain that D ∗ − C ∗ follows at least a binomial distribution with parameters Ω(µ) and Ω(1/σt ) = Ω(1). Hence, by Chernoff bounds the probability that D ∗ − C ∗ ≥ c1 µ is at least 1 − e−Ω(µ) . Assuming this to happen, the number of ones-bits sampled in the D ∗ candidates is at least D ∗ (1 − δ)Xt /µ with probability 1 − e−Ω(µ) by Chernoff bounds (using that Xt /µ = Θ(1)), where δ is a constant that can be chosen small enough. Likewise, the number of one-bits sampled in the µ−C ∗ 1st-class individuals is at least (µ−C ∗ )(1−δ)Xt /µ with probability 1−e−Ω(µ) . Assuming all this to happen, we have Xt+1 ≥ Xt (1 − δ) + (D ∗ − C ∗ )(1 − δ)Xt /µ (or Xt+1 takes its maximum µ anyway) with probability 1 − e−Ω(µ) . If δ is chosen sufficiently small compared to c1 , we obtain Xt+1 ≥ Xt + µδ/2 with probability 1 − e−Ω(µ) . Note that the constants in the exponent of e−Ω(µ) may be different; we use the smallest ones from these estimations and union bounds to obtain the bound 1 − e−Ω(µ) on the final probability. If Xt+1 ≥ Xt + µδ/2 for a certain constant number of iterations, then the frequency has raised from 1/2 to at least 3/4 in this number of steps. By a union bound over these many iterations, the probability that a frequency over 3/4 drops to less than 1/2 before returning to at least 3/4 is at least 1 − e−Ω(µ) = 1 − e−Ω(c log n) as claimed above. Choosing c large enough, we obtain that always pt,i ≥ 1/2 within n2 steps with high probability, provided that the frequency was at least 3/4 at the start of the phase. The latter is fulfilled since our consideration start at the first time where Xt = 1 − 1/n. Using the bound pt,i ≥ 1/2 just derived, we apply Lemma 6 again and obtain for qt,i = 1 − pt,i that E(qt,i − qt+1,i | qt,i ) = Ω(qt,i ). Hence, using additive drift, the expected return time from state j/µ (with respect to the q-values), where j ∈ {1, . . . , µ/2}, to state 0 is O(k). Note that this bound is linear in k. Since the expected successor state of 0, when left, is O(1/µ), the expected return time to 0 after having left 0 is O(1) as well. Finally, note that the probability of leaving state 0 is O(µ/n). Hence, looking into an arbitrary time after reaching the upper border for the first time, the frequency has an expected value of at least 1 − O(1/n) (see Lemma 8 below for a detailed argumentation). Consequently, if there are k bits that have been at the upper border at least once, the 21 probability of sampling only 1s at all these bits is at least     k  Y 1 1 1−O 1− = Ω(1). n n i=1 This still allows the optimum to be sampled with probability Ω(1) after the potential on the bits that never have hit the border so far has decreased below c′ . Finally, we have to justify why E(σt′ ) = O(1) after for all t′ ≥ t within n2 steps after the first time t where φt = O(1). The frequencies that never have been at the upper border are at most 1 − 1/µ = 1 − ω(1/n), contribute O(1) to φt by assumption and, as already analyzed, will in expectation not decrease towards time t + 1. The remaining frequencies have an expected value of 1 − O(1/n) (by the analysis above), so their expected contribution to the φt′ -value is O(1) for all t′ ≥ t by induction. The claim follows since always σt ≤ φt . Finally, we give a proof of a property that was only sketched in the proof of Theorem 4 above. A frequency is considered after the first point of time where it has hit the upper border and proved to be very likely to stay there in subsequent steps. Due to the Markov property, the time where the order is hit can w. l. o. g. be assume to be 0. Lemma 8. Let µ = o(n). Consider the frequencies pt , t ≥ 0, belonging to an arbitrary but fixed bit and suppose that • p0 = 1 − 1/n • E(σt ) = O(1) for all t ≥ 0 and • pt ≥ 1/2 for all pt ≥ 0. Then for all t ≥ 0 the probability of sampling a one at the bit is 1 − O(1/n). Proof. Consider an arbitrary point in time t where pt = 1 − 1/n. We analyze the distribution of pt+1 (so we consider the original state space of the frequencies and not the complementary probabilities used in the main theorem). Since the µ best individuals are biased towards one-entries, the number of zero-bits sampled at the bit among the µ best is stochastically smaller than Z ∼ Bin(µ, 1/n). Since µ = o(n), even the expected number of zero-bits sampled is o(1). Hence Pr(Z = k) is exponentially decreasing in k. Therefore, under the condition that pt+1 < 1 − 1/n (which means that at least one zero-bit is sampled), the expected number is 0-bits sampled is O(1) and the expected value of pt+1 is (µ − O(1))/µ. As the process is a submartingale (unless it has hit the upper border) also the expected value of pt+i , i ≥ 2, is bounded in the same way. We will show in the remainder of the proof that for all t ≥ 0, we have Pr(pt = 1 − 1/n) = 1 − O(µ/n) ≥ 1 − cµ/n for some constant c > 0. Using the law of total probability to combine the cases pt = 1 − 1/n and pt < 1 − 1/n, we obtain that a 1-bit is sampled at time t with probability at least    1 cµ µ − O(1) cµ  = 1 − O(1/n). 1− + 1− n n n µ 22 We are left with the claim Pr(pt = 1 − 1/n) = 1 − O(µ/n). Recall that on pt+1 < 1 − 1/n we have E(pt+1 ) = (µ − O(1))/µ. It also follows from the second and third assumption of the lemma that we have additive drift Ω(1) the whole time. The expected time to raise the frequency from i/µ to 1 − 1/n is therefore O(µ − i), which is linear in i. Hence, after state 1 − 1/n has been left, the total expected time to return to 1 − 1/n is O(1). By Markov’s inequality, there is a constant c such that after c steps the process has returned to 1 − 1/n with probability at least 1/2. Again using the submartingale property, the expected state after c steps is no less than the state before these steps. Hence, we can repeat the argumentation and obtain that after every block of c steps the process has returned to 1 − 1/n with probability at least 1/2. We take now a simpler view by means of a two-state Markov chain, where state 0 corresponds to frequency 1− 1/n and state 1 to the rest of the states. Time is considered in blocks of c steps, which will be justified in the final paragraph of this proof. The transition probability from 0 to 1 is O(µ/n) = o(1) and the one from 1 to 0 is 1/2; the remaining probabilities are self-loops. Now, it is easy to analyze the steady state probabilities, which are 1 − O(µ/n) for state 0 and O(1/n) for state 1. Moreover, since the chain starts in state 0, simple calculations of occupation probabilities over time yield for state 0 a probability of 1 − O(µ/n) for all points of time t ≥ 0. More precisely, at the transition from time t to time t+1 the occupation probability of state 0 can only decrease by O(µ/n). When state 1 exceeds an occupation probability of c′ µ/n for a sufficiently large constant c′ > 0, the process goes to state 0 with probability at least c′ µ/(2n), which is less than the decrease of the occupation probability for state 0 for c′ large enough. Hence, the occupation probability of state 0 cannot drop below 1 − O(µ/n). Finally, we argue why we may consider phases of length c in the Markov chain analysis. Note that only every c-th step a transition from state 1 to 0 is possible (in our pessimistic model), however, in fact every step can transit from state 0 to 1. Formally, we have to work in these additional steps in our two-state model. We do so by increasing the probability of leaving state 0 by a factor of c, which vanishes in the O(µ/n) bound used above. We have now concluded the proof of Theorem 4. As mentioned before, we can from this theorem extract a second value of µ that gives the O(n log n) runtime bound, namely µ = c′ log n. We also believe that values µ = o(log n) will lead to a too coarse-grained frequency scale and exponential lower bounds on the runtime, which can be regarded as another phase transition in the behavior. We do not give a proof here but only mention that such a phase transition from polynomial to exponential runtime is known from ACO algorithms and non-elitist (1, λ) EAs when a parameter crosses log n [21, 23]. Conclusions √ We have analyzed the UMDA on OneMax and obtained the upper bounds O(µ n) and √ O(µn) on its expected runtime in different domains for µ, more precisely if µ ≥ c n log n and µ ≥ c′ log n, respectively, where c, c′ are positive constants. This implies an expected 23 runtime of O(n log n) for two asymptotic values of µ, closing the previous gap between √ the lower bound Ω(µ n + n log n) and the upper bound O(n log n log log n). In our proofs, we provide detailed tools for the analysis of the stochastic processes at single frequencies in the UMDA. We hope that these tools will be fruitful in future analyses of EDAs. We note that all our results assume λ = O(µ). However, we do not think that larger λ can be beneficial; if λ = αµ, for α = ω(1), the progress due to 2nd-class individuals can be by a factor of at most α bigger; however, also the computational effort per generation would grow by this factor. A formal analysis of other ratios between µ and λ is open, as is the case of sublogarithmic µ. Moreover, we do not have lower bounds matching the upper bounds from Theorem 3 if µ is in the regime where both µ = ω(log n) and √ µ = o( n log n). Acknowledgments Financial support by the Danish Council for Independent Research (DFF-FNU 4002–00542) is gratefully acknowledged. A A.1 Appendix Proof of Theorem 1 We will use Hajek’s drift theorem to prove Lemma 1. As we are dealing with a stochastic process, we implicitly assume that the random variables Xt , t ≥ 0, are adapted to some filtration Ft such as the natural filtration X0 , . . . , Xt , t ≥ 0. We do not formulate the theorem using a potential/Lyapunov function g mapping from some state space to the reals either. Instead, we w. l. o. g. assume the random variables Xt as already obtained by the mapping. The following theorem follows immediately from taking Conditions D1 and D2 in [11] and applying Inequality (2.8) in a union bound over L(ℓ) time steps. Theorem 5 ([11]). Let Xt , t ≥ 0, be real-valued random variables describing a stochastic process over some state space, adapted to a filtration Ft . Pick two real numbers a(ℓ) and b(ℓ) depending on a parameter ℓ such that a(ℓ) < b(ℓ) holds. Let T (ℓ) be the random variable denoting the earliest point in time t ≥ 0 such that Xt ≤ a(ℓ) holds. If there are λ(ℓ) > 0 and p(ℓ) > 0 such that the condition  1 E e−λ(ℓ)·(Xt+1 −Xt ) | Ft ; a(ℓ) < Xt < b(ℓ) ≤ 1 − p(ℓ) holds for all t ≥ 0 then for all time bounds L(ℓ) ≥ 0  Pr T (ℓ) ≤ L(ℓ) | X0 ≥ b(ℓ) ≤ e−λ(ℓ)·(b(ℓ)−a(ℓ)) · L(ℓ) · D(ℓ) · p(ℓ),   where D(ℓ) = max 1, E e−λ(ℓ)·(Xt+1 −b(ℓ)) | Ft ; Xt ≥ b(ℓ) . 24 (∗) Proof of Theorem 1. We will apply Theorem 5 for suitable choices of its variables, some of which might depend on the parameter ℓ = b−a denoting the length of the interval [a, b]. The following argumentation is also inspired by Hajek’s work [11]. Fix t ≥ 0. For notational convenience, we let ∆ := (Xt+1 − Xt | Ft ; a < Xt < b) and omit to state the filtration Ft hereinafter. The aim is to bound the moment-generating function (mgf.) from Condition (∗). First we observe that it is sufficient to bound the mgf. of ∆ · 1{∆ ≤ κǫ} since E(e−λ∆ ) = E(e−λ∆1{∆≤κǫ}−λ∆1{∆>κǫ} ) = E(e−λ∆1{∆≤κǫ} e−λ∆1{∆>κǫ} ) ≤ E(e−λ∆1{∆≤κǫ} ), using ∆1{∆ > κǫ} > 0 and hence e−λ∆1{∆>κǫ} ≤ 1. In the following, we omit the factor 1{∆ ≤ κǫ} but implicitly multiply ∆ with it all the time. To establish Condition (∗), it is sufficient to identify values λ := λ(ℓ) > 0 and p(ℓ) > 0 such that 1 . E(e−λ∆ ) ≤ 1 − p(ℓ) Using the series expansion of the exponential function, we get E(e−λ∆ ) = 1 − λE(∆) + = 1 − λǫ + ∞ X (−λ)k k=2 k! ∞ X (−λ)k k=2 k! E(∆k )   E(∆k 1{∆ ≥ 0}) + E(∆k 1{∆ < 0}) . We first concentrate on the positive steps in the direction of the expected value, more precisely, we consider for any odd k ≥ 3 Mk := λk+1 λk E(∆k 1{∆ ≥ 0}) − E(∆k+1 1{∆ ≥ 0}). k! (k + 1)! Since we implicitly multiply with 1{∆ ≤ κǫ}, we have ∆k 1{∆ ≥ 0} ≤ (κǫ)k and hence |E(∆k+1 1{∆ ≥ 0})/E(∆k 1{∆ ≥ 0})| ≤ κǫ. By choosing λ ≤ 1/(κ2 ǫ), we have Mk ≥ λk λk E(∆k 1{∆ ≥ 0}) − 2 κǫE(∆k 1{∆ ≥ 0}) ≥ 0, k! κ ǫ(k + 1)! for k ≥ 3, using κ ≥ 1. Hence, λ2 E(∆2 1{∆ ≥ 0}) 2 1 ≤ 1 − λǫ + λ 2 (κǫ)2 ≤ 1 − λǫ/2 2κ ǫ E(e−λ∆ ) ≤ 1 − λǫ + using again λ ≤ 1/(κ2 ǫ). So, we have estimated the contribution of all the positive steps by 1 − λE(∆)/2. 25 We proceed with the remaining terms. We overestimate the sum by using ∆′ := |∆·1{∆ < 0})| and bounding (−λk ) ≤ λk in all terms starting from k = 2. Incorporating the contribution of the positive steps, we obtain for all γ ≥ λ E(e−λ∆ ) ≤ 1 − ∞ λ λ2 X γ k E(∆) + 2 E(∆′k ) 2 γ k! k=2 ∞ 2 X λ λ ≤ 1 − E(∆) + 2 2 γ ′ γk E(eγ∆ ) λ E(∆′k ) ≤ 1 − ǫ + λ2 , k! 2 γ2 k=0 | {z } =:C(γ) where the last inequality uses the first condition of the theorem, i. e., the bound on the drift. Given any γ > 0, choosing λ := min{1/(κ2 ǫ), γ, ǫ/(4C(γ))} results in E(e−λ∆ ) ≤ 1 − ǫ λǫ 1 λ ǫ+λ· · C(γ) = 1 − = 1− 2 4C(γ) 4 p(ℓ) with p(ℓ) := 4/(λǫ). ′ The aim is now to choose γ in such a way that E(eγ∆ ) is bounded from above by a constant. We get γ∆′ E(e ) ≤ ∞ X γ(j+1)r e j=0 Pr(∆ ≤ −jr) ≤ ∞ X eγ(j+1)r e−j j=0 where the inequality uses the second condition of the theorem. Choosing γ := 1/(2r) yields ′ E(eγ∆ ) ≤ ∞ X e(j+1)/2−j = e1/2 ∞ X j=0 j=0 e−j/2 = e1/2 1 ≤ 4.2. 1 − e−1/2 Hence, λ ≤ ǫ/(4 · 4.2r 2 ) ≤ ǫ/17r 2 . From the definition of λ, we altogether have λ = min{1/(2r), ǫ/(17r 2 ), 1/(κ2 ǫ)}. Since p(ℓ) = 4/(λǫ), we know p(ℓ) = O(r/ǫ + r 2 /ǫ2 + κ2 ). Condition (∗) of Theorem 5 has been established along with these bounds on p(ℓ) and λ = λ(ℓ). To bound the probability of a success within L(ℓ) steps, we still need a bound on D(ℓ) = max{1, E(e−λ(Xt+1 −b) | Xt ≥ b)}. If 1 does not maximize the expression then D(ℓ) = E(e−λ(Xt+1 −b) | Xt ≥ b) ≤ E(e−λ|∆| | Xt ≥ b) ′ ≤ 1 + E(eγ∆ | Xt ≥ b), where the first inequality follows from Xt ≥ b and the second one from γ ≥ λ along with the bound +1 for the positive terms as argued above. The last term can be bounded as ′ in the above calculation leading to E(eγ∆ ) = O(1) since that estimation uses only the 26 second condition, which holds conditional on Xt > a. Hence, in any case D(ℓ) = O(1). Altogether, we have e−λ(ℓ)·ℓ · D(ℓ) · p(ℓ) ≤ e−λℓ · 4 λǫ = e−λℓǫ+ln(4/(λǫ)) By the third condition, we have λℓ ≥ 2 ln(4/(λǫ)), which finally means that e−λ(ℓ)·ℓ · D(ℓ) · p(ℓ) ≤ O(e−λℓǫ/2)) Choosing L(ℓ) = eλℓ/4 , Theorem 5 yields Pr(T (ℓ) ≤ L(ℓ)) ≤ L(ℓ) · O(e−λℓ/4 ) = O(e−λℓ/4 ), which proves the theorem. References [1] Tianshi Chen, Ke Tang, Guoliang Chen, and Xin Yao. On the analysis of average time complexity of estimation of distribution algorithms. In Proc. of CEC ’07, pages 453–460, 2007. [2] Tianshi Chen, Per Kristian Lehre, Ke Tang, and Xin Yao. When is an estimation of distribution algorithm better than an evolutionary algorithm? In Proc. of CEC ’09, pages 1470–1477, 2009. [3] Tianshi Chen, Ke Tang, Guoliang Chen, and Xin Yao. Rigorous time complexity analysis of univariate marginal distribution algorithm with margins. In Proc. of CEC ’09, pages 2157–2164, 2009. [4] Tianshi Chen, Ke Tang, Guoliang Chen, and Xin Yao. Analysis of computational time of simple estimation of distribution algorithms. IEEE Transactions on Evolutionary Computation, 14(1):1–22, 2010. [5] Duc-Cuong Dang and Per Kristian Lehre. Simplified runtime analysis of estimation of distribution algorithms. In Proc. of GECCO ’15, pages 513–518. ACM Press, 2015. [6] Stefan Droste. A rigorous analysis of the compact genetic algorithm for linear functions. Natural Computing, 5(3):257–283, 2006. [7] William Feller. An Introduction to Probability Theory and Its Applications, volume 1. Wiley, 1968. [8] William Feller. An Introduction to Probability Theory and Its Applications, volume 2. Wiley, 1971. 27 [9] Tobias Friedrich, Timo Kötzing, Martin S. Krejca, and Andrew M. Sutton. The benefit of recombination in noisy evolutionary search. In Proc. of ISAAC ’15, pages 140–150. Springer, 2015. [10] Tobias Friedrich, Timo Kötzing, and Martin S. Krejca. EDAs cannot be balanced and stable. In Proc. of GECCO ’16, pages 1139–1146. ACM Press, 2016. [11] Bruce Hajek. Hitting-time and occupation-time bounds implied by drift analysis with applications. Advanced Applied Probability, 14:502–525, 1982. [12] Mark Hauschild and Martin Pelikan. An introduction and survey of estimation of distribution algorithms. Swarm and Evolutionary Computation, 1(3):111–128, 2011. [13] Daniel Johannsen. Random combinatorial structures and randomized search heuristics. PhD thesis, Universität des Saarlandes, Germany, 2010. URL http://scidok.sulb.uni-saarland.de/volltexte/2011/3529. [14] Martin S. Krejca and Carsten Witt. Lower bounds on the run time of the univariate marginal distribution algorithm on OneMax. In Proc. of FOGA 2017, pages 65–79. ACM Press, 2017. [15] Pedro Larrañaga and Jose A. Lozano, editors. Estimation of Distribution Algorithms: A New Tool for Evolutionary Computation, volume 2 of Genetic Algorithms and Evolutionary Computation. Springer, 2002. [16] Per Kristian Lehre and Phan Trung Hai Nguyen. Improved runtime bounds for the univariate marginal distribution algorithm via anti-concentration. In Proc. of GECCO ’17. ACM Press, 2017. To appear. [17] Per Kristian Lehre and Carsten Witt. Concentrated hitting times of randomized search heuristics with variable drift. In Proc. of ISAAC ’14, pages 686–697. Springer, 2014. Full technical report at http://arxiv.org/abs/1307.2559. [18] Colin McDiarmid. Concentration. In M. Habib, C. McDiarmid, J. Ramirez-Alfonsin, and B. Reed, editors, Probabilistic Methods for Algorithmic Discrete Mathematics, page 195–247. Springer, 1998. [19] Boris Mitavskiy, Jonathan E. Rowe, and Chris Cannings. Theoretical analysis of local search strategies to optimize network communication subject to preserving the total number of links. International Journal of Intelligent Computing and Cybernetics, 2(2):243–284, 2009. [20] Heinz Mühlenbein and Gerhard Paass. From Recombination of Genes to the Estimation of Distributions I. Binary Parameters. In Proc. of PPSN IV, pages 178–187. Springer, 1996. [21] Frank Neumann, Dirk Sudholt, and Carsten Witt. A few ants are enough: ACO with iteration-best update. In Proc. of GECCO ’10, pages 63–70. ACM Press, 2010. 28 [22] Pietro S. Oliveto and Carsten Witt. Improved time complexity analysis of the simple genetic algorithm. Theoretical Computer Science, 605:21–41, 2015. [23] Jonathan E. Rowe and Dirk Sudholt. The choice of the offspring population size in the (1, λ) evolutionary algorithm. Theoretical Computer Science, 545:20–38, 2014. [24] Stephen M. Samuels. On the number of successes in independent trials. The Annals of Mathematical Statistics, 36(4):1272–1278, 08 1965. [25] Dirk Sudholt. A new method for lower bounds on the running time of evolutionary algorithms. IEEE Transactions on Evolutionary Computation, 17(3):418–435, 2013. [26] Dirk Sudholt and Carsten Witt. Update strength in EDAs and ACO: How to avoid genetic drift. In Proc. of GECCO ’16, pages 61–68. ACM Press, 2016. [27] Eric W. Weisstein. Normal distribution function. In MathWorld–A Wolfram Web Resource. Accessed February 1, http://mathworld.wolfram.com/NormalDistributionFunction.html. From 2017. [28] Carsten Witt. Tight bounds on the optimization time of a randomized search heuristic on linear functions. Combinatorics, Probability and Computing, 22(2): 294–318, 2013. 29
9cs.NE
Submitted to Bernoulli arXiv: arXiv:1705.09898 arXiv:1705.09898v2 [cs.IT] 16 Jun 2017 Projection Theorems of Divergences and Likelihood Maximization Methods ATIN GAYEN and M. ASHOK KUMAR Discipline of Mathematics, Indian Institute of Technology Indore, Indore 453 553. Email: [email protected] and [email protected] Abstract: Projection theorems of divergences enable us to find reverse projection of a divergence on a specific statistical model as a forward projection of the divergence on a different but rather “simpler” statistical model, which, in turn, results in solving a system of linear equations. Reverse projection of divergences are closely related to various estimation methods such as the maximum likelihood estimation or its variants in robust statistics. We consider projection theorems of three parametric families of divergences that are widely used in robust statistics, namely the Rényi divergences (or the Cressie-Reed power divergences), density power divergences, and the relative α-entropy (or the logarithmic density power divergences). We explore these projection theorems from the usual likelihood maximization approach and from the principle of sufficiency. In particular, we show the equivalence of solving the estimation problems by the projection theorems of the respective divergences and by directly solving the corresponding estimating equations. We also derive the projection theorem for the density power divergences. Keywords: Estimating equations, power divergence, power-law family, projection theorem, relative α-entropy, Rényi divergence, robust estimation, sufficient statistics. 1. Introduction Minimum divergence1 (or minimum distance) method has a unique place in statistical inference because of its ability to trade-off between efficiency and robustness [3, 28]. Minimization of Kullback-Leibler divergence (I-divergence) or relative entropy is closely related to the maximum likelihood estimation (MLE) [17, Lemma 3.1]. MLE is not a preferred method when the data set is contaminated by some unexpected sample points called outliers. However, I-divergence can be generalized, replacing the logarithmic function by some power function, to produce divergences that are more robust with respect to outliers [2, 21]. In this paper we consider three such families of divergences that are well-known in the context of robust statistics. They are defined as follows. 1 By a divergence, we mean a non-negative extended real valued function defined for every pair of probability measures (P, Q) satisfying D(P, Q) = 0 if and only if P = Q. 1 imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 2 ATIN GAYEN AND ASHOK KUMAR Let X be a finite set. Let P := P(X ) be the space of all strictly positive probability measures2 on X . Let α > 0, α 6= 1, and let P, Q ∈ P. 1. The Dα -divergence3 (also known as Rényi divergence [30] or power divergence [29]): X 1 log P (x)α Q(x)1−α . (1.1) Dα (P, Q) := α−1 x∈X 2. The Bα -divergence (also known as density power divergence [2]): X α X 1 X Bα (P, Q) := P (x)Q(x)α−1 − P (x)α + Q(x)α . 1−α 1−α x∈X x∈X (1.2) x∈X 3. The Iα -divergence [31], [32], [26], [19] (also known as relative α-entropy [23], [24], logarithmic density power divergence [27]): Iα (P, Q) X X X 1 α log log P (x)Q(x)α−1 − P (x)α + log Q(x)α .(1.3) := 1−α 1−α x∈X x∈X x∈X Throughout the paper log stands for the natural logarithm. It should be noted that, although the above divergences are not defined for α = 1, they all coincide with the I-divergence as α → 1 [7]. That is, X P (x) . (1.4) lim Bα (P, Q) = lim Iα (P, Q) = lim Dα (P, Q) = I(P, Q) := P (x) log α→1 α→1 α→1 Q(x) x∈X In this sense each of these three classes of divergences can be regarded as a generalization of the I-divergence. Dα -divergences also arise as generalized cut-off rates in information theory [13]. The Bα -divergences belong to the Bregman class which is characterized by transitive projection rules (see [12, Eq. (3.2) and Th. 3]). The Iα -divergence (for α < 1) arises in information theory as redundancy in mismatched guessing moments [31], in mismatched compression [24], and in mismatched encoding of tasks [5]. The three classes of divergences are associated with robust inference for α > 1 in case of Bα and Iα , and α < 1 in case of Dα , as we shall see now. Suppose that X1 , . . . , Xn are an independent and identically distributed (i.i.d.) random sample drawn according to a particular member of a parametric family of probability measures, Π = {Pθ : θ ∈ Θ} ⊂ P, where Θ is an open subset of Rk . To find the MLE of the parameter θ, one needs to solve the so-called score equation or estimating equation for θ, given by n X s(Xj ; θ) = 0, (1.5) j=1 2 P can be just thought of the set of all ordered |X |-tuples with strictly positive components that sum to one. 3 Upto a monotone function, same as the Cressie-Read power divergence [8]. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 3 where s(x; θ) := ∇ log Pθ (x), called the score function and ∇ stands for gradient with respect to θ. Observe that (1.5) can be re-written as X Pb(x)s(x; θ) = 0, (1.6) x∈X where Pb (·) is the empirical probability measure of the sample X1 , . . . , Xn . In the presence of outliers in the observed sample, one modifies the score equation by scaling the score function in (1.6) by weights that down-weights the effect of outliers. The following estimating equation, referred as generalized Hellinger estimating equation, was proposed where the score function was weighted by Pb (·)α Pθ (·)1−α instead of Pb(·): X Pb (x)α Pθ (x)1−α s(x; θ) = 0, (1.7) x∈X where α ∈ (0, 1). The above estimating equation was proposed based on the following intuition. If x is an outlier in the sample, Pb(x)α is larger while Pθ (x)1−α is smaller for sufficiently smaller value of α. Hence the terms in (1.7) corresponding to outliers are down-weighted. (See [3, Sec. 4.3] and the references therein.) The following estimating equation, where the score function is weighted by power of model probability measure and equated to its hypothetical one, was proposed by Basu et. al. [2]: X X Pb(x)Pθ (x)α−1 s(x, θ) = Pθ (x)α s(x, θ), (1.8) x∈X x∈X where α > 1. Motivated by the works of Field and Smith [18] and Windham [35], further an alternative estimating equation was proposed by Jones et. al. [21] where the weights in (1.8) were normalized: P P Pb(x)Pθ (x)α−1 s(x; θ) Pθ (x)α s(x; θ) x∈X x∈X P , (1.9) = P b Pθ (x)α P (x)Pθ (x)α−1 x∈X x∈X where α > 1. It should be noted that all the three Pestimating equations coincide with the usual score equation (1.6) when α = 1, since x Pθ (x)s(x; θ) = 0. The estimating equations (1.6), (1.7), (1.8), and (1.9) are, respectively, associated with the divergences in (1.4), (1.1), (1.2), and (1.3) in a sense that will be made clear in the following. Observe that the estimating equations (1.6), (1.7), (1.8), and (1.9) are implications of the first order optimality condition of, respectively, the usual log-likelihood function and the following modified likelihood functions, hX i 1 (α) log Pb (x)α Pθ (x)1−α , (1.10) L1 (θ) := 1−α x∈X (α) L2 (θ) 1 := n n  X j=1  X αPθ (Xj )α−1 − 1 − Pθ (x)α , α−1 (1.11) x∈X imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 4 ATIN GAYEN AND ASHOK KUMAR and (α) L3 (θ)   X n hX i 1 α α−1 − log Pθ (Xj ) Pθ (x)α . log := α−1 n j=1 (1.12) x∈X Although the above likelihood functions (1.10), (1.11) and (1.12) are not defined for α = 1, it can be shown that they all coincide with the following usual log-likelihood function as α → 1: n L(θ) := 1X log Pθ (Xj ). n j=1 (1.13) Moreover, it is easy to see that the Pθ that maximizes the likelihood function in (1.10), (1.11), (1.12) or (1.13) is same as the one that minimizes Dα (Pb, Pθ ), Bα (Pb , Pθ ), Iα (Pb, Pθ ) or I(Pb , Pθ ) respectively. Thus, for MLE or “robustified MLE”, one needs to solve min D(Pb , Pθ ), (1.14) min D(P, Q) (1.15) Pθ ∈Π where D is either I, Dα , Bα or Iα . The minimizing probability measure Pθ∗ (if exists and unique) is known as the reverse D-projection of Pb on Π. A “dual” minimization problem is the so-called forward projection problem, where the minimization is over the first argument of the divergence function. Given C ⊂ P, and Q ∈ P, any P ∗ ∈ C that attains P ∈C is called a forward D-projection of Q on C. Forward projection is usually on a convex set or on an α-convex set of probability measures. Forward projection on a convex set is motivated by the well-known maximum entropy principle of statistical physics [20]. Motivation for forward projection on α-convex set comes from the so-called non-extensive statistical physics [33, 34, 23]. Forward I-projection on convex sets was extensively studied by Csiszár [9, 10, 14], Csiszár and Matúš [16], [15], Csiszár and Shields [17], and Csiszár and Tusnády [11]. Csiszár and Shields showed that the reverse I-projection on an exponential family is same as the forward I-projection on a linear family4 , which, in turn, is a solution to a system of linear equations [17, Th. 3.3]. We call such a result a projection theorem for the associated divergence. Projection theorem for I-divergence was due to an “orthogonal” relationship between the exponential family and the linear family. Projection theorem for Iα -divergence was established by Kumar and Sundaresan where the so-called αpower-law family plays the role of exponential family [24, Th. 18 and Th. 21]. Projection theorem for Dα -divergence was established by Kumar and Sason where a variant of the α-power-law family, called an α-exponential family, plays the role of exponential family and the so-called α-linear family plays the role of linear family [25, Th. 6]. Projection 4 See Definition 2. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 5 theorem for the more general class of Bregman divergences, where Bα is a subclass, was established by Csiszár and Matúš [16] using techniques from convex analysis. One of our goals in this paper is to derive the projection theorem for the Bα -divergence using elementary tools. We also identify the parametric family of probability measures associated with the projection theorem of Bα -divergence, which is yet another generalization of the exponential family. In all these projection theorems, the Pythagorean theorem of the respective divergence plays a key role. Thus projection theorems enable us to find the estimator (whether MLE or robustified MLE) as a forward projection if the estimation is done on a specific parametric family. While for MLE the required family is the exponential family, for robustified MLE, it is one of the generalized exponential families. Our contributions in this paper are the following. (a) We show that the generalized Hellinger estimating equation (1.7) and the estimating equation of Jones et al. (1.9) are equivalent under a transformation. (b) We show the equivalence of the two methods of solving the estimation problems: the one by the projection theorem and the other by directly solving the corresponding estimating equation. (c) We show that the statistics of the data that have bearing on the projection theorem (that is, projection equation) are the sufficient statistics of the underlying statistical model with respect to the associated likelihood function. (d) We derive the projection theorem for the Bα -divergence. Rest of the paper is organised as follows. The contributions mentioned in (a) and (b) are covered in section 2. The contribution mentioned in (c) is covered in section 3. The contribution in (d) is given in Appendix A. The paper ends with a summary in section 4. 2. Relationship Between Projection Theorems and Estimating Equations We now show that the solutions of the estimation problems obtained using the projection theorems and those obtained by directly solving the estimating equations are the same. Recall that, projection theorem of a divergence enables us to find the reverse projection in terms of a forward projection if the former is done on the statistical model associated with the divergence. The statistical models associated with the I, Bα , Iα and Dα divergences are, respectively, exponential family, non-normalized α-power-law family, αpower-law family, and α-exponential family which we shall define now. Indeed, for I, Bα , Iα and Dα divergences, the reverse projection (if exists) must satisfy an equation that we call a projection equation. We shall first list down the statistical models along with the projection equations associated with these divergences. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 6 ATIN GAYEN AND ASHOK KUMAR 1. Projection equation for I-divergence on exponential family: The exponential family, E := E(Q, f, Θ), characterized by a probability measure Q ∈ P, k real valued functions fi , i = 1, . . . , k on X , and parameter space Θ ⊂ Rk , is given by E = {Pθ : θ ∈ Θ} ⊂ P, where   Pθ (x) = Z(θ)−1 exp log(Q(x)) + θT f (x) for x ∈ X , (2.1) Z(θ) is a normalizing constant that makes Pθ a probability measure, and f = (f1 , . . . , fk )T . The reverse I-projection of Pb on E, if exists, is a unique solution of Eθ [f (X)] = f¯, (2.2) P where f¯ := (f¯1 , . . . , f¯k )T , f¯i := n1 nj=1 fi (Xj ) for i = 1, . . . , k, and Eθ denotes expected value with respect to Pθ . The above result was due to [17, Th. 3.3]. We call (2.2) the projection equation for I-divergence on exponential family. 2. Projection equation for Bα on non-normalized α-power-law family: The non-normalized α-power-law family, B(α) := B(α) (Q, f, Θ) ⊂ P, characterized by a Q ∈ P, k real valued functions fi , i = 1, . . . , k on X , and parameter space Θ ⊂ Rk , is defined as in Definition 3. The reverse Bα -projection of Pb on B(α) , if exists, is a unique solution of Eθ [f (X)] = f¯, by Theorem 7. (Notice that the projection equations for I and Bα -divergences are the same.) 3. Projection equation for Iα on α-power-law family: The α-power-law family, M(α) := M(α) (Q, f, Θ)5 , characterized by a Q ∈ P and k real valued functions fi , i = 1, . . . , k on X , and parameter space Θ ⊂ Rk , is given by M(α) = {Pθ : θ ∈ Θ} ⊂ P, where   1 Pθ (x) = Z(θ)−1 Q(x)α−1 + (1 − α)θT f (x) α−1 for x ∈ X , (2.3) and Z(θ) is the normalizing constant (c.f. [24, Defn. 8]). The reverse Iα -projection of Pb on M(α) , if exists, is a unique solution of     Eθ Q(X)α−1 Eθ fi (X) = f¯i , (2.4) Qα−1 Pn for i = 1, . . . , k, where Qα−1 := n1 j=1 Q(Xj )α−1 [24, Th. 18 and Th. 21]6 . 5 In the continuous case, each Student-t distribution can be seen as point-wise limit of a sequence of distributions from M(α) . (c.f. [23, Rem. 13].) 6 Notice that this result in [24] is true under the assumption that the associated linear family L determined by the functions f1 , . . . , fk is non-empty. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 7 4. Projection equation for Dα on α-exponential family: The α-exponential family, Eα := Eα (Q, f, Θ), characterized by a Q ∈ P and k real valued functions fi , i = 1, . . . , k on X , and parameter space Θ ⊂ Rk , is given by Eα = {Pθ : θ ∈ Θ} ⊂ P, where   1 Pθ (x) = Z(θ)−1 Q(x)1−α + (1 − α)θT f (x) 1−α for x ∈ X , (2.5) and Z(θ) is the normalizing constant (c.f. [25, Eq. (62)]. The reverse Dα -projection of Pb on Eα , if exists, is a unique solution of P Pθ (x)α Q(x)1−α X X x∈X Pb (x)α fi (x), Pθ (x)α fi (x) = P b(x)α Q(x)1−α P x∈X x∈X (2.6) x∈X for i = 1, . . . , k ([25, Th. 6]). (2.6) can be re-written as Eθ(α)     Eθ(α) Q(X)1−α (α) fi , fi (X) = (α) Q1−α (α) (α) (2.7) (α) where Eθ(α) denotes expectation with respect to Pθ ; Q1−α and fi are, respectively, P averages of Q(·)1−α and fi (·), with respect to Pb(α) , where P (α) (x) := P (x)α / y P (y)α is the α-scaled measure7 associated with P . Notice that while the projection equations for I and Bα depend on the sample only through f¯, the projection equations for Iα and Dα , respectively, depend on f¯/Qα−1 and (α) (α) f /Q1−α . This fact will be further explored in terms of sufficiency principle in section 3. Also notice that (2.4) and (2.7) are related by the transformations P ↔ P (α) and α ↔ 1/α. The following lemmas explore this connection further. While lemma 1 establishes the connection between M(α) and Eα , lemma 2 establishes the connection between the estimation problem based on Dα -divergence on Eα and the estimation problem based on Iα -divergence on M(α) . Lemma 1 is due to Karthik and Sundaresan [22, Th. 2], where only the reverse implication was proved though. Lemma 1. The map P 7→ P (α) establishes a one-to-one correspondence between the parametric families Eα (Q, f, Θ) and M(1/α) (Q(α) , f, Θ′ ), where n o (−α)θi Θ′ = θ′ = (θ1′ , . . . , θk′ ) : θi′ = kQk (2.8) 1−α , i = 1, . . . , k, θ ∈ Θ ,  P α 1/α . (We suppress the dependence of kQk on α for notational and kQk := x Q(x) convenience.) 7 Sometimes referred as escort measure among the physicists. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 8 ATIN GAYEN AND ASHOK KUMAR Proof. For any Pθ ∈ Eα (Q, f, Θ), we have from (2.5), for x ∈ X , α h i 1−α −α (α) 1−α T Q(x) + (1 − α)θ f (x) Pθ (x) = Z(θ) kPθ kα hn o 1−α i 11 −α α (−α) T α −1 Q(x)α 1 α ) = Z(θ)kPθ kkQk + (1 − θ f (x) α α kQk α kQk1−α h i 11 1 −α α  −1 T −1 = Z(θ)kPθ kkQk Q(α) (x) α + (1 − α1 )θ′ f (x) α . α (2.9) (α) Hence Pθ ∈ M(1/α) (Q(α) , f, Θ′ ). So, the mapping is well-defined. The map is clearly (α) (α) one-one, since it is easy to see that, if Pθ = Pη for some θ, η ∈ Θ, then Pθ = Pη . To verify it is onto, let P ∈ M(1/α) (Q(α) , f, Θ′ ) be arbitrary. Then h i 11 1 −1 T −1 P (x) = Z(θ′ )−1 Q(α) (x) α + (1 − α1 )θ′ f (x) α α hn o1−α i 1−α (1−α) T = Z(θ′ )−1 Q(x) θ f (x) + 1−α kQk kQk  α Z(θ ′ )−1  1−α + (1 − α)θT f (x) 1−α . = kQkα Q(x) This implies that P (x)1/α = and hence P (1/α) (x) = Z(θ ′ )−1/α  Q(x)1−α kQk  1 + (1 − α)θT f (x) 1−α ,  ′ −1/α Z(θ P) Q(x)1−α kQk y P (y)1/α  1 + (1 − α)θT f (x) 1−α . Hence P (1/α) ∈ Eα (Q, f, Θ) and so P (1/α) = Pθ for some θ ∈ Θ. It is now easy to show (α) that Pθ = P . Thus, for any P ∈ M(1/α) (Q(α) , f, Θ′ ), there exists Pθ ∈ Eα (Q, f, Θ) such (α) that Pθ = P . Hence the mapping is onto. Lemma 2. The following statements hold. (a) Solving the estimating equation (1.7) for Pθ ∈ Eα (Q, f, Θ) is equivalent to solving (α) the estimating equation (1.9) for the α-scaled measure Pθ ∈ M(1/α) (Q(α) , f, Θ′ ), ′ where Θ is as in (2.8). (b) Solving the projection equation (2.7) for Pθ ∈ Eα (Q, f, Θ) is equivalent to solving (α) the projection equation (2.4) for the α-scaled measure Pθ ∈ M(1/α) (Q(α) , f, Θ′ ), where Θ′ is as in (2.8). Proof. (a) The estimating equation in (1.7) can be re-written as P Pb(x)α Pθ (x)1−α s(x; θ) X x∈X = Pθ (x)s(x; θ), P b α P (x) Pθ (x)1−α x∈X (2.10) x∈X imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods since P 9 Pθ (x)s(x; θ) = 0. This can further be re-written as x∈X P b (α)  (α)  α1 −1 P (x) Pθ (x) s(x; θ) x∈X P b (α)  (α)  α1 −1 P (x) Pθ (x) = x∈X Observe that P  x∈X 1 (α) Pθ (x) α s(x; θ) P  (α)  α1 Pθ (x) . (2.11) x∈X α (α) θ (x) s(α) (x; θ) := ∇ log Pθ (x) = ∇ log PkP α θk   = ∇ log Pθ (x)α − log kPθ kα   = α s(x; θ) − ∇ log kPθ k . Hence s(x; θ) = 1 (α) (x; θ) αs + A(θ), (2.12) where A(θ) = ∇ log kPθ k. Plugging (2.12) in (2.11), we get P b(α)  (α)  α1 −1 (α) s (x; θ) P (x) Pθ (x) x∈X P x∈X  (α)  1 −1 Pb(α) (x) Pθ (x) α = P  x∈X 1 (α) Pθ (x) α s(α) (x; θ) P  x∈X 1 (α) Pθ (x) α . (2.13) (α) This is same as (1.9) with Pb, Pθ , and α, respectively, replaced by Pb (α) , Pθ , and 1/α. Thus, solving the estimating equation (1.7) for Pθ ∈ Eα (Q, f, Θ) is equivalent (α) to solving (1.9) for Pθ ∈ M(1/α) (Q(α) , f, Θ′ ), by lemma 1. (b) The projection equation (2.7) can further be re-written as i h 1 −1 Eθ(α) Q(α) (X) α X   Eθ(α) fi (X) = Pb (α) (x)fi (x). 1 P (α)  (α)  α −1 x∈X Pb (x) Q (x) (2.14) x∈X (α) This is same as (2.4) with Pθ , Pb , Q, and α, respectively, replaced by Pθ , Pb (α) , (α) Q , and 1/α. Thus solving (2.6) for Pθ ∈ Eα (Q, f, Θ) is equivalent to solving (α) (2.14) for Pθ ∈ M(1/α) (Q(α) , f, Θ′ ), by lemma 1. We are now ready to state the main result of this section. Theorem 1. The solutions of the estimation problems based on the estimating equations (1.6), (1.7), (1.8), and (1.9) on E, Eα , B(α) , and M(α) respectively, is same as the solutions obtained from their corresponding projection equations. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 10 ATIN GAYEN AND ASHOK KUMAR Proof. (a) MLE on exponential family E: For Pθ ∈ E, log Pθ (x) = − log Z(θ) + log Q(x) + θT f (x). (2.15) Hence (1.5) implies that n ∇ log Z(θ) = 1X f (Xj ). n j=1 (2.16) Since Eθ [∇ log Pθ (X)] = 0, (2.15) implies that ∇ log Z(θ) = Eθ [f (X)]. (2.17) Thus, from (2.16) and (2.17), we see that the MLE must satisfy Eθ [f (X)] = f¯, which is same as the projection equation for I-divergence. (b) Robust estimation based on (1.8) on B(α) : The estimating equation (1.8) can be re-written as X X Pb (x)Pθ (x)α−2 ∇Pθ (x) = Pθ (x)α−1 ∇Pθ (x). x∈X (2.18) x∈X For Pθ ∈ B(α) , from (A.22) we have ∇Pθ (x)    1 −1 = − Q(x)α−1 + (1 − α) Z(θ) + θT f (x) α−1 [∇Z(θ) + f (x)] = −Pθ (x)2−α [∇Z(θ) + f (x)]. Substituting this in (2.18), we get Eθ [f (X)] = f¯, which is same as the projection equation for Bα -divergence. (c) Robust estimation based on (1.9) on M(α) : The estimating equation (1.9) can be re-written as 1 n n P Pθ (Xi )α−2 ∇Pθ (Xi ) i=1 1 n n P i=1 = Pθ (Xi )α−1 P x∈X Pθ (x)α−1 ∇Pθ (x) P . Pθ (x)α (2.19) x∈X Now if Pθ ∈ M(α) , then from (2.3) we have   Pθ (x)α−1 = Z(θ)1−α Q(x)α−1 + (1 − α)θT f (x) for x ∈ X . (2.20) imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 11 Differentiating (2.20) with respect to θ, we get Pθ (x)α−2 ∇Pθ (x)   = −Z(θ)−α ∇Z(θ) Q(x)α−1 + (1 − α)θT f (x) − Z(θ)1−α f (x)    = −Z(θ)1−α Z(θ)−1 ∇Z(θ) Q(x)α−1 + (1 − α)θT f (x) + f (x) . (2.21) Using (2.20) and (2.21), left-hand side of (2.19) becomes 1 n − n n P j=1 o   Z(θ)−1 ∇Z(θ) Q(Xj )α−1 + (1 − α)θT f (Xj ) + f (Xj ) n   P Q(Xj )α−1 + (1 − α)θT f (Xj ) 1 n j=1 = −Z(θ)−1 ∇Z(θ) − f¯ Qα−1 + (1 − α)θT f¯ . Similarly, using (2.20) and (2.21), one can show that the right-hand side of (2.19) is   1 P f (x) Q(x)α−1 + (1 − α)θT f (x) α−1 x∈X −Z(θ)−1 ∇Z(θ) − .  α P  Q(x)α−1 + (1 − α)θT f (x) α−1 x∈X Hence (2.19) is same as f¯ Qα−1 + (1 − α)θT f¯ P x∈X =   1 f (x) Q(x)α−1 + (1 − α)θT f (x) α−1 P  x∈X  α Q(x)α−1 + (1 − α)θT f (x) α−1 . Using (2.20) the above can be re-written as f¯ Qα−1 + (1 − α)θT f¯ = Eθ [f (X)] . Eθ [Q(X)α−1 + (1 − α)θT f (X)] (2.22) Hence the estimator Pθ must satisfy the above equation. On the other hand, the projection equation (2.4) can be re-written as This implies   Eθ fi (X) = f¯i Qα−1   Eθ Q(X)α−1 , for i = 1, . . . , k.    θT f¯  Eθ Q(X)α−1 . θT Eθ f (X) = Qα−1 imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 12 ATIN GAYEN AND ASHOK KUMAR The above two equations can be combined to (1 − α)θT f¯ Qα−1 f¯i  =  =   , Eθ fi (X) Eθ Q(X)α−1 (1 − α)θT Eθ f (X)  for i = 1, . . . , k. This implies that the reverse projection Pθ must satisfy f¯ Qα−1 + (1 − α)θT f¯  i =  , Eθ fi (X) Eθ Q(X)α−1 + (1 − α)θT f (X) for i = 1, . . . , k. (2.23) This is same as (2.22) derived from the estimating equation. Hence any solution of the projection equation (2.4) is a solution of the estimating equation (2.22). Hence, it suffices to show that, if (2.22) has a solution, it is unique. To this end, we define Φ := (φ1 , . . . , φk ), where    Eθ fi (X) Qα−1 + (1 − α)θT f¯ E [f (X)]Pθα−1  = θ i φi (θ) := , for i = 1, . . . , k, kPθ kα Eθ Q(X)α−1 + (1 − α)θT f (X) (2.24) where the second equality follows from (2.20). Then (2.22) reduces to solving Φ(θ) = f¯ (2.25) for θ. Thus it remains to show that the mapping θ 7→ Φ(θ) is one-one. This is indeed the case. The proof is given in Appendix B. (d) Robust estimation based on (1.7) on Eα : This clearly follows from (c) in view of lemmas 1 and 2. 3. Projection Theorems and the Principle of Sufficiency In the previous section we studied four estimation problems respectively on four statistical models from the perspectives of projection theorems and estimating equations. We observed that the estimating equations or the projection equations arising from these estimation problems depended on the given sample only through some specific statistics of the sample. In this section we explore this observation further from the principle of sufficiency. The following result, known as factorization theorem [6, Th. 6.2.6], tells us a way to identify the sufficient statistics from the log-likelihood function. Factorization Theorem: Let X1 , . . . , Xn be an i.i.d. random sample drawn according to some model Pθ , θ ∈ Θ. A statistic T (X1 , . . . , Xn ) is a sufficient statistic for θ if and only if there exists functions g(θ, T (X1 , . . . , Xn )) and h(X1 , . . . , Xn ) such that the log-likelihood function L(θ) in (1.13) can be written as L(θ) = g(θ, T (X1 , . . . , Xn )) + h(X1 , . . . , Xn ), (3.1) imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 13 for all sample points (X1 , . . . , Xn ) and for all θ ∈ Θ. However, when the data set is contaminated, we saw in section 1 that one should use some modified likelihood function for inference instead of the usual log-likelihood function. The quantities in (1.10), (1.11) and (1.12) are some examples of modified likelihood functions. Suppose that LG is one of the modified likelihood functions in (1.10) - (1.12). The robust estimator of θ is given by θE := arg max LG (θ). θ (3.2) Now, if we can analogously write the modified likelihood function LG as in (3.1), that is, if LG (θ) = g(θ, T (X1 , . . . , Xn )) + h(X1 , . . . , Xn ), (3.3) for some functions g and h, then we have θE = arg max LG (θ) θ = arg max[g(θ, T (X1 , . . . , Xn )) + h(X1 , . . . , Xn )] θ = arg max g(θ, T (X1 , . . . , Xn )). θ This means that the robustified MLE depends on the sample only through the function T (·). Thus it is reasonable to call such T (·) a sufficient statistics for θ with respect to the modified likelihood function. In view of this, in the following theorem, we find the sufficient statistics for the parameters of each of the families E, B(α) , M(α) and Eα when the appropriate likelihood function is used. Theorem 2. Let X1 , . . . , Xn be an i.i.d. random sample drawn according to one of the statistical models E, B(α) , M(α) or Eα . Then the following statements hold. (a) For E, T1 (X1 , . . . , Xn ) = f¯ is a sufficient statistic for θ with respect to the usual log-likelihood function L(θ) in (1.13). (b) For B(α) , T2 (X1 . . . , Xn ) = f¯ is a sufficient statistic for θ with respect to the like(α) lihood function L2 (θ) in (1.11). (α) (c) For M , T3 (X1 . . . , Xn ) = f¯/Qα−1 is a sufficient statistic for θ with respect to (α) the likelihood function L3 (θ) in (1.12). (α) (α) (d) For Eα , T4 (X1 . . . , Xn ) = f /Q1−α is a sufficient statistic for θ with respect (α) to the likelihood function L1 (θ) in (1.10). Proof. (a) See [6, Th. 6.2.10]. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 14 ATIN GAYEN AND ASHOK KUMAR (b) For Pθ ∈ B(α) , using (A.22), the likelihood function in (1.11) can be re-written as  X n   1 X α Q(Xj )α−1 + (1 − α)[Z(θ) + θT f (Xj )] − 1 (α) L2 (θ) = − Pθ (x)α n j=1 α−1 x∈X i h X 1 α + αθT f¯ + Pθ (x)α Qα−1 − αZ(θ) + = α−1 α−1 x∈X = h(X1 , . . . , Xn ) + g(θ, T2 (X1 , . . . , Xn )), where α h(X1 , . . . , Xn ) := α−1 Qα−1 , T2 (X1 , . . . , Xn ) := f¯, h and g(θ, T2 (X1 , . . . , Xn )) := − αZ(θ) + 1 α−1 i P Pθ (x)α . + αθT f¯ + x∈X Hence T2 (X1 , . . . , Xn ) = f¯ is a sufficient statistics for θ. (c) For Pθ ∈ M(α) , using (2.20), the likelihood function in (1.12) can be re-written as (α) L3 (θ) n i h1 X X  α = Pθ (x)α Z(θ)1−α Q(Xj )α−1 + (1 − α)θT f (Xj ) − log log α−1 n j=1 x∈X X   α T ¯ α α−1 log Q = −α log Z(θ) + + (1 − α)θ f − log Pθ (x) α−1 x∈X    α α log Qα−1 + log 1 + (1 − α) θT f¯/Qα−1 = −α log Z(θ) + α−1 α−1 X − log Pθ (x)α  = h(X1 , . . . , Xn ) + g θ, T3 (X1 , . . . , Xn ) , where T3 (X1 , . . . , Xn ) := f¯/Qα−1 , h(X1 , . . . , Xn ) := g(θ, T3 (X1 , . . . , Xn )) := −α log Z(θ) + x∈X α α−1 log Qα−1 , and    α log 1 + (1 − α) θT f¯/Qα−1 α−1 X − log Pθ (x)α . x∈X Hence T3 (X1 , . . . , Xn ) = f¯/Qα−1 is a sufficient statistics for θ. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 15 (d) For Pθ ∈ Eα , using (2.5), the likelihood function in (1.10) can be re-written as (α) L1 (θ) = = hX i  1 log Pb(x)α Z(θ)α−1 Q(x)1−α + (1 − α)θT f (x) 1−α x∈X i h (α) 1 (α) log 1 + (1 − α)θT f /Q1−α − log Z(θ) + 1−α X 1 + log Pb (x)α Q(x)1−α 1−α x∈X = h(X1 , . . . , Xn ) + g(θ, T4 (X1 , . . . , Xn )), where (α) (α) (α) (α) with f being, respectively, averand Q1−α T4 (X1 , . . . , Xn ) := f /Q1−α ages of f (·) and Q(·)1−α with respect to the measure Pb (α) , oi h n (α) 1 (α) g(θ, T4 (X1 , . . . , Xn )) := − log Z(θ) + , log 1 + (1 − α) θT f /Q1−α 1−α and P 1 h(X1 , . . . , Xn ) := 1−α Pb (x)α Q(x)1−α . log x∈X (α) Hence T4 (X1 , . . . , Xn ) = f /Q1−α (α) is a sufficient statistic for θ. (α) (α) Thus the sufficient statistics f¯, f¯/Qα−1 , and f /Q1−α are precisely the statistics of the sample that influence the projection equations (2.2), (2.4), and (2.7) respectively. 4. Summary In this paper we studied four estimation problems on four statistical models distinctively associated with them. Each of these estimation problems can be regarded as a reverse projection problem of one of the divergences I, Bα , Iα and Dα , on one of these statistical models. Projection theorems tell us that, the reverse projection, if exists, is the unique solution of an equation, called projection equation. While the projection equations are simple and easy to interpret in the case of I and Bα -divergences, it is not so in the case of Iα and Dα -divergences. Our objective in this paper was to understand these projection theorems (that is, projection equations) from the usual statistical method of solving by estimating equations. In the case of I and Bα -divergences, we saw that the projection equations and the estimating equations are the same and both depended only on the statistics of f which is one of the defining entity of the underlying statistical model. However, in the case of Iα and Dα -divergences, the estimating equations and the projection equations are different and both depended not only on the statistics of f but also on Q which is other defining entity of the model. Nevertheless, we showed that, in the case of Iα and Dα also, the solutions of the estimation problems obtained both imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 16 ATIN GAYEN AND ASHOK KUMAR from the projection equations and from the estimating equations are the same. We then tried to understand the projection theorems via sufficient statistics in the sense of generalized likelihood functions and observed that the estimating equations (or the projection equations) depended on the given sample only through these sufficient statistics. Appendix A: Projection Theorem for Density Power Divergence The Projection theorem and the Pythagorean property of the more general class of Bregman divergences were established by Csiszár and Matúš [16] in generality using tools from convex analysis. The density power divergences Bα is a subclass of the Bregman divergences. However, it is hard to extract the results for the Bα -divergence from [16]. Hence we derive those results for the Bα -divergence using some elementary tools as in [17] for the KL-divergence. We must point out that the geometry of Bα -divergence is quite a natural extension of that of KL-divergence. Here we assume that P := P(X ) is the space of all probability measures on X . Let Bα be as defined in (1.2)8 . Let us also recall the definitions of reverse and forward projections given in (1.14) and (1.15). Definition 1. For P ∈ P, the support of P is defined as Supp(P ) = {x ∈ X : P (x) > 0}. For C ⊂ P, we will denote Supp(C) for the union of support of members of C. First we show that, while the Pythagorean inequality is always satisfied when the forward projection is on a closed convex set, equality is satisfied when the forward projection is on a linear family and α < 1. Here, in the sequel, we assume that Supp(Q) = X . Theorem 3. Let α > 0, α 6= 1. Let P ∗ be the forward Bα -projection of Q on a closed and convex set C. Then Bα (P, Q) ≥ Bα (P, P ∗ ) + Bα (P ∗ , Q) ∀P ∈ C. (A.1) ∗ Further, if α < 1, Supp(C) = Supp(P ). Proof. Let P ∈ C and define Pt (·) = (1 − t)P ∗ (·) + tP (·), for t ∈ [0, 1]. Since C is convex, Pt ∈ C. By mean-value theorem, we have for each t ∈ (0, 1), 0 ≤ = = 8 We  1 Bα (Pt , Q) − Bα (P ∗ , Q) t  1 Bα (Pt , Q) − Bα (P0 , Q) t d Bα (Pt , Q) t=t̃ , for some t̃ ∈ (0, t). dt (A.2) assume the usual convention that Bα (P, Q) = ∞ when P 6≪ Q and α < 1. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 17 Using definition of Bα , we have   α X d Bα (Pt , Q) = P (x) − P ∗ (x) Pt (x)α−1 − Q(x)α−1 . dt α−1 x∈X Therefore, using (A.2),   α X P (x) − P ∗ (x) Pt̃ (x)α−1 − Q(x)α−1 ≥ 0. α−1 (A.3) x∈X Hence, as t ↓ 0, we have   α X P (x) − P ∗ (x) P ∗ (x)α−1 − Q(x)α−1 ≥ 0, α−1 (A.4) x∈X which is equivalent to (A.1). If Supp(P ∗ ) 6= Supp(C), that is, if P ∗ (x) = 0 for some x ∈ X and some P ∈ C such that x ∈ Supp(P ), and if α < 1, then the left-hand side of (A.3) goes to −∞ as t ↓ 0, which contradicts (A.3). This proves the claim. If α > 1, in general, Supp(P ∗ ) 6= Supp(C). [24, Example 2] serves as a counterexample here as well. We will now show that equality holds in (A.1) for α < 1 when C is a linear family, which we shall define now. Definition 2. The linear family, determined by k real valued functions fi , i = 1, . . . , k on X and k real numbers ai , i = 1, . . . , k, is defined as o n X L := P (x)fi (x) = ai , P ∈P: i = 1, . . . , k . (A.5) x∈X Theorem 4. Let P ∗ be the forward Bα -projection of Q on L. The following hold. (a) If α < 1, then the Pythagorean equality holds, that is, Bα (P, Q) = Bα (P, P ∗ ) + Bα (P ∗ , Q) ∀P ∈ L. (A.6) (b) If α > 1 and if Supp(P ∗ ) = Supp(L), then the Pythagorean equality (A.6) holds. Proof. (a) Let Pt be as in Theorem 3. Since Supp(P ∗ ) = Supp(L), there exists t′ < 0 such that Pt = (1 − t)P ∗ + tP ∈ L for t ∈ (t′ , 0). Hence, for every t ∈ (t′ , 0), there exists t̃ ∈ (t, 0) such that   α X P (x) − P ∗ (x) Pt̃ (x)α−1 − Q(x)α−1 ≤ 0. α−1 x∈X Proceeding as in Theorem 3, we get (A.4) with a reversed inequality. Thus we have equality in (A.4). Hence (A.6) holds. (b) Similar to (a). imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 18 ATIN GAYEN AND ASHOK KUMAR Remark 1. When α > 1, equality in (A.6) does not hold in general. [24, Example 2] serves as a counterexample here as well. We will now find an explicit expression of the forward Bα -projection in both the cases α < 1 and α > 1 separately. Theorem 5. (A.5). Let Q ∈ P and consider a linear family L of probability measures as in (a) If α < 1, the forward Bα -projection P ∗ of Q on L satisfies k X  1   θi fi (x) α−1 P ∗ (x) = Q(x)α−1 + (1 − α) Z + ∀x ∈ Supp(L), (A.7) i=1 where θ1 , . . . , θk are scalars and Z is a constant. (b) If α > 1, the forward Bα -projection P ∗ of Q on L satisfies k X  1   θi fi (x) +α−1 P ∗ (x) = Q(x)α−1 + (1 − α) Z + ∀x ∈ X , (A.8) i=1 where θ1 , . . . , θk are scalars, Z is a constant, and for any real number r, [r]+ := max{r, 0}. Proof. (a) The linear family in (A.5) can be re-written as o n X P (x)fi (x) = ai , i = 1, . . . , k . L := P ∈ P : (A.9) x∈Supp(L) Let F be the subspace of R|Supp(L)| spanned by the k vectors f1 (·) − a1 , . . . , fk (·) − ak . Then every P ∈ L can be thought of a |Supp(L)|-dimensional vector in F ⊥ . Hence F ⊥ is a subspace of R|Supp(L)| that contains a vector whose components are strictly positive as P ∗ ∈ L. It follows that F ⊥ is spanned by its probability vectors. From (A.4), we see that (A.6) is equivalent to X   P (x) − P ∗ (x) P ∗ (x)α−1 − Q(x)α−1 = 0 ∀P ∈ L. (A.10) x∈X This implies that the vector P ∗ (·)α−1 − Q(·)α−1 − X x Hence P ∗ (x)α−1 − Q(x)α−1 − X x   P ∗ (x) P ∗ (x)α−1 − Q(x)α−1 ∈ (F ⊥ )⊥ = F . k   X   P ∗ (x) P ∗ (x)α−1 − Q(x)α−1 = ci fi (x) − ai i=1 ∀x ∈ Supp(L), imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 19 for some scalars c1 , . . . , ck . This implies (A.7) for appropriate choices of Z and θ1 , . . . , θk . (b) The proof of this case is similar to the proof for relative α-entropy [24, Th. 14 (b)]. The optimization problem involved in the forward Bα -projection is min Bα (P, Q) P X subject to P (x)fi (x) = ai , (A.11) i = 1, . . . , k, (A.12) x X P (x) = 1, (A.13) x P (x) ≥ 0 ∀x ∈ X . (A.14) Hence, by [4, Prop. 3.3.7], there exists Lagrange multipliers λ1 , . . . , λk , ν, and (µ(x), x ∈ X ) respectively associated with the above constraints such that, for x ∈ X , ∂ Bα (P, Q) ∂P (x) = P =P ∗ λi [fi (x) − ai ] + µ(x) − ν, (A.15) i=1 µ(x) µ(x)P ∗ (x) Since k X ≥ = 0, 0. (A.16) (A.17)  ∂ α  P (x)α−1 − Q(x)α−1 , Bα (P, Q) = ∂P (x) α−1 (A.18) (A.15) can be re-written as k   X  α  ∗ α−1 λi fi (x) − ai + µ(x) − ν P (x) − Q(x)α−1 = α−1 i=1 for x ∈ X . (A.19) Multiplying both sides by P ∗ (x) and summing over all x ∈ X , we get  α X ∗  ν= P (x) Q(x)α−1 − P ∗ (x)α−1 . α−1 x∈X ∗ For x ∈ Supp(P ), from (A.17), we must have µ(x) = 0. Then, from (A.19), we have k P ∗ (x)α−1 = Q(x)α−1 + If P ∗ (x) = 0, from (A.19), we get  α−1 α−1X  λi fi (x) − ai − ν. α i=1 α (A.20) k Q(x)α−1 +  α−1 α−1 α−1X  λi fi (x) − ai − ν=− µ(x) ≤ 0. α i=1 α α (A.21) Combining (A.20) and (A.21) we get (A.8). imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 20 ATIN GAYEN AND ASHOK KUMAR Remark 2. The expression for P ∗ in (A.7) (or in (A.8)) is given with the multiplicative factor 1 − α in the square brackets so that the formula in (A.7) can be rewritten, with the help of α-exponential and α-logarithmic functions [24, Defn. 7], as k   P θi fi (x) , analogous to the exponential probability P ∗ (x)−1 = eα lnα (Q(x)−1 ) + Z + i=1 measure (see (2.1)). Theorem 5 suggests us to define a parametric family of probability measures that extends the usual exponential family. We first formally define this family and then show an orthogonality relationship between this family and the linear family. As a consequence we will also show that the reverse Bα -projection on this generalized exponential family is same as a forward projection on a linear family. Definition 3. The non-normalized α-power-law family9 , B(α) := B(α) (Q, f, Θ), characterized by a Q ∈ P, k real valued functions fi , i = 1, . . . , k on X , and a parameter space Θ ⊂ Rk , is given by B(α) = {Pθ : θ ∈ Θ} ⊂ P, where    1 Pθ (x) = Q(x)α−1 + (1 − α) Z(θ) + θT f (x) α−1 for x ∈ X . (A.22) Remark 3. (a) Observe that B(α) is a special case of the family F[βh] in [16, Eq. (28)] 1 [tα − αt + α − t]. when h(·) = Q(·) and β(·, t) = α−1 (b) As in the case of E, M(α) , and Eα families, the family B(α) depends on the reference measure Q only in a loose manner in the sense that any other member of B(α) can play the role of Q. The change of reference measure only corresponds to a translation of the parameter space. The following theorem and its corollary together establish an “orthogonality” relationship between the non-normalized α-power-law family and its associated linear family. Theorem 6. Let α < 1. Let B(α) be the non-normalized α-power-law family as in Definition 3 and L be the corresponding linear family determined by the same functions fi , i = 1, . . . , k and some constants ai , i = 1, . . . , k as in (A.5). If P ∗ is the forward Bα -projection of Q on L, then we have the following: (a) L ∩ cl(B(α) ) = {P ∗ } and Bα (P, Q) = Bα (P, P ∗ ) + Bα (P ∗ , Q) ∀P ∈ L. (A.23) (b) Further, if Supp(L) = X , then L ∩ B(α) = {P ∗ }. Proof. By Theorem 5, the forward Bα -projection P ∗ of Q on L is in B(α) . This implies that P ∗ ∈ L ∩ B(α) . In general, it would suffice if we prove the following: 9 This term is coined due to the fact that this family differs from the α-power-law family only in the normalizing constant. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 21 (i) Every P̃ ∈ L ∩ cl(B(α) ) satisfies (A.6) with P̃ in place of P ∗ . (ii) L ∩ cl(B(α) ) is non-empty. We now proceed to prove both (i) and (ii). (i) Let P̃ ∈ L ∩ cl(B(α) ). As P̃ ∈ cl(B(α) ), this implies there exists a sequence {Pn } ⊂ B such that Pn → P̃ as n → ∞. Since Pn ∈ B(α) , we can write (α) k X   (n) Pn (x)α−1 = Q(x)α−1 + (1 − α) Zn + θi fi (x) ∀x ∈ X (A.24) i=1 (n) (n) for some constants θ(n) = (θ1 , . . . , θk ) ∈ Rk and Zn . Now, for any P ∈ L we have, P P (x)fi (x) = ai , i = 1, . . . , k. Since P̃ ∈ L, we from the definition of linear family, x∈X P P̃ (x)fi (x) = ai , i = 1, . . . , k. Multiplying both sides of (A.24) by P (·) and also have x∈X P̃ (·) separately, we get X P (x)Pn (x)α−1 = X P̃ (x)Pn (x)α−1 = x∈X and k i h X (n) θi a i P (x)Q(x)α−1 + (1 − α) Zn + X k h i X (n) P̃ (x)Q(x)α−1 + (1 − α) Zn + θi a i , x∈X x∈X which imply X x∈X X x∈X i=1 i=1   P (x) − P̃ (x) Pn (x)α−1 − Q(x)α−1 = 0. As n → ∞, the above becomes X   P (x) − P̃ (x) P̃ (x)α−1 − Q(x)α−1 = 0, x∈X which is equivalent to (A.6). (ii) Let Pn∗ be the forward Bα -projection of Q onto the linear family n  X 1 X 1 Ln := P : ai + P (x)fi (x) = 1 − Q(x)fi (x), n n x∈X x∈X  1 o i = 1, . . . , k . By construction, 1 − n P + n1 Q ∈ Ln for any P ∈ L. Hence, since Supp(Q) = X , we have Supp(Ln ) = X . Since Ln is also characterized by the same functions fi , i = 1, . . . , k, we have Pn∗ ∈ B(α) for every n ∈ N. Hence limit of any convergent subsequence of {Pn∗ } belongs to cl(B(α) ) ∩ L. Thus cl(B(α) ) ∩ L is non-empty. This completes the proof. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 22 ATIN GAYEN AND ASHOK KUMAR Corollary 1. Let L and B(α) be characterized by the same functions fi , i = 1, . . . , k. Then L ∩ cl(B(α) ) = {P ∗ } and Bα (P, Q) = Bα (P, P ∗ ) + Bα (P ∗ , Q) ∀P ∈ L, ∀Q ∈ cl(B(α) ). (A.25) Proof. By Theorem 6, we have L ∩ cl(B(α) ) = {P ∗ }. In view of Remark 3(b), notice that every member of B(α) has the same projection on L, namely P ∗ . Hence (A.25) holds for every Q ∈ B(α) . Thus we only need to prove (A.25) for every Q ∈ cl(B(α) ) \ B(α) . Let Q ∈ cl(B(α) ) \ B(α) . There exists {Qn } ⊂ B(α) such that Qn → Q. Hence, for any P ∈ L, Bα (P, Qn ) = Bα (P, P ∗ ) + Bα (P ∗ , Qn ) ∀n ∈ N. (A.26) 10 Taking limit as n → ∞, we have (A.25) . This completes the proof. The following theorem tells us that a reverse Bα -projection on a non-normalized αpower-law family can be turned into a forward Bα -projection on the associated linear family. We shall refer this as the projection theorem for the Bα -divergence. Theorem 7. Let α < 1. Let B(α) be as in Definition 3 and let X1 , . . . , Xn be an i.i.d. sample drawn according to a particular member of B(α) . Let Pb be the empirical probability measure of X1 , . . . , Xn and let n o X b := P ∈ P : L P (x)fi (x) = f¯i , i = 1, . . . , k , (A.27) x∈X Pn ∗ b where f¯i = j=1 fi (Xj ), i = 1, . . . , k. Let P be the forward Bα -projection of Q on L. Then the following hold. (i) If P ∗ ∈ B(α) , then P ∗ is the reverse Bα -projection of Pb on B(α) . (ii) If P ∗ ∈ / B(α) , then Pb does not have a reverse Bα -projection on B(α) . However, P ∗ is the reverse Bα -projection of Pb on cl(B(α) ). 1 n b is so constructed that Pb ∈ L. b Since the families L b Proof. Let us first observe that L (α) and B are defined by the same functions fi , i = 1, . . . , k, by Corollary 1, we have b ∩ cl(B(α) ) = {P ∗ } and L Bα (Pb , Q) = Bα (Pb , P ∗ ) + Bα (P ∗ , Q) ∀Q ∈ cl(B(α) ). (A.28) Hence it is clear that the minimizer of Bα (Pb , Q) over Q ∈ cl(B(α) ) is same as the minimizer of Bα (P ∗ , Q) over Q ∈ cl(B(α) ) (Notice that this statement is also true with cl(B(α) ) replaced by B(α) ). But Bα (P ∗ , Q) over Q ∈ cl(B(α) ) is uniquely minimized by Q = P ∗ . Hence, if P ∗ ∈ / B(α) , since minimum of Bα (Pb, Q) over Q ∈ cl(B(α) ) is same as b the minimum of Bα (P , Q) over Q ∈ B(α) , the later is not attained on B(α) . Remark 4. Theorems 6, 7, and Corollary 1 continue to hold for α > 1 as well if attention is restricted to probability measures with strictly positive components and the existence of P ∗ is guaranteed. 10 For a fixed P , Q 7→ Bα (P, Q) is continuous as a function from P to [0, ∞]. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 23 Appendix B: The Map θ 7→ Φ(θ) Defined in (2.24) is one-one: Let us first recall that Φ = (φ1 , . . . , φk ), where φi (θ) = Eθ [fi (X)]Pθα−1 , kPθ kα for i = 1, . . . , k. We will show that the determinant of the Jacobian matrix of Φ is non-zero. Then the claim follows from [1, Th. 13.6]. Let ∂j denote ∂/∂θj . Then the (i, j)th entry of the Jacobian matrix of Φ is given by ∂j φi = = = Pθα−1  kPθ kα ∂j (Eθ [fi (X)]) − Eθ [fi (X)]∂j (kPθ kα ) kPθ k2α  + Eθ [fi (X)] ∂j (Pθα−1 ) kPθ kα Pθ α−1 Eθ [fi (X)]∂j (kPθ kα ) Eθ [fi (X)] ∂j (Eθ [fi (X)]) − Pθα−1 + ∂j (Pθα−1 ) α kPθ k kPθ k2α kPθ kα i  Pθ α−1 Eθ [fi (X)] h α−1 α−1 α + ∂ (P log kP k ∂ ) . ∂ (E [f (X)]) + −P j θ j j θ i θ θ kPθ kα kPθ kα (B.1) We now calculate each of the terms in (B.1). ∂j Eθ [fi (X)]  = X x∈X = X x∈X = − ∂j [Pθ (x)]fi (x)    1  ∂j Z(θ)−1 Q(x)α−1 + (1 − α)θT f (x) α−1 fi (x) X Z(θ)−1 Pθ (x)fi (x)∂j [Z(θ)] x∈X −Z(θ)−1 X  1 −1 Q(x)α−1 + (1 − α)θT f (x) α−1 fi (x)fj (x) x∈X = −Z(θ)−1 Eθ [fi (X)]∂j [Z(θ)] X  1 −1 −Z(θ)−1 Z(θ)α−1 Pθ (x)α−1 α−1 fi (x)fj (x) x∈X = −1 −Z(θ) Eθ [fi (X)]∂j [Z(θ)] X Pθ (x)α [Pθ (x)1−α fi (x)][Pθ (x)1−α fj (x)]. 1−α −Z(θ) x∈X imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 24 ATIN GAYEN AND ASHOK KUMAR Hence Pθ α−1 ∂j (Eθ [fi (X)]) = −Pθ α−1 Z(θ)−1 ∂j [Z(θ)]Eθ(α) [Pθ1−α (X)fi (X)] kPθ kα −Z(θ)1−α Pθ α−1 Eθ(α) [Pθ1−α (X)fi (X)Pθ1−α (X)fj (X)], (B.2) where we used the fact that Eθ [fi (X)] = Eθ(α) [Pθ1−α (X)fi (X)]. kPθ kα Similarly   ∂j log kPθ kα i h X Pθ (x)α = ∂j log h x∈X  = ∂j log Z(θ)−α  X  α i Q(x)α−1 + (1 − α)θT f (x) α−1 x∈X −α = ∂j log Z(θ)   X  α  Q(x)α−1 + (1 − α)θT f (x) α−1 + ∂j log = −αZ(θ)−1 ∂j [Z(θ)] − x∈X  1 P  α Q(x)α−1 + (1 − α)θT f (x) α−1 fj (x) x∈X  α P  Q(x)α−1 + (1 − α)θT f (x) α−1 x∈X −1 = −αZ(θ) ∂j [Z(θ)] − α Z(θ)α kPθ kα = −αZ(θ)−1 ∂j [Z(θ)] − αZ(θ)1−α Z(θ) X Pθ (x)fj (x) x∈X Eθ [fj (X)] . kPθ kα (B.3) Also   ∂j (Pθα−1 ) = ∂j Z(θ)1−α Qα−1 + (1 − α)θT f¯   = (1 − α)Z(θ)−α ∂j [Z(θ)] Qα−1 + (1 − α)θT f¯ + (1 − α)Z(θ)1−α f¯j = (1 − α)Z(θ)−1 Pθ α−1 ∂j [Z(θ)] + (1 − α)Z(θ)1−α Eθ [fj (X)]Pθα−1 , kPθ kα (B.4) where in (B.4) we used the fact that Eθ [fj (X)]Pθα−1 f¯j = kPθ kα by (2.23) and (2.24). imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods Using (B.3) and (B.4), the last two terms in (B.1) together yield i  Eθ [fi (X)] h α−1 α−1 α −P + ∂ log kP k ∂ P j θ j θ θ kPθ kα " Eθ [fi (X)] Eθ [fj (X)] αPθα−1 Z(θ)−1 ∂j [Z(θ)] + αPθα−1 Z(θ)1−α = kPθ kα kPθ kα −1 +(1 − α)Z(θ) Pθ = Z(θ)−1 Pθ α−1 ∂j [Z(θ)] α−1 ∂j [Z(θ)] + (1 − Eθ [fj (X)]Pθα−1 α)Z(θ)1−α kPθ kα 25 # Eθ [fi (X)] Eθ [fi (X)] Eθ [fj (X)] + Z(θ)1−α Pθα−1 kPθ kα kPθ kα kPθ kα = Z(θ)−1 Pθ α−1 ∂j [Z(θ)]Eθ(α) [Pθ1−α (X)fi (X)] +Z(θ)1−α Pθα−1 Eθ(α) [Pθ1−α (X)fi (X)]Eθ(α) [Pθ1−α (X)fj (X)]. (B.5) Substituting (B.2) and (B.5) in (B.1), we get ∂j φi = −Pθ α−1 Z(θ)−1 ∂j [Z(θ)]Eθ(α) [Pθ1−α (X)fi (X)] −Z(θ)1−α Pθ α−1 Eθ(α) [Pθ1−α (X)fi (X)Pθ1−α (X)fj (X)] +Z(θ)−1 Pθ α−1 ∂j [Z(θ)]Eθ(α) [Pθ1−α (X)fi (X)] +Z(θ)1−α Pθα−1 Eθ(α) [Pθ1−α (X)fi (X)]Eθ(α) [Pθ1−α (X)fj (X)] = −Z(θ)1−α Pθα−1 Eθ(α) [Pθ1−α (X)fi (X)Pθ1−α (X)fj (X)] +Z(θ)1−α Pθα−1 Eθ(α) [Pθ1−α (X)fi (X)]Eθ(α) [Pθ1−α (X)fj (X)] = −Z(θ)1−α Pθα−1 Covθ(α) [Pθ1−α (X)fi (X), Pθ1−α (X)fj (X)]. (B.6) Let A denote the above covariance matrix, that is, the (i, j)th entry of A is Covθ(α) [Pθ1−α (X)fi (X), Pθ1−α (X)fj (X)]. Then A is symmetric and positive semi-definite. Let B denote the Jacobian matrix of Φ. Then, from (B.6), we have B = −Z(θ)1−α Pθα−1 A. So, B is also symmetric but negative semi-definite. If we can show that B is negative definite then then the determinant of B is non-zero. Thus it suffices to show that A is positive definite. Suppose that A is not positive definite. Then there exists a non-zero vector c = (c1 , . . . , ck )T such that cT Ac = 0. (B.7) Varθ(α) [c1 Pθ (X)1−α f1 (X) + · · · + ck Pθ (X)1−α fk (X)] = 0. (B.8) This implies Therefore, c1 Pθ (X)1−α f1 (X) + · · · + ck Pθ (X)1−α fk (X) = t, imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 26 ATIN GAYEN AND ASHOK KUMAR where t = Eθ(α) [c1 Pθ (X)1−α f1 (X) + · · · + ck Pθ (X)1−α fk (X)]. c1 f1 (·) + · · · + ck fk (·) = tPθ (·)α−1 . (B.9) As Pθ ∈ M(α) , we have Pθ (·)α−1 = Z(θ)1−α [Q(·)α−1 + (1 − α)θT f (·)], for some θ = (θ1 , . . . , θk ) ∈ Θ. Substituting this in (B.9), we get [c1 − (1 − α)tθ1 Z(θ)1−α ]f1 (·) + · · · + [ck − (1 − α)tθk Z(θ)1−α ]fk (·) −tZ(θ)1−α Q(·)α−1 = 0. (B.10) Observe that, with out loss of generality, we can assume that the vectors f1 (·), . . . , fk (·) in the α-power-law family are linearly independent. Further, in view of footnote 6, we claim that the vector Q(·)α−1 is linearly independent of the vectors f1 (·), . . . , fk (·). If T not, let Q(·)α−1 = c1 f1P (·) + · · · + ck fk (·) for P some non-zero vector c = (c1 , . . . , ck ) . α−1 P (x)[c1 f1 (x) + · · · + ck fk (x)] = 0. This P (x)Q(x) = Then, for any P ∈ L, x∈X x∈X is not possible since Q has full support. Then, from (B.10), we have t = 0 and hence c1 = · · · = ck = 0, which is a contradiction. Hence A is positive definite. This completes the proof. Acknowledgements Atin Gayen is supported by an INSPIRE fellowship of the Department of Science and Technology, Government of India. References [1] Apostol, T. M. (2002). “Mathematical Analysis,” Indian student 2nd ed., Narosa Publishing House. [2] Basu, A., Harris, I. R., Hjort, N. L., and Jones, M. C. (1998). “Robust and efficient estimation by minimising a density power divergence,” Biometrika, 85(3), pp. 549– 559. [3] Basu, A., Shioya, H., and Park, C. (2011). “Statistical Inference: The Minimum Distance Approach,” Chapman & Hall/ CRC Monographs on Statistics and Applied Probability 120. [4] Bertsekas, D. P. (2003). “Nonlinear Programming,” 2nd ed. Belmont, MA: Athena Scientific. [5] Bunte, C. and Lapidoth, A. (2014). “Encoding tasks and Rényi entropy,” IEEE Trans. Info. Theory, 60(9), pp. 5065-5076. [6] Casella, G. and Berger, R. L. (2002). “Statistical Inference,” 2nd ed. Duxbury Press. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 Projection Theorems of Divergences and Likelihood Maximization Methods 27 [7] Cichocki, A. and Amari, S. (2010). “Families of Alpha-Beta-and GammaDivergences: Flexible and Robust Measure of Similarities,” Entropy, 12, pp. 1532– 1568. [8] Cressie, N. and Read, T. R. C. (1984). “Multinomial Goodness-of-Fit Tests,” Journal of the Royal Statistical Society. Series B (Methodological), 46(3), pp. 440–464. [9] Csiszár, I. (1975). “I-divergence geometry of probability distributions and minimization problems,” Ann. Probab., 3, pp. 146–158. [10] Csiszár, I. (1984). “Sanov property, generalized I-projection, and a conditional limit theorem,” Ann. Probab., 12(3), pp. 768–793. [11] Csiszár, I. and Tusnády, G. (1984). “Information geometry and alternating minimization procedures,” Statistics and Decisions, Supp. 1, pp. 205–237. [12] Csiszár, I. (1991). “Why least squares and maximum entropy? An axiomatic approach to inference for linear inverse problems,” Ann. Statist., 19(4), pp. 2032–2066. [13] Csiszár, I. (1995). “Generalized Cutoff Rates and Rényi’s Information Measures,” IEEE Trans. Info. Theory, 41(1), pp. 26–34. [14] Csiszár, I. (1995). “Generalized projections for non-negative functions”, Acta Math. Hungar., 68(1–2), pp. 161–185. [15] Csiszár, I. and Matúš, F. (2003). “Information projections revisited,” IEEE Trans. Info. Theory, 49(6), pp. 1474–1490. [16] Csiszár, I. and Matúš, F. (2012). “Generalized minimizers of convex integral functionals, Bergman distance, Pythagorean identities.” Kybernetika, 48(4), pp. 637– 689. [17] Csiszár, I. and Shields, P. C. (2004). “Information Theory and Statistics: A Tutorial,” Foundations and Trends in Communications and Information Theory, 1(4), pp. 417–528. [18] Field, C. and Smith, B. (1994). “Robust estimation: A weighted maximum likelihood approach,” International Statistical Review, 62(3), pp. 405–424. [19] Fujisawa, H. and Eguchi, S. (2008). “ Robust parameter estimation with a small bias against heavy contamination”, J. Multivariate Anal., 99, pp. 2053–2081. [20] Jaynes, E. T. (1983). Papers on Probability, Statistics and Statistical Physics, R. D. Rosenkrantz, Ed. P.O. Box 17,3300 AA Dordrecht, The Netherlands.: Kluwer Academic Publishers. [21] Jones, M. C., Hjort, N. L., Harris, I. R., and Basu, A. (2001). “A comparison of related density based minimum divergence estimators,” Biometrika, 88(3), pp. 865– 873. [22] Karthik, P. N. and Sundaresan, R. (2017). “ On the equivalence of projections in relative α-entropy and Rényi divergence,”preprint, [Online]. Available at https://arxiv.org/abs/1701.06347. [23] Kumar, M. A. and Sundaresan, R. (2015). “Minimization problems based on relative α-entropy I: Forward Projection,” IEEE Trans. Info. Theory, 61(9), pp. 5063–5080. [24] Kumar, M. A. and Sundaresan, R. (2015). “Minimization problems based on relative α-entropy II: Reverse Projection,” IEEE Trans. Info. Theory, 61(9), pp. 5081–5095. [25] Kumar, M. A. and Sason, I. (2016). “Projection theorems for the Renyi divergence on alpha-convex sets, IEEE Trans. Info. Theory, 62(9), pp. 4924–4935. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017 28 ATIN GAYEN AND ASHOK KUMAR [26] Lutwak, E., Yang, D., and Zhang, G. (2005) “Cramér-Rao and moment-entropy inequalities for Rényi entropy and generalized Fisher information,” IEEE Trans. Info. Theory, 51(2), pp. 473–478. [27] Maji, A., Ghosh, A., and Basu, A. (2016). “The logarithmic super divergence and asymptotic inference properties,” Advances in Statistical Analysis, 100, pp. 99–131. [28] Pardo, L. (2006). “Statistical Inference Based on Divergence Measures,” Chapman & Hall/CRC, Taylor and Francis group, Boca Raton, Florida, USA. [29] Patra, S., Maji, A., Pardo, L., and Basu, A. (2013). “The power divergence and the density power divergence families: the mathematical connection,” Sankhya, Series B, 75, pp. 16–28. [30] Rényi, A. (1961). “On measures of entropy and information,” Proceedings of 4th Berekely Symposium on Mathematical Statistics and Probability, pp. 547–561, Berekeley, California, USA. [31] Sundaresan, R. (2002). “A measure of discrimination and its geometric properties,” in Proc. 2002 IEEE Int. Symp. Inf. Theory, Lausanne, Switzerland, pp. 264. [32] Sundaresan, R. (2007). “Guessing under source uncertainty,” IEEE Trans. Info. Theory, 53(1), pp. 269–287. [33] Tsallis, C. (1988). “Possible generalization of Bolzmann-Gibbs statistics,” Journal of Statistical Physics, 52(1-2), pp. 479–487. [34] Tsallis, C., Mendes, R. S., and Plastino, A. R. (1998). “The role of constraints within generalized non-extensive statistics,” Physica A, 261(34), pp. 534–554. [35] Windham, M. P. (1995). “Robustifying model fitting,” Journal of the Royal Statistical Society, Series B (Methodological), 57(3), pp. 599–609. imsart-bj ver. 2014/10/16 file: ProjectionLikelihood.tex date: June 19, 2017
7cs.IT
arXiv:1605.01746v1 [cs.NE] 5 May 2016 Biobjective Performance Assessment with the COCO Platform Dimo Brockhoff1 , Tea Tušar1 , Dejan Tušar1 , Tobias Wagner2 , Nikolaus Hansen3,4 , Anne Auger3,4 1 Inria, research centre Lille, 2 Technical University Dortmund, 3 Inria, research centre Saclay, 4 Université Paris-Saclay, LRI Abstract This document details the rationales behind assessing the performance of numerical blackbox optimizers on multi-objective problems within the COCO platform and in particular on the biobjective test suite bbob-biobj. The evaluation is based on a hypervolume of all nondominated solutions in the archive of candidate solutions and measures the runtime until the hypervolume value succeeds prescribed target values. Contents 1 Introduction 1.1 Definitions and Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2 2 Performance Assessment with a Quality Indicator 2.1 Definition of the Quality Indicator . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Rationales Behind the Performance Measure . . . . . . . . . . . . . . . . . . . . . 2.3 Specificities and Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3 4 5 3 Definition of Target Values 3.1 Target Precision Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 The Reference Hypervolume Indicator Value . . . . . . . . . . . . . . . . . . . . 6 6 7 4 Instances and Generalization Experiment 7 5 Data Storage and Future Recalculations of Indicator Values 7 1 1 Introduction The performance assessment of (numerical) optimization algorithms with the COCO platform [HAN2016co] is invariably based on the measurement of the runtime1 until a quality indicator reaches a predefined target value. On each problem instance, several target values are defined and for each target value a runtime is measured (or no runtime value is available if the indicator does not reach the target value) [HAN2016perf]. In the single-objective, noise-free case, the assessed quality indicator is, at each given time step, the function value of the best solution the algorithm has obtained (evaluated or recommended, see [HAN2016ex]) before or at this time step. In the bi- and multi-objective case, e.g. on the biobjective bbob-biobj test suite [TUS2016], the assessed quality indicator at the given time step is a hypervolume indicator computed from all solutions obtained (evaluated or recommended) before or at this time step. 1.1 Definitions and Terminology In this section, we introduce the definitions of some basic terms and concepts. function instance, problem In the case of the bi-objective performance assessment within COCO, a problem is a 5-tuple of • a parameterized function 𝑓𝜃 : R𝑛 → R2 , mapping the decision variables of a solution 𝑥 ∈ R𝑛 to its objective vector 𝑓𝜃 (𝑥) = (𝑓𝛼 (𝑥), 𝑓𝛽 (𝑥)) with 𝑓𝛼 : R𝑛 ↦→ R and 𝑓𝛽 : R𝑛 ↦→ R being parameterized (single-objective) functions themselves • its concrete parameter value 𝜃 ∈ Θ determining the so-called function instance 𝑖, • the problem dimension 𝑛, • an underlying quality indicator 𝐼, mapping a set of solutions to its quality, and • a target value 𝐼target of the underlying quality indicator, see below for details. We call a problem solved by an optimization algorithm if the algorithm reaches a quality indicator value at least as good as the associated target value. The number of function evaluations needed to surpass the target value for the first time is COCO‘s central performance measure. [HAN2016co] In case a single quality indicator is used for all problems in a benchmark suite, we can drop the quality indicator and refer to a problem as a quadruple 𝑓𝜃 , 𝜃, 𝑛, 𝐼target . Note that typically more than one problem for a function instance of (𝑓𝜃 , 𝜃, 𝑛) is defined by choosing more than one target value. Pareto set, Pareto front, and Pareto dominance For a function instance, i.e., a function 𝑓𝜃 = (𝑓𝛼 , 𝑓𝛽 ) with given parameter value 𝜃 and dimension 𝑛, the Pareto set is the set of all (Paretooptimal) solutions for which no solutions in the search space R𝑛 exist that have either an improved 𝑓𝛼 or an improved 𝑓𝛽 value while the other value is at least as good (or in other 1 Time is considered to be number of function evaluations and, consequently, runtime is measured in number of function evaluations. 2 words, a Pareto-optimal solution in the Pareto set has no other solution that dominates it). The image of the Pareto set in the objective space is called the Pareto front. We generalize the standard Pareto dominance relation to sets by saying solution set 𝐴 = {𝑎1 , . . . , 𝑎|𝐴| } dominates solution set 𝐵 = {𝑏1 , . . . , 𝑏|𝐵| } if and only if for all 𝑏𝑖 ∈ 𝐵 there is at least one solution 𝑎𝑗 that dominates it. ideal point The ideal point (in objective space) is defined as the vector in objective space that contains the optimal function value for each objective independently, i.e. for the above concrete function instance, the ideal point is given by 𝑧ideal = (inf 𝑥∈R𝑛 𝑓𝛼 (𝑥), inf 𝑥∈R𝑛 𝑓𝛽 (𝑥)). nadir point The nadir point (in objective space) consists in each objective of the worst value obtained by any Pareto-optimal solution. More precisely, if 𝒫𝒪 denotes the Pareto set, the nadir point satisfies 𝑧nadir = (sup𝑥∈𝒫𝒪 𝑓𝛼 (𝑥), sup𝑥∈𝒫𝒪 𝑓𝛽 (𝑥)). archive An external archive or simply an archive is the set of non-dominated solutions, obtained over an algorithm run. At each point 𝑡 in time (that is after 𝑡 function evaluations), we consider the set of all mutually non-dominating solutions that have been evaluated so far. We denote the archive after 𝑡 function evaluations as 𝐴𝑡 and use it to define the performance of the algorithm in terms of a (quality) indicator function 𝐴𝑡 → R that might depend on a problem’s underlying parameterized function and its dimension and instance. 2 Performance Assessment with a Quality Indicator For measuring the runtime on a given problem, we consider a quality indicator which is to be optimized (minimized). In the noiseless single-objective case, the quality indicator is the best sofar observed objective function value (recommendations can replace previous observations). In the case of the bbob-biobj test suite, the quality indicator is based on the hypervolume indicator of the archive 𝐴𝑡 . 2.1 Definition of the Quality Indicator COCO The indicator 𝐼HV to be mininized is either the negative hypervolume indicator of the archive with the nadir point as reference point or the distance to the region of interest [𝑧ideal , 𝑧nadir ] after a normalization of the objective space2 : {︂ −HV(𝐴𝑡 , [𝑧ideal , 𝑧nadir ]) if 𝐴𝑡 dominates {𝑧nadir } COCO 𝐼HV = . 𝑑𝑖𝑠𝑡(𝐴𝑡 , [𝑧ideal , 𝑧nadir ]) otherwise where )︃ ⋃︁ [︂ 𝑓𝛼 (𝑎) − 𝑧ideal,𝛼 ]︂ [︂ 𝑓𝛽 (𝑎) − 𝑧ideal,𝛽 ]︂ ,1 × ,1 HV(𝐴𝑡 , 𝑧ideal , 𝑧nadir ) = VOL 𝑧nadir,𝛼 − 𝑧ideal,𝛼 𝑧nadir,𝛽 − 𝑧ideal,𝛽 𝑎∈𝐴 (︃ 𝑡 2 We conduct an affine transformation of both objective function values such that the ideal point 𝑧ideal = (𝑧ideal,𝛼 , 𝑧ideal,𝛽 ) is mapped to (0, 0) and the nadir point 𝑧nadir = (𝑧nadir,𝛼 , 𝑧nadir,𝛽 ) is mapped to (1, 1). 3 is the (normalized) hypervolume of archive 𝐴𝑡 with respect to the nadir point (𝑧nadir,𝛼 , 𝑧nadir,𝛽 ) as reference point and where (with division understood to be element-wise, Hadamard division), ⃦ ⃦ ⃦ 𝑓 (𝑎) − 𝑧 ⃦ ⃦ ⃦ 𝑑𝑖𝑠𝑡(𝐴𝑡 , [𝑧ideal , 𝑧nadir ]) = inf 𝑎∈𝐴𝑡 ,𝑧∈[𝑧ideal ,𝑧nadir ] ⃦ 𝑧nadir − 𝑧ideal ⃦ is the smallest (normalized) Euclidean distance between a solution in the archive and the region of interest, see also the figures below for an illustration. f2 znadir f1 Fig. 1: Illustration of Coco’s quality indicator (to be minimized) in the (normalized) bi-objective case if no solution of the archive (blue filled circles) dominates the nadir point (black filled circle), i.e., the shortest distance of an archive member to the region of interest (ROI), delimited by the nadir point. Here, it is the fourth point from the left (indicated by the red arrow) that defines the smallest distance. 2.2 Rationales Behind the Performance Measure Why using an archive? We believe using an archive to keep all non-dominated solutions is relevant in practice in bi-objective real-world applications, in particular when function evaluations are expensive. Using an external archive for the performance assessment has the additional advantage that no populuation size needs to be prescribed and algorithms with different or even changing population sizes can be easily compared. 4 f2 znadir f1 Fig. 2: Illustration of Coco’s quality indicator (to be minimized) in the bi-objective case if the nadir point (black filled circle) is dominated by at least one solution in the archive (blue filled circles). The indicator is the negative hypervolume of the archive with the nadir point as reference point. Why hypervolume? Although, in principle, other quality indicators can be used in replacement of the hypervolume, the monotonicity of the hypervolume is a strong theoretical argument for using it in the performance assessment: the hypervolume indicator value of the archive improves if and only if a new non-dominated solution is generated [ZIT2003]. 2.3 Specificities and Properties In summary, the proposed bbob-biobj performance criterion has the following specificities: • Algorithm performance is measured via runtime until the quality of the archive of nondominated solutions found so far surpasses a target value. • To compute the quality indicator, the objective space is normalized. The region of interest (ROI) [𝑧ideal , 𝑧nadir ], defined by the ideal and nadir point, is mapped to [0, 1]2 . • If the nadir point is dominated by at least one point in the archive, the quality is computed as the negative hypervolume of the archive using the nadir point as hypervolume reference point. • If the nadir point is not dominated by the archive, the quality equals the distance of the 5 archive to the ROI. This implies that: • the quality indicator value of an archive that contains the nadir point as non-dominated point is 0. • the quality indicator value is bounded from below by −1, which is the quality of an archive that contains the ideal point, and • because the quality of an archive is used as performance criterion, no population size has to be prescribed to the algorithm. In particular, steady-state and generational algorithms can be compared directly as well as algorithms with varying population size and algorithms which carry along their external archive themselves. 3 Definition of Target Values For each problem instance of the benchmark suite, consisting of a parameterized function, its dimension and its instance parameter 𝜃𝑖 , a set of quality indicator target values is chosen, eventually used to measure algorithm runtime to reach each of these targets. The target values are based on a target precision ∆𝐼 and a reference hypervolume indicator value, 𝐼𝑖ref , which is an approximation COCO of the 𝐼HV indicator value of the Pareto set. 3.1 Target Precision Values All target indicator values are computed in the form of 𝐼𝑖ref + ∆𝐼 from the instance dependent reference value 𝐼𝑖ref and a target precision value ∆𝐼. For the bbob-biobj test suite, 58 target precisions ∆𝐼 are chosen, identical for all problem instances, as ∆𝐼 ∈ {−10−4 , −10−4.2 , . . . , −10−4.8 , −10−5 , 0, 10−5 , 10−4.9 , 10−4.8 , . . . , 10−0.1 , 100 } . ⏞ ⏟ six negative target precision values Negative target precisions are used because the reference indicator value, as defined in the next section, can be surpassed by an optimization algorithm.3 The runtimes to reach these target values are presented as empirical cumulative distribution function, ECDF [HAN2016perf]. Runtimes to reach specific target precisions are presented as well. It is not uncommon however that the quality indicator value of the algorithm never surpasses some of these target values, which leads to missing runtime measurements. 3 In comparison, the reference value in the single-objective case is the 𝑓 -value of the known global optimum and, consequently, the target precision values have been strictly positive [HAN2016perf]. 6 3.2 The Reference Hypervolume Indicator Value Unlike the single-objective bbob test suite [HAN2009fun], the biobjective bbob-biobj test suite does not provide analytic expressions of its optima. Except for 𝑓1 , the Pareto set and the Pareto front are unknown. Instead of the unknown hypervolume of the true Pareto set, we use the hypervolume of an approximation of the Pareto set as reference hypervolume indicator value 𝐼𝑖ref .4 To obtain the approximation, several multi-objective optimization algorithms have been run and all non-dominated solutions over all runs have been recorded.5 The hypervolume indicator value of the obtained set of non-dominated solutions, also called non-dominated reference set, separately obtained for each problem instance in the benchmark suite, is then used as the reference hypervolume indicator value. 4 Instances and Generalization Experiment The standard procedure for an experiment on a benchmark suite, like the bbob-biobj suite, prescribes to run the algorithm of choice once on each problem of the suite [HAN2016ex]. For the bbob-biobj suite, the postprocessing part of COCO displays currently by default only 5 out of the 10 instances from each function-dimension pair. 5 Data Storage and Future Recalculations of Indicator Values Having a good approximation of the Pareto set/Pareto front is crucial in assessing algorithm performance with the above suggested performance criterion. In order to allow the reference sets to approximate the Pareto set/Pareto front better and better over time, the COCO platform records every non-dominated solution over the algorithm run. Algorithm data sets, submitted through the COCO platform’s web page, can therefore be used to improve the quality of the reference set by adding all solutions to the reference set which are currently non-dominated to it. Recording every new non-dominated solution within every algorithm run also allows to recover the algorithm runs after the experiment and to recalculate the corresponding hypervolume difference values if the reference set changes in the future. In order to be able to distinguish between different collections of reference sets that might have been used during the actual benchmarking experiment and the production of the graphical output, COCO writes the absolute hypervolume reference 4 Using the quality indicator value of the true Pareto set might not be desirable, because the set contains an infinite number of solutions, which is neither a possible nor a desirable goal to aspire in practice. 5 Amongst others, we run versions of NSGA-II [DEB2002] via Matlab’s gamultiobj function, SMS-EMOA [BEU2007], MOEA/D [ZHA2007], RM-MEDA [ZHA2008], and MO-CMA-ES [VOS2010], together with simple uniform RANDOMSEARCH and the single-objective CMA-ES [HAN2001] on scalarized problems (i.e. weighted sum) to create first approximations of the bi-objective problems’ Pareto sets. 7 values together with the performance data during the benchmarking experiment and displays a version number in the plots generated that allows to retrieve the used reference values from the Github repository of COCO. Acknowledgements This work was supported by the grant ANR-12-MONU-0009 (NumBBO) of the French National Research Agency. The authors would like to thank Thanh-Do Tran for his contributions and assistance with the preliminary code of the bi-objective setting and for providing us with his extensive experimental data. We also thank Tobias Glasmachers, Oswin Krause, and Ilya Loshchilov for their bug reports, feature requests, code testing, and many valuable discussions. Special thanks go to Olaf Mersmann for the inital rewriting of the COCO platform without which the bi-objective extension of COCO would not have happened. References [BEU2007] N. Beume, B. Naujoks, and M. Emmerich (2007). SMS-EMOA: Multiobjective selection based on dominated hypervolume. European Journal of Operational Research, 181(3), pp. 1653-1669. [DEB2002] K. Deb, A. Pratap, S. Agarwal, and T. A. M. T. Meyarivan (2002). A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation, 6(2), pp. 182-197. [HAN2001] N. Hansen and A. Ostermeier (2001). Completely derandomized self-adaptation in evolution strategies. Evolutionary computation, 9(2), pp. 159-195. [HAN2016perf] N. Hansen, A. Auger, D. Brockhoff, D. Tušar, T. Tušar (2016). COCO: Performance Assessment, ArXiv e-prints, arXiv:160x.xxxxx. [HAN2016co] N. Hansen, A. Auger, O. Mersmann, T. Tušar, D. Brockhoff (2016). COCO: A Platform for Comparing Continuous Optimizers in a Black-Box Setting, ArXiv e-prints, arXiv:1603.08785. [HAN2009fun] N. Hansen, S. Finck, R. Ros, and A. Auger (2009). Real-parameter black-box optimization benchmarking 2009: Noiseless functions definitions. Technical Report RR-6829, Inria, updated February 2010. [HAN2016ex] N. Hansen, T. Tušar, A. Auger, D. Brockhoff, O. Mersmann (2016). COCO: The Experimental Procedure, ArXiv e-prints, arXiv:1603.08776. 8 [TUS2016] T. Tušar, D. Brockhoff, N. Hansen, A. Auger (2016). COCO: The Bi-objective Black Box Optimization Benchmarking (bbob-biobj) Test Suite, ArXiv e-prints, arXiv:1604.00359. [VOS2010] T. Voß, N. Hansen, and C. Igel (2010). Improved step size adaptation for the MO-CMA-ES. In Genetic and Evolutionary Computation Conference (GECCO 2010), pp. 487-494. ACM. [ZHA2007] Q. Zhang, and H. Li (2007). MOEA/D: A multiobjective evolutionary algorithm based on decomposition. IEEE Transactions on Evolutionary Computation, 11(6), pp. 712-731. [ZHA2008] Q. Zhang, A. Zhou, and Y. Jin (2008). RM-MEDA: A regularity model-based multiobjective estimation of distribution algorithm. IEEE Transactions on Evolutionary Computation, 12(1), pp. 41-63. [ZIT2003] E. Zitzler, L. Thiele, M. Laumanns, C. M. Fonseca, and V. Grunert da Fonseca (2003). Performance Assessment of Multiobjective Optimizers: An Analysis and Review. IEEE Transactions on Evolutionary Computation, 7(2), pp. 117-132. 9
9cs.NE
SKELETA OF G-PARKING FUNCTION IDEALS arXiv:1708.04712v2 [math.CO] 12 Sep 2017 ANTON DOCHTERMANN Abstract. Given a graph G, the G-parking function ideal MG is an artinian monomial ideal in the polynomial ring S with the property that a linear basis for S/MG is provided by the set of G-parking functions. It follows that the dimension of S/MG is given by the number of spanning trees of G, which by the Matrix Tree Theorem is equal to the determinant of the reduced Laplacian of G. The ideals MG and related algebras were introduced by Postnikov and Shapiro [23] where they studied their Hilbert functions and homological properties. In [14] it was shown that a minimal resolution of MG can be constructed from the graphical hyperplane arrangement associated to G, providing a combinatorial interpretation for the Betti numbers. Motivated by constructions in the theory of chip-firing on graphs, we study certain ‘skele(k) ton’ ideals MG ⊂ MG generated by subsets of vertices of G of size at most k + 1. We study (k) monomial bases of MG and provide formulas and combinatorial interpretations for the di(1) (n−2) mensions of S/MG and S/MG for the case that G = Kn+1 is the complete graph. These monomial bases have connections to various combinatorial objects including Cayley trees and determinants of the signless Laplacians, and in some cases lead to new enumerative (1) formulas. We furthermore study resolutions of MG and show that for certain graphs G a minimal resolution is supported on the decomposition of Euclidean space coming from the theory of tropical hyperplane arrangements. This leads to combinatorial interpretations of the Betti numbers of these ideals. 1. Introduction Let G = (V, E) be a simple undirected graph with vertex set V = {0, 1, . . . , n}, with distinguished sink vertex 0. In this paper we study various algebraic objects associated with combinatorial properties of G. Our point of departure will be the well-known formula of Cayley that says that the number of spanning trees of the complete graph is equal to (n+1)n−1 . This number is related to various other seemingly disparate combinatorial objects, and in particular counts the number of parking functions of length n. This correspondence can be generalized to the case of arbitrary graphs G in the context of sequence of integers known as G-parking functions. On the algebraic side this data can be encoded in the G-parking function ideal MG , a monomial ideal living in the polynomial ring S = K[x1 , x2 , . . . , xn ]. By construction the standard monomials of MG correspond to G-parking functions (this explains the name), and hence are in bijection with the number of spanning trees of G. The standard monomials form a monomial basis for the algebra S/MG and, in the case of G = Kn+1 the complete graph, Cayley’s formula says that S/MG has dimension (n + 1)n−1 . A generating set of monomials for MG is indexed by all nonempty subsets of [n] = {1, 2, . . . , n}. MG = hmσ : ∅ = 6 σ ⊆ [n]i Date: September 14, 2017. 1 2 ANTON DOCHTERMANN We refer to the next section for the definition of mσ . For the case of the complete graph Kn+1 this set gives a minimal set of generators, but for all other graphs G this generating set is redundant. The ideal MG was introduced by Postnikov and Shapiro in [23], where they study various properties of AG = S/MG . In particular they seek to compare AG to a related algebra BG , defined as the quotient of S by certain powers of linear forms. In [23] it is shown that AG and BG have the same dimension. The motivation in [23] came from certain algebras generated by curvature forms on generalized flag manifolds, in an attempt to lift Schubert calculus to the level of differential forms. In [23] the authors study homological properties of MG and show that a cellular resolution of MG is supported on B(∆n−1 ), the barycentric subdivision of the (n − 1)-dimensional simplex, which is minimal only for the case of the complete graph G = Kn+1 . The ideals MG are examples of more general monotone monomial ideals which have cellular resolutions supported on the geometric realization of certain posets. In [14] it is shown that a minimal resolution of MG is supported on a certain polyhedral complex obtained from the graphical hyperplane arrangement associated with G. In this paper we study generalizations of MG and similarly relate their algebraic properties to well-known combinatorial structures. Our motivation comes from the theory of chip-firing on G. In this context one studies the dynamical system associated with distributing chips on the vertices of a G according to edge adjacency information. The dynamics of chip-firing is governed by the Laplacian matrix LG of the graph, and it can be shown that the G-parking function ideal MG is in fact a certain initial ideal of the (binomial) lattice ideal determined by LG . Recently Backman and Paoletti and others ([1], [6]) introduced the notion of ‘hereditary set’ chip-firing, where certain subsets of vertices are allowed to fire simultaneously. This rather general notion of chip-firing interpolates between the ‘abelian sandpile’ model (where only singletons fire) and the ‘cluster model’ (where any subset is allowed to fire). One can see that the ‘stable’ configurations in the cluster model are precisely the G-parking functions. Hereditary set chip-firing shares desirable properties with the more traditional models, including stabilization that is independent of the chosen firings and a well-defined notion of a recurrent configuration. In [1] an explicit bijection between these recurrent configurations and the set of spanning trees is described. Motivated by these constructions, we study subideals of MG described by k-dimensional ‘skeleta’. Recall that MG has a (possibly redundant) set of generators mσ for every nonempty (k) subset σ ⊆ [n] = {1, 2, . . . , n}. For each integer k, define the ideal MG to be the sub ideal of MG generated by elements corresponding to subsets of cardinality at most k + 1: (k) MG = hmσ : ∅ = 6 σ ⊆ [n], |σ| ≤ k + 1i. For k = 0 the ideal is generated by powers of the variables (corresponding to the degree of the corresponding vertex), and for k = n − 1 we recover the ideal MG . We will mostly focus on the case k = 1 and k = n − 2, the one-dimensional and codimension one skeleta of MG . It turns out for these cases there is a story of free resolutions and monomial bases that runs somewhat parallel to that of MG described above. Recall that the standard monomials of MG are by construction given by the G-parking functions (and hence in bijection with the spanning trees of G). By the matrix-tree theorem SKELETA OF G-PARKING FUNCTION IDEALS 3 this number is given by the determinant of L̃G , the reduced Laplacian matrix of G. A (k) formula for the number of standard monomials of MG is not so clear even in the case that G = Kn+1 is the complete graph. In the cases that we can find such a formula, we see some intriguing connections to other combinatorial objects. Our main results along these lines are summarized by the following, we refer to subsequent sections for any undefined terms. (k) (k) Theorem (see Theorems 3.2 and 3.8 and Corollary 3.4). Let Mn := MKn+1 denote the k-skeleton ideal of the complete graph Kn+1 . Then we have the following. (1) (1) • The number of standard monomials of Mn (and hence dimK S/Mn ) is given by (2n − 1)(n − 1)n−1 . (1) This number is given by det(Q̃Kn+1 ), the determinant of the reduced signless Laplacian of the complete graph Kn+1 . (n−2) (n−2) • The number of standard monomials of Mn (and hence dimK S/Mn by (n + 1)n−1 + (n − 1)n−1 . ) is given (2) (k) We have not found a closed formula for the dimension of S/Mn for other skeleta. We remark that the value det(Q̃G ) appearing in (1) counts (in a weighted fashion) certain combinatorial substructures of the graph G, in the same way that the usual reduced Laplacian det(L̃G ) counts spanning trees (see Section 3 for details). We are unable to find an explicit (1) bijection between the standard monomials of Mn and these substructures. For arbitrary (1) graphs G we illustrate that det(Q̃G ) does not count standard monomials of MG (see Example 3.6), but some computer experimentation suggests that an inequality may hold (see Question 3.7). The value (n − 1)(n−1) appearing in (2) also has combinatorial interpretations, for example involving Cayley trees in which the root is smaller than its immediate descendant [7], but again we do not know of a bijection between these objects and the standard monomials of (n−2) (n−2) Mn . An explicit formula for the standard monomials of Mn coming directly from n−1 the definition provides ‘another way of counting’ (n − 1) in the spirit of [5]. We refer to Corollary 3.9 for details. (k) We next turn to homological properties of MG , and in particular a combinatorial description of minimal free resolutions. Recall in [23] it was shown that a cellular resolution for MG is supported on the barycentric subdivision of a simplex (with a minimal cellular (k) resolution described in [14]). To build resolutions of the skeleton ideals MG , we will search for polyhedral decompositions of the simplex that agree with B(∆n−1 ) on the appropriate subcomplex induced by subsets of cardinality at most k + 1. For the case of k = 1 there is a natural candidate coming from the the theory of tropical convexity. Our next main result is the following. (1) Theorem (see Theorem 4.6). The ideal MKn+1 has a minimal cocellular resolution supported on the labeled polyhedral complex induced by any generic arrangement of two tropical hyperplanes in Rn−1 . As was spelled out in [12], arrangements of tropical hyperplanes are intimately tied to triangulations of a product of simplices, which in turn are related to mixed subdivisions 4 ANTON DOCHTERMANN and have many pleasing combinatorial properties [11]. In particular by taking the ‘staircase (1) triangulation’ we obtain a combinatorial interpretation for the Betti numbers of Mn = (1) MKn+1 in terms of certain subgraphs of the complete bipartite graph Kn,2 . In addition, we are able to obtain a closed formula for the Betti numbers of these ideals. (1) Corollary (See Corollary 4.7). The total Betti numbers βin of the ideal MKn+1 are given by   n X j−1 n βi = j . i−1 j=1 (1) The complex supporting a resolution of MKn+1 does not support a resolution of MG for arbitrary G. However, we are able to utilize certain degenerations of the underlying arrangement to obtain a minimal resolution for a certain class of graphs. Proposition (See Proposition 4.11). Suppose G is a graph of the form G = H ∗ {v}, (1) where H is obtained by removing disjoint cliques from the complete graph Kn . Then MG has a minimal resolution supported on the subdivision of Rn−1 induced by a (non-generic) arrangement of two tropical hyperplanes. The rest of the paper is organized as follows. In Section 2 we review the basic definitions of the G-parking function ideals, their skeleta and related constructions, and also recall some basic facts from combinatorial commutative algebra. In Section 3 we study the standard (n−2) (1) monomials of the skeleta ideals, and provide explicit formulas for the case of MG and MG for the complete graph. We relate these counts to well-known combinatorial structures including signless Laplacians and Cayley’s formula. In Section 4 we study homological properties of the skeleta ideal, and in particular establish our results regarding cocellular (1) resolutions of MG for certain G. We end with some concluding remarks and open questions. Acknowledgements. We thank Spencer Backman, Sam Hopkins, and Suho Oh for useful conversations. The results in the this paper grew out of discussions initiated at a workshop on ‘Generalizations of chip-firing and the critical group’ held July 8-12, 2013 at the American Institute of Mathematics. We thank the organizers for the opportunity to participate and AIM for providing the working environment. 2. Definitions and objects of study 2.1. G-parking functions, ideals, and their skeleta. We begin with some basic facts regarding the combinatorial objects involved in our study. Recall that a parking function of size n is a sequence (a1 , a2 , . . . , an ) of nonnegative integers such that its rearrangement c1 ≤ c2 ≤ · · · ≤ cn satisfies ci < i. This seemingly innocent construction turns out to have connections and applications to many areas of mathematics. For instance, in [20] it is shown that the parking functions of size n are in bijection with the number of trees on n + 1 labeled vertices which, by Cayley’s formula, is given by (n + 1)n−1 . One can extend these constructions to arbitrary graphs (with the classical case recovered by the complete graph Kn+1 ). For this suppose that G is an (undirected) graph on vertex set {0, 1, . . . , n} with distinguished sink vertex 0 (much of the theory can be extended to directed graphs with multiple edges, but here we will focus on the simple undirected case). SKELETA OF G-PARKING FUNCTION IDEALS 5 Associated to the graph G is the reduced Laplacian matrx LG , an n × n symmetric matrix with entries given by (L̃G )i,j ( deg(vi ) if i = j = −1 if i 6= j The matrix-tree theorem says that the number NG of spanning trees of G is given by NG = det L̃G . Our definition of L̃ corresponds to deleting from the usual Laplacian LG the row and column corresponding to the vertex 0, but is well known that NG is independent of which vertex is chosen. For a subset σ ⊆ [n] = {1, 2, . . . , n} and a vertex i ∈ [n], let dσ (i) = |{j : j ∼ i, j ∈ / σ}| (3) Definition 2.1. A sequence (b1 , b2 , . . . , bn ) is said to be a G-parking function if for any ∅= 6 σ ⊆ [n] there exists i ∈ σ such that bi < dS (i). Note that if G = Kn+1 a complete graph then this recovers the classical parking functions of size n defined above. In addition we have the following enumerative property. Theorem 2.2. [17] The number of G-parking functions is given by det L̃G , the number of spanning trees of G. In [23] the authors formulate G-parking functions in an algebraic context. As above we assume that G is an (undirected) graph on vertex set {0, 1, . . . , n} with distinguished sink vertex 0. Fix a field K and let S = K[x1 , x2 , . . . , xn ] denote the polynomial ring on n variables. For any ∅ = 6 σ ⊆ [n] define the monomial mσ by Y outdeg (i) σ , (4) mσ = xi i∈σ where outdegσ (i) = #{j ∈ [n]\σ : j ∼ i} is the number of vertices outside the set σ that are adjacent to i. Definition 2.3. For a graph G on vertex set {0, 1, . . . , n} the G-parking function ideal MG ⊂ S is generated by all mσ for nonempty σ: MG = hmσ : ∅ = 6 σ ⊆ [n]i. The ideal MG was introduced by Postnikov and Shapiro in [23], where they studied monomial bases for the quotient algebra S/MG and also described cellular resolutions of these and related ideals. The ideals MG also have connections to ‘chip-firing’ and a discrete RiemannRoch theory of graphs. In fact it can be shown that MG is a certain initial ideal of the so-called toppling ideal IG , the binomial lattice ideal parametrizing linear equivalence classes of effective divisors on G. In the context of chip-firing one studies the following dynamical system: a number of ‘chips’ are placed on the vertices of a graph G, and a vertex v is allowed to ‘fire’ if the number of chips is at least deg(v) (the degree of that vertex), in which case one chip is passed to each of its neighbors and v loses deg(v) chips. In the Abelian sandpile model vertices are restricted to fire individually, whereas in the ‘cluster firing model’ any collection of non-sink vertices is allowed to fire simultaneously. In both models the stabilization of a configuration is independent of the sequence of firings, and the number of ‘recurrent’ configurations is the 6 ANTON DOCHTERMANN same (given by the number of spanning trees). In the case of the cluster firing method, the recurrent configurations are the same as the stable configurations. Backman and Paoletti and others ([1], [6]) generalized this situation by considering ‘hereditary chip-firing’ models, where the prescribed sets of vertices form any simplicial complex on the vertex set of G. In [1] it is shown that these models enjoy similar properties, and for example by adapting the Cori-Le Borgne algorithm from [10] an explicit bijection between the recurrent configurations of a hereditary chip-firing model on a graph and the set of its spanning trees is given. In this paper we consider the algebraic aspects of hereditary chip-firing in the context of the monomial ideals defined above. Although a general theory seems difficult to describe, we do see some pleasing structure arising in the case of subideals defined by ‘skeleta’. The following will be our main objects of study. Definition 2.4. Suppose G is a graph on vertex set {0, 1, . . . , n}. For an integer k with (k) 1 ≤ k ≤ n − 1, we define the ideal MG according to (k) MG = hmσ : ∅ = 6 σ ⊆ [n], |σ| ≤ k + 1i. (k) One can think of the MG as certain ‘k-skeleta’ of the ideal MG . For example for G = K5 and k = 2 we have (2) MG = hx41 , x42 , x43 , x44 , x31 x32 , x31 x33 , x31 x34 , x32 x34 , x32 x34 , x33 x34 i, generated by all monomials mσ with 1 ≤ |σ| ≤ 2. (k) (k) Notation. To simplify notation we will often use Mn := MKn+1 to denote the k-skeleton ideal of the complete graph G = Kn+1 . (k) We note that the ideals MG are non-generic: for example the monomials x31 x32 and x31 x33 (2) are both generators of the ideal MK5 with the same positive degree in x1 , and yet the only other generator dividing their least common multiple x31 x32 x33 is the monomial x32 x33 . Hence certain techniques for studying monomial ideals (as were utilized in [23]) break down. In addition, the Scarf complex associated to these ideals will not support a resolution. For the (k) case of a complete graph, the Scarf complex of Mn will consist of the (k − 1)-skeleton of the barycentric subdivision of the (n − 1)-dimensional simplex, and for k ≤ n − 1 will carry a nontrivial top homology group. These ideals are also not monotone in the sense of [23] (despite the apparent similarity in the names/construction). In that context, for any generators mσ and mτ one requires that (k) lcm(mσ , mτ ) is divisible by a generator mρ for some ρ ⊇ σ ∪ τ . Our construction of MG provides a condition on subsets of σ for each mσ , and in this sense runs somewhat dual to the theory of monotone ideals. 2.2. Resolutions and monomial bases. We briefly recall some of the commutative algebra needed for our constructions and results. Further detail and any undefined terms can be found for example in [22]. Recall that if M is any finely graded S-module, then a (Zn -graded) free resolution of M is a sequence of free S-modules 0 ← M ← F1 ← F2 ← · · · ← Fd ← 0, SKELETA OF G-PARKING FUNCTION IDEALS 7 L where each Fi = m∈Zn S(−m)βi,m . The sum is over all monomials m in S, which are often (as in this case) described in terms of their exponent vector in Zn . The resolution is said to be minimal if each of the βi,m is minimum over all free resolutions of M , in which case the βi,m are called the (Zn -, or finely-)graded Betti numbers of M . A resolution of a monomial ideal M said to be cellular (resp. cocellular) if there exists a CW -complex X with monomial labelings mF on its faces F ∈ X such that the chain complex computing cellular homology (resp. cohomology) ‘supports’ the resolution. More specifically, suppose X is a CW-complex with a monomial associated to each face {mF : F ∈ X } satisfying mF = max{mG : for G ⊆ F a face}, so that every face contained in F has a monomial label that divides the label of F . We define a complex C∗ (X ) of free S-modules according to M Ci = S(−mF ) F ∈X , dim F =i+1 where the sum is over all (i + 1)-dimensional faces F of X . The differentials ∂i : Ci → Ci−1 of C∗ (X ) are monomial-valued matrices with scalar coefficients determined by the entries in the maps of the chain complex of K-modules computing homology of X , and with monomial entries that make the differential a Zn -graded map. A cocellular resolution is defined similarly using the cochain complex C ∗ (X ) of the underlying space. Note that in the case of a cellular resolution the monomial ideal is generated by the monomials on the vertices (0-cells), whereas in the case of a cocellular complex is generated by the facets (maximal faces). Given a monomial labeled complex X there is a useful criteria for checking where it supports a resolution. For a monomial m, let X≤m denote the subcomplex of X consisting of those faces F whose label mF divides m: X≤m = {F ∈ X : mF divides m}. From [4] we then have the following observation. Lemma 2.5. The complex C∗ (X ) of S-modules is exact if and only if the induced complex X≤m is K-acyclic for all monomials m. In this case C∗ (X ) supports a cellular resolution of the ideal I = hmv : v ∈ X a vertexi, generated by the monomials on the vertices of X . If in addition we have that mF 6= mG for any proper containment F ( G of faces then C∗ (X ) is a minimal free resolution of I. If the labeling on X satisfies mF = max{mG : for G ⊃ F a face} then X is said to be colabeled and gives rise to a cocellular resolution via the cellular cochain complex of X . Note that for any monomial m, the set X≤m of cells H with mH dividing m is not a subcomplex of X , but rather a union of relatively open stars of cells. The criteria for checking acyclicity of the complex is similar. Lemma 2.6. The colabeled complex C ∗ (X ) is exact if and only if X≤m is K-acyclic for every monomial m ∈ Zn (identifying m with its exponent vector). In this case C ∗ (X ) provides a resolution of S/I, where I = hmH : H ∈ X is a maximal cell i. 8 ANTON DOCHTERMANN The resolution is minimal if mF 6= mG for any proper containment F ( G of faces. Suppose I ∈ S is an ideal such that S/I is finite dimensional as a K-vector space. Then we say that I is an Artinian ideal and a basis for S/I is called the set of standard monomials of I (determined by a chosen term order). In the case that I is monomial, one can see that the standard monomials consist of those monomials m such that m is not divisible by any generators of I. In [23] it is shown that for the G-parking function ideals I = MG , the dimension of S/MG is equal to the number of spanning trees of G. More recently [8] the authors provide a family of combinatorial bijections between the G-parking functions and the spanning trees of G. 3. Monomial bases of skeleta Recall that the standard monomials of MG (a basis for the vector space S/MG ) are given by the G-parking functions (and hence counted by spanning trees). For the case of G = Kn+1 the number of standard monomials is thus given by (n−1)n+1 . In this section we consider the standard monomials of skeleton ideals, seeking an analogous combinatorial interpretation. (k) Note that in general since MG ⊂ MG we have that the usual G-parking functions will be among the standard monomials for the k-skeleton ideals for all k. (0) For any graph G the zero-skeleton ideal MG is generated by each variable raised to the (0) power of the degree of the corresponding vertex. Hence a monomial basis for S/MG is easy to describe as the set of monomials lying within an n-orthotope with edge lengths given by degree: o nY di xi : 0 ≤ di < deg(i) i∈[n] We next turn to the other skeleta. For the remainder of this section we will primarily (k) (k) focus on the case that G = Kn+1 is a complete graph. Recall that we use Mn := MKn+1 to denote the k-skeleton ideal of the complete graph Kn+1 . (2) Example 3.1. For n = 3 we have M3 standard monomials given by = hx31 , x32 , x33 , x21 x22 , x21 x23 , x22 x23 i, with the set of {G-parking functions of length 3} ∪ {x1 x2 x3 , x21 x2 x3 , x1 x22 x3 , x1 x2 x23 }, giving a total of 16 + 4 = 20 standard monomials. Here as usual we identify a G-parking function with the monomial having that sequence as an exponent vector, so that for example (1, 0, 2) is identified with the monomial x1 x23 . In general we have the following formula. (1) Theorem 3.2. The number of standard monomials of Mn (and hence the dimension of the (1) K-vector space S/Mn ) is given by dimK (S/Mn(1) ) = (2n − 1)(n − 1)n−1 . (2) Proof. Suppose (a1 , a2 , . . . , an ) is the exponent vector of a standard monomial of Mn . Then by definition each entry ai is strictly less than n, and at most one entry equals n − 1. SKELETA OF G-PARKING FUNCTION IDEALS 9 If no entry equals n − 1 then every entry satisfies 0 ≤ ai ≤ n − 2 so we have (n − 1)n possibilities. If exactly one entry (say ai ) equals n − 1 then every other entry satisfies 0 ≤ aj ≤ n − 2 for j 6= i. Hence we have n(n − 1)n−1 possibilities. Adding these up we get (n − 1)n + n(n − 1)n−1 = (2n − 1)(n − 1)n−1 standard monomials, as desired.  It turns out this number has a determinantal interpretation analogous to the case of Gparking functions. Once again recall that the dimension of S/MKG (and the number of G-parking functions) is equal to det L̃G , the determinant of the reduced Laplacian of G. For the case of G = Kn+1 this number is provided by the well known formula (n + 1)n−1 . For the one-skeleton a different but related matrix makes an appearance. Definition 3.3. For a graph G on vertex set {0, 1, . . . , n} the signless Laplacian Q = QG is the symmetric (n + 1) × (n + 1) matrix with rows and columns indexed by the vertices of G and with entries given by ( deg(i) if i = j, Qi,j = |{edges connecting i and j}| if i 6= j. Define the reduced signless Laplacian Q̃ to be the matrix obtained from Q by deleting the row and column corresponding to the vertex 0. Note that Q has entries given by the absolute values of the entries of the usual Laplacian L (hence the name). For example, if G = K4 we get the following matrices.  3 1 Q= 1 1 1 3 1 1 1 1 3 1  1 1  1 3   3 1 1 Q̃ = 1 3 1 1 1 3 In this case one has det Q̃ = 20 = (5)(22 ). This should remind the reader of the count from Example 3.1 above, and in general we have the following observation. (2) Corollary 3.4. The number of standard monomials of Mn (2) S/Mn ) is given by dimK (S/Mn(2) ) = det Q̃Kn+1 . (and hence the dimension of Proof. According to Theorem 3.2 it is enough to show that det Q̃Kn+1 = (2n − 1)(n − 1)n−1 . For this we examine the eigenvalues of the matrix Q̃Kn+1 . We have one eigenvalue 2n − 1 with multiplicity 1 corresponding to the all 1’s vector 1. Subtracting the matrix (n − 1)In from Q̃Kn+1 gives us the matrix J consisting of all ones, which has an (n − 1)-dimensional kernel. Hence Q̃Kn+1 has one other eigenvalue n − 1 with multiplicity n − 1. The result follows.  It would be interesting to find a bijective proof of Corollary 3.4, along the lines of wellknown bijections between spanning trees and parking functions that are scattered throughout the literature (see for instance [8]). For this we need a graph-theoretical interpretation of the determinant of Q̃, which we have (again) thanks to the Cauchy-Binnet theorem. 10 ANTON DOCHTERMANN 0 0 1 4 3 1 4 2 3 2 Figure 1. The graphs H 0 and H from Example 3.6. The graphs are isomorphic but have different values of det Q̃ (in both cases the sink is given by the vertex 0). Proposition 3.5. [8] For any graph G the determinant of Q̃G = Q̃ is given by X det Q̃ = 4c(H) , H where the summation runs over all spanning T U -subgraphs H of G with c(H) unicyclic components, and one tree component which contains the vertex 0. Here a T U -subgraph is a subgraph of G whose components are trees or unicylic graphs with odd cycles. Analogous to the usual Laplacian, Q can be obtained as Q = M T M , where M is the 0 − 1 vertex-edge signless incidence matrix of G. Applying Cauchy-Binet to this factorization gives the result (see [3] for details). A bijective proof of Corollary 3.4 would therefore associate to each spanning T U -subgraph (1) H ⊂ Kn+1 a collection of 4c(H) standard monomials of Mn . Note that each spanning tree of G would be assigned 40 = 1 standard monomials, so presumably such a bijection would extend the correspondence between usual G-parking functions and spanning trees. In Example 3.1 we have the 16 parking functions coming from the spanning trees of G, and 4 new standard monomials coming from the T U -subgraph consisting of the edges {12, 13, 23}. For graphs that lack symmetry we note that det(Q̃) depends on the choice of sink vertex. This is in contrast to the usual Laplacian, where the determinant simply counts the number of spanning trees containing the sink and in particular is independent of which row/column is deleted to obtain L̃. In fact Corollary 3.4 does not hold for general G, as the following example illustrates. Example 3.6. Let H be the graph obtained from The reduced signless Laplacian is  4 1 1 4 Q̃H =  1 1 1 1 removing the edge (34) from the graph K5 . 1 1 3 0  1 1  0 3 (1) with det(Q̃H ) = 99. According to Macaulay2 [18] we have dimK MG = 105, so that there (1) are 105 standard monomials of MG in this case. Note however if H 0 is the graph obtained from K5 by removing the edge 01 then we get det(Q̃H 0 ) = 135, while there are 135 standard (1) monomials of MH . After a number of calculations we have not found an example where the determinant of (1) Q̃ is larger than the dimension of S/MG , which begs the following question. SKELETA OF G-PARKING FUNCTION IDEALS 11 Question 3.7. For any graph G is it true that (1) dimK S/MG ≥ det(Q̃G )? The hope here is that for each T U subgraph H ⊂ G we can find a way to assign 4c(H) (1) standard monomials of MG (in an injective fashion). 3.1. Codimension one. Having obtained a formula for the number of standard monomials (1) (n−2) of the one-skeleton S/Mn we next turn to S/Mn , the ‘codimension one’ skeleton ideal. (n−2) Recall that MG is generated by all monomials mσ where σ ⊆ [n] and 1 ≤ |σ| ≤ n − 1. In (n−2) particular MG has the same generators as MG except for the single monomial m{1,2,...,n} corresponding to the entire set. Again we restrict ourselves to the complete graph and let (n−2) Mn(n−2) = MKn+1 denote the codimension-one skeleton ideal of the complete graph. There is a surprisingly (n−2) simple closed formula for the vector space dimension of S/Mn that again involves familiar combinatorial objects. (n−2) Theorem 3.8. The number of standard monomials of the ideal Mn (n−2) mension of the K-vector space S/Mn ) is given by (and hence the di- dimK S/Mn(n−2) = (n + 1)n−1 + (n − 1)n−1 . (n−2) Proof. Again since Mn ⊂ MKn+1 we have that the set of standard monomials of MKn+1 (n−2) are contained in those of Mn . The new contributions come from monomials of the form xa11 xa22 · · · xann , where ai ≥ 1 for all i. Let M+ n denote the set of such monomials, so that if Mn denotes the set of standard (n−2) monomials of Mn = MKn+1 then the set of standard monomials of Mn is given by Mn ∪ n−1 + and hence it suffices to Mn . From the above discussion we know that |Mn | = (n + 1) n−1 | = (n − 1) . show that |M+ n Note that an element of M+ n is obtained by taking the monomial x1 x2 · · · xn , choosing a set S ⊆ [n], and then raising each variable corresponding to a element of S by a nonzero amount. Let F (n, s) denote the number of standard monomials in M+ n+1 that correspond to raising the exponent of all variables in a chosen (and fixed) set of n − s variables, fixing the exponents of all other variables to be one. We claim that F (n, s) satisfies the recursion  n−s  X n−s F (n, s) = F (n − 1, s + j − 1), (5) j j=0 with F (1, 1) = 1 and F (n, 0) = 0 for n ≥ 1. We have F (1, 1) = 1 since if we have only two variables, we get a single contribution to the (1) set M+ that are elements of M2 ) by ‘changing zero variables’, 2 (standard monomials of M2 namely from the monomial x1 x2 . In fact F (n, n) = 1 for all n ≥ 1. Similarly we have F (n, 0) = 0 for n ≥ 1 since if we have n + 1 variables and raise the (n−1) exponent of any n variables we end up with a monomial in Mn+1 . This follows from the (n−1) fact that Mn+1 contains the monomial mS for all S ⊆ [n] with |S| ≤ n. 12 ANTON DOCHTERMANN Next, to establish the recursion, suppose m is a standard monomial in M+ n+1 resulting from raising the exponents in some set of t = n − s variables. Without loss of generality suppose that the set is {1, 2, . . . , t} so that m = xa11 xa22 · · · xat t xt+1 · · · xn+1 , with each ai > 1. Suppose j of these variables have exponent equal to 2 (so that t − j variables have exponent 3 or larger). Take the subset of variables consisting of those with exponent 3 or larger and subtract one from each of those exponents to get a new monomial m0 (on that subset of variables, shifting indices if necessary) that is now a standard monomial (n−2) of Mn with the property that t − j = n − s − j variables have exponent (strictly) larger than 1. The number of such standard monomials is F (n − 1, s + j − 1). If we add up n−s F (n − 1, s + j − 1) for all possible choices of j variables with exponent equal to 2 we j get F (n, s). The recursion formula (5) follows. To aid the reader we provide an illustration of the identity for the case F (4, 2) = F (3, 1) + 2F (3, 2) + F (3, 3). Here we are considering monomials with 4 + 1 = 5 variables. Assuming as above that the set of variables with raised coefficients is {x1 , x2 } we have |{33111, 34111, 43111, 32111, 23111, 42111, 24111, 22111}| = |{2211, 2311, 3211}| + 2|{2111, 3111}| + |{1111}|, (6) where monomials are represented by their exponent vectors. Now, in [25] it is shown that F (n, s) counts the number of forests with n labeled vertices consisting of s distinct trees such that s specified vertices belong to distinct trees. There it is shown that F (n, s) = snn−s−1 . In [7] the authors consider labeled rooted trees on vertex set [n + 1] with the property that the root has no smaller ‘son’ (immediate descendant). They prove that the number of such trees is nn and show how the tree description leads to certain combinatorial interpretations of nn . By considering the parameter ‘degree s of the root’, they obtain the identity:  n  X n+1 n n = snn−s−1 . (7) s + 1 s=1 We have seen that snn−s−1 counts the number of monomials in M+ n+1 that correspond to raising the exponent of all variables in a chosen (and fixed) set of n − s  variables (while fixing  n+1 n+1 all other variables to have exponent one). There are n−s = s+1 ways to choose which variables to raise, and hence our result follows.  There is an interesting (and as far as we know, new) enumerative corollary of this result that follows from a more straightforward way to count the elements of M+ n. Corollary 3.9. For any integer n ≥ 1 we have      X n n − k1 n − (k1 + · · · + kn−3 ) n−1 (n − 1) = ··· . k1 k2 kn−2 0≤k ≤1 1 0≤k1 +k2 ≤2 ··· 0≤k1 +···+kn−2 ≤n−2 (8) SKELETA OF G-PARKING FUNCTION IDEALS 13 Proof. We prove this by counting the elements of M+ n and applying Theorem 3.8. Note , then no exponent can satisfy ai ≥ n since xni is a generating that if xa11 xa22 · · · xann ∈ M+ n (n−1) monomial of MG . We can have at most one exponent satisfying ai = n − 1, at most two exponents satisfying aj = n − 2, and so on. Let k1 denote the number of exponents ai such that ai = n − 1, k2 the number of exponents aj such that aj = n − 2, etc. Hence the number of standard monomials of the form xa11 xa22 · · · xann is given by the expression on the right hand side of (8), which by Theorem 3.8 is equal to (n − 1)n−1 .  The formula is similar to ‘other way to count N N ’ as described in [5]. Curiously, both formulas involve a summation over the same index set but one can check that the terms in the summation are not the same (even up to reordering). Remark 3.10. As discussed in [7] Equation (7) enumerates labeled rooted trees with no smaller immediate descendants, via the parameter ‘degree s of the root’. In our context this corresponds to enumerating elements of M+ n+1 in terms of ‘raising the exponent of n − s variables’. We can alternatively enumerate elements of M+ n+1 according to degree (as a n polynomial) and this leads to yet another q-analogue of n that we were unable to find in the literature. Example 3.11. As an example of the above discussion, the relevant monomials in M+ 4 (described in terms of exponent vectors) are 3211 (all 12 permutations), 2211 (all six permutations), 3111 (all four permutations), 2111 (all four permutations), and 1111. Theorem 7 gives the decomposition 27 = 18 + 8 + 1, since 18 monomials have two variables raised, 8 have a single variable raised, and one has no variable raised. If we count using the degree statistic then we get 27 = 1 + 4 + 10 + 12. We assume that this has an interpretation in terms of trees but have not found any reference. 4. Resolutions of the 1-skeleton Recall from [23] that a free resolution of the G-parking function ideal MG is supported on B(∆n ), the barycentric subdivision of the (n − 1)-dimensional simplex. This resolution is minimal only in the case that G = Kn+1 is the complete graph, in which case the ideal is generic and the resolution can be seen to coincide with the Scarf complex. For the case of arbitrary G it was shown in [14] that a minimal free resolution of MG is supported on the bounded complex of a certain affine slice of the graphical hyperplane arrangement of G. This provides a convenient description of the resolution itself and also leads to a combinatorial interpretation of the Betti numbers of MG in terms of Whitney numbers of the intersection lattice of the graphical arrangement, acyclic orientations of (contractions of) the graph G with unique sink, etc. We refer to [14] for details. (k) In the case of the skeleton ideals MG one can ask whether the Betti numbers have similar combinatorial meaning, and if a (co)cellular resolution can be easily described. Although in general this question does not seem to have a concise answer, we do have a way to interpret (1) the Betti numbers for a large class of 1-skeleton ideals MG . 14 ANTON DOCHTERMANN (1) Recall that the ideal MG is generated by all monomials mσ where 1 ≤ |σ| ≤ 2. Hence a complex supporting a cocellular resolution must have maximal cells that index nonempty subsets of [n] of cardinality at most 2 (just as the vertices of B(∆n ) are naturally labeled by all nonempty subsets of [n]). For our description of such a complex it will be convenient to use the language of tropical convexity, as developed by Develin and Sturmfels in [12] and adapted here for our purposes. Most of our techniques will be standard manipulations in tropical convexity but for the reader unfamiliar with such constructions we will provide a more or less self-contained treatment in what follows. Let ∆n denote the (n − 1)-dimensional simplex given by the convex hull of the origin and the standard basis vectors ∆n = conv{0, e1 , . . . , en }. Now suppose a = (a1 , a2 , . . . , an ) is a point in Rn , thought of as a linear functional in an appropriate dual space. For us a tropical hyperplane determined by the functional a, denoted H(a), is by definition the codimension one skeleton of the outward normal fan of ∆n , with vertex at a. Note that the complement of the tropical hyperplane consists of n + 1 maximal cones which we label {1, 2, . . . , n + 1} according to which vertex of ∆n it attains a maximum value on (with the origin treated as the (n + 1)st vertex). (1,1) e2 2 3 0 (3,0) 1 e1 Figure 2. The simplex ∆2 , its normal fan with labeled cones, and the arrangement A = {H(1, 1), H(3, 0)}. A collection A of tropical hyperplanes then gives rise to a polyhedral decomposition XA of Rn , whose relatively open cells are determined by which cones of the hyperplanes they lie in. We take the following notion from [12], amended for our purposes. Definition 4.1. Suppose (T (a), T (b)) is an (ordered) arrangement of tropical hyperplanes in Rn , and let x ∈ Rn . Let a∗ = (a1 , . . . , an , an+1 = 0), b∗ = (b1 , . . . , bn , bn+1 = 0), and x∗ = (x1 , . . . , xn , xn+1 = 0) denote the vectors in Rn+1 obtained by adding a ‘0’ in the last coordinate. Then the type of x is given by T (x) = (Ta (x), Tb (x)), where Ta (x) = {i ∈ [n + 1] : xi − ai = max {xj − aj }}, j∈[n+1] Tb (x) = {i ∈ [n + 1] : xi − bi = max {xj − bj }}. j∈[n+1] Alternatively, if we think of each tropical hyperplane in terms of the labeled cones that they define, then Ta (x) (resp. Tb (x)) is the set of closed cones of H(a) (resp. H(b)) that intersect the point x. We will often use this description in our arguments. SKELETA OF G-PARKING FUNCTION IDEALS 15 For example in the arrangement of Figure 2, we have TA (2, 0) = ({1}, {2, 3}). Note that this notion corresponds to the ‘fine’ types of [15], but we won’t need the distinction here. In [12] it is shown that the set of x ∈ Rn with a fixed type forms a relatively open convex (and tropically convex) subset of Rn , the cells of the decomposition XA . If F ∈ XA is a relatively open cell we will often speak of the type of F , by which we mean the type of any point x ∈ F . Given a pair of tropical hyperplanes A = (H(a), H(b)) we label each maximal cell F of XA with a monomial mF as follows. If x ∈ F is any point in the relative interior of F with type TA (x) = (Ta , Tb ) we let σ = Ta ∪ Tb and set mF = mσ . This is well-defined since, as we have seen, every point in the relative interior of F has the same type. For example in Figure 2 the point x = (2, −1) has type ({1}, {3}) and hence the cell containing x is labeled by the monomial outdeg(1) outdeg(3) m{1,3} = x1 x3 . If G ∈ XA is any other (non maximal) face, we label it with the monomial mG where mG = lcm{mF : F is a facet with G ⊆ F }. We refer to Figure 3 for an example. x23 x12x22 x22x32 x33 x13x22x32 x13x22 x12x32 x13 Figure 3. The monomial labeled complex XA . We will see that with this monomial labeling the complex XA in fact supports a cocellular resolution of our ideals. To establish this we will need one more notion from tropical convexity. Definition 4.2. Given points x, y ∈ Rn the (max-)tropical line segment they determine is given by the set of points p ∈ Rn of the form p = max{λ1 + x, µ1 + y}, where λ, µ are arbitary real numbers, and 1 is the vector in Rn consisting of all one’s. We then have the following results from [15], again adapted to suit our setup. Proposition 4.3. [15] Let A = {H(a), H(b)} be an arrangement of tropical hyperplanes in Rn , and let XA denote the induced decomposition of Rn . For every cell G ∈ XA of codimension ≥ 1 we have [ TA (G) = TA (F ), G⊂F 16 ANTON DOCHTERMANN where the union of a pair of sets is taken to be the pair of the unions, so that e.g. (Sa , Sb ) ∪ (Ta , Tb ) = (Sa ∪ Ta , Sb ∪ Tb ). Lemma 4.4. [15] Suppose x, y ∈ Rn , and let z be a point on the tropical line segment between x and y. Suppose A = {H(a), H(b)} is a arrangement of a pair of tropical hyperplanes in Rn , and let TA (x) = (Ca , Cb ), TA (y) = (Da , Db ), and TA (z) = (Ea , Eb ) denote the types of these points with respect to A. Then we have the following inclusions of multisets: Ca ∩ Da ⊆ Ea ⊆ Ca ∪ Da , (9) Cb ∩ Db ⊆ Eb ⊆ Cb ∪ Db . Proposition 4.5. [15] Let C and D be distinct cells in XA with types T (C)A = (Ca , Cb ) and T (C)A = (Da , Db ). If C is contained in the closure of D then as multisets we have Ca ∪ Cb 6= Da ∪ Db . Note that cells that are ‘far away’ in the complex XA can violate the inequality in the previous Proposition. For instance in the arrangement in Figure (2) we have T (1, 1/2) = ({1, 3}, {2}) and T (2, 0) = ({1}, {2, 3}). In this case both of the relevant faces have the monomial label x21 x22 x23 . With these in statements in place we can now prove our main results of this section. Theorem 4.6. Suppose A = {H(a), H(b)} is an arrangement of two tropical hyperplanes in Rn−1 in generic position, and let XA denote the induced subdivision of Rn−1 with the (1) monomial labeling described above. Then the ideal MKn+1 has a minimal cocellular resolution supported on XA . (1) (1) Proof. Recall that a non-redundant list of generators of the ideal Mn = MKn+1 is indexed by all subsets σ of [n] = {1, 2, . . . , n} such that 1 ≤ |σ| ≤ 2. Also recall that each maximal cell F of XA is labeled by the monomial mσ , where σ = Ta ∪ Tb is the union of the sets occurring as the type of any x ∈ F . Since x does not lie on H(a) ∪ H(b), we have σ = {i, j} where 1 ≤ i ≤ j ≤ n. Since the arrangement is assumed to be generic we have that every such (possibly degenerate) pair is realized as the union of type sets for some point x ∈ Rn . This is equivalent to the fact that in any regular fine mixed subdivision of ∆n−1 + ∆n−1 every lattice point occurs as a 0-cell, and these lattice points are of the form ei + ej for all 1 ≤ i ≤ j ≤ n. Furthermore, the set of points that have a particular σ label forms a maximal connected open cell in Rn . We conclude that the ideal generated by the monomials (1) corresponding to maximal cells of XA is indeed the ideal Mn . We next apply Lemma 2.6 to show that the complex of S-modules induced by the cochain complex of XA with this monomial labeling is indeed K-acyclic. For this suppose m ∈ Zn is any monomial (identified with its exponent vector) and consider the complex (XA )≤m . We follow the argument in [15] to show that (XA )≤m is tropically convex, which implies that it is in fact contractible [12] (and hence K-acyclic). The key observation here is that the monomial label of any point x in A can be read off from its type data. Namely, if F is a cell of A (of any dimension), and x ∈ F has type TA (x) = (Ta , Tb ) then the monomial label of F is given by n Y mF = xdi i , (10) i=1 SKELETA OF G-PARKING FUNCTION IDEALS where 17   if i ∈ Ta and i ∈ Tb , n di = n − 1 if i ∈ Ta \Tb or i ∈ Tb \Ta ,  0 if i ∈ / Ta ∪ Tb . This follows from the way that we have defined the monomial labeling. Namely, if F ∈ XA is a maximal cell and x ∈ F then x does not lie on either hyperplane of the arrangement and hence is in exactly one cone defined by each. In this case the monomial label of the relevant cell is xn−1 xn−1 if the cones are distinct, or xni if the cones are the same. If x lies in some i j other (non maximal) cell F ∈ XA then Proposition 4.3 implies that the monomial label xF described in (10) is equal to the lcm of the monomial labels of all faces that contain F . Now suppose x, y ∈ (XA )≤m and suppose z in a point in the tropical convex hull of x and y. From Lemma 4.4 we have that TA (z) is contained in TA (x) ∪ TA (y). Hence if z lies in the cell G ∈ XA we have from (10) that mF divides m. We conclude that z ∈ (XA )≤m so that (XA )≤m is tropically convex and hence K-acyclic. We next turn to minimality of the resolution. If F ⊂ G are cells of XA with F 6= G then by Proposition 4.5 along with the labeling formula (10) we have that mF 6= mG . By Lemma 2.6 this implies that the resolution is minimal.  P Recall that the ith total Betti number of a module is the sum σ βi,σ of all Betti numbers (1) in the ith homological degree. According to Theorem 4.6 the total Betti number of a Mn is given by the number of codimension i faces in the decomposition of Rn determined by the tropical hyperplane arrangement. Importing results from [15] we get the following formula. (1) Corollary 4.7. The total Betti numbers βin of the ideal Mn are given by   n X j−1 n βi = j i−1 j=1 (1) Example 4.8. For n = 3 the resolution of M3 has a Z-graded resolution given by (2) 0 ← M3 ← S(−3)3 ⊕ S(−4)3 ← S(−5)6 ⊕ S(−6)2 ← S(−7)3 ← 0. This can be read off from the monomial labeled complex depicted in Figure 3. The total Betti numbers are given by β13 = 6, β23 = 8, β33 = 3. Remark 4.9. Note that since the complexes (XA )≤m considered above are contractible (and hence K-acylic for any field K), it follows that the resolution and associated Betti numbers are independent of which field we are working over. Similar properties hold for the resolutions of MG considered in [23] and [14]. The combinatorics of the decomposition of Rn induced by a generic arrangement of a pair of tropical hyperplanes is closely related to regular triangulations of a product of simplices ∆1 × ∆n−1 , as spelled out in [12]. By the Cayley Trick [11] this implies that a cellular (1) resolution of the ideal MKn+1 is supported on any ‘regular fine mixed subdivision’ of the Minkowski sum ∆n−1 +∆n−1 (see Figure 4). We will not stress this perspective here and refer to [15] for more details, where arrangements of tropical hyperplanes are used to construct 18 ANTON DOCHTERMANN minimal cellular resolutions of similar monomial ideals arising from oriented matroid ‘type’ data. x34 x13x33 x23x33 x14 x33x43 x13x43 x24 x44 x23x43 (1) Figure 4. A cellular resolution of M4 is supported on any regular fine mixed subdivision of ∆3 + ∆3 . Remark 4.10. Triangulations of a product of simplices (and the related mixed subdivisions of dilated simplices) are well-studied objects (see for example Chapter 6.2 of [11]). Applying (1) this technology we obtain several combinatorial interpretations for the Betti numbers of Mn . In particular if we consider the ‘staircase’ (or ‘pulling’) triangulation of ∆1 × ∆n−1 we see that maximal syzygies (corresponding to simplices in the triangulation) can be encoded by certain lattice paths or, equivalently, certain ‘non-crossing’ spanning trees of the complete bipartite graph K2,n (see Figure 5). We refer to [11] for more details. (1) Figure 5. Maximal syzygies of Mn are indexed by ‘non-crossing’ spanning trees of K2,n (here n = 3, compare with Example 4.8). (1) We next consider resolutions of the ideal MG for an arbitrary graph G. Recall that a (1) (possibly redundant) set of generators of MG is again given by the set of monomials mσ for 1 ≤ |σ| ≤ 2, and hence the decomposition of Rn induced by a generic arrangement of a pair of tropical hyperplanes has a natural monomial labeling with the property that its maximal cells correspond to these generators. However one can check that with such a labeling a generic arrangement of hyperplanes does not support a resolution of MG for general G. For example if G is the graph obtained from K4 by removing the edge 12, then the arrangement depicted in Figure 3 (with relevant monomial labels) will have the property that the downset (XA )≤(112) is disconnected. For certain graphs, however, we can perturb our arrangements to obtain complexes that support (minimal) resolutions. Proposition 4.11. Suppose G = H ∗ {0} is obtained by coning the vertex 0 over the graph H, where H is obtained by removing a collection of disjoint cliques from the complete graph SKELETA OF G-PARKING FUNCTION IDEALS 19 Kn . Then there exists a (degenerate) arrangement A = (T (a), T (b)) ⊂ Rn−1 of tropical hyperplanes with the property that the induced subdivision of Rn−1 supports a minimal cocellular (1) resolution MG . Proof. Without loss of generality we can assume that H is obtained from the complete graph Kn by removing cliques C1 , C2 , . . . , Cd , where V (C1 ) = {1, 2, . . . , k1 }, V (C2 ) = {k1 + 1, . . . , k2 }, . . . , V (Cd ) = {kd−1 + 1, . . . , kd }. We will explicitly write down the coordinates of the hyperplane arrangement that supports (1) our resolution of MG . For this let a = (0, . . . , 0) be the origin in Rn−1 and define b ∈ Rn−1 according to:   . . . , 1, 2, . . . , 2, . . . , d, . . . , d, d + 1, d + 2, . . . , n − kd + d), if kd 6= n (1,  | {z }  | {z } | {z } k1 -times k2 − k1 kd − kd−1 b=  (1, . . . , 1, 2, . . . , 2, . . . , d − 1, . . . , d − 1, 0, 0, . . . , 0 ), if kd = n.   | {z } | {z } {z } | {z } |  k1 -times k2 − k1 kd−1 − kd−2 kd − kd−1 − 1 Let A = (T (a), T (b)) be the resulting arrangement of tropical hyperplanes, and let XA denote the induced decomposition of Rn−1 . We first claim that the maximal regions of XA (1) are in one-to-one correspondence with the set of minimal generators of MG . Recall that for (1) any G, a redundant set of generators for MG is given by all monomials mσ for all subsets σ ⊂ [n] with 1 ≤ |σ| ≤ 2. For our given graph G, a minimal set of generators is given by i monomials m{i} = xdeg for all i ∈ [n], along with m{i,j} for all subsets {i, j} ∈ E(G). To see i this note that if ij ∈ / E(G) we have deg(i) deg(j) xj m{i,j} = xi = m{i} m{j} , and hence the monomial m{i,j} is redundant. On the other hand, if F ∈ XA is a maximal cell with x ∈ F (so that x does not intersect either of the hyperplanes T (a) nor T (b)) then x sits in exactly one cone of each hyperplane. Hence the sets Ta and Tb are each singletons (where T (x) = (Ta , Tb ) is the type of x). By construction the only such types that can occur are of the type ({i}, {i}) and ({i}, {j}), where ij ∈ E(G). Furthermore, all such pairs of singletons actually do occur exactly once as types of some region. To see this, note that since these types occur exactly once in a generic arrangement it suffices to show that these types are actually achieved in our particular arrangement A = (T (a), T (b)). We first consider the repeated singletons. To achieve ({i}, {i}) for i 6= n simply take the x to be a vector of 0’s except for a sufficiently large positive entry in the ith coordinate. To achieve ({n}, {n}) take x = (−1, −1, . . . , −1), a vector of all −1’s. To realize a cell with the type ({i}, {j}) with i < j we have to consider a couple of cases depending on the value of kd (the largest vertex in our removed cliques). In the case that kd 6= n we achieve the type ({i}, {j}), j 6= n by taking x to be the vector consisting of all 0’s except the values bi + 1 in the ith coordinate and bj + 1/2 in the jth coordinate. To achieve the pair ({i}, {n}) take x to be all 0’s except for the value bi + 1/2 in the ith coordinate. In the case that kd = n we can achieve any type ({i}, {j}) with i < j as follows. If j ∈ Cd take x to be all 0’s except bi + 1/2 in the ith coordinate and bj + 1 = 1 in the jth coordinate. 20 ANTON DOCHTERMANN Otherwise if j ∈ / Cd take x to be all 0’s except bi + 1 in the ith coordinate and bj + 1/2 in the jth coordinate. We next describe the mononial labeling on the complex XA , a modification of the monomial labeling of the case of the complete graph described in the proof of Theorem 4.6. If F is a cell of A (of any dimension), and x ∈ F has type TA (x) = (Ta , Tb ) then the monomial label of F is given by n Y mF = xdi i , (11) i=1 where   if i ∈ Ta and i ∈ Tb , deg(i) di = deg(i) − 1 if i ∈ Ta \Tb or i ∈ Tb \Ta ,  0 if i ∈ / Ta ∪ Tb . With this convention, the maximal cells of XA are labeled with monomials corresponding to (1) the set of minimal generators of MG . For all other faces F , Proposition 4.3 implies that the monomial label xF described in (10) is equal to the lcm of the monomial labels of all faces that contain F . If m ∈ Zn is any monomial then the same argument employed in the proof of Theorem 4.6 shows that the complex (XA )≤m is tropically convex and hence contractible. (1) Applying Lemma 2.6 then implies that XA supports a cocellular resolution of the ideal MG . Furthermore, if F ⊂ G are cells of XA with F 6= G then Proposition 4.5 along with the formula (11) implies that mF 6= mG , so that the resolution is minimal. This completes the proof.  0 0 1 4 2 3 1 4 2 3 x33 x32 x12x32 x13 x22x32 x12 x3x43 x1x43 x12x42 x23 x22x42 x43 x22 x2x43 x44 (1) Figure 6. Resolutions of MGi for the graphs G1 and G2 from Example 4.12. Example 4.12. As examples of the previous result, consider the graphs G1 and G2 depicted in Figure 6. The graph G1 is obtained by removing the complete graphs (edges) 12 and 34, and in G2 we have removed the triangle 123. The cellular resolutions of each ideal are illustrated in Figure (6). In both cases the complexes are dual to a non-generic arrangement of a pair of tropical hyperplanes in R3 . For G1 we have b = (1, 1, 0), for G2 we have b = (1, 1, 1). SKELETA OF G-PARKING FUNCTION IDEALS 21 5. Discussion and open questions We end with some discussion regarding other open questions and possible future directions. 5.1. Resolutions of other skeleta. We do not have uniform descriptions of resolutions (k) for other skeleton ideals MG , even for the complete graph G = Kn+1 . We have seen that a cellular resolution of Mn = MKn+1 is supported on B(∆n−1 ), the barycentric subdivision of the (n − 1)-dimensional simplex. As discussed above, a reasonable candidate for a geometric (k) complex supporting a resolution of the ideals Mn would be a subdivision of the simplex ∆n−1 that agrees with B(∆n−1 ) up to the k-dimensional skeleton. For the case of k = 1 we have seen that complex generated by a generic arrangement of two tropical hyperplanes has this property, but we do not know of any candidates for other skeleta. We remark that an arrangement of k tropical hyperplanes will not produce the desired complex, since for instance the number of maximal cells is not equal to the number of minimal generators of the relevant ideal. (n−2) ⊂ MG A particularly tractable case seems to be in codimension one, where the ideal MG is only missing the generator of MG given by the monomial m[n] . Here we would need a subdivision of ∆n+1 that agrees with the complex B(∆n+1 ) on the boundary but is missing the ‘interior’ vertex. 5.2. Enumeration of parking functions. A natural invariant of a parking function (thought of as a standard monomial in Mn := MKn+1 ) is its degree. With this statistic we can define a generating function Pn (q) of parking functions of length n as follows: X Pn (q) = q a1 +a2 +···+an α=(a1 ,a2 ,...,an ) where α ranges over all parking functions of length n (corresponding to standard monomials of Mn ). For small values of n we get P1 (q) = 1 P2 (q) = 2q + 1 P3 (q) = 6q 3 + 6q 2 + 3q + 1 (12) P4 (q) = 24q 6 + 36q 5 + 30q 4 + 20q 3 + 10q 2 + 4q + 1 Kreweras [20] studied another polynomial In (q) which enumerates (labeled) rooted forests by number of inversions, and showed that In (q) was closely connected to Pn (q). Here a rooted forest on [n] is a graph on the vertex set {1, 2, . . . , n} with the property that each connected component is a rooted tree. An inversion of a rooted forest is a pair (i, j) satisfying i < j and such that j lies on the unique path connecting k to i, where k is the root of the tree containing the vertex i. We let inv(F ) denote the number of inversions of F and define the polynomial In (q) as X In (q) = q inv(F ) F where F ranges over all labeled forests on [n]. 22 ANTON DOCHTERMANN The polynomials In (q) have the following connection to parking functions of complete graphs (as shown in [20]): n q ( 2 ) In (1/q) = Pn (q). (k) Is there an analogous story for the standard monomials of the skeleton ideals Mn ? Using the degree statistic we can similarly define a generating function X Pn(k) (q) = q b1 +b2 +···+bn β=(b1 ,b2 ,...,bn ) (k) where β ranges over all standard monomials of Mn . For the case of k = 1 and small values of n we have (1) P1 (q) = 1 (1) P2 (q) = 2q + 1 (13) (1) P3 (q) = 3q 4 + 7q 3 + 6q 2 + 3q + 1 (1) P4 (q) = 4q 9 + 13q 8 + 28q 7 + 38q 6 + 40q 5 + 31q 4 + 20q 3 + 10q 2 + 4q + 1 (1) In Section 3 we have seen that standard monomials of Mn are counted (in a weighted fashion) by the spanning T U -subgraphs of Kn (with spanning trees appearing as a special cases). Is there a notion of an ‘inversion’ for a T U -subgraph that recovers this statistic? 5.3. Generalized parking. We briefly recall the meaning of ‘parking’ in the the parking functions ideals that we have been studying. We imagine a parking lot consisting of n labeled spots lined up from right to left, and a sequence of positive integers (a1 , a2 , . . . , an ) as encoding the preferences for parking spaces among n cars: the first car prefers spot a1 , the second car a2 , and so on. The cars enter the lot from the right and the procedure for parking is as follows: the first car takes spot a1 , the second car takes spot a2 unless it is already taken, in which case it takes the next available spot (moving from right to left). If no spot is available that car is not able to park and gives up. The procedure continues with a3 , etc. The sequence (a1 , a2 , . . . , an ) is a parking function if all n cars succeed in parking in the lot. It can be shown that the set of parking functions correspond to the (exponent vectors of) standard monomials of MKn+1 (to be precise we must add 1 to each coordinate, so that e.g. if n = 3 then x21 x3 corresponds to the parking function (3, 1, 2)). Is there a similar ‘parking’ interpretation for the standard monomials of the skeleton ideals (k) Mn defined above? We note that these objects do not seem to be related (as far as we know) to another generalization of parking functions discussed in [26]. 5.4. Power ideals. Recall that in [23] the authors were interested in another class of ‘power ideals’ that one associate to a graph G on vertex set {0, 1, . . . , n}. We briefly recall the definition. For any nonempty subset σ ⊆ {1, 2, . . . , n} let X Dσ pσ = xi , i∈σ P where Dσ = i∈σ dσ (i), with dσ defined in Equation (3). Now define JG to be the ideal in the polynomial ring S = K[x1 , x2 , . . . , xn ] generated by the pσ for all nonempty subsets σ, and let BG denote the quotient algebra BG = S/JG . Recall that AG = S/MG is the algebra SKELETA OF G-PARKING FUNCTION IDEALS 23 obtained by factoring out the G-parking function ideal. The algebras AG and BG are both graded, and in [23] it is shown that the Hilbert series coincide. In fact both algebras have a K-basis given by the monomials xb where b ranges over all G-parking functions. This is particularly surprising since (in general) the monomial ideal MG is not an initial ideal of the ideal JG for any monomial order, and hence standard Gröbner degeneration techniques do not apply. In our context we have a natural definition for the skeleton of these power ideals, mimicking the construction of the monomial case discussed above. Namely, for any graph G and integer (k) k with 0 ≤ k ≤ n − 1 we define the k-skeleton power ideal JG to be the subideal of JG given by (k) JG = hpσ : 1 ≤ |σ| ≤ k + 1i. (k) (k) One can check that for 0 ≤ k ≤ 1 we have MG = JG (equality as ideals), but already for the 2-skeleton the ideals differ. In fact the quotient algebras can have different Hilbert series, as the next example illustrates. Example 5.1. Let G be the graph obtained from removing the edge 12 from the complete graph on vertex set {0, 1, 2, 3, 4}. Then we have (2) MG = hx31 , x32 , x43 , x44 , x21 x33 , x21 x34 , x22 x33 , x22 x34 , x33 x34 , x21 x22 x23 , x21 x2 x24 , x1 x23 x24 , x2 x23 x24 i (14) (2) JG = hx31 , x32 , x43 , x44 , (x1 + x2 )6 , (x1 + x3 )5 , (x1 + x4 )5 , (x2 + x3 )5 , (x2 + x4 )5 , (x3 + x4 )6 , (x1 + x2 + x3 )6 , (x1 + x2 + x4 )5 , (x1 + x3 + x4 )5 , (x2 + x3 + x4 )5 i (15) (2) According to our calculations with Macaulay2 [18], the graded components of S/MG and (2) S/JG have the same dimension except in degree 6, where (2) (2) dimK (S/MG )6 = 7 > 6 = dimK (S/JG )6 . (k) (k) We do not know if termwise inequalities Hilb S/MG ≥ Hilb S/JG hold for the Hilbert functions of the two algebras, as was the case for deformations of more general monotone monomial ideals [23] (and as in Example 5.1). We will point that in this example the (2) (2) monomial basis for (S/MG )6 does not span the linear space (S/JG )6 . References [1] S. Backman, A Bijection Between the Recurrent Configurations of a Hereditary Chip-Firing Model and Spanning Trees, preprint available at arxiv.org:1401.3309. [2] M. Baker and S. Norine, Riemann-Roch and Abel-Jacobi Theory on a Finite Graph, Adv. Math. 215 (2007), pp. 766–788. [3] R. P. Bapat, Graphs and matrices, Universitext, Springer-Verlag London, 2010. [4] Dave Bayer and Bernd Sturmfels, Cellular resolutions of monomial modules, J. Reine Angew. Math. 502 (1998), pp. 123–140. [5] A. Benjamin and F. Juhnke, Another way of counting N N , SIAM J. Disc. Math. 5, No. 3 (1992), pp. 377–379. [6] S. Caracciolo, G. Paoletti, A. Sportiello, Multiple and inverse topplings in the Abelian Sandpile Model, Eur. Phys. J. Special Topics 212 (2012). [7] C. Chauve, S. Dulucq, O. Guibert, Enumeration of some labelled trees, Proceeding of SFCA/FPSAC 2000 (Moscow, June 2000), D. Krob and A. Mikhalev eds., Springer, pp. 146–157, 2000. 24 ANTON DOCHTERMANN [8] Denis Chebikin, Pavlo Pylyavskyy, A family of bijections between G-parking functions and spanning trees, J. Combin. Theory Ser. A 110, Issue 1 (2005), pp. 31–41. [9] R. Cori, D. Rossin, B. Salvy, Polynomial ideals for sandpiles and their Grobner bases, Theor. Comp. Sci. 276 (2002), pp. 1–15. [10] R. Cori, Y. Le Borgne, The sand-pile model and Tutte polynomials, Adv. Appl. Math. 30 (2003), pp. 44–52. [11] J. De Loera, J. Rambau, F. Santos, Triangulations, Structures for Algorithms and Applications, Algorithms and Computation in Mathematics, vol. 25, Springer-Verlag Berlin Heidelberg, 2010. [12] M. Develin, B. Sturmfels, Tropical convexity, Doc. Math. 9 (2004), pp. 1–27. [13] Deepak Dhar, Self-organized critical state of sandpile automaton models, Phys. Rev. Lett. 64 (1990), no. 14, pp. 1613–1616. [14] A. Dochtermann and R. Sanyal, Laplacian ideals, arrangements, and resolutions, J. Algebr. Comb. (2014) 40, pp. 805–822. [15] A. Dochtermann, M. Joswig, R. Sanyal, Tropical types and associated cellular resolutions, J. Algebra. 356 (2012), pp. 304–324. [16] J. Francon, Acyclic and parking functions, J. Combin. Theory Ser. A 18 (1975), pp. 27–35. [17] Andrei Gabrielov, Abelian avalanches and Tutte polynomials, Phys. A 195 (1993), no. 1-2, pp. 253–274. [18] D. Grayson, M. Stillman, Macaulay2, a software system for research in algebraic geometry, Available at http://www.math.uiuc.edu/Macaulay2/ [19] Alan G. Konheim and Benjamin Weiss, An occupancy discipline and applications, SIAM J. Applied Math. 14 (1966), 1266–1274. [20] G. Kreweras, Une famille de polynômes ayant plusieurs propriétés énumeratives. (French) Period. Math. Hungar. 11 (1980), no. 4, pp. 309–320. [21] C.L. Mallows, John Riordan, The inversion enumerator for labeled trees, Bull. Amer. Math. Soc. Volume 74, Number 1 (1968), pp. 92–94. [22] E. Miller, B. Sturmfels, Combinatorial commutative algebra. Graduate Texts in Mathematics 227. Springer-Verlag, New York, 2005. [23] Alexander Postnikov and Boris Shapiro, Trees, parking functions, syzygies, and deformations of monomial ideals, Trans. Amer. Math. Soc. 356 (2004), pp. 3109–3142. [24] Richard Stanley, Hyperplane Arrangements, Parking Functions and Tree Inversions, Mathematical Essays in honor of Gian-Carlo Rota Volume 161 of the series Progress in Mathematics, pp. 359–375. [25] L. Takács, On Cayley’s Formula for Counting Forests, J. Combin. Theory Ser. A 53, (1990), pp. 321–323. [26] Catherine Huafei Yan, On the enumeration of generalized parking functions, Proceedings of the Thirtyfirst Southeastern International Conference on Combinatorics, Graph Theory and Computing (Boca Raton, FL, 2000), 2000, pp. 201–209. Department of Mathematics, Texas State University, San Marcos E-mail address: [email protected]
0math.AC
Optimal Gossip Algorithms for Exact and Approximate Quantile Computations arXiv:1711.09258v1 [cs.DS] 25 Nov 2017 Bernhard Haeupler CMU Jeet Mohapatra MIT Hsin-Hao Su UNC Charlotte Abstract This paper gives drastically faster gossip algorithms to compute exact and approximate quantiles. Gossip algorithms, which allow each node to contact a uniformly random other node in each round, have been intensely studied and been adopted in many applications due to their fast convergence and their robustness to failures. Kempe et al. [KDG03, FOCS’03] gave gossip algorithms to compute important aggregate statistics if every node is given a value. In particular, they gave a beautiful O(log n + log 1 ) round algorithm to -approximate the sum of all values and an O(log2 n) round algorithm to compute the exact φ-quantile, i.e., the the dφne smallest value. We give an quadratically faster and in fact optimal gossip algorithm for the exact φ-quantile problem which runs in O(log n) rounds. We furthermore show that one can achieve an exponential speedup if one allows for an -approximation. We give an O(log log n + log 1 ) round gossip algorithm which computes a value of rank between φn and (φ + )n at every node.Our algorithms are extremely simple and very robust - they can be operated with the same running times even if every transmission fails with a, potentially different, constant probability. We also give a matching Ω(log log n + log 1 ) lower bound which shows that our algorithm is optimal for all values of . 1 Introduction Today, due to the vast amount of data and advances in connectivity between computers, distributed data processing has become increasingly important. In distributed systems, data is stored across different nodes. When one requires some aggregate properties of the data, such as, sums, ranks, quantiles, or other statistics, nodes must communicate in order to compute these properties. Aggregating data in an efficient and reliable way is a central topic in distributed systems such as P2P networks and sensor networks [YG02, MFHH02, SBAS04]. We consider uniform gossip protocols, which are often very practical due to their fast convergence, their simplicity, and their stability under stress and disruptions. In uniform gossiping protocols, computation proceeds in synchronized rounds. In each round, each node chooses to pull or push. In a push a node chooses a message, which is delivered to a uniformly random other node. In a pull each node receives a message from a random node. The message size is typically restricted to O(log n) bits. The (time) complexity of an algorithm is measured by the number rounds executed. One typically wants algorithms that succeed with high probability, i.e., with probability at least 1 − 1/ poly(n). In this paper, we study the quantile computation problem. In the exact φ-quantile problem each node v is given a O(log n) bit value xv and wants to compute the dφne smallest value overall. In the -approximate φ-quantile problem each node wants to compute a value whose rank is between (φ + )n and (φ − )n. Previously, Kempe et al. [KDG03] gave a beautiful and simple O(log n + log 1 ) round gossip algorithm to approximate the sum of all values up to a (1 ± ) factor. They also showed how to use this algorithm to solve the exact φ-quantile problem in O(log2 n) rounds with high probability. The main result of this paper is a quadratically faster gossip algorithm for the φ-quantile problem. The O(log n) round complexity of our algorithm means that the exact φ-quantile can be computed as fast as broadcasting a single message. Theorem 1.1. For any φ ∈ [0, 1] there is a uniform gossip algorithm which solves the exact φquantile problem in O(log n) rounds with high probability using O(log n) bit messages. Clearly the running time of this algorithm is optimal as Ω(log n) rounds are known to be neccesary to even just broadcast to each node the φ-quantile value, after it has been identified. Equally interestingly we show that one achieve even faster algorithms if one considers the approximate φ-quantile problem. While a O( 12 log n) round algorithm for an -approximation follows from q simple sampling and a O(log n) round algorithm computing the median up to a ±O( logn n ) (but not general quantiles) was given by Doerr et al. [DGM+ 11], no approximation algorithm for the quantile problem with a sub-logarithmic round complexity was known prior to this work. We give an O(log log n + log(1/)) round algorithm for -approximating any φ-quantile which, for arbitrarily good constant approximations, is exponentially faster than our optimal exact algorithm: Theorem 1.2. For any constant or non-constant (n) > 0 and any φ ∈ [0, 1], there exists a uniform 1 ) rounds gossip algorithm that solves the -approximate φ quantile problem in O(log log n + log (n) with high probability using O(log n) bit messages. We also give a Ω(log 1 ) and a Ω(log log n) lower bound for the -approximate φ-quantile problem, which shows that our algorithm is optimal for essentially any value of . 1 n <  < 1/8 and φ ∈ [0, 1], any gossip algorithm that uses less Theorem 1.3. For any 10 log n 1 than 2 log log n or less than log4 8 round fails to solve the -approximate φ-quantile problem with probability at least 1/3. This remains true even for unlimited message sizes. We furthermore show that our algorithms can be made robust to random failures, i.e., the same round complexities apply even if nodes fail with some constant probability. We remark that a small caveat of excluding an exp(−t) fraction of nodes after a runnig time of t rounds is necessary and indeed optimal given that this is the expected fraction of nodes which will not have participated in any successful push or pull after t rounds. Theorem 1.4. Suppose in every round every node fails with a, potentially different, probability bounded by some constant µ < 1. For any φ ∈ [0, 1] there is a gossip algorithm that solves the φ quantile problem in O(log n) rounds. For any t and any (n) > 0, there furthermore exists a gossip 1 algorithm that solves the -approximate φ-quantile problem in O(log log n + log (n) + t) rounds for n all but 2t nodes, with high probability. Despite being extremely fast and robust our algorithms remain very simple. In fact they do little more than repeatedly sampling two or three nodes, requesting their current value and selecting the largest, smallest, or median value. Given that in many cases an -approximation is more than sufficient we expect this algorithm to easily find applications in areas like sensor networks and distributed database systems. For instance, suppose that a sensor network consisting of thousands of devices is spread across an object to monitor and control the temperature. Say the top and bottom 10%-quantiles need special attention. By computing the 90%- and 10%-quantile, each node can determine whether it lies in the range. It is unlikely that such a computation needs to exact. In fact, for any 0 <  < 1, running O(1/) approximate quantile computations suffices for each node to determine its own quantile/rank up to an additive . The fact that this can be done in O(log log n) rounds further demonstrates the power of approximations as there is not even a o(n) algorithm known1 which allows each node to compute its quantile/rank exactly. Corollary 1.5. For any constant or non-constant  > 0 and given that each node has a value there is a gossip algorithm that allows every node to approximate the quantile of its value up to an additive  in 1 · O(log log n + log 1 ) rounds with high probability using O(log n) bit messages. Technical Summary. While computing exact quantiles seems to be a very different problem from the approximate problem at first we achieve our exact algorithm by first designing an extremely efficient solution to the -approximate quantile problem running in O(log log n + log 1 ) rounds. This algorithm is in some sense based on sampling and inherently is not able to work for the exact quantile problem or too small  itself, as it might randomly discard the target value in its first iteration. However, we show that the algorithm does works for  larger than some polynomial in n. This allows us to bootstrap this algorithm and repeatedly remove a polynomial fraction of values within O(log n) rounds until, after a constant number of such iterations, only the target value persists. Overall this leads to an O(log log n + log 1 ) algorithm for the -approximate φ-quantile problem which works for  values that can be any function of n. This is actually generelizes the 1 O(log n) algorithm for the exact φ-quantile problem, too, given that the 2n -approximate φ-quantile problem is accurate enough to compute exact ranks and quantiles. 1 The trivial algorithm which broadcasts the maximum value n times requires O(n log n) rounds. Using network coding gossip [Hae16] one can improve this to O(n) rounds. It is likely that computing the exact rank at each node cannot be done faster. 2 Next we outline an, indeed very simple, intuition of why a time complexity of O(log log n + log 1 ) is conceivable for the quantile computation problem: Suppose we sample Θ(log n/2 ) many values uniformly and independently at random. With high probability the φ-quantile of the sampled values is an -approximation to the φ-quantile in the original data. Since each node can sample t node values (with replacement) in t rounds, one immediately get an O(log n/2 ) round algorithm that uses O(log n) bit messages. Using larger message sizes, it is possible to reduce the number of rounds. Consider the following doubling algorithm: Each node v maintains a set Sv such that initially Sv = {xv }. In each round, let t(v) be the node contacted by v. Node v updates Sv by setting Sv ← Sv ∪St(v) . Since the set size essentially doubles each round, after log O(log n/2 ) = O(log log n + log 1 ) rounds, we have sampled Ω(log n/2 ) values uniformly, albeit not quite independently, at random. A careful analysis shows that indeed a O(log log n + log 1 ) running time can be achieved using messages of size Θ(log2 n/2 ) bits. Our first approach for reducing the message sizes tried to utilize the quantile approximation sketches from the streaming algorithm community (see related work). We managed to reduce the message complexity to O( 1 · log n · (log log n + log(1/))) by adopting the compactor ideas from these streaming sketches. A write-up of this might be of independent interest and can be found in the Appendix A. Unfortunately even if one could losslesly port the state-of-the-art compactors scheme from [KLL16] into this setting, the Ω( 1 log log(1/δ)) for getting -approximate quantile sketches with probability 1 − δ suggests that one cannot achieve a o(log n log log n) message size this way, even if  is a constant. In contrast to most other distributed models of computation gossip algorithms furthermore do not allow to easily shift extra factors in the message size over to the round complexity. In fact, we did not manage to devise any o(log n) round gossip algorithm based on sketching which adheres to the standard O(log n) bound on message sizes. Instead of sticking to the centralized mentality where each node tries to gather information to compute the answer, consider the following 3-TOURNAMENT mechanism. In each iteration, each node uniformly sample three values (in three rounds) and assign its value to the middle one2 . Intuitively nodes close to the median should have a higher probability of surviving and being replicated. Indeed, we show that the number of nodes that have values that are  close to the median grows exponentially for the first O(log 1 ) iterations. After that, the number of nodes with values more than n away from the median decreases double exponentially. For sufficiently large  this simple 3-TOURNAMENT algorithm gives an approximation of the the median in O(log 1 +log log n) iterations. In general, if we want to approximate the φ-quantile, we shift the [φ − , φ + ] quantiles to the quantiles around the median by the following 2-TOURNAMENT mechanism. If φ < 1/2, each node samples two values and assign its value to the higher one. The case for φ > 1/2 is symmetric. Intuitively this process makes it more likely for nodes with higher/smaller values to survive. Indeed, we show that with a bit of extra care in the last iterations, O(log 1 ) invocations suffice to shift the values around the φ-quantile to almost exactly the median, at which point one can apply the median approximation algorithm. Finally, our lower bound comes from the fact that if one chooses Θ(n) nodes and either gives them a very large or a very small value, then knowing which of the two cases occurred is crucial for computing any -approximate quantiles. However, initially only these Θ(n) nodes have such information. We show that it takes Ω(log log n + log 1 ) rounds to spread the information from these 2 Such gossip dynamics have also been analyzed in [DGM+ 11] for the setting of adversarial node failures and in [FHK17] for the setting of random message corruptions. 3 nodes to every node, regardless of the message size. Related Work The randomized gossip-based algorithms dates back to Demers et al. [DGH+ 87]. The initial studies are on the spreading of a single message [FG85, Pit87, KSSV00], where Karp et al. [KSSV00] showed that O(log n) round and O(n log log n) total messages is sufficient to spread a single message w.h.p. Kempe et al. [KDG03] studied gossip-based algorithms for the quantile computation problem as well as other aggregation problems such as computing the sum and the average. Kempe et al. developed O(log n) rounds algorithm to compute the sum and average w.h.p. Later, efforts have been made to reduce the total messages to O(n log log n) for computing the sum and the average [KDN+ 06, CP12]. Using the ability to sample and count, Kempe et al. implemented the classic randomized selection algorithm [Hoa61, FR75] in O(log2 n) rounds. Doerr et al. [DGM+ 11] considered gossip algorithms for the problem of achieving a stabilizing consensus algorithm under adversarial node failures. They analyze the median rule, i.e., sample three values and keepq the middle value, in this setting and show that O(log n) rounds suffice √ to converge to an ±O( logn n )-approximate median even if O( n) adversarial node failures occur. Similar gossip dynamics were also studied in [FHK17] which considers randomly corrupted (binary) messages. The exact quantile computation is also known as the selection problem, where the goal is to select the k’th smallest element. The problem has been studied extensively in both centralized and distributed settings. Blum et al. [BFP+ 73] gave a deterministic linear time algorithm for the problem in the centralized setting. In the distributed setting, Kuhn et al. [KLW07] gave an optimal algorithm for the selection problem that runs in O(D logD n) rounds in the CONGEST model, where D is the diameter of the graph. Many works have been focused on the communication complexity aspect (i.e. the total message size sent by each node) of the problem [SFR83, RSS86, SSS88, SS89, SSS92, NSU97, GK04, PS07]. Most of them are for complete graphs or stars. Others studied specific class of graphs such as two nodes connected by an edge [Rod82, CT87], rings, meshes, and complete binary trees [Fre83]. The quantile computation problem has also been studied extensively in the streaming algorithm literature [MP80, ARS97, MRL99, GK01, GM09, HT10, ACH+ 13, MMS13, FO15, KLL16], where the goal is to approximate φ-quantile using a small space complexity when the data comes in a single stream. 2 The Tournament Algorithms In this section, we present our algorithm for the -approximate quantile computation problem for sufficiently large . For convenience, we use a ± b to denote the interval [a − b, a + b]. Theorem 2.1. For any constant or non-constant (n) = Ω(1/n0.096 ) and any φ ∈ [0, 1], there exists 1 a uniform gossip algorithm that solves the -approximate φ quantile problem in O(log log n+log (n) ) rounds with high probability using O(log n) bit messages. The algorithm is divided into two phases. In the first phase, each node adjusts its value so that the quantiles around the φ-quantile will become the median quantiles approximately. In the second phase, we show how to compute the approximate median. 4 2.1 Phase I: Shifting the Target Quantiles to Approximate Medians Let H denote the nodes whose quantiles lie in (φ + , 1], L denote the nodes whose quantiles lie in [0, φ − ), and M denote the nodes whose quantiles lie in [φ − , φ + ]. Let Li , Mi , and Hi denote the set L, M , and H respectively at the end of iteration i for i ≥ 1 and L0 , M0 , and H0 denote the sets in the beginning. The goal is to show that by the end of the algorithm at iteration t, the size of |Lt | and |Ht | are 1/2 − Ω() so that an approximate median lies in Mt , which consists of our target quantiles. Let h0 = 1 − (φ + ) and l0 = φ − . We first consider the case where h0 ≥ l0 and the other case is symmetric. Initially, we have |Hn0 | ∈ h0 ± 1/n. Let hi+1 = h2i for i ≥ 1. We run the 2-TOURNAMENT def algorithm (Algorithm 1) until the iteration t such that ht ≤ T , where T = 1/2 − . We will show that t = O(log(1/)) and |Hni | concentrates around hi for iteration 1 ≤ i ≤ t − 1 and in the end we have |Hnt | ∈ T ± 2 . Algorithm 1 2-TOURNAMENT(v) 1: h0 ← (1 − (φ + )) 2: i ← 0, T = 1/2 − . 3: while hi > T do 4: hi+1 ← h2i  5: 6: 7: 8: 9: 10: 11: 12: 13: i −T δ ← min 1, hih−h i+1 With probability δ do Select two nodes t1 (v) and t2 (v) randomly xv ← min(xt1 (v) , xt2 (v) ) Otherwise do Select a node t1 (v) randomly xv ← xt1 (v) i←i+1 end while The algorithm ends when hi decreases below T . The lemma below bounds the number of iterations needed for this to happen. It can be shown that since h2i squares in each iteration, the quantity (1 − hi ) roughly grows by a constant factor in each iteration. Since initially (1 − h0 ) ≥ , O(log(1/)) iterations suffice for hi to decrease below T . Lemma 2.2. Let t denote the number of iterations in Algorithm 1, t ≤ log7/4 (4/) + 2. Proof. The algorithm ends when ht ≤ 1/2 − . The highest possible value for h0 is 1 − . We show i i−1 that hi ≤ 1 − 47 ·  provided that 1 − 47 ·  ≥ 3/4. 5 Suppose by induction that hi−1 ≤ 1 −  7 i−1 4 · . We have hi = h2i−1  i−1 !2 7 ≤ 1− · 4  i−1 !  i−1 7 7 ·· 2− · =1− 4 4    i  i−1 1 7 7 ·· 2− ≤1− · ≤1− 4 4 4  i−1 7 1− ·  ≥ 3/4 4 Therefore, after i0 = log7/4 (4/) iterations we have, hi0 ≤ 1 − ( 47 )i ·  ≤ 1 − hi0 +2 ≤ ( 43 )4 < 12 −  for  < 1/8, it must be the case t ≤ i0 + 2 = O(log(1/)). 1 4 = 3 4. Since Note that Line 7 and Line 8 are executed with probability 1 during the first t − 1 iterations. We show the following. | | Hi ] = Lemma 2.3. For iteration 1 ≤ i < t − 1, E[ |Hi+1 n |Hi |2 . n2 Proof.      |Hi+1 | 1 X |Hi | 2 |Hi |2 1X | Hi = Pr(xt1 (v) ∈ Hi ∧ xt2 (v) ∈ Hi ) = = E n n n n n2  v∈V v∈V | | Therefore, for 1 ≤ i ≤ t − 1, if |Hni | ∼ hi (∼ means they are close), then |Hi+1 ∼ hi+1 if |Hi+1 n n concentrates around its expectation, since hi+1 = h2i . In the last iteration, we truncate the probability of doing the tournament by doing it with only probability δ for each node, so that ideally we hope to have E[ |Hnt | |Ht−1 ] = T . However, since δ is | calculated with respect to ht−1 instead of the actual |Ht−1 n , we need the following lemma to bound | ∼ ht−1 , then indeed we have the deviated expectation. In the next lemma, we show that if |Ht−1 n |Ht | E[ n |Ht−1 ] ∼ T . 00 Lemma 2.4.h Suppose that i (1 −  )ht−1 ≤ T − 300 ≤ E |Hnt | | Ht−1 ≤ T + 300 . |Ht−1 | n ≤ (1 + 00 )ht−1 for some 0 < 00 < 1. We have Proof. First,    |Ht−1 |2 |Ht | 1X |Ht−1 | E | Ht−1 = δ· + (1 − δ) · n n n2 n v∈V   |Ht−1 | |Ht−1 | · (1 − δ) + δ · = n n  6 |Ht−1 | n ≤ (1 + 00 )ht−1 . We have    |Ht | E | Ht−1 ≤ (1 + 00 )ht−1 · (1 − δ) + δ · (1 + 00 )ht−1 n   T · (1 − ht−1 ) − 00 ht−1 T + 00 h2t−1 00 = (1 +  )ht−1 · ht−1 − ht   2 T · (ht−1 − ht−1 ) 00 h2t−1 − 00 ht−1 T 00 = (1 +  ) · + ht−1 · ht−1 − ht ht−1 − ht   (ht−1 − T ) = (1 + 00 ) · T + 00 h2t−1 · ht−1 − ht  00 00 ≤ (1 +  ) · T +  ht ≤ T + 300 Suppose that | Similarly, if |Ht−1 ≥ (1 − 00 )ht−1 , we have n    |Ht | E | Ht−1 ≥ (1 − 00 )ht−1 · (1 − δ) + δ · (1 − 00 )ht−1 n   T · (1 − ht−1 ) + 00 ht−1 T − 00 h2t−1 00 = (1 −  )ht−1 · ht−1 − ht   2 00 h2t−1 − 00 ht−1 T T · (ht−1 − ht−1 ) 00 − ht−1 · = (1 −  ) · ht−1 − ht ht−1 − ht   (h − T ) t−1 = (1 − 00 ) · T − 00 h2t−1 · ht−1 − ht  ≥ (1 − 00 ) · T − 00 ht ≥ T − 300 In the end, we hope that each iteration 1 ≤ i ≤ t − 1, |Ht | n |Hi | n deviates from T by at most /2. To achieve this, we show that in deviates from its expectation, |Hi−1 |2 , n2 by at most a (1 ± 0 ) factor, where 0 = /2t+4 is an error control parameter that is much less than . Note that deviated from h2i−1 Lemma 2.5. Let  = Ω(1/n1/4.47 ) and 0 = ∈ (1 ± is already |Hi | n |Hi−1 |2 2 n = hi to some degree. The next lemma bounds the cumulative deviation of from hi . Note that 0 has to be large enough in order guarantee that range. This also implies  has to be large enough. |Hi | n |Hi−1 |2 n2 2i+1 −1 0 )  . 2t+4 |Hi | n lies in the (1 ± 0 ) · W.h.p. for iteration 0 ≤ i < t, we have · hi . Proof. We will show by induction. Initially, we have (1 − 0 )h0 ≤ (1 − 1/n) · h0 ≤ Suppose that |Hi | n i+1 −1 ∈ (1 ± )2 |H0 | ≤ (1 + 1/n)h0 ≤ (1 + 0 )h0 n · hi is true. Then by Lemma 2.3, |Hi |2 n2 i+2 ≥ (1 − 0 )2 −2 · h2i E[|Hi+1 | | Hi ] = ≥ (1 − 0 · (2t+2 − 2)) · h2i ≥ (1 − ) · h2i = Ω(1) 7 (1 − a)b ≥ 1 − ab  0 = t+4 , hi ≥ 1/2 −  2 (1) Also, p 0 =  · 2log7/4 (/4)−2 /16 ≥ 2.24 /256 = Ω( log n/n) (2) Therefore, by (1), (2), and Chernoff Bound, we have   log n |Hi+1 | |Hi+1 | 02 0 Pr ∈ (1 ±  ) · E[ | Hi ] ≤ 1−2·e−Ω( E[|Hi+1 ||Hi ]) ≤ 1−2·e−Ω( n ·n) = 1−1/ poly(n) n n Thus, w.h.p. |Hi+1 | n | ∈ (1 ± 0 ) · E[ |Hi+1 | Hi ]. n |Hi+1 | ≤ (1 + 0 ) · n  |Hi | n 2  2 i+1 ≤ (1 + 0 ) · (1 + 0 )2 −1 · hi = (1 + 0 )2 Similarly, we can show i+1 (1 ± 0 )2 −1 · hi . |Hi | n ≥ (1 − 0 )2 i+2 −1 i+2 −1 · hi+1 · hi+1 . Therefore, we conclude for 0 ≤ i < t, |Hi | n ∈ Combining Lemma 2.4 for the deviation on the last round and Lemma 2.5 for the deviation on first t − 1 rounds, the following lemma summarizes the final deviation. Lemma 2.6. Let  = Ω(1/n1/4.47 ). At the end of the algorithm, w.h.p. T −  2 ≤ |Ht | n ≤ T + 2 . |  Proof. Let 0 = 2t+4 . By Lemma 2.5, we have |Ht−1 ∈ (1 ± 0 )2 −1 · ht−1 w.h.p. n t Note that (1+0 )2 −1 ≤ 1+2(2t − 1)0 ≤ 1+2t+1 0 , since (1+a)b ≤ 1+2ab provided 0 < ab ≤ 1/2 t and we have (2t − 1)0 ≤ /16 ≤ 1/2. Similarly, (1 − 0 )2 −1 ≥ 1 − 2t+1 0 . Therefore, we can let 00 = 2t+1 0 and apply Lemma 2.4 to conclude that   |Ht | t+1 0 00 T − 3 · 2  ≤ T − 3 ≤ E | Ht−1 ≤ T − 300 ≤ T + 3 · 2t+1 0 n p | By Lemma 2.5, (1), and (2), we have |Ht−1 = Ω(1) and 0 = Ω( log n/n). Therefore, we can n apply Chernoff Bound to show w.h.p. |Ht | ∈ (1 ± )E[|Ht | | Ht−1 ]. Thus, t |Ht | ≤ (1 + 0 )(T + 3 · 2t+1 0 ) n |Ht | T − 4 · 2t+1 0 ≤ ≤ T + 4 · 2t+1 0 n  |Ht |  T− ≤ ≤T + 2 n 2 (1 − 0 )(T − 3 · 2t+1 0 ) ≤ 0 = /(2t+4 ) Initially, |Mn0 | ≥ 2. The following three lemmas are for showing Lemma 2.10, which states that |Mt | |Mi | n does not decrease much from 2. This is done by showing that n does not decrease in each round, except possibly the last. We first derive bounds on the expectation of |Mni+1 | in terms |Mni | in each round. Lemma 2.7. For 0 ≤ i < t − 1, suppose that |Mi | n · (1 + 2). |Hi | n 8 ≥ 1/2 and |Mi | n ≥ |M0 | n , E[ |Mni+1 | | Mi , Hi ] ≥ Proof. Therefore, we have  !  |Mi | |Hi | |Mi | 2 2· · + n n n v∈V    |Hi | |Mi | 1 X |Mi | 2· + = · n n n n E[|Mi+1 | | Mi , Hi ] 1 X = · n n v∈V 1 X |Mi | ≥ · · (1 + 2) n n |Hi | ≥ 1/2, |Mi | ≥ |M0 | ≥ 2n n v∈V ≥ |Mi | · (1 + 2) n Lemma 2.8. Suppose that |Ht−1 | n ≥ 1 2 − 3 2 and |Mt−1 | n ≥ |M0 | n , E[ |Mnt | | Mt−1 , Ht−1 ] ≥ (1 − ) · |Mnt−1 | . Proof. !   ! 1 X |Mt−1 | |Ht−1 | |Mt−1 | 2 |Mt−1 | E[|Mt | | Mt−1 , Ht−1 ] = · δ· 2· · + + (1 − δ) · n n n n n n v∈V    |Mt−1 | |Ht−1 | |Mt−1 | |Mt−1 | =δ· 2· + + (1 − δ) · n n n n |Mt−1 | 1 3 |Mt−1 | |M0 | |Mt−1 | · (1 − ) + (1 − δ) · − , ≥ ≥ 2 ≥δ· n n 2 2 n n |Mt−1 | ≥ (1 − ) · n Lemma 2.9. For 0 ≤ i ≤ t − 1, suppose that 02 1 − 2 · e−Ω( E[|Mi+1 ||Mi ,Hi ]) . |Mi | n ≥ |M0 | n , Pr( |Mni+1 | ∈ (1 ± 0 ) · E[ |Mni+1 | | Mi , Hi ] ≤ Proof. Since the events that v ∈ Mi+1 are independent for all v, by Chernoff Bound,   |Mi+1 | E[|Mi+1 | | Mi , Hi ] 02 0 ≤ e−Ω( E[|Mi+1 ||Mi ,Hi ]) Pr > (1 +  ) · n n   |Mi+1 | E[|M | 02 i+1 | Mi , Hi ] 0 Pr < (1 −  ) · ≤ e−Ω( E[|Mi+1 ||Mi ,Hi ]) n n Lemma 2.10. Let  = Ω(1/n1/4.47 ). At the end of the algorithm, w.h.p. |Mt | n ≥ 7 4. Proof. First note that for 0 ≤ i ≤ t − 2, w.h.p. we must have |Hni | ≥ 1/2. Otherwise, by Lemma | 2.3 and Chernoff Bound with error 0 = 1/3, w.h.p. we have |Hi+1 ≤ (1 + 0 )(1/2)2 ≤ 1/2 − . This n implies t = i + 1, a contradiction occurs. We will show by induction that |Mni | ≥ |Mn0 | for 0 ≤ i ≤ t − 1 first. Initially, |Mn0 | ≥ |Mn0 | is true. Suppose that |Mni | ≥ |Mn0 | is true.   |Mi+1 | < (1 − 0 ) · E[|Mi+1n||Mi ,Hi ] n w.h.p. |Mni+1 | ≥ (1−0 )· E[|Mi+1n||Mi ,Hi ] Let 0 = /4. By Lemma 2.9 and Lemma 2.7, we have Pr e −Ω(02 E[|M i+1 ||Mi ,Hi ]) −Ω(02 n) =≤ e = 1/ poly(n). Therefore, 9 ≤ ≥ (1 − /4) · (1 + 2) · |Mni | ≥ |Mni | . From this statement, we can also obtain that in the end of round t − 1, |Mt−1 |  |Mt−2 |  |M0 | ≥ (1 − ) · (1 + 2) · ≥ (1 − ) · (1 + 2) · n 4 n 4 n Also let 00 = /2t+4 . By Lemma 2.5, w.h.p. we have |Ht−1 |  1 3 i+1 ≥ (1 − 00 )2 −1 · ht−1 ≥ (1 − 2 · (2i+1 − 1)00 ) · ht−1 ≥ ht−1 · (1 − /2) ≥ T − ≥ − n 2 2 2 This satisfy the conditions required for Lemma 2.8. By Lemma 2.9 and Lemma 2.8, we have w.h.p. |Mt | E[|Mt | | Mt−1 , Ht−1 ] ≥ (1 − 0 ) · n n |M t−1 | ≥ (1 − 0 ) · (1 − ) · n |M0 | ≥ (1 − /4)2 · (1 + ) · n |M0 | ≥ (1 − ) · (1 + ) · n |M0 | 2 ≥ (1 −  ) · n 7 ≥ 4 (1 − /4)2 ≥ 1 −  for  ≤ 1/2.  < 1/8 and |M0 | n = 2 The following lemma shows that at the end of Algorithm 1, the problem has been reduced to finding the approximate median. Lemma 2.11. Let  = Ω(1/n1/4.47 ). At the end of iteration t of Algorithm 1, w.h.p. any φ0 -quantile where φ0 ∈ [ 21 − 4 , 12 + 4 ] must be in Mt . |Ht | |Mt | 1  ≥ Proof. Since 12 − 3 2 ≤ n ≤ 2 − 2 and n |Ht | |Mt | 1  n + n ≥ 2 + 4 . Combined with the fact that where φ0 ∈ [ 12 − 4 , 21 + 4 ] must be in Mt . 2.2 7 4 by Lemma 2.5 and Lemma 2.10, we have |Ht | 1  0 n ≤ 2 − 2 , we conclude that any φ -quantile Phase II: Approximating the Median Let Li , Mi , and Hi denote the nodes whose quantiles lie in [0, 12 − ), [ 12 − , 12 + ], and ( 12 − , 1] respectively at the end of iteration i, and L0 , M0 , and H0 be the nodes with those quantiles in the beginning. Note that Li and Hi are the nodes whose values are not our targets. We will show the quantities of |Lni | and |Hni | decrease in each iteration as our 3-TOURNAMENT algorithm (Algorithm 2) makes progress. Initially, l0 = h0 = 21 − . Let hi+1 = 3h2i − 2h3i and li+1 = 3li2 − 2li3 for i ≥ 0, we will show that |Li | |Hi | n and n concentrate around li and hi . Note that hi and li roughly square in each iteration. Once they decrease below a constant after the first O(log(1/)) iterations, they decrease double exponentially in each iteration. The tournaments end when li and hi decrease below T = 1/n1/3 . 10 Algorithm 2 3-TOURNAMENT(v) 1: 2: 3: 4: 5: 6: 7: 8: h0 , l0 ← 12 −  i ← 0, T = 1/n1/3 . while li > T do hi+1 ← 3h2i − 2h3i , li+1 ← 3li2 − 2li3 Select three nodes t1 (v), t2 (v), t3 (v) randomly. xv ← median(xt1 (v) , xt2 (v) , xt3 (v) ). end while Sample K = O(1) nodes uniformly at random and output the median value of these nodes. 1 Lemma 2.12. Let t denote the number of iterations in Algorithm 2. We have t ≤ log11/8 ( 4 )+ log2 log4 n = O(log(1/) + log log n). i−1  ≤ 1/4, we will show that l ≤ 1 − ( 11 )i . First, l = 1 − . Suppose Proof. Suppose that ( 11 i 0 8 ) 8 i−1 . We have: ) by induction that li−1 ≤ 1 − ( 11 8 2 3 li = 3li−1 − 2li−1  i−1 !2  i−1 !3 1 11 1 11 =3 − · −2 − · 2 8 2 8    i−1 !3 1 3 11 i−1 11 = − ·+2 · 2 2 8 8   i−1 !  1 1 3 11 i−1 11 ·+ · ≤ − 2 2 8 8 8  i 1 11 = − · 2 8 1 Therefore, after i0 = log11/8 ( 4 ) iterations, we have li ≤ Suppose that i1 = log2 log4 n, we have 1 2 −  11 i0 8 ≤ 1 2 − 1 4 = 41 . li0 +i1 ≤ 3li20 +i1 −1 i1 ≤ 3i1 li20  2i1 1 i1 ≤3 · 4 log2 3 ≤ (log4 n) =  log4 n 1 · 4 (log4 n)log2 3 ≤ n2/3 n 1 ) + log2 log4 n = O(log(1/) + log log n). Therefore, t ≤ i0 + i1 = log11/8 ( 4 | | Lemma 2.13. For each iteration 0 ≤ i < t, E[ |Li+1 | Li ] = 3( |Lni | )2 − 2( |Lni | )3 and E[ |Hi+1 | Hi ] = n n |Hi | 3 |Hi | 2 3( n ) − 2( n ) . 11 | |Hi+1 | Proof. We will show the proof for E[ |Li+1 | Hi ] is the same. Note that a node v n |Li ], since E[ n is in Li+1 if and only if at least 2 ot t1 (v), t2 (v), t3 (v) are in Li . Therefore,     !        1X |Li | |Li | 2 |Li | 3 |Li | 2 |Li | 3 |Li+1 | 1− =3 | Li = +3 −2 E n n n n n n n v∈V The following lemma shows the probabilities that |Lni | and |Hni | deviate from their expectation by a (1 + 0 ) factor are polynomially small in n, provided 0 is sufficiently large. We cap the quantity at T for the purpose of applying concentration inequalities. 1/2 n) Lemma 2.14. Let 0 = Ω( (logn1/3 max(T, E[ |Hni | | Hi−1 ]) and |Li | n |Hi | n ), w.h.p. for each iteration 0 ≤ i <= t, ≤ (1 + 0 ) · ≤ (1 + 0 ) · max(T, E[ |Lni | | Li−1 ]). Proof. In each iteration, since each node set its value independently, by Chernoff Bound (see Lemma B.2), we have   |Li | E[|Li | | Li−1 ] 0 Pr ≤ (1 +  ) · max(T, ) ≤ exp(−Ω(02 max(n · T, E[|Li | | Li−1 ]))) n n = exp(−Ω(02 n2/3 )) = 1/ poly(n) The proof for |Hi | is the same. Then we bound the cumulative deviation of from li . |Hi | n from hi and the cumulative deviation of 1/2 n ). W.h.p. for each iteration 0 ≤ i <= t, Lemma 2.15. Let 0 = Ω( logn1/3 li , (1 + 0 )T ) and |Hi | n ≤ max((1 + 0 ) 3i −1 2 |Li | n ≤ max((1 + 0 ) 3i −1 2 · · hi+1 , (1 + 0 )T ). Proof. We only show the proof for |Li | and we will prove by induction. Initially, 3i −1 |Li | n |Li | n |L0 | n ≤ l0 . Suppose that ≤ max((1 + 0 ) 2 · li+1 , (1 + 0 )T ) is true. | ||Li ] ||Li ] By Lemma 2.14, we have w.h.p., |Li+1 ≤ (1 + 0 ) · max( E[|Li+1 , T ). If E[|Li+1 ≤ T , then n n n |Li+1 | E[|Li+1 ||Li ] |Li | 0 0 we are done, since n ≤ (1 +  ) · = (1 +  ) · T . Also, if n ≥ (1 + 0 )T , then n E[|Li+1 ||Li ] n ≤3· |Li |2 n2 |Li | n ≤ |Li | n 1 · O( n2/3 ) ≤ T. Otherwise, if > (1 + 0 )T then it must be the case that hypothesis. Therefore, |Li | n ≤ (1 + 0 ) 3i −1 2 · li+1 by induction |Li+1 | E[|Li | | Li−1 ] ≤ (1 + 0 ) · n n   2  |L |Li | 3 i| 0 ≤ (1 +  ) · 3 −2 n n  2  3 ! i i 0 3 2−1 0 0 3 2−1 ≤ (1 +  ) · 3 (1 +  ) · li − 2 (1 +  ) · li 0 ≤ (1 +  ) ·  0 (1 +  ) 3i+1 −3 2  · 3· 12 li2 −2· li3    = 0 (1 +  ) 3i+1 −1 2  · li+1 Now, by setting 0 roughly equal to 1/3t ∼ 3.45 /(log4 n)1.59 , we can bound the final deviations of |Hni | and |Lni | from T by a factor of 2 w.h.p. 0.61 n Lemma 2.16. Let  = Ω( log ) and 0 = 3.45 /(log4 n)1.59 , then n0.096 3.45 |Lt | n ≤ 2T and 1/2 Proof. First, 0 = Ω( log 1.59 n ) = Ω( logn1/3 n ). By Lemma 2.15, w.h.p. we have either |Ht | n ≤ 2T w.h.p. |Lt | n ≤ (1 + 0 ) · T 3i −1 or |Lnt | ≤ (1 + 0 ) 2 · lt . If it is the former, then we are done since |Lnt | ≤ (1 + 0 ) · T ≤ 2T . Otherwise, we have   3t −1 |Lt | ·T ≤ (1 + 0 ) 2 n   t 0 3 −1 ≤ 1+2· · ·T since (1 + x)n ≤ 1 + 2nx for nx ≤ 12 2   1 ≤ 1 + 0 · 3log11/8 ( 4 )+log2 log4 n · T !  log11/8 3 1 log2 3 0 ≤ 1+ · · log4 n ·T 4 0 = 3.45 /(log4 n)1.59 ≤2·T Finally, we show that when |Lnt | and |Hnt | are O(1/n2/3 ), if we sample a constant number of values randomly and output the median of them, then w.h.p. the median is in Mt . Lemma 2.17. W.h.p. every node outputs a quantile in [ 21 − , 12 + ]. Proof. By Corollary 2.16, w.h.p. at the end of iteration t, |Lnt | ≤ 2/n2/3 and |Hnt | ≤ 2/n2/3 . The algorithm outputs a quantile in [ 12 − , 12 + ] if there are less than K/2 nodes in Lt are sampled and less than K/2 nodes in Ht are sampled. The probability that at least K/2 nodes in |Lt | are sampled is at most   K/2 K 2 · ≤ K/2 n2/3  eK K 2 !K/2  K/2   4e K/2 2 ≤ · n2/3 n2/3 K/2  Similarly, the probability that at least K/2 nodes in |Ht | are sampled is also at most n4e . 2/3 By an union bound, the probability that less than K/2 nodes in Lt are sampled and less than K/2 K/2  nodes in Ht are sample is at least 1 − 2 · n4e = 1 − 1/ poly(n). 2/3 Theorem 2.1 follows from Lemma 2.11 and Lemma 2.17. 3 Exact Quantile Computation To fill the gap of approximating the φ-quantile with  error for  = O(1/n0.096 ), we show that the exact quantile computation can be done in O(log n) rounds using O(log n) message size. Since we def are to compute the exact quantile φ, we can assume that k0 = φ · n is an integer. The problem is to compute a value whose rank is k0 . Again, w.l.o.g. we assume that every value has a distinct value initially. 13 Algorithm 3 Exact Quantile Computation 1: k0 ← φ · n 2: for i = 1, 2, . . . , 25 do   3: Each node v computes an 2 -approximate of the ( ki−1 n − 2 )-quantile and an 2 -approximate of  −0.05 /2. the ( ki−1 n + 2 )-quantile with  = n 4: Each node learns the max and the min of these approximates of all nodes. 5: Compute the rank of min among the original xv ’s and denote it by R. 6: Each node v set xv ← ∞ if xv ∈ / [min, max]. Call these nodes valueless, otherwise valued. 7: Let mi be the smallest power of 2 that is larger than (n0.99 /2)/(# valued nodes). Each valued node makes mi copies of its value and distribute them to valueless nodes so that there are at least n0.99 /2 valued nodes. (For convenience, we let the duplicated values to have smaller ranks than the original one.) 8: Set ki ← mi · (ki−1 − R + 1). 9: end for k 10: Every node outputs an (/3)-approximate ( n25 − 2 )-quantile. The following is a detailed implementation of each step. Step 3: Since  = n−0.05 /2, we can 2 -approximate the quantiles in O(log n) rounds by Theorem 2.1. Step 4: The maximum (the minimum) can be computed by having each node forwarding the maximum (the minimum) value it has ever received. Since it takes O(log n) rounds to spread a message by [FG85, Pit87], this step can be done in O(log n) rounds. Step 5: The rank of the minimum can be computed by performing a counting. The nodes whose xv values are less than or equal to the minimum will be assigned 1. Otherwise they are assigned 0. By Kempe et al. [KDG03], the sum can be aggregated in O(log n) rounds w.h.p. Step 7: Consider the following process for distributing the values. Initially, every valued node v generates a token with weight equal to mi , the targeted number of copies. We denote the token by a value-weight pair (xv , mi ). Recall that mi is a power of 2 and it can be computed by counting the number of valued nodes in O(log n) rounds. The goal is to split and distribute the tokens so that every node has at most one token of weight 1 in the end. The process consists of O(log n) phases and each phase uses O(1) rounds. Suppose that node v holds tokens (x1 , w1 ), (x2 , w2 ), . . . (xm , wm ) at the beginning of a phase. For each token (xi , wi ), if wi 6= 1, v splits (xi , wi ) into two tokens (xi , wi /2) and push each one to a node randomly. If wi = 1, then the token remains at v. Note that when two tokens of the same value are on the same node, they do not merge. First note lg mi = O(log n) phases are needed to split to tokens into tokens of weight 1. Now, we show that it takes constant number of rounds to implement one phase. Let N (v, i) denote the number of tokens at v at the end i’th phase. Let N = maxv,i N (v, i). It takes N rounds to implement one phase. The value of N (v, i) can be bounded by following calculation. Since at any phase, there cannot be more than n0.99 tokens and each token appears at a node chosen uniformly at random, we have  Pr(N (v, i) ≥ 100K) ≤ n0.99 100K  · 1 n100K  ≤ n0.99 n 100K = (1/n)K . By taking an union bound over each v and i, we conclude that N < 100K w.h.p. Therefore, 14 w.h.p. each phase can be implemented in 200K = O(1) rounds. At the end of O(log n) phase, every node has at most 100K tokens of weight 1 w.h.p. Next, in the subsequent phases, if a node holds more than one token, then it will push every token except one to a random node (one random node per token). We say a token succeeded at the end of the phase if it was pushed to a node without any other tokens. Consider a token, the probability a token did not succeed in a phase is at most n0.99 /n = 1/n0.01 , since there are at most n0.99 nodes with tokens at the end of the phase. Therefore, after 100K phases, the probability that a token did not succeed is at most 1/n0.01·100K = 1/nK . By a union bound over the tokens, we conclude that w.h.p. all tokens succeeded. Moreover, again, each phase can be implemented using 100K rounds. Therefore, we can split and distribute the tokens in O(log n) rounds. Each original token is duplicated with exactly mi copies. Then, those nodes holding a token set its value to the value of the token. Nodes without a token will remain valueless. Q Correctness: Let ans be the answer (the value whose initial rank is k0 ). Let Mi = ij=1 mi denote the number of copies of each value from the beginning. We show by induction that the values whose ranks lying in (ki − Mi , ki ] are ans after iteration i. Initially, M0 = 1, the statement trivially holds. Suppose that at the end of iteration i − 1, the values whose ranks lying in (ki−1 − Mi , ki−1 ] are ans. After Step 6 in iteration i, the rank of ans is exactly ki−1 − R + 1. Since every value is duplicated to have mi copies after Step 7, the rank of ans becomes ki = mi · (ki−1 − R + 1) (Recall that we let the original value to have a larger rank than the duplicated values). Since the values whose ranks lying in (ki−1 − Mi−1 , ki−1 ] were ans at the end of iteration i − 1 and ans ∈ [min, max], it must be the case that every value in this range is duplicated with mi copies. Therefore, all values whose ranks lying in (ki − mi · Mi−1 , ki ] = (ki − Mi , ki ] are ans after iteration i. Next, we show that after 25 iterations, M25 ≥ n. Suppose that Mi−1 ≤ n. The number of valueless node after Step 6 is at most 2n + 2Mi−1 ≤ 4n. The 2n comes from the fact that at most 2n values can lie in the range (min, max). The 2Mi−1 term is because at most Mi−1 values are equal to min and max. Therefore, mi ≥ (n0.99 /2)/(4n) = (n0.04 /4) and Mi ≥ (n0.04 /4) · Mi−1 . Therefore, M25 ≥ min(n, (n0.04 /4)25 ) = n. Now the the values of the items whose ranks are in the range of (k25 − n, k25 ] must be ans. We then compute a quantile in ( kn25 − , kn25 ] using our /3-approximate quantile computation algorithm to approximate the ( kn25 − 2 )-quantile in O(log n) rounds. 4 A Lower Bound We show that it takes at least Ω(log(1/) + log log n) rounds to approximate the φ-quantile up to  error w.h.p. n <  < 1/8 and φ ∈ [0, 1], any gossip algorithm that uses less Theorem 1.3. For any 10 log n 1 than 2 log log n or less than log4 8 round fails to solve the -approximate φ-quantile problem with probability at least 1/3. This remains true even for unlimited message sizes. Proof. Consider the following two scenarios. The first is when each node is associated with a distinct value from {1, 2, . . . , n}. The second is when each node is associated with a distinct value from {1 + b2nc, . . . , n + b2nc}. 15 def A node is able to distinguish between these cases only if it recieves an value from S = {1, 2, . . . , 1 + b2nc} ∪ {n + 1, n + 2, . . . , n + b2nc}. Otherwise, it can only output a value whose quantile is in [1/2 − , 1/2 + ] with probability 1/2, since the difference of the φ-quantile in both scenarios is at least b2nc ≥ n. Call a node good if it ever received a value from S, and bad otherwise. Note that a bad node cannot outputs a correct answer with probability more than 1/2. Initially there are at most 2 · b2nc ≤ 4n good nodes. We will show that with probability 1 − 1/n there exists at least one bad node at the end of round t. Let X0 = 2 · b2nc and let Xi denote the number of good nodes at the end of round i. Given a bad node v, it can become good if it pulls from a good node or some good node pushes to it. Let Yv denote the event that v pulls from a good node, we have Pr(Yv | Xi ) = Xi /n. Also, the pushes from the good nodes can only generate another at most Xi good nodes. Therefore,   X P E[Xi+1 | Xi ] ≤ 2Xi + E  Yv  ≤ 3Xi , since E[ v∈Bi Yv | Xi ] ≤ Xi v∈Bi P By Chernoff Bound, we have Pr( v∈Bi Yv > 2Xi | Xi ) ≤ e−Xi /2 ≤ e−5 log n ≤ 1/n5 , since Xi ≥ X0 ≥ 10 log n. Therefore, with probability at least 1 − 1/n5 , Xi+1 ≤ 4Xi . By taking a union bound over such events for the first t0 = log4 (8/) rounds, we conclude with probability at least 0 1 − 1/n4 , Xt0 ≤ (4n)4t ≤ n/2. Let t0 be the last round such that Xt0 ≤ n/2. Define Zi = |Bi |/n. A node v remains in Bi if it did not pull from a good node and it was not pushed from any good nodes. Denote the event by Wv , we have Pr(Wv | Bi ) ≥ Zi · (1 − n1 )n−1 ≥ Zi · e−1 . Therefore,     X X Zi · e−1  = |Bi | · Zi · e−1 Wv | Bi  ≥  E[|Bi+1 | | Bi ] = E  v∈Bi v∈Bi Note that the events {Wv }v∈Bi are negatively dependent [DR98] (the number of empty bins in the balls into bins problem). Suppose that Zi · |Bi | ≥ 60e log n. By Chernoff Bound, Pr (|Bi+1 | ≤ |Bi | · Zi /(2e) | Bi ) ≤ e−Zi ·|Bi |/(12e) ≤ 1/n5 Therefore, Pr(Zi+1 ≤ Zi2 /(2e) | Zi ) ≤ 1/n5 . Suppose that t1 = O(1). We can take an union bound over the subsequent t1 rounds to show that with probability at least 1 − 1/n4 , Zi+1 ≥ Zi2 /(2e) holds for these rounds, as long as Zt20 +t1 ≥ (60 log n)/n. Let zt0 = 1/2 and zi+1 = zi2 /(2e). If zt20 +t1 ≥ (60 log n)/n, with probability at least 1 − 1/n4 , we have Zt0 +t1 ≥ zt0 +t1 . Let t1 = 12 lg log n, by definition of zi , we have  t1 1 t1 zt0 +t1 = · zt20 2e  t1 +2t1 1 zt0 = 1/2 ≥ 1/(2e) ≥ 2e √  (lg log n)/2+ log n 1 = 2e  2√log n 1 ≥ for sufficiently large n 2e 16 √ √ Since (2e)−2 log n = Ω((log n)/n), zt0 +t1 ≥ 2−2 log n ≥ (60 log n)/n for sufficiently large n. Therefore, with probability at least 1 − 1/n4 , Zt0 +t1 > 0. Since with probability 1 − 1/n4 , t0 ≥ log4 8/. By taking an union bound over these two events, we conclude with probability at most 2/n4 , all nodes are good by the end of round t0 + t1 . Therefore, the probability that every node computes a correct output at the end of round t0 + t1 is at most 1/2 + 2/n4 . 5 Robustness In this section, we show that our algorithm is robust against failures. We consider the following model of failures: Let 0 < µ < 1 be a constant. Every node v in every round i is associated with a probability 0 ≤ pv,i ≤ µ. Note that pv,i is pre-determined before the execution of the algorithm. During the execution of round i, each node v fails with probability pv,i to perform its operation (which may be either push or pull). Theorem 1.4. Suppose in every round every node fails with a, potentially different, probability bounded by some constant µ < 1. For any φ ∈ [0, 1] there is a gossip algorithm that solves the φ quantile problem in O(log n) rounds. For any t and any (n) > 0, there furthermore exists a gossip 1 algorithm that solves the -approximate φ-quantile problem in O(log log n + log (n) + t) rounds for n all but 2t nodes, with high probability. We show how to modify the algorithm and the analysis for the tournament algorithms and the exact quantile computation algorithms in the following. 5.1 The Tournament Algorithms First consider the 2-TOURNAMENT algorithm. Initially, every node is good. Consider node v, instead 1 1 of only pulling from 2 neighbors each iteration, now pull from Θ( 1−µ · log( 1−µ )) neighbors. We say a pull is good if the node performing the pull operation did not fail and it pulls from a node who is good at the end of iteration i − 1. A node remains good at the end of iteration i if there are at least two good pulls. Then, v uses the first two good pulls to execute the tournament procedure. Also, note that in the last iteration, we let a good node to have probability of δ to do the two tournament using the first two good pulls and probability 1 − δ to set the value equal to the first good pull. We show that the good nodes always consists of a constant fraction of nodes. Lemma 5.2. For 0 ≤ i ≤ t − 1, w.h.p. at the end of each iteration i of 2-TOURNAMENT , there are 1 1 at least n/2 good nodes if every node pulls from k = Θ( 1−µ · log( 1−µ )) other nodes. Proof. We will prove by induction. Initially, every node is good. Suppose that there are at least n/2 good nodes at the end of iteration i − 1. During iteration i, a node with more than k − 2 bad pulls will become bad at the end of iteration i. 4 4 Let k = 1−µ log 1−µ + 1. The probability that there are at least k − 1 bad pulls is at most:     (1−µ) k (1 − µ) k−1 · 1− ≤ k · e− 2 ·(k−1) k−1 2     4 4 1−µ 2 ≤ log +1 · 1−µ 1−µ 4 ≤ 1/e + 1/16 ≤ 0.44 x log(1/x) maximized at 1/e 17 Therefore, the expected number of bad nodes is at most 0.44n for iteration 1 ≤ i ≤ t − 1. Since each node becomes bad independently of other nodes, by Chernoff Bound, w.h.p. there are at most 0.5n bad nodes at the end of iteration i. At the end of iteration t − 1, there are at least P n/2 good nodes w.h.p. The expected number of bad nodes at the end of iteration t is at most v∈V δ · 0.44 + (1 − δ)/2 ≤ 0.5n. By Chernoff Bound again, we can conclude that w.h.p. there are at least n/3 good nodes. We can also modify the process in the same way for the 3-TOURNAMENT algorithm. That is, 1 1 in each iteration each node pulls from Θ( 1−µ log 1−µ ) other nodes. If there are less than 3 good pulls, then the node becomes bad. Otherwise, it uses the first 3 good pulls to do the tournament procedure. We can show similarly that there are at most a constant fraction bad nodes in each iteration. Consider a node v in the modified processes. Suppose that v is good in iteration i, then v must have at least two (or three) good pulls. Note that the probability that v pulls from a particular good node, conditioned v is good at the end of iteration, is uniform among all nodes that are good at the end of iteration i − 1. Let Vi denote the set of good nodes and ni = |Vi |. Given any subset of good nodes S ⊆ Vi−1 , the probability of choosing a node in |S| is therefore |S|/ni . Therefore, we can replace |Lni | , |Hni | , |Mi | i| and |Mni | in our proofs in the previous section with |Lnii | , |H ni , and ni and observe that all the statements hold. Note that ni ≥ n/3 = Ω(n) for 0 ≤ i ≤ t w.h.p. Thus, all the concentration inequalities also hold. K K In the last step of Algorithm 2, all nodes pulls from Θ( 1−µ log 1−µ ) nodes. If there are K good pulls, then each node outputs the median directly. Otherwise, it becomes bad and outputs nothing. We can similarly show that there are at least constant fraction of good nodes. Therefore, at least a constant fraction of nodes output a correct answer and all the others output nothing. Note that we can use additional O(t) rounds of pulling from valueless nodes to have all but 2nt nodes learn a correct answer. 5.2 Exact Quantile Computation Consider Algorithm 3. We know Step 3 (Section 5.1), Step 4 [ES09], and Step 5 [KDG03] tolerate such failures with a constant factor delay on the running time. The only step that remains to discuss is Step 7. We run the same algorithm described. Initially each valued node v generates a token (xv , mi ). In the first O(log n) phases, each node tries to split every token whose weight is larger than 1 into two tokens with halved weight, and push one of them to a random node. If the push succeed, the token has been pushed is considered a new token and the one with halved weight remaining at the same node is considered as the old one. If the push fails, then we will merge them back to the original one. We will show that at the end of O(log n) phase, each node holds at most O(1) tokens and their weights are 1. In each subsequent phases, if a node has more than one tokens, then it will push every token except one to a random neighbor. We argue that after O(log n) phases, every node contains exactly one token. First, we show that the number of tokens at each node is bounded by a constant w.h.p. so that each phase can be implemented in O(1) rounds. Recall that N (v, i) is the number of tokens at v at the end of i’th phase. Suppose the total number of phases is C log n for some constant C > 0. For a token (except the one that is initially at v) to be at node i, it must be the case that it was pushed to i during one of the phase. Note that at any phase, there are at most n0.99 tokens. By 18 taking an union bound over all possible set of tokens of size 200K and all possible combinations of phases on when each of the token was pushed to i, we have n0.99 200K  Pr(N (v, i) ≥ 200K + 1) ≤  · (C log n) 200K · 1 n200K  ≤ Cn0.99 log n n 200K ≤ 1/nK . Next, we show that for a token (xv , mi ), it takes O(log n) rounds to split into tokens of weight 1 w.h.p. Let PTv (i) denote the set of all v’s tokens with weight at least 2 at the end of Phase i. Let Φ(i) = (xv ,w)∈Tv (i) w2 be a potential function. Consider a token (xv , w) ∈ Tv (i), since with probability at most µ it fails to split, the expected contribution of the token to the Φ(i + 1) is at most:   1−µ 2 2 µw + (1 − µ)2 · (w/2) = 1 − · w2 2 Therefore, E[Φ(i + 1) | Φ(i)] ≤ (1 − (1 − µ)/2) · Φ(i). Since Φ(0) ≤ n, after t = we have   2K 1 − µ 1−µ log n E[Φ(t)] ≤ 1 − · n ≤ e−K log n · n ≤ 1/nK−1 2 2K 1−µ log n rounds, Since Φ(t) must be an integer, we conclude that with probability at least 1 − 1/nK−1 , Φ(t) = 0 by Markov’s inequality. Therefore, after t rounds w.h.p. every token of value v has weight 1. We can further take an union over all tokens to show that it holds for all tokens w.h.p. Therefore, w.h.p. the weight of all tokens are 1 at the end of O(log n) round. In the subsequent phases, the probability a token fail to be pushed to a node without any other tokens is at most µ + n0.99 /n = O(1). Therefore, the probability a token fails in the all of the next O(log n) phases is at most 1/ poly(n). Thus, w.h.p. after O(log n) phases, every node has at most one token. Since each phase can be implemented using O(1) rounds, we conclude that Step 7 can be done in O(log n) rounds in our failure model. Acknowledgement We thank Frederik Mallmann-Trenn for pointing out [DGM+ 11] to us. References [ACH+ 13] Pankaj K. Agarwal, Graham Cormode, Zengfeng Huang, Jeff M. Phillips, Zhewei Wei, and Ke Yi. Mergeable summaries. ACM Trans. Database Syst., 38(4):26:1–26:28, 2013. [ARS97] Khaled Alsabti, Sanjay Ranka, and Vineet Singh. A one-pass algorithm for accurately estimating quantiles for disk-resident data. In Proc. 23rd Int’l Conference on Very Large Data Bases (VLDB), pages 346–355, 1997. [BFP+ 73] Manuel Blum, Robert W. Floyd, Vaughan Pratt, Ronald L. Rivest, and Robert E. Tarjan. Time bounds for selection. J. Comput. Syst. Sci., 7(4):448–461, 1973. [CP12] Jen-Yeu Chen and Gopal Pandurangan. Almost-optimal gossip-based aggregate computation. SIAM Journal on Computing, 41(3):455–483, 2012. 19 [CT87] Francis Chin and H. F. Ting. An improved algorithm for finding the median distributively. Algorithmica, 2(1):235–249, 1987. [DGH+ 87] Alan Demers, Dan Greene, Carl Hauser, Wes Irish, John Larson, Scott Shenker, Howard Sturgis, Dan Swinehart, and Doug Terry. Epidemic algorithms for replicated database maintenance. In Proc. 6th ACM Symposium on Principles of Distributed Computing (PODC), pages 1–12, 1987. [DGM+ 11] Benjamin Doerr, Leslie Ann Goldberg, Lorenz Minder, Thomas Sauerwald, and Christian Scheideler. Stabilizing consensus with the power of two choices. In Proc. 23rd Annual ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), pages 149–158, 2011. [DR98] Devdatt Dubhashi and Desh Ranjan. Balls and bins: A study in negative dependence. Random Structures & Algorithms, 13(2):99–124, 1998. [ES09] R. Elsässer and T. Sauerwald. On the runtime and robustness of randomized broadcasting. Theor. Comput. Sci., 410(36):3414–3427, 2009. [FG85] A.M. Frieze and G.R. Grimmett. The shortest-path problem for graphs with random arc-lengths. Discrete Applied Mathematics, 10(1):57 – 77, 1985. [FHK17] Ofer Feinerman, Bernhard Haeupler, and Amos Korman. Breathe before speaking: efficient information dissemination despite noisy, limited and anonymous communication. Distributed Computing, 30(5):339–355, 2017. [FO15] David Felber and Rafail Ostrovsky. A randomized online quantile summary in o((1/) log(1/)) words. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM, pages 775–785, 2015. [FR75] Robert W. Floyd and Ronald L. Rivest. Expected time bounds for selection. Commun. ACM, 18(3):165–172, 1975. [Fre83] Greg N. Frederickson. Tradeoffs for selection in distributed networks (preliminary version). In Proc. 2nd ACM Symposium on Principles of Distributed Computing (PODC), pages 154–160, 1983. [GK01] Michael Greenwald and Sanjeev Khanna. Space-efficient online computation of quantile summaries. SIGMOD Rec., 30(2):58–66, 2001. [GK04] Michael B. Greenwald and Sanjeev Khanna. Power-conserving computation of orderstatistics over sensor networks. In Proc. of the 23rd ACM Symposium on Principles of Database Systems (PODS), pages 275–285, 2004. [GM09] Sudipto Guha and Andrew McGregor. Stream order and order statistics: Quantile estimation in random-order streams. SIAM J. Comput., 38(5):2044–2059, 2009. [Hae16] Bernhard Haeupler. Analyzing network coding (gossip) made easy. Journal of the ACM, pages 26:1–26:22, 2016. [Hoa61] C. A. R. Hoare. Algorithm 63 (partition) and algorithm 65 (find). Commun. ACM, 4(7):321–322, 1961. 20 [HT10] Regant Y. S. Hung and Hingfung F. Ting. An Ω((1/) log(1/)) space lower bound for finding -approximate quantiles in a data stream. In Proc. 4th International Conference on Frontiers in Algorithmics (FAW), pages 89–100, 2010. [KDG03] David Kempe, Alin Dobra, and Johannes Gehrke. Gossip-based computation of aggregate information. In Proc. 44th IEEE Symposium on Foundations of Computer Science (FOCS 2003), pages 482–491, 2003. [KDN+ 06] Srinivas Kashyap, Supratim Deb, K. V. M. Naidu, Rajeev Rastogi, and Anand Srinivasan. Efficient gossip-based aggregate computation. In Proc. of the 25th ACM Symposium on Principles of Database Systems (PODS), pages 308–317, 2006. [KLL16] Z. Karnin, K. Lang, and E. Liberty. Optimal quantile approximation in streams. In Proc. 57th IEEE Annual Symposium on Foundations of Computer Science (FOCS), pages 71–78, 2016. [KLW07] Fabian Kuhn, Thomas Locher, and Rogert Wattenhofer. Tight bounds for distributed selection. In Proc. of 19th Annual ACM Symposium on Parallel Algorithms and Architectures (SPAA), pages 145–153, 2007. [KSSV00] R. Karp, C. Schindelhauer, S. Shenker, and B. Vocking. Randomized rumor spreading. In Proc. 41st IEEE Symposium on Foundations of Computer Science (FOCS), pages 565–574, 2000. [MFHH02] Samuel Madden, Michael J. Franklin, Joseph M. Hellerstein, and Wei Hong. Tag: A tiny aggregation service for ad-hoc sensor networks. SIGOPS Oper. Syst. Rev., 36(SI):131– 146, December 2002. [MMS13] Qiang Ma, S. Muthukrishnan, and Mark Sandler. Frugal streaming for estimating quantiles. In Space-Efficient Data Structures, Streams, and Algorithms: Papers in Honor of J. Ian Munro on the Occasion of His 66th Birthday, pages 77–96, 2013. [MP80] J.I. Munro and M.S. Paterson. Selection and sorting with limited storage. Theoretical Computer Science, 12(3):315 – 323, 1980. [MRL99] Gurmeet Singh Manku, Sridhar Rajagopalan, and Bruce G. Lindsay. Random sampling techniques for space efficient online computation of order statistics of large datasets. SIGMOD Rec., 28(2):251–262, 1999. [NSU97] A. Negro, N. Santoro, and J. Urrutia. Efficient distributed selection with bounded messages. IEEE Transactions on Parallel and Distributed Systems, 8(4):397–401, 1997. [Pit87] Boris Pittel. On spreading a rumor. SIAM Journal on Applied Mathematics, 47(1):213– 223, 1987. [PS07] Boaz Patt-Shamir. A note on efficient aggregate queries in sensor networks. Theor. Comput. Sci., 370(1-3):254–264, February 2007. [Rod82] Michael Rodeh. Finding the median distributively. Journal of Computer and System Sciences, 24(2):162–166, 1982. 21 [RSS86] Doron Rotem, Nicola Santoro, and Jeffrey B. Sidney. Shout echo selection in distributed files. Networks, 16(1):77–86, 1986. [SBAS04] Nisheeth Shrivastava, Chiranjeeb Buragohain, Divyakant Agrawal, and Subhash Suri. Medians and beyond: New aggregation techniques for sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, SenSys ’04, pages 239–249, New York, NY, USA, 2004. ACM. [SFR83] Liuba Shrira, Nissim Francez, and Michael Rodeh. Distributed k-selection: From a sequential to a distributed algorithm. In Proceedings of 2nd ACM Symposium on Principles of Distributed Computing (PODC), pages 143–153, 1983. [SS89] N. Santoro and E. Suen. Reduction techniques for selection in distributed files. IEEE Transactions on Computers, 38(6):891–896, 1989. [SSS88] Nicola Santoro, Michael Scheutzow, and Jeffrey B. Sidney. On the expected complexity of distributed selection. Journal of Parallel and Distributed Computing, 5(2):194 – 203, 1988. [SSS92] Nicola Santoro, Jeffrey B. Sidney, and Stuart J. Sidney. A distributed selection algorithm and its expected communication complexity. Theoretical Computer Science, 100(1):185 – 204, 1992. [YG02] Yong Yao and Johannes Gehrke. The cougar approach to in-network query processing in sensor networks. SIGMOD Rec., 31(3):9–18, 2002. 22 A A Sampling Algorithm We first present a simpler algorithm with a higher message complexity of O(log2 n/2 ) and O(log(1/) + poly(log log n)) running time. In Manku et al. [MRL99], they observed the following. Suppose that we sample a multi-set S of nodes (with replacement) from all the node uniformly at random. Then, the φ’th quantile of S has quantile approximately equal to φ in all the nodes. Lemma A.1. Suppose that a multi-set S of values are sampled from the n values and |S| = Ω(log n/2 ). Given z (which is not necessarily in S), define QS (z) to be the number of elements in S whose values are smaller than z. We have |QS (z) − Q(z)| ≤  w.h.p. Therefore, we can -approximate the φ-quantile or -approximate the quantile of every node in O(log n/2 ) rounds. Each node v uniformly samples |Sv | nodes in |Sv | rounds. To approximate the φ-quantile, output the element z ∈ S such that QS (z) is the closest to φ. Since there are at least 1/ elements in S, we must have |QS (z)−φ| ≤ . Therefore, |φ−Q(z)| ≤ |φ−QS (z)|+|QS (z)−Q(z)| ≤ 2. To approximate v’s own quantile, simply output QS (xv ). We can take an union bound over each node to show w.h.p. every node outputs correctly. The algorithm uses O(log n) message size, since in each round each node is only pulling the value of the node contacted. By using larger message sizes, it is possible to reduce the number of rounds. Consider the following doubling algorithm: Each node v maintains a multi-set buffer Sv . Before the first round, each node v sample a random node t0 (v) and set Sv (0) = {t0 (v)}. In round i, let ti (v) be the node contacted by v in that round, node v sets Sv (i) ← Sv (i) ∪ Sti (v) (i). Let Sv denote Sv (T ) at the end of the algorithm. Since the buffer size doubles each round after the first round, after t = O(log((log n)/2 )) = O(log log n + log(1/)) rounds, the size of the buffer is Ω(log n/2 ). The message complexity is O(log2 n) for this algorithm. On the surface, it seems that we can apply Lemma A.1 to show that QSv (z) is a good approximation of Q(z), since |Sv | = Ω((log n)/2 ). However, the elements in Sv are not independently uniformly sampled. There are correlations among the elements. In the rest of the section, we will show that the correlations among the elements are not too strong so that the algorithm still works. Lemma A.2. Let  = Ω(1/n1/16 ). Suppose that Sv is sampled by using the doubling algorithm described above for T = O(log log n + log(1/2 )). Given z, w.h.p. we have |QSx (z) − Q(z)| ≤ . Proof. For convenience, we also define the multiset Sv0 (0) ← {v} and Sv0 (i) ← Sv0 (i) ∪ Sv0 (ti (v)). Also let Sv0 = Sv0 (T ). Therefore, Sv = {t0 (u) | u ∈ Sv0 }. First we show that the multiplicity of every element in Sv0 is bounded by some constant w.h.p. Then, we will reveal t0 (u) for all u ∈ Sv0 to show that QSv (z) is concentrated around Q(z). Given a node w ∈ V , we will show that w.h.p. for every x ∈ V , the multiplicity of w in Sv0 , mSv0 (T ) (w), is bounded above by a constant. Let Mi = maxy mSy0 (i) (w). Observe that Mi+1 ≤ 2 · Mi S due to the update rule. Let S −1 (w, i) = y:w∈Sy0 (i) {y}. Note that Mi > Mi−1 only if a node in S −1 (w, i − 1) chooses a node in S −1 (w, i − 1). We will first bound the size of S −1 (w, i) over the execution of the algorithm, then we can bound the probability that Mi > Mi−1 increases. Initially, S −1 (w, 0) = {w}. In round i, if a node z chose a node in S −1 (w, i − 1), then we must have z ∈ S −1 (w, i). Let Xz denote whether the node z has chosen a node in S −1 (w, i − 1). X E[|S −1 (w, i)|] ≤ |S −1 (w, i − 1)| + E[Xz ] z∈V ≤ |S −1 (w, i − 1)| + n · |S −1 (w, i − 1)|/n = 2 · |S −1 (w, i − 1)|. 23 Moreover, we show that Xz ≤ 4·|S −1 (w, i−1)|+O(log n) w.h.p. Let k = 3·|S −1 (w, i−1)|+K·log n. We have k    −1 X n |S (w, i − 1)| Pr( Xz ≥ k) ≤ k n z∈V  k en |S −1 (w, i − 1)| ≤ · k n K·log n  −1 e · |S (w, i − 1)| ≤ 3 · |S −1 (w, i − 1)| ≤ 1/ poly(n) Therefore, w.h.p. |S −1 (w, i)| ≤ 4 · |S −1 (w, i − 1)| + O(log n) for i = 1 . . . T . As a result, S −1 (w, T ) = O(4K · log n) = O(log3 n/4 ). Recall that Mi > Mi−1 only if some node in S −1 (w, i − 1) selects a node in S −1 (w, i − 1) during round i. Thus, the probability that Mi > Mi−1 is at most  6  log n def 3 4 O(log3 n/4 ) p = 1 − (1 − O(log n/ )/n) =O 8 n The probability that M increases in more than K rounds over the T rounds is at most   K ! K !   T K e · T log6 n e log6 n · (log log n + log(1/)) p ≤O · 8 =O · = 1/ poly(n) K K  n K 8 n Therefore, w.h.p. MT ≤ 2K . Now, given z ∈ V , we will show that QSv (z) −  ≤ Q(z) ≤ QSv (z) + . For every element y ∈ Sv0 , let Zy be the indicator random variable that denotes whether xt0 (y) ≤ z. Note that Pr(Zy = 1) = Q(z). Therefore, we have X E[rankSx (z)] = E[Zy ] · mSv0 (y) = Q(z) · |Sv | y∈Sv0 P Since the events {Zy }y∈Sv are mutually independent. We can show that the quantity y∈Sv Zy · mSv0 (y) concentrates around Q(z) · |Sv (z)| by using Hoeffiding’s inequality. ! X 22 |Sv |2 Pr(| Zy · mSv0 (y) − Q(z) · |Sv || ≥ |Sv |) ≤ exp − P 2 y∈Sv mSv0 (y) y∈Sv   22 |Sv |2 mSv0 (y) ≤ MT ≤ 2K ≤ exp − 2K 2 · |Sv | ≤ exp (−Ω(log n)) ≤ 1/ poly(n) Therefore, w.h.p. |QSv (z) − Q(z)| ≤ . 24 |Sv | = Ω((log n)/2 ) A.1 Compaction In this section, we show that instead of storing the full buffer, it is possible to only keep a summary of the buffer, where the size of the summary is Θ( 1 · (log log n + log(1/))). Then, when a node v contacts t(v), v only pulls the summary of t(v). This reduces the message complexity. Let k = Θ( 1 · (log log n + log(1/))) be a power of 2 that denotes the size of the buffer. Also, we assume that n0 = |Sv | is also a power of 2 thus the algorithm runs for T = log2 n0 + 1 rounds. Suppose that v contacts t(v) in a given round, the new buffer updating rule is: S̃v ← Compact(S̃v ∪ S̃t(v) ) , where Compact(Z) is a compaction operation. The compaction operation leaves the buffer unchanged if |Z| ≤ k. Otherwise, it sort the elements in non-decreasing order and then extract the elements in the even positions. Since |Z| ≤ 2k, we must have | Compact(Z)| ≤ k. Let Sv denote the buffer of x at end of round T . Let S̃v ⊆ Sv denote the buffer of v with the compaction updating rule at the end of round T . We will show that QS̃v (z) is a good approximation of QSv (z) for any value z. Suppose that the content of Sv is known. At the end of round i, Sv can be expressed as the union of the buffers of 2T −i nodes. Let Uv (i) denote the multi-set of 2T −i nodes. Let Su (i) and S̃u (i) denote the buffer and the compacted bufferSof u at the end of round i respectively. Now let Uv (i) be the set of nodes such that u∈Uv (i) Su (i) = Sv , where |Uv (i)| = 2T −i . Now def S we consider the compacted version of the set Cv (i) = u∈Uv (i) S̃u (i). Note that Cv (i) = Sv for i = 1, . . . , log2 k +1 (that is, before any compaction happens). Also, Cv (T ) = S̃v . We will show that in each transition along Sv = Cv (log2 k + 1), Cv (log2 k + 2), . . . , Cv (T ) = S̃v , the error introduced by compaction is sufficiently small. Let a · S denote the multiset where each element s ∈ S is duplicated to have a occurrence. For a given element z, we will compare the rank of z in wi · Cv (i) and wi+1 · Cv (i + 1) for log2 k + 1 ≤ i < T to derive the loss of compaction. Let hi denotes the number of compaction operations done on Sv at the end of round i. Therefore, hi = max(0, i − lg k − 1). Let wi = 2hi denote the weight of the buffer at the end of round i. Note that the cardinality of the set |wi · Cv (i)| = |Sv | for 1 ≤ i ≤ T . Given a multi-set S and any element z (not necessarily in S), we let RS (z) to denote the rank of z in S (i.e. the number of elements in S that are smaller than or equal to z). Lemma A.3. Let v be a node and let z by any element. For log2 k + 1 ≤ i < T , |R(wi ·Cv (i)) (z) − R(wi+1 ·Cv (i+1)) (z)| ≤ |Uv (i + 1)| · wi . Proof. Note that Cv (i + 1) is obtained from Cv (i) by applying |Uv (i + 1)| compactions, where there is one compaction operation for each u ∈ Uv (i + 1). Each compaction operation compacts two buffers S̃u (i) and S̃t(u) (i) into one and also doubles the weight. Consider the effect of one compaction operation on the rank of z. Let R1 denote the rank of z in wi · (S̃u (i) ∪ S̃t(u) (i)) (i.e. before the compaction) and R2 denote the rank of z in wi+1 · S̃u (i + 1) (i.e. after the compaction). If R1 is even, then we must have R1 = R2 . If R1 is odd, then we have R2 = R1 − wi . Since there are most |Uv (i + 1)| compactions, the total difference created by all of them is at most wi · |Uv (i + 1)|. Corollary A.4. Let v be a node and let z by any element. We have |RSv (z)−RwT ·S̃v (z)| ≤ 25 n0 2k 0 log nk . Proof. First, note that Sv = Cv (log2 k + 1) and S̃v = Cv (T ). For any z, we have: |RSv (z) − RwT ·S̃v (z)| ≤ T −1 X Rwi ·Cv (i) (z) − Rwi+1 ·Cv (i+1) (z) wlog2 k+1 = 1 i=log2 k+1 ≤ T −1 X Rwi ·Cv (i) (z) − Rwi+1 ·Cv (i+1) (z) i=log2 k+1 ≤ T −1 X |Uv (i + 1)| · wi By Lemma A.3 i=log2 k+1 = T −1 X 2T −i−1 · 2i−log2 k−1 i=log2 k+1 = T −1 X 2T −log2 k−2 = i=log2 k+1 n0 n0 log 2k k Therefore, if we set k = Θ( 1 log(n0 )), then we have |RSv (z) − RwT ·S̃v (z)| ≤ n0 by Corollary A.4. This further implies that |QSv (z) − QS̃v (z)| ≤ . We immediately obtain the following Corollary. Corollary A.5. Given any 0 <  < 1. Let Sv denote the buffer of v with the original updating rule after T = Θ(log n0 ) rounds, where n0 = |Sv |. Let S̃v denote the buffer of v using the compaction updating rule with buffer size k = Θ( 1 log(n0 )). For any z, we have |QSv (z) − QS̃v (z)| ≤ . Theorem A.6. Given  = Ω(1/n1/16 ). Let S̃v denote the buffer of v using the compaction updating rule with buffer size k = Θ( 1 · (log log n + log(1/))) after T = Θ(log log n + log(1/)) rounds. For any z, w.h.p. we have |Q(z) − QS̃v (z)| ≤ . Proof. Let 1 = 2 = /2. First, by applying Lemma A.2, we have |QSv (z) − Q(z)| ≤ 1 w.h.p. where n0 = |Sv | = Θ(log n/2 ). Then, we apply Corollary A.5 to show that the corresponding compaction update rule obtains a compacted buffer S̃v of size O( 1 (log log n + log(1/))) such that |QSv (z) − QS̃v (z)| ≤ 2 . By triangle inequality, we have: |Q(z) − QS̃v (z)| ≤ |QSv (z) − Q(z)| + |QSv (z) − QS̃v (z)| ≤ 1 + 2 ≤  B Tools Lemma P B.1. (Chernoff Bound) Let X1 , . . . , Xn be indicator variables such that Pr(Xi = 1) = p. Let X = ni=1 Xi . Then, for δ > 0: E[X] eδ Pr(X ≥ (1 + δ)E[X]) < (1 + δ)(1+δ)  E[X] eδ Pr(X ≤ (1 − δ)E[X]) < (1 − δ)(1−δ)  26 The two bounds above imply that for 0 < δ < 1, we have: Pr(X ≥ (1 + δ)E[X]) < e−δ 2 E[X]/3 Pr(X ≤ (1 − δ)E[X]) < e−δ 2 E[X]/2 . Lemma B.2. Suppose that for any δ > 0, eδ Pr (X > (1 + δ)np) ≤ (1 + δ)(1+δ)  np then for any M ≥ np and 0 < δ < 1, eδ Pr (X > np + δM ) ≤ (1 + δ)(1+δ)  ≤ e−δ M 2 M/3 Proof. Without loss of generality, assume M = tnp for some t ≥ 1, we have Pr (X > np + δM )  np etδ ≤ (1 + tδ)(1+tδ)  M eδ = (1 + tδ)(1+tδ)/t  M eδ ≤ (1 + δ)(1+δ) ≤ e−δ 2 M/3 (∗) eδ (1+δ)(1+δ) ≤ e−δ 2 /3 for 0 < δ < 1 Inequality (*) follows if (1 + tδ)(1+tδ)/t ≥ (1 + δ)(1+δ) , or equivalently, ((1 + tδ)/t) ln(1 + tδ) ≥ (1 + δ) ln(1 + δ). Letting f (t) = ((1 + tδ)/t) ln(1 + tδ) − (1 + δ) ln(1 + δ), we have f 0 (t) = 1 (δt − ln(1 + δt)) ≥ 0 for t > 0. Since f (1) = 0 and f 0 (t) ≥ 0 for t > 0, we must have f (t) ≥ 0 for t2 t ≥ 1. 27
8cs.DS
Title: A Quantitative Neural Coding Model of Sensory Memory Authors: Peilei Liu1*, Ting Wang1 Affiliations: 1 College of Computer, National University of Defense Technology, 410073 Changsha, Hunan, China. *Correspondence to: [email protected] Abstract: The coding mechanism of sensory memory on the neuron scale is one of the most important questions in neuroscience. We have put forward a quantitative neural network model, which is self-organized, self-similar, and self-adaptive, just like an ecosystem following Darwin's theory. According to this model, neural coding is a “mult-to-one” mapping from objects to neurons. And the whole cerebrum is a real-time statistical Turing Machine, with powerful representing and learning ability. This model can reconcile some important disputations, such as: temporal coding versus rate-based coding, grandmother cell versus population coding, and decay theory versus interference theory. And it has also provided explanations for some key questions such as memory consolidation, episodic memory, consciousness, and sentiment. Philosophical significance is indicated at last. Main Text: Great strides have been made in neuroscience and cognitive science (1-8). Until now however, the coding mechanism of sensory memory on the neuron scale is still unclear. A gap exists between the molecular and whole brain research (9). We wish to bridge this gap through a quantitative coding model. Inspired by the “self-organization” idea (10, 11), we only make local rules about neuron and synapse based on existing data and theories. Then the hierarchical neural network will emerge automatically. It has features of considerable interest in neuroscience, cognitive science, psychology, and even philosophy. The modeling target is mainly the cerebral cortex. All ci are constants, which have different meanings in different paragraphs. dq  c1 (1  e c2 ) ,   mi pi ai , where q is the ion quantity, dt m is neuromodulator factor, pi is the postsynaptic signal, ai is the activation or sensitivity of membrane channels. The neuron will be fired when q>c0. And the postsynaptic AP (action potential) will induce LTP (long-term potentiation) in this case. Otherwise LTD (long-term depression) will be induced when lacking postsynaptic AP. N1 is inspired by the MP model (12) Single neuron model (N): N1) dpi  c3 wi fi  c4 pi (c3  c4 ) , s p  c5 pi f , where wi is the dt synaptic strength, fi is the presynaptic spike frequency, sp is stimulus quantity inducing LTP when the neuron is fired, f is the neuron’s firing frequency. Namely pi is determined by two and Hodgkin-Huxley model (13). N2) dai  c6 (c7  ai )  0(c6  0) , dt sd  c8 pi (c7  ai )  c9ec t , where sd is stimulus quantity inducing LTD when the neuron can’t be fired. LTD should be caused by stimulus to fatigue channels namely c7  ai . Postsynaptic AP can result in complete fatigue of channels namely ai  0 , while EPSP (excitatory postsynaptic processes: linearly increase of fi and exponentially decay. N3) 6 potential) will result in partial fatigue namely 0  ai  c7 . Without stimulus however, they will recover to c7 quickly since c6>>0. N1 and N2 reflect the widely acknowledged spatial and temporal summarization of EPSP. N3 is actually an adaptive mechanism preventing spike frequency becoming too high. This model is supported by experiments and STDP (Spike timing Dependent Plasticity) model (14). As in N1, experiments support that inducing LTP needs the coincidence of back-propagating AP and EPSP (15). Correspondingly, inducing LTD needs stimulus without postsynaptic AP. According to N1, this require stimulus of low frequency (16) or closely after postsynaptic AP (namely stimulus in the refractory period) (14). Accordingly to N2 and N3, the time interval between presynaptic and postsynaptic spikes is important. Specifically, the temporal curves of LTP and LTD in STDP should be caused by the EPSP decay and channels recovery respectively. On the other hand however, this neuron model also supports rate-based coding or Hebb coding. For a usual spike sequence, it can be inferred from N2 that pi  c1 fi (1  ec t ) , namely pi  c1 fi when t>>0. Therefore s p  c3 pi f  c4 fi f , and this is actually the Hebb conjecture (17). This can 2 explain why inducing LTP needs stimulus of high frequency or collaboration of multiple dendrites (16). In conclusion, this model has reconciled the disputations between rate-based coding (Hebb coding) and temporal coding (STDP). Specifically, it is temporal coding for single isolated spike, but rate-based coding for natural spike sequence. We mainly discuss natural spike sequence in this paper, because the isolated spike is usually man-made rather than natural. For usual spike sequence, σ in N1 is approximately constant. Therefore N1 becomes q  c1 (1  ec2 )t . Namely, the neuron’s firing frequency is f  1/ t  c3 (1  ec2 ) . Some early models such as MP model also used the form f   (i w i fi ) . But the specific form of φ here is important for the statistical significances. Suppose that the probability of an object O occurring on condition of attribute Ai is P(Oi)= P(O|Ai), where Ai are independent events. Let P(¬Oi)= e c4 pi , and then P(O)=P(O1+O2+…+ Oi)= 1-P(¬O1¬O2…¬Oi)= (1  ec4 ) , where    i pi . Compared with N1, the firing frequency f is proportional to the probability of an object occurring P(O) on condition of attributes. Similarly in N2, pi  c5 fi (1  ec t ) could be viewed as the probabilistic estimate of an attribute occurring P(Ai) on condition of presynaptic spikes history. Without presynaptic spikes however, the reliability of this probabilistic estimate should drop exponentially with time. In essence, N1 and N2 reflect space-time localization which is also a frequently-used principle in the memory management of computer. Namely objects tend to exist in continuous local space and time. In conclusion, neuron is real-time statistical machine. This is also inspired by the statistical physics (18) and prediction of John Von Neumann (19). Incidentally, the exponential functions in this model can be easily implemented in physics and biology. For example, the radioactive materials decay exponentially. 6 Synapse model (S): S1) LTP: dw dr  c1s p h(c2  w)  0 ,  c3 s p h(1  r )  0 , and dt dt dw  c4 w log(r )  0 when s p  0 , where w is the synaptic strength, r is the synaptic decay rate, h dt is hormone factor, s p  c5 fi f according to N2. Generally speaking, synapses are alive and self- adaptive like muscles: continuous exercises make them thick and tough, but they will decay passively without exercises. S2) LTD: and dwd dr  c6 sd wd  0  wd  1 , d  c7 sd rd  0  rd  1 , dt dt dwd  c8 log(rd )(1  wd ) when sd  0 , where wd is the synaptic devaluation, rd is the dt recovery rate of wd. Generally speaking, LTD is the devaluation of LTP, and the actual synaptic strength should be their product wwd. Interestingly, curves in S2 are almost the reversal of S1. Since LTP is long-term (16), stimulus must have changed the synaptic persistence as well as strength. And obviously LTP decays with time. This synapse model is inspired by the BCM model in that synaptic growth rate is influenced by the synaptic strength itself (20). From the statistical viewpoint, synaptic strength reflects the confidence of attribute based on stimulus history. Similar to N2, S1 actually reflect the temporal localization principle, which should be the physiological foundation of “recency effect” or “recency bias”. Differently however, N2 is a kind of instantaneous memory which could be the foundation of consciousness according to Francis Crick (1). We mainly discuss LTP here, because LTD is similar. In addition, LTD is induced by stimulus below the firing threshold. Therefore it should be a regulator for depressing noises other than kernel encoding mechanism (21), just like the fatigue of photoreceptors in the retina. Both synaptic increase and decrease are necessary for many neural network models (6, 7). According to our model however, the synaptic decrease should be due to passive decay instead of LTD. Competition model (C): C1) dpi n   pd , pd  c1 (1  ec  ) ,    j 1, j i f j , where pd is the dt 2 quantity of retrograde messengers, n is the number of dendrites connected to the same axonal branch, pi and fi are the postsynaptic potential and spike frequency respectively. Specifically, back-propagating AP will release retrograde messengers to the presynaptic and transitorily depress other synapses connecting to the axonal branch (22). And their postsynaptic APs will be depressed reversely according to N1. As statistics, this “rich-get-richer” will lead to lateral inhibition known as “softmax” or “winner-take-all” in existing theories (see Fig. 1) (4, 6). However, our model doesn’t need extra “MAX” layers or lateral inhibitory neurons, which is consistent with physiological evidences. The presynaptic axonal branches themselves actually play similar roles. This convergent competition should be the physiological foundation of “primacy effect” in psychology. And the unique winner is actually the coding neuron of this input, while its revivals can be viewed as background noises. After all, two clocks don’t give more accurate time. Form this viewpoint, lateral inhibition is a spatial adaptive mechanism, just like LTD being the temporal adaptive. On the other hand, neurons tend to keep sematic distances apart and prevent replicative coding due to lateral competition. In brief, neurons are professionalized in the division of work. And this will lead to sparse coding (23) and the structure of attribute slot defined as following. y1 a y2 b y3 c d Sparse Inputs Fig. 1. Synaptic competition and attribute slot. Black and white dots mean fired and unfired neurons respectively. Synapse a and d aren’t activated for lack of presynaptic spike. But b isn’t activated for its failure in the synaptic competition. However, c will be activated somewhat because y3 will be fired by other inputs. As a result, neuron y2 will inhibit y1 known as lateral inhibition, and y2 and y3 will inhibit each other. Lateral inhibition will lead to attribute slots, which are divided by vertical dotted lines here. For example, y1 and y2 are in the same attribute slot, while y3 is in a different one. Definition 1: as in Fig. 1, an attribute slot is a set of neurons: s=(a1, a2, …, an): if ai>0, then aj=0 for all j≠i, where ai is the neuron’s firing frequency. For example, if every color of a point corresponds to a single detector, all these detectors can compose an attribute slot. Specially, a binary bit is actually a special attribute slot with two values, and it needs two neurons for representing 0 and 1 respectively (see Fig. 2). In some models, 0 is represented by the resting potential. In our opinion however, the resting potential is meaningless because it can’t transit neurotransmitters. Therefore the spike is actually unitary other than binary, different from the binary pulse in computer. On the other hand, an attribute with n values can also be represented by the combination of m independent neurons (logb (n)  m  n) other than by n mutuallyexclusive neurons. For example, all colors can be mixed of three-primary colors in different proportions. In essence, these two coding manners are “grandmother cell” and population coding respectively (24). Attribute slot has great representative ability. The “XOR problem” once caused the “artificial intelligence winter” (25), which was solved by multiple-layered network latter. With attribute slot however, it can be solved through a single-layer network (see Fig. 2). In fact, it can be proved that a single-layer network can represent any logic expression P. As well known, P  p1 pi  pn , pi  a1 a j  a m , where aj is either an atom expression or its negative form. Since aj and ¬aj can be represented by attribute slot, pi can be represented by a single neuron. Therefore P can be represented by a single-layer network. Moreover, inhibitory neurons aren’t necessary, different from logic gates in computer. Retrograde massagers actually play similar roles of logic “NOT”. Similar to the all-or-none AP, the attribute slot is a kind of digital coding in essence. The digital coding is used widely in computer science for its tolerance of noise. Similarly, the cerebrum can also ignore flaws known as brain completion. The cost is that more neurons are needed. A x1 y1 ¬x1 B y2 ¬x2 x2 ¬x1 y1 y3 x1 y2 x2 ¬x2 Fig. 2. Representation of XOR function. Panel A and B represent “x1 XOR x2” and “x1 OR x2” respectively. Feature each of x1 and ¬x1 corresponds to an independent neuron respectively. In some models however, ¬x1 and ¬x2 are represented by resting potentials. Self-organized neural network and circuits. The initial model is composed of free neurons. Free dendrites move randomly and connect to axonal branches nearby with an initial synaptic strength. Whenever meeting an input, neurons compete and only winners can strengthen their dendritic synapses. Other synapses will decay until broken. Therefore, any input is actually either encoded by a free neuron or merged into the most similar coding neuron. Since single neuron’s dendrites are limited, every neuron only encodes a small part of an input. Therefore fine-grain encoding is supported. And the whole input is actually encoded by a hierarchy tree structure, whose root is the coding neuron of this input (see Fig. 3A). Overlapping coding trees compose neural network or cortical column (26). Since input is sparse (23), for simplicity we suppose that every input is composed of attribute slots (s1,s2,…,sn). Then every layer should be composed of attribute slots according to C1. And higher layer contains fewer attribute slots. Therefore every layer is the input of next layer, and feedback fibers can be viewed as common inputs. As results, circuits can be self-organized similar to the feedforward network (see Fig. 3B). Moreover, the neural network is self-similar: coding trees are like large neurons, while columns are large attribute slots. In some degree, a cortical area or the cerebrum itself is a super attribute slot. According to Francis Crick (1), the main cortical structure is determined by genes, while the fine neural coding is determined by postnatal experiences. Consistent with the neural Darwinism theory (2), the cortex is like an ecosystem according to our model: inputs are the sunshine; neurons collaborate and compete like plants and animals; and only the fittest can survive. Animals at the top of food chains are actually the memories of environment and era. For instances, lion is the symbol of African grassland, while the tyrannosaurus rex is the memory of the Cretaceous period. Recent experiments support that neural connections change dynamically with external stimulus (27). As results, universal free neurons become specialized gradually, just like embryonic stem-cells irreversibly growing into different organs. For example, visual pathways in the developing ferret brain can be rewired to auditory cortex and work well. A neuron’s function is actually determined by its dendritic connections. Just as Karl Marx said, “Person is the sum of all social relations”. From this viewpoint, people are super neurons of the society or Twitter. A y2 y1 B Outputs x Inputs Feedback Fig. 3. Neural network and circuits. In A, black and white dots mean fired and unfired neurons respectively. Any input will converge to a single neuron such as y1 through a coding tree. Overlapping trees compose a neural network, and common intermediate nodes such as x are shared. Due to lateral inhibition, every layer is composed of attribute slots separated by vertical dotted lines here. In B, the triangle symbol represents coding tree in A. The long feedforward and feedback fibers can be viewed as common inputs. Therefore circuits can be self-organized similar to A. Computational significance. According to our model, neural coding is a “multiple-to-one” mapping from inputs to neurons due to lateral inhibition, which is a well-defined function in essence. An input is encoded only when it has been convergent to the coding neuron through a coding tree. Conversely, whenever a coding neuron is fired, the corresponding input will be retrieved. Obviously, the retrieval process is an encoding process meanwhile. Neurons are computing units as well as storage units. Information is saved in the dendritic synapses, while the firing frequency is actually computing result. From this viewpoint, synapses and spikes are hardware and software of nerve system respectively, and both of them are distributed. Different from the von Neumann architecture (19), data and program aren’t separated. Representation of information is digital but not binary. In addition, dynamic changes of program at runtime are allowed. From the viewpoint of machine learning, the feedforward encoding is unsupervised learning in general. But supervised learning can also be conducted by facilitating or inhibiting neuron’s firing through specific fibers casting. This is important when we need to associate different objects or distinguish similar objects. For instance, we have to associate words and pronunciations with pictures as well as distinguish similar faces. Incidentally, that’s why people have “face cells” while monkeys don’t (1). According to N1 and S1, neuromodulators and hormones are actually meta-mechanisms influencing neuron’s firing frequency and learning rate. They could conduct reinforcement learning and selectively reinforcing memories important for survival, similar to the dopamine system in motor learning (28). However, the supervised learning and reinforcement learning here are “soft” or statistical rather than absolute. Since fired neurons strengthen their dendritic synapses towards to the input pattern, the lateral competition become convergent and stable gradually. Therefore the neural network tends to converge to the global minimum point, as in the simulated annealing algorithm (29). Similarly, synapses become stable gradually with stimuli according to S1. And synapses in lower layers are more stable. As results, iterations in back-propagating algorithm could be avoided when training hierarchical feedforward networks (7). Generally speaking, our model supports “grandmother cell” rather than population coding (24). The “grandmother cell” was questioned for following reasons (1, 4): first, neurons are too few and too simple for coding infinite complex objects in theory; second, experiments demonstrate that a neuron isn’t a template of all stimuli in its receptive field. According to our model however, a neuron encodes more than one object, and not all inputs are stored. Instead, only those occurring frequently or companied with hormone can be saved. And synaptic decay and neurogenesis (30) can produce additional memory capacity. Moreover, resources can be saved through sharing common intermediate nodes in the deep hierarchical network (4, 5), although retrieval will become slower. And neurons could actually use large trees for encoding complex objects. On the other hand, not all stimuli in a neuron’s receptive field are effective. Due to space-time adaptive mechanisms, neurons are more sensitive to features in contrast to backgrounds. Moreover, the coding is also influenced by the vast top-down connections. A possible worry is about the dying of neurons. In our opinion, only those lack of stimulus die. In fact, the influence of accidental death is also limited. As statistical model, lack of partial inputs won’t result in fatal disaster to a neuron. And due to the low firing threshold, this neuron model has surprising generalizing ability (4). Almost any input could stir up many neurons, and the retrieval is actually determined by lateral competition. Therefore the place of a dead neuron can be taken by the most similar one. In brief, the “grandmother cell” is as robust as population coding. However, population firing confronts the binding problem (1), namely how to reconcile distributed information and the unitary consciousness. Brain waves or rhythm was proposed as the binding mechanism. In our opinion however, binding is computing in essence. And neurons themselves should be the workshops binding features together. Psychological significance. S1 actually gives the learning curve and forgetting curve. However, the forgetting curve in experiments isn’t consistent with exponential function completely (31). In our opinion, recall in the tests and other rehearsals are actually memory consolidation process, which will slow down the decay rate. On the other hand, the lateral inhibition in C1 can explain memories interference (32). Since it influences encoding and retrieval meanwhile, both proactive interference and retroactive interference can be explained. Therefore our model has actually reconciled the decay theory and interference theory (33). In essence, forgetting is retrieval failure due to either lateral inhibition or disappearance of “memory trace”. Some researchers hold that forgetting should result from random changes of synapses due to noise (34), because relearning is easier than learning new, namely the implicit memory in psychology. According to our model, implicit memory are stored in lower layers, where neurons are common nodes shared by different coding trees. Therefore their synapses are usually tougher and more likely to remain. And forgetting should mainly be due to synaptic decay near the root of coding trees. Repetitive stimulus (rehearsal) and hormones can lead to memory consolidation. For example, we can remember a strange phone number through quick repetition. And dream should be one of such rehearsals (35). Specifically, neurons will become sensitive and firing spontaneously when without external inputs in sleep. Due to lateral inhibition, only strong circuits can be fired. Therefore in essence, dream is the self-reinforcing of strong memories as well as the fantasy divorced from reality since lacking inputs from nature. Influential events are often companied with hormones changing, which actually represent their importance for the survival (36). Since an event seldom repeats, it is hard for the neocortex to encode. However, it can be stored in hippocampus and limbic structure which are sensitive to hormones. These memories are usually known as episodic memory or flash memory, which is an important part of working memory in our opinion. They should be able to influence the sematic memory in cortex (37), just like computer memory writing and reading disk. From this viewpoint, sematic memory and rationality serve the hormone system, or instinct dominates rationality. Consciousness is one of the most important and mystical topics (1, 3, 8), which has different meanings in different disciplines. Here we try to discuss the neural mechanism correlative with consciousness, namely what happens when you think of an object. According to our model, conscious of something means the corresponding coding neuron’s firing. Paying attention to an object means specific fibers and neuromodulators casting to the coding neuron, while sentiment should be pervasive hormones. And different areas should be sensitive to different hormones, as the Lövheim cube of emotion (38). Our consciousness is often believed to be autonomous and free. For example, a girl can make various sentences she has never heard of. In our opinion, the consciousness seems autonomous because of the continuous complex inputs, huge memory volume, and some randomness. Specifically, the cerebrum is a “Turing Machine” in essence, whose output is determined by current inputs and internal states. Current inputs come from nature as well as our body, while internal states include memory and instinct system. In fact, the instinct or sentiment can also be viewed as ancient memories encoded in genes. As Crick said, we believe our minds are free, because we often know the decision itself but unaware of the decision-making process (1). In other words, the cerebrum is approximately a black box for us. Open the mainframe however, you will find a not-so-intelligent machine composed of transistors and plastic connections, although it is indeed more robust. It is surprising and interesting that intelligence could come from random processes. The philosophical significance hasn’t escaped our notice: the consciousness is the second nature, while the so-called “nature” is actually our subjective cognition of the “real” nature. We can cognize the nature only in probability and statistics, but never precisely or completely. In brief, the materialism and idealism can be reconciled. References and Notes: 1. F. Crick, The Astonishing Hypothesis: The Scientific Search for the Soul (Charles Scribner's Sons, New York, 1994). 2. G. Edelman, The Theory of Neuronal Group Selection (Basic Books, New York 1987). 3. C. Koch, K. Hepp, Quantum mechanics in the brain. Nature 440, 611-612 (2006). 4. T. Poggio, E. Bizzi, Generalization in vision and motor control. Nature 43, 768-774 (2004). 5. G. E. Hinton, R. R. Salakhutdinov, Reducing the dimensionality of data with neural networks. Science 313, 504-507 (2006). 6. S. Grossberg, Adaptive resonance theory: how a brain learns to consciously attend, learn, and recognize a changing world. Neural Networks 37, 1-47 (2013). 7. D. E. Rumelhart, J. L. McClelland. Parallel Distributed Processing (The MIT Press, London, 1986). 8. J. Hawkins, S. Blakeslee, On Intelligence (Times Books, New York, 2004). 9. G. Miller, How are memories stored and retrieved. Science 309, 92 (2005). 10. A. L. Barabási, R. Albert, Emergence of scaling in random networks. Science 286, 509-512 (1999). 11. C. W. Reynolds, Flocks, herds, and schools: a distributed behavioral model. Comput. Graphics 21, 25-34 (1987). 12. W. S. McCulloch, W. Pitts, A logical calculus of the ideas immanent in nervous activity. Bull. Math. Biol. 5: 115-133 (1943). 13. A. L. Hodgkin, A. F. Huxley, A quantitative description of membrane current and its application to conduction and excitation in nerve. J. Physiol. 117, 500-544 (1952). 14. W. Gerstner, R. Kempter, J. L. Hemmen, H. Wagner, A neuronal learning rule for submillisecond temporal coding. Nature 383, 76-78 (1996). 15. H. Markram, J. Lübke, M. Frotscher, B. Sakmann, Regulation of synaptic efficacy by coincidence of postsynaptic APs and EPSPs. Science 275, 213-215 (1997). 16. C. R. Bramham, B. Srebro, Induction of long-term depression and potentiation by low- and high-frequency stimulation in the dentate area of the anesthetized rat: Magnitude, time course and EEG. Brain Res. 405:100-107 (1987). 17. D. O. Hebb, The Organization of Behavior: A Neuropsychological Approach (Jhon & Sons, New York, 1949). 18. E. Schrödinger, What Is Life? (Cambridge University Press, Cambridge, 1944). 19. J. V. Neumann, The Computer and the Brain (Yale University Press, New Haven, CT, 2000). 20. E. L. Bienenstock, L. N. Cooper, P. W. Munro, Theory for the development of neuron selectivity: orientation specificity and binocular interaction in visual cortex. J. Neurosci. 2, 28-32 (1982). 21. M. Schonewille et al., Reevaluating the role of LTD in cerebellar motor learning. Neuron 70, 43-50 (2011). 22. W. G. Regehr, M. R. Carey, A. R. Best, Activity-dependent regulation of synapses by retrograde messengers. Neuron 63, 154-170 (2009). 23. B. A. Olshausen, Sparse codes and spikes. R.P.N. Rao, B. A. Olshausen and M. S. Lewicki Eds. MIT press, 257-272 (2002). 24. C. G. Gross, Genealogy of the "grandmother cell". Neuroscientist 8, 512-518 (2002).M. 25. Minsky, S. Papert, Perceptrons: An Introduction to Computational Geometry (MIT Press, London, 1972). 26. R. B. Tootell, M. S. Silverman, R. L. De Valois, Spatial frequency columns in primary visual cortex. Science 214, 813-815 (1981). 27. G. B. Ermentrout, R. F. Galán, N. N. Urban, Relating neural dynamics to neural coding. Phys. Rev. 99, 248103 (2007). 28. M. J. Frank, L. C. Seeberger, R. C. O’Reilly, By carrot or by stick: cognitive reinforcement learning in parkinsonism. Science 306, 1940-1943 (2004). 29. D. H. Ackley, G. E. Hinton, T. J. Sejnowski, A learning algorithm for Boltzmann machine. Cognit. Sci. 9, 147-169 (1985). 30. C. G. Gross, Neurogenesis in the adult brain: death of a dogma. Nature Rev. Neurosci. 1, 6773 (2000). 31. J. T. Wixted, On common ground: Jost’s (1897) law of forgetting and Ribot’s (1881) law of retrograde amnesia. Psychol. Rev. 111, 864-879 (2004). 32. T. D. Tomlinson, D. E. Huber, C. A. Rieth, E. J. Davelaar, An interference account of cueindependent forgetting in the no-think paradigm. Proc. Natl. Acad. Sci. U.S.A. 106, 1558815593 (2009). 33. K. Oberauer, S. Lewandowsky, Forgetting in immediate serial recall: decay, temporal distinctiveness, or interference? Psychol. Rev. 115, 544-576 (2008). 34. J. V. Stone, P. E. Jupp, Falling towards forgetfulness: synaptic decay prevents spontaneous recovery of memory. PLoS Comput. Biol. 4, (2008). doi:10.1371/journal.pcbi.1000143. 35. R. Stickgold, Sleep-dependent memory consolidation. Nature 437, 1272-1278 (2005). 36. E. Tulving, H. J. Markowitsch, Episodic and declarative memory: Role of the hippocampus. Hippocampus 8, 198-204(1998). 37. P. W. Frankland, B. Bontempi, The organization of recent and remote memories. Nature Rev. 6, 119-130 (2005). 38. H. Lövheim, A new three-dimensional model for emotions and monoamine neurotransmitters. Med. Hypotheses 78, 341-348 (2012). Acknowledgments: This work was supported by the National Natural Science Foundation of China (Grant No. 61170156 and 60933005).
9cs.NE
TRACY-WIDOM AT EACH EDGE OF REAL COVARIANCE ESTIMATORS arXiv:1707.02352v1 [math.PR] 7 Jul 2017 ZHOU FAN AND IAIN JOHNSTONE Abstract. We study the sample covariance matrix for real-valued data with general population covariance, as well as MANOVA-type covariance estimators in variance components models under null hypotheses of global sphericity. In the limit of large n and p, the spectra of such estimators may have multiple disjoint intervals of support, possibly intersecting the negative half line. We show that the distribution of the extremal eigenvalue at each regular edge of the support has a Tracy-Widom F1 limit. Our proof extends a comparison argument of Ji Oon Lee and Kevin Schnelli, replacing a continuous Green function flow by a discrete Lindeberg swapping scheme. 1. Introduction Let Y1 , . . . Yn be observations on p traits or features. When the traits are distributed with mean 0 and covariance Σ ∈ Rp×p , the sample covariance matrix provides an unbiased estimate of Σ: n X −1 Σ̂ = n Yi Yi0 . i=1 It is common to assume √ that the vectors Yi are independent, and that the dependence between traits arises via Yi = nΣ1/2 Xi , where the entries of Xi are i.i.d. with mean 0 and variance 1/n. Setting X = [X1 , . . . , Xn ] this sample covariance estimator then takes the form Σ̂ = Σ1/2 XX 0 Σ1/2 . (1) Equivalently, we may study its “companion” matrix X 0 ΣX, which has the same eigenvalues at Σ̂ up to |p − n| zeros. In the large-sample limit where p and n increase proportionally, the empirical spectrum of Σ̂ is well-approximated by a deterministic law ρ [MP67, Yin86, SB95]. This asymptotic regime has become increasingly relevant for data analysis, due to the prevalence of data where p is of comparable magnitude to n. In this regime and under a “sphericity” null hypothesis that Σ is the identity, i.e. the traits represent isotropic noise, the largest eigenvalue of the estimate Σ̂ falls close to the largest point of support of ρ [Gem80, YBK88] and has a Tracy-Widom F1 limiting distribution [Joh01, Sos02, Péc09, PY14, LS16]. This yields a statistical test for whether a large observed eigenvalue of Σ̂ may be attributed to the isotropic noise, or whether it represents a deviation from this sphericity null [Joh01, PPR06]. The primary motivation for our work arises from a class of statistical models in which the observations Yi are dependent. For example, suppose the samples are divided into n/2 pairs (e.g. pairs of siblings), and samples within each pair are more similar than samples between different pairs. A classical statistical model for this scenario is a multivariate variance components (or random effects) linear model, where the p-dimensional observation for sample i, belonging to pair bi/2c, is modeled as Yi = αbi/2c + εi . Here, α1 , . . . , αn/2 are independent draws of a random vector with mean 0 and covariance Σ1 ∈ Rp×p , representing shared “pair effects”, and ε1 , . . . , εn are independent vectors with mean 0 and Department of Statistics, Stanford University E-mail addresses: [email protected], [email protected]. 1 2 TRACY-WIDOM FOR COVARIANCE MATRICES a different covariance Σ2 ∈ Rp×p , representing the individual variation. This model is expressed concisely as Y = U α + ε, (n/2)×p where the rows of α ∈ R and ε ∈ Rn×p are the above vectors, and U ∈ {0, 1}n×(n/2) is an incidence matrix encoding the pair memberships. Denoting by π, π ⊥ ∈ Rn×n the orthogonal projections onto the column span of U and its orthogonal complement, it is verified that Σ̂1 = n−1 Y 0 (π − π ⊥ )Y, Σ̂2 = 2n−1 Y 0 π ⊥ Y (2) are unbiased estimators of Σ1 and Σ2 based on the observed data Y . These are the classical multivariate analysis of variance (MANOVA) estimators of covariance in this model. More generally, a multivariate variance components linear model takes the form Y = U1 α1 + . . . + Uk αk , (3) RIr ×p where α1 , . . . , αk are independent matrices, each αr ∈ containing Ir independent rows disp×p tributed with mean 0 and covariance Σr ∈ R . Each Ur ∈ Rn×Ir is a known and deterministic incidence matrix. (Often there is an additional fixed effects term Xβ, for example modeling a nonzero mean value for each trait, which we omit here for simplicity.) It is usual to assume αr is Gauss√ 1/2 ian, but in the spirit of our earlier discussion, we assume only a representation αr = pXr Σr , where the entries of Xr ∈ RIr ×p are i.i.d. mean 0 and variance 1/p. The setting of n independent samples corresponds trivially to k = 1 and U1 = Id, while the preceding example corresponds to k = 2, U1 = U , and U2 = Id. Such models encompass crossed and nested classification designs, one application of which is the modeling of components of variation and covariation of phenotypic traits in quantitative genetics [LW98, MCM+ 14, BAC+ 15]. In many examples, each Σr has a MANOVA estimator Σ̂r = Y 0 BY, (4) where B ≡ Br is a symmetric matrix that is constructed based on U1 , . . . , Uk . In the regime where n, p, I1 , . . . , Ik all increase proportionally, the empirical spectrum of Σ̂r was shown in [FJ16] to also be well-approximated by a deterministic law, in the sense of global weak convergence. A relevant null hypothesis for the model (3) is that of “global sphericity”, which asserts that each Σr is proportional to the identity, Σr = c2r Id for some c1 , . . . , ck ≥ 0. The value cr may be 0, √ in which case the null hypothesis signifies the absence of the rth effect. Now αr = cr pXr and it is verified that the MANOVA estimator (4) takes the equivalent form Σ̂r = X 0 T X (Xr )kr=1 RM ×p (5) (pcr cs Ur0 BUs )kr,s=1 RM ×M ∈ for upon defining block matrices X = ∈ and T = M = I1 + . . . + Ik . This is the same form as the companion matrix of (1). Correspondingly, under a global sphericity null hypothesis, the equations in [FJ16] that describe the empirical spectrum of Σ̂r reduce to the Marcenko-Pastur equation describing the spectrum of (1). In this paper, we study the edges of the spectrum of the matrix (1) or (5). Recent work by Lee and Schnelli [LS16] showed that, under certain regularity conditions, the largest eigenvalue of (1) or (5) continues to exhibit a Tracy-Widom F1 limit, when Σ or T is positive-definite but not necessarily identity. Building on the proof in [LS16], we extend this result in two directions: 1. We show that this holds also for symmetric matrices T that have negative eigenvalues. 2. The limiting spectrum of (1) or (5) may have multiple disjoint intervals of support. We establish a Tracy-Widom F1 limit for the extremal eigenvalue at each “regular” edge of the support. Both extensions are relevant to variance components models: The matrices B and T in (4) and (5) typically have both positive and negative eigenvalues. [BM15, Boxes 1 and 2] has an example from the quantitative genetics literature, and our main result resolves an open question stated there about Tracy-Widom limits and scaling constants. (The MANOVA estimator Σ̂r may not be TRACY-WIDOM FOR COVARIANCE MATRICES 3 positive definite. This is not of particular concern in our testing application, whereas for estimation, it is common to postprocess Σ̂r to make it positive-definite [Ame85].) In spiked perturbations to the global sphericity null, it is possible for spike eigenvalues of Σ̂r to appear not only beyond the outer edges of the support, but also in the gaps between support intervals—we will describe this in forthcoming work. The Tracy-Widom limit at each edge facilitates a statistical test of whether any such observed eigenvalue may be attributed to a true spike eigenvalue in Σ1 , . . . , Σk . We discuss applications to variance components models further in Section 2.4. To our knowledge, the second extension above is new even for the sample covariance matrix (1) with positive-definite Σ. The analogous result is known when X has complex Gaussian entries, where convergence of the largest eigenvalue to the Tracy-Widom F2 law was established in [Kar07], and this was extended to each regular edge in [HHN16]. These analyses use the determinantal form of the HCIZ integral over the complex unitary group, which has no known real analogue. The proof of [LS16] for the largest eigenvalue in the real setting is different and relies on a resolvent/Green function comparison strategy, which we now discuss. 1.1. Strategy of proof. We consider the N × N matrix Σ̂ = X 0 T X where the M × M matrix T is real symmetric. Let E∗ denote an edge of the deterministic spectral support of Σ̂. (We define this formally in Section 2.) As in [LS16], the strategy of proof will be to consider Σ̂(L) = X 0 T (L) X for a different matrix T (L) , and to compare the eigenvalue behavior of Σ̂ near E∗ with that of Σ̂(L) (L) near an edge E∗ . By extending the edge universality established in [KY16] from positive-definite to general symmetric T , it suffices to consider the case where T is diagonal and X has Gaussian entries. In [LS16], E∗ is the rightmost edge of support. The comparison between T and T (L) is achieved by a continuous interpolation over l ∈ [0, L], where T (0) = T and each T (l) has diagonal entries (l) {tα : α = 1, . . . , M } given by 1 1 = e−l (0) + (1 − e−l ). (6) (l) tα tα (See [LS16, Eq. (6.1)].) For reasons of the proof, each T (l) is then rescaled so that the largest eigenvalue of Σ̂(l) ≡ X 0 T (l) X fluctuates with identical scale (of order N −2/3 ) for every l. Taking L = ∞, T (∞) is a multiple of the identity, so Σ̂(∞) is a white Wishart matrix for which the (l) Tracy-Widom distributional limit is known. Along this interpolation, the upper edge E∗ traces a (0) (∞) continuous path between E∗ and E∗ . Defining (l) (l) (l) (l) #(E∗ + s1 , E∗ + s2 ) = number of eigenvalues of Σ̂(l) in [E∗ + s1 , E∗ + s2 ], a resolvent approximation idea from [EYY12b] establishes the smooth approximation h i h i (l) (l) P #(E∗ + s1 , E∗ + s2 ) = 0 ≈ E K(X(l) (s1 , s2 )) , (7) where K(X(l) (s1 , s2 )) is a smoothed indicator of the integrated Stieltjes transform of Σ̂(l) along an interval in C+ at height η = N −2/3−ε above the corresponding interval on the real axis. The crux of the proof in [LS16] is then to show i d h (8) E K(X(l) (s1 , s2 )) ≤ N −1/3+ε dl for a small constant ε > 0 and s1 , s2 on the N −2/3 scale. This is applied to compare the probability in (7) for l = 0 and l = 2 log N . A simple direct argument compares these probabilities for l = 2 log N and l = ∞, concluding the proof in [LS16]. 4 TRACY-WIDOM FOR COVARIANCE MATRICES The technical contribution of our paper is to show that the continuous interpolation in (6) may be replaced by a discrete interpolating sequence. The resulting extra flexibility permits the extension of this result in the two directions mentioned earlier. Indeed, we note that (6) is not well-defined (0) for negative tα , as the right side passes through 0 along the interpolation. More importantly, (6) does not allow us to study interior edges of Σ̂ when there are multiple disjoint intervals of support, as the support intervals merge and these edges vanish along the interpolation. We instead consider a discrete interpolating sequence T (0) , T (1) , . . . , T (L) for an integer L ≤ O(N ), where the diagonal (l) entries tα satisfy M X |t(l+1) − t(l) α α |≤ O(1) (9) α=1 (l) for all l = 0, . . . , L − 1. Each matrix Σ̂(l) ≡ X 0 T (l) X will have a corresponding edge E∗ such that (l+1) |E∗ (l) − E∗ |≤ O(1/N ). (10) Each of these L discrete steps may be thought of as corresponding to a time interval ∆l = O(N −1 ) in the continuous interpolation (6). We show that the above conditions are sufficient to establish a discrete analogue of (8), h i h i E K(X(l+1) (s1 , s2 )) − E K(X(l) (s1 , s2 )) ≤ N −4/3+ε . (11) As L ≤ O(N ), summing over l = 0, . . . , L − 1 establishes the desired comparison between T (0) and T (L) . Importantly, the requirement (9) is sufficiently weak to allow a Lindeberg swapping scheme, where each T (l+1) makes a single O(1) perturbation to a single entry of T (l) . Hence we may move the diagonal entries of T from one interval of support to another, without continuously evolving them between such intervals. This allows us to preserve the edge E∗ as in (10) along the entire interpolating sequence, even as the other intervals of support disappear. Section 3 reviews the requisite proof ingredients, which are similar to those in [LS16]. These include properties of the limiting Stieltjes transform near regular edges, Schur-complement identities for the resolvent, a local Marcenko-Pastur law as in [BPZ13, KY16], and the resolvent approximation from [EYY12b] that formalizes (7). These ingredients either are drawn from the existing literature or represent extensions to non-positive-definite T ; we defer proofs or proof sketches of these extensions to Appendices A and B. Section 4 constructs an interpolating sequence T (0) , . . . , T (L) for any starting matrix T (0) = T . As in [LS16], we rescale each T (l) so that the eigenvalue of interest fluctuates with identical scale for each l. Consequently, the interpolating sequence will not be exactly Lindeberg, but rather will (l+1) (l) (l+1) (l) satisfy |tα − tα |≤ O(1) for a single entry α and |tβ − tβ |≤ O(1/N ) for all remaining entries (L) β 6= α. The final edge E∗ may be either a left or right edge of Σ̂(L) , and we conclude the proof by applying either the result of [Joh01] for a positive right edge or [FS10] for a positive left edge of a (real) white Wishart matrix. To ensure that a left edge is not a hard edge at 0, we allow T (L) to have two distinct diagonal entries {0, t}. Thus, Σ̂(L) may have a different dimensionality ratio from the starting Σ̂. In Section 5, we conclude the proof by establishing (11). To achieve this, we generalize the “decoupling lemma” of [LS16, Lemma 6.2] to a setting involving two different resolvents G and Ǧ, corresponding to T ≡ T (l) and Ť ≡ T (l+1) . Fortunately, we do not need to perform the same generalization for the “optical theorems” of [LS16, Lemma B.1], as we may apply (9) to reduce the higher-order terms arising in the decoupling lemma to involve only G and not Ǧ. We will explain this later in the proof. TRACY-WIDOM FOR COVARIANCE MATRICES 5 Acknowledgments. We are indebted to quantitative geneticist Mark Blows for asking the question about Tracy-Widom for variance components models that led to this paper, and for many stimulating discussions. We would like to also thank Kevin Schnelli for helpful conversations about [LS16]. ZF is supported in part by a Hertz Foundation Fellowship and an NDSEG Fellowship (DoD AFOSR 32 CFR 168a). IJ is supported in part by NIH R01 EB001988 and NSF DMS 1407813. 2. Model and results 2.1. Deterministic spectral law. Let T ∈ RM ×M be a deterministic symmetric matrix of bounded operator norm, whose eigenvalues t1 , . . . , tM may be positive, negative, or zero. Let X ∈ RM ×N be a random matrix with independent entries of mean 0 and variance 1/N . We study the matrix Σ̂ = X 0 T X in the limit as N, M → ∞ proportionally. In this limit, the empirical spectrum of Σ̂ is wellapproximated by a deterministic law ρ ≡ ρN,M,T .∗ We review in this section the definition of ρ and its relevant properties. When T is the identity matrix, ρ is the Marcenko-Pastur law [MP67]. Under our scaling for X, this has density p p (E+ − x)(x − E− ) 1 1(E− ,E+ ) (x), E± = (1 ± M/N )2 (12) f0 (x) = 2π x on the positive real line, and an additional point mass at 0 when M < N . More generally, for any symmetric matrix T , the law ρ may be defined by a fixed-point equation in its Stieltjes transform: For each z ∈ C+ , there is a unique value m0 (z) ∈ C+ which satisfies z=− M 1 X tα 1 + . m0 (z) N 1 + tα m0 (z) (13) α=1 This is oftentimes called the Marcenko-Pastur equation, and it defines implicitly the Stieltjes transform m0 : C+ → C+ of a law ρ on R [MP67, SB95]. This law ρ admits a continuous density f0 at each x ∈ R∗ , given by 1 =m0 (z), (14) f0 (x) = lim + z∈C →x π where ( R if rank(T ) > N R∗ = R \ {0} if rank(T ) ≤ N. For x 6= 0, this is shown in [SC95]; we extend this to x = 0 when rank(T ) > N in Appendix A. The law ρ is called the free multiplicative convolution of the empirical distribution of t1 , . . . , tM with the Marcenko-Pastur law (12). In contrast to the case T = Id, if t1 , . . . , tM take more than one distinct value, then ρ may have multiple disjoint intervals of support. Two such cases are depicted in Figures 1 and 2. For each support interval [E− , E+ ] of ρ, we will call each endpoint E− and E+ an edge. More formally: Definition 2.1. The support of ρ is supp(ρ) = {x ∈ R : ρ([x + δ, x − δ]) > 0 for all δ > 0}. E∗ ∈ R is a right edge of ρ if (E∗ − δ, E∗ ) ⊂ supp(ρ) and (E∗ , E∗ + δ) ⊂ R \ supp(ρ) for some δ > 0. E∗ is a left edge of ρ if this holds with (E∗ − δ, E∗ ) and (E∗ , E∗ + δ) exchanged. Alternatively, supp(ρ) is the closure of {x ∈ R∗ : f0 (x) > 0} together with the isolated point 0 if rank(T ) < N . When 0 is an isolated point, we do not consider it an edge. ∗We define ρ directly by N/M and T , rather than assuming that N/M and the spectrum of T converge to certain limiting quantities. 6 TRACY-WIDOM FOR COVARIANCE MATRICES Figure 1. Left: Density f0 (x) of ρ and simulated eigenvalues of Σ̂, for N = 500, M = 700, and T having 350 eigenvalues at -2, 300 at 0.5, and 50 at 6. The four soft edges of ρ are indicated by E1 , . . . , E4 . Right: The function z0 (m), with two local minima and two local maxima corresponding to the four edges of ρ. Figure 2. Left: Density f0 (x) of ρ and simulated eigenvalues of Σ̂, for N = M = 500, and T having 400 eigenvalues at -1 and 100 at 4. Here, ρ has three soft edges E1 , E2 , E4 and one hard edge E3 = 0. Right: The function z0 (m), with three indicated local extrema, and also a local minimum at m = ∞ corresponding to the hard right edge E3 = 0. The support intervals and edge locations of ρ are described in a simple way by (13): Define P = {0} ∪ {−t−1 α : tα 6= 0}, and consider R̄ = R ∪ {∞}. Consider the formal inverse of m0 (z), z0 (m) = − M 1 1 X tα + , m N 1 + tα m (15) α=1 as a real-valued function on R̄ \ P with the convention z0 (∞) = 0. Then z0 is a rational function with poles P —two examples are plotted in Figures 1 and 2. The following proposition relates the edges of ρ to the local extrema of z0 . We indicate its proof in Appendix A. (Parts (a), (b), and (d) follow from [SC95], and part (c) was established for positive-definite T in [KY16].) TRACY-WIDOM FOR COVARIANCE MATRICES 7 Proposition 2.2. Let m1 , . . . , mn ∈ R̄\P denote the local minima and local maxima† of z0 , ordered such that 0 > m1 > . . . > mk > −∞ and ∞ ≥ mk+1 > . . . > mn > 0. Let Ej = z0 (mj ) for each j = 1, . . . , n. Then: (a) ρ has exactly n/2 support intervals and n edges, which are given by E1 , . . . , En . (b) Ej is a right edge if mj is a local minimum, and a left edge if mj is a local maximum. (c) The edges are ordered as E1 > . . . > Ek > Ek+1 > . . . > En . 00 (d) For each Ej where mj 6= ∞, we have Ep j ∈ R∗ and z0 (mj ) 6= 0. Defining γj = the density of ρ satisfies f0 (x) ∼ (γj /π) |Ej − x| as x → Ej with x ∈ supp(ρ). p 2/|z000 (mj )|, Definition 2.3. For each edge E∗ of ρ, the local minimum or maximum m∗ of z0 such that z0 (mp 6 ∞ and hard if m∗ = ∞. For a soft edge, ∗ ) = E∗ is its m -value. The edge is soft if m∗ = γ = 2/|z000 (m∗ )| is its associated scale. Hence the local extrema of z0 are in 1-to-1 correspondence with the edges of ρ. Excluding the point mass at 0 when rank(T ) < N , supp(ρ) is exactly [En , En−1 ] ∪ [En−2 , En−3 ] ∪ . . . ∪ [E2 , E1 ], where these intervals are disjoint and in increasing order. The density f0 exhibits square-root decay at each soft edge E∗ , with scale inversely related to the curvature of z0 at m∗ . When T is positive-semidefinite, supp(ρ) is nonnegative. In this setting, an edge at 0 is usually called hard and all other edges soft. The above definition generalizes this to non-positive-definite T : A hard edge is always 0 and can occur when rank(T ) = N . One example is depicted in Figure 2. However, if T has negative eigenvalues, then a soft edge may also be 0 when rank(T ) > N . 2.2. Edge regularity and extremal eigenvalues. We state our assumptions and introduce the notion of a “regular” edge of ρ. For positive-definite T , regularity was introduced for the rightmost edge in [Kar07] and generalized to all soft edges in [HHN16, KY16]. Throughout, we denote the dimensionality ratio by d = N/M. We make the following assumptions regarding d and the scaling of T : Assumption 2.4. For some constant Cd,T > 0, the ratio d = N/M satisfies −1 < d < Cd,T . Cd,T T ∈ RM ×M is symmetric, and all of its eigenvalues {tα : α = 1, . . . , M } satisfy |tα |< Cd,T . Let us state here, for clarity, that the existence of any regular edge will imply T is also nondegenerate, in the sense (number of eigenvalues tα such that |tα |> c) > cM (16) for a Cd,T -dependent constant c > 0. (See Proposition 3.5.) Thus the largest and average values of |tα | are both of constant order. We assume the following weak moment conditions for X: Assumption 2.5. X ∈ RM ×N is random with independent entries. For every α ∈ {1, . . . , M } and i ∈ {1, . . . , N }, 2 E[Xαi ] = 0, E[Xαi ] = 1/N. †m ∈ R̄ \ P is a local minimum of z if z (m) ≥ z (m ) for all m in a sufficiently small neighborhood of m , ∗ 0 0 0 ∗ ∗ with the convention that m∗ = ∞ is a local minimum if z0 is positive over (C, ∞) ∪ (−∞, −C) for some C > 0. Local maxima are defined similarly. 8 TRACY-WIDOM FOR COVARIANCE MATRICES For some constants C1 , C2 , . . . > 0 and every l ≥ 1, √ E[| N Xαi |l ] ≤ Cl . We will establish a Tracy-Widom limit at each edge of ρ that is regular in the following sense: Definition 2.6. Let E∗ ∈ R be a soft edge of ρ with m-value m∗ and scale γ. E∗ is regular if all of the following hold for a constant τ ∈ (0, 1): • |m∗ |< τ −1 . • γ < τ −1 . • For all α ∈ {1, . . . , M } such that tα 6= 0, |m∗ + t−1 α |> τ . A smaller constant τ indicates a weaker regularity assumption. We will say E∗ is τ -regular if we wish to emphasize the role of τ . All subsequent constants may depend on Cd,T , Cl , τ above; we will usually not explicitly state this dependence. We discuss implications of edge regularity in Section 3.3. One interpretation of this condition is the following, whose proof we defer to Appendix A. Proposition 2.7. Suppose Assumption 2.4 holds and the edge E∗ is regular. Then there exist constants C, c, δ > 0 such that (a) (Separation) The interval (E∗ − δ, E∗ + δ) belongs to R∗ and contains no edge other than E∗ . (b) (Square-root decay) For all x ∈ supp(ρ) ∩ (E∗ − δ, E∗ + δ), the density f0 of ρ satisfies p p c |E∗ − x| ≤ f0 (x) ≤ C |E∗ − x|. Thus if E∗ is a right edge, then (E∗ − δ, E∗ ) ⊂ supp(ρ) while (E∗ , E∗ + δ) ⊂ R \ supp(ρ). If E∗ is a left edge, this holds with (E∗ − δ, E∗ ) and (E∗ , E∗ + δ) exchanged. Whereas Definition 2.1 and Proposition 2.2(d) imply the above for C, c, δ depending on N , edge regularity ensures that these depend only on the constants Cd,T and τ of Assumption 2.4 and Definition 2.6, and not on N . Hence edge separation and square-root decay hold uniformly in N . One may check, via Proposition 3.5 below, that Definition 2.6 is equivalent to the definition of a regular edge in [KY16] when T is positive-definite. The condition |m∗ |< τ −1 quantifies softness of E∗ , so E∗ cannot converge to a hard edge at 0. The condition γ < τ −1 guarantees non-vanishing curvature of z0 at m∗ , so E∗ cannot approach a neighboring interval of support. The condition |m∗ + t−1 α |> τ guarantees separation of m∗ from the poles P of z0 ; this implies, in particular, that E∗ cannot be the edge of a support interval for an outlier eigenvalue of Σ̂. This last condition was introduced for the rightmost edge in [Kar07]. In the setting of a simple spiked model [Joh01] where (t1 , . . . , tM ) = (θ, 1, 1, . . . , 1) for fixed θ > 1, if E∗ is the rightmost edge, then it is easily √ verified that this condition is equivalent to θ falling below the phase transition threshold 1 + 1/ d studied in [BBAP05, BS06, Pau07]. We will study the extremal eigenvalue of Σ̂ at each regular edge. This is well-defined by the following results establishing closeness of eigenvalues of Σ̂ to the support of ρ. Theorem 2.8 (No eigenvalues outside support). Suppose Assumptions 2.4 and 2.5 hold. Fix any constants δ, D > 0, and define the δ-neighborhood of supp(ρ) by supp(ρ)δ = {x ∈ R : there exists y ∈ supp(ρ) such that |x − y|< δ}. Then there exists a constant N0 ≡ N0 (δ, D) such that for all N ≥ N0 , P[all eigenvalues of Σ̂ belong to supp(ρ)δ ] > 1 − N −D . Theorem 2.9 (N −2/3 concentration at regular edges). Suppose Assumptions 2.4 and 2.5 hold, and E∗ is a regular right edge. Then there exists a constant δ > 0 such that for any ε, D > 0, some N0 ≡ N0 (ε, D), and all N ≥ N0 , h i P no eigenvalue of Σ̂ belongs to [E∗ + N −2/3+ε , E∗ + δ] > 1 − N −D . (17) TRACY-WIDOM FOR COVARIANCE MATRICES 9 The analogous statement holds if E∗ is a regular left edge, with no eigenvalue of Σ̂ belonging to [E∗ − δ, E∗ − N −2/3+ε ]. Theorem 2.8 ensures that all eigenvalues of Σ̂ are within a δ-neighborhood of the deterministic support, for any fixed δ as N, M → ∞. (This does not require edge regularity.) Theorem 2.9 then ensures that for sufficiently small δ, within this δ-neighborhood of any regular edge E∗ , the eigenvalue of Σ̂ farthest from the support is typically only at distance N −2/3 . This is the extremal eigenvalue at E∗ , whose fluctuations on the N −2/3 scale will follow the Tracy-Widom law. Results similar to Theorems 2.8 and 2.9 were established in [BS98, KY16] for positive-definite T . We check in Appendix B that the proof of [KY16] generalizes to any symmetric T . 2.3. Tracy-Widom fluctuations at regular edges. The following is our main result: Theorem 2.10. Let Σ̂ = X 0 T X. Suppose that Assumptions 2.4 and 2.5 hold for T and X, and that E∗ is a τ -regular edge of the law ρ ≡ ρN,M,T . Let E∗ have scale γ as defined in Definition 2.3. Denote by µT W the Tracy-Widom F1 law (corresponding to the β = 1 case from [TW96]). Then there exists a constant δ ≡ δ(τ ) such that as N → ∞, (a) If E∗ is a right edge and λmax is the largest eigenvalue of Σ̂ in [E∗ − δ, E∗ + δ], then L (γN )2/3 (λmax − E∗ ) → µT W . (b) If E∗ is a left edge and λmin is the smallest eigenvalue of Σ̂ in [E∗ − δ, E∗ + δ], then L (γN )2/3 (E∗ − λmin ) → µT W . L The notation → indicates convergence in law. This is interpreted as follows: Let F1 denote the cumulative distribution function of µT W , and fix x ∈ R. Then P[(γN )2/3 (λmax − E∗ ) ≤ x] − F1 (x) ≤ o(1), where o(1) denotes an error term going to 0 as N, M → ∞ and that depends only on x, τ , and the constants in Assumptions 2.4 and 2.5. (Equivalently, we may interpret the above in the context of a sequence of matrices of growing size, each satisfying Assumptions 2.4 and 2.5 and each with an identified τ -regular edge E∗ .) We remark that as we are making no sign convention for T and E∗ , part (b) follows from part (a) by considering the reflection T 7→ −T . When T is positive-semidefinite, the sample covariance matrix Σ̃ = T 1/2 XX 0 T 1/2 has the same eigenvalues as Σ̂ except for a set of |N − M | zeros. Thus the above result also holds for Σ̃ with the same values for E∗ and γ: Corollary 2.11. Under the conditions of Theorem 2.10, suppose t1 , . . . , tM ≥ 0, and let Σ̃ = T 1/2 XX 0 T 1/2 . Then Theorem 2.10 holds also with Σ̃ in place of Σ̂. When T = Id, the equation 0 = z00 (m∗ ) may be solved explicitly to yield ! √ √ √ √  √ 1/3 N ( N ± M )2 N± M 1 1 −2/3 √ √ ±√ , E∗ = , (γN ) = m∗ = − √ N N N± M N M for the upper and lower edge. These centering and scaling constants are the same as those of [Sos02, Péc09, FS10] and differ from those of [Joh01, Ma12] in small O(1) adjustments to N and M . These adjustments do not affect the validity of Theorem 2.10, although the proper adjustments are shown in [Ma12] to lead to an improved second-order rate of convergence. The determination of the rate of convergence and of such adjustments remain open in the setting of general T . 10 TRACY-WIDOM FOR COVARIANCE MATRICES 2.4. Application to variance components models. In the variance components model (3), when p, n, and I1 , . . . , Ik are large and of comparable magnitude, Theorem 2.10 provides an asymptotic test of the global sphericity null hypothesis H0 : Σr = c2r Id for every r = 1, . . . , k based on the largest observed eigenvalue λmax of a MANOVA estimator Σ̂ = Y 0 BY . If H0 specifies Σr = 0 for some r, then an intuitive choice of B to ensure reasonable power is B = Br for the MANOVA estimator Σ̂r . Note that by the representation (5), in this context N = p and M = I1 + . . . + Ik , and the spectral norm of B satisfies kBk n−1 for usual MANOVA estimators. In detail, the test of H0 may be performed as follows: 1. Define   c1 U10   U =  ...  ∈ R(I1 +...+Ik )×n , ck Uk0 and construct the matrix T = pU BU 0 . 2. Compute the eigenvalues t1 ≥ . . . ≥ tM of T , plot M 1X tα 1 z0 (m) = − + m p 1 + tα m α=1 over m ∈ R, and locate the unique local minimum m∗ of this function in the range (−1/t1 , 0). p 3. Compute E∗ and γ in Theorem 2.10 as E∗ = z0 (m∗ ) and γ = 2/z000 (m∗ ). 4. Reject H0 at level α if (γp)2/3 (λmax − E∗ ) exceeds the 1 − α quantile of the Tracy-Widom F1 law. Remark 2.12. If a scaling constant cr is unknown and not specified by H0 , it may be replaced by any 1/p-consistent estimate ĉr in the above. (For example, one may take the linear spectral statistic ĉr = p−1 Tr Σ̂r .) The asymptotic validity of this substitution is justified by the fact that the error in the corresponding estimate of T is O(1/p) in spectral norm, which propagates to a pointwise O(1/p) error in z0 (m) near m∗ and a O(1/p) error in the estimated centering and scaling constants E∗ and γ; this follows from the argument of Lemma 4.4. In particular, the error in E∗ is smaller than O(p−2/3 ) for large p, so Theorem 2.10 remains asymptotically valid for the estimated center and scale. A similar procedure may be used to test H0 based on the extremal eigenvalue observed near any edge E∗ , where m∗ is identified by the correspondence established in Proposition 2.2. For application of Theorem 2.10 in any finite-sample setting, we expect the accuracy of the TracyWidom approximation to depend on the extent to which the regularity condition of Definition 2.6 holds at E∗ . This is quantified by the separation between m∗ and the asymptotes of z0 , as well as the curvature of z0 at m∗ . We will not pursue a detailed numerical investigation of this dependence here, but let us note that one may visually inspect the plot of z0 for a qualitative diagnostic check of edge regularity. For balanced classification designs where a constant fraction of the eigenvalues of T equal its largest eigenvalue, edge regularity always holds at the rightmost edge. Example 2.13. As a concrete example, consider the balanced one-way classification model in the introduction, where n samples are divided into I = n/J groups of equal size J. The data is modeled as Y = U α + ε, I×p where the rows of α ∈ R are distributed as Normal(0, Σ1 ), the rows of ε ∈ Rn×p are distributed as Normal(0, Σ2 ), and U ∈ {0, 1}n×I has Uk,i = 1 if bk/Jc = i and Uk,i = 0 otherwise. Defining π, π ⊥ ∈ TRACY-WIDOM FOR COVARIANCE MATRICES 11 Table 1. Empirical cumulative probabilities for (γp)2/3 (λmax (Σ̂1 ) − E∗ ) at the theoretical 90th, 95th, and 99th percentiles of the Tracy-Widom F1 law, estimated across 10000 simulations. Here, Σ̂1 is the MANOVA estimator of Σ1 in the balanced one-way classification model, for various n, p, J. The final column gives approximate standard errors based on binomial sampling. F1 J =2 n=p J =5 J = 10 J =2 n=4×p J = 5 J = 10 2 × SE 0.90 0.95 0.99 0.938 0.971 0.995 0.944 0.974 0.995 0.953 0.978 0.995 0.932 0.968 0.993 0.937 0.970 0.994 0.940 (0.005) 0.972 (0.003) 0.995 (0.002) 0.90 p = 100 0.95 0.99 0.926 0.963 0.992 0.934 0.969 0.995 0.931 0.968 0.995 0.923 0.962 0.993 0.919 0.961 0.993 0.918 (0.005) 0.961 (0.004) 0.994 (0.002) 0.90 p = 500 0.95 0.99 0.922 0.961 0.992 0.917 0.958 0.992 0.918 0.959 0.991 0.913 0.956 0.993 0.909 0.954 0.992 0.916 (0.006) 0.959 (0.004) 0.994 (0.002) p = 20 Rn×n as the orthogonal projections onto the column span of U and its orthogonal complement, the MANOVA estimators for Σ1 and Σ2 are     1 1 1 0 ⊥ 0 ⊥ Σ̂1 = Y π− π Y, Σ̂2 = Y π Y. n n(J − 1) I(J − 1) The example of sibling pairs discussed in the introduction corresponds to J = 2. Suppose we wish to test H0 : Σ1 = 0, Σ2 = c22 Id using the largest observed eigenvalue of Σ̂1 . Setting B as the estimation matrix defining Σ̂1 , and noting π = J −1 U U 0 and π ⊥ = Id −π, we obtain ! 2 0 p c1 J Id  c1 c2 U  T = ∈ R(I+n)×(I+n) . 1 π⊥ n c1 c2 U c22 π − J−1 Explicit diagonalization yields that T has I eigenvalues (p/n)(c21 J + c22 ), I eigenvalues 0, and n − I eigenvalues −(p/n)(c22 /(J − 1)). Then z0 (m) = − 1 I 1 n−I 1 + · + · −1 m p m + t1 p m + t−1 2 (18) where p 2 p c22 (c1 J + c22 ), t2 = − · . n n J −1 (Figure 2 in fact corresponds to this example with p = n = 500, J = 5, c1 = 0, and c2 = 2.) This is easily generalized if the model includes a fixed effect term for mean-centering, Y = 1µT + U α + ε where µ ∈ Rp and where 1 is the length n all-1’s vector. In this case, π in the definition of Σ̂1 also projects out 1 (and π ⊥ remains unchanged), and the factor I/p in the second term of (18) is replaced by (I − 1)/p. Table 1 displays the accuracy of the Tracy-Widom approximation for the standardized largest eigenvalue (γp)2/3 (λmax (Σ̂1 ) − E∗ ), under various settings of n, p, and group size J. The center and scale E∗ , γ are computed from z0 (m) above, where we have assumed for simplicity that c2 = 1 t1 = 12 TRACY-WIDOM FOR COVARIANCE MATRICES is known. The approximation is reasonably accurate but has a conservative bias, particularly for small sample sizes. 3. Preliminaries and tools The remainder of this paper is devoted to the proof of Theorem 2.10. We collect in this section the requisite ingredients and tools for the proof. 3.1. Notation. We denote IM = {1, . . . , M } and IN = {1, . . . , N }. Considering the elements of these index sets as distinct, we define the disjoint union I ≡ IN t IM . For a matrix in C(N +M )×(N +M ) , we identify {1, 2, . . . , N + M } ' I and index its rows and columns by I, where IN corresponds to the upper left block and IM to the lower right block. We consistently use lowercase Roman letters i, j, p, q, etc. for indices in IN , Greek letters α, β, etc. for indices in IM , and upper-case Roman letters A, B, etc. for general indices in I. =z and <z denote the real and imaginary parts of z. We typically write z = E + iη where E = <z and η = =z. C+ = {z ∈ C : =z > 0} and C+ = {z ∈ C : =z ≥ 0} denote the open and closed upper-half complex plane. X 0 denotes the transpose of a matrix X, and kXk denotes its Euclidean operator norm. For vectors v, w, hv, wi denotes the Euclidean inner product and kvk= hv, vi1/2 the Euclidean norm. Throughout, C, c denote positive constants that may change from instance to instance. We write aN  bN for deterministic non-negative quantities aN , bN when cbN ≤ aN ≤ CaN . The constants C, c may depend on τ in the context of a regular edge. 3.2. Stochastic domination. We use the following the definition introduced in [EKY13] to express bounds that hold with high probability: Definition 3.1 (Stochastic domination). Let ξ = (ξ(u) : u ∈ U ), Ψ = (Ψ(u) : u ∈ U ) be two collections of (N -dependent) random variables indexed by a (N -dependent) set U , where ξ(u) is complex-valued and Ψ(u) is real-valued and nonnegative. We say that ξ ≺ Ψ or ξ = O≺ (Ψ) uniformly over u ∈ U if, for any constants ε, D > 0, there exists N0 ≡ N0 (ε, D) such that for all N ≥ N0 , sup P [|ξ(u)|> N ε Ψ(u)] < N −D . (19) u∈U N0 may implicitly depend on other constants, such as τ in the context of a regular edge. To explicitly emphasize this dependence for some constant a, we write ξ ≺a Ψ. In this paper, u ∈ U will typically correspond to indices in IN , IM , I and/or z in bounded domains of C+ . All uses of the above definition will be implicitly uniform over all such u ∈ U . With the exception of the proof sketch of the local law in Appendix B, Ψ(u) in this paper will always be deterministic. If ξ(u) is also deterministic, then ξ ≺ Ψ means |ξ(u)|< Ψ(u)N ε for any ε > 0, all N ≥ N0 (ε), and all u ∈ U . We review several properties of ≺ from [EKY13]: First, we may take union bounds, sums, and products over sets of cardinality N C : Lemma 3.2. Let ξ(u, v) and Ψ(u, v) be such that ξ(u, v) ≺ Ψ(u, v) uniformly over u ∈ U and v ∈ V . Suppose the cardinality of V satisfies |V |≤ N C for a constant C > 0. Then: (a) For any ε, D > 0 and all N ≥ N0 (ε, D), sup P [there exists v ∈ V such that |ξ(u, v)|> N ε Ψ(u, v)] < N −D . u∈U (b) P v∈V ξ(u, v) ≺ P v∈V Ψ(u, v) uniformly over u ∈ U . TRACY-WIDOM FOR COVARIANCE MATRICES (c) Q v∈V ξ(u, v) ≺ Q v∈V 13 Ψ(u, v) uniformly over u ∈ U . Proof. All three parts follow from a simple union bound. For example, for (c), " # i Y Y X h sup P |ξ(u, v)|> N ε Ψ(u, v) ≤ sup P |ξ(u, v)|> N ε/C Ψ(u, v) u∈U v∈V u∈U v∈V v∈V ≤ NC sup h i P ξ(u, v) > N ε/C Ψ(u, v) < N −D u∈U,v∈V for any ε, D > 0 and all N ≥ N0 (ε, D). Parts (a) and (b) follow similarly.  When V is a bounded domain of C+ , part (a) above does not directly apply, but we may oftentimes take the union bound by Lipschitz continuity: Lemma 3.3. Let ξ(u, z), Ψ(u, z) be such that ξ(u, z) ≺ Ψ(u, z) uniformly over u ∈ U and z ∈ V , where V ⊂ C is uniformly bounded. Suppose that for any D > 0, there exists C ≡ C(D) > 0 and an event of probability 1 − N −D on which • Ψ(u, z) > N −C for every u, z. • ξ and Ψ are N C -Lipschitz continuous over z ∈ V for every u. Then for any ε, D > 0 and all N ≥ N0 (ε, D), sup P[there exists z ∈ V such that |ξ(u, z)|> N ε Ψ(u, z)] < N −D . u∈U Proof. Let D > 0, C = C(D), and set ∆N = N −3C . Take a covering net V 0 ⊂ V such that for every z ∈ V , there exists z 0 ∈ V 0 with |z − z 0 |< ∆N , and also |V 0 |≤ N 6C+1 . Let u ∈ U and ε > 0. Then applying Lemma 3.2(a) to union bound over V 0 , with probability at least 1 − 2N −D , for N ≥ N0 (ε/2, D) and every z ∈ V , |ξ(u, z)|≤ |ξ(u, z 0 )|+∆N N C ≤ N ε/2 Ψ(u, z 0 ) + ∆N N C ≤ N ε/2 Ψ(u, z) + 2∆N N ε/2+C ≤ N ε Ψ(u, z).  Under mild conditions, we may also take (conditional) expectations over the above definition: Lemma 3.4. Let ξ(u) and Ψ(u) be such that ξ ≺ Ψ uniformly over u ∈ U . Suppose furthermore that for some constant C > 0 and all u ∈ U , Ψ(u) is deterministic with Ψ(u) ≥ N −C , and E[|ξ(u)|2 ] ≤ N C . Then E[ξ|G] ≺ Ψ uniformly over u ∈ U and all sub-σ-fields G. Proof. If G is trivial so E[ξ|G] = E[ξ], then this follows from Cauchy-Schwarz: For any ε > 0 and all N ≥ N0 (ε, C), |Eξ| ≤ E [|ξ|1{|ξ|≤ N ε Ψ}] + E [|ξ|1{|ξ|> N ε Ψ}]  1/2 ≤ N ε Ψ + E |ξ|2 P [|ξ|> N ε Ψ]1/2 ≤ N ε Ψ + N C/2 N −2C ≤ 2N ε Ψ. For general G, note that for any p ∈ N and any ε > 0, h i E[|E[ξ|G]|p ] E[|ξ|p ] P |E[ξ|G]|> N ε Ψ ≤ ≤ ≤ N ε−pε , N pε Ψp N pε Ψp where the last step holds for all N ≥ N0 (p, ε) by E[|ξ|p ] ≺ Ψp established above. (N0 does not depend on G.) For any D > 0, this error is at most N −D by taking p > (D + ε)/ε.  14 TRACY-WIDOM FOR COVARIANCE MATRICES 3.3. Implications of edge regularity. We state several consequences of edge regularity. The first proposition is directly verified from Definition 2.6. Proposition 3.5. Suppose Assumption 2.4 holds and E∗ is a regular edge with m-value m∗ and scale γ. Then there exist constants C, c > 0 such that c < |m∗ |< C, c < γ < C, |E∗ |< C, and for all α = 1, . . . , M , |1 + tα m∗ |> c. Furthermore, if any regular edge E∗ exists, then T satisfies (16), and if T is positive-semidefinite, then also E∗ > c > 0. Proof. |m∗ |< τ −1 and γ < τ −1 are assumed in Definition 2.6. Writing 1 1 X 1 0 = z00 (m∗ ) = 2 − , 2 m∗ dM (m∗ + t−1 α ) α:t 6=0 α |m∗ |> c follows from d > c and |m∗ + t−1 α |> τ . |E∗ |< C and γ > c then follow from the definitions E∗ = z0 (m∗ ) and γ −2 = |z000 (m∗ )|/2 together with the bounds d > c, |m∗ |> c, and |m∗ + t−1 α |> τ . For |1 + tα m∗ |, take C > 0 such that |m∗ |< C. If |tα |> 1/(2C), then |1 + tα m∗ |> τ /(2C) by the condition |m∗ + t−1 α |> τ , whereas if |tα |≤ 1/(2C), then |1 + tα m∗ |> 1/2. P We verify from 0 = z00 (m∗ ) and |m∗ |< C, d > c, |1 + tα m∗ |> c that M −1 α t2α > c. Together 0 with the assumption P 2 |tα |< C for all2 α, this implies (16). Finally, note that 0 = z0 (m∗ ) implies −1 −1 m∗ = (dM ) α tα m∗ /(1 + tα m∗ ) , and hence E∗ = z0 (m∗ ) = M 1 X tα . dM (1 + tα m∗ )2 α=1 If T is positive-semidefinite, then E∗ > c follows from |1 + tα m∗ |< C, d < C, and (16).  The remaining implications heuristically follow from the Taylor expansion z000 (m∗ ) (m − m∗ )2 + O((m − m∗ )3 ), 2 where there is no first-order term because 0 = z00 (m∗ ). Consequently, s 2 m0 (z) ≈ m∗ + (z − E∗ ) 00 z0 (m∗ ) z0 (m) − E∗ = z0 (m) − z0 (m∗ ) = for z ∈ C+ near E∗ and an appropriate choice of square-root. Edge regularity implies uniform control of the above Taylor expansion; we defer detailed proofs to Appendix A. Similar properties were established for positive-definite T in [BPZ13, KY16]. Proposition 3.6. Suppose Assumption 2.4 holds and E∗ is a regular edge with m-value m∗ . Then there exist constants c, δ > 0 such that for all m ∈ (m∗ − δ, m∗ + δ), if E∗ is a right edge then z000 (m) > c, and if E∗ is a left edge then z000 (m) < −c. Proposition 3.7. Suppose Assumption 2.4 holds and E∗ is a regular edge. Then there exist constants C, c, δ > 0 such that the following hold: Define D0 = {z ∈ C+ : <z ∈ (E∗ − δ, E∗ + δ), =z ∈ (0, 1]}. Then for all z ∈ D0 and α ∈ {1, . . . , M }, c < |m0 (z)|< C, c < |1 + tα m0 (z)|< C. TRACY-WIDOM FOR COVARIANCE MATRICES 15 Furthermore, for all z ∈ D0 , denoting z = E + iη and κ = |E − E∗ |, √ √ c κ + η ≤ |m0 (z) − m∗ |≤ C κ + η, cf (z) ≤ =m0 (z) ≤ Cf (z) where (√ f (z) = κ+η √η κ+η if E ∈ supp(ρ) if E ∈ / supp(ρ). 3.4. Properties of the resolvent. For z ∈ C+ , denote the resolvent and Stieltjes transform of Σ̂ by GN (z) = (Σ̂ − z Id)−1 ∈ CN ×N , mN (z) = N −1 Tr GN (z). (20) The entries of GN and mN are bounded and Lipschitz-continuous: Lemma 3.8. For any η > 0 and z, z 0 ∈ C+ with =z ≥ η and =z 0 ≥ η, and for any i, j ∈ IN , |mN (z)|≤ |mN (z) − mN (z 0 )|≤ 1 , η |z − z 0 | , η2 |Gij (z)|≤ 1 , η |Gij (z) − Gij (z 0 )|≤ |z − z 0 | . η2 P P Proof. Let Σ̂ = i λi ξi ξi0 be the (real) spectral decomposition of Σ̂. Then GN (z) = i (λi −z)−1 ξi ξi0 , so for any v, w ∈ RN with kvk= kwk= 1, X hv, ξi ihw, ξi i d 1 X |hv, wi| 1 hv, GN (z)wi = ≤ 2 |hv, ξi ihw, ξi i|= ≤ 2. 2 2 dz (λi − z) η η η i i Taking v, w as standard basis vectors yields the Lipschitz bound for Gij , and averaging over i = j yields the bound for mN . The bounds |Gij |, |mN |≤ η −1 follow similarly.  As in [LS16, KY16], define the linearized resolvent G(z) by   −z Id X0 H(z) = ∈ C(N +M )×(N +M ) , X −T −1 G(z) = H(z)−1 . (21) We index rows and columns of G(z) by I ≡ IN t IM . The Schur-complement formula for block matrix inversion yields the alternative form   GN (z) GN (z)X 0 T G(z) = , (22) T XGN (z) T XGN (z)X 0 T − T which is understood as the definition of G(z) when T is not invertible. We will omit the argument z in m0 , mN , GN , G when the meaning is clear. For any A ∈ I, define H (A) as the submatrix of H with row and column A removed, and define G(A) = (H (A) )−1 . When T is not invertible, G(A) is defined by the alternative form analogous to (22). We index G(A) by I \ {A}. Note that G and G(A) are symmetric, in the sense G0 = G and (G(A) )0 = G(A) without complex conjugation. Restricting to the case of diagonal T , the entries of G and G(A) are related by the following Schur-complement identities: Lemma 3.9 (Resolvent identities). Suppose T is diagonal, and fix z ∈ C+ . 16 TRACY-WIDOM FOR COVARIANCE MATRICES (a) For any i ∈ IN , Gii = − 1 z+ . (i) P α,β∈IM Gαβ Xαi Xβi For any α ∈ IM , Gαα = − tα 1 + tα P . (α) i,j∈IN Gij Xαi Xαj X (i) (b) For any i 6= j ∈ IN , Gij = −Gii Gβj Xβi . β∈IM For any α 6= β ∈ IM , X Gαβ = −Gαα (α) Gjβ Xαj . j∈IN For any α ∈ IM and i ∈ IN , Giα = −Gii X (i) Gβα Xβi = −Gαα β∈IM X (α) Gij Xαj . j∈IN (c) For any A, B, C ∈ I with A 6= C and B 6= C, (C) GAB = GAB − GAC GCB . GCC Proof. For T invertible, see [KY16, Lemma 4.4]. (These are algebraic relations derived from the Schur-complement formula for matrix inversion; they do not require positivity of T .) The identities for non-invertible T follow by continuity in T and the alternative form for G in (22).  3.5. Local law and reduction to diagonal T . As in [LS16], an important proof ingredient is a high-probability entrywise bound on G(z) for z ∈ C+ close to a regular edge E∗ . This comes from a local law establishing a deterministic approximation Π0 for G. Such a law was first established for the Wigner model in [EYY12a]. In our setting, for T positive-definite, this was proven in [KY16] near all regular edges (and in regular bulk components); see also [BPZ13, LS16] for the rightmost edge. We check in Appendix B that the proof of [KY16] generalizes to arbitrary symmetric T . Theorem 3.10 (Local law at regular edges). Suppose Assumptions 2.4 and 2.5 hold and E∗ is a τ -regular edge. Then there exists a constant δ ≡ δ(τ ) > 0 such that the following holds: Fix any constant a > 0 and define D = {z ∈ C+ : <z ∈ (E∗ − δ, E∗ + δ), =z ∈ [N −1+a , 1]}. For z ∈ D, define the (N + M ) × (N + M ) matrices   m0 (z) Id 0 Π0 (z) = , 0 −T (Id +m0 (z)T )−1   Id 0 . T = 0 T Then uniformly over z ≡ E + iη ∈ D and vectors v, w ∈ CN +M with kvk= kwk= 1, s =m0 (z) 1 −1 −1 hv, T (G(z) − Π0 (z))T wi ≺τ,a + , Nη Nη and also mN (z) − m0 (z) ≺τ,a (N η)−1 . (Here, τ is the constant from Definition 2.6, and a is the constant defining D.) (23) (24) (25) TRACY-WIDOM FOR COVARIANCE MATRICES 17 It is verified from (22) that the matrix on the left of (25) is alternatively written as   GN − m0 Id GN X 0 T −1 (G − Π0 )T −1 = . XGN XGN X 0 − m0 (Id +m0 T )−1 (26) This is understood as the definition of this matrix when T is not invertible. Lipschitz continuity of G and mN imply the above result in union bound form: Corollary 3.11. Under the assumptions of Theorem 3.10, for any ε, D > 0 and all N ≥ N0 (ε, D), " P there exist z ∈ D and v, w ∈ CN +M with kvk= kwk= 1 : s hv, T −1 (G(z) − Π0 (z))T −1 wi > N ε =m0 (z) 1 + Nη Nη !# < N −D . Proof. This follows from Lemma 3.3. For any D > 0, on an event of probability 1 − N −D , we have kX ∗ Xk≤ C (see e.g. [BEK+ 14, Theorem 2.10]). The required boundedness and Lipschitz continuity properties for Lemma 3.3 then follow from (26), Lemma 3.8, Proposition 3.7, and known properties of any Stieltjes transform m0 .  As in [KY16], Theorem 3.10 is sufficient to establish universality (with respect to the distribution of entries of X) of the fluctuations of the extremal eigenvalue at E∗ . This follows the argument of [EYY12b], which we discuss briefly in Appendix B. Hence we may reduce the proof of Theorem 2.10 to the case of Gaussian X. By diagonalizing T and applying rotational symmetry of X, we may also reduce to diagonal T : Corollary 3.12. If Theorem 2.10 holds under the additional conditions that T is diagonal and X has (real) Gaussian entries, then it holds also without these conditions. 3.6. Resolvent approximation. We formalize the approximation (7) stated in the introduction. This approximation was introduced in [EYY12b]. Fix a regular edge E∗ and define, for s1 , s2 ∈ R and η > 0, Z E∗ +s2 X(s1 , s2 , η) = N =mN (y + iη)dy. (27) E∗ +s1 For η much smaller than N −2/3 and s1 , s2 on the N −2/3 scale, we expect #(E∗ + s1 , E∗ + s2 ) ≈ π −1 X(s1 , s2 , η) where the left side denotes the number of eigenvalues of Σ̂ in this interval. We apply this in the form of the following lemma, and provide a self-contained proof using the local law following the approach of [EYY12b, Corollary 6.2]. (For simplicity, we state the result only for a right edge.) Lemma 3.13. Suppose Assumptions 2.4 and 2.5 hold, and E∗ is a regular right edge. Let K : R → [0, 1] be such that K(x) = 1 for all x ≤ 1/3 and K(x) = 0 for all x ≥ 2/3. For all sufficiently small constants δ, ε > 0, the following holds: Let λmax be the maximum eigenvalue of Σ̂ in (E∗ − δ, E∗ + δ). Set s+ = N −2/3+ε , l = N −2/3−ε , and η = N −2/3−9ε . Then for any D > 0, all N ≥ N0 (ε, D), and all s ∈ [−s+ , s+ ],     E K(π −1 X(s − l, s+ , η)) − N −D ≤ P [λmax (W ) ≤ E∗ + s] ≤ E K(π −1 X(s + l, s+ , η)) + N −D . Proof. Denote #(a, b) = number of eigenvalues of Σ̂ in [a, b]. 18 TRACY-WIDOM FOR COVARIANCE MATRICES For any E1 < E2 , any m > 0, and any λ ∈ R, we have the casewise bound  E −E η 2 1  if λ < E1 − m  π η 2 +(E1 −λ)2     if E1 − m ≤ λ ≤ E1 + m Z E2 1 1 η 2 η 1[E1 ,E2 ] (λ) − dx ≤ if E1 + m < λ < E2 − m πm 2 2  E1 π η + (x − λ)   1 if E2 − m ≤ λ ≤ E2 + m    η  E2 −E1 if λ > E2 + m, π η 2 +(λ−E2 )2 where the middle case E1 + m < λ < E2 − m follows from Z E2 Z λ+m   2 η 1 η 1 η 2 −1 η 1− dx ≤ 1 − dx = tan ≤ . 2 2 2 2 π m πm E1 π η + (x − λ) λ−m π η + (x − λ) For the first case, we apply also the bound η2 η η 2η m ≤ ≤ · 2 , 2 2 + (E1 − λ) (E1 − λ) m m + (E1 − λ)2 and similarly for the last case. Hence, summing over λ as the eigenvalues of Σ̂, Z N E2 =mN (x + iη)dx ≤ R(E1 , E2 , m) + S(E1 , E2 , m) #(E1 , E2 ) − π E1 (28) where we set R(E1 , E2 , m) = #(E1 − m, E1 + m) + #(E2 − m, E2 + m), 2 η (E2 − E1 )N =mN (E1 + im) + (E2 − E1 )N =mN (E2 + im) S(E1 , E2 , m) = πm  + #(E1 + m, E2 − m) . We apply the above with E1 , E2 ∈ [E∗ − 2s+ , E∗ + 2s+ ], and with m = N −2/3−3ε . To bound S(E1 , E2 , m), note that Proposition 3.7 and Theorem 3.10 yield, for j = 1, 2, =mN (Ej + im) ≺ N −1/3+3ε . For z = E∗ + i(2s+ ), Proposition 3.7 and Theorem 3.10 also yield N s+ =mN (z) ≺ N 3ε/2 . Applying #(E∗ − v, E∗ + v) ≤ 2N v =mN (E∗ + iv) for any v > 0, this yields #(E∗ − 2s+ , E∗ + 2s+ ) ≺ N 3ε/2 . (29) Then applying #(E1 + m, E2 − m) ≤ #(E∗ − 2s+ , E∗ + 2s+ ) and η/m = N −6ε , we obtain S(E1 , E2 , m) ≺ N −2ε uniformly over E1 , E2 ∈ [E∗ − 2s+ , E∗ + 2s+ ]. By Lemmas 3.8 and 3.3, we may in fact take a union bound over all such E1 , E2 : For any ε0 , D > 0, h i 0 P there exist E1 , E2 ∈ [E∗ − 2s+ , E∗ + 2s+ ] such that S(E1 , E2 , m) > N −2ε+ε ≤ N −D (30) for all N ≥ N0 (ε0 , D). Now let E = E∗ + s and E+ = E∗ + s+ − l. Then Z E+ +l  Z 1 E #(E, E+ ) ≤ 2 #(E1 , E2 )dE2 dE1 l E−l E+ Z Z Z E+ +l N E+ +l 1 E ≤ =mN (x + iη)dx + 2 R(E1 , E2 , m)dE2 dE1 + O≺ (N −2ε ), π E−l l E−l E+ TRACY-WIDOM FOR COVARIANCE MATRICES 19 where we have applied (28) and (30). The first term is π −1 X(s − l, s+ , η). For the second term, we obtain from the definition of R(E1 , E2 , m) Z Z E+ +l 1 E 2m 2m R(E1 , E2 , m)dE2 dE1 ≤ #(E − l − m, E + m) + #(E+ − m, E+ + l + m). 2 l E−l E+ l l Applying (29) to crudely bound #(E − l − m, E + m) and #(E+ − m, E+ + l + m) by #(E∗ − 2s+ , E∗ + 2s+ ), and noting m/l = N −2ε , we obtain #(E, E+ ) ≤ π −1 X(s − l, s+ , η) + O≺ (N −ε/2 ). Theorem 2.9 yields #(E+ , E∗ + δ) = 0 with probability 1 − N −D for N ≥ N0 (ε, D), so #(E, E∗ + δ) ≤ π −1 X(s − l, s+ , η) + O≺ (N −ε/2 ). (31) Similarly, setting E+ = E∗ + s+ + l, we have  Z E+ Z 1 E+l #(E, E∗ + δ) ≥ 2 #(E1 , E2 )dE2 dE1 l E E+ −l ≥ π −1 X(s + l, s+ , η) − O≺ (N −ε/2 ). (32) For any D > 0 and all N ≥ N0 (ε, D), (31) implies that π −1 X(s − l, s+ , η) ≥ 2/3 whenever #(E∗ + s, E∗ + δ) ≥ 1, except possibly on an event of probability N −D . Similarly (32) implies π −1 X(s + l, s+ , η) ≤ 1/3 whenever #(E∗ + s, E∗ + δ) = 0, except possibly on an event of probability N −D . The result then follows from the definition and boundedness of K.  4. The interpolating sequence In this section, we construct the interpolating sequence T (0) , . . . , T (L) described in the introduction. We consider only the case of a right edge; this is without loss of generality, as the edge can have arbitrary sign and we may take the reflection T 7→ −T . For each pair T ≡ T (l) and Ť ≡ T (l+1) , the following definition captures the relevant property that will be needed in the subsequent computation. Definition 4.1. Let T, Ť ∈ RM ×M be two diagonal matrices satisfying Assumption 2.4. Let E∗ be a right edge of the law ρ defined by T , and let Ě∗ be a right edge of ρ̌ defined by Ť . (T, E∗ ) and (Ť , Ě∗ ) are swappable if, for a constant φ > 0, both of the following hold. • Letting tα and ťα be the diagonal entries of T and Ť , M X |tα − ťα |< φ. α=1 • The m-values m, m̌∗ of E∗ , Ě∗ satisfy |m∗ − m̌∗ |< φ/N. We will say that (T, E∗ ) and (Ť , Ě∗ ) are φ-swappable if we wish to emphasize the role of φ. All subsequent constants may implicitly depend on φ. We first establish some basic deterministic properties of a swappable pair, including closeness of the edges E∗ , Ě∗ as claimed in (10) in the introduction. Lemma 4.2. Suppose T, Ť are diagonal matrices satisfying Assumption 2.4, E∗ , Ě∗ are regular right edges, and (T, E∗ ) and (Ť , Ě∗ ) are swappable. Let m∗ , γ and m̌∗ , γ̌ be the m-values and scales of E∗ , Ě∗ . Denote sα = (1 + tα m∗ )−1 and šα = (1 + ťα m̌∗ )−1 . For integers i, j ≥ 0, define Ai,j = M 1 X i i j j tα sα ťα šα . N α=1 20 TRACY-WIDOM FOR COVARIANCE MATRICES Then there exists a constant C > 0 such that all of the following hold: (a) For all i, j satisfying i + j ≤ 4, |Ai,j − Ai+j,0 |≤ C/N. (b) (Closeness of edge location) |E∗ − Ě∗ |≤ C/N, and M 1 X (tα − ťα )sa šα ≤ C/N 2 . (E∗ − Ě∗ ) − N (33) α=1 (c) (Closeness of scale) |γ − γ̌|≤ C/N. Proof. By Proposition 3.5, |tα |, |sα |, |m∗ |, γ ≤ C, and also |ťα |, |šα |, |m̌∗ |, γ̌ ≤ C. From the definitions of sα and šα , we verify tα sα − ťα šα = (tα − ťα )sα šα + (m̌∗ − m∗ )tα sα ťα šα . Then swappability implies |Ai,j M 1 X i i j−1 j−1 − Ai+1,j−1 |≤ |tα sα ťα šα ||ťα šα − tα sα |≤ C/N. N α=1 Iteratively applying this yields (a). For (b), recall 0 = z00 (m∗ ) = m−2 ∗ − A2,0 . Then M 1 1 1 X (tα sα − ťα šα ) E∗ − Ě∗ = − + + m∗ m̌∗ N α=1   M 1 1 X = (m∗ − m̌∗ ) − A1,1 + (tα − ťα )sα šα . m∗ m̌∗ N α=1 Part (b) follows from the definition of swappability, together with |A1,1 −m−2 ∗ |= |A1,1 −A2,0 |≤ C/N −2 −1 −1 and |m∗ − m∗ m̌∗ |≤ C/N . −2 − γ̌ −2 |≤ |m−3 − For (c), we have γ −2 = z000 (m∗ )/2 = −m−3 ∗ + A3,0 . Then (c) follows from |γ ∗ −3 m̌∗ |+|A3,0 − A0,3 |≤ C/N .  In the rest of this section, we prove the following proposition: Proposition 4.3. Suppose T is diagonal and satisfies Assumption 2.4, and E∗ is a τ -regular 0 , τ 0 , φ > 0, a sequence right edge with scale γ = 1. Then there exist τ -dependent constants Cd,T of diagonal matrices T (0) , T (1) , . . . , T (L) in RM ×M for L ≤ 2M , and a sequence of right edges (0) (1) (L) E∗ , E∗ , . . . , E∗ of the corresponding laws ρ(l) defined by T (l) , such that: (0) 1. T (0) = T and E∗ = E∗ . 2. T (L) has at most two distinct diagonal entries 0 and t, for some t ∈ R. 0 . 3. Each T (l) satisfies Assumption 2.4 with constant Cd,T (l) 4. Each E∗ is τ 0 -regular. (l) (l+1) 5. (T (l) , E∗ ) and (T (l+1) , E∗ ) are φ-swappable for each l = 0, . . . , L − 1. (l) 6. (Scaling) Each E∗ has associated scale γ (l) = 1. TRACY-WIDOM FOR COVARIANCE MATRICES 21 (0) (L) We first ignore the scaling condition, property 6, and construct T (0) , . . . , T (L) and E∗ , . . . , E∗ satisfying properties 1–5. We will use a Lindeberg swapping construction, where each T (l+1) differs from T (l) in only one diagonal entry. It is useful to write z00 and z000 as 1 X 1 1 z00 (m) = 2 − 2 m N (m + t−1 α ) α:tα 6=0 2 2 X 1 z000 (m) = − 3 + , 3 m N (m + t−1 α ) α:t 6=0 α and to think about swapping entries of T as swapping or removing poles of z00 and z000 . In particular, for each fixed m ∈ R, we can easily deduce from the above whether a given swap increases or decreases the values of z00 and z000 at m. Upon defining a swap T → Ť , the identification of the new right edge Ě∗ for Ť uses the following continuity lemma. Lemma 4.4. Suppose T is a diagonal matrix satisfying Assumption 2.4, and E∗ is a τ -regular right edge with m-value m∗ . Let Ť be a matrix that replaces a single diagonal entry tα of T by a value ťα , such that |ťα |≤ kT k and either ťα = 0 or |m∗ + ť−1 α |> τ . Let z0 , ž0 denote the function (15) defined by T, Ť . Then there exist τ -dependent constants N0 , φ > 0 such that whenever N ≥ N0 : • Ť has a right edge Ě∗ with m-value m̌∗ satisfying |m∗ − m̌∗ |< φ/N . • The interval between m∗ and m̌∗ does not contain any pole of z0 or ž0 . • sign(m∗ − m̌∗ ) = sign(ž00 (m∗ )). (We define sign(x) = 1 if x > 0, −1 if x < 0, and 0 if x = 0.) Proof. By Proposition 3.5, |m∗ |> ν for a constant ν. Take δ < min(τ /2, ν/2). Then the given conditions for ťα imply that (m∗ − δ, m∗ + δ) does not contain any pole of z0 or ž0 , and |z00 (m) − ž00 (m)|< C/N for some C > 0 and all m ∈ (m∗ − δ, m∗ + δ). For sufficiently small δ, Proposition 3.6 also ensures z000 (m) > c for all m ∈ (m∗ − δ, m∗ + δ). Suppose ž00 (m∗ ) < 0 = z00 (m∗ ). Taking N0 = C/(δc), if N > N0 , then the above implies ž00 (m∗ + C/(cN )) > z00 (m∗ + C/(cN )) − C/N > 0. Hence ž0 has a local minimum in (m∗ , m∗ + C/(cN )). Similarly, if ž00 (m∗ ) > 0, then ž0 has a local minimum in (m∗ − C/(cN ), m∗ ), and if ž00 (m∗ ) = 0, then ž0 has a local minimum at m∗ . The result follows from Proposition 2.2 upon taking Ě∗ = ž0 (m̌∗ ) and φ = C/c.  The basic idea for proving Proposition 4.3 is to take a Lindeberg sequence T (0) , . . . , T (L) and apply the above lemma for each swap. We cannot do this naively for any Lindeberg sequence, (l) (l+1) because in general if E∗ is τl -regular, then the above lemma only guarantees that E∗ is τl+1 regular for τl+1 = τl − C/N and a τl -dependent constant C > 0. Thus edge regularity, as well as the edge itself, may vanish after O(N ) swaps. To circumvent this, we consider a specific construction of the Lindeberg sequence, apply Lemma 4.4 inductively along this sequence to identify an edge Ě∗ for each successive Ť , and use a separate argument to show that Ě∗ must be τ 0 -regular for a fixed constant τ 0 > 0. Hence we may continue to apply Lemma 4.4 along the whole sequence. We consider separately the cases m∗ < 0 and m∗ > 0. Lemma 4.5. Suppose (the right edge) E∗ has m-value m∗ < 0. Then for some τ -dependent constant N0 , whenever N ≥ N0 , Proposition 4.3 holds without the scaling condition, property 6. Proof. We construct a Lindeberg sequence that first reflects about m∗ each pole of z0 to the right of m∗ , and then replaces each pole by the one closest to m∗ . 22 TRACY-WIDOM FOR COVARIANCE MATRICES Suppose, first, that there are K1 non-zero diagonal entries tα of T (positive or negative) where (0) , T (1) , . . . , T (K1 ) where T (0) = T , and each −t−1 α > m∗ . Consider a sequence of matrices T T (k+1) replaces one such diagonal entry tα of T (k) by the value ťα such that −ť−1 α < m∗ and −1 |. For each such swap T → Ť , we verify |ť |≤ |t |≤ kT k, ž 0 (m ) = z 0 (m ) = 0, |m∗ + ť−1 |= |m +t ∗ α α ∗ ∗ α α 0 0 and ž000 (m∗ ) > z000 (m∗ ) > 0. Thus we may take m̌∗ = m∗ in Lemma 4.4, and the new edge Ě∗ = ž0 (m∗ ) remains τ -regular for the same constant τ . All diagonal entries of T (K1 ) are now nonnegative. Let t = kT (K1 ) k be the maximal such entry. By (K ) the above construction, −t−1 < m∗ < 0. Since E∗ 1 is τ -regular, (16) implies t > c for a constant c > 0. Let K2 be the number of positive diagonal entries of T (K1 ) strictly less than t, and consider a sequence T (K1 +1) , . . . , T (K1 +K2 ) where each T (k+1) replaces one such diagonal entry in T (k) by t. Applying Lemma 4.4 inductively to each such swap T → Ť , we verify ž00 (m∗ ) < z0 (m∗ ) = 0, so −1 −1 m∗ < m̌∗ < 0. Then |m̌∗ |< |m∗ | and minα |m̌∗ + ť−1 α |> minα |m∗ + tα |. Also m̌∗ + ťα > 0 for all ťα 6= 0, so ž000 (m̌∗ ) > −2/m̌3∗ > 2t3 . This verifies Ě∗ = ž0 (m̌∗ ) is τ 0 -regular for a fixed constant τ 0 > 0. (We may take any τ 0 < min(τ, t3/2 ).) The total number of swaps L = K1 + K2 is at most 2M , and all diagonal entries of T (L) belong to {0, t}. This concludes the proof, with property 5 verified by Lemma 4.4.  Lemma 4.6. Lemma 4.5 holds also when (the right edge) E∗ has m-value m∗ > 0. Proof. Proposition 2.2 implies m∗ is a local minimum of z0 . The interval (0, m∗ ) must contain a pole of z0 —otherwise, by the boundary condition of z0 at 0, there would exist a local maximum m of z0 in (0, m∗ ) satisfying z0 (m) > z0 (m∗ ), which would contradict the edge ordering in Proposition 2.2(c). Let −t−1 be the pole in (0, m∗ ) closest to m∗ . Note that t < 0 and |t|> |m∗ |−1 > τ . We construct a Lindeberg sequence that first replaces a small but constant fraction of entries of T by t, then replaces all non-zero tα > t by 0, and finally replaces all tα < t by 0. First, fix a small constant c0 > 0, let K1 = bc0 M c, and consider a sequence of matrices (0) T , T (1) , . . . , T (K1 ) where T (0) = T and each T (k+1) replaces a different (arbitrary) diagonal entry of T (k) by t. For c0 sufficiently small, we claim that we may apply Lemma 4.4 to identify an edge (k) (k) E∗ for each k = 1, . . . , K1 , such that each E∗ is τ /2-regular. Indeed, let k ∈ {0, . . . , K1 − 1} and (j) suppose inductively that we have identified this edge E∗ for j = 0, . . . , k. Let mj , γj be the m-value (j) and scale for E∗ . Then Lemmas 4.4 and 4.2 ensure |mj − mj−1 |< C/N and |γj − γj−1 |< C/N for a τ /2-dependent constant C > 0. This yields |mk − m0 |< c0 d−1 C and |γk − γ0 |< c0 d−1 C. As (0) (k) the original edge E∗ is τ -regular, for sufficiently small c0 this implies E∗ is in fact 3τ /4-regular. (k+1) Applying Lemma 4.4, we may identify an edge E∗ for T (k+1) with m-value mk+1 satisfying (k+1) |mk+1 − mk |< φ/N . For N ≥ N0 , this implies E∗ is τ /2-regular, completing the induction. T (K1 ) now has at least K1 + 1 ≥ c0 M diagonal entries equal to t. By the condition in Lemma 4.4 that the swap m∗ → m̌∗ does not cross any pole of z0 or ž0 , we have that −t−1 is still the (K ) (K ) pole in (0, m∗ 1 ) closest to m∗ 1 . Let K2 be the number of non-zero diagonal entries tα of T (K1 ) (positive or negative) such that tα > t. Consider a sequence T (K1 +1) , . . . , T (K1 +K2 ) where each T (k+1) replaces one such entry in T (k) by 0. Applying Lemma 4.4 inductively to each such swap −1 T → Ť , we verify ž00 (m∗ ) > z00 (m∗ ) = 0, so −t−1 < m̌∗ < m∗ . Then minα:−ť−1 −1 |m̌∗ + ťα |> α >−t −1 −1 > c and minα:−t−1 −1 |m∗ + tα |> τ /2. The conditions m̌∗ > |t| α >−t 0 = ž00 (m̌∗ ) ≤ 1 c0 M 1 − 2 m̌∗ N (m̌∗ + t−1 )2 TRACY-WIDOM FOR COVARIANCE MATRICES 23 ensure that m̌∗ + t−1 > ν for a constant ν > 0, and hence minα |m̌∗ + ť−1 α |> min(ν, τ /2). To bound ž000 (m̌∗ ), let us introduce the function f (m) = − M t2α m3 2 X N (1 + tα m)3 α=1 and define analogously fˇ(m) for Ť . We verify f 0 (m) < 0 for all m, so f (m̌∗ ) > f (m∗ ). Furthermore, if the swap T → Ť replaces tα by 0, then 1 + tα m̌∗ > 0. (This is obvious for positive tα ; for negative 0 ˇ tα , it follows from m̌∗ < −t−1 α .) Then f (m̌∗ ) > f (m̌∗ ) > f (m∗ ). Applying the condition 0 = z0 (m∗ ), 4 00 we verify f (m∗ ) = m∗ z0 (m∗ ). Then ž000 (m̌∗ ) > m4∗ 00 z (m∗ ) > z000 (m∗ ) > 0. m̌4∗ 0 This shows that Ě∗ = ž0 (m̌∗ ) is τ 0 -regular for a fixed constant τ 0 > 0. (We may take τ 0 = min(ν, τ /2) as above.) Finally, T (K1 +K2 ) now has at least c0 M diagonal entries equal to t, and all non-zero diagonal entries tα satisfy tα < t < 0. Let K3 be the number of such entries and consider a sequence T (K1 +K2 +1) , . . . , T (K1 +K2 +K3 ) where each T (k+1) replaces one such entry of T (k) by 0. Applying Lemma 4.4 inductively to each such swap T → Ť , we verify ž00 (m∗ ) > z00 (m∗ ) = 0, so −t−1 < m̌∗ < m∗ . As in the K2 swaps above, this implies minα |m̌∗ + ť−1 α |> c for a constant c > 0. The condition ťα < t implies 1 + ťα m̌∗ < 0 for all ťα , so we have 2 c0 M t2 m̌3∗ fˇ(m̌∗ ) > − >c N N (1 + tm̌∗ )3 for a constant c. Applying again fˇ(m̌∗ ) = m̌4∗ ž000 (m̌∗ ), this yields ž000 (m̌∗ ) > c > 0, so Ě∗ is τ 0 -regular for a constant τ 0 > 0. The total number of swaps L = K1 + K2 + K3 is at most 2M (provided c0 < 1 in the first step). All diagonal entries of T (L) belong to {0, t}, so this concludes the proof.  Proof of Proposition 4.3. Suppose first N ≥ N0 so that both Lemmas 4.5 and 4.6 hold for N . (0) (L) Then there exist T (0) , . . . , T (L) and E∗ , . . . , E∗ satisfying conditions 1–5. By Lemma 4.2, the associated scales γ0 , . . . , γL satisfy |γl+1 − γl |≤ C/N for a φ, τ 0 -dependent constant C > 0 and each l = 0, . . . , L − 1. We verify from the definitions of E∗ , m∗ , γ that under the rescaling T 7→ cT for any c > 0, we have E∗ 7→ cE∗ , m∗ 7→ c−1 m∗ , γ 7→ c−3/2 γ. 2/3 (l) 2/3 (l) Consider then the matrices T̃ (l) = γl T (l) and edges Ẽ∗ = γl E∗ . We check properties 1–6 for (l) T̃ (l) and Ẽ∗ : Properties 1, 2, and 6 are obvious. Since T (0) , . . . , T (L) are all τ 0 -regular, Proposition 3.5 implies c < γl < C for constants C, c > 0 and every l, so properties 3 and 4 hold with adjusted constants. Property 5 also holds with an adjusted constant φ, since X X X |γ 2/3 tα − γ̌ 2/3 ťα | ≤ γ 2/3 |tα − ťα | + |γ 2/3 − γ̌ 2/3 | |ťα |< φ0 α α α and |γ −2/3 m∗ − γ̌ −2/3 m̌∗ |≤ γ −2/3 |m∗ − m̌∗ |+|γ −2/3 − γ̌ −2/3 | |m̌∗ |< φ0 /N for a φ, τ 0 -dependent constant φ0 > 0. This concludes the proof in the case N ≥ N0 . The case N < N0 is trivial, as we may take K = 1, T (1) = t Id where t is chosen to satisfy property 6, and sufficiently large constants such that properties 3–5 hold trivially whenever N < N0 .  24 TRACY-WIDOM FOR COVARIANCE MATRICES 5. Resolvent comparison and proof of Theorem 2.10 The crux of the proof of Theorem 2.10 is the following lemma. Lemma 5.1 (Resolvent comparison). Fix ε > 0 a sufficiently small constant, and let s1 , s2 , η ∈ R be such that |s1 |, |s2 |< N −2/3+ε and η ∈ [N −2/3−ε , N −2/3 ]. Let T, Ť ∈ RM ×M be two diagonal matrices and E∗ , Ě∗ two corresponding regular right edges, such that (T, E∗ ) and (Ť , Ě∗ ) are swappable and their scales satisfy γ = γ̌ = 1. Let mN , m̌N be the Stieltjes transforms as in (20) corresponding to T, Ť , and define Z Ě∗ +s2 Z E∗ +s2 =m̌N (y + iη)dy. =mN (y + iη)dy, X̌ = N X=N Ě∗ +s1 E∗ +s1 Let K : R → R be any function such that K and its first four derivatives are uniformly bounded by a constant. Then, uniformly over s1 , s2 , η satisfying the above, E[K(X) − K(X̌)] ≺ N −4/3+16ε . (34) Let us first prove Theorem 2.10 assuming this lemma. Proof of Theorem 2.10. By symmetry with respect to T 7→ −T , it suffices to consider part (a), the case of a right edge. By rescaling T 7→ γ 2/3 T , it suffices to consider the case where γ = 1. By Corollary 3.12, we may assume that T is diagonal and X has Gaussian entries. (0) (L) Let T (0) , . . . , T (L) and E∗ , . . . , E∗ satisfy Proposition 4.3. Define X(k) (s1 , s2 , η) as in (27) for (k) each (T (k) , E∗ ). For a sufficiently small constant ε > 0, let η, s+ , l and K : [0, ∞) → [0, 1] be as in Lemma 3.13, where K has bounded derivatives of all orders. Fix x ∈ R and let s = xN −2/3 . Applying Lemma 3.13, we have (for all large N ) P[λmax (Σ̂) ≤ E∗ + s] ≤ E[K(π −1 X(0) (s + l, s+ , η)] + N −1 . Setting ε0 = 9ε and applying Lemma 5.1, we have 0 E[K(π −1 X(k) (s + l, s+ , η)] ≤ E[K(π −1 X(k+1) (s + l, s+ , η)] + N −4/3+17ε for each k = 0, . . . , L − 1. Finally, defining Σ̂(L) = X 0 T (L) X and λmax (Σ̂(L) ) as its largest eigenvalue (L) (L) in (E∗ − δ 0 , E∗ + δ 0 ) for some δ 0 > 0, applying Lemma 3.13 again yields (L) E[K(π −1 X(L) (s + l, s+ , η)] ≤ P[λmax (Σ̂(L) ) ≤ E∗ + s + 2l] + N −1 . Recalling L ≤ 2M and combining the above bounds, (L) P[N 2/3 (λmax (Σ̂) − E∗ ) ≤ x] ≤ P[N 2/3 (λmax (Σ̂(L) ) − E∗ ) ≤ x + 2N −ε ] + o(1). The matrix T (L) has all diagonal entries 0 or t, so Σ̂(L) = tX̃ 0 X̃ for X̃ ∈ RM̃ ×N having Normal(0, 1/N ) entries. The corresponding law ρ(L) has a single support interval and a unique (L) (L) right edge, so E∗ must be this edge. Regularity of E∗ and (16) imply |t| 1 and M̃ /N  1. If (L) E∗ > 0, then t > 0. Applying [Joh01, Theorem 1.1] for the largest eigenvalue of a real Wishart matrix, we have (L) P[N 2/3 (λmax (Σ̂(L) ) − E∗ ) ≤ x + 2N −ε ] = F1 (x) + o(1) (35) (L) where F1 is the distribution function of µT W . If E∗ < 0, then t < 0, and edge regularity implies M̃ /N is bounded away from 1. Then we also have (35) by considering −Σ̂(L) and applying [FS10, Theorem I.1.1] for the smallest eigenvalue of a real Wishart matrix. (If M̃ < N , we apply this result to the companion matrix X̃ X̃ 0 .) Combining the above, we obtain P[N 2/3 (λmax (Σ̂) − E∗ ) ≤ x] ≤ F1 (x) + o(1). The reverse bound is analogous, concluding the proof.  TRACY-WIDOM FOR COVARIANCE MATRICES 25 In the remainder of this section, we prove Lemma 5.1. 5.1. Individual resolvent bounds. For diagonal T and for z = y +iη as appearing in Lemma 5.1, we record here simple resolvent bounds that follow from the local law. Similar bounds were used in [EYY12b, LS16]. We also introduce the shorthand notation that will be used in the computation. Let E∗ be a regular right edge. Fix a small constant ε > 0, and fix s1 , s2 , η such that |s1 |, |s2 |≤ N −2/3+ε and η ∈ [N −2/3−ε , N −2/3 ]. Changing variables, we write Z s2 =mN (y + E∗ + iη)dy. X ≡ X(s1 , s2 , η) = N s1 For y ∈ [s1 , s2 ], we write as shorthand z ≡ z(y) = y + E∗ + iη, G(α) ≡ G(α) (z(y)), (α) mN ≡ G ≡ G(z(y)), 1 X (α) Gii , N X(α) mN ≡ mN (z(y)), Z s2 (α) =mN (y + E∗ + iη)dy. ≡N s1 i∈IN The above quantities depend implicitly on y. We use the simplified summation notation X X ≡ , i,j X i,j∈IN X ≡ α,β α,β∈IM where summations over lower-case Roman indices are implicitly over IN and summations over Greek indices are implicitly over IM . We use also the simplified integral notation Z Z s2 Z Z s2 G̃AB ≡ G(z(ỹ))AB dỹ, m̃N ≡ mN (z(ỹ))dỹ, s1 s1 etc., so that integrals are implicitly over [s1 , s2 ], and we denote by F̃ the function F evaluated at F (z(ỹ)) for ỹ the variable of integration. In this notation, X and X(α) are simply X Z X Z (α) (α) X= = G̃ii , X = = G̃ii . i i We introduce the fundamental small parameter Ψ = N −1/3+3ε . (36) We will eventually bound all quantities in the computation by powers of Ψ. In fact, as shown in Lemmas 5.2 and 5.3 below, non-integrated resolvent entries are controlled by powers of the smaller quantity N −1/3+ε . However, integrated quantities will require the additional slack of N 2ε . We will pass to using Ψ for all bounds after this distinction is no longer needed. We have the following corollaries of Proposition 3.7 and Theorem 3.10: Lemma 5.2. Under the assumptions of Lemma 5.1, for all y ∈ [s1 , s2 ], i 6= j ∈ IN , and α 6= β ∈ IM , 1 Gαα tα ≺ 1, ≺ 1, ≺ 1, Gii ≺ 1, Gii tα Gαα Gij ≺ N −1/3+ε , Giα ≺ N −1/3+ε , tα Gαβ ≺ N −1/3+ε , tα tβ |mN − m∗ |≺ N −1/3+ε . When T is not invertible, these quantities are defined by continuity and the form (22) for G. 26 TRACY-WIDOM FOR COVARIANCE MATRICES Proof. For diagonal T , the matrix Π0 in (24) is diagonal,   t1 tM Π0 = diag m0 , . . . , m0 , − ,...,− . 1 + t1 m0 1 + tM m0 √ Proposition 3.7 implies =m0 (z(y)) ≤ C κ + η ≤ CN −1/3+ε/2 , while η ≥ N −2/3−ε by assumption. Then, defining tA = 1 for A ∈ IN (and tA = tα for A = α ∈ IM ), Theorem 3.10 applied with standard basis vectors for v, w yields (tA tB )−1 (G − Π0 )AB ≺ N −1/3+ε for all A, B ∈ I. Proposition 3.7 also implies |m0 (z)| 1 and |1+tα m0 (z)| 1, from which all of the entrywise bounds on G follow. √ The bound on mN follows from |m0 −m∗ |≤ C κ + η ≤ CN −1/3+ε/2 and |mN −m0 |≺ N −1/3+ε .  Lemma 5.3. Under the assumptions of Lemma 5.1, for all i ∈ IN and α ∈ IM , X (α) X −1/3+ε G(α) . Gik Xαk ≺ N −1/3+ε , pq Xαp Xαq − m∗ ≺ N p,q k Proof. Applying Lemmas 3.9(b) and 5.2, X (α) Gik Xαk = −Giα /Gαα ≺ N −1/3+ε . k Similarly, applying Lemma 3.9(a) and Theorem 3.10, X Gαα − Π0,αα 1 t2α 1 1 1 G(α) X X − m = − − − m = − = ≺ N −1/3+ε . αp αq ∗ ∗ pq 2 G t Π G t G Π αα α 0,αα αα αα 0,αα α p,q (These types of bounds are in fact used in the proof of Theorem 3.10 and may also be derived directly from concentration inequalities and the independence of Xαk and G(α) .)  Remark 5.4. All probabilistic bounds used in the proof of Lemma 5.11, such as the above, are derived from Theorem 3.10. Thus they in fact hold in the union bound form of Corollary 3.11. We continue to use the notation ≺ for convenience, with the implicit understanding that we may take a union bound over all y ∈ [s1 , s2 ], and in particular integrate such bounds over y. We record one trivial bound for an integral that will be repeatedly used, and which explains the appearance of Ψ. Lemma 5.5. Suppose the assumptions of Lemma 5.1 hold, F (z(y)) ≺ N a(−1/3+ε) for some a ≥ 2, and we may take a union bound of this statement over y ∈ [s1 , s2 ] (in the sense of Lemma 3.3). Then, with Ψ = N −1/3+3ε , Z N F̃ ≺ Ψa−1 . Proof. This follows, for a ≥ 2, from N (s2 − s1 )N a(−1/3+ε) ≤ 2N 1/3+ε N a(−1/3+ε) ≤ 2Ψa−1 .  The next lemma will allow us to “remove the superscript” in the computation. Lemma 5.6. Under the assumptions of Lemma 5.1, for any y ∈ [s1 , s2 ], i, j ∈ IN (possibly equal), and α ∈ IM , (α) Gij − Gij ≺ N 2(−1/3+ε) , (α) mN − mN ≺ N 2(−1/3+ε) , X − X(α) ≺ Ψ. TRACY-WIDOM FOR COVARIANCE MATRICES 27 Proof. Applying the last resolvent identity from Lemma 3.9, Giα Gjα Gjα tα (α) Gij − Gij = = Giα , Gαα tα Gαα so the first statement follows from Lemma 5.2. Taking i = j and averaging over IN yields the second statement. The third statement follows from   Z (α) (α) X − X = = N m̃N − m̃N and Lemma 5.5.  5.2. Resolvent bounds for a swappable pair. We now record bounds for a swappable pair (T, E∗ ) and (Ť , Ě∗ ), where E∗ , Ě∗ are both regular. We denote by m̌N , Ǧ, X̌ the analogues of mN , G, X for Ť . For ε, s1 , s2 , η and y ∈ [s1 , s2 ] as in Section 5.1, we write as shorthand ž ≡ ž(y) = y + Ě∗ + iη, Ǧ ≡ Ǧ(ž(y)), m̌N ≡ m̌N (ž(y)), where these quantities depend implicitly on y. The results of the preceding section hold equally for Ǧ, m̌N , and X̌. The desired bound (34) arises from the following identity: Suppose first that T and Ť are invertible. Applying A−1 − B −1 = A−1 (B − A)B −1 ,   −ž + z 0 G − Ǧ = G Ǧ. 0 −Ť −1 + T −1 Hence, as z − ž = E∗ − Ě∗ , Gij − Ǧij = X Gik Ǧjk (E∗ − Ě∗ ) − X Giα Ǧjα α k tα ťα (tα − ťα ). (37) This holds also by continuity when T is not invertible, where Giα /tα and Ǧjα /ťα are well-defined by (22). The following lemma will allow us to “remove the check” in the computation. Lemma 5.7. Suppose the assumptions of Lemma 5.1 hold. Let Ψ = N −1/3+3ε . Then for any y ∈ [s1 , s2 ], i, j ∈ IN (possibly equal), and α ∈ IM , Gij − Ǧij ≺ N 2(−1/3+ε) , mN − m̌N ≺ N 2(−1/3+ε) , X − X̌ ≺ Ψ. Proof. Applying Lemma 5.2 for both G and Ǧ, and also the definition of swappability and Lemma 4.2, we have from (37) X Gij − Ǧij ≺ |E∗ − Ě∗ |·N · N 2(−1/3+ε) + |tα − ťα |N 2(−1/3+ε) ≺ N 2(−1/3+ε) . α (The contribution from k = i or k = j in the first sum of (37) is of lower order.) Taking i = j and averaging over IN yields the second statement, and integrating over y ∈ [s1 , s2 ] and applying Lemma 5.5 yields the third.  In many cases, we may strengthen the above lemma by an additional factor of Ψ if we take an expectation. (This type of idea is an important part of the argument in [EYY12b, LS16]. For example, setting a = 0 and Y ≡ Y (α) ≡ 1 in Lemma 5.9 below yields the second-order bound E[X − X̌] ≺ Ψ2 .) To take expectations of remainder terms, we will invoke Lemma 3.4 combined with the following basic bound: 28 TRACY-WIDOM FOR COVARIANCE MATRICES Lemma 5.8. Under the assumptions of Lemma 5.1, let P ≡ P (z(y)) be any polynomial in the entries of X and G with bounded degree, bounded (possibly random) coefficients, and at most N C terms for a constant C > 0. Then for a constant C 0 > 0 and all y ∈ [s1 , s2 ], 0 E[|P |] ≤ N C . Proof. By the triangle inequality and Holder’s inequality, it suffices to consider a bounded power of a single entry of G or X. Then the result follows from Assumption 2.5, Lemma 3.8, and the form (22) for G.  Lemma 5.9. Under the assumptions of Lemma 5.1, let Y be any quantity such that Y ≺ Ψa for some constant a ≥ 0. Suppose that for each α ∈ IM , there exists a quantity Y (α) such that Y − Y (α) ≺ Ψa+1 , and Y (α) is independent of row α of X. Suppose furthermore that E[|Y |4 ] ≤ N C for a constant C > 0. Then, for all i, j ∈ IN (possibly equal) and y ∈ [s1 , s2 ], E[(Gij − Ǧij )Y ] ≺ N 2(−1/3+ε) Ψa+1 ≺ Ψa+3 , E[(mN − m̌N )Y ] ≺ N 2(−1/3+ε) Ψa+1 ≺ Ψa+3 . E[(X − X̌)Y ] ≺ Ψa+2 . Proof. Applying (33), the trivial bound N −1 ≺ Ψ3 , and Lemma 5.2 to (37), X Giα Ǧjα X (tα − ťα )Y (Gij − Ǧij )Y = Gik Ǧjk (E∗ − Ě∗ )Y − tα ťα α k ! X 1 X Giα Ǧjα = (tα − ťα ) sα šα Gik Ǧjk − Y + O≺ (Ψa+5 ). N t ť α α α k By swappability and Lemma 5.2, the explicit term on the right is of size O≺ (N 2(−1/3+ε) Ψa ). (The contributions from k = i and k = j in the summation are of lower order.) Applying the assumption (α) Y − Y (α) ≺ Ψa+1 as well as Lemma 5.6, we may replace Y with Y (α) , Gik with Gik , and Ǧjk with (α) Ǧjk above while introducing an O≺ (N 2(−1/3+ε) Ψa+1 ) error. Hence, ! X 1 X (α) (α) Giα Ǧjα Gik Ǧjk − Y (α) + O≺ (N 2(−1/3+ε) Ψa+1 ). (38) (Gij − Ǧij )Y = (tα − ťα ) sα šα N t ť α α α k Applying the resolvent identities from Lemma 3.9, Giα Gαα X (α) = Gik Xαk = − P tα tα 1 + tα k Recalling sα = (1 + tα m∗ around x = m∗ , )−1 , 1 X (α) p,q Gpq Xαp Xαq (α) Gik Xαk . k and applying Lemma 5.3 and a Taylor expansion of (1 + tα x)−1 X (α) Giα = −sα Gik Xαk + O≺ (N 2(−1/3+ε) ), tα k where the explicit term on the right is of size O≺ (N −1/3+ε ) ≺ Ψ. A similar expansion holds for Ǧjα /ťα . Substituting into (38),   X X X 1 (α) (α) (α) (α) (Gij − Ǧij )Y = (tα − ťα )sα šα  Gik Ǧjk − Gik Xαk Ǧjl Xαl  Y (α) N α k + O≺ (N 2(−1/3+ε) a+1 Ψ ). k,l TRACY-WIDOM FOR COVARIANCE MATRICES 29 Denoting by Eα the partial expectation over only row α of X (i.e. conditional on Xβj for all β 6= α), we have   X (α) (α) X (α) 1 (α) Eα  Gik Ǧjk − Gik Xαk Ǧjl Xαl  = 0, N k k,l (N 2(−1/3+ε) Ψa+1 ) while the remainder term remains O≺ by Lemmas 3.4 and 5.8, the assumption on E[|Y |4 ], and Cauchy-Schwarz. Then the first statement follows. The second statement follows from applying this with i = j and averaging over i ∈ IN . The third statement follows from integrating over y ∈ [s1 , s2 ] and noting N 1/3+ε N 2(−1/3+ε) = Ψ as in Lemma 5.5. (If Y depends on the spectral parameter z(y), this integration is performed by fixing this parameter for Y , evaluating mN and m̌N at a different parameter ỹ, and integrating over ỹ. The preceding arguments do not require Y and mN , m̌N to depend on the same spectral parameter.)  P Finally, recall the notation sα = (1 + tα m∗ )−1 and Ai = N −1 α tiα siα . (This corresponds to Ai,0 in Lemma 4.2.) We derive a deterministic consequence of swappability and the scaling condition γ = γ̌ = 1. In the proof of [LS16] for a continuous interpolation T (l) , denoting ṫα and ṁ∗ the derivatives with respect to l, the differential analogue of the following lemma is the pair of identities X X ṫα tα s3α = N ṁ∗ , ṫα t2α s4α = N ṁ∗ (A4 − m−4 ∗ ). α α These may be derived by implicitly differentiating 0 = z00 (m∗ ) and 1 = z000 (m∗ ) with respect to l. We show that discrete versions of these identities continue to hold, with O(N −1 ) error: Lemma 5.10. Suppose T, Ť satisfy Assumption 2.4, E∗ , Ě∗ are associated regular right edges with scales γ = γ̌ = 1, and P (T, E∗ ) and (Ť , Ě∗ ) are swappable. Define sα = (1 + tα m∗ )−1 , šα = 4 4 −1 −1 (1 + ťα m̌∗ ) , A4 = N α tα sα , and Pα = sα šα (tα sα + ťα šα ), Qα = sa šα (t2α s2α + tα sα ťα šα + ť2α š2α ). Then for some constant C > 0, both of the following hold: 2N (m∗ − m̌∗ ) − M X (tα − ťα )Pα ≤ C/N (39) α=1 3N (m∗ − m̌∗ )(A4 − m−4 ∗ )− M X (tα − ťα )Qα ≤ C/N. (40) α=1 Proof. For (39), we have from the identity 0 = z00 (m∗ ) applied to T and Ť 1 X 2 2 −2 t s − ť2α š2α . m−2 ∗ − m̌∗ = N α α α (41) The left side may be written as −2 −2 −2 −3 −2 m−2 ), ∗ − m̌∗ = (m̌∗ − m∗ )(m̌∗ + m∗ )m∗ m̌∗ = 2(m̌∗ − m∗ )m∗ + O(N (42) where the second equality applies |m∗ |, |m̌∗ | 1 and |m̌∗ − m∗ |≤ C/N . The right side may be written as 1 X 2 2 1 X tα sα − ť2α š2α = (tα − ťα )tα s2α + (s2α − š2α )tα ťα + (tα − ťα )ťα š2α . N α N α Including the identities (1 + tα m∗ )sα = 1 and (1 + ťα m̌∗ )šα = 1, 1 X 2 2 1 X tα sα − ť2α š2α = (tα − ťα )(tα s2α (1 + ťα m̌∗ )šα + ťα š2α (1 + tα m∗ )sα ) + (s2α − š2α )tα ťα N α N α 30 TRACY-WIDOM FOR COVARIANCE MATRICES 1 X (tα − ťα )sα šα (tα sα + ťα šα + tα sα ťα m̌∗ + ťα šα tα m∗ ) + (s2α − š2α )tα ťα N α 1 X ≡ (tα − ťα )sα šα (tα sα + ťα šα ) + Rα , (43) N α = where we define Rα as the remainder term. Noting that s2α − š2α = (sα − šα )(sα + šα ) = (ťα m̌∗ − tα m∗ )sα šα (sα + šα ), we have Rα = tα ťα sα šα (tα sα m̌∗ + tα šα m∗ − ťα sα m̌∗ − ťα šα m∗ + ťα sα m̌∗ + ťα šα m̌∗ − tα sα m∗ − tα šα m∗ ) = tα sα ťα šα (m̌∗ − m∗ )(tα sα + ťα šα ). Then, applying Lemma 4.2(a), 1 X Rα = (m̌∗ − m∗ )(A2,1 + A1,2 ) = 2(m̌∗ − m∗ )A3,0 + O(N −2 ). N α By the scaling γ = 1, we have A3,0 = 1 + m−3 ∗ . Combining this with (41), (42), and (43) and multiplying by N yields (39). The identity (40) follows similarly: The condition γ = γ̌ implies 1 X 3 3 −3 m−3 t s − ť3α š3α . ∗ − m̌∗ = N α α α The left side is −3 −4 −2 (m̌∗ − m∗ )(m2∗ + m∗ m̌∗ + m̌2∗ )m−3 ), ∗ m̌∗ = 3(m̌∗ − m∗ )m∗ + O(N while the right side is 1 X 1 X 3 3 tα sα − ť3α š3α = (tα − ťα )t2α s3α + (s2α − š2α )t2α sα ťα + (tα − ťα )tα sα ťα š2α N α N α + (sα − šα )tα ť2α š2α + (tα − ťα )ť2α š3α  1 X = (tα − ťα ) t2α s3α (1 + ťα m̌∗ )šα + tα sα ťα š2α (1 + tα m∗ )sα N α  2 3 + ťα šα (1 + tα m∗ )sα + (sα − šα )((sα + šα )t2α sα ťα + tα ť2α š2α ) 1 X = (tα − ťα )sα šα (t2α s2α + tα sα ťα šα + ť2α š2α ) N α = + tα sα ťα šα (m̌∗ − m∗ )(t2α s2α + tα sα ťα šα + ť2α š2α ) ! 1 X (tα − ťα )Qα + 3(m̌∗ − m∗ )A4 + O(N −2 ). N α Combining the above and multiplying by N yields (40). 5.3. Proof of Lemma 5.1. We use the notation of Sections 5.1 and 5.2. Define the following quantities, depending implicitly on a fixed index i ∈ IN and y ∈ [s1 , s2 ]: 1 X 2 X3,120 = K 0 (X)(mN − m∗ ) Gik N k 1 X 0 X3,3 = K (X) 2 Gik Gkl Gil N k,l  TRACY-WIDOM FOR COVARIANCE MATRICES Z 1 X Gik Gil = G̃jk G̃jl N2 j,k,l Z X 1 00 2 = K (X) 2 Gik = G̃2jl N X3,2e2 = K 00 (X) X3,20e20 j,k,l 1 X 2 Gik N k 1 X = K 0 (X)(mN − m∗ ) 2 Gik Gkl Gil N X4,220 = K 0 (X)(mN − m∗ )2 X4,13 k,l X4,4 1 X Gij Gjk Gkl Gil = K 0 (X) 3 N X4,40 1 X 2 2 = K 0 (X) 3 Gik Gjl N j,k,l j,k,l X4,12e2 X4,120e20 X4,3e2 X4,30e2 X4,3e20 X4,2f 12 0 X4,20 f 12 X4,2e3 X4,2e30 X4,20e3 X4,2e2e2 X4,20e2e2 Z 1 X = K (X)(mN − m∗ ) 2 Gik Gil = G̃jk G̃jl N j,k,l Z 1 X 2 00 = K (X)(mN − m∗ ) 2 Gik = G̃2jl N j,k,l Z X 1 00 = K (X) 3 Gip Giq Gpr = G̃jq G̃jr N j,p,q,r Z 1 X 2 = K 00 (X) 3 Gir Gpq = G̃jp G̃jq N j,p,q,r Z X 1 00 = K (X) 3 Giq Gir Gqr = G̃2jp N j,p,q,r Z 1 X 00 Gik Gil = (m̃N − m∗ )G̃jk G̃jl = K (X) 2 N j,k,l Z 1 X 2 = K 00 (X) 2 Gil = (m̃N − m∗ )G̃2jk N j,k,l Z X 1 00 = K (X) 3 Gip Giq = G̃jp G̃jr G̃qr N j,p,q,r Z 1 X 00 = K (X) 3 Gip Giq = G̃2jr G̃pq N j,p,q,r Z 1 X 2 00 = K (X) 3 Gip = G̃jq G̃jr G̃qr N j,p,q,r  Z  Z  1 X 000 = K (X) 3 Gip Giq = G̃jp G̃jr = G̃kq G̃kr N j,k,p,q,r  Z  Z  1 X 2 000 = G̃kq G̃kr = K (X) 3 Gip = G̃jq G̃jr N 00 j,k,p,q,r 31 32 TRACY-WIDOM FOR COVARIANCE MATRICES   Z  Z 1 X 2 = G̃ G̃ = G̃ G G jp jq ip iq kr N3 j,k,p,q,r   Z  Z 1 X = K 000 (X) 3 G2ip = G̃2jq = G̃2kr N X4,2e2e20 = K 000 (X) X4,20e20e20 j,k,p,q,r Define the aggregate quantities X3 = X3,12 + X3,3 + X3,2e2 X4 = 3X4,220 + 6X4,13 + 12X4,4 + 3X4,40 + 4X4,12e2 + 8X4,3e2 + 4X4,30e2 + 2X4,2f 3 + 2X4,2e 30 + 4X4,2e 2e 2, 12 + 4X4,2e X− 4 = X4,2f 30 + 2X4,2e 3 − X4,12e 2 − X4,30 e 2 − 2X4,3e 2. 12 + X4,2e (Not all of the above terms appear in these aggregate quantities; we define them because they appear in intermediate steps of the proof.) The notation signifies that each term X3,∗ is of size at most O≺ (Ψ3 ), and each term X4,∗ is of size at most O≺ (Ψ4 ), as may be verified from Lemmas 5.2 and 5.5. A ∼ in the subscript denotes an integrated quantity, and a 0 in the subscript denotes a squared resolvent entry. Lemma 5.1 is a consequence of the following two technical results. Lemma 5.11 (Decoupling). Under the assumptions of Lemma 5.1, denote Xλ = λX + (1 − λ)X̌ for λ ∈ [0, 1]. For fixed i ∈ IN and y ∈ [s1 , s2 ], define X3 , X4 , and X− 4 as above. For fixed α ∈ IM , let sα = (1 + tα m∗ ) and šα = (1 + ťα m̌∗ ), and define Pα = sα šα (tα sα + ťα šα ), Qα = sα šα (t2α s2α + tα sα ťα šα + ť2α š2α ), Rα = sα šα (tα sα − ťα šα )2 . Then Z 0 1  Giα Ǧiα E K (Xλ ) tα ťα 0  Z dλ = sα šα 0 1 " # 1 X E K (Xλ ) Gik Ǧik dλ N 0 k 5 − Pα E[X3 ] + 13 Qα E[X4 ] + 31 Rα E[X− 4 ] + O≺ (Ψ ). Lemma 5.12 (Optical theorems). Under the assumptions of Lemma 5.1, for fixed i ∈ IN and P y ∈ [s1 , s2 ], define X3 and X4 as above. Let A4 = N −1 α t4α s4α . Then 5 2=E[X3 ] = (A4 − m−4 ∗ )=E[X4 ] + O≺ (Ψ ). Lemma 5.11 generalizes [LS16, Lemma 6.2] to a swappable pair. We will present a self-contained proof in Section 5.4, although many computational ideas are the same. We introduce the interpolation Xλ = λX + (1 − λ)X̌ as a device to bound K(X) − K(X̌). (This is different from a continuous interpolation between the entries of T and Ť .) We make several additional remarks for the reader familiar with [LS16]: 1. The proof in [LS16] requires this lemma in “differential form”, where T = Ť . In this case, we have G = Ǧ, Xλ = X for every λ ∈ [0, 1], sα = šα , and tα = ťα . Then the integral over λ is irrelevant, and Lemma 5.11 reduces to the full version of [LS16, Lemma 6.2]. 2. There is an additional term X− 4 that does not appear in [LS16], and which is not canceled by the optical theorems of Lemma 5.12. (When T = Ť , we have Rα = 0 so this term is not present.) The cancellation will instead occur by symmetry of its definition, upon integrating over y. 3. The main additional complexity in our proof comes from needing to separately track the terms that arise from resolvent expansions of G and Ǧ, and from X and X̌ after Taylor expanding K 0 (Xλ ). An important simplification is that we may use Lemmas 5.7 and 5.9 to convert O≺ (Ψ3 ) and O≺ (Ψ4 ) terms to involve only G and not Ǧ—hence X3 , X4 , X− 4 are defined only by T and not Ť . Swappability of (T, E∗ ) and (Ť , Ě∗ ) is used for this simplification. TRACY-WIDOM FOR COVARIANCE MATRICES 33 The other technical ingredient, Lemma 5.12, is identical to the full version of [LS16, Lemma B.1], as the terms X3 and X4 depend only on the single matrix T . We briefly discuss the breakdown of its proof in Section 5.5. In [LS16], for expositional clarity, these lemmas were stated and proven only in the special case K 0 ≡ 1. Full proofs were presented for an analogous deformed Wigner model in [LS15]. Although more cumbersome, we will demonstrate the full proof of Lemma 5.11 for a general function K in Section 5.4, as much of the additional complexity due to two resolvents G and Ǧ arises from the interpolation Xλ and the Taylor expansion of K 0 . We conclude this section by establishing Lemma 5.1 using the above two results: Proof of Lemma 5.1. We write 1 Z K(X) − K(X̌) = 0 d K(Xλ )dλ = dλ Z 1 K 0 (Xλ )(X − X̌)dλ. (44) 0 Recalling X= X Z = G̃ii i and applying (37), X − X̌ = X Z X = i ˜ (E − Ě ) − G̃ik Ǧ ∗ ∗ ik ˜ X G̃iα Ǧ iα α k tα ťα ! (tα − ťα ) . ˜ denote G and Ǧ evaluated at the variable of integration ỹ.) Further applying (33), (G̃ and Ǧ Lemma 5.2, and the trivial bound N −2/3+ε ≺ Ψ2 , ! ˜ X Z X G̃iα Ǧ 1 X iα ˜ X − X̌ = G̃ik Ǧik − + O≺ (Ψ4 ). = (tα − ťα ) sα šα N t ť α α α i k Applying this to (44), taking the expectation, exchanging orders of summation and integration, and noting that K 0 (Xλ ) is real, E[K(X) − K(X̌)] 1 Z Z XX = (tα − ťα )= i 0 α ˜ 1 X ˜ − G̃iα Ǧiα E K (Xλ ) sα šα G̃ik Ǧ ik N tα ťα " 0 !# dλ dỹ + O≺ (Ψ4 ), k where the expectation of the remainder term is still O≺ (Ψ4 ) by Lemmas 3.4 and 5.8. Denoting − by X̃3 (i), X̃4 (i), and X̃− 4 (i) the quantities X3 , X4 , and X4 defined by ỹ and the outer index of summation i, Lemma 5.11 implies Z XX 1/3+ε 5 E[K(X)−K(X̌)] = (tα −ťα )= (Pα E[X̃3 (i)]− 13 Qα E[X̃4 (i)]− 31 Rα E[X̌− Ψ ), 4 (i)])dỹ+O≺ (N i α where the error is N 1/3+ε Ψ5 because [−N −2/3+ε , N −2/3+ε ]. We note P α |tα Z = − ťα |≤ C and the range of integration is contained in X̃− 4 (i)dỹ = 0 by symmetry of the terms defining X̃− 4 , so this term vanishes. Then, applying Lemma 5.12,   Z XX A4 − m−4 Qα ∗ E[K(X) − K(X̌)] = (tα − ťα ) Pα − = E[X̃4 (i)]dỹ + O≺ (N 1/3+ε Ψ5 ). 2 3 α i 34 TRACY-WIDOM FOR COVARIANCE MATRICES Finally, applying Lemma 5.10, we have   X A4 − m−4 Qα ∗ (tα − ťα ) Pα − ≤ C/N. 2 3 α Hence E[K(X) − K(X̌)] ≺ N 1/3+ε Ψ5 = N −4/3+16ε .  5.4. Proof of Lemma 5.11. In this section, we prove the decoupling lemma. We will implicitly use the resolvent bounds of Lemma 5.2 throughout the proof. Step 1: Consider first a fixed value λ ∈ [0, 1]. Let Eα denote the partial expectation over row α of X (i.e. conditional on all Xβj for β 6= α). In anticipation of computing Eα for the quantity on the left, we expand Giα Ǧiα K 0 (Xλ ) tα ťα as a polynomial of entries of row α of X, with coefficients independent of all entries in this row. Applying the resolvent identities, X (α) Giα 1 Gαα X (α) Gik Xαk . Gik Xαk = − = P (α) tα tα 1 + t G X X pq α αp αq k k p,q Applying Lemma 5.3 and a Taylor expansion of the function (1 + tα x)−1 around x = m∗ , ! X (α) X X (α) Giα = −sα Gik Xαk + tα s2α G(α) Gik Xαk pq Xαp Xαq − m∗ tα p,q k k !2 X X (α) − t2α s3α G(α) Gik Xαk + O≺ (Ψ4 ) pq Xαp Xαq − m∗ p,q k 4 ≡ U1 + U2 + U3 + O≺ (Ψ ), (45) where we defined the three explicit terms of sizes O≺ (Ψ), O≺ (Ψ2 ), O≺ (Ψ3 ) as U1 , U2 , U3 . Similarly Ǧiα = Ǔ1 + Ǔ2 + Ǔ3 + O≺ (Ψ4 ), ťα (46) where Ǔi are defined analogously with šα , ťα , m̌∗ , Ǧ in place of sα , tα , m∗ , G. (α) (α) For K 0 (Xλ ), define Xλ = λX(α) + (1 − λ)X̌(α) and note from Lemma 5.6 that Xλ − Xλ ≺ Ψ. (α) Taylor expanding K 0 (x) around x = Xλ , (α) 0 K (Xλ ) = K 0 (α) (Xλ ) +K 00 (α) (Xλ )(Xλ − (α) Xλ ) K 000 (Xλ ) (α) + (Xλ − Xλ )2 + O≺ (Ψ3 ). 2 (47) Applying the definition of X, X(α) and the resolvent identities, Z X Z Z X 2 X (α) G̃jα (α) (α) (α) X−X == (G̃jj − G̃jj ) = = = = G̃αα G̃jp Xαp G̃jq Xαq . G̃αα j j j,p,q Further applying the resolvent identity for G̃αα , a Taylor expansion as above, and Lemma 5.5, Z X (α) (α) (α) X − X = −tα sα = G̃jp Xαp G̃jq Xαq j,p,q + t2α s2α = Z X G̃(α) rs Xαr Xαs − m∗ r,s X (α) (α) G̃jp Xαp G̃jq Xαq + O≺ (Ψ3 ) j,p,q 3 ≡ V1 + V2 + O≺ (Ψ ), (48) TRACY-WIDOM FOR COVARIANCE MATRICES 35 where V1 ≺ Ψ and V2 ≺ Ψ2 . Analogously we may write X̌ − X̌(α) = V̌1 + V̌2 + O≺ (Ψ3 ), (49) where V̌1 , V̌2 are defined with šα , ťα , m̌∗ , Ǧ in place of sα , tα , m∗ , G. Substituting (48) and (49) into (47), and combining with (45) and (46), we obtain K 0 (Xλ ) Giα Ǧiα = W2 + W3 + W4 + O≺ (Ψ5 ) tα ťα (50) where the O≺ (Ψ2 ) term is (α) W2 = K 0 (Xλ )U1 Ǔ1 , the O≺ (Ψ3 ) term is (α) (α) W3 = K 0 (Xλ )(U2 Ǔ1 + U1 Ǔ2 ) + K 00 (Xλ )(λV1 + (1 − λ)V̌1 )U1 Ǔ1 , and the O≺ (Ψ4 ) term is (α) (α) W4 = K 0 (Xλ )(U3 Ǔ1 + U2 Ǔ2 + U1 Ǔ3 ) + K 00 (Xλ )(λV1 + (1 − λ)V̌1 )(U2 Ǔ1 + U1 Ǔ2 ) " # 000 (X(α) ) K (α) λ + K 00 (Xλ )(λV2 + (1 − λ)V̌2 ) + (λV1 + (1 − λ)V̌1 )2 U1 Ǔ1 . 2 Step 2: We compute Eα of W2 , W3 , W4 above. Note that X(α) , X̌(α) , G(α) , Ǧ(α) are independent of row α of X. Then for W2 , we have X (α) (α) (α) Eα [W2 ] = sα šα K 0 (Xλ ) Gik Ǧil Eα [Xαk Xαl ] k,l X (α) (α) (α) 1 Gik Ǧik , = sα šα K 0 (Xλ ) N k where we have used E[Xαk Xαl ] = 1/N if k = l and 0 otherwise. For W3 , let us introduce 1 X (α) (α) (α) (α) (α) Y3,120 = K 0 (Xλ )(mN − m∗ ) Gik Ǧik , N k 1 X (α) (α) (α) (α) (α) 0 Gik Ǧik , Z3,120 = K (Xλ )(m̌N − m̌∗ ) N k X (α) (α) (α) 1 (α) (α) Y3,3 = K 0 (Xλ ) 2 Gik Gkl Ǧil N k,l (α) Z3,3 (α) Y3,20e20 (α) Z3,20e20 (α) Y3,2e2 (α) Z3,2e2 X (α) (α) (α) (α) 1 Gik Ǧkl Ǧil = K 0 (Xλ ) 2 N k,l Z X 1 (α) (α) (α) (α) 00 = K (Xλ ) 2 Gik Ǧik = (G̃jl )2 N j,k,l Z X 1 (α) (α) (α) ˜ (α) )2 00 = K (Xλ ) 2 Gik Ǧik = (Ǧ jl N j,k,l X (α) (α) Z (α) (α) (α) 1 00 = K (Xλ ) 2 Gik Ǧil = G̃jk G̃jl N j,k,l X (α) (α) Z ˜ (α) ˜ (α) (α) 1 00 = K (Xλ ) 2 Gik Ǧil = Ǧjk Ǧjl , N j,k,l (51) 36 TRACY-WIDOM FOR COVARIANCE MATRICES which are versions of X3,∗ that don’t depend on row α of X and with various instances of mN , m∗ , G, X replaced by m̌N , m̌∗ , Ǧ, Xλ . Consider the first term of W3 and write (α) Eα [K 0 (Xλ )U2 Ǔ1 ]   ! (α) X = Eα −tα s2α šα K 0 (Xλ ) G(α) pq Xαp Xαq − m∗ p,q (α) = −tα s2α šα K 0 (Xλ ) X  X (α) (α) Gik Xαk Ǧil Xαl  k,l G(α) pq Eα [Xαp Xαq Xαk Xαl ] − k,l,p,q  1 (α) (α) m∗ 1{p = q}Eα [Xαk Xαl ] Gik Ǧil . N The summand corresponding to (k, l, p, q) is 0 unless each distinct index appears at least twice in (k, l, p, q). Furthermore, the case where all four indices are equal is negligible:  X  (α) 1 (α) (α) 2 4 Gkk Eα [Xαk ] − m∗ Eα [Xαk ] Gik Ǧik ≺ N · N −2 · Ψ2 ≺ Ψ5 . N k (The k = i case of the sum may be bounded separately as O≺ (N −2 ).) Thus up to O≺ (Ψ5 ), we need only consider summands where each distinct index appears exactly twice. Considering the one case where k = l and the two cases where k = p and k = q,  (k)   XX (α) (α) (α) (α)  1 (α) 0 2 0 Gpp − m∗ Gik Ǧik Eα [K (Xλ )U2 Ǔ1 ] = −tα sα šα K (Xλ ) N2 p k  (k) 2 X X (α) (α) (α)  + 2 Gik Ǧil Gkl + O≺ (Ψ5 ). N k l Re-including p = k and l = k into the double summations introduces an additional O≺ (Ψ5 ) error; hence we obtain for the first term of W3 (α) (α) (α) Eα [K 0 (Xλ )U2 Ǔ1 ] = −tα s2α šα (Y3,120 + 2Y3,3 ) + O≺ (Ψ5 ). (52) Similar arguments apply for the remaining three terms of W3 . For the terms involving an integral, we may apply Lemma 5.5 and also move Xαk outside of the integral and imaginary part because X is real and does not depend on the variable of integration ỹ. We obtain (α) (α) (α) Eα [K 0 (Xλ )U1 Ǔ2 ] = −ťα š2α sα (Z3,120 + 2Z3,3 ) + O≺ (Ψ5 ), (α) (α) (53) (α) Eα [λK 00 (Xλ )V1 U1 Ǔ1 ] = −λtα s2α šα (Y3,20e20 + 2Y3,2e2 ) + O≺ (Ψ5 ), (α) (α) (54) (α) Eα [(1 − λ)K 00 (Xλ )V̌1 U1 Ǔ1 ] = −(1 − λ)ťα š2α sα (Z3,20e20 + 2Z3,2e2 ) + O≺ (Ψ5 ), and Eα [W3 ] is the sum of (52–55). For W4 , consider the first term and write  (α) (α) Eα [K 0 (Xλ )U3 Ǔ1 ] = Eα t2α s3α šα K 0 (Xλ ) (α)  !2 X G(α) pq Xαp Xαq − m∗ p,q = t2α s3α šα K 0 (Xλ ) (55) X X (α) (α) Gik Xαk Ǧil Xαl  k,l (α) G(α) pq Grs Eα [Xαp Xαq Xαr Xαs Xαk Xαl ] p,q,r,s,k,l 1 − m∗ 1{p = q}G(α) rs Eα [Xαr Xαs Xαk Xαl ] N 1 − m∗ 1{r = s}G(α) pq Eα [Xαp Xαq Xαk Xαl ] N TRACY-WIDOM FOR COVARIANCE MATRICES 37 ! 1 2 (α) (α) + 2 m∗ 1{p = q}1{r = s}E[Xαk Xαl ] Gik Ǧil . N A summand corresponding to (k, l, p, q, r, s) is 0 unless each distinct index in (k, l, p, q, r, s) appears at least twice. Furthermore, as in the computations for W3 above, all summands for which (k, l, p, q, r, s) do not form three distinct pairs may be omitted and reincluded after taking Eα , introducing an O≺ (Ψ5 ) error. Considering all pairings of these indices, (α) (α) (α) Eα [K 0 (Xλ )U3 Ǔ1 ] = t2α s3α šα K 0 (Xλ ) (mN − m∗ )2 1 X (α) (α) Gik Ǧik N k 1 X (α) (α) (α) (α) 1 X (α) (α) (α) (α) Gik Gkl Ǧil + 8 3 Gik Gjk Gjl Ǧil + 4(mN − m∗ ) 2 N N k,l j,k,l ! 1 X (α) (α) (α) 2 Gik Ǧik (Gjl ) + O≺ (Ψ5 ). +2 3 N j,k,l At this point, let us apply Lemmas 5.6 and 5.7 to remove each superscript (α) above and to convert each Ǧ to G, introducing an O≺ (Ψ5 ) error. (We could not do this naively for W2 and W3 , because the errors would be O≺ (Ψ3 ) and O≺ (Ψ4 ) respectively.) We may also remove the superscript (α) (α) and convert Xλ to X in K 0 (Xλ ), via the second-derivative bounds (α) (α) K 0 (Xλ ) − K 0 (Xλ ) ≤ kK 00 k∞ |Xλ − Xλ |≺ Ψ. K 0 (Xλ ) − K 0 (X) ≤ kK 00 k∞ |Xλ − X|≺ Ψ. We thus obtain (α) Eα [K 0 (Xλ )U3 Ǔ1 ] = t2α s3α šα (X4,220 + 4X4,13 + 8X4,4 + 2X4,40 ) + O≺ (Ψ5 ). Applying a similar computation to each term of W4 , we obtain (α) Eα [K 0 (Xλ )(U3 Ǔ1 + U2 Ǔ2 + U1 Ǔ3 )] (56) = sα šα (t2α s2α + tα sα ťα šα + ť2α š2α )(X4,220 + 4X4,13 + 8X4,4 + 2X4,40 ) + O≺ (Ψ5 ), (57) (α) Eα [K 00 (Xλ )(λV1 + (1 − λ)V̌1 )(U2 Ǔ1 + U1 Ǔ2 )] = sα šα (λtα sα + (1 − λ)ťα šα )(tα sα + ťα šα )× (X4,120e20 + 2X4,12e2 + 2X4,3e20 + 2X4,30e2 + 8X4,3e2 ) + O≺ (Ψ5 ), (58) (α) Eα [K 00 (Xλ )(λV2 + (1 − λ)V̌2 )U1 Ǔ1 ] 5 0 + 2X = sα šα (λt2α s2α + (1 − λ)ť2α š2α )(X4,20 f 3 + 2X4,2e 30 + 8X4,2e 3 ) + O≺ (Ψ ), 4,2f 12 + 2X4,20 e 12 " # (α) K 000 (Xλ ) Eα (λV1 + (1 − λ)V̌1 )2 U1 Ǔ1 2 (59) sα šα (λtα sα + (1 − λ)ťα šα )2 (X4,20e20e20 + 2X4,20e2e2 + 4X4,2e2e20 + 8X4,2e2e2 ) + O≺ (Ψ5 ), (60) 2 and Eα [W4 ] is the sum of (57–60). The O≺ (Ψ5 ) remainder in (50) is given by the difference of the left side with W2 , W3 , W4 . As this is an integral over a polynomial of entries of G(α) and X, its partial expectation is still O≺ (Ψ5 ) by Lemmas 3.4 and 5.8. Summarizing the results of Steps 1 and 2, we collect (50), (51), (52–55), and (57–60):   Giα Ǧiα 0 Eα K (Xλ ) tα ťα = 38 TRACY-WIDOM FOR COVARIANCE MATRICES (α) = sα šα K 0 (Xλ ) − − + 1 X (α) (α) Gik Ǧik N k (α) (α) (α) (α) tα s2α šα (Y3,120 + 2Y3,3 ) − ťα š2α sα (Z3,120 + 2Z3,3 ) (α) (α) (α) (α) λtα s2α šα (Y3,20e20 + 2Y3,2e2 ) − (1 − λ)ťα š2α sα (Z3,20e20 + 2Z3,2e2 ) sα šα (t2α s2α + tα sα ťα šα + ť2α š2α )(X4,220 + 4X4,13 + 8X4,4 + 2X4,40 ) + sα šα (λtα sα + (1 − λ)ťα šα )(tα sα + ťα šα )(X4,120e20 + 2X4,12e2 + 2X4,3e20 + 2X4,30e2 + 8X4,3e2 ) 0 + 2X + sα šα (λt2α s2α + (1 − λ)ť2α š2α )(X4,20 f 3 + 2X4,2e 30 + 8X4,2e 3) 4,2f 12 + 2X4,20 e 12 + sα šα (λtα sα + (1 − λ)ťα šα )2 (X4,20e20e20 + 2X4,20e2e2 + 4X4,2e2e20 + 8X4,2e2e2 ) + O≺ (Ψ5 ). 2 (61) Step 3: In (61), we consider the first term on the right (of size O≺ (Ψ2 )) and remove the superscripts (α), keeping track of the O≺ (Ψ3 ) and O≺ (Ψ4 ) terms that arise. Applying the resolvent identities and a Taylor expansion for Gαα , we write (α) Giα Gkα Gαα X (α) (α) = Gik − Gαα Gir Xαr Gks Xαs Gik = Gik − r,s ! = Gik + tα sα X (α) (α) Gir Xαr Gks Xαs − t2α s2α X r,s G(α) pq Xαp Xαq − m∗ p,q X (α) (α) Gir Xαr Gks Xαs r,s 4 + O≺ (Ψ ) ≡ Gik + R2k + R3k + O≺ (Ψ4 ), (62) where we defined the two remainder terms of sizes O≺ (Ψ2 ), O≺ (Ψ3 ) as R2k , R3k . Similarly we write (α) Ǧik = Ǧik + Ř2k + Ř3k + O≺ (Ψ4 ). (63) (α) For K 0 (Xλ ), we apply the Taylor expansion (47) and recall V1 , V̌1 , V2 , V̌2 from (48,49) to obtain (α) (α) (α) (α) K 0 (Xλ ) = K 0 (Xλ ) − K 00 (Xλ )(Xλ − Xλ ) − K 000 (Xλ ) (α) (Xλ − Xλ )2 + O≺ (Ψ3 ) 2 (α) (α) = K 0 (Xλ ) − K 00 (Xλ )(λV1 + (1 − λ)V̌1 ) − K 00 (Xλ )(λV2 + (1 − λ)V̌2 ) (α) K 000 (Xλ ) − (λV1 + (1 − λ)V̌1 )2 + O≺ (Ψ3 ). 2 (64) Taking the product of (62), (63), and (64), applying the identity xyz = (x − δx )(y − δy )(z − δz ) + xyδz + xδy z + δx yz − xδy δz − δx yδz − δx δy z + δx δy δz (α) (with x = Gik , x − δx = Gik , and δx = R2k + R3k , etc.), and averaging over k ∈ IN , we obtain X (α) (α) (α) 1 K 0 (Xλ ) Gik Ǧik ≡ S2 + S3,1 + S3,2 + S4,1 + S4,2 + S4,3 + S4,4 + S4,5 + O≺ (Ψ5 ), (65) N k where the O≺ (Ψ2 ) term is S2 = K 0 (Xλ ) 1 X Gik Ǧik , N k TRACY-WIDOM FOR COVARIANCE MATRICES 39 the O≺ (Ψ3 ) terms are X 1 X (α) (α) 1 (α) Gik Ř2k + K 0 (Xλ ) R2k Ǧik , N N k k X 1 (α) (α) (α) = −K 00 (Xλ )(λV1 + (1 − λ)V̌1 ) Gik Ǧik , N (α) S3,1 = K 0 (Xλ ) S3,2 k and the O≺ (Ψ4 ) terms are X 1 X (α) (α) 1 (α) Gik Ř3k + K 0 (Xλ ) R3k Ǧik , N N k k X 1 (α) (α) (α) Gik Ǧik , = −K 00 (Xλ )(λV2 + (1 − λ)V̌2 ) N (α) S4,1 = K 0 (Xλ ) S4,2 k S4,3 = − S4,4 (α) K 000 (Xλ ) 2 (λV1 + (1 − λ)V̌1 )2 1 X (α) (α) Gik Ǧik , N k X (α) 1 R2k Ř2k , = −K 0 (Xλ ) N k (α) S4,5 = K 00 (Xλ )(λV1 + (1 − λ)V̌1 ) 1 X (α) 1 X (α) (α) Gik Ř2k + K 00 (Xλ )(λV1 + (1 − λ)V̌1 ) R2k Ǧik . N N k k Recalling the definition of R2k and applying Eα to the O≺ (Ψ3 ) terms, we obtain (α) (α) Eα [S3,1 ] = tα sα Y3,3 + ťα šα Z3,3 , (α) (α) Eα [S3,2 ] = λtα sα Y3,20e20 + (1 − λ)ťα šα Z3,20e20 . Similarly, we apply Eα to each of the O≺ (Ψ4 ) terms, considering all pairings of the four summation indices as in Step 2. Then applying Lemmas 5.6 and 5.7 to remove superscripts and convert Ǧ to G, we obtain Eα [S4,1 ] = −(t2α s2α + ť2α š2α )(X4,13 + 2X4,4 ) + O≺ (Ψ5 ), 5 0 + 2X Eα [S4,2 ] = −(λt2α s2α + (1 − λ)ť2α š2α )(X4,20 f 4,20 e 3 ) + O≺ (Ψ ), 12 1 Eα [S4,3 ] = − (λtα sα + (1 − λ)ťα šα )2 (X4,20e20e20 + 2X4,20e2e2 ) + O≺ (Ψ5 ), 2 Eα [S4,4 ] = −tα sα ťα šα (X4,40 + 2X4,4 ) + O≺ (Ψ5 ), Eα [S4,5 ] = −(λtα sα + (1 − λ)ťα šα )(tα sα + ťα šα )(X4,3e20 + 2X4,3e2 ) + O≺ (Ψ5 ). 40 TRACY-WIDOM FOR COVARIANCE MATRICES Then applying Eα to (65), noting that the remainder is again O≺ (Ψ5 ) by Lemmas 3.4 and 5.8, and substituting into (61), " #   Giα Ǧiα 1 X (α) (α) 0 0 Eα K (Xλ ) Gik Ǧik − tα s2α šα (Y3,120 + Y3,3 ) = sα šα Eα K (Xλ ) tα ťα N − (α) ťα š2α sα (Z3,120 + k (α) Z3,3 ) (α) (α) − 2λtα s2α šα Y3,2e2 − 2(1 − λ)ťα š2α sα Z3,2e2 + sα šα (t2α s2α + ť2α š2α )(X4,220 + 3X4,13 + 6X4,4 + 2X4,40 ) + sα šα (tα sα ťα šα )(X4,220 + 4X4,13 + 6X4,4 + X4,40 ) + sα šα (λtα sα + (1 − λ)ťα šα )(tα sα + ťα šα )(X4,120e20 + 2X4,12e2 + X4,3e20 + 2X4,30e2 + 6X4,3e2 ) + sα šα (λt2α s2α + (1 − λ)ť2α š2α )(2X4,2f 30 + 8X4,2e 3) 12 + 2X4,2e sα šα (λtα sα + (1 − λ)ťα šα )2 (4X4,2e2e20 + 8X4,2e2e2 ) + O≺ (Ψ5 ). + 2 (66) Step 4: In (66), we remove the superscript (α) from Y3,∗ and Z3,∗ , keeping track of the O≺ (Ψ4 ) (α) (α) errors that arise. For each quantity Y3,∗ or Z3,∗ , let Y3,∗ or Z3,∗ be the analogous quantity with (α) (α) each instance of mN , G(α) , G̃(α) , Xλ (α) For Y3,120 , recall from (62) replaced by mN , G, G̃, Xλ . (α) Gik = Gik + R2k + O≺ (Ψ3 ), and from (64) (α) (α) K 0 (Xλ ) = K 0 (Xλ ) − K 00 (Xλ )(λV1 + (1 − λ)V̌1 ) + O≺ (Ψ2 ). (α) For mN − m∗ , we apply the resolvent identities and write (α) mN − m∗ = mN − m∗ − 1 X G2jα N Gαα j = mN − m∗ − Gαα 1 X (α) (α) Gjk Xαk Gjl Xαl N j,k,l = mN − m∗ + tα sα 1 X (α) (α) Gjk Xαk Gjl Xαl + O≺ (Ψ3 ) N j,k,l ≡ mN − m∗ + Q + O≺ (Ψ3 ), where Q is the O≺ (Ψ2 ) term. Multiplying the above and averaging over k yields 1 X (α) (α) (α) (α) Gik Ř2k Y3,120 = Y3,120 + K 0 (Xλ )(mN − m∗ ) N k 1 X (α) 1 X (α) (α) (α) (α) (α) + K 0 (Xλ )(mN − m∗ ) Ǧik R2k + K 0 (Xλ )Q Gik Ǧik N N k k 1 X (α) (α) (α) (α) − K 00 (Xλ )(λV1 + (1 − λ)V̌1 )(mN − m∗ ) Gik Ǧik + O≺ (Ψ5 ), N k where each term except Y3,120 on the right is of size O≺ (Ψ4 ). Taking Eα and applying Lemmas 5.6 and 5.7 to remove superscripts and checks, (α) Y3,120 = Eα [Y3,120 ] + (tα sα + ťα šα )X4,13 + tα sα X4,40 + (λtα sα + (1 − λ)ťα šα )X4,120e20 + O≺ (Ψ5 ). (67) TRACY-WIDOM FOR COVARIANCE MATRICES 41 Similar arguments yield (α) Z3,120 = Eα [Z3,120 ] + (tα sα + ťα šα )X4,13 + ťα šα X4,40 + (λtα sα + (1 − λ)ťα šα )X4,120e20 + O≺ (Ψ5 ), (α) Y3,3 = Eα [Y3,3 ] + (2tα sα + ťα šα )X4,4 + (λtα sα + (1 − λ)ťα šα )X4,3e20 + O≺ (Ψ5 ), (α) Z3,3 = Eα [Z3,3 ] + (tα sα + 2ťα šα )X4,4 + (λtα sα + (1 − λ)ťα šα )X4,3e20 + O≺ (Ψ5 ), (α) Y3,2e2 = Eα [Y3,2e2 ] + (tα sα + ťα šα )X4,3e2 + 2tα sα X4,2e3 + (λtα sα + (1 − λ)ťα šα )X4,2e2e20 + O≺ (Ψ5 ), (α) Z3,2e2 = Eα [Z3,2e2 ] + (tα sα + ťα šα )X4,3e2 + 2ťα šα X4,2e3 + (λtα sα + (1 − λ)ťα šα )X4,2e2e20 + O≺ (Ψ5 ). Substituting into (66), " #   X Ǧ 1 G iα iα = sα šα Eα K 0 (Xλ ) Eα K 0 (Xλ ) Gik Ǧik − tα s2α šα Eα [Y3,120 + Y3,3 ] tα ťα N − k 2 ťα šα sα Eα [Z3,120 + Z3,3 ] − 2λtα s2α šα Eα [Y3,2e2 ] − 2(1 − λ)ťα š2α sα Eα [Z3,2e2 ] sα šα (t2α s2α + tα sα ťα šα + ť2α š2α )(X4,220 + 2X4,13 + 4X4,4 + X4,40 ) + + sα šα (λtα sα + (1 − λ)ťα šα )(tα sα + ťα šα )(2X4,12e2 + 2X4,30e2 + 4X4,3e2 ) + sα šα (λt2α s2α + (1 − λ)ť2α š2α )(2X4,2f 3) 30 + 4X4,2e 12 + 2X4,2e + 4sα šα (λtα sα + (1 − λ)ťα šα )2 X4,2e2e2 + O≺ (Ψ5 ). (68) Step 5: We take the full expectation of both sides of (68), applying Lemma 5.9 to convert Y3,∗ and Z3,∗ into X3,∗ . We illustrate the argument for Z3,120 : For k 6= i, denote (α) Y = K 0 (Xλ )(m̌N − m̌∗ )Gik , (α) (α) Y (α) = K 0 (Xλ )(m̌N − m̌∗ )Gik . Then Y ≺ Ψ2 , and Y − Y (α) ≺ Ψ3 for all α ∈ IM , the latter from Lemma 5.6 and the secondderivative bound for K. Then applying Lemma 5.9, E[Y Ǧik ] = E[Y Gik ] + O≺ (Ψ5 ). Hence # 1 X Gik (Ǧik − Gik ) = O≺ (Ψ5 ), E K (Xλ )(m̌N − m̌∗ ) N " 0 (69) k where the k = i term is controlled directly by Lemma 5.7. Applying this argument again with Y = K 0 (Xλ )G2ik , together with the bound m̌∗ − m∗ ≤ C/N ≺ Ψ3 , we may convert the term m̌N − m̌∗ : " # 1 X 2 0 E K (Xλ )(m̌N − m̌∗ − mN + m∗ ) Gik = O≺ (Ψ5 ). (70) N k Finally, a Taylor expansion of 0 K 0 (x) around X yields 0 K (Xλ ) = K (X) + (1 − λ)K 00 (X)(X̌ − X) + O≺ (Ψ2 ), (71) where we have used X̌ − X ≺ Ψ by Lemma 5.7. Applying the third implication of Lemma 5.9 with Y = K 00 (X)(mN − m∗ )G2ik ≺ Ψ3 for k 6= i, we obtain " # X 1 E K 00 (X)(X̌ − X)(mN − m∗ ) G2ik = O≺ (Ψ5 ). (72) N k Then combining (69–72), we obtain E[Z3,120 ] = E[X3,120 ] + O≺ (Ψ5 ). 42 TRACY-WIDOM FOR COVARIANCE MATRICES The same argument holds for the other terms Y3,∗ and Z3,∗ . Then taking the full expectation of (68), " #   X G Ǧ 1 iα iα E K 0 (Xλ ) = sα šα E K 0 (Xλ ) Gik Ǧik − (tα s2α šα + ťα š2α sα )E[X3,120 + X3,3 ] tα ťα N − k 2 2(λtα sα šα + (1 − λ)ťα š2α sα )E[X3,2e2 ] sα šα (t2α s2α + tα sα ťα šα + ť2α š2α )E[X4,220 + + 2X4,13 + 4X4,4 + X4,40 ] + sα šα (λtα sα + (1 − λ)ťα šα )(tα sα + ťα šα )E[2X4,12e2 + 2X4,30e2 + 4X4,3e2 ] + sα šα (λt2α s2α + (1 − λ)ť2α š2α )E[2X4,2f 30 + 4X4,2e 3] 12 + 2X4,2e + 4sα šα (λtα sα + (1 − λ)ťα šα )2 E[X4,2e2e2 ] + O≺ (Ψ5 ). (73) R R R λ2 R we integrate (73) over λ ∈ [0, 1], applying λ = (1−λ) = 1/2 and = 2λ(1−λ) = R Finally, − 2 (1 − λ) = 1/3. Simplifying the result and identifying the terms X3 , X4 , X4 , Pα , Qα , and Rα concludes the proof of the lemma. 5.5. Proof of Lemma 5.12. We discuss briefly the proof of the optical theorems, Lemma 5.12. In the setting K 0 ≡ 1, Lemma 5.12 corresponds to [LS16, Lemma B.1] upon taking the imaginary part. The proof for general K is the same as that of [LS16, Lemma B.1], with additional terms arising from the Taylor expansion of K 0 as in the proof of Lemma 5.11. The computation may be broken down into the following intermediate identities:  1 0 E[K 0 (X)] + 2m−1 ∗ E[K (X)(mN − m∗ )] N −1 −4 5 = 2E[X3 ] − 2m−1 (74) ∗ (z − E∗ )E[X2 ] − (A4 − 2m∗ − m∗ )E[X4 ] + O≺ (Ψ ), 1 E[K 0 (X)(mN − m∗ )] − 2E[X4,220 + X4,13 + X4,4 + X4,12e2 ] = O≺ (Ψ5 ), N E[2X4,13 + 3X4,4 + X4,40 + 2X4,3e2 ] = O≺ (Ψ5 ), (77) 5 (78) E[X4,12e2 + 2X4,3e2 + X4,30e2 + X4,2f 3 + X4,2e 30 + 2X4,2e 2e 2 ] = O≺ (Ψ ), 12 + 2X4,2e X2 = K 0 (X) (76) 5 (z − E∗ )E[X2 ] − E[X4,220 + 4X4,4 + X4,40 + 2X4,30e2 ] = O≺ (Ψ ), where (75) 1 X 2 Gik . N k For K 0 ≡ 1, (74) reduces to [LS16, (B.29)], (75) to [LS16, (B.33)], (76) to [LS16, (B.38)], and a linear combination of (76) and (77) to [LS16, (B.51)]. The last identity (78) is trivial for K 0 ≡ 1, as the left side is 0. It is analogous to [LS15, Eq. (C.42)] in the full computation for the deformed Wigner model, and may be derived as an “optical theorem” from X3,2e2 in the same manner as (75) and (76). The derivations of these identities do not require positivity of T or E∗ : They use only the resolvent identities of Lemma 3.9, the resolvent bounds from Section 5.1, the conditions |z − E∗ |≤ CN −2/3+ε and γ = 1, and the additional bound |m∗ + z + mM |≺ N −1/3+ε for mM = N −1 X α Gαα . TRACY-WIDOM FOR COVARIANCE MATRICES 43 P This additional bound follows from (13) written in the form z +m−1 0 =− α Π0,αα , and the bounds P −1 −1 −1/3+ε/2 −1/3+ε |m0 − m∗ |≤ CN and |mM − α Π0,αα |≺ N as implied by Proposition 3.7 and Theorem 3.10. We omit further details and refer the reader to [LS16]. −1 Lemma 5.12 follows from substituting (75) and (77) into (74), adding 4m−1 ∗ times (76) and 4m∗ 0 times (78), and taking the imaginary part (noting K is real-valued). This concludes the proof. Appendix A. Properties of ρ A.1. Fixed N, M, T . We extend the results in [SC95] to the case x = 0 and prove Proposition 2.2 following ideas of [KY16, Lemma 2.5]. The following results are from [SC95]: Proposition A.1. The Stieltjes transform m0 : C+ → C+ of ρ extends continuously to R \ {0}. At each x ∈ R \ {0}, ρ admits a continuous density given by 1 f0 (x) = =m0 (x). π Proof. See [SC95, Theorem 1.1].  Proposition A.2. Let S = {m ∈ R \ P : z00 (m) > 0}, and denote z0 (S) = {z0 (m) : m ∈ S}. Then R \ supp(ρ) = z0 (S). More specifically, z0 : S → R \ supp(ρ) defines a bijection with inverse m0 . Proof. See [SC95, Theorems 4.1 and 4.2].  Let us first extend Proposition A.1 to handle the case x = 0 (cf. Proposition A.5 below). Lemma A.3. Denote m0 (C+ ) = {m0 (z) : z ∈ C+ }. For any m ∈ R \ P such that z00 (m) < 0, m cannot belong to the closure of m0 (C+ ). Proof. z0 defines an analytic function on C \ P . For any such m, the inverse function theorem implies z0 has an analytic inverse in a neighborhood B of m in C \ P . If m belongs to the closure of m0 (C+ ), then B ∩ m0 (C+ ) is non-empty. As z0 (m0 (z)) = z for z ∈ C+ by definition of m0 , the inverse of z0 on B is an analytic extension of m0 to z0 (B). By the open mapping theorem, z0 (B) is an open set in C containing m. On the other hand, as m0 is the Stieltjes transform of ρ, it permits an analytic extension only to C \ supp(ρ), and this extension is real-valued and increasing on R \ supp(ρ). Then z0 (B) ∩ R must belong to R \ supp(ρ) and z0 must be increasing on B ∩ R, but this contradicts that z00 (m) < 0.  Lemma A.4. Define g(q) = z0 (1/q) = −q +  M  1 X t2α tα − . N q + tα (79) α=1 Then for any c ∈ R, there is at most one value q ∈ R for which g(q) = c and g 0 (q) ≤ 0. Proof. Denote by P 0 = {−tα : tα 6= 0} the distinct poles of g, and let I1 , . . . , I|P 0 |+1 be the intervals of R \ P 0 in increasing order. For any c ∈ R, boundary conditions of g at P 0 imply that g(q) = c has at least one root q in each interval I2 , . . . , I|P 0 | , and hence at least |P 0 |−1 total roots. In addition, every q ∈ R where g(q) = c and g 0 (q) ≤ 0 contributes two additional roots to g(q) = c, counting multiplicity. As g(q) = c may be written as a polynomial equation in q of degree |P 0 |+1 by clearing denominators, it can have at most |P 0 |+1 total roots counting multiplicity, and hence there is at most one such q.  Proposition A.5. If rank(T ) > N , then m0 extends continuously to x = 0, and ρ has continuous density f0 (x) = (1/π)=m0 (x) at x = 0. If rank(T ) ≤ N , then for any sequence zn → 0 with zn ∈ C+ \ {0}, we have |m0 (zn )|→ ∞. 44 TRACY-WIDOM FOR COVARIANCE MATRICES Proof. Suppose rank(T ) > N . Taking imaginary parts of (13) yields M 1 X |tα m0 (z)|2 1− N |1 + tα m0 (z)|2 =m0 (z) =z = |m0 (z)|2 ! . α=1 C+ , Both =z > 0 and =m0 (z) > 0 for z ∈ whereas if |m0 (zn )|→ ∞ along any sequence zn ∈ C+ , then ! M rank(T ) 1 X |tα m0 (zn )|2 →1− 1− . N |1 + tα m0 (zn )|2 N α=1 When rank(T ) > N , this implies m0 (z) is bounded on all of C+ . In particular, it is bounded in a neighborhood of x = 0, and the result follows from the same proof as [SC95, Theorem 1.1]. (If m0 (zn ) → m ∈ C+ for any zn → x, then the limit exists and equals m by the open mapping theorem applied to z0 in a neighborhood of m, and the uniquness of m0 (z) as the root to (13) in C+ . If m0 (zn ) → m and m0 (zn0 ) → m0 for m, m0 ∈ R and two sequences zn → x and zn0 → x, then for each m00 ∈ [m, m0 ] there exists a sequence zn00 → x such that m0 (zn00 ) → m00 . Then z0 is constant on the interval [m, m0 ], implying m = m0 .) Suppose now rank(T ) ≤ N . Note (13) holds for z ∈ C+ \{0} by continuity of m0 . If m0 (zn ) → m for some finite m along any sequence zn ∈ C+ \{0} with zn → 0, then z0 (m) = limn z0 (m0 (zn )) = 0, and m ∈ / P . Rearranging (13) yields zm0 (z) = −1 + M 1 X 1 rank(T ) − , N N 1 + tα m0 (z) α=1 and taking real and imaginary parts followed by zn → 0 yields M 1 X tα =m . N |1 + tα m|2 α=1 α=1 P When rank(T ) ≤ N , the first equation implies <m 6= 0 and α tα /|1 + tα m|2 6= 0, and the second equation then implies =m = 0. Thus m ∈ R \ P . But recalling g(q) from (79), we have g(0) = 0 and g 0 (0) ≤ 0 when rank(T ) ≤ N , so Lemma A.4 implies g 0 (q) > 0 for every other q where g(q) = 0. Thus z00 (m) < 0, but this contradicts Lemma A.3. Hence |m0 (zn )|→ ∞.  1− M 1 X 1 + tα <m rank(T ) =− , N N |1 + tα m|2 0= We record the following consequence: Proposition A.6. If E∗ is a soft edge of ρ with m-value m∗ , then E∗ ∈ R∗ , m0 extends continuously to E∗ , and m0 (E∗ ) = m∗ . Proof. Recalling g(q) from (79), if E∗ = 0 is a soft edge, then g(−1/m∗ ) = 0 and g 0 (−1/m∗ ) = 0. Hence Lemma A.4 implies g 0 (0) > 0, so rank(T ) > N . Thus any soft edge E∗ belongs to R∗ . Propositions A.1 and A.5 then imply continuous extension of m0 to E∗ . Considering m ∈ R with z00 (m) > 0 and m → m∗ , Proposition A.2 implies m0 (z0 (m)) = m, while continuity of z0 and m0 yield z0 (m) → z0 (m∗ ) = E∗ and m0 (z0 (m)) → m0 (E∗ ). Hence m0 (E∗ ) = m∗ .  Using the above, we may establish Proposition 2.2. Proof of Proposition 2.2. Let g(q) be as in Lemma A.4. If mj is a local minimum (or maximum) of z0 , then qj = 1/mj is a local minimum (resp. maximum) of g, where qj = 0 if mj = ∞. Furthermore these are the only local extrema of g, and they are ordered as q1 < . . . < qn . We have Ej = g(qj ) for each j = 1, . . . , n. Let P 0 = {−tα : tα 6= 0} be the poles of g, and let I1 , . . . , I|P 0 |+1 be the intervals of R \ P 0 in increasing order. Denoting S 0 = {q ∈ R \ P 0 : g 0 (q) < 0}, TRACY-WIDOM FOR COVARIANCE MATRICES 45 Proposition A.2 is rephrased in terms of g as R \ supp(ρ) = g(S 0 \ {0}). (80) (We must remove 0 from S 0 , as m = ∞ is not included in S.) As g 000 (q) > 0 for all q ∈ R \ P 0 , we have that g 0 (q) is convex on each Ij . Together with the boundary conditions g 0 (q) → ∞ as q → P 0 and g 0 (q) → −1 as q → ±∞, this implies I1 contains the single local extremum q1 (a minimum), I|P 0 |+1 contains the single local extremum qn (a maximum), and each Ij for j = 2, . . . , |P 0 | contains either 0 or 2 local extrema (a maximum followed by a minimum). Hence S 0 is a union of open intervals, say J1 , . . . , Jr , with at most one such interval contained in each Ij . Lemma A.4 verifies g(Jj ) ∩ g(Jk ) = ∅ (81) for all j 6= k. Together with (80), this verifies that the edges of ρ are precisely the values g(qj ), with a local maximum qj corresponding to a left edge and a local minimum qj corresponding to a right edge. If 0 ∈ S 0 , then it belongs to the interior of some open interval Jj , and supp(ρ) contains an isolated point at 0 which is not considered an edge. This establishes (a) and (b). The ordering in part (c) follows from a continuity argument as in [KY16, Lemma 2.5]: Define for λ ∈ (0, 1]  M  λ X t2α gλ (q) = −q + tα − . N q + tα α=1 is increasing in λ for each fixed q ∈ R \ P 0 . Hence for each local minimum (or g, we may define a path qj (λ), continuous and increasing (resp. decreasing) in λ, such that qj (1) = qj and qj (λ) remains a local minimum (resp. maximum) of gλ for each λ ∈ (0, 1]. As λ & 0, each qj (λ) converges to a pole −tα in P 0 , with gλ (qj (λ)) & tα if qj (λ) % −tα and gλ (qj (λ)) % tα if qj (λ) & −tα . Hence for sufficiently small λ > 0, Note that gλ0 (q) maximum) qj of gλ (q1 (λ)) > . . . > gλ (qn (λ)). Lemma A.4 applies to gλ for each fixed λ, implying in particular that gλ (qj (λ)) 6= gλ (qk (λ)) for any j 6= k. Hence by continuity in λ, the above ordering is preserved for all λ ∈ (0, 1]. In particular it holds at λ = 1, which establishes (c). Finally, for part (d), Proposition A.6 yields mj ∈ R∗ and m0 (Ej ) = mj for any soft edge Ej . The previous convexity argument implies g 00 (qj ) 6= 0 for any local extremum qj , and hence z000 (mj ) 6= 0. Taking x ∈ supp(ρ) with x → Ej , continuity of m0 implies m0 (x) → mj . As z0 is analytic at mj and z00 (mj ) = 0, a Taylor expansion yields, as x → Ej , x − Ej = z0 (m0 (x)) − z0 (mj ) = Since =m0 (x) > 0 and =mj = 0, this yields s m0 (x) − mj = z000 (mj ) (1 + o(1))(m0 (x) − mj )2 . 2 2 (x − Ej )(1 + o(1)), z000 (mj ) where we take the square root with branch cut on the positive real axis and having positive imaginary part. Taking imaginary parts and recalling f0 (x) = (1/π)=m0 (x) yields (d).  A.2. Behavior near regular edges. We now turn to the implications of edge regularity and prove Propositions 2.7, 3.6, and 3.7; the arguments are similar to those of [KY16, Appendix A]. We first quantify continuity of m0 , uniformly in N , near a regular edge E∗ . In particular this implies that when |z − E∗ | is small, |m0 (z) − m∗ | is also small. 46 TRACY-WIDOM FOR COVARIANCE MATRICES Lemma A.7. Suppose Assumption 2.4 holds and E∗ is a regular edge with m-value m∗ . Then there exist constants C, δ > 0 such that (E∗ − δ, E∗ + δ) ⊂ R∗ , and for every z ∈ C+ with |z − E∗ |< δ, |m0 (z) − m∗ |2 < C|z − E∗ |. Proof. Applying Proposition 3.5, take a constant ν > 0 such that |m∗ |> ν. Fix a constant c ≡ c(τ ) < min(ν, τ ) to be determined later, and define  δN = min c, inf(δ > 0 : |m0 (z) − m∗ |< c for all z ∈ C+ ∪ R∗ such that |z − E∗ |≤ δ) . As m0 (E∗ ) = m∗ , continuity of m0 at E∗ implies δN > 0. Furthermore, if rank(T ) ≤ N so that 0∈ / R∗ , then the divergence of m0 at 0 from Proposition A.5 implies (E∗ − δN , E∗ + δN ) ⊂ R∗ . A priori, δN may depend on N . We will first establish that |m0 (z) − m∗ |2 < C|z − E∗ | when |z − E∗ |≤ δN . This will then imply that δN is bounded below by a constant δ ≡ δ(τ ). Consider z ∈ C+ with |z − E∗ |≤ δN . Let us write as shorthand m = m0 (z). Then |z − E∗ | = |z0 (m) − z0 (m∗ )| M 1 1 X t2α = |m − m∗ | − + mm∗ N (1 + tα m)(1 + tα m∗ ) = |m − m∗ |2 − α=1 M X 1 1 + mm2∗ N α=1 t3α , (1 + tα m)(1 + tα m∗ )2 (82) where the last line adds to the quantity inside the modulus 0= z00 (m∗ ) M 1 1 X t2α = 2− . m∗ N (1 + tα m∗ )2 α=1 As |m − m∗ |< c by definition of δN , we have for each non-zero tα 1 1 c − , < m m∗ ν(ν − c) 1 c 1 −1 − −1 < τ (τ − c) . m + tα m∗ + tα Applying this to (82) and recalling γ −2 = |z000 (m∗ )|/2 yields   c c |z − E∗ |> |m − m∗ |2 γ −2 − 3 − d−1 3 . ν (ν − c) τ (τ − c) As γ −2 > τ 2 , this implies |m0 (z) − m∗ |2 < C|z − E∗ | when c is chosen sufficiently small, as desired. By continuity of m0 and definition of δN , either δN = c or there must exist z ∈ C+ such that |z − E∗ |= δN and |m0 (z) − m∗ |= c. In the latter case, for this z we have c2 = |m0 (z) − m∗ |2 < C|z − E∗ |= CδN , implying δN > c2 /C. Thus in both cases δN is bounded below by a constant, yielding the lemma.  Next we bound the third derivative of z0 near the m-value of a regular edge. Lemma A.8. Suppose Assumption 2.4 holds and E∗ is a regular edge with m-value m∗ . Then there exist constants C, δ > 0 such that z0 is analytic on the disk {m ∈ C : |m − m∗ |< δ}, and for every m in this disk, |z0000 (m)|< C. TRACY-WIDOM FOR COVARIANCE MATRICES 47 Proof. Proposition 3.5 ensures |m∗ |> ν for a constant ν > 0. Taking δ < min(ν, τ ), the disk D = {m ∈ C : |m − m∗ |< δ} does not contain any pole of z0 , and hence z0 is analytic on D. We compute 6 1 X 6 z0000 (m) = 4 − , −1 m N (tα + m)4 α:tα 6=0 |z0000 (m)|< so d > c. C for m ∈ D and sufficiently small δ by the bounds |m∗ |> ν, |m∗ + t−1 α |> τ , and  Propositions 2.7, 3.6, and 3.7 now follow: Proof of Proposition 3.6. This follows from Taylor expansion of z000 at m∗ , the condition |z000 (m∗ )|= 2γ −2 > 2τ 2 implied by regularity, and Lemma A.8.  Proof of Proposition 2.7(a). Let C, δ > 0 be as in Lemma A.7. Reducing δ as necessary and applying Lemma A.8, we may assume z0 is analytic with |z0000 (m)|< C 0 over the disk √ D = {m ∈ C : |m − m∗ |< Cδ}, for a constant C 0 > 0. Let E ∗ be the closest other edge to E∗ , and suppose E ∗ ∈ (E∗ −δ, E∗ +δ). Let m∗ be the m-value for E ∗ . Then Lemma A.7 implies m∗ ∈ D. Applying a Taylor expansion of z00 , z0000 (m) ∗ (m − m∗ )2 2 for some m between m∗ and m∗ . Applying 0 = z00 (m∗ ) = z00 (m∗ ), |z000 (m∗ )|= 2γ −2 > 2τ 2 , and |z0000 (m)|< C 0 , we obtain |m∗ − m∗ |> 4τ 2 /C 0 . Then Lemma A.7 yields |E ∗ − E∗ |> c for a constant c > 0. Reducing δ to c if necessary, we ensure (E∗ − δ, E∗ + δ) contains no other edge E ∗ . The condition (E∗ − δ, E∗ + δ) ⊂ R∗ was established in Lemma A.7.  z00 (m∗ ) = z00 (m∗ ) + z000 (m∗ )(m∗ − m∗ ) + Proof of Propositions 3.7 and 2.7(b). Taking δ sufficiently small, Lemma A.7 implies |m0 (z)−m∗ |< √ Cδ for all z ∈ D0 . Then |m0 (z)| 1 and |1 + tα m0 (z)| 1 by Proposition 3.5. Reducing δ if necessary, by Lemma A.8 we may also ensure z0 is analytic with |z0000 (m)|< C 0 on √ D = {m ∈ C : |m − m∗ |< Cδ}. Note z = z0 (m0 (z)) by (13) while E∗ = z0 (m∗ ). Then taking a Taylor expansion of z0 and applying the conditions z00 (m∗ ) = 0, z000 (m∗ ) = 2γ −2 , and |z0000 (m̃)|< C 0 for all m̃ ∈ D, we have where |r(z)|< C √ 0 z − E∗ = z0 (m0 (z)) − z0 (m∗ ) = (γ −2 + r(z))(m0 (z) − m∗ )2 (83) Cδ/6. Taking δ sufficiently small, we ensure |γ −2 + r(z)| 1, arg(γ −2 + r(z)) ∈ (−ε, ε) (84) for an arbitrarily small constant ε > 0, where arg(z)pdenotes the complex argument. Taking the √ modulus of (83) on both sides yields |m0 (z) − m∗ | |z − E∗ |  κ + η. For =m0 (z), suppose E∗ is a right edge. (The case of a left edge is similar.) By Proposition 2.7(a), we may assume (E∗ − δ, E∗ ) ⊂ supp(ρ) and (E∗ , E∗ + δ) ⊂ R \ supp(ρ). First suppose z 6= E∗ and E ≡ <z ≤ E∗ . As =m0 (z) > 0 by definition, (83) yields p m0 (z) − m∗ = (z − E∗ )/(γ −2 + r(z)) where the square-root has branch cut on the positive real positive imaginary part. Applying √ axis and √ √ arg(z −E∗ ) ∈ [π/2, π) and (84), we have =m0 (z)  = z − E∗  | z − E∗ | κ + η. By continuity of m0 , this extends to z ∈ (E∗ − δ, E∗ ) on the real axis. Hence Proposition 2.7(b) also follows, as f0 (x) = π −1 =m0 (x). 48 TRACY-WIDOM FOR COVARIANCE MATRICES Finally, suppose E > E∗ . Let us write Z Z η η =m0 (z) = ρ(dλ) + ρ(dλ) ≡ I + II. 2 2 2 2 |λ−E∗ |<δ (λ − E) + η |λ−E∗ |≥δ (λ − E) + η 2 Reducing δ to δ/2, we may √ assume the closest edge to E is E∗ . Then we have II ∈ [0, η/δ ]. For I, as ρ has density f0 (x)  E∗ − x for x ∈ (E∗ − δ, E∗ ) while (E∗ , E∗ + δ) ⊂ R \ supp(ρ), Z E∗ Z δ p √ η η I E∗ − λ dλ = x dx. 2 2 2 2 E∗ −δ (λ − E) + η 0 η + (κ + x) √ Considering separately the integral over x ∈ √ [0, κ + η] and x ∈ [κ + η, δ], we obtain I  η/ η + κ.  Then II ≤ C · I, and this yields =m0 (z)  η/ η + κ. Appendix B. Local law We show that the proof of the local law in [KY16] extends to non-positive-definite T with minor and cosmetic modifications. As in [KY16], we may deduce from this Theorems 2.8 and 2.9 and Corollary 3.12. We follow the approach of [KY16] and establish a local law over a spectral domain that satisfies an abstract stability condition. We will use a modification of the original stability condition in [BEK+ 14, Lemma 4.5], rather than the one in [KY16], as we find its statement and verification a bit clearer. (The constant C is not appearing in both the assumption at w ∈ L(z) and the implication at z, so larger C indicates a weaker condition.) Definition B.1. Fix a bounded set S ⊂ R and a constant a > 0, and let D = {z ∈ C+ : <z ∈ S, =z ∈ [N −1+a , 1]}. For z = E + iη ∈ D, denote L(z) = {z} ∪ {w ∈ D : <w = E, =w ∈ [η, 1] ∩ (N −6 N)}. For a positive bounded function g : D → (0, C), the Marcenko-Pastur equation (13) is g -stable on D if the following holds for some constant C > 0: Let u : C+ → C+ be the Stieltjes transform of any probability measure, and let ∆ : D → (0, ∞) be any function satisfying • (Boundedness) ∆(z) ∈ [N −2 , (log N )−1 ] for all z ∈ D, • (Lipschitz) |∆(z) − ∆(w)|≤ N 2 |z − w| for all z, w ∈ D, • (Monotonicity) η 7→ ∆(E + iη) is non-increasing for each E ∈ S. If z ∈ D is such that |z0 (u(w)) − w|≤ ∆(w) for all w ∈ L(z), then |u(z) − m0 (z)|≤ C∆(z) p . g(z) + ∆(z) (85) Theorem B.2 (Abstract local law). Suppose Assumptions 2.4 and 2.5 hold. Fix S ⊂ R and a constant a > 0, and denote D = {z ∈ C+ : <z ∈ S, =z ∈ [N −1+a , 1]}. Suppose for constants C, c > 0 and a bounded function g : D → (0, C) that (13) is g-stable on D and c < |m0 (z)|< C, |1 + tα m0 (z)|> c, =m0 (z) < Cg(z) for all z = E + iη ∈ D. Then, letting T , Π0 , G, and mN be as in Theorem 3.10, and denoting s =m0 (z) 1 Ψ(z) = + , Nη Nη TRACY-WIDOM FOR COVARIANCE MATRICES 49 (a) (Anisotropic law) Uniformly over z ∈ D and all v, w ∈ CN +M with kvk= kwk= 1, v ∗ T −1 (G(z) − Π0 (z))T −1 w ≺ Ψ(z). (b) (Averaged law) Uniformly over z ∈ D,  mN (z) − m0 (z) ≺ min 1 Ψ(z)2 , N η g(z)  . Proof. The proof is the same as [KY16, Theorems 3.21 and 3.22], with only cosmetic differences which we indicate here. The notational identification with [KY16] is T ↔ Σ and tα ↔ σi . (We continue to use Greek indices for IM and Roman indices for IN , although this is reversed from the convention in [KY16].) The proof follows three steps: 1. The averaged law and an entrywise law (i.e. for v, w being standard basis vectors) when T is diagonal and X has Gaussian entries. 2. The anisotropic law when X has Gaussian entries. 3. The averaged law and anisotropic law for general X. As in [KY16], we may assume T is invertible. The non-invertible case follows by continuity. Step 1 follows [KY16, Section 5], which in turn is based on [PY14] and [BEK+ 14]. Denoting (S) by GM and GM the lower-right blocks of G and G(S) , all of the resolvent identities of [KY16, Lemma 4.4] remain valid for non-positive-definite T , and [KY16, Eqs. (4.17)–(4.20)] and [KY16, Lemmas 4.8 and 4.9] also hold with identical proofs. Denote tA = 1 for A = i ∈ IN and tA = tα for A = α ∈ IM , and define X X (α) (i) (i) (α) Zi = Gαβ Xαi Xβi − N −1 Tr GM , Zα = Gij Xαi Xαj − N −1 Tr GN , i,j∈IN α,β∈IM   X 1 X t2α [Z] = Zα  , Zi + N (1 + tα m0 )2 i∈IN α∈IM s Θ = N −1 X (G − Π0 )ii + M −1 i∈IN Λo = max A6=B∈I X (G − Π0 )αα , ΨΘ = α∈IM |GAB | , |tA tB | Λ = max A,B∈I |(G − Π0 )AB | , |tA tB | =m0 + Θ , Nη Ξ = {Λ ≤ (log N )−1 }. These all implicitly depend on an argument z ∈ D. Then the same steps as in [KY16, Section 5] yield, either for η = 1 or on the event Ξ, for all z ∈ D and A ∈ I, |ZA |, Λo ≺ ΨΘ , z0 (mN (z)) − z − [Z] ≺ Ψ2Θ ≺ (N η) (86) −1 . (87) (In the argument for η = 1, the use of [KY16, Eq. (4.16)] may be replaced by [KY16, Lemmas 4.8 and 4.9]. In [KY16, Eqs. (5.4), (5.11), etc.], σi is to be replaced by the positive quantity |tα |.) Applying (86) and the resolvent identities for Gii and Gαα , we may also obtain on the event Ξ Θ ≺ |mN − m0 |+|[Z]|+(N η)−1 , Λ ≺ |mN − m0 |+ΨΘ . (88) The bound (86) yields the initial estimate [Z] ≺ ΨΘ ≺ (N η)−1/2 on Ξ. The conditions of Definition B.1 hold for ∆ = (N η)−1/2 , so (87), the assumed stability of (13), and the stochastic continuity argument of [BEK+ 14, Section 4.1] yield that Ξ holds with high probability (i.e. 1 ≺ 1{Ξ}) and Λ ≺ (N η)−1/4 on all of D. Next, applying the fluctuation averaging result of [KY16, 50 TRACY-WIDOM FOR COVARIANCE MATRICES Lemma 5.6] (whose proof uses resolvent identities as in Step 2 below and does not require positivedefinite T ), we obtain for any c ∈ (0, 1] the implications s =m0 + (N η)−c =m0 + (N η)−c ⇒ [Z] ≺ ≡ ∆(z). Θ ≺ (N η)−c ⇒ ΨΘ ≺ Nη Nη The conditions of Definition B.1 hold for this ∆(z) by known properties of the Stieltjes transform, so applying (87), stability of (13), and 1 ≺ 1{Ξ(w)} for all w ∈ L(z), we have the implications ∆(z) ∆(z) p p ⇒Θ≺ + ∆(z) + (N η)−1 . g(z) + ∆(z) g(z) + ∆(z) Θ ≺ (N η)−c ⇒ |mN − m0 |≺ (89) We bound ∆(z) ≤ C(N η)−1 and ∆(z) =m0 (z) p + (N η)−(1+c)/2 < (N η)−1 + (N η)−(1+c)/2 , ≤ N η g(z) g(z) + ∆(z) where this applies =m0 (z) < g(z). Hence Θ ≺ (N η)−c ⇒ Θ ≺ (N η)−(1+c)/2 . Initializing to c = 1/4 and iterating, we obtain Θ ≺ (N η)−1+ε for any ε > 0, so |mN − m0 |≤ Θ ≺ (N η)−1 . Applying (89) once more with c = 1, we have for c = 1 that ∆(z) ≤ Ψ(z)2 and hence also |mN − m0 |≺ Ψ2 /g. This yields both bounds in the averaged law. The entrywise law Λ ≺ Ψ follows from (88). Step 2, the anisotropic law for Gaussian X, follows [KY16, Section 6] with details as in [BEK+ 14, Section 5]. Upon applying rotational invariance of X and diagonalizing T , we must establish, for diagonal T , the bounds E|Z|p ≺ Ψp and E|Z 0 |p ≺ Ψp where X vα Gαi X vα Gαβ wβ , Z0 = , Z= |tα tβ | |tα | α∈IM α6=β∈IM v, w ∈ CIM are fixed unit vectors, i ∈ IN is a fixed index, and p is an arbitrarily large constant power. Let α, β, δ ∈ IM and S ⊂ IM denote distinct indices. For E|Z|p , we carry out the graph operations (a,b,c) of [BEK+ 14, Section 5.7], where operation (a) is implemented by the identities (S) (Sδ) (S) (S) Gδβ |tδ | G = − |tδ | αδ , |tα tβ | |tα tβ | |tα tδ | |tδ tβ | G(S) δδ ! (S) 2 (S) (Sδ) Gαδ Gαα Gαα |tδ | = − |tα tδ | , (S) |tα | |tα | |tα tδ | Gδδ ! (S) 2 Gαδ |tα | |tα | |tα | |tα | |tδ | , = (Sδ) − |tα tδ | (S) (S) (Sδ) (S) |tα tδ | Gαα Gαα Gαα Gαα Gδδ Gαβ Gαβ operation (b) is implemented by the identity (S) (Sα) (S) Gαα Gββ = |tα tβ | |tα | |tβ | Gαβ X i,j∈IN and operation (c) is implemented by the identities X |tα | (Sα) = ±1 ± t Xαi Gij Xαj , α (S) Gαα i,j∈IN (Sαβ) Xαi Gij Xβj , TRACY-WIDOM FOR COVARIANCE MATRICES (S) Gαα =± P |tα | 1 + tα 1 (Sα) i,j∈IN =± L−1 X − k=0 51 Xαi Gij 1 1 + tα m0 k+1 Xαj  tkα  k X (Sα) Xαi Gij Xαj − m0  + O≺ (ΨL ), i,j∈IN which all follow from the resolvent identities in Lemma 3.9. Applying these operations according (S) to [BEK+ 14, Section 5], and finally applying the bounds |tα |≤ C, |1 + tα m0 |≥ c, and Gαα /tα ≺ 1, (S) (S) tα /Gαα ≺ 1, and Gαβ /tα tβ ≺ Ψ for α 6= β ∈ IM \ S from the entrywise law, we obtain the bound on E|Z|p . The bound on E|Z 0 |p follows similarly. Step 3, the full result for general X, follows exactly as in [KY16, Sections 7, 8, and 9]. The only proof modification required is in [KY16, Lemma 7.12], where the spectral decomposition in [KY16, Eq. (4.15)] for G may be replaced by   N X uk u0k 0 0 + , G= 0 Σ λk − z k=1 where Σ̂ = PN 0 k=1 λk ζk ζk is the spectral decomposition of Σ̂ = X 0 T X and where   ζk uk = . T Xζk This follows from (22) and the definition of GN . Then the proof of [KY16, Lemma 7.12] holds with this definition of uk , where we still have =Gxx (z) = N X k=1 hx, uk i2 η (λk − E)2 + η 2 for z = E + iη. The remainder of Step 3 is identical to the proof in [KY16]. In particular, as g(z) is bounded, the averaged law bound   1 Ψ(z)2 , Φ(z) ≡ min N η g(z) from Step 1 satisfies [KY16, Eq. (9.1)], so [KY16, Proposition 9.1] carries through.  We now verify Theorems 3.10, 2.8, 2.9, and Corollary 3.12. Most of the remaining work is to verify the stability condition in Definition B.1. Lemma B.3. Suppose Assumption 2.4 holds and E∗ is a regular edge. Then for some constants C, δ > 0, the following holds: Define D by (23) for any a > 0. For z = E + iη ∈ D, denoting √ κ = |E − E∗ |, let g(z) = κ + η. Then (13) is g-stable on D. Proof. The proof follows [BEK+ 14, Lemma 4.5] and [KY16, Lemma A.5]: Fix z ∈ D and suppose |z0 (u(w)) − w|≤ ∆(w) for all w ∈ L(z). We wish to show C∆(z) |u(z) − m0 (z)|≤ p . κ + η + ∆(z) (90) Suppose first =z > ν for a constant ν > 0. Then =m0 (z) > cν. By assumption |z0 (u(z)) − z|≤ ∆(z) ≤ (log N )−1 , so also =z0 (u(z)) > cν for a constant c > 0. Since m0 is (cν)−2 -Lipschitz over {z : =z > cν}, this yields |u(z) − m0 (z)|= |m0 (z0 (u(z))) − m0 (z)|≤ ∆(z)/(cν)2 , 52 TRACY-WIDOM FOR COVARIANCE MATRICES and hence (90) holds at z. Thus it remains to check the case =z ≤ ν. Taking δ and ν sufficiently small, and applying Lemma A.7 and |z0 (u(w)) − w|≤ ∆(w) ≤ (log N )−1 , we may assume |m0 (w) − m∗ |< ε, |u(w) − m∗ |< ε (91) for all w ∈ L(z) ∩ {w : =w ≤ ν}, where ε > 0 is an arbitrarily small constant. For any w ∈ L(z) ∩ {w : =w ≤ ν}, writing u = u(w), m = m0 (w), and ∆0 (w) = z0 (u) − w, we verify ! M m−u 1 X t2α um ∆0 (w) = z0 (u) − z0 (m) = −1 + um N (1 + tα u)(1 + tα m) α=1 2 = α(w)(m − u) + β(w)(m − u) for M t2α 1 1 X , · u N (1 + tα u)(1 + tα m)2 α=1 ! M 1 X t2α m2 m −1 + = − z00 (m). N (1 + tα m)2 u α(w) = − β(w) = 1 um α=1 Denoting the two values R1 (w), R2 (w) = − β(w) ± p β(w)2 + 4α(w)∆0 (w) , 2α(w) (92) we obtain m0 (w) − u(w) ∈ {R1 (w), R2 (w)}. We bound α(w) and β(w) under (91): Applying 0 = z00 (m∗ ), we have M M m∗ z000 (m∗ ) 1 1 X t2α m∗ 1 X t2α =− 2 + = − , 2 m∗ N (1 + tα m∗ )3 N (1 + tα m∗ )3 α=1 α=1 Z m Z mZ x 0 00 00 z0000 (y)dy dx. z0 (m) = z0 (x)dx = (m − m∗ )z0 (m∗ ) + m∗ m∗ m∗ Applying Propositions 3.5, √ 3.7, and Lemma A.8, for sufficiently small ε in (91) we obtain |α(w)| 1 and |β(w)| |m − m∗ | κ + ηw . (Here and below, ηw = =w.) The remainder of the argument is as in [BEK+ 14, Lemma 4.5]: Applying the bounds on |α(w)| and |β(w)| to (92), there exists a constant C0 > 0 for which, for all w ∈ L(z) ∩ {=w ≤ ν}, C0 |∆0 (w)| C0 ∆(w) min(|R1 (w)|, |R2 (w)|) ≤ p ≤p , κ + ηw + |∆0 (w)| κ + ηw + ∆(w) p p |R1 (w) − R2 (w)| ≤ C0 κ + ηw + |∆0 (w)| ≤ C0 κ + ηw + ∆(w), p p |R1 (w) − R2 (w)| ≥ C0−1 (κ + ηw − |∆0 (w)|)+ ≥ C0−1 (κ + ηw − ∆(w))+ , (93) (94) (95) where the second inequality in each case applies |∆0 (w)|≤ ∆(w) and monotonicity. Increasing C0 as necessary, we may assume also |u(w) − m0 (w)|≤ p C0 ∆(w) κ + ηw + ∆(w) for w ∈ L(z) ∩ {w : =w > ν}, as we have established (90) in this case. If C0 ∆(w) 1 p p > (κ + ηw − ∆(w))+ 2C0 κ + ηw + ∆(w) (96) TRACY-WIDOM FOR COVARIANCE MATRICES 53 for any w ∈ L(z), then by monotonicity of ∆(w) in ηw , this holds also at w = z. Then rearranging yields κ + η < C∆(z), so (93), (94), and m0 (z) − u(z) ∈ {R1 (z), R2 (z)} yield (90) as desired. Otherwise, C0 ∆(w) 1 p p ≤ (κ + ηw − ∆(w))+ 2C0 κ + ηw + ∆(w) for all w ∈ L(z). If there exists w ∈ L(z) for which (96) does not hold, then letting w∗ be the one with maximal imaginary part, we have =w∗ ≤ ν, so (93–95) hold at w = w∗ . This implies 1 p 2C0 ∆(w∗ ) |u(w∗ ) − m0 (w∗ )|= max(|R1 (w∗ )|, |R2 (w∗ )|) > (κ + ηw∗ − ∆(w∗ ))+ ≥ p , C0 κ + ηw∗ + ∆(w∗ ) while (96) holds at w = w+ ≡ w∗ + iN −6 . However, from the conditions N −2 ≤ ∆(w) ≤ 1, ηw ≥ N −1 , N 2 -Lipschitz continuity of u and m0 , and N 2 -Lipschitz continuity of ∆, we verify |u(w∗ ) − u(w+ )|≤ CN −4 , |m0 (w∗ ) − m0 (w+ )|≤ CN −4 , ∆(w+ ) ∆(w∗ ) p −p ≤ CN −2.5 , κ + ηw+ + ∆(w+ ) κ + ηw∗ + ∆(w∗ ) ∆(w∗ ) p ≥ cN −2 κ + ηw∗ + ∆(w∗ ) for constants C, c > 0, which contradicts the above. Thus (96) holds at each w ∈ L(z), and in particular at w = z, concluding the proof.  √ Proof of Theorem 3.10. This follows from Theorem B.2 applied with g(z) = κ + η, and Proposition 3.7 and Lemma B.3.  Proof of Theorem 2.9. The argument follows [PY14, Eq. (3.4)]. Consider the case of a right edge E∗ . (A left edge is analogous.) For each E ∈ [E∗ + N −2/3+ε , E∗ + δ], denoting κ = E − E∗ , consider z = E + iη for η = N −1/2−ε/4 κ1/4 ∈ [N −2/3 , 1], where the inclusion holds for all large N because κ ∈ [N −2/3+ε , δ]. Proposition 3.7 implies =m0 (z) ≤ √ Cη Cη ≤ √ = C(N η)−1 N −ε/2 . κ+η κ √ Also by Proposition 3.7 and Lemma B.3, we may apply Theorem B.2 with g(z) = κ + η. The above bound on =m0 (z) yields Ψ(z)2 ≤ C/(N η)2 , and hence Theorem B.2(b) implies |mN (z) − m0 (z)|≺ (N η)2 1 1 1 √ = 3+ε/2 4 ≤ (N η)−1 N −ε/2 , √ ≤ 2 κ+η (N η) κ N η where the last bound uses η ≥ N −2/3 . Thus we obtain =mN (z) ≺ C(N η)−1 N −ε/2 . As the number of eigenvalues of W in [E − η, E + η] is at most 2N η · =mN (z), this implies W has no eigenvalues in this interval for all large N . The result follows from a union bound over a grid of such values E.  Proof of Theorem 2.8. By the bound kW k≤ kT kkX ∗ Xk and a spectral norm bound on X ∗ X, e.g. from [BEK+ 14, Theorem 2.10], we may take C0 sufficiently large such that kW k≤ C0 with probability at least N −D , for any D > 0 and all N ≥ N0 (D). This implies also supp(ρ) ⊂ [−C0 , C0 ]. For some small a > 0, let D = {z ∈ C+ : <z ∈ [−C0 , C0 ] \ supp(ρ)δ , =z ∈ [N −1+a , 1]}. 54 TRACY-WIDOM FOR COVARIANCE MATRICES For each z = E + iη ∈ D, we have δ ≤ |E − λ|≤ 2C0 for all λ ∈ supp(ρ), hence Z η =m0 (z) = ρ(dλ)  η (λ − E)2 + η 2 and Z |m0 (z)|≤ 1 ρ(dλ) < C, |λ − z| |m00 (z)|≤ Z 1 ρ(dλ) < C |λ − z|2 for a constant C > 0. We verify the conditions of Theorem B.2 on D, for g(z) ≡ 1. For any E ∈ [−C0 , C0 ] \ supp(ρ)δ , Proposition A.2 implies there is m ∈ R such that z0 (m) = E, m0 (E) = m, and z00 (m) > 0. If m is close to 0, i.e. |m|< 1/(2kT k), then m is separated from the poles of z0 : |m + t−1 α |> 1/(2kT k) for each non-zero tα . Note z00 (x) ≤ 1/x2 ≤ 4kT k2 when |x|≥ 1/(2kT k). Thus if m is far from 0, i.e. |m|≥ 1/(2kT k), then |m − m∗ |> δ/(4kT k2 ) for any local minimum or maximum m∗ of z0 , as |E − E∗ |> δ for the corresponding edge E∗ . m is separated from all non-zero poles of z0 by such 0 an m∗ , so we have |m + t−1 α |> c0 for some c0 > 0 in both cases. Applying |m0 (z)|< C, this yields |m0 (z) + t−1 α |> c0 /2 for all z ∈ D with =z < C/(2c0 ). For =z ≥ C/(2c0 ), we have |m0 (z) + t−1 α |≥ =m0 (z) > c. As |m0 (z)|< C, considering separately the cases |tα |> 1/(2C) and |tα |≤ 1/(2C) yields |1 +tα m0 (z)|> c for all non-zero tα . Applying |z|≤ C0 + 1 and |m0 (z) + t−1 α |> c to (13), we also obtain |m0 (z)|> c. It remains to check that (13) is stable in the sense of Definition B.1 for g(z) ≡ 1, but this follows easily: Suppose z ∈ D satisfies |z0 (u(z)) − z|≤ ∆(z) ≤ (log N )−1 . As |m00 (z)|< C still holds on a (log N )−1 neighborhood of D, we have p |u(z) − m0 (z)|= |m0 (z0 (u(z)) − m0 (z)|≤ C|z0 (u(z)) − z|≤ C∆(z) = C min( ∆(z), ∆(z)). Thus Theorem B.2(b) applies to yield |mN (z) − m0 (z)|≺ Ψ(z)2  N −1 + (N η)−2 for any z ∈ D. Taking η = N −2/3 and applying also =m0 (z)  η, we obtain =mN (z) ≺ N −2/3 < 1/(2N η). Then for any D > 0, W has no eigenvalues in [E − η, E + η] with probability 1 − N −D for N ≥ N0 (D). The result follows from a union bound over a grid of values E ∈ [−C0 , C0 ] \ supp(ρ)δ , together with bound kW k≤ C0 .  Proof of Corollary 3.12. The proof is similar to [EYY12b, Theorem 2.4]: Consider two matrices Σ̂ = X 0 T X and Σ̃ = Y 0 T Y where Y has independent Normal(0, 1/N ) Gaussian entries. Applying Lemma 5.1 as in the proof of Theorem 2.10, it suffices to show |E[K(X) − K(X̌)]|= o(1), where X ≡ X(s, N ε , N −2/3−9ε ) for fixed s ∈ R, and X̌ is the same quantity defined by Σ̃. Introducing a Lindeberg sequence that swaps the entries of X for Gaussian entries of Y one at a time, it suffices to show E[K(X) − K(X̌)] ≺ N −13/6+Cε for each such swap X ↔ X̌ and some constant C > 0. Writing N =mN (z) = η Tr GN (z)GN (z), the proof then follows [EYY12b, Theorem 2.4], where we expand the linearized resolvent G from (21) as Ǧ = G + GV Ǧ = . . . = G + GV G + (GV )2 G + (GV )3 G + (GV )4 Ǧ with V = G−1 − Ǧ−1 . V has a symmetric pair of non-zero entries, and all other entries 0. The proof of [EYY12b, Theorem 2.4] then carries through using the resolvent bounds of Lemma 5.2, where we may ignore the tα ’s (as they are bounded) and use simply Giα , Gαβ ≺ Ψ and Gαα ≺ 1. We note that there is no separate case of “diagonal entry swaps” in our setting, and in [EYY12b, Eq. (6.58)] we can only have k = 0 or 1, as one index of the replaced entry belongs to IM and thus TRACY-WIDOM FOR COVARIANCE MATRICES 55 cannot coincide with i, j ∈ IN . The analogue of [EYY12b, Lemma 6.6] that is required to conclude the proof is E[K 0 (X)Gij Gjk Gαi ] ≺ N −4/3+Cε (97) for distinct entries i, j, k ∈ IN and α ∈ IM . This follows by applying Lemma 5.6 and the bounded (α) (α) second-derivative of K to replace X, Gij , Gjk by X(α) , Gij , Gjk , and then applying Gαi = Gαα X k (α) Gik Xαk = − X (α) tα Gik Xαk + O≺ (N −2/3+2ε ) 1 + tα m∗ k as in the proof of Lemma 5.9. The partial expectation Eα of the leading order term is 0, thus yielding (97). We omit further details and refer the reader to [EYY12b].  References [Ame85] Yasuo Amemiya. What should be done when an estimated between-group covariance matrix is not nonnegative definite? The American Statistician, 39(2):112–117, 1985. [BAC+ 15] Mark W Blows, Scott L Allen, Julie M Collet, Stephen F Chenoweth, and Katrina McGuigan. The phenome-wide distribution of genetic variance. The American Naturalist, 186(1):15–30, 2015. [BBAP05] Jinho Baik, Gérard Ben Arous, and Sandrine Péché. Phase transition of the largest eigenvalue for nonnull complex sample covariance matrices. The Annals of Probability, 33(5):1643–1697, 2005. [BEK+ 14] Alex Bloemendal, László Erdos, Antti Knowles, Horng-Tzer Yau, and Jun Yin. Isotropic local laws for sample covariance and generalized Wigner matrices. Electronic Journal of Probability, 19(33):1–53, 2014. [BM15] Mark W Blows and Katrina McGuigan. The distribution of genetic variance across phenotypic space and the response to selection. Molecular ecology, 24(9):2056–2072, 2015. [BPZ13] Zhigang Bao, Guangming Pan, and Wang Zhou. Local density of the spectrum on the edge for sample covariance matrices with general population. Technical report, 2013. [BS98] Zhi-Dong Bai and Jack W Silverstein. No eigenvalues outside the support of the limiting spectral distribution of large-dimensional sample covariance matrices. The Annals of Probability, 26(1):316–345, 1998. [BS06] Jinho Baik and Jack W Silverstein. Eigenvalues of large sample covariance matrices of spiked population models. Journal of Multivariate Analysis, 97(6):1382–1408, 2006. [EKY13] László Erdős, Antti Knowles, and Horng-Tzer Yau. Averaging fluctuations in resolvents of random band matrices. Annales Henri Poincaré, 8(14):1837–1926, 2013. [EYY12a] László Erdős, Horng-Tzer Yau, and Jun Yin. Bulk universality for generalized Wigner matrices. Probability Theory and Related Fields, 154(1):1–67, 2012. [EYY12b] László Erdős, Horng-Tzer Yau, and Jun Yin. Rigidity of eigenvalues of generalized Wigner matrices. Advances in Mathematics, 229(3):1435–1515, 2012. [FJ16] Zhou Fan and Iain Johnstone. Eigenvalue distributions of variance components estimators in highdimensional random effects models. arXiv preprint 1607.02201, 2016. [FS10] Ohad N Feldheim and Sasha Sodin. A universality result for the smallest eigenvalues of certain sample covariance matrices. Geometric And Functional Analysis, 20(1):88–123, 2010. [Gem80] Stuart Geman. A limit theorem for the norm of random matrices. The Annals of Probability, 8(2):252–261, 1980. [HHN16] Walid Hachem, Adrien Hardy, and Jamal Najim. Large complex correlated Wishart matrices: Fluctuations and asymptotic independence at the edges. The Annals of Probability, 44(3):2264–2348, 2016. [Joh01] Iain M Johnstone. On the distribution of the largest eigenvalue in principal components analysis. The Annals of Statistics, 29(2):295–327, 2001. [Kar07] Noureddine El Karoui. Tracy-Widom limit for the largest eigenvalue of a large class of complex sample covariance matrices. The Annals of Probability, 35(2):663–714, 2007. [KY16] Antti Knowles and Jun Yin. Anisotropic local laws for random matrices. Probability Theory and Related Fields, pages 1–96, 2016. [LS15] Ji Oon Lee and Kevin Schnelli. Edge universality for deformed Wigner matrices. Reviews in Mathematical Physics, 27(08):1550018, 2015. [LS16] Ji Oon Lee and Kevin Schnelli. Tracy-Widom distribution for the largest eigenvalue of real sample covariance matrices with general population. The Annals of Applied Probability, 26(6):3786–3839, 2016. [LW98] Michael Lynch and Bruce Walsh. Genetics and analysis of quantitative traits. Sinauer Sunderland, 1998. [Ma12] Zongming Ma. Accuracy of the Tracy-Widom limits for the extreme eigenvalues in white Wishart matrices. Bernoulli, 18(1):322–359, 2012. 56 TRACY-WIDOM FOR COVARIANCE MATRICES [MCM+ 14] Katrina McGuigan, Julie M Collet, Elizabeth A McGraw, H Ye Yixin, Scott L Allen, Stephen F Chenoweth, and Mark W Blows. The nature and extent of mutational pleiotropy in gene expression of male drosophila serrata. Genetics, 196(3):911–921, 2014. [MP67] Vladimir A Marčenko and Leonid Andreevich Pastur. Distribution of eigenvalues for some sets of random matrices. Sbornik: Mathematics, 1(4):457–483, 1967. [Pau07] Debashis Paul. Asymptotics of sample eigenstructure for a large dimensional spiked covariance model. Statistica Sinica, 17(4):1617, 2007. [Péc09] Sandrine Péché. Universality results for the largest eigenvalues of some sample covariance matrix ensembles. Probability Theory and Related Fields, 143(3-4):481–516, 2009. [PPR06] Nick Patterson, Alkes L Price, and David Reich. Population structure and eigenanalysis. PLoS Genetics, 2(12):e190, 2006. [PY14] Natesh S Pillai and Jun Yin. Universality of covariance matrices. The Annals of Applied Probability, 24(3):935–1001, 2014. [SB95] Jack W Silverstein and Zhidong Bai. On the empirical distribution of eigenvalues of a class of large dimensional random matrices. Journal of Multivariate Analysis, 54(2):175–192, 1995. [SC95] Jack W Silverstein and Sang-Il Choi. Analysis of the limiting spectral distribution of large dimensional random matrices. Journal of Multivariate Analysis, 54(2):295–309, 1995. [Sos02] Alexander Soshnikov. A note on universality of the distribution of the largest eigenvalues in certain sample covariance matrices. Journal of Statistical Physics, 108(5):1033–1056, 2002. [TW96] Craig A Tracy and Harold Widom. On orthogonal and symplectic matrix ensembles. Communications in Mathematical Physics, 177(3):727–754, 1996. [YBK88] Yong-Quan Yin, Zhi-Dong Bai, and Pathak R Krishnaiah. On the limit of the largest eigenvalue of the large dimensional sample covariance matrix. Probability Theory and Related Fields, 78(4):509–521, 1988. [Yin86] Y. Q. Yin. Limiting spectral distribution for a class of random matrices. J. Multivariate Anal., 20(1):50– 68, 1986.
10math.ST
arXiv:1705.02768v1 [math.RA] 8 May 2017 Typical ranks of semi-tall real 3-tensors Toshio SUMI∗, Mitsuhiro MIYAZAKI†and Toshio SAKATA‡ Abstract Let m, n and p be integers with 3 ≤ m ≤ n and (m − 1)(n − 1) + 1 ≤ p ≤ (m − 1)m. We showed in previous papers that if p ≥ (m − 1)(n − 1) + 2, then typical ranks of p × n × m-tensors over the real number field are p and p + 1 if and only if there exists a nonsingular bilinear map Rm × Rn → Rmn−p . We also showed that the “if” part also valid in the case where p = (m − 1)(n − 1) + 1. In this paper, we consider the case where p = (m−1)(n−1)+1 and show that the typical ranks of p × n × m-tensors over the real number field are p and p + 1 in several cases including the case where there is no nonsingular bilinear map Rm × Rn → Rmn−p . In particular, we show that the “only if” part of the above mentioned fact does not valid for the case p = (m − 1)(n − 1) + 1. Keywords: tensor rank, typical rank, tall tensor, semi-tall tensor, Bezout’s theorem, determinantal variety MSC:15A69, 14P10, 14M12, 13C40 1 Introduction Tensor rank is a subject which is widely studied in both pure and applied mathematics. A high dimensional array of datum is called a tensor in the field of data analysis. Precisely, let N1 , . . . , Nd be positive integers. A ddimensional array datum T = (ti1 ···id )1≤ij ≤Nj ,1≤j≤d is called a d-way tensor or simply a d-tensor of format N1 ×· · ·×Nd . For a set S, the set of N1 ×· · ·×Nd tensors with entries in S is denoted by S N1 ×···×Nd . Let K be a field and Vj an Nj -dimensional vector space over K with fixed basis vj1 , . . . , vjNj for 1 ≤ j ≤ d. Then there is a one Pto one correspondence between K N1 ×···×Nd and V1 ⊗ · · · ⊗ Vd by (mi1 ···id ) ↔ i1 ···id mi1 ···id v1i1 ⊗ · · · ⊗ ∗ Faculty of Arts and Science, Kyushu University, Fukuoka, Japan Department of Mathematics, Kyoto University of Education, Kyoto, Japan ‡ Emeritus professor, Kyushu University, Fukuoka, Japan † 1 vdid . A non-zero tensor corresponding to an element of V1 ⊗ · · · ⊗ Vd of the form a1 ⊗ · · · ⊗ ad is called a rank 1 tensor. For a general tensor T of format N1 ×· · ·×Nd , the rank of T , denoted by rankT , is by definition the minimum integer r such that T can be expressed as a sum of r rank 1 tensors, where we set the empty sum to be zero. Thus, the rank is a measure of the complexity of a tensor. Further, for a 2-tensor, i.e., a matrix, the rank is identical with the one defined in linear algebra. However, for the case where d ≥ 3, the behavior of rank is much more complicated than the matrix case. In the matrix case, the rank is the maximum size of non-zero minors. Thus, if K is an infinite field, the set of m × n matrices with rank min{m, n} form a Zariski dense open subset of K m×n . However, there are non-empty Euclidean open subsets of R2×2×2 such that one consists of rank 2 tensors and the other one consists of rank 3 tensors. In particular, it is not possible to characterize the rank of a tensor by vanishing and/or non-vanishing of polynomials. Let m, n, p be positive integers. If the set of rank r tensors of format p × n × m over R contains a non-empty Euclidean open subset of Rp×n×m , we say that r is a typical rank of p × n × m tensors over R. The set of typical ranks of p × n × m tensors over R is denoted as trankR (p, n, m) or simply trank(p, n, m). If the base field is C, the set of tensors of format p × n × m with rank at most r contains a non-empty Zariski open set if and only if its Zariski closure is Cp×n×m (cf., Chevalley’s Theorem, see e.g., [Har92, p. 39]). Therefore, there exists exactly one “typical rank of p × n × m tensors over C”. This is called the generic rank of p × n × m tensors over C and denoted as grankC (p, n, m) or simply grank(p, n, m). It is fairly easy to show that grank(p, n, m) = min trank(p, n, m) (see e.g., [SSM16, Chapter 6]). Further r ≥ grank(p, n, m) if and only if the r-th higher secant variety of the image of Segre embedding PC Cp × PC Cn × PC Cm → PC Cp×n×m is the whole space PC Cp×n×m , where PK V denotes the projective space consisting of one dimensional subspaces of the K-vector space V . Thus, mnp by counting the dimensions, we see that grank(p, n, m) ≥ ⌈ m+n+p−2 ⌉. mnp Suppose that 3 ≤ m ≤ n ≤ p. Then p ≥ ⌈ m+n+p−2 ⌉ if and only if p ≥ (m − 1)(n − 1) + 1. Catalisano, Geramita, and Gimigliano [CGG02] (see also [CGG08]) proved that if (m − 1)(n − 1) + 1 ≤ p ≤ mn, then grank(p, n, m) = p. Thus, min trank(p, n, m) = p in these cases. ten Berge [tB00] called a p × n × m-tensor with (m − 1)n < p < mn a tall array or a tall tensor and proved that trank(p, n, m) = {p} for these cases (see [SSM16, Chapter 6] for another proof). Here we define a p × n × m-tensor a semi-tall tensor if (m − 1)(n − 1) + 1 ≤ p ≤ (m − 1)n. We [SSM13, SMS15, SMS17] 2 studied the plurality of typical ranks of semi-tall tensors and proved that if (m − 1)(n − 1) + 2 ≤ p ≤ (m − 1)n, then trank(p, n, m) = {p, p + 1} if there exists a nonsingular bilinear map Rm ×Rn → Rmn−p and trank(p, n, m) = {p} otherwise, where a bilinear map ϕ : V1 ×V2 → W is nonsingular if ϕ(x, y) = 0 implies x = 0 or y = 0. We also showed in [SMS17] that the former part of the above mentioned result also valid in the case where p = (m−1)(n−1)+1. Therefore, the latter part of the above mentioned result in the case where p = (m − 1)(n − 1) + 1 is left open. In this paper, we treat the case where p = (m − 1)(n − 1) + 1 and show that trank(p, n, m) = {p, p + 1} in several cases. In particular, we show that the latter part does not valid in the case where p = (m − 1)(n − 1) + 1. 2 Preliminaries Let K be a field and T = (tijk ) ∈ K ℓ×m×n . For 1 ≤ k ≤ n, we set Tk = (tijk ) ∈ K ℓ×m and denote T = (T1 ; · · · ; Tn ). For P ∈ GL(ℓ, K) and Q ∈ GL(m, K), we set P T Q = (P T1 Q; · · · ; P Tn Q). Note rankP T Q = rankT by the definition of rank. We first state the definition of the typical rank over R. Definition 2.1 If the set of rank r tensors over R of format ℓ × m × n contains a non-empty Euclidean open subset of Rℓ×m×n , then we say r is a typical rank of ℓ × m × n tensors over R. We denote the set of typical ranks of ℓ × m × n tensors over R by trankR (ℓ, m, n) or simply trank(ℓ, m, n). By the definition of the rank, we see the following fact. Lemma 2.2 Let n1 , n2 and n3 be positive integers. Then trank(ni1 , ni2 , ni3 ) = trank(n1 , n2 , n3 ) for any permutation i1 , i2 , i3 of 1, 2, 3. Definition 2.3 For T = (T1 ; · · · ; Tn ) ∈ K ℓ×m×n , we set fl1 (T ) := (T1 , . . . , Tn ) ∈ K ℓ×mn and and call flattenings of T .   T1   fl2 (T ) :=  ...  ∈ K ℓn×m Tn 3 By the correspondence K ℓ×m×n ↔ V1 ⊗ V2 ⊗ V3 , where V1 (resp. V2 , V3 ) is a vector space over K of dimension ℓ (resp. m, n) with fixed basis, flattenings correspond to natural isomorphisms V1 ⊗ V2 ⊗ V3 → V1 ⊗ (V2 ⊗ V3 ) and V1 ⊗ V2 ⊗ V3 → (V1 ⊗ V3 ) ⊗ V2 . In particular, rank(fl1 (T )) ≤ rankT and rank(fl2 (T )) ≤ rankT .   m(1)   Definition 2.4 For M = (m1 , . . . , mn ) =  ...  ∈ K ℓ×n , we set m(ℓ)   m(1)   M≤j := (m1 , . . . , mj ), j< M := (mj+1 , . . . , mn ), M ≤i :=  ...  and m(i)   m(i+1)   i< M :=  ... . m(ℓ) Definition 2.5 Let R be a commutative ring and M ∈ Rℓ×n . We denote by It (M) the ideal of R generated by t-minors of R. 3 A condition of an n × p × m-tensor to be of rank p From now on, let m, n and p be integers with 3 ≤ m ≤ n and (m − 1)(n − 1) + 1 ≤ p ≤ mn. We set u = mn − p. Fact 3.1 (1) grank(p, n, m) = p. In particular, min trank(p, n, m) = p [CGG02]. (2) If p > (m − 1)n, then trank(p, n, m) = {p} [tB00]. (3) Suppose p ≤ (m − 1)n. If there exists a nonsingular bilinear map Rm × Rn → Ru , then trank(p, n, m) = {p, p + 1}. Moreover, if (m − 1)(n − 1) + 2 ≤ p, then the converse also hold true [SSM13, SMS15, SMS17]. Therefore, the case where p = (m−1)(n−1)+1 and there is no nonsingular bilinear map Rm × Rn → Ru is still left open. In the following, we consider the case where p = (m − 1)(n − 1) + 1 and study if there are plural typical ranks of p × n × m tensors over R. Before concentrating on the case where p = (m − 1)(n − 1) + 1, we state notations and a criterion of an n × p × m tensor to be of rank p in the case 4 where (n − 1)(m − 1) + 1 ≤ p ≤ (m − 1)n. Note that trank(p, n, m) = trank(n, p, m). Definition 3.2 We set V := {T ∈ Rn×p×m | fl2 (T )≤p is nonsingular.}, O := {Y ∈ Ru×n×m | p< fl1 (Y ) is nonsingular.}, σ : V → Ru×p , σ(T ) = (p< fl2 (T ))(fl2 (T )≤p )−1 , ν : O → Ru×p , ν(Y ) = −(p< fl1 (Y ))−1 (fl1 (Y )≤p ), Ep and µ : Ru×p → O, µ(W ) = fl−1 τ : Ru×p → V , τ (W ) = fl−1 1 (W, −Eu ). 2 W Remark 3.3 Rn×p×m ⊃ V τ տց σ Ru×p µ ւր ν Ru×n×m ⊃ O and σ(τ (W )) = ν(µ(W )) = W for W ∈ Ru×p . Definition 3.4 Let x = (x1 , . . . , xm ) be a row vector of indeterminates, i.e., x1 , . . . , xm are independent indeterminates. For A = (A1 ; · · · ; Am ) ∈ Ru×n×m , we set M(x, A) := x1 A1 + · · · + xm Am ∈ R[x1 , . . . , xm ]u×n . Definition 3.5 Let a and b be column vectors with entries in R of dimension m and n respectively. We set ψ(a, b) := (a ⊗Kr b)≤p , where the  ⊗Kr denotes    a1 b a1   ..  ..    . Kronecker product, i.e., if a =  . , then ψ(a, b) =  .   am−2 b am ≤p−(m−2)n am−1 b For Y ∈ Ru×n×m , we define U(Y ) to be the vector subspace of Rp generated by {ψ(a, b) | M(a⊤ , Y )b = 0}. Lemma 3.6 For T ∈ V , rankT = p if and only if dim U(µ(σ(T ))) = p. Proof Set µ(σ(T )) = W = (W1 ; · · · ; Wm ) and ℓ = u − n. Then by [SMS17, Theorem 6.5 (1) ⇐⇒ (3)], we see that rankT = p if and only if there are B = (b1 , . . . , bp ) ∈ Rn×p and p × p diagonal matrices D1 , . . . , Dm such that  Dk = Diag(d1k , . . . , dpk ) for 1 ≤ k ≤ m,     (d W + · · · + d W )b = 0 for 1 ≤ j ≤ p and   j1 1  jm m j   BD1 (∗)   ..    .     is nonsingular.     BD  m−2   B ≤n−ℓ D m−1 5 First suppose that there are B = (b1 , . . . , bp ) ∈ Rn×p and D1 , . . . , Dm which satisfy (∗). If we set aj = (dj1 , . . . , djm)⊤ for 1 ≤ j ≤ p, then M(a⊤ j , W )bj = 0 for 1 ≤ j ≤ p and  BD1 .. .      (ψ(a1 , b1 ), . . . , ψ(ap , bp )) =    BDm−2  B ≤n−ℓ Dm−1 is nonsingular. Therefore dim U(µ(σ(T ))) = p. Conversely, assume that dim U(µ(σ(T ))) = p. Then there are a1 , . . . , ap ∈ Rm and b1 , . . . , bp ∈ Rn such that ψ(a1 , b1 ), . . . , ψ(ap , bp ) are linearly independent. Set aj = (dj1, . . . , djm)⊤ for 1 ≤ j ≤ p, Dk = Diag(d1k , . . . , dpk ) for 1 ≤ k ≤ m and B = (b1 , . . . , bp ) ∈ Rn×p . Then it is easily verified that B and D1 , . . . , Dm satisfy (∗). 4 Determinantal varieties and Bezout’s theorem From now on, we consider the case where p = (m − 1)(n − 1) + 1. Then u = m + n − 2. Definition 4.1 We set   O(k−1)×n  ∈ Ru×n En Ak :=  O(m−k−1)×n for 1 ≤ k ≤ m − 1 and Am :=  O(m−1)×(n−1) −e1 En−1 0  ∈ Ru×n ,   1 0   where e1 =  ..  ∈ Rm−1 and A = (A1 ; · · · ; Am ) ∈ Ru×n×m . . 0 The next fact is the key lemma of this paper. 6 Lemma 4.2 Let y be an indeterminate and a1 , . . . , am−1 ∈ C. Then the following conditions are equivalent, where Va (I) denotes the affine variety defined by an ideal I. (1) (a1 , . . . , am−1 , −1) ∈ Va (In (M(x, A))). (2) y m−1 − am−1 y m−2 − · · · − a2 y − a1 is a factor of y u + 1. In order to prove this lemma, we need some preparation. First we make the following Definition 4.3 Let y be an indeterminate and {µt }t≥1 an infinite sequence P k of P complex numbers. We set I ({µt }t≥1 ) = {f (y) ∈ C[y] | f (y) = k ck y , k ck µk+t = 0 for any t ≥ 1}. It is easily verified that I ({µt }t≥1 ) is an ideal of C[y]. Now let a1 , . . . , am−1 ∈ C. Set λt = 0 for 1 ≤ t ≤ m − 2, λm−1 = 1 and   am−1 am−2 · · · a1   .. .. ..  −1  . . .   .. .. ..   . . . a  1  λm−1+s = det  ..  .. .. ..  . . . .      . . . .  . . am−2  −1 am−1 for s ≥ 1, where the right hand side is an s × s-determinant (some ai ’s may not appear for small s). By the first row expansion, we see the following Lemma 4.4 For t ≥ m, we have λt = Pm−1 k=1 am−k λt−k . Set h(y) = y m−1 − am−1 y m−2 − · · · − a2 y − a1 . By the above lemma, we see that h(y) ∈ I ({λt }t≥1 ). Further, since λt = 0 for 1 ≤ t ≤ m − 2 and λm−1 = 1, there is no polynomial in I ({λt }t≥1 ) whose degree is less than m − 1 except the zero polynomial, i.e., I ({λt }t≥1 ) is generated by h(y). 7 Set  a1   a2  .  ..   am−1 N = M((a1 , . . . , am−1 , −1), A) =    −1      1 .. . .. . .. .. .. . .. . . . .. .. .. . .. . . . .. a1 a2 .. . . −1 am−1                 and for integers c1 , . . . , cn with 1 ≤ c1 < · · · < cn ≤ u, we denote by [c1 , . . . , cn ]N the maximal minor of N consisting of the c1 -th, . . . , cn -th rows of N. Now we state the following Lemma 4.5 Under the notation above, the following conditions are equivalent. (1) rankN < n. (2) [i, m, m + 1, . . . , u]N = 0 for 1 ≤ i ≤ m − 1. (3) λu+t = 0 for 1 ≤ t ≤ m − 2 and λu+m−1 = −1. (4) λu+t = −λt for t ≥ 1. (5) y u + 1 ∈ I ({λt }t≥1 ). Proof Let  am−1 am−2 · · ·  .. ..  −1 . .  .. ..  . .  U = .  ..    a1 1 .. .     ..  . a1  ..  .. .. . . .    .. .. . . am−2  −1 am−1 be a u × u matrix. Then det(t< t< U) = λu+m−1−t + δ0,t for 0 ≤ t ≤ u − 1, where δ0,t is the Kronecker’s delta. (1)=⇒(3): Since m−2< U = N and rankN < n by assumption, we see that det(t< t< U) = 0 for 0 ≤ t ≤ m − 2. Thus, we see that λu+m−1−t + δ0,t = 0 for 0 ≤ t ≤ m − 2. 8 (3)=⇒(2): We see by the first row expansions of det(t< t< U) and [t + 1, m, . . . , u] and the assumption that 0 = λu+m−1−t + δ0,t m−1 X am−k λu+m−1−t−k + δ0,t = = k=1 m−1 X am−k λu+m−1−t−k + δ0,t k=m−t−1 = t+1 X at+2−s λu+1−s + δ0,t s=1 = [t + 1, m, . . . , u]N for 0 ≤ t ≤ m − 2. (2)=⇒(1) follows from the fact that the last n − 1 rows of N are linearly independent, (3) ⇐⇒ (4) follows from the facts that λ1 = · · · = λm−2 = 0 and λm−1 = 1 and Lemma 4.4 and (4) ⇐⇒ (5) follows from the definition of I ({λt }t≥1 ). Since (a1 , . . . , am−1 , −1) ∈ Va (In (M(x, A))) if and only if rankN < n and y + 1 ∈ I ({λt }t≥1 ) if and only if h(y) divides y u + 1, we see Lemma 4.2 by Lemma 4.5. Now we recall the following facts about determinantal varieties (see e.g. [Har92, p.151 and p.243]). u Fact 4.6 Let X be a u × n matrix of indeterminates.  Then the projective u variety in PC Cu×n defined by In (X) has degree n−1 and codimension u − n + 1.   u u Note that n−1 = m−1 and u − n + 1 = m − 1 since u = m + n − 2. Note  u also that there are m−1 monic factors of y u + 1 of degree m − 1 in C[y]. In view of this fact, we make the following Definition 4.7 For B = (B1 ; · · · ; Bm ) ∈ Cu×n×m , we set ϕB : Cm → Cu×n , (α1 , . . . , αm ) 7→ α1 B1 + · · · + αm Bm . Then by Lemma 4.2, Fact 4.6 and Bezout’s theorem, we see the following Corollary 4.8 Let PC (ImϕA ) be the linear subspace of PC Cu×n defined by  u ImϕA . Then PC (ImϕA ) and Vp (In (X)) intersect transversely at m−1 distinct points, where Vp (I) denotes the projective variety defined by the homogeneous ideal I. 9 By the implicit function theorem, we see the following fact. Corollary 4.9 There is a Euclidean open neighborhood U of A in Ru×n×m such that if B ∈ U , then ϕB is injective and the number of real points of Vp (In (M(x, B))) ⊂ PC Cm is the number of real monic polynomials of degree m − 1 which divide y u + 1, where we say a point of a complex projective space is real if all possible ratios of its homogeneous coordintes are real numbers. We denote the number of real monic polynomials of degree m − 1 which divides y u + 1 by α(m, n). Then we see the following Lemma 4.10 α(m, n) =          u/2 (m−1)/2 (u−1)/2 (m−2)/2 (u−1)/2 (m−1)/2  0 if if if if m m m m and n are odd, is even and n is odd, is odd and n is even and and n are even. By replacing U to a smaller neighborhood if necessary, we may assume that rank(M(a, B)≤n−1 ) = n − 1 for any B ∈ U and a ∈ Rm \ {0} (cf. [SMS17, Corollary 4.20]). Then we have the following fact. Lemma 4.11 Suppose B ∈ U . Then #{[ψ(a, b)] ∈ PR Rp | M(a, B)b = 0, a ∈ Rm \ {0}, b ∈ Rn \ {0}} = α(m, n), where [x] denotes the point of PR Rp defined by x ∈ Rp \ {0}. 5 Plural typical ranks of some formats of 3tensors In this section, we show that in certain formats of 3-tensors, there are plural typical ranks. We use the notation of the previous section. First we recall the following fact. Fact 5.1 ([SMS17, Proposition 2.4, Lemma 3.5, Theorems 7.3 and 8.1]) If m − 1 and n − 1 are not bit-disjoint, then trank(n, p, m) = {p, p + 1}, where two positive integers are bit-disjoint if there are no 1’s in the same place of their binary notation. Example 5.2 trank(n, p, m) = {p, p + 1} in the following cases. (1) Both m and n are even. 10 (2) m = 5 and n ≡ 5, 6, 7, 8 (mod 8). (3) m = 6 and n ≡ 2, 4, 5, 6, 7, 8 (mod 8). (4) m = 7 and n ≡ 3, 4, 5, 6, 7, 8 (mod 8). (5) m = 8 and n ≡ 2, 3, 4, 5, 6, 7, 8 (mod 8). (6) m = 9 and n ≡ 9, 10, 11, 12, 13, 14, 15, 16 (mod 16). Set A′′ = (A2 ; · · · ; Am−2 ; Am ; −Am−1 ; −A1 ). Then there is a permutation matrix P ∈ GL(u, R) such that p< fl1 (P A′′ ) = −Eu . Set A′ = P A′′ and W0 = fl1 (A′ )≤p . Further set ρ : Ru×n×m → Ru×n×m , B = (B1 ; · · · ; Bm ) 7→ P (B2 ; · · · ; Bm−2 ; Bm ; −Bm−1 ; −B1 ) and U = µ−1 (ρ(U )), where µ is the map defined in Definition 3.2. Then U is an open neighborhood of W0 . Further, we see the following fact by Lemma 4.11. Lemma 5.3 If T ∈ σ −1 (U), then #{[ψ(a, b)] ∈ PR Rp | M(a, µ(σ(T )))b = 0, a ∈ Rm \ {0}, b ∈ Rn \ {0}} = α(m, n). Since σ −1 (U) contains τ (W0 ), σ −1 (U) is not an empty set. Therefore, we see by Lemma 3.6 that if α(m, n) < p, then there exists a non-empty Euclidean open subset σ −1 (U) of Rn×p×m consisting of tensors of rank larger than p. Further, since we see by [SMS17, Theorem 8.1] that typical ranks of n×p×m tensors are less than or equal to p + 1, we see the following fact. Lemma 5.4 If α(m, n) < p, then trank(n, p, m) = {p, p + 1}. Now we state the following Theorem 5.5 Suppose 3 ≤ m ≤ n and p = (m − 1)(n − 1) + 1. Then trank(n, p, m) = {p, p + 1} in the following cases. (1) m = 3 or m = 4. (2) m = 5 and n ≤ 26 or n = 28. (3) m = 6 and n ≤ 34. (4) m = 7 and n ≤ 16. (5) m = 8 and n ≤ 16. 11 Proof By Lemma 4.10 and computation, we see that α(m, n) < p in the following cases: (1) m = 3 or m = 4, (2) m = 5 and n ≤ 26 or n = 28, (3) m = 6 and n ≤ 34, (4) m = 7 and n ≤ 12, (5) m = 8 and n ≤ 14 and (6) m = 9 and n = 10. Thus, we see the result by Example 5.2 and Lemma 5.4. Remark 5.6 Set m = 3 and n = 5. Then m − 1 and n − 1 are bit-disjoint. However, by Theorem 5.5, we see that trank(n, p, m) = {p, p + 1}. Thus the converse of Fact 5.1 does not valid. References [CGG02] M. V. Catalisano, A. V. Geramita, and A. Gimigliano, Ranks of tensors, secant varieties of Segre varieties and fat points, Linear Algebra Appl. 355 (2002), 263–285. [CGG08] M. V. Catalisano, A. V. Geramita, and A. Gimigliano, On the ideals of secant varieties to certain rational varieties, J. Algebra 319 (2008), no. 5, 1913–1931. [Har92] Joe Harris, Algebraic geometry, A first course., Graduate Texts in Mathematics, vol. 133, Springer-Verlag, New York, 1992, [SSM16] Toshio Sakata, Toshio Sumi and Mitsuhiro Miyazaki, Algebraic and Computational Aspects of Real Tensor Ranks, SpringerBriefs in Statistics, Springer, 2016. [SMS15] Toshio Sumi, Mitsuhiro Miyazaki and Toshio Sakata, Typical ranks of m × n × (m − 1)n tensors with 3 ≤ m ≤ n over the real number field, Linear Multilinear Algebra 63 (2015), no. 5, 940–955. [SMS17] Toshio Sumi, Mitsuhiro Miyazaki and Toshio Sakata, Typical ranks for 3-tensors, nonsingular bilinear maps and determinantal ideals, Journal of Algebra, 471 409–453 (Feb. 2017) [SSM13] Toshio Sumi, Toshio Sakata and Mitsuhiro Miyazaki, Typical ranks for m × n × (m − 1)n tensors with m ≤ n, Linear Algebra and its Application, 438 953–958 (Jan. 2013). [tB00] Jos M. F. ten Berge, The typical rank of tall three-way arrays, Psychometrika 65 (2000), no. 4, 525–532. 12
0math.AC
N.B. A USB memory stick, storing my draft PhD thesis - comprising material partly used in this work, ”disappeared” from my hotel room safe in July 2017. For this reason, I’m unnecessarily forced to post this preprint prior publication acceptance. Golden Angle Modulation Abstract—Quadrature amplitude modulation (QAM) exhibits a shaping-loss of πe/6, (≈ 1.53 dB) compared to the AWGN Shannon capacity. With inspiration gained from special (leaf, flower petal, and seed) packing arrangements (spiral phyllotaxis) found among plants, a novel, shape-versatile, circular symmetric, modulation scheme, the Golden Angle Modulation (GAM) is introduced. Disc-shaped, and complex Gaussian approximating bell-shaped, GAM-signal constellations are considered. For bellGAM, a high-rate approximation, and a mutual information optimization formulation, are developed. Bell-GAM overcomes the asymptotic shaping-loss seen in QAM, and offers Shannon capacity approaching performance. Transmitter resource limited links, such as space probe-to-earth, and mobile-to-basestation, are cases where GAM could be particularly valuable. Index Terms—Modulation, golden angle, golden ratio, shaping, inverse sampling, Shannon capacity, optimization. 2.5 2 1.5 1 0.5 Im(x) arXiv:1708.05947v1 [cs.IT] 20 Aug 2017 Peter Larsson Student Member, IEEE 0 -0.5 -1 -1.5 -2 -2.5 -2 -1 0 1 2 Re(x) I. I NTRODUCTION M ODULATION formats, of great number and variety, have been developed and analyzed in the literature. Examples are PAM, square/rectangular-QAM, phase shift Keying (PSK), Star-QAM [1], and amplitude-PSK (APSK) [2]. Square-QAM, hereon referred to as QAM, is the defacto-standard in existing wireless communication systems. However, at high signal-to-noise-ratio (SNR), QAM is known to asymptotically exhibit an 1.53 dB SNR-gap (a shapingloss) to the additive white Gaussian noise (AWGN) Shannon capacity [3]. This is attributed to the square shape, and the uniform discrete distribution, of the QAM-signal constellation points. Geometric and probabilistic shaping techniques have been proposed to mitigate the shaping-gap [3]. An early work on geometric shaping is nonuniform-QAM in [4]. More recent works in this direction are, e.g., [5], [6], [7], [8]. Existing work on modulation schemes have, in our view, not completely solved the shaping-loss problem, nor offered a modulation format practically well-suited for the task. This leads us to examine new modulation formats. Inspired by the beautiful, and equally captivating, cylindrical-symmetric packing of scales on a cycad cone, the spherical-symmetric packing of seeds on a thistle seed head, or the circular-symmetric packing of sunflower seeds, we have recognized that this shape-versatile spiral-phyllotaxis packing principle, found among plants, is applicable to modulation signal constellation design. Based on the spiral phyllotaxis packing, the key contribution of this letter is proposing a novel, shape-versatile, high-performance modulation framework - the Golden angle modulation (GAM). We consider discrete modulation, with equiprobable constellation points, that approximate a r.v. with continuous complex Gaussian The author is with the ACCESS Linnaeus Center and the School of Electrical Engineering at KTH Royal Institute of Technology, SE-100 44 Stockholm, Sweden. E-mail: [email protected]. Figure 1: Geometric-bell-GAM signal constellation, N = 210 . (bell)-shaped distribution, as well as a baseline case, with a disc-shaped distribution. We find, as expected, that the MIasymptote of geometric-bell GAM (GB-GAM), for increasing number of constellation points, coincide with the AWGN Shannon capacity. This also supports the complex Gaussian communication signal assumption, used in many performance analysis works, for the low-to-high SNR-range. II. G OLDEN A NGLE M ODULATION The core design of GAM is given below. Definition 2.1: (Golden angle modulation) The nth constellation point of GAM has the probability of excitation pn , and the complex amplitude xn = rn ei2πϕn , n ∈ {1, 2, . . . , N }, (1) where rn is the radius of constellation point n, 2πϕ denotes √ the golden angle in rads, and ϕ = 1 − ( 5 − 1)/2. We will assume that rn+1 > rn for an increasing spiral winding. For the probability, it may be equiprobable, pn = 1/N , or dependent on index n. The later, where pn+1 ≤ pn , corresponds to GAM with probabilistic shaping and is explored extensively in [9]. Hence, a constellation point, is located ϕ ≈ 0.381 turns (137.5◦) relative√to the previous constellation point. Replacing ϕ, with (1 + 5)/2 ≈ 1.618, the golden ratio, or its fractional part, gives an equivalent spiral winding, but, in the opposite direction. Note that phase rotation value deviating with approximately 1% from the golden angle (ratio) destroys the locally uniform packing. The mathematical design of the phase rotation in Def. 2.1 is inspired from the work by Vogel, [10], who described √ an idealized growth pattern for the sunflower seeds, xn = nei2πϕn (in our notation). Vogel did however not consider modulation. More importantly, This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible. 2 a key insight here, enabling the approximation of a complex √ Gaussian pdf, is to not restrict the radial function rn to n as in [10]. Allowing for arbitrary radial growth of rn , gives the geometric shaping capability, and allowing for arbitrary probabilities pn , gives the dimension of probabilistic-shaping. GAM features the following advantages: • Natural constellation point indexing: In contrast to QAM, APSK, and other, without any natural index order, GAM enables a unique indexing based on signal phase, 2πϕn, or magnitude, rn , alone. • Practically near-ideal circular design: A circular design can offer enhanced MI-, distance-, symbol error rate- and PAPR- performance over a square-QAM design. • Shape-flexibility in radially distribution of constellation points while retaining an evenly distributed packing: We recognize this as a central feature of GAM which allows approximation of (practically) any radial-symmetric pdfs. • Naturally lends itself for circular-symmetric probabilistic shaping: We recognize this as a central feature of GAM which allows approximation of (practically) any radialsymmetric pdfs. • Any number of constellation points, while retaining the overall circular shape: This gives full flexibility, e.g., in alphabet size of a channel coder, or a probabilistic shaper. • Rotation (and gain) invariant: The uniquely identifiable gain and rotation of signal constellation could, e.g., allow for blind channel estimation. Some comments. First, the index range is not necessarily limited to n ∈ {1, 2, . . . , N }. Second, GAM has a complex valued DC component. Possible remedies, if a problem, is to subtract the DC component, or negate every second symbol. Third, while hexagonal packing is the densest 2D-packing (as desirable in the high SNR-range), it does not share the above listed features of GAM. A. Disc-GAM We first introduce disc-GAM, i.e. GAM without shaping, below. Besides its own merits, this also serves as a base-line to shaping. If the expression for rn is altered (fixed), but pn is fixed (altered), geometric (probabilistic) shaping result. Definition 2.2: (Disc-GAM) Let pn = 1/N , N be the number of constellation points, and P̄ be the average power constraint. Then, the complex amplitude of the nth constellation point is √ rn = cdisc n, n ∈ {1, 2, . . . , N }, (2) s 2P̄ . (3) cdisc , N +1 In the above, (3) from P the power normalization P is found N 1 2 2 2 N +1 condition, P̄ = N n=1 pn rn = cdisc n=1 N n = cdisc 2 . We illustrate the disc-GAM constellation in Fig. 2, where its approximate disc-shape is clearly depicted. A few remarks about disc-GAM. The entropy is simply Hdisc = log2 N . The PAPR is P AP Rdisc = 2P̄ N/(N + 1)P̄ ≃ 2 (≃ 3dB) when N → ∞. From PAPR-pointof-view, this makes disc-GAM favorable over QAM, since 1.5 1 0.5 0 -0.5 -1 -1.5 -1.5 -1 -0.5 0 0.5 1 1.5 Figure 2: Disc-GAM signal constellation, N = 210 . P AP RQAM = 4.8 dB. (PSK has P AP RPSK = 0 dB, but with very poor MI-performance for N → ∞). Letting N → ∞, QAM asymptotically requires 10 log2 (π/3) (≈ 0.2 dB) higher average power than disc-GAM for the same average constellation point distances . Also when N → ∞, QAM asymptotically requires 10 log2 (π/2) (≈ 1.96 dB) higher peak power than disc-GAM for the same average distance between (uniformly packed) constellation points. B. Geometric bell-GAM Next, two geometric shaped GAM schemes are introduced. 1) High-rate approach: This first GB-GAM design builds on the inverse sampling method (a high-rate (HR) approximation), and approximates a complex Gaussian distributed r.v. Theorem 2.1: (Geometric-bell-GAM (HR)) Let pn = 1/N , N be the number of constellation points, and P̄ be the average power constraint. Then, the complex amplitude of the nth constellation point is s   N , n ∈ {0, 1, . . . , N − 1}, rn = cgb ln N −n s N P̄ cgb , . (4) N ln N − ln(N !) Proof: The proof is given in Appendix A. We illustrate the geometric-bell-GAM signal constellation in Fig. III, and note that it is densest at its center, i.e. where the pdf for the complex Gaussian r.v. peaks. We note the following characteristics. When N → ∞,  −1 N since lim N ln N /N ! = 1, we get rn ≃ N →∞ p P̄ ln (N/(N − n)). The entropy is Hgb = log2 N . The PAPR is P AP Rgb = c2gb ln(N ) = P̄ /(1 − ln (N !)/N ln N ) ≃ P̄ ln (N ), which tends to infinity with N . This is expected as the PAPR of a complex Gaussian r.v. is infinite. Note here that the index range in (4) can not be n ∈ {1, 2, . . . , N }, but is chosen as n ∈ {0, 1, . . . , N − 1}, as rN = ∞ otherwise. 3 1.53 dB C=log 2(1+SNR) MI and Shannon capacity [b/Hz/s] 10 N=212 MI GB-GAM (IS) MI asymptote QAM 11 MI and Shannon capacity [b/Hz/s] 12 N=210 10 9 N=28 8 7 N=26 6 5 Formulation-G1 N=24 4 3 9.5 9 8.5 MI GB-GAM (HR), N=210 8 MI Disc-GAM, N=210 MI QAM, N=210 C=log2(1+S) 7.5 2 5 10 15 20 25 30 35 40 22 24 26 SNR [dB] Figure 3: MI of GB-GAM (HR), asymptote of QAM, and Shannon capacity. MI of GB-GAM (G1) with N = 24 . 2) MI-optimization of GB-GAM: Formulation-G1: In this method, we let pn = 1/N , and vary rn in order to maximize the MI, for a desired SNR S. The optimized signal constellation points are x∗n = rn∗ ei2πϕn . More formally, allowing for a complex valued output r.v. Y , and a complex valued (discrete modulation) input r.v. X, the optimization problem is maximize I(Y ; X), subject to rn+1 ≥ rn , n = {1, 2, . . . , N }, rn r1 ≥ 0, N X n=1 pn rn2 σ2 28 30 32 34 SNR [dB] (5) = S. Remark 2.1: For some applications, PAPR is of interest. Pthe N −1 2 A PAPR-inequality constraint, rN / n=1 pn rn2 ≤ P AP R0 , P AP R0 being the target PAPR, can be amended to the optimization problem. Other constraints may also be of interest. When optimizing GAM in AWGN, the MI is I(Y ; X) = 2 h(Y R ) − h(W ), where h(W ) = log2 (πeσ ), h(Y ) = − C fY log2 (fY ) dy, integrating over the complex domain, |y−xn |2 PN PN with fY = n=1 pn f (y|xn ) = πσ1 2 n=1 pn e− σ2 . Due to the non-linearities in the MI, the optimization problem in formulation-G1 is hard to solve analytically. Hence, a numerical optimization solver is used in Section III. III. N UMERICAL R ESULTS Here, we now examine the MI-performance of GAM (with its irregular cell-shapes and varying cell-sizes) by using a Monte-Carlo simulation approach. For the optimization in formulation-G1, MATLAB’s fmincon function is used together with numerical integration for the MI. In Fig. 3, we illustrate the MI performance for GB-GAM (HR) together with the Shannon capacity. As expected, for larger constellation size N , a greater overlap with the Shannon capacity is seen. The MI approximation is good up to about ≈ 2H/3. Naturally, the MI is limited by the entropy of the signal constellation. We observe an intermediate SNR region, Figure 4: MI of disc-GAM, GB-GAM (HR), QAM, with N = 210 , and Shannon capacity. SNR ≈ 4.8 dB ≈ 11.8 dB 15 dB AWGN capacity 2 4 ≈ 5.03 HR 1.921 3.440 3.828 G1 1.961 3.549 3.926 Table I: MI in [b/Hz/s] for HR- and G1-schemes with N = 16. a region where the MI does neither reach the channel capacity, nor the entropy of the signal constellation. It is in this SNRregion that further constellation optimization, i.e. formulationG1 , is of interest. The MI for GB-GAM (G1) is also shown, but due to optimization complexity only, for N = 16. In Tab. I, the MI of GB-GAM with the HR-, and G1-, formulations are given. As expected, the optimized scheme, G1, perform better than HR. While the MI-improvements are modest, the optimization formulation is substantiated. For G1, when the MI is as large as the constellation entropy, we have observed that the signal constellation approaches the disc-GAM solution, whereas in the low-MI region, we have noted that the optimized signal constellation approaches the HR GB-GAM solution. It is further observed that the extreme magnitudes of the highest constellation indices for GB-GAM (HR), as seen in Fig. , are attenuated with the MI-optimization and leads to improved PAPR performance. In Fig. 4, we compare disc-GAM, GB-GAM (HR), and QAM, together with the Shannon capacity when the MI is nearly as large as the constellation entropy. We note the (expected) ≈ 1.53 dB SNR-gap for QAM to the Shannoncapacity. The (expected) SNR-gap from QAM to disc-GAM is ≈ 0.2 dB. When the MI is approximately as large as the constellation entropy, disc-GAM, and QAM, perform slightly better than GB-GAM (HR) scheme. This observation prompted us to develop the MI-optimization formulation-G1. IV. S UMMARY AND C ONCLUSIONS In this letter, we have introduced a new modulation format, the golden angle modulation. With geometric- (or probabilistic-) shaping, GAM can approximate virtually any circular-symmetric pdf. We studied geometrically-shaped 4 GAM to approximate the pdf of a continuous complex Gaussian r.v. A high-rate solution, was developed. We also introduced the notion of MI-optimized GAM under an average SNR-constraint, and optionally also a PAPR-inequalityconstraint. The MI-performance was observed to asymptotically approach the Shannon capacity as the number of signal constellation points tended to infinity. In contrast to QAM’s 1.53 dB shaping-loss, GAM exhibit no asymptotic loss. The complex Gaussian communication signal model assumption, as often used for performance analysis, was substantiated from a practical modulation point-of-view. We believe that GAM may find many applications in transmitter-resource-limited links, such as space probe-toearth, satellite-to-earth, or mobile-to-basestation communication. This is so since high data-rate is desirable from the power-, energy-, and complexity-limited transmitter side, but higher decoding complexity is acceptable at the receiver side. Certain cases may also benefit from using the PAPR-inequality constrained optimization. With bell-GAM, the power reduction in the high-MI regime could be up to 30% (1 − 1/101.53/10 ≈ 0.3), which is of environmental interest. Moreover, cellularsystem operators, could potentially also reduce energy consumption (and cost) with up to 30%. It is hoped that, GAM, with its attractive characteristics and performance, could be of interest for most, wireless, optical, and wired, communication systems. A PPENDIX A. Proof in Theorem 2.1 Proof: The distribution in phase, for the constellation points, is already given by the e2πϕn -factor. However, the radial distribution need to be determined. A complex Gaussian r.v. with variance σ 2 is initially considered. The inverse sampling method, assumes a uniform continuous pdf on (0, 1). We modify the inverse sampling method and use a discrete uniform pmf at steps n/N, n ∈ {0, 1, . . . , N − 1}, where N is assumed large (for the high-rate approximation). Z rn − r22 Z rn e σ 2πr dr fR (r)dr = F (rn ) = πσ 2 0 0 2 rn = 1 − e− σ 2 . Setting F (rn ) = n/N , and solving for rn , yields s   N . rn = σ ln N −n Thus, the general for the signal constellation has the r solution   form rn = cgb ln NN−n . The constant cgb is given by the average power constraint as follows, ⇒ cgb N −1 X −1 c2gb NX  N , N n=0 N −n n=0 s v u N P̄ N P̄ u  =  = tP . N −1 N ln N − ln N ! ln N P̄ = pn rn2 = n=0 N −n ln  R EFERENCES [1] L. L. Hanzo, S. X. Ng, T. Keller, and W. Webb, Star QAM Schemes for Rayleigh fading channels. Wiley-IEEE Press, 2004, pp. 307–335. [2] C. Thomas, M. Weidner, and S. Durrani, “Digital amplitude-phase keying with M-ary alphabets,” IEEE Transactions on Communications, vol. 22, no. 2, pp. 168–180, February 1974. [3] G. D. Forney and G. Ungerboeck, “Modulation and coding for linear Gaussian channels,” IEEE Transactions on Information Theory, vol. 44, no. 6, pp. 2384–2415, Oct 1998. [4] W. Betts, A. R. Calderbank, and R. Laroia, “Performance of nonuniform constellations on the Gaussian channel,” IEEE Transactions on Information Theory, vol. 40, no. 5, pp. 1633–1638, Sep 1994. [5] L. Szczecinski, S. Aissa, C. Gonzalez, and M. Bacic, “Exact evaluation of bit- and symbol-error rates for arbitrary 2-D modulation and nonuniform signaling in AWGN channel,” IEEE Transactions on Communications, vol. 54, no. 6, pp. 1049–1056, June 2006. [6] Z. Mheich, P. Duhamel, L. Szczecinski, and M. L. A. Morel, “Constellation shaping for broadcast channels in practical situations,” in 2011 19th European Signal Processing Conference, Aug 2011, pp. 96–100. [7] X. Xiang and M. C. Valenti, “Closing the gap to the capacity of APSK: Constellation shaping and degree distributions,” in 2013 International Conference on Computing, Networking and Communications (ICNC), Jan 2013, pp. 691–695. [8] F. Buchali, W. Idler, L. Schmalen, and Q. Hu, “Flexible optical transmission close to the Shannon limit by probabilistically shaped QAM,” in Optical Fiber Communications Conference and Exhibition (OFC)’17, March 2017, pp. 1–3. [9] P. Larsson, “Golden angle modulation: Geometric- and probabilisticshaping approaches,” To be Submitted, 2017. [10] H. Vogel, “A better way to construct the sunflower head,” Mathematical Biosciences, vol. 44, no. 3-4, pp. 179–189, Jun. 1979.
7cs.IT
Book review arXiv:cs/0512096v2 [cs.PL] 22 Jun 2006 The Haskell Road to Logic, Maths and Programming, Kees Doets and Jan van Eijck, Texts in Computing Series, King’s College Publications, London, 2004. Price: £14.00 pounds, $ 25.00, 444 pages, Paperback, ISBN: 0-9543006-9-6. Reviewer: Ralf Lämmel Microsoft Corp., Redmond, U.S.A. 1 Preamble In university curricula, the subjects of programming and maths and logic tend to be separated. For instance, in the typical computer-science curriculum, mathematics and logic are taught according to the (dry) mathematical tradition, perhaps with modern concessions to help the less abstract minds. One sort of concession is to illustrate the implementability of selected mathematical concepts in some programming language, be it C, Fortran, or others. Another sort of concession is to hint at the usefulness of systems like Maple or Mathematica — systems that are probably more appreciated by mathematicians than applied, programming-minded computer scientists. By contrast, programming courses are almost certainly focused on a specific programming paradigm and on a specific language. Logic and maths may show up in such courses as a sort of “application domain”, while competing with many other domains. For instance, a typical course on the programming language Haskell is likely to emphasize Haskell’s strengths in the areas of abstract-data type specification and combinator libraries for domain-specific languages. The authors of the book at hand have succeeded in amalgamating the themes of maths, logic and Haskell programming in a mutually beneficial manner. The book really stands out in so far that it leverages Haskell in diving deep into maths and logic (as deep as covering power series or co-inductive proofs). The use of Haskell makes the mathematical concepts quite digestible; Haskell lends itself so well as a strongly typed and executable modeling language. The authors’ style is quite relaxing. The mathematical concepts are explained in a way that carefully helps with an intuitive understanding. The “Haskell road to Logic, Maths and Programming” by Kees Doets and Jan van Eijck does not (mean to) comprise a detailed and comprehensive introduction to functional programming or the programming language Haskell. There exist such introductions to Haskell; cf. the excellent textbooks by Thompson and Hudak [14, 6], and these introductions should still be useful for readers who want to deeply appreciate Haskell as a general-purpose programming language and Haskell’s strengths other than maths and logic. The book at hand does not assume prior knowledge of Haskell, though; all Haskell concepts are introduced incrementally. The combination of texts on maths/logic with computer programming is not unprecedented. For instance, Barwise and Etchemendy’s “Language, Proof, and Logic” [2] accompanies a text on logic with several computer programs. Even more to the point, Hall and O’Donnell’s “Discrete math1 ematics using a computer” [5] covers maths and logic in similar ways than the book at hand, and it also facilitates Haskell. 2 Chapter by chapter Preface This is an outstanding book, but the preface could be improved. In particular, the preface seems to be somewhat ambiguous about the purpose and the subject of the book. Citation: “The purpose of the book is to teach logic and mathematical reasoning in practice and to connect logical reasoning with computer programming.” The mentioning of “practice” may count as confusing. Elsewhere in the preface: “The subject of the book is the use of logic in practice, more in particular the use of logic in reasoning about programming tasks.” It is not immediately obvious to the reader what sorts of “programming tasks”, what sorts of “reasoning” are meant here. (For instance, one may think that program validation and verification is included, but this turns out not to be the case. Likewise, one may expect reasoning about complexity.) It would help if the following questions were answered more clearly: What are the mathematical fields covered by the book? What sorts of reasoning about either mathematical notions or programs or both are carried out? According to the preface, Haskell is a member of the LISP family with the lambda calculus as foundation. This characterization does not hint at two of Haskell’s strengths: its advanced type system and its lazy semantics. (LISP, in particular, does not share these assets.) Both strengths are exploited in the book, and this is worth emphasizing. The choice of Haskell is less arbitrary than it may seem from the preface. The outline of the chapters could be more helpful. Regarding chapters 1–7, there is basically one sentence. The explanations for the remaining chapters may overwhelm newcomers with technical terms (cf. Chapter 9: “closed forms for polynomial sequences”). It would be wonderful to read a preface that provides an accessible overview of the chapters, including a story how these subjects fit together, making brief links to the three components of the book’s title: logic, maths, programming. Chapter 1: Getting started The text starts with some basic explanations of literate programming, lambda calculus and typed functional programming. Then, the text picks up the problem of prime-number testing for a first illustration of the “Haskell Road to Maths”. The text is pleasant to read, and it introduces a good deal of mathematical conventions and Haskell idioms including primitive types, products and lists. The text also states clearly an important goal of the book early on: to communicate skills for the formulation of properties about programs and their proofs. The textbook style of the book also settles immediately: a very good 2 mix of definitions, explanations, examples and exercises. Eventually, the chapter describes prime factorization and prime-number generation. Surprisingly, the authoritative definition of the former problem is given in an imperative language notation with assignments! The Haskell implementation of the latter puts the higher-order combinators map and filter to work. This is an indication that the first chapter has come to real speed. Some bits of the Haskell exposition in this chapter lack context in the sense that idioms and examples do not contribute to the running theme of algorithms around prime numbers. The chapter pleasantly closes by emphasizing a major strength of Haskell: this pure, declarative, functional language admits equational reasoning, which is out of reach for imperative languages like Java due to destructive assignments and other side effects in these languages. Like most chapters in the book, Chapter 1 carries a short tail “Further Reading”. Chapter 2: Talking about Mathematical Objects The chapter describes the basics of logic, in particular the usual connectives (not, if, and, or, iff, for all, there exists) complete with Haskell encodings of connectives, formulas, and validity checks for formulas. The text is very pleasant to read; the alternation between mathematical notation and Haskell encoding really makes sense. The text carefully explains the many aspects of quantification: free variables, open and closed formulas, domains for quantification. The text makes a laudable effort to help the beginning logician. For instance, the text identifies “bad habits” regarding the ambiguous use of quantifiers in textual formulations of mathematical statements. The text makes clear that Platonism is adopted in this book: every mathematical statement is either true or false. Other forms of logic, such as intuitionistic logic or fuzzy logic are not covered. A side note on Haskell’s type classes Throughout the book, there are a few occasions where Haskell’s type classes could show off nicely. For instance, when checks for validity or logical equivalence are provided (cf. Chapter 2), they are coded separately for several arities, as indicated by the following examples: valid1 :: (Bool -> Bool) -> Bool valid1 bf = (bf True) && (bf False) 3 valid2 :: (Bool -> Bool -> Bool) valid2 bf = (bf True True) && (bf True False) && (bf False True) && (bf False False) -> Bool valid3 :: (Bool -> Bool -> Bool -> Bool) -> Bool -- ... and so on ... A single, generic valid function would suffice for all arities, as defined below. The same holds for logical equivalence. (It is left as an exercise for the reader to eliminate the minor violation of strict Haskell 98 rules.) class Valid f where valid :: f -> Bool instance Valid Bool where valid = id instance Valid f => Valid (Bool -> f) where valid f = valid (f True) && valid (f False) It is understandable that the text does not want to overwhelm the reader in the early chapters. However, the power of Haskell’s type classes could have been discussed in a later chapter. Fortunately, the reader will still hear about this important part of Haskell because a few chapters take advantage of some type classes from the Haskell library. Chapter 3: The Use of Logic: Proof The chapter communicates style recommendations and recipes for simple proofs. This is done without much reference to Haskell or Haskell examples. The idea seems to be that the chapter provides the foundation for carrying out mathematical proofs and proofs about program properties in all subsequent chapters. A typical style recommendation is “Make sure the reader knows exactly what you are up to.” The various recipes basically cover all logical connectives — their introduction and elimination. And then again, even the use of the recipes is complemented by further recommendations such as not to consider proof by contradiction all too easily. The authors deserve extra credit for their clear and detailed enumeration and rationalization of the proof recipes, complete with careful coverage of style issues. This textbook may really enable readers to acquire proving skills. Some of 4 the examples may be potentially too demanding for the beginning mathematician. For instance, the first example for ∃-elimination refers to transcendent reals and their definition as not being roots of a polynomial with integer coefficients. (Polynomials and number theory are only covered much later in the book.) The text readily admits that programming languages like Haskell are of little help with proving general properties about programs. One may use the computer though to refute single cases. Perhaps, this is too much to ask for, but two topics could have been touched upon in the context of this chapter: • The Curry-Howard isomorphism, i.e., the correspondence between types and logical formulas, as much as expressions and logical proofs; see [13] for a functional-programming-minded discussion of this correspondence. • The use of theorem provers to check or even to find proofs. Chapter 4: Sets, Types and Lists The chapter, according to the authors, presents ample opportunity to exercise (perhaps better: acquire) the reader’s skills in writing implementations for set operations and for proving things about sets. This is perhaps a bit misleading. The text does certainly not discuss different (efficient) implementations of sets or other data types. In reality, the chapter focuses on the axiomatization of sets as well as pairs, products and lists. The text also explains Russell’s paradox and the provisions by the Haskell type system that help avoiding such problems in actual Haskell programs. (The text also touches upon the relation between the Halting problem and Russell’s paradox.) Eventually, several list- and set-processing primitives are encoded. These implementations facilitate the type classes Eq (“equality”) and Ord (“ordering”) from the Haskell prelude. Afterwards, the chapter spends some time on Haskell’s special idioms for list comprehensions, which are clearly related to the mathematical notion of set comprehensions. List comprehensions are illustrated with a detailed example in the realm of relational database queries. Regarding “Further Reading”, some more references spring to mind. The reader could appreciate pointers to existing functional-programming-minded or Haskell-specific work on the efficient implementation of data types [11, 12]. The chapter’s major example for list comprehensions, a database query scenario, is weakly typed: the type String is used as the universal data type for all cells in the database instance and all column names. Haskell can do much better using more sophisticated type-system features. Admittedly, substantially more strongly typed approaches require non-Haskell 98 features [8, 7]. It is an asset of the book at hand that it stays with the Haskell 98 standard. Chapter 5: Relations The chapter describes the theory of relations (“sets of ordered pairs”); it defines the common properties of relations and other related terms (reflexivity, 5 transitivity, equivalence relations, quotients, characteristic functions, etc.). The properties are also implemented as checks that can be effectively computed for relations that are given as finite sets of pairs. The chapter focuses on elementary material about relations. N-ary relations and the corresponding relational algebra are not covered. The chapter offers a huge amount of simple but insightful exercises with which the reader can develop skills in mathematical proofs. These exercises are particularly manageable since they assume mostly basic properties of sets and the chapter’s simple definitions for relations. Chapter 6: Functions The chapter is about functions as mathematical objects, not to be confused with Haskell functions. There is clearly a plethora of important mathematical notions around functions: function definition by case discrimination, the relational view on functions, surjections, injections, bijections, inverse, partiality, congruences, and so on. As in previous chapters, the text captures properties of mathematical objects as Haskell expressions that perform “checks”. That is, a certain property of a function, such as injectivity, is checked under the assumption that the domain of the function is given as a (finite) list: injective :: Eq b => (a -> b) -> [a] -> Bool injective f [] = True injective f (x:xs) = notElem (f x) (image f xs) && injective f xs One could take this idea a tiny step further, by writing down QuickCheck [4] properties in Haskell. The QuickCheck tool would automatically check all these properties. For instance, rather than stating the mere expectation that fromEnum should be the left-inverse of toEnum (cf. page 222), one could instead formulate QuickCheck properties for different instances of Enum (i.e., for different enumeration types). Here is a sample property for the Char type: prop_EnumChar = forAll charInts $ \x -> fromEnum ((toEnum x) :: Char) == x charInts :: Gen Int -- restrict Int generator to valid character codes Chapter 7: Induction and Recursion The chapter starts with the basic proof method for mathematical induction. The method is explained in all detail and with great care. In particular, the text clarifies that induction proofs are particularly straightforward whenever the function “under study” is defined by (primitive) recursion on the natural numbers. Induction and recursion is then also demonstrated for trees and lists. The text clearly hints at the full generality of the concepts: recursion schemes 6 can be advised for a large class of data types, and corresponding induction proof schemes are thereby enabled. The “Further Reading” section would be more complete with some references to seminal work on recursion schemes, e.g., [9]. There is also a wonderful tutorial by Augusteijn, which applies morphisms (such as primitive recursion) to the rigorous design of sorting algorithms and their encoding in Haskell [1]. Chapter 8: Working with Numbers The chapter presents the different number systems that exist: natural numbers, integers, rational numbers, irrational numbers, and complex numbers. By developing these number systems for Haskell, the text also provides deeper insight into Haskell’s built-in and library support for numbers. As usual, natural numbers are shown to suffice as basis for integers and rational numbers. In fact, different representations for these two derived number systems are discussed and implemented in Haskell. Irrational numbers are defined informally (as infinite, non-periodic decimal expansions). Implementation-wise, the Haskell primitive type for reals is used. Key notions for reasoning about reals are defined: continuous functions, limits, Cauchy sequences. Throughout the chapter, it is shown how the different number systems participate in standard type classes for equality, ordering and arithmetic operations. Standard algebraic properties of the operations on the numbers (associativity etc.) are routinely proved. For several of the number representations, geometric interpretations are visualized. These illustrations should be of great help for the reader. Chapter 9: Polynomials The chapter discusses polynomials with the initial goal to automate the search for polynomials as closed forms for sequences of integers. To this end, Babbage’s classic difference method is explained and implemented in Haskell. (Recall that the method works as follows: suppose we are given a “long enough” sequence of integers a0 , . . . , an , for which we presume that it may be computed from a polynomial f (x) such that a0 = f (0), . . . , an = f (n), then we may attempt to find the closed form f (x) in two steps. (i) Determine the degree of f (x) by difference analysis on the given sequence of integers. (ii) Perform Gaussian elimination to determine the coefficients of f (x).) The authors succeed in capturing the beauty of this method, making clear that no magic is involved. Again, the combination of mathematical notation and Haskell encoding helps enormously to get all the fine details across. This chapter is a master piece: a concise but still comprehensive and insightful explanation of the method. All of Babbage, complete with the Haskell encoding on just 13 pages! The chapter also discusses the link between polynomials and combinatorics. In this context, Newton’s binomial theorem is derived and put to work. These 7 parts of the chapter are slightly less clear in stating up-front what they aim to achieve. We recall the simple version of Newton’s binomial theorem: n X n k (z + 1) = ( )z k n k=0 The left-hand side is not in the form of a polynomial (it uses a binomial — a sum of two terms), whereas the right-hand side is in the form of a polynomial. Hence, one way to read Newton’s theorem is that it enables binomial expansions such that pure polynomials are derived. It is straightforward to prove Newton’s theorem (by induction). The text however conveys the beauty of Newton’s findings by deriving the theorem through operations on polynomials: substitution and calculus. Again, the text communicates deep insight combined with a Haskell model. The final part of the chapter discusses the representation of polynomials as lists of their coefficients. Polynomial arithmetics and calculus is then derived on top of this representation. The main goal is to reason about combinatorial problems. In particular, polynomials (as lists of coefficients) are derived as solutions to combinatorial problems. For instance, the polynomial expansion of (z + 1)10 solves the problem of picking k elements from a set of 10. Chapter 10: Corecursion The chapter discusses infinite data structures (mostly streams). Haskell laziness’s makes this language clearly suited to study such data structures even programmatically. One important goal of the chapter is to describe proof methods for corecursive functionality. The text also makes excursions to the following two related subjects. Non-deterministic processes are modeled as functions from random integer streams (for coding “decisions”) to streams (for coding the actions performed). The earlier discussion of the link between polynomials and combinatorics is generalized to power series (so to say polynomials with infinite series of coefficients). Power series naturally show up once polynomials are divided; the results of division may have an infinite degree. The authors make the point (in the introduction) that they deliver the first, general textbook treatment of recursion. This already indicates the challenge of this section. Some readers may expect from the chapter to become wellversed in coinduction proofs. Unfortunately, the text is scarce in this respect. There are essentially just 5 pages for the recipe of coinduction proofs. There is essentially just one example of a coinduction proof for streams, and one may argue whether or not the proof is detailed enough. The “Further reading” section should perhaps refer to more scenarios for coinductive reasoning, and more sample proofs. In particular, Barwise and Moss’ book on “Vicious circles” [3] springs to mind. 8 Chapter 11: Finite and Infinite Sets The chapter can be seen as a more advanced continuation of Chapter 4: Sets, Types and Lists. The text begins with a deeper analysis of mathematical induction. Many additional insights are provided, when compared to the intuitive use of induction proofs in earlier chapters. For instance, the notion of strong induction is presented, which does not require a base step and uses a stronger induction hypothesis, thereby enabling proofs of more involved problems. Another subject of the chapter is equipollence, preparing ultimately for the discussion of cardinalities of sets including infinite cardinalities such as ℵ0 (i.e., the cardi0 nality of the natural numbers) and 2ℵ (i.e., the cardinality of the powerset of the natural numbers). A few ideas are nicely illustrated through Haskell code, e.g., the diagonalization for the rational numbers, which shows that this set of numbers is countably infinite. 3 Non-Haskell roads to logic and maths When reading this book, it is a useful exercise to question every now and then whether or not the Haskell road is a convenient one, what the issues would be when mainstream programming languages were used at times. It seems to be undisputed that Haskell allows for a more or less immediate transcription of mathematical notation to program code. This is made possible by Haskell’s declarativeness, purity and conciseness. Haskell’s laziness further helps with encoding mathematical problems that involve infinite data structures. Haskell’s higher-orderness is essential to provide mathematical concepts as library functionality. (For instance, think of the higher-order function that turns a sequence of a polynomial’s coefficients in the actual function for the polynomial.) Finally, Haskell’s type system serves an important documentary purpose; machine-checked type information and executability are in fact the two major ways in which Haskell notation complements mathematical notation. Without any claim of completeness, we would like to illustrate some of the issues that arise when encoding maths in mainstream languages such as C# or Java. For the code examples that follow, we will use C# (2.0), but we could have used Java (1.5) just as well, without changing the tenor of the observations. Consider the following Haskell function, difs, for computing a difference sequence. This operation is at the heart of Babbage’s difference engine. (Recall: one uses the function difs to determine the degree of a potential polynomial f (x) that should be derived as the closed form from a “long enough” sequence of integers a0 , . . . , an , for which we assume that it corresponds to f (0), . . . , f (n). The degree of f (x) is the number of iterations of applying difs until the resulting sequence is a constant sequence, if this happens at all.) difs difs difs difs :: [Integer] -> [Integer] [] = [] [_] = [] (m:n:ks) = n-m : difs (n:ks) 9 The following C# encoding may serve as an efficient transcription. static Decimal[] difs(Decimal[] given) { Decimal[] result = new Decimal[ given.Length == 0 ? 0 : given.Length-1]; for (int i=1; i<given.Length; i++) result[i-1] = given[i]-given[i-1]; return result; } The C# function operates on arrays of values of type Decimal (which is C#’s counterpart to Haskell’s arbitrary precision integers). The array for the result is explicitly allocated, leveraging the observation that the difs function returns a sequence that is one element shorter than the (non-empty) input sequence. All sense of equational reasoning is gone. The allocation code requires an extra proof in order to establish its correctness. There is actually no straightforward way to retain the recursive formulation of the problem. (For the record, with C++ pointer arithmetics, we were able to process the input array recursively. However, the recursive synthesis of the result would not work so easily.) Hence, the mainstream road to maths is bumpy because of the encoding efforts; it will be rather painful once we wanted to reason about these programs. We attempt some variations in the sequel. The following C# variation uses the generic collection type List in place of arrays: static List<Decimal> difs(List<Decimal> given) { List<Decimal> result = new List<Decimal>(); if (given.Count > 1) { result.Add(given[1]-given[0]); result.AddRange(difs(given.GetRange(1,given.Count-1))); } return result; } The earlier array location reduces to a simple object construction for the initially empty list. (Hence, we eliminated the need for the extra insight regarding the length of the result.) The List type is rich enough to re-establish the recursive coding style. The exercised style is rather inefficient. For instance, the GetRange method involves cloning of the “tail”. We also note that we still fail to provide any sort of equational style; so equational reasoning remains out of reach. Furthermore, we fail to obtain the conciseness of pattern matching. Yet another deficiency is worth mentioning: The previous C# encodings are all eager. This is perhaps acceptable for the use of difs in the context of Babbage’s method, but eventually all sorts of similar list processing functionality needs to be lazy. (Think of moving from polynomials to power series.) Here is 10 a more clever C# solution, which engages in less cloning, and which is lazy at the same time: static IEnumerable<Decimal> difs(IEnumerable<Decimal> given) { Decimal? i = null; foreach (Decimal j in given) { if (i.HasValue) yield return j-i.Value; i = j; } } That is, we use the IEnumerable interface and the yield return idiom to compute the resulting list lazily. (We also use C#’s nullable types; cf. “?”.) It is not an accident that this solution uses an imperative loop again. That is, C#’s streams (or lazy lists) are idiomatically restricted. Re-establishing recursion is a non-trivial undertaking. Here is a (prohibitively inefficient) attempt: static IEnumerable<Decimal> difs(IEnumerable<Decimal> given) { if (empty(given)) yield break; if (empty(tail(given))) yield break; Decimal m = head(given); Decimal n = head(tail(given)); yield return n-m; foreach (Decimal i in difs(tail(given))) yield return i; } One major problem is that the streams returned from the recursive calls needs to be pulled into the local result stream explicitly through the (expensive) foreach loop. Also, the code is baroque anyhow, even though we anticipated the possibility of helpers to take apart lists; cf. empty, head, tail (definitions omitted). Bottom line This detour has illustrated that relatively simple pieces of mathematical definitions can be difficult to encode in mainstream programming languages. So anyone in search of a road to logic and maths, is well advised to favor the Haskell road, not to get lost in the programming bits of such an endeavor. It is a unique capability of Haskell that mathematical notation (in the form of equations, sums, products, compound expressions, etc.) is type-able and executable in this programming language more or less as is. The book under review leverages this capability very appropriately. 11 4 Concluding remarks Doets and van Eijck’s “The Haskell Road to Logic, Maths and Programming” is an astonishingly extensive and accessible textbook on logic, maths, and Haskell. The book adopts a systematic but relaxed mathematical style (definition, example, exercise, ...); the text is very pleasant to read due to a small amount of anecdotal information, and due to the fact that definitions are fluently integrated in the running text. The overall selection of mathematical subjects is non-surprising (which is good), except that some advanced topics are included such as corecursion and Cantor’s infinities. One would perhaps expect to see a more substantial treatment of calculus and some coverage of statistics. Regarding the targeted audience, the text seems to be valuable and advisable for undergraduates with mathematics and logic as minor subjects. However, even mathematically ambitious readers should find this book interesting, be it then more for the Haskell part of it. The book was indeed developed through undergraduate courses at the University of Amsterdam. The Haskell samples in the book appear to be highly idiomatic, and readers can certainly expect to learn Haskell programming, so to say as a side effect. Not surprisingly, the book does not cover all of a typical functional programming text. For instance, type classes are used only in a minimalistic way. Also, monads do not show up anywhere in the book. While this is normally “unimaginable” for a Haskell introduction, it makes total sense for this specific book. The book’s write-up and program development has been based on literate programming. (However, the sources that are obtainable from the authors’ website do not currently comprise the text of the chapters; presumably for copyright reasons.) Regarding the availability of the book: the “Texts in Computing Series” of King’s College Publications are published on a ”Print on Demand” basis. This has as the benefit that the price is much lower than with regular publishers — at the time of writing: 25$ vs. 14£. Some may argue that it also has the minor drawback that the book is not for sale in local bookstore, but has to be ordered through Amazon instead. I take the liberty to close this review with an admittedly personal comment. I would have wanted this very book during my computer science studies. The Haskell way of modeling mathematical concepts in a declarative, executable and strongly typed manner is very supportive in learning. The small but telling distance between mathematical notation and Haskell notation makes it also more rewarding to actually engage in reasoning about mathematical problems and programs. I still remember wasting time on engaging in Pascal encodings for some of my maths homework. Should I end up giving lectures on maths and logic, I will love to use this book in such a course. 12 References [1] L. Augusteijn. Sorting morphisms. In S. Swierstra, P. Henriques, and J. Oliveira, editors, 3rd International Summer School on Advanced Functional Programming, volume 1608 of LNCS, pages 1–27. Springer-Verlag, Sept. 1998. [2] J. Barwise and J. Etchemendy. Language, Proof, and Logic. Center for the Study of Language and Information, Stanford, CA, USA, 1999. Accompanied by software. [3] J. Barwise and L. Moss. Vicious circles: on the mathematics of nonwellfounded phenomena. Center for the Study of Language and Information, Stanford, CA, USA, 1996. [4] K. Claessen and J. Hughes. QuickCheck: a lightweight tool for random testing of Haskell programs. In Proceedings of the ACM Sigplan International Conference on Functional Programming (ICFP-00), volume 35.9 of ACM Sigplan Notices, pages 268–279, N.Y., Sept. 18–21 2000. ACM Press. [5] C. Hall and J. O’Donnell. Discrete mathematics using a computer. SpringerVerlag, 2000. Second Edition to appear [10]. [6] P. Hudak. The Haskell School of Expression: Learning Functional Programming through Multimedia. CUP, Jan. 2000. [7] O. Kiselyov, R. Lämmel, and K. Schupke. Strongly typed heterogeneous collections. In Haskell ’04: Proceedings of the ACM SIGPLAN workshop on Haskell, pages 96–107. ACM Press, 2004. [8] D. Leijen and E. Meijer. Domain specific embedded compilers. In Proceedings of the 2nd conference on Domain-Specific Languages, pages 109–122. ACM Press, 1999. [9] E. Meijer, M. Fokkinga, and R. Paterson. Functional Programming with Bananas, Lenses, Envelopes and Barbed Wire. In FPCA91: Functional Programming Languages and Computer Architecture, volume 523 of LNCS, pages 124–144. Springer-Verlag, 1991. [10] J. O’Donnell, C. Hall, and R. Page. Discrete Mathematics Using a Computer. Springer-Verlag, 2006. Second Edition. [11] C. Okasaki. Purely functional data structures. PhD thesis, Carnegie Mellon University, 1996. [12] C. Okasaki. An Overview of Edison. In G. Hutton, editor, Electronic Notes in Theoretical Computer Science, volume 41. Elsevier, 2001. [13] S. Thompson. Type Theory and Functional Programming. International Computer Science Series. Addison Wesley, 1991. 13 [14] S. Thompson. The Craft of Functional Programming. Addison Wesley, 1996. 2nd edition in 1999. 14
6cs.PL
EQUATIONS OF REES ALGEBRAS OF IDEALS IN TWO VARIABLES arXiv:1511.04073v1 [math.AC] 12 Nov 2015 JEFF MADSEN Abstract. Let I be an ideal of height two in R = k[x0 , x1 ] generated by forms of the same degree, and let K be the ideal of defining equations of the Rees algebra of I. Suppose that the second largest column degree in the syzygy matrix of I is e. We give an algorithm for computing the minimal generators of K whose degree is at least e, as well as a simple formula for the bidegrees of these generators. In the case where I is an almost complete intersection, we give a generating set for each graded piece Ki,∗ with i ≥ e − 1. Let I be an ideal in a Noetherian ring R. The Rees algebra of I, defined as R(I) = R[It] = L∞ j j j=0 I t , is a central object in both commutative algebra, where it is used to study the asymptotic behavior of I, and algebraic geometry, where it corresponds to blowing up the closed subscheme V (I) in Spec R. A common approach to understanding Rees algebras is by representing them as quotients of polynomial rings. Namely, if I = (f1 , . . . , fn ), then R(I) is a quotient of the polynomial ring S = R[T1 , . . . , Tn ] via the R-linear map Ti 7→ fi t. The kernel of this map is an ideal K ⊂ S, called the ideal of defining equations of R(I). Much work has been done to determine the ideal K under various conditions (such as [1, 3, 5, 14, 15, 16, 23, 24, 25, 26, 31, 32]). However, even in the relatively simple case where R = k[x0 , x1 ] is a polynomial ring in two variables over a field and I is a homogeneous ideal generated in a single degree d, the problem of determining the equations of R(I) remains open. This problem is of interest not only in commutative algebra and algebraic geometry, but also in elimination theory and geometric modeling, where it is connected to implicitization of parametrized varieties (e.g. [4, 9, 10, 28, 27]). We focus on the case R = k[x0 , x1 ] where k is an algebraically closed field. To any height two homogeneous ideal I ⊂ R generated by forms f1 , . . . , fn of degree (f1 :···:fn ) d, we may associate a morphism Φ : P1k −−−−−−→ Pkn−1 , which parametrizes a curve C ⊂ Pkn−1 . Conversely, to any map Φ : P1k → C parametrizing a curve in Pkn−1 by equations (f1 : · · · : fn ), we may associate the ideal I = (f1 , . . . , fn ) ⊂ R. Then the Rees algebra R(I) is the bihomogeneous coordinate ring of the graph of Φ, ΓΦ = {(p, Φ(p)) | p ∈ P1k } ⊂ P1k × Pkn−1 . Date: January 9, 2018. 2010 Mathematics Subject Classification. Primary: 13A30, Secondary: 13D02, 14E05, 14H50, 14Q05. Key words and phrases. Bidegree, elimination theory, Hilbert-Burch matrix, integral closure, parametrization, plane curve, rational curve, rational normal scroll, Rees algebra, Sylvester form, symmetric algebra. 1 Since S = R[T1 , . . . , Tn ] is the bihomogeneous coordinate ring of P1k × Pkn−1 , this means that the ideal K ⊂ S of defining equations of R(I) is the ideal of ΓΦ . That is, for any bihomogeneous h ∈ S, h ∈ K ⇔ h(x0 , x1 , f1 (x0 , x1 ), . . . , fn (x0 , x1 )) = 0. In particular, the elements of K having x-degree 0 are just the implicit equations of the curve C. (By x-degree we mean the degree in the variables x0 , x1 , as opposed to the degree in T1 , . . . , Tn , or T -degree.) The first step in computing the equations of the Rees algebra is to compute the syzygy matrix ϕ of I, which determines the T -linear part of K. Since I is generated in one degree, each column of the matrix ϕ has the same degree. Several results have been proved by imposing restrictions on the syzygy matrix. For ideals generated by three forms, Cox, Hoffman, and Wang [7] gave a recursive algorithm, using Sylvester forms, for computing a minimal generating set for the equations of the Rees algebra when I has a syzygy of degree 1. This was generalized by Cortadellas and D’Andrea [6] to the case where a syzygy of I of minimal degree µ, when viewed as a column vector, has linearly dependent entries (a “generalized zero”). However, their method only produces part of a minimal generating set. In particular, the equations produced by this algorithm all have x-degree ≥ µ − 1. These are in fact all the minimal generators of K having x-degree ≥ µ − 1, as proved by Kustin, Polini, and Ulrich [19]. Kustin, Polini, and Ulrich [22] took another approach to determine the equations of K when I has any number of generators and has a presentation matrix ϕ which is almost linear, meaning all but one of the columns of ϕ have linear entries. They showed that the Rees algebra is a quotient of a ring A, which is the coordinate ring of a rational normal scroll, by a height one prime ideal KA. The equations of the scroll being easy to compute, this reduces the problem to computing the generators of the divisor KA on A, which was carried out in [21]. The equations are even given explicitly, assuming ϕ is put into a canonical form. In this paper, we extend the method of Kustin, Polini, and Ulrich to arbitrary height two ideals I in k[x0 , x1 ] generated by forms of the same degree. Unlike the almost linearly presented case, we cannot produce all the defining equations of the Rees algebra in this way, but we do obtain all the minimal generators of x-degree greater than or equal to the second largest degree of a column of ϕ, and in some cases, in degree one less. Theorem 3.9 gives an abstract form of these generators, and Corollary 3.17 gives a recursive algorithm for computing them. In particular, their bidegrees follow a simple formula; see Corollary 3.13. In Example 3.20, we show how to use Theorem 3.9 to solve the almost linearly presented case, reproving [22, Theorem 3.6]. In Example 3.21, we show how the algorithm in Corollary 3.17 reduces to the Sylvester form algorithm in [6, Theorem 2.10], when I has three generators and has a syzygy of minimal degree with a generalized zero. In Example 3.22, we give another example, applying Corollary 3.17 to the case where I has three generators and a syzygy of minimal degree 2 without a generalized zero, a case which was previously solved in [2] and [6] using Morley forms. 2 In Section 1, we introduce the setup of the problem and the necessary definitions. In particular, we construct a sequence of modules Em which are successive approximations of I. In Section 2, we determine the structure of the modules R(Em ) by embedding each Em in a free L module. This allows us to embed R(Em ) in a ring of the form R(M ) where M = si=1 mσi (σi ), which we show in Proposition 2.5 is the coordinate ring of a rational normal scroll. This embedding is actually an integral extension, and the two rings are equal in large degree, as we show in Theorem 2.9. In Section 3, we use the results of Section 2 to compute the ideal of equations of R(Em+1 ) in R(Em ) by first computing it in R(M ) and then contracting to R(Em ). In Theorem 3.9, we give the elements in R(M ) which contract to a minimal generating set of the x-degree ≥ dm part of the ideal of equations of R(Em+1 ). The contraction may be made explicit using the algorithm given in Corollary 3.17. Corollary 3.13 applies this in particular to the case m = n − 2 to obtain the bidegrees of the minimal generators of K with x-degree ≥ dn−2 . In Section 4, we consider specifically plane curves, that is, the case n = 3. In this case, we can be more explicit about the R(E1 )-module structure of R(M ), in Proposition 4.7. We use this to give a generating set, in general not minimal, for each graded component Ki,∗ with i ≥ d1 − 1. 1. Setup Throughout this paper, we assume k is a field, R is the two-variable polynomial ring R = k[x0 , x1 ], and m is the homogeneous maximal ideal m = (x0 , x1 ). We use the convention that N is the set of nonnegative integers. Although we wish to compute Rees algebras of ideals, it will be helpful to use Rees algebras of more general modules. If E is a finitely generated R-module, then following [29], we define the Rees algebra R(E) to be the quotient of the symmetric algebra S(E) by its R-torsion. As R is a domain, this is consistent with the other standard definitions of Rees algebras of modules, such as in [13], and it is also consistent with the usual definition of the Rees algebra of an ideal. Recall ∼ R[T1 , . . . , Tn ]/(g1 , . . . , gm ) where that if ϕ is the m × n presentation matrix of E, then S(E) = i i h h (1.1) g1 · · · gm = T1 · · · Tn ϕ. The Krull dimension of the Rees algebra is dim R(E) = dim R + rank E = 2 + rank E ([29, Propo- sition 2.2]). Let S = R[T1 , . . . , Tn ], with deg xi = (1, 0) and deg Ti = (0, 1). We refer to the first degree in this bigrading as the x-degree or degx , and the second degree as the T -degree or degT . By Si,j we mean the bidegree (i, j) part of S, viewed as a k-vector space. Write Si,∗ for the k[T1 , . . . , Tn ]-module L L j Si,j , and S∗,j for the R-module i Si,j . We shall use the same bigrading on any quotient of S, such as R(I). Note that this is not the same as the bigrading induced by the inclusion R(I) = R[It] ⊂ R[t]. For example, the element fi t has bidegree (d, 1) in R[t], however we will think of it as having bidegree (0, 1) since it corresponds 3 to the element Ti ∈ S. Thus to be more precise, we consider R(I(d)) rather than R(I), so that the grading induced by S is the natural grading on the Rees algebra. If I is a height two ideal of R minimally generated by n forms of degree d, then I(d) has a Hilbert-Burch resolution (1.2) 0→ n−1 M ϕ R(−di ) − → Rn → I(d) → 0 i=1 where I is generated by the maximal minors of ϕ, and thus Pn−1 i=1 di = d. We may assume the column degrees of ϕ are nondecreasing, that is, 1 ≤ d1 ≤ · · · ≤ dn−1 . For 1 ≤ m ≤ n − 1, let ϕm be the n × m matrix consisting of the first m columns of ϕ and let Em = coker ϕm , so that ϕn−1 = ϕ and En−1 = I(d). There is a sequence of surjections R3 ։ E1 ։ E2 ։ · · · ։ En−1 = I(d) which induce surjections S ։ R(E1 ) ։ R(E2 ) ։ · · · ։ R(En−1 ) = R(I(d)). We think of the rings R(Em ) as successive approximations of R(I(d)). Instead of directly computing the equations of R(I(d)) in S, we may compute the equations in R(En−2 ), where it will be simpler. We then need to compute the equations of R(En−2 ) in R(En−3 ), and so on. That is, we have a sequence of inclusions 0 ( K1 ( K2 ( · · · ( Kn−1 = K where each Km is a prime ideal with ht Km = dim S − dim R(Em ) = (2 + n) − (2 + rank Em ) = m. We study the modules Km+1 R(Em ) ∼ = Km+1 /Km . A generating set for K may be obtained by combining the lifts of generating sets of all the modules Km+1 /Km . We summarize the data that we will be assuming. Data 1.3. Let I be a height 2 ideal in R generated by n forms f1 , . . . , fn of degree d, with presentation matrix ϕ, and resolution as given in (1.2). Let S = k[T1 , . . . , Tn ], let g1 , . . . , gn−1 ∈ S be the equations of the symmetric algebra of I as in (1.1), and let K ⊂ S be the ideal of equations of the Rees algebra of I. For 1 ≤ m ≤ n − 1, let ϕm be the n × m matrix consisting of the first m columns of the presentation matrix ϕ and let Em = coker ϕm . Let Km ⊂ S be the ideal of equations of the Rees algebra of Em . By (1.1), the equations of S(Em ) are g1 , . . . , gm . Thus for each m, there is a short exact sequence (1.4) 0 → Km /(g1 , . . . , gm ) → S(Em ) → R(Em ) → 0. Let us deduce some simple properties of the modules Em . Lemma 1.5. Assume Data 1.3 and let 1 ≤ m ≤ n − 1. Then Em is torsionfree of rank n − m, and for any w ∈ m, (Em )w is a free Rw -module. 4 Proof. Because ϕ is injective, and ϕm is the restriction of ϕ to a submodule, ϕm is injective. Thus Em has a free resolution (1.6) 0→ m M ϕm R(−di ) −−→ Rn → Em → 0. i=1 By expanding the determinants along the last n−1−m columns, we see that I = In−1 (ϕ) ⊂ Im (ϕm ). Because ht I = 2, we get ht Im (ϕm ) = 2. So if we invert w ∈ m, we get Im (ϕm )w = Rw . This means ∼ Rm−n . that after inverting w, (1.6) splits, yielding (Em )w = w It remains to show that Em is torsionfree, or equivalently that if p 6= 0 is a homogeneous prime ideal of R, then p 6∈ AssR (Em ). If p 6= m, then (Em )p is free by the above, so pRp 6∈ AssRp ((Em )p ) and thus p 6∈ AssR (Em ). On the other hand, pd Em ≤ 1 by (1.6), so depth Em ≥ 1 by the Auslander-Buchsbaum formula. Hence m 6∈ AssR (Em ), therefore Em is torsionfree.  As a consequence, we obtain a formula for Km . While this description does not provide any information about the generators of Km , it is the basis upon which we will perform our calculations involving Km . Proposition 1.7. Assume Data 1.3 and let 1 ≤ m ≤ n − 1. Then Km = (g1 , . . . , gm ) :S m∞ . Proof. By Lemma 1.5, for any w ∈ m, (Em )w is a free Rw -module. Therefore R(Em )w = R((Em )w ) = S((Em )w ) = S(Em )w . It follows from (1.4) that Km Sw = (g1 , . . . , gm )Sw , which means Km :S m∞ = (g1 , . . . , gm ) :S m∞ . But Km is a prime ideal, so Km = Km :S m∞ = (g1 , . . . , gm ) :S m∞ .  2. The modules R(Em ) Fix m. To determine the Rees algebra of Em , we begin by embedding Em in a free module. ∗∗ is free (where −∗ = Hom (−, R)); we have an Namely, we show in Lemma 2.1 that F = Em R ∗∗ since E injection Em ֒→ Em m is torsionfree by Lemma 1.5. The free module F is generated in nonpositive degrees, while Em is generated in degree 0. Thus E is a submodule of M = F≥0 . This section is concerned with computing the Rees algebras of F and M and comparing them to the Rees algebra of Em . The lemma below is the graded version of [18, Proposition 2.1]. Ls Lemma 2.1. Let E be an R-module of rank s generated in degree 0. Then E ∗∗ ∼ = i=1 R(σi ) with all σi ≥ 0. Proof. Set F = E ∗∗ . Then F is reflexive, so it satisfies Serre’s condition S2 . Since F is torsionfree, dim F = dim R = 2, hence F is maximal Cohen-Macaulay. Because R is regular, the AuslanderL Buchsbaum formula implies F is free. Thus we may write F = si=1 R(σi ). To see that all σi ≥ 0, choose a surjection Rn ։ E and consider the map ξ : Rn → F obtained by composing this surjection with the natural map θ : E → E ∗∗ = F . Assume by way of contradiction that some σi , say σs , is negative. Then, viewing ξ as an s × n matrix, the last row of ξ must be zero. 5 This means im ξ ⊂ Ls−1 i=1 R(σi ), so rank(im ξ) < s. But im ξ = im θ, so rank(im ξ) = rank E = s. By contradiction, all σi are nonnegative.  Recall from Lemma 1.5 that Em is a torsionfree R-module of rank n − m. Using Lemma 2.1, we extend Data 1.3: Data 2.2. Assume Data 1.3, fix 1 ≤ m ≤ n − 1, and set s = n − m. Let E = Em and let Ls F = E ∗∗ ∼ = i=1 R(σi ), with σ1 ≥ · · · ≥ σs ≥ 0. Let r be the unique integer with 1 ≤ r ≤ s such L that σ1 ≥ · · · ≥ σr > 0 = σr+1 = · · · = σs . Let M = F≥0 = si=1 mσi (σi ). Let ξ be the composite map Rn ։ E ֒→ F . Because E is generated in degree 0, the inclusion E ֒→ F factors as E ֒→ M ֒→ F . Therefore there are inclusions of Rees algebras R(E) ֒→ R(M ) ֒→ R(F ). This will allow us to do computations in R(E) by extending to R(M ) or R(F ) and then contracting, as in Proposition 3.1. The Rees algebra of F is easy to understand. Remark 2.3. Assume Data 2.2. Then R(F ) = R[w1 , . . . , ws ] = k[x0 , x1 , w1 , . . . , ws ], where deg xi = (1, 0) and deg wi = (−σi , 1). Viewing R(E) as a subset of R(F ), we have i i h h T1 · · · Tn = w1 · · · ws ξ. L Proof. Since F = si=1 R(σi ) is a free module, the Rees algebra R(F ) is the same as the symmetric algebra S(F ), which is a polynomial ring R[w1 , . . . , ws ]. Each variable wi corresponds to one generator of F . Since the ith generator of F has degree −σi , the variable wi has bidegree (−σi , 1). The R-module map ξ : Rn ։ E ֒→ F induces the R-algebra map R(ξ) : S = R(Rn ) ։ R(E) ֒→ R(F ) which lets us view R(E) as a submodule of R(F ). Therefore i i h h T1 · · · Tn = w1 · · · ws ξ.  The Rees algebra of M is also not difficult to describe. First, will to define the R-algebra Scr(σ), which we will then show is isomorphic to R(M ) in Proposition 2.5. The ring Scr(σ) is the coordinate ring of a rational normal scroll if all the σi are positive; otherwise, it is a cone over a rational normal scroll. In any case, it is a Cohen-Macaulay normal domain of dimension s + 2 (see [11] or [12]). Definition 2.4. Let σ1 , . . . , σs be nonnegative integers, and let V = R[{vi,j | 1 ≤ i ≤ s, 0 ≤ j ≤ σi }]. Let Γ be the matrix with entries in V : " x0 v1,0 v1,1 · · · v1,σ1 −1 · · · Γ= x1 v1,1 v1,2 · · · v1,σ1 ··· vs,0 vs,1 · · · vs,σs −1 vs,1 vs,2 · · · vs,σs # . Define the ring Scr(σ) = Scr(σ1 , . . . , σs ) = V /I2 (Γ). Proposition 2.5. Assume Data 2.2. Then R(M ) = R[{xσ0 i −j xj1 wi | 1 ≤ i ≤ s, 0 ≤ j ≤ σi }] ⊂ R[w1 , . . . , ws ] = R(F ) 6 and R(M ) ∼ = Scr(σ). Proof. From Remark 2.3, R(F ) = R[w1 , . . . , ws ] where deg xi = (1, 0) and deg wi = (−σi , 1). Thus the monomials in R(F ) of x-degree 0 are xσ0 i −j xj1 wi , so R(M ) = R(F )≥0,∗ = R[{xσ0 i −j xj1 wi | 1 ≤ i ≤ s, 0 ≤ j ≤ σi }]. Now define V and Γ as in Definition 2.4, and define a surjective R-linear map θ : V ։ R(M ) by vi,j 7→ xσ0 i −j xj1 wi . It is easy to see that I2 (Γ) ⊂ ker θ, so θ descends to a map θ : Scr(σ) = V /I2 (Γ) ։ R(M ). Since dim Scr(σ) = s + 2 = 2 + rank M = dim R(M ), θ is a surjective map between domains of the same dimension, hence it is an isomorphism.  Because R(F ) and R(M ) have straightforward descriptions, we want to compare R(E) to these rings. The first step is to compare the modules E and F by looking at F/E. In the remark below, we see that F/E is Artinian and is zero in degree ≥ dm − 1. This will be used in Theorem 2.9 to show that R(F ) and R(E) agree in these degrees. As another consequence, the resolution (2.8) gives an easy way of computing the matrix ξ, as the transpose of the syzygy matrix of ϕT m . We need to know ξ in order to make the homomorphism R(E) ֒→ R(F ) explicit (Remark 2.3). Lemma 2.6. Assume Data 2.2. (a) F/E has free resolution (2.7) 0→ m M ξ ϕm →F = R(−di ) −−→ Rn − s M R(σi ) → F/E → 0. i=1 i=1 (b) F/E is Artinian. (c) (F/E)≥dm −1 = 0. (d) Ext2R (F/E, R) has free resolution (2.8) 0→ s M ξT ϕT R(−σi ) −→ Rn −−m → (e) s = n − m and i=1 σi R(di ) → Ext2R (F/E, R) → 0. i=1 i=1 Ps m M = Pm i=1 di . Proof. (a) This resolution is obtained by combining the short exact sequence (1.6) with the short exact sequence 0 → E → F → F/E → 0. (b) If p ⊂ R is a prime ideal with p 6= m, then Ep is free by Lemma 1.5. Therefore Fp = Ep∗∗ = Ep , so (F/E)p = 0. Hence Supp(F/E) ⊂ {m}, meaning F/E is Artinian. (c) Since 1 ≤ d1 ≤ · · · ≤ dm , it follows from (2.7) that reg(F/E) = dm − 2. Since F/E is Artinian, this means that (F/E)≥dm −1 = 0. (d) Since F/E is Artinian, grade(F/E) = 2. By (2.7), pd(F/E) ≤ 2, therefore F/E is perfect of grade 2. Thus the resolution of Ext2R (F/E, R) is dual to the resolution of F/E in (2.7). 7 (e) From (2.7), we see that the Hilbert polynomial of F/E is m s X X R(t − di + 1) (t + σi + 1) − n(t + 1) + HPF/E (t) = i=1 s X i=1 = (s + m − n)t + (s + m − n + σi − i=1 m X di ). i=1 On the other hand, F/E is Artinian, so its Hilbert polynomial must be zero. Therefore s = n − m P P and si=1 σi = m  i=1 di . The next theorem relates the Rees algebras R(E), R(M ), and R(F ). It allows us, when looking in large x-degrees, to pass from R(E) to R(M ), where computation is easier due to the structure of R(M ) given in Proposition 2.5. Theorem 2.9. Assume Data 2.2. (a) R(E)≥dm −1,∗ = R(M )≥dm −1,∗ = R(F )≥dm −1,∗ . (b) R(M ) is the integral closure of R(E) in its field of fractions. (c) E is a reduction of M in F . Proof. (a) The second equality is true because R(M ) = R(F≥0 ) = R(F )≥0,∗ . For the first equality, we show by induction on j ≥ 0 that R(E)i,j = R(M )i,j for all i ≥ dm − 1. If j = 0, this is true because R(E)∗,0 = R = R(M )∗,0 . Let j = 1 and let i ≥ dm − 1. As E and M are torsionfree R-modules, R(E)∗,1 = E and R(M )∗,1 = M . But E≥dm −1 = F≥dm −1 = M≥dm −1 by Lemma 2.6(c), therefore R(E)≥dm −1,1 = R(M )≥dm −1,1 . In particular, R(E)i,1 = R(M )i,1 since i ≥ dm − 1. Now suppose j > 1 and i ≥ dm − 1. Certainly R(E)i,j ⊂ R(M )i,j . On the other hand, R(M )i,j = R(M )0,1 R(M )i,j−1 = R(M )0,1 R(E)i,j−1 by induction = R(M )0,1 R(E)i,0 R(E)0,j−1 ⊂ R(M )i,1 R(E)0,j−1 = R(E)i,1 R(E)0,j−1 by the case j = 1 = R(E)i,j . Therefore R(E)i,j = R(M )i,j . (b) Since R(M )≥dm −1,∗ = R(E)≥dm −1,∗ is a faithful R(M )-module which is a finitely generated R(E)-module, the determinant trick ([30, Lemma 2.1.9]) shows that the extension R(E) ⊂ R(M ) is integral. Since R(M ) ∼ = Scr(σ) by Proposition 2.5, R(M ) is normal. It remains to show that R(E) and R(M ) have the same field of fractions. For each 1 ≤ i ≤ s, define pi = xσ0 i +dm −1 wi . i −dm +1 Then deg pi = (dm − 1, 1), so pi ∈ R(E) by (a). Also, x0 ∈ R ⊂ R(E), thus wi = x−σ pi ∈ 0 Quot(R(E)). Since x0 , x1 ∈ Quot(R(E)) and wi ∈ Quot(R(E)) for all i, we get Quot(R(E)) ⊃ 8 k(x0 , x1 , w1 , . . . , ws ) = Quot(R(F )) ⊃ Quot(R(M )), therefore Quot(R(E)) = Quot(R(M )). Hence R(M ) is the integral closure of R(E) in its field of fractions. (c) This is equivalent to R(M ) being integral over R(E) ([30, Theorem 16.2.3]), which we already proved in (b).  3. Equations of Rees algebras Now that we have some understanding of R(E), we wish to compute the ideal Km+1 R(E), as discussed in Section 1. First, in Proposition 3.1, we use the fact that R(E) ⊂ R(M ) is an integral extension of rings to show that Km+1 R(E) is the contraction of the R(M )-ideal (gm+1 R(F ))≥0,∗ = gm+1 R(F )≥−dm+1 ,∗ . Theorem 3.7 gives a generating set for ideals of this form. We will put these together to obtain the x-degree ≥ dm part of a minimal generating set of Km+1 R(E) in Theorem 3.9. While these generators are given in terms of the variables w1 , . . . , ws ∈ R(M ), we desire an expression for the generators as elements of S = R[T1 , . . . , Tn ]. We cannot give a closed form, but in Corollary 3.17 we give a recursive algorithm for computing the generators of Km+1 R(E) with x-degree ≥ dm . Proposition 3.1. Assume Data 2.2. Then Km+1 R(E) = (Km+1 R(M )) ∩ R(E) = (gm+1 R(F )≥−dm+1 ,∗ ) ∩ R(E). Proof. According to Theorem 2.9(b), R(E) ⊂ R(M ) is an integral extension of rings. Since Km+1 R(E) is a prime ideal, the first equality is true by the lying over property of integral extensions. By Proposition 1.7, Km = (g1 , . . . , gm ) :S m∞ . Since Km is the ideal of defining equations of R(E), this means g1 , . . . , gm are zero in R(E), and thus also in R(M ). Proposition 1.7 also gives Km+1 = (g1 , . . . , gm+1 ) :S m∞ . Therefore Km+1 R(M ) = (g1 , . . . , gm+1 )R(M ) :R(M ) m∞ = gm+1 R(M ) :R(M ) m∞ . It remains to show that gm+1 R(M ) :R(M ) m∞ = gm+1 R(F )≥−dm+1 ,∗ . The containment “⊃” comes because mdm+1 (gm+1 R(F )≥−dm+1 ,∗ ) ⊂ gm+1 R(F )≥0,∗ = gm+1 R(M ), which means gm+1 R(F )≥−dm+1 ,∗ ⊂ gm+1 R(M ) :R(M ) mdm+1 ⊂ gm+1 R(M ) :R(M ) m∞ . For the containment “⊂”, first note that gm+1 R(M ) :R(M ) m∞ ⊂ (gm+1 R(F ) :R(F ) m∞ ) ∩ R(M ). But since R(F ) is a polynomial ring, gm+1 R(F ) is an unmixed ideal of height 1, while mR(F ) is a prime ideal of height 2, so gm+1 R(F ) :R(F ) m∞ = gm+1 R(F ). Thus gm+1 R(M ) :R(M ) m∞ ⊂ (gm+1 R(F )) ∩ R(M ) = (gm+1 R(F ))≥0,∗ = gm+1 R(F )≥−dm+1 ,∗ . 9 This shows that gm+1 R(M ) :R(M ) m∞ = gm+1 R(F )≥−dm+1 ,∗ .  According to Proposition 3.1, there are two steps to computing Km+1 R(E). First, we must compute gm+1 R(F )≥−dm+1 ,∗ , then we must contract to R(E). We begin with the task of determining the generators of R(F )≥−c,∗ as an R(M )-module for any c ≥ 0. 3.1. Generators of truncations of R(F ). Assume Data 2.2. For any s-tuple α = (α1 , . . . , αs ) ∈ Ns , write wα = w1α1 · · · wsαs ∈ R(F ), and define α · σ = α1 σ1 + · · · + αs σs . Then since degx xi = 1 and degx wi = −σi , we may compute the x-degree of any monomial in R(F ) with the formula degx (xj0 xk1 wα ) = j + k − α · σ. In what follows, it will be convenient to use the following nonstandard notation: For h, h′ ∈ R(F ), say h divides h′ (or write h | h′ ) to mean that there exists ℓ ∈ R(M ) such that h′ = ℓh. Note that this is different from the standard notion of divisibility in R(F ) because we require ℓ to have nonnegative degree (that is, to be in R(M ) and not just R(F )). One more definition will make it easier to work with exponent vectors α ∈ Ns . Recall that r is the unique integer with 1 ≤ r ≤ s such that σi > 0 for i ≤ r and σi = 0 for i > r. In the definition below, we think of α+ as the part of the vector corresponding to those σi which are positive, and α0 as the part corresponding to those σi which are zero. Definition 3.2. Assume Data 2.2, and let α ∈ Ns . Define α+ = (α1 , . . . , αr , 0, . . . , 0) ∈ Ns and α0 = (0, . . . , 0, αr+1 , . . . , αs ) ∈ Ns . The following properties are clear from the definition. Remark 3.3. Assume Data 2.2, and let α ∈ Ns . (a) α = α+ + α0 . (b) (α+ )0 = 0 and (α0 )+ = 0. (c) α · σ = α+ · σ. The importance of distinguishing α+ from α0 can be seen in the following lemma, which shows that we may ignore wr+1 , . . . , ws for the purpose of computing minimal generators. Lemma 3.4. Assume Data 2.2. Then after row operations on ξ corresponding to an automorphism of k[w1 , . . . , ws ] which fixes w1 , . . . , wr , we get w α ∈ R(E) for all α ∈ Ns with α+ = 0. Proof. By definition of r, for every i > r we have σi = 0. By (2.7), this means the last s−r rows of ξ have entries in k. Now by Lemma 2.6(a,b), grade Is (ξ) = grade Fitt0 (F/E) = grade ann(F/E) = 2, so Is (ξ) 6= 0. Thus there is an invertible n × n matrix χ with entries in k such that # " A B ξχ = 0 Is−r where Is−r is the (s − r) × (s − r) identity matrix, and A and B are arbitrary matrices of sizes r × (n − s + r) and r × (s − r), respectively. We may perform row operations on ξ that involve 10 subtracting multiples of the last s − r rows from the first r rows to assume that B = 0. Such row operations correspond to automorphisms of k[w1 , . . . , ws ] fixing w1 , . . . , wr . Now Remark 2.3 yields # " i A i h i h h 0 , T1 · · · Tn χ = w1 · · · ws ξχ = w1 · · · ws 0 Is−r from which we get Tn−s+i = wi for all r < i ≤ s. Because all Tj ∈ R(E), this means wr+1 , . . . , ws ∈ R(E). Therefore if α ∈ Ns has α+ = 0, meaning α = (0, . . . , 0, αr+1 , . . . , αs ), we get w α = α r+1 wr+1 · · · wsαs ∈ R(E).  Now we are ready to give minimal generating sets for R(M )-modules of the form R(F )≥−c,∗ . Definition 3.5. Assume Data 2.2, and fix c ≥ 0. Set Λc = {α ∈ Ns | α0 = 0 and α · σ ≥ c}. For 1 ≤ i ≤ r, let Ωc,i = {α ∈ Ns | αi > 0 and αj = 0 for j > i and c ≤ α · σ < c + σi } ⊂ Λc S and set Ωc = ri=1 Ωc,i ⊂ Λc . Define Ac = {w α | α ∈ Ns and α0 = 0 and α · σ < c} and Bc = {xj0 xk1 wα | α ∈ Ωc and j + k = α · σ − c}. We will see in Theorem 3.7 that Ac ∪ Bc is a minimal generating set for R(F )≥−c,∗ . Observe that for any monomial h ∈ Ac , we have −c < degx h ≤ 0, while any monomial h ∈ Bc has degx h = −c. In fact, the set Ac consists of all monomials of x-degree > −c which do not involve x0 , x1 , or any wi with i > r (which are the i with σi = 0). The set Bc is more complicated, but it may be thought of as the set of all monomials of x-degree −c which do not involve any wi with i > r, and only include just as many other wi as necessary to make the x-degree small enough. This is made precise in the next lemma. Lemma 3.6. Assume Data 2.2, and fix c > 0. Place a partial order on Ns such that α ≤ β if and only if αi ≤ βi for all i. Then Ωc is the set of minimal elements of Λc under this partial order. Proof. First, we show that every minimal element of Λc is in Ωc . Let α be a minimal element of Λc . Choose i so that αi > 0 and αj = 0 for all j > i. From the definition of Λc , we have α0 = 0. This means αr+1 = · · · = αs = 0, therefore i ≤ r. We claim that α ∈ Ωc,i . Suppose not. Then since α · σ ≥ c by definition of Λc , we must have α · σ ≥ c + σi . Let β = (α1 , . . . , αi−1 , αi − 1, 0, . . . , 0) = α − (0, . . . , 0, 1, 0, . . . , 0) (with the 1 in position i), which is in Ns since αi > 0. Moreover, β 0 = 0, and β · σ = α · σ − σi ≥ c. Therefore β ∈ Λc . But β < α, contradicting the minimality of α. Hence α ∈ Ωc,i ⊂ Ωc . 11 Now we must show that every element of Ωc is minimal in Λc . Take α ∈ Ωc ; then α ∈ Ωc,i for some 1 ≤ i ≤ r. Consider β ∈ Λc with β ≤ α. Choose k so that βk > 0 and βj = 0 for all j > k. Since β ≤ α, the largest nonzero index of α must be greater than or equal to the largest nonzero index of β, that is, i ≥ k. This means that for j > i, αj = βj = 0. Further, the inequalities β · σ ≥ c and α · σ < c + σi yield (α − β) · σ = α · σ − β · σ < (c + σi ) − c = σi . Thus P P σi > (α − β) · σ = sj=1 (αj − βj )σj = ij=1 (αj − βj )σj , since αj = βj for j > i. But each coefficient P αj − βj is nonnegative, so if some αℓ 6= βℓ , we would have ij=1 (αj − βj )σj ≥ σℓ ≥ σi , the latter inequality because the σj are in non-increasing order. This contradiction means that we must have αj = βj for all j, thus α = β. Hence α is minimal in Λc .  Theorem 3.7. Assume Data 2.2, and fix c > 0. Let Ac and Bc be as defined in Definition 3.5. (a) The image of Ac is a minimal generating set for the R(M )-module R(F )≥−c,∗ /RR(F )−c,∗ . (b) Bc is a minimal generating set for the R(M )0,∗ -module R(F )−c,∗ . (c) Ac ∪ Bc is a minimal generating set for the R(M )-module R(F )≥−c,∗ . Proof. (a) Let Ac be the image of Ac in R(F )≥−c,∗ /RR(F )−c,∗ . Since R(F )≥−c,∗ is generated by monomials, to show that Ac is a generating set, it suffices to show that for any monomial h ∈ R(F ) with degx h ≥ −c, the image h ∈ R(F )≥−c,∗ /RR(F )−c,∗ is in the R(M )-module generated by Ac . Write h = xj0 xk1 w β . First suppose β + · σ < c. Then since (β + )0 = 0, if we set h′ = w β h′ ∈ Ac . Since 0 xj0 xk1 wβ has nonnegative x-degree, it is in R(M ), therefore h = + we have 0 xj0 xk1 w β h′ is in + the R(M )-module generated by Ac . On the other hand, suppose c ≤ β · σ = β · σ. Then since −c ≤ degx h = j + k − β · σ, we have 0 ≤ β · σ − c ≤ j + k. Thus there are 0 ≤ j ′ ≤ j and 0 ≤ k′ ≤ k ′ such that j ′ + k′ = β · σ − c. If we set h′ = xj0 xk1 w β , then we have degx h′ = j ′ + k′ − β · σ = −c, j−j ′ meaning h′ ∈ R(F )−c,∗ . Therefore h = x0 ′ ′ x1k−k ∈ RR(F )−c,∗ , so h = 0, which is certainly in the R(M )-module generated by Ac . Hence Ac generates R(F )≥−c,∗ /RR(F )−c,∗ . Because Ac consists of monomials, to see that it is a minimal generating set, it is enough to show that no element of Ac divides another. Suppose there are h, h′ ∈ Ac with h′ | h, meaning there ′ is ℓ ∈ R(M ) with h = h′ ℓ. Write h = w α and h′ = w α . The only way we can have h = h′ ℓ is if ′ α′ ≤ α, in which case ℓ = w α−α . Because ℓ ∈ R(M ), we must have deg ℓ = −(α − α′ ) · σ ≥ 0, P so (α − α′ ) · σ ≤ 0. But each term in the sum (α − α′ ) · σ = si=1 (αi − α′i )σi is nonnegative, so each (αi − α′i )σi must be 0. If i ≤ r, then σi > 0, so αi = α′i . If i > r, then αi = α′i = 0 by the assumption that α0 = (α′ )0 = 0. Thus α = α′ and therefore h = h′ . Hence Ac is a minimal generating set for R(F )≥−c,∗ /RR(F )−c,∗ . (b) Since every monomial in Bc has x-degree −c, we have Bc ⊂ R(F )−c,∗ . Since R(F )−c,∗ is generated by monomials, to show that Bc is a generating set it will suffice to show that any monomial h ∈ R(F )−c,∗ is divisible by an element of Bc . Write h = xj0 xk1 wβ . Then (3.8) − c = degx h = j + k − β · σ = j + k − β + · σ, 12 so β + · σ ≥ c. Also, (β + )0 = 0, therefore β + ∈ Λc . By Lemma 3.6, there is α ∈ Ωc such that α ≤ β + . Since α ∈ Λc , α · σ ≥ c. Thus 0 ≤ α · σ − c ≤ β + · σ − c = j + k (using (3.8)), so there ′ are 0 ≤ j ′ ≤ j and 0 ≤ k′ ≤ k such that j ′ + k′ = α · σ − c. Set h′ = xj0 xk1 w α . Then h′ ∈ Bc since ′ α ∈ Ωc and j ′ + k′ = α · σ − c. Because j ′ ≤ j, k′ ≤ k, and α ≤ β + ≤ β, there is ℓ ∈ R(F ) such that h = ℓh′ . Since degx ℓ = degx h − degx h′ = (−c) − (−c) = 0, we have ℓ ∈ R(M )0,∗ . This proves that h is divisible by an element of Bc , so Bc is a generating set for R(F )−c,∗ . To show minimality, since Bc consists of monomials, it is enough to show that no element of Bc ′ divides another. Suppose there are h, h′ ∈ Bc with h′ | h. Write h = xj0 xk1 w α and h′ = xj0 xk1 w α . ′ ′ Then α, α′ ∈ Ωc and α′ ≤ α. By Lemma 3.6, α′ = α. Therefore j ′ + k′ = α′ ·σ − c = α ·σ − c = j + k, but also j ′ ≤ j and k′ ≤ k, therefore j ′ = j and k′ = k. This shows that h′ = h, hence Bc is a minimal generating set for R(F )−c,∗ . (c) It follows from (b) that Bc minimally generates the R(M )-module L defined in (a), and Ac minimally generates R(F )≥−c,∗ /L by (a). Thus, taken together, Ac ∪ Bc generates R(F )≥−c,∗ . For minimality, it is enough to show that no element of Ac ∪ Bc divides another. But no element of Ac is divisible by another element of Ac ∪ Bc by (a), and no element of Bc is divisible by another element of Bc by (b). Finally, no element of Bc may be divisible by an element of Ac since every element of Bc has x-degree −c while every element of Ac has x-degree > −c. Thus Ac ∪ Bc is a minimal generating set for R(F )≥−c,∗ .  3.2. Generators of the equations of the Rees algebra. Now we will prove the main theorem. In Theorem 2.9, we showed the equality R(E)≥dm −1,∗ = R(M )≥dm −1,∗ . This allows us to compute the contraction from Proposition 3.1 in x-degree ≥ dm , and thus determine the generators of Km+1 R(E) in these degrees using Theorem 3.7. It may seem like we should be able to compute the minimal generators in x-degree dm − 1 as well. However, because Theorem 3.7 gives a generating set as an R(M )-module, and we want a generating set as an R(E)-module, the proof of Theorem 3.9 is not as simple as just applying Theorem 3.7. Instead, it works by factoring out the x-degree dm − 1 part of Km+1 R(E), which only allows us to compute the generators in x-degree ≥ dm . In §4, we will determine the generators in x-degree dm − 1 when n = 3 and m = 1. Theorem 3.9. Assume Data 2.2. Then the set (3.10) {gm+1 w α | α ∈ Ns and α0 = 0 and α · σ ≤ dm+1 − dm } is equal to the x-degree ≥ dm part of a minimal generating set for Km+1 R(E) as an R(E)-module. Proof. Observe that the set (3.10) is equal to gm+1 Ac for c = dm+1 − dm + 1, where Ac is defined in Definition 3.5. Let J = Km+1 R(E). The claim that gm+1 Ac is the part of a minimal generating set of J having x-degree ≥ dm is equivalent to saying that the image of gm+1 Ac in R(E)/RJdm −1,∗ is a minimal generating set of J≥dm −1,∗ /RJdm −1,∗ . 13 From Proposition 3.1, J = (gm+1 R(F )≥−dm+1 ,∗ ) ∩ R(E). Therefore J≥dm −1,∗ = (gm+1 R(F ))≥dm −1,∗ ∩ R(E)≥dm −1,∗ = (gm+1 R(F )≥−c,∗ ) ∩ R(E)≥dm −1,∗ . But R(E)≥dm −1,∗ = R(F )≥dm −1,∗ by Theorem 2.9, therefore (3.11) J≥dm −1,∗ = gm+1 R(F )≥−c,∗ . We claim that it is enough to show that R(F )≥−c,∗ = Ac R(E) + RR(F )−c,∗ . Indeed, if we multiply this equation by gm+1 and use (3.11), we obtain J≥dm −1,∗ = gm+1 Ac R(E) + RJdm −1,∗ . This shows that gm+1 Ac is a generating set for J≥dm −1,∗ /RJdm −1,∗ over R(E). Minimality follows because Ac , and therefore gm+1 Ac , is minimal over the larger ring R(M ) (Theorem 3.7(a)). We now prove that R(F )≥−c,∗ = Ac R(E) + RR(F )−c,∗ . Theorem 3.7(a) says that Ac generates R(F )≥−c,∗ /RR(F )c,∗ as an R(M )-module, that is to say, R(F )≥−c,∗ = Ac R(M ) + RR(F )−c,∗ . It is clear that Ac R(E) + RR(F )−c,∗ ⊂ Ac R(M ) + RR(F )−c,∗ , so we just need to show that Ac R(M ) ⊂ Ac R(E) + RR(F )−c,∗ . Because R(M ) is generated by monomials, it suffices to show that for any monomials h ∈ Ac and f ∈ R(M ), we have hf ∈ Ac R(E) + RR(F )−c,∗ . By Lemma 3.4, we may apply an automorphism of k[w1 , . . . , ws ] which fixes w1 , . . . , wr , and 0 therefore fixes Ac , to assume that w β ∈ R(E) for all β. From the definition of Ac , we may write h = wα with α0 = 0 and α · σ < c. Also, write f = xj0 xk1 w β , so that hf = xj0 xk1 w α+β . If + (α + β) · σ < c, then since (α + β) · σ = (α + β + ) · σ, we have wα+β ∈ Ac . Thus hf is the product + 0 of wα+β ∈ Ac and xj0 xk1 wβ ∈ R(E), meaning hf ∈ Ac R(E). On the other hand, if (α + β) · σ ≥ c, then d := degx (w α+β ) ≤ −c. Since degx h > −c (as h ∈ Ac ) and degx f ≥ 0 (as f ∈ R(M )), we obtain degx (hf ) ≥ −c. But degx (hf ) = degx (xj0 xk1 w α+β ) = j + k + d, so 0 ≤ −c − d ≤ j + k. Thus there are 0 ≤ j ′ ≤ j and 0 ≤ k′ ≤ k such that ′ j ′ + k′ = −c − d. Set ℓ = xj0 xk1 w α+β . Then degx ℓ = j ′ + k′ + d = −c, so ℓ ∈ R(F )−c,∗ . Therefore j−j ′ hf = (x0 ′ ′ x1k−k )ℓ ∈ RR(F )−c,∗ . In either case, hf ∈ Ac R(E) + RR(F )−c,∗ , which proves the claim that R(F )≥−c,∗ = Ac R(E) + RR(F )−c,∗ . Therefore the image of gm+1 Ac minimally generates J≥dm ,∗ /RJdm −1,∗ as an R(E)module. For every α ∈ Ns with α0 = 0 and α · σ < c, we get a generator gm+1 w α ∈ gm+1 Ac having P bidegree (dm+1 − α · σ, ri=1 αi + 1).  The bidegrees of the minimal generators given in Theorem 3.9 may be computed: Corollary 3.12. Assume Data 2.2. Then Km+1 R(E) has a minimal generating set whose elements P of x-degree ≥ dm lie in bidegrees (dm+1 − α · σ, ri=1 αi + 1) for each α ∈ Ns with α0 = 0 and α · σ ≤ dm+1 − dm . In particular, the only minimal generator of Km+1 R(E) having x-degree dm+1 is gm+1 , and all other minimal generators of Km+1 R(E) have x-degree < dm+1 . Proof. Since gm+1 has bidegree (dm+1 , 1), for every α ∈ Ns with α0 = 0 and α · σ ≤ dm+1 − dm , P the element gm+1 wα has bidegree (dm+1 − α · σ, ri=1 αi + 1), so the first claim follows from 14 Theorem 3.9. The second claim comes from noticing that if α0 = 0 ad α 6= 0, then degx (w α ) < 0, therefore degx (gm+1 wα ) < dm+1 .  As a consequence, we get Corollary 3.13, which gives the bidegrees of the minimal generators of K having x-degree at least dn−2 . For example pictures of these bidegrees, see Tables 1, 2, and 3. The row represents T -degree, the column represents x-degree, and the numbers in the table are the number of generators in the corresponding bidegree. Only the minimal generators lying on the right of the vertical line are given in Corollary 3.13. Note the patterns in these tables: in cases (i) and (iii), the generators lie on a line of slope −1/σ1 ; while in case (ii), the generators lie between a line of slope −1/σ1 and a line of slope −1/σ2 . Corollary 3.13. Assume Data 2.2 with m = n − 2. Then s = 2 and σ1 + σ2 = Pn−2 i=1 di , and the minimal generators of K having x-degree ≥ dn−2 consist of the generator gn−2 and any other gm having bidegree (dn−2 , 1), and also: (i) If σ2 = 0: one generator of bidegree (dn−1 − jσ1 , j + 1) for each integer j with 0 ≤ j ≤ dn−1 −dn−2 . σ1 (ii) If σ1 > σ2 > 0: one generator of bidegree (dn−1 − iσ1 − (j − i)σ2 , j + 1) for each pair of integers (j, i) with 0 ≤ j ≤ dn−1 −dn−2 σ2 n−2 −jσ2 and 0 ≤ i ≤ min{j, dn−1 −d }. σ1 −σ2 (iii) If σ1 = σ2 : j + 1 generators of bidegree (dn−1 − jσ1 , j + 1) for each integer j with 0 ≤ j ≤ dn−1 −dn−2 . σ1 Proof. The equalities s = 2 and σ1 + σ2 = Pn−2 di come from Lemma 2.6. Since K = Kn−1 , a generating set for K consists of the lifts of generating sets of each quotient Km+1 /Km ∼ = Km+1 R(Em ) i=1 for 1 ≤ m ≤ n − 2. For m < n − 2, Corollary 3.12 says that besides gm+1 , all the minimal generators of Km+1 R(Em ) have x-degree less than dm+1 . Since dm+1 ≤ dn−2 , the only generator of Km+1 R(Em ) that could possibly have x-degree at least dn−2 is gm+1 . The remaining generators with x-degree at least dn−2 must come from generators of Kn−1 R(En−2 ). The bidegrees of the minimal generators of Kn−1 R(En−2 ) are given in Corollary 3.12. If σ2 = 0, then r = 1, so we only consider those pairs (α1 , α2 ) with α2 = 0. Setting j = α1 , we see that Kn−1 R(En−2 ) has a minimal generator in bidegree (dn−1 −jσ1 , j+1) for all j with jσ1 ≤ dn−1 −dn−2 . If σ2 > 0, then r = 2. Set i = α1 and j = α1 + α2 . Then Kn−1 R(En−2 ) has a minimal generator in bidegree (dn−1 − iσ1 − (j − i)σ2 , j + 1) for all i, j with iσ1 + (j − i)σ2 ≤ dn−1 − dn−2 . If σ1 > σ2 , then these bidegrees are all distinct. For if (dn−1 −iσ1 −(j −i)σ2 , j +1) = (dn−1 −i′ σ1 −(j ′ −i′ )σ2 , j ′ +1), then certainly j = j ′ . But then i(σ1 − σ2 ) = i′ (σ1 − σ2 ), whence i = i′ . If σ1 = σ2 , on the other hand, these bidegrees reduce to (dn−1 − jσ1 , j + 1), and there is one generator in this bidegree for each 0 ≤ i ≤ j, for a total of j + 1 generators.  The condition σ2 = 0 in Corollary 3.13 has geometric significance, as we see in the next proposition, a consequence of the results in [8]. The proposition only holds if dn−2 < dn−1 , for if dn−2 = dn−1 , then the matrix ϕn−2 consisting of all but the last column of ϕ is not an invariant. 15 7 6 5 1 4 1 3 1 2 1 1 1 1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Table 1. An example of case (i), with n = 3, d1 = 3, d2 = 16, σ1 = 3, and σ2 = 0. 7 6 1 1 5 1 1 1 1 1 1 1 4 3 1 1 1 1 2 1 1 1 1 1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Table 2. An example of case (ii), with n = 3, d1 = 5, d2 = 16, σ1 = 3, and σ2 = 2. 7 7 6 6 5 5 4 4 3 3 2 1 2 1 1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Table 3. An example of case (iii), with n = 3, d1 = 4, d2 = 16, σ1 = 2, and σ2 = 2. However, if dn−2 = dn−1 , then the only minimal generators of K having x-degree ≥ dn−2 are some of the gm , so there is no difference between the cases in Corollary 3.13. The birationality assumption is also mild, as any rational curve C may be reparametrized so that the morphism Φ : P1k → C is birational, as shown in [20]. It is not known whether there is any geometric meaning of the values of σ1 and σ2 when they are both positive. Proposition 3.14. Assume Data 2.2 with m = n − 2. Let f1 , . . . , fn be a minimal generating set of I and let Φ : P1k → C ⊂ Pkn−1 be the morphism defined by (f1 : · · · : fn ). Assume k is algebraically 16 closed and Φ is birational onto its image C, and assume dn−2 < dn−1 . Then σ2 = 0 if and only if C has a point of multiplicity greater than dn−2 (which must then have multiplicity dn−1 ). Proof. Let p = (a1 : · · · : an ) ∈ Pkn−1 be a point. By [8, Theorem 1.8], the multiplicity of p on C is deg gcd I1 (aϕ) where a = [a1 · · · an ]. We may write aϕ = [h1 · · · hn−1 ] where hi is homogeneous of degree di , so that the multiplicity of p on C is deg gcd(h1 , . . . , hn−1 ). By assumption, di < dn−1 for 1 ≤ i ≤ n − 2. Thus the only way that the gcd of h1 , . . . , hn−1 can have degree greater than dn−2 is if h1 = · · · = hn−2 = 0, in which case the gcd will have degree dn−1 . Therefore C has a point of multiplicity greater than dn−2 if and only if some linear combination of the rows of ϕ is zero except for the last column. This is the same as saying that some linear combination of the rows of ϕn−2 is zero. From the exact sequence (2.7), this will occur if and only if σ2 = 0.  3.3. A recursive procedure for the generators. While Theorem 3.9 gives the generators as elements of R[w1 , . . . , ws ], we seek the generators as elements of S = R[T1 , . . . , Tn ]. In Corollary 3.17, we show how the generators in S may be computed. For specific examples, see Example 3.21 and Example 3.22. The algorithm hinges on the following way to multiply by wi in S. Proposition 3.15. Assume Data 2.2. For 1 ≤ i ≤ s, let ξi be the ith row of ξ and let ξ i be the matrix obtained by deleting the ith row from ξ. Let ρi = [ρi1 · · · ρim+1 ] be the n × (m + 1) matrix whose columns generate the kernel of ξ i . Set pij = ξi ρij ∈ R and set qji = [T1 · · · Tn ]ρij ∈ S∗,1 . Then (a) For each i, (pi1 , . . . , pim+1 )dm −1+σi = Rdm −1+σi . (b) For each i and j, we have qji = pij wi in R(E) ⊂ R(F ). Proof. (a) Let h ∈ R be a form of degree dm − 1 + σi . Then [0 · · · h · · · 0]T ∈ F (with h in the ith position) has degree dm − 1. By Lemma 2.6, (F/E)dm −1 = 0, and since F/E = coker ξ by (2.7), ξ is surjective in degree dm − 1. Thus there is u ∈ Rn such that   0 . . .    ξu =  h . .  ..    0 (3.16) This means that u ∈ ker ξ i = im ρi , so u = a1 ρi1 + · · · + am+1 ρim+1 for some a1 , . . . , am+1 ∈ R. Then the ith row of (3.16) yields h = ξi u = a1 ξi ρi1 + · · · + am+1 ξi ρim+1 = a1 pi1 + · · · + am+1 pim+1 . Therefore h ∈ (pi1 , . . . , pim+1 ) for all h ∈ Rdm −1+σi , hence (pi1 , . . . , pim+1 )dm −1+σi = Rdm −1+σi . 17 (b) Since ρij is in the kernel of ξ i (the matrix consisting of all but the ith row of ξ),     0 0  .  .  .  .  .  .     i i  i ξρj =  ξi ρj  = pj   .  .  ..   ..      0 0 with pij appearing in the ith row. Thus, using Remark 2.3, h qji = T1 · · · i h Tn ρij = w1 · · · i h ws ξρij = w1 · · ·   0 . . . i   i i ws  pj  = pj wi . .  ..    0  Corollary 3.17. Assume Data 2.2. Define the polynomials pij and qji as in Proposition 3.15. For each α ∈ Ns with α0 = 0 and α · σ ≤ dm+1 − dm , we recursively construct forms hα ∈ S P of bidegree (dm+1 − α · σ, ri=1 αi + 1) as follows. Set h0 = gm+1 . For α 6= 0, choose any i such that αi > 0, and assume we have constructed h(α1 ,...,αi −1,...,αs ) . Write h(α1 ,...,αi −1,...,αs ) = a1 pi1 + · · · + am+1 pim+1 for some a1 , . . . , am+1 ∈ S (which we may do by Proposition 3.15(a) since i . Then the the x-degree of h(α1 ,...,αi −1,...,αs ) is at least dm + σi ), then set hα = a1 q1i + · · · + am+1 qm+1 images of {hα } in R(E) are uniquely determined and form the x-degree ≥ dm part of a minimal generating set of Km+1 R(E). Proof. Let A = {α ∈ Ns | α0 = 0 and α · σ ≤ dm+1 − dm }. By Theorem 3.9, the x-degree ≥ dm part of a minimal generating set for Km+1 R(E) is given by {gm+1 w α | α ∈ A}. Thus we are done P if we can show that hα = gm+1 w α in R(E). We use induction on ℓ := αi . If ℓ = 0, then α = 0, and by definition h0 = gm+1 = gm+1 w0 . Now suppose ℓ > 0. By construction, there is i for which αi > 0 and a1 , . . . , am+1 ∈ S such that i . Then h(α1 ,...,αi −1,...,αs ) = a1 pi1 + · · · + am+1 pim+1 and hα = a1 q1i + · · · + am+1 qm+1 i hα = a1 q1i + · · · + am+1 qm+1 = a1 pi1 wi + · · · + am+1 pim+1 wi by Proposition 3.15(b) = h(α1 ,...,αi −1,...,αs ) wi = (gm+1 w1α1 · · · wiαi −1 · · · wsαs )wi by induction = gm+1 wα . Therefore hα = gm+1 w α for all α ∈ A.  18 When m = 1, the process in Corollary 3.17 may be represented in terms of Sylvester forms (or Jacobian duals). In fact, when n = 3 (so that there are only two σs) and σ2 = 0, the procedure in Corollary 3.17 agrees with the one given in [6, Theorem 2.10]. It is also similar to the iterated Jacobian dual construction in [1, §4], although we use Sylvester forms with respect to multiple regular sequences pi1 , pi2 . Before stating the result, we give the definition of Sylvester forms. Let p1 , p2 ∈ R be homogeneous polynomials which form a regular sequence. Consider forms f, g ∈ S such that f, g ∈ (p1 , p2 )S. Then we may (non-uniquely) write f = f1 p1 + f2 p2 and g = g1 p1 + g2 p2 . We will, by abuse of notation, refer to the determinant # " f1 g1 sylp1 ,p2 (f, g) = det f2 g2 as the Sylvester form of f, g with respect to p1 , p2 . The Sylvester form sylp1 ,p2 (f, g) is not uniquely determined, but its image in S/(f, g) is unique ([17, Proposition 3.8.1.6]). Proposition 3.18. Assume Data 2.2 with m = 1. Define pi1 , pi2 as in Proposition 3.15. Then for all i, the polynomials pi1 , pi2 form a regular sequence, and for any form h ∈ S with x-degree ≥ d1 − 1 + σi , the image of the Sylvester form sylpi1 ,pi2 (g1 , h) in R(E) = S/(g1 ) is a nonzero scalar multiple of hwi . In particular, the polynomials hα of Corollary 3.17 may be defined, up to scalar multiples, as hα = sylpi ,pi (g1 , h(α1 ,...,αi −1,...,αs ) ) for any i such that αi > 0. 1 2 Proof. That pi1 , pi2 form a regular sequence is immediate from Proposition 3.15(a). Recall the matrix ρi from Proposition 3.15. Let δ1i , δ2i be the degrees of the columns of ρi . We claim that δ1i + δ2i = d1 − σi . First, since ξ i is all but the ith row of ξ, there is a surjection coker ξ ։ coker ξ i . By Lemma 2.6(a,b), coker ξ is Artinian, so coker ξ i is Artinian as well. Since R is a two-dimensional regular ring, there is a free resolution ξi ρi → 0 → R(−δ1i ) ⊕ R(−δ2i ) −→ Rn − M R(σj ) → coker ξ i → 0. j6=i By computing the Hilbert polynomial and using that coker ξ i is Artinian, we see that δ1i + δ2i = P P σj = d1 by Lemma 2.6(e), hence δ1i + δ2i = d1 − σi . j6=i σj . But Now let h ∈ R(E) be homogeneous of x-degree ≥ d1 − 1 + σi . Then by Proposition 3.15(a), there are a1 , a2 ∈ R(E) such that h = a1 pi1 + a2 pi2 . Recall that ρi generates the kernel of ξ i , the matrix obtained by removing the ith row of ξ. Since ξϕ1 = 0 from (2.7), ϕ1 is in the kernel of ξ i , therefore ϕ1 = ρi λ for some 2 × 1 column vector λ with entries in R. Then i h i i p1 p2 λ = ξi ρi λ = ξi ϕ1 = 0. Since pi1 , pi2 are a regular sequence, this means λ= " −cpi2 cpi1 19 # for some c ∈ R. Thus h (3.19) g1 = T1 · · · i h Tn ϕ1 = T1 · · · i i h Tn ρi λ = q1i q2i λ = c(pi1 q2i − pi2 q1i ). Now pij has x-degree σi + δj , while qji has x-degree δj . Because we have shown that δ1i + δ2i = d1 − σi , we have degx (pi1 q2i − pi2 q1i ) = σi + δ1i + δ2i = d1 = degx g1 , hence c ∈ k. We cannot have c = 0, or we would get ϕ1 = ρi λ = ρi · 0 = 0, which is impossible. Therefore c is a unit. Since h = a1 pi1 + a2 pi1 and g1 = (cq2i )pi1 + (−cq1i )pi2 by (3.19), the definition of the Sylvester form yields # " cq2i a1 = c(a1 q1i + a2 q2i ). sylpi ,pi (g1 , h) = det i 1 2 −cq1 a2 But by Proposition 3.15(b), a1 q1i + a2 q2i = a1 pi1 wi + a2 pi2 wi = hwi , so sylpi ,pi (g1 , h) = chwi . 1 2 Because we showed in the proof of Corollary 3.17 that hα = h(α1 ,...,αi −1,...,αs ) wi in R(E), the final claim follows.  3.4. Some examples. Example 3.20 (compare [22, Theorem 3.6]). Assume I is almost linearly presented, meaning Pn−2 d1 = · · · = dn−2 = 1 and dn−1 = c ≥ 1. First, Lemma 2.6(e) gives σ1 + σ2 = i=1 di = n − 2. By Theorem 2.9, the modules E = En−2 and M = mσ1 (σ1 ) ⊕ mσ2 (σ2 ) agree in degree ≥ 0, but they are both generated in degree 0, so E ∼ = M . Thus by Proposition 2.5, after an automorphism of S = R[T1 , . . . , Tn ], the ideal of equations of R(E) is generated by the 2 × 2 minors of the matrix # " Tσ1 Tσ1 +2 Tσ1 +3 · · · Tn−1 x0 T1 T2 · · · . x1 T2 T3 · · · Tσ1 +1 Tσ1 +3 Tσ1 +4 · · · Tn In particular, there are n − 2 generators of bidegree (1, 1) and 12 (n − 2)(n − 3) generators of bidegree (0, 2). The ideal K of equations of R(I) is generated by these equations, plus a lift of a minimal generating set of KR(E). By (3.11) with m = n − 2, this ideal is KR(E) = gn−1 R(F )≥−c,∗ where F = R(σ1 ) ⊕ R(σ2 ). We may compute the generators of this ideal directly from Theorem 3.7: they are just the elements of gn−1 Ac ∪ gn−1 Bc . The set gn−1 Ac consists of the minimal generators of KR(E) having x-degree > 0, and equals {gn−1 w1α1 w2α2 | α1 σ1 + α2 σ2 ≤ c − 1} if σ2 > 0 {gn−1 w1α1 | α1 σ1 ≤ c − 1} if σ2 = 0. We can translate from w’s to T ’s by the equations Tj+1 = xσ0 1 −j xj1 w1 and Tσ1 +j+2 = xσ0 2 −j xj1 w2 (see Proposition 2.5). The bidegrees of these minimal generators are listed in Corollary 3.13. We can also compute the minimal generators of x-degree 0, which are the elements of gn−1 Bc . To do this, we must first determine the set Ωc of Definition 3.5. There are two cases. First, suppose σ2 = 0. Then r = 1, so Ωc = Ωc,1 = {(β1 , 0) | c ≤ β1 σ1 < c + σ1 }. 20 This is just Ωc = {(k, 0)} where k = ⌈ σc1 ⌉. Let ℓ = kσ1 − c; note that 0 ≤ ℓ < σ1 . Then gn−1 Bc consists of ℓ + 1 elements of bidegree (0, k + 1), namely {gn−1 x0ℓ−j xj1 w1k | 0 ≤ j ≤ ℓ}. Second, suppose σ2 > 0. Then r = 2, so Ωc = Ωc,1 ∪ Ωc,2 . As above, Ωc,1 = {(k, 0)} where k = ⌈ σc1 ⌉. Again, setting ℓ = kσ1 − c, gn−1 Bc has ℓ + 1 elements of bidegree (0, k + 1), namely {gn−1 x0ℓ−j xj1 w1k | 0 ≤ j ≤ ℓ}. In this case, however, we also have Ωc,2 = {(α1 , α2 ) | α2 > 0 and c ≤ α1 σ1 + α2 σ2 < c + σ2 }. 2 To have (α1 , α2 ) ∈ Ωc,2 , we must have α1 σ1 < c + σ2 , thus α1 < ⌈ c+σ σ1 ⌉. Once we have chosen α1 , 1 σ1 the condition c − α1 σ1 ≤ α2 σ2 < c − α1 σ1 + σ2 forces α2 = ⌈ c−α σ2 ⌉. Hence (α1 , α2 ) ∈ Ωc,2 come c−iσ1 2 in pairs of the form (i, v(i)) where 0 ≤ i < ⌈ c+σ σ1 ⌉ and v(i) = ⌈ σ2 ⌉. Let ℓ(i) = iσ1 + v(i)σ2 − c, so that 0 ≤ ℓ(i) < σ2 . Therefore the remaining part of gn−1 Bc consists of ℓ(i) + 1 generators of 2 bidegree (0, i + v(i) + 1) for each 0 ≤ i < ⌈ c+σ σ1 ⌉, namely ℓ(i)−j j i v(i) {gn−1 x0 x1 w1 w2  c + σ2 }. |0≤i< σ1   Example 3.21 (compare [6, Theorem 2.10] and [19, Corollary 3.10]). Assume n = 3 and assume that the entries of the first column of ϕ are linearly dependent. Thus after row operations on ϕ, we have   γ1 δ1   ϕ = γ2 δ2  . 0 δ3 Since ϕ1 = [γ1 γ2 0]T , the resolution (2.8) becomes ξT ϕT 1 0 → R(−d1 ) ⊕ R −→ R3 −−→ R(d1 ) → Ext2R (F/E, R) → 0 where the image of ξ T is the kernel of [γ1 γ2 0], meaning " # −γ2 γ1 0 ξ= . 0 0 1 In particular, σ1 = d1 , σ2 = 0, s = 2, and r = 1. Then by Theorem 3.9, the minimal generators of K besides g1 having x-degree ≥ d1 are g2 w1α1 for α1 ∈ N such that α1 σ1 ≤ d2 − d1 , or in other words, 0 ≤ α1 ≤ d2 d1 − 1. 21 To compute these generators, we will use Corollary 3.17. The matrix ρ1 defined in Proposition 3.15 is the syzygy matrix of the matrix obtained by deleting the first row of ξ, which is [0 0 1], thus   1 0   ρ1 = 0 1 . 0 0 Following Proposition 3.15, we have i h i h i h p11 p12 = −γ2 γ1 0 ρ1 = −γ2 γ1 and h q11 q21 i i i h h = T1 T2 T3 ρ1 = T1 T2 . Now Corollary 3.17 says that the generators of K can be computed recursively. Let h(0,0) = g2 , and for any 1 ≤ α1 ≤ d2 d1 − 1, write h(α1 −1,0) = a1 p11 + a2 p12 = −a1 γ2 + a2 γ1 , then set h(α1 ,0) = a1 q11 + a2 q21 = a1 T1 + a2 T2 . These h(α1 ,0) , together with g1 , are all the minimal generators of K having x-degree at least d1 . We will determine the minimal generators of x-degree d1 − 1 in Example 4.10.  Example 3.22 (compare [2, Proposition 3.4] and [6, Theorem 5.4]). Assume n = 3 and d1 = 2. We may assume that the entries of the first column of ϕ are linearly independent, for the other case was considered in Example 3.21. Then after row operations, we may write   2 x0 δ1   ϕ = x0 x1 δ2  . x21 δ3 Then the resolution (2.8) is ϕT ξT 1 0 → R(−1) ⊕ R(−1) −→ R3 −−→ R(2) → Ext2R (F/E, R) → 0 where ξ= " −x1 0 x0 0 −x1 x0 # . In particular, σ1 = σ2 = 1, s = 2, and r = 0. By Theorem 3.9, the minimal generators of K besides g1 having x-degree ≥ 2 are g2 w1α1 w2α2 for α1 , α2 ∈ N such that α1 + α2 ≤ d2 − 2. Now let us use Corollary 3.17 to compute the precise generating set. Let ρ1 and ρ2 be the syzygy matrices of the matrices obtained by deleting the first and second row of ξ, respectively. That is,     0 x0 1 0     ρ1 = 0 x0  and ρ2 = 0 x1  . 1 0 x1 0 Therefore h i h i h i p11 p12 = −x1 x0 0 ρ1 = −x1 x20 22 h h q11 q12 i i h i h p21 p22 = 0 −x1 x0 ρ2 = x0 −x21 i i h i h q21 = T1 T2 T3 ρ1 = T1 x0 T2 + x1 T3 i i h i h q22 = T1 T2 T3 ρ2 = T3 x0 T1 + x1 T2 . h Now we are ready to apply the algorithm from Corollary 3.17. Let h(0,0) = g2 . Suppose we have computed h(α1 ,α2 ) for some α1 , α2 with α1 + α2 < d2 − 2. Write h(α1 ,α2 ) = −a1 x1 + a2 x20 = b1 x0 − b2 x21 . (We can do this since degx h(α1 ,α2 ) ≥ 2.) Set h(α1 +1,α2 ) = a1 T1 + a2 (x0 T2 + x1 T3 ) and h(α1 ,α2 +1) = b1 T3 + b2 (x0 T1 + x1 T2 ). By Corollary 3.17, the polynomials h(α1 ,α2 ) constructed in this way coincide with the generators g2 w1α1 w2α2 .  4. The case of plane curves Let n = 3, so that I = (f1 , f2 , f3 ) and C is a plane curve. In this case, we can actually compute a generating set for each slice Ki,∗ with i ≥ d1 − 1, in Theorem 4.8. In particular, we get a generating set of K≥d1 −1,∗ by combining the generators of Kd1 −1,∗ from Theorem 4.8 with the minimal generators of K in x-degree ≥ d1 from Theorem 3.9. Unfortunately, the generating set for Ki,∗ in Theorem 4.8 is usually not minimal. Observe that K1 = (g1 ) : m∞ = (g1 ), meaning R(E1 ) = S(E1 ) = S/(g1 ). Thus to determine K, it suffices to compute K/K1 = KR(E1 ) = K2 R(E1 ). To accomplish this, we will first determine the k[T1 , T2 , T3 ]-module structure of R(F )i,∗ . This is carried out in the next two lemmas and Proposition 4.4, where we show that R(F )i,∗ is generated as a k[T1 , T2 , T3 ]-module in T -degrees 0 and 1 for all i ≥ −1. Lemma 4.1. Let ζ be an n × (n − 1) matrix and let η be an (n − 1) × n matrix with coefficients in m, such that ηζ = f In−1 for some f ∈ R. Assume that grade In−1 (ζ) = 2. Then f ∈ In−1 (ζ). Proof. Let χ be the 1 × n row matrix consisting of the signed minors of ζ. By the Hilbert-Burch theorem, im(χT ) = ker(ζ T ). By the Hilbert syzygy theorem, coker η has minimal free resolution ϑ η → Rn−1 → coker η → 0 0→F − → Rn − where F is a free R-module. We have f ∈ annR (coker η), so rank(coker η) = 0. Using the additivity of rank, we see that rank F = 1, hence ϑ is an n × 1 column matrix. Now η(ζη − f In) = ηζη − f η = (ηζ − f In−1 )η = 0, so im(ζη − f In) ⊂ ker η = im ϑ. Thus there is a row matrix λ : Rn → R such that ζη − f In = ϑλ. Then ϑ(λζ) = ζηζ − f ζ = ζ(ηζ − f In−1 ) = 0. Since ϑ is injective, this means λζ = 0. Hence im(λT ) ⊂ ker(ζ T ) = im(χT ), so there is g ∈ R such that λ = gχ. We conclude that ζη − gϑχ = f In . Set h i ζ ′ = ζ −gϑ and η ′ = 23 " # η χ . These are both n × n matrices, and ζ ′ η ′ = ζη − gϑχ = f In . It follows that η ′ ζ ′ = f In . But " # ηζ −gηϑ ′ ′ ηζ = , χζ −gχϑ so we get f = −gχϑ = χ(−gϑ). Therefore f ∈ im χ = In−1 (ζ).  In order to compare R(E) = R(E1 ) and R(F ) in high T -degrees, we first compare them in bidegree (−1, 2). This will be used as the base case in the proof of Proposition 4.4. Lemma 4.2. Assume Data 2.2 with n = 3 and m = 1. Then R(F )−1,2 = R(E)0,1 R(F )−1,1 . Proof. Recall that R(F ) = R[w1 , w2 ], with deg wi = (−σi , 1). Then R(F )−1,1 = Rσ1 −1 w1 ⊕ Rσ2 −1 w2 R(F )−1,2 = R2σ1 −1 w12 ⊕ Rσ1 +σ2 −1 w1 w2 ⊕ R2σ2 −1 w22 . Because dimk Rℓ = ℓ + 1 for any ℓ, we get dimk R(F )−1,1 = σ1 + σ2 = d1 , while dimk R(F )−1,2 = 3σ1 + 3σ2 = 3d1 . Set T = [T1 T2 T3 ], considered as a function T : R(F )3−1,1 → R(F )−1,2 . Since R(E)0,1 = kT1 + kT2 + kT3 , we have R(E)0,1 R(F )−1,1 = im(T). It will suffice to show that T is injective, for then dimk (R(E)0,1 R(F )−1,1 ) = 3(dimk R(F )−1,1 ) = 3d1 = dimk R(F )−1,2 , which implies the equality R(E)0,1 R(F )−1,1 = R(F )−1,2 . Suppose [p1 p2 p3 ]T ∈ ker(T), with pi ∈ R(F )−1,1 . From Remark 2.3, [w1 w2 ]ξ = [T1 T2 T3 ]. Thus     p1 i p1 h     0 = T p2  = w1 w2 ξ p2  p3 p3 which we can rewrite as h i p1 p2 p3 ξ T " w1 w2 # = 0. Since w1 , w2 is a regular sequence in R(F ), there is f ∈ R(F )d1 −1,0 = Rd1 −1 such that i i h h (4.3) p1 p2 p3 ξ T = −f w2 f w1 . For a, b ∈ k, denote by pi (a, b) ∈ R the evaluation of pi at (w1 , w2 ) = (a, b). Let # " p1 (0, −1) p2 (0, −1) p3 (0, −1) η= . p1 (1, 0) p2 (1, 0) p3 (1, 0) Then (4.3) gives ηξ T = # " −f · (−1) f · 0 −f · 0 f ·1 = f I2 . By Lemma 4.1, f ∈ I2 (ξ T ). Recall the exact sequence (2.8), which in this setting is ξT ϕT → R(d1 ) → Ext2R (F/E, R) → 0. 0 → R(−σ1 ) ⊕ R(−σ2 ) −→ R3 −−m 24 T By the Hilbert-Burch theorem, I2 (ξ T ) = I1 (ϕT m ), therefore f ∈ I2 (ξ ) = I1 (ϕm ). But f ∈ Rd1 −1 , while I1 (ϕm ) is generated in degree d1 , therefore f = 0. Hence by (4.3), [p1 p2 p3 ]ξ T = 0, so [p1 p2 p3 ]T ∈ ker ξ. Recall from (2.7) that ker ξ = im ϕm , which is generated in degree d1 . However, degx pi ≤ σ2 − 1 < d1 , so we must have pi = 0, hence T is injective as claimed.  The next proposition shows that R(M ) is generated as a module over R(E)0,∗ = k[T1 , T2 , T3 ] in T -degrees 0 and 1. Proposition 4.4. Assume Data 2.2 with n = 3 and m = 1. Let U = R(E)0,∗ = k[T1 , T2 , T3 ]. Then R(F )i,∗ = U R(F )i,0 + U R(F )i,1 for all i ≥ −1. Proof. We first show by induction on j that R(F )−1,j = Uj R(F )−1,0 + Uj−1 R(F )−1,1 . For j = 0 and j = 1 this is clear. For j ≥ 2, R(F )−1,j = R(F )−1,2 R(F )0,j−2 = U1 R(F )−1,1 R(F )0,j−2 by Lemma 4.2 = U1 R(F )−1,j−1 = U1 (Uj−1 R(F )−1,0 + Uj−2 R(F )−1,1 ) by induction = Uj R(F )−1,0 + Uj−1 R(F )−1,1 . This proves that R(F )−1,∗ = U R(F )−1,0 +U R(F )−1,1 . Multiplying both sides by Ri+1 = R(F )i+1,0 gives R(F )i,∗ = U R(F )i,0 + U R(F )i,1 .  By Proposition 4.4, the U -module R(M ) is generated in T -degrees 0 and 1. In T -degree 0, R(M )∗,0 is just the ring R = k[x0 , x1 ]. To understand R(M )∗,1 as a U -module, recall that R(E)∗,1 = E and R(M )∗,1 = M = F≥0 . Therefore R(M )∗,1 /R(E)∗,1 = (F/E)≥0 . The free resolution of F/E was given in Lemma 2.6(a): (4.5) ϕ1 ξ 0 → R(−d1 ) −→ R3 − → R(σ1 ) ⊕ R(σ2 ) → F/E → 0. Remark 4.6. Assume Data 2.2 with n = 3 and m = 1. Let HF/E (i) be the Hilbert function of F/E. Then for all −1 ≤ i ≤ d1 − 1, we have HF/E (i) = d1 − i − 1. Proof. Recall from Lemma 2.6(e) that σ1 + σ2 = d1 . Then this is a straightforward computation from (4.5).  For −1 ≤ i ≤ d1 − 1, we have the following refinement of Proposition 4.4. Proposition 4.7. Assume Data 2.2 with n = 3 and m = 1. Let U = R(E)0,∗ = k[T1 , T2 , T3 ]. Then for all −1 ≤ i ≤ d1 − 1, there is an isomorphism R(F )i,∗ ∼ = U i+1 ⊕ U d1 −i−1 (−1) under which R(E)i,∗ ∼ = U i+1 . 25 i Proof. The vector space R(F )i,0 is generated by xi0 , xi−1 0 x1 , . . . , x1 , so it has dimension i + 1. By Remark 4.6, dimk (Fi /Ei ) = d1 − i − 1. Thus there are elements pi,1 , . . . , pi,d1 −i−1 ∈ Fi = R(F )i,1 whose images in Fi /Ei form a basis. Since Ei = R(E)i,1 = U1 R(E)i,0 = U1 R(F )i,0 , the vector space R(F )i,1 /U1 R(F )i,0 is generated by the images of p1 , . . . , pd1 −i−1 . Now consider the map U i+1 ⊕ U d1 −i−1 (−1) → R(F )i,∗ given by [xi0 · · · xi1 p1 · · · pd1 −i−1 ]. Then the image of this map contains R(F )i,0 , and it contains R(F )i,1 . Since R(F )i,∗ = U R(F )i,0 +U R(F )i,1 by Proposition 4.4, it is a surjective map, and it sends U i+1 to R(E)i,∗ = U xi0 + · · · + U xi1 . To show that it is actually an isomorphism U i+1 ⊕ U d1 −i−1 (−1) ∼ = R(F )i,∗ , it suffices to show that the U -modules U i+1 ⊕ U d1 −i−1 (−1) and R(F )i,∗ have the same Hilbert function. The Hilbert function of the former is     j +2 j+1 HU i+1⊕U d1 −i−1 (−1) (j) = (i + 1) + (d1 − i − 1) 2 2   j+1 = (i + 1)(j + 1) + d1 . 2 To compute the Hilbert function of R(F )i,∗ , note that a basis for R(F )i,j consists of monomials xk0 xℓ1 w1j−a w2a where k + ℓ = (j − a)σ1 + aσ2 + i. Thus j X ((j − a)σ1 + aσ2 + i + 1) HR(F )i,∗ (j) = a=0 = σ1 j X (j − a) + σ2 j X a + (i + 1)(j + 1) a=0 a=0     j+1 j+1 = σ1 + σ2 + (i + 1)(j + 1) 2 2   j+1 = (i + 1)(j + 1) + d1 2 = HU i+1⊕U d1 −i−1 (−1) (j). Therefore R(F )i,∗ ∼ = U i+1 ⊕ U d1 −i−1 (−1).  We may now compute the generators of Ki,∗ for any i ≥ d1 − 1. Theorem 4.8. Assume Data 2.2 with n = 3 and m = 1. Fix i ≥ d1 − 1 and set c = d2 − i. Let U = k[T1 , T2 , T3 ]. Let Ωc and Bc be as defined in Definition 3.5. For each 0 ≤ ℓ ≤ d1 − 2, choose elements pℓ,1 , . . . , pℓ,d1 −ℓ−1 ∈ Fℓ = R(F )ℓ,1 whose images in Fℓ /Eℓ form a basis. Then 1 1 {g1 xi−d , . . . , g1 xi−d } ∪ g2 Bc ∪ {g2 pα·σ−c,j wα | α ∈ Ωc , 1 ≤ j ≤ d1 − α · σ + c − 1} 0 1 is a generating set (not necessarily minimal) for Ki,∗ as a U -module. Proof. Since R(E) = R(E1 ) ∼ = S/(g1 ), and g1 has x-degree d1 , we just need to show that g2 Bc ∪ {g2 pα·σ−c,j w α | α ∈ Ωc , 1 ≤ j ≤ d1 − α · σ + c − 1} 26 is a minimal generating set for Ki,∗ R(E). We showed in (3.11) that Ki,∗ R(E) = g2 R(F )−c,∗ . From Theorem 3.7(b), we know that g2 Bc is a minimal generating set for Ki,∗ R(E) as an R(M )0,∗ -module. Recalling the definition of Bc , this means that X X (4.9) Ki,∗ R(E) = g2 R(M )0,∗ (x0 , x1 )α·σ−c w α = g2 R(M )α·σ−c,∗ wα . α∈Ωc α∈Ωc By Proposition 4.4, R(M )α·σ−c,∗ = U R(M )α·σ−c,0 + U R(M )α·σ−c,1 . The vector space R(M )α·σ−c,0 α·σ−c−j j x1 is spanned by {x0 | 0 ≤ j ≤ α·σ−c}, while the vector space R(M )α·σ−c,1 /U1 R(M )α·σ−c,0 = (F/E)α·σ−c is spanned by the images of {pα·σ−c,j | 1 ≤ j ≤ d1 −α·σ +c−1}. Therefore R(M )α·σ−c,∗ is generated as an U -module by the union of these two sets. Then by (4.9), Ki,∗ R(E) is generated as an U -module by the union of α·σ−c−j j α x1 w g2 Bc = {g2 x0 | α ∈ Ωc , 0 ≤ j ≤ α · σ − c} and {g2 pα·σ−c,j w α | α ∈ Ωc , 1 ≤ j ≤ d1 − α · σ + c − 1}.  Example 4.10 (continuation of Example 3.21). Assume n = 3 and assume that the entries of the first column of ϕ are linearly dependent. In Example 3.21, we computed the minimal generators of K with x-degree ≥ d1 . As for the generators having x-degree d1 − 1, we claim that the generating set given in Theorem 4.8 is minimal. Note that Ωc (where c = d2 − d1 + 1) in this case consists of only one element, namely (α1 , 0) where α1 = ⌈ dd21 ⌉ (as in the σ2 = 0 case of Example 3.20). Therefore the generating set in Theorem 4.8 is just g2 w1α1 {xα0 1 σ1 −c , . . . , xα1 1 σ1 −c , pα1 σ1 −c,1 , . . . , pα1 σ1 −c,d1 −α1 σ1 +c−1 }. By Proposition 4.7, {xα0 1 σ1 −c , . . . , xα1 1 σ1 −c , pα1 σ1 −c,1 , . . . , pα1 σ1 −c,d1 −α1 σ1 +c−1 } is a minimal generating set for R(F )α1 σ1 −c,∗ as a U -module. Thus the generating set from Theorem 4.8 is a minimal generating set for K in x-degree d1 − 1.  Example 4.11 (continuation of Example 3.22). Assume n = 3 and d1 = 2, and assume that the entries of the first column of ϕ are linearly independent, as in Example 3.22. To determine the minimal generators of K having x-degree 1, first note that Ωd2 −1 = {(α1 , α2 ) | α1 + α2 = d2 − 1}, therefore g2 Bd2 −1 = {g2 w1α1 w2α2 | α1 + α2 = d2 − 1}. We claim that this is a minimal generating set of K1,∗ . Minimality will follow from Theorem 3.7, so we just have to show it is generating. By Theorem 4.8, the only other generators of K1,∗ have the form g2 pα1 +α2 −d2 +1,j w1α1 w2α2 for (α1 , α2 ) ∈ Ωd2 −1 . But since (α1 , α2 ) ∈ Ωd2 −1 , this means α1 + α2 − d2 + 1 = 0 so the generators have the form g2 p0,1 w1α1 w2α2 , where p0,1 is a lift of a generator of F1 /E1 . Since α1 + α2 = d2 − 1, g2 p0,1 w1α1 w2α2 ∈ g2 R(F )0,1 (w1 , w2 )d2 −1 ⊂ g2 R(F )−1,2 (w1 , w2 )d2 −2 . But R(F )−1,2 = U1 R(F )−1,1 by Proposition 4.4, and R(F )−1,1 is generated by w1 and w2 , thus g2 p0,1 w1α1 w2α2 ∈ g2 R(F )−1,2 (w1 , w2 )d2 −2 ⊂ U1 (g2 (w1 , w2 )d2 −1 ). 27 Therefore g2 p0,1 w1α1 w2α2 is in the U -submodule generated by g2 Bd2 −1 . Hence g2 p0,1 w1α1 w2α2 is not part of a minimal generating set, so the only minimal generators are g2 Bd2 −1 . Combining this with what we already showed in Example 3.22, we conclude that all the minimal generators of K besides g1 having x-degree ≥ 1 are g2 w1α1 w2α2 for α1 , α2 ∈ N such that α1 + α2 ≤ d2 − 1. Since the only generator of K in degree 0 is the equation of the fiber ring, in bidegree (0, d), we have all the minimal generators of K.  Example 4.12. Unlike in the previous examples, it is not always possible to determine which, or even how many, of the generators in Theorem 4.8 are minimal, from only the numerical data of d1 , d2 , σ1 , and σ2 . For example, take  x40  ϕ = x20 x21 x41 x71   0 . x70 Then d1 = 4, d2 = 7, and σ1 = σ2 = 2. A computation in Macaulay2 shows that K3,∗ has seven minimal generators: three in degree 3, and four in degree 4. On the other hand, consider   4 x0 + x30 x1 x71   ϕ =  x20 x21 0 . x41 x70 Then, as before, we have d1 = 4, d2 = 7, and σ1 = σ2 = 2. But in this case, K3,∗ has only six minimal generators: three in degree 3, and three in degree 4.  Acknowledgments This work was carried out as part of the author’s doctoral thesis research. The author is very grateful to his advisor, Claudia Polini, for suggesting the problem and for helpful discussions, as well as her comments on an early version of the paper. References [1] J. A. Boswell and V. Mukundan. Rees algebras and almost linearly presented ideals. Preprint, arXiv:1505.04851. [2] L. Busé. On the equations of the moving curve ideal of a rational algebraic plane curve. J. Algebra, 321(8):2317– 2344, 2009. [3] L. Busé, M. Chardin, and A. Simis. Elimination and nonlinear equations of Rees algebras. J. Algebra, 324(6):1314– 1333, 2010. [4] L. Busé and J.-P. Jouanolou. On the closed image of a rational map and the implicitization problem. J. Algebra, 265(1):312–357, 2003. [5] T. Cortadellas Benı́tez and C. D’Andrea. Rational plane curves parameterizable by conics. J. Algebra, 373:453– 480, 2013. [6] T. Cortadellas Benı́tez and C. D’Andrea. Minimal generators of the defining ideal of the Rees algebra associated with a rational plane parametrization with µ = 2. Canad. J. Math., 66(6):1225–1249, 2014. [7] D. Cox, J. W. Hoffman, and H. Wang. Syzygies and the Rees algebra. J. Pure Appl. Algebra, 212(7):1787–1796, 2008. 28 [8] D. Cox, A. R. Kustin, C. Polini, and B. Ulrich. A study of singularities on rational curves via syzygies. Mem. Amer. Math. Soc., 222(1045):x+116, 2013. [9] D. A. Cox. The moving curve ideal and the Rees algebra. Theoret. Comput. Sci., 392(1-3):23–36, 2008. [10] D. A. Cox, T. W. Sederberg, and F. Chen. The moving line ideal basis of planar rational curves. Comput. Aided Geom. Design, 15(8):803–827, 1998. [11] D. Eisenbud. The geometry of syzygies, volume 229 of Graduate Texts in Mathematics. Springer-Verlag, New York, 2005. [12] D. Eisenbud and J. Harris. On varieties of minimal degree (a centennial account). In Algebraic geometry, Bowdoin, 1985 (Brunswick, Maine, 1985), volume 46 of Proc. Sympos. Pure Math., pages 3–13. Amer. Math. Soc., Providence, RI, 1987. [13] D. Eisenbud, C. Huneke, and B. Ulrich. What is the Rees algebra of a module? Proc. Amer. Math. Soc., 131(3):701–708, 2003. [14] J. Hong, A. Simis, and W. V. Vasconcelos. The equations of almost complete intersections. Bull. Braz. Math. Soc. (N.S.), 43(2):171–199, 2012. [15] J. Hong, A. Simis, and W. V. Vasconcelos. Extremal Rees algebras. J. Commut. Algebra, 5(2):231–267, 2013. [16] M. R. Johnson. Second analytic deviation one ideals and their Rees algebras. J. Pure Appl. Algebra, 119(2):171– 183, 1997. [17] J.-P. Jouanolou. Aspects invariants de l’élimination. Adv. Math., 114(1):1–174, 1995. [18] V. Kodiyalam. Integrally closed modules over two-dimensional regular local rings. Trans. Amer. Math. Soc., 347(9):3551–3573, 1995. [19] A. Kustin, C. Polini, and B. Ulrich. The bi-graded structure of symmetric algebras with applications to rees rings. J. Algebra. To appear, arXiv:1301.7106. [20] A. R. Kustin, C. Polini, and B. Ulrich. Blowups and fibers of morphisms. Preprint, arXiv:1410.3172. [21] A. R. Kustin, C. Polini, and B. Ulrich. Divisors on rational normal scrolls. J. Algebra, 322(5):1748–1773, 2009. [22] A. R. Kustin, C. Polini, and B. Ulrich. Rational normal scrolls and the defining equations of Rees algebras. J. Reine Angew. Math., 650:23–65, 2011. [23] N. P. H. Lan. On Rees algebras of linearly presented ideals. J. Algebra, 420:186–200, 2014. [24] K.-N. Lin and C. Polini. Rees algebras of truncations of complete intersections. J. Algebra, 410:36–52, 2014. [25] S. Morey. Equations of blowups of ideals of codimension two and three. J. Pure Appl. Algebra, 109(2):197–211, 1996. [26] S. Morey and B. Ulrich. Rees algebras of ideals with low codimension. Proc. Amer. Math. Soc., 124(12):3653– 3661, 1996. [27] T. Sederberg, R. Goldman, and H. Du. Implicitizing rational curves by the method of moving algebraic curves. J. Symbolic Comput., 23(2-3):153–175, 1997. Parametric algebraic curves and applications (Albuquerque, NM, 1995). [28] T. W. Sederberg and F. Chen. Implicitization using moving curves and surfaces. In Proceedings of the 22Nd Annual Conference on Computer Graphics and Interactive Techniques, SIGGRAPH ’95, pages 301–308, New York, NY, USA, 1995. ACM. [29] A. Simis, B. Ulrich, and W. V. Vasconcelos. Rees algebras of modules. Proc. London Math. Soc. (3), 87(3):610– 646, 2003. [30] I. Swanson and C. Huneke. Integral closure of ideals, rings, and modules, volume 336 of London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge, 2006. [31] H. H. Tài. On the Rees algebra of certain codimension two perfect ideals. Manuscripta Math., 107(4):479–501, 2002. 29 [32] B. Ulrich and W. V. Vasconcelos. The equations of Rees algebras of ideals with linear presentation. Math. Z., 214(1):79–92, 1993. Department of Mathematics, University of Notre Dame, Notre Dame, IN 46556 E-mail address: [email protected] 30
0math.AC
COMMUTATIVITY THEOREMS FOR GROUPS AND SEMIGROUPS arXiv:1706.00381v2 [math.GR] 22 Nov 2017 FRANCISCO ARAÚJO AND MICHAEL KINYON∗ Abstract. In this note we prove a selection of commutativity theorems for various classes of semigroups. For instance, if in a separative or completely regular semigroup S we have xp y p = y p xp and xq y q = y q xq for all x, y ∈ S where p and q are relatively prime, then S is commutative. In a separative or inverse semigroup S, if there exist three consecutive integers i such that (xy)i = xi y i for all x, y ∈ S, then S is commutative. Finally, if S is a separative or inverse semigroup satisfying (xy)3 = x3 y 3 for all x, y ∈ S, and if the cubing map x 7→ x3 is injective, then S is commutative. 1. Introduction Broadly speaking, a commutativity theorem in group theory is any result concluding that a group is commutative, i.e. abelian. Perhaps the best known example is the following standard exercise, usually given to students at the beginning of their study of group theory: If G is a group satisfying x2 = 1 for all x ∈ G, then G is commutative. Commutativity theorems can sometimes be extended to various classes of semigroups properly containing groups. For instance, a semigroup S is cancellative if it satisfies the conditions xy = xz =⇒ y = z and yx = zx =⇒ y = z for all x, y, z. Every finite cancellative semigroup is a group; the positive integers under addition provide an example of a cancellative semigroup which is not a group. The exercise above extends easily to cancellative semigroups once we reinterpret the condition “x2 = 1”. Since we do not wish to assume the existence of an identity element, we replace the condition with “x3 = x”, which is clearly equivalent to x2 = 1 in groups. Proposition 1.1. If S is a cancellative semigroup satisfying x3 = x for all x ∈ S, then S is commutative (and in fact, is a group satisfying x2 = 1 for all x ∈ S). The parenthetical part of the assertion suggests the proof: if x3 = x, then x3 y = xy and so cancelling gives x2 y = y for all x, y ∈ S. Dually, yx2 = y for all x, y ∈ S. Thus for all x, y ∈ S, x2 = x2 y 2 = y 2. This constant, which we denote by 1, is an identity element. Hence x3 = x = x1, and cancelling gives x2 = 1 for all x ∈ S. Therefore S is a group and we have reduced the problem to the original exercise. Still using this elementary example to illustrate our point, further extensions of the result are possible. A semigroup is separative if it satisfies the conditions xy = xx & yx = yy =⇒ x = y and xy = yy & yx = xx =⇒ x = y ([7], Def. II.6.2, p. 51). Every cancellative semigroup is evidently separative. We also need the notion of a semilattice of semigroups. A semilattice is a partially ordered set (I, ≤) such that every two elements x, y ∈ S have a greatest lower bound, denoted by Partially supported by Simons Foundation Collaboration Grant 359872 and by FCT project CEMATCIÊNCIAS UID/Multi/04621/2013. ∗ 1 x∧y. A semigroup S is a semilattice of semigroups if there exist a semilattice (I, ≤) and a set Y = {Sα }α∈I of pairwise disjoint subsemigroups Sα ≤ S indexed by I such that S = ∪α∈I Sα , and satisfying this property: for all α, β ∈ I and for all a ∈ Sα , b ∈ Sβ , we have ab ∈ Sα∧β . (For details, see [7], Def. II.1.4, p. 27). For our purposes, the following results are key ([7, Thm. II.6.4, p. 51], [6, Thm. 3.12, p. 47]). Proposition 1.2. Let S be a semigroup. (1) S is separative if and only if S is semilattice of cancellative semigroups. (2) S is commmutative and separative if and only if S is a semilattice of commutative cancellative semigroups. Now we can extend the original exercise even further. Corollary 1.3. Let S be a separative semigroup satisfying x3 = x for all x ∈ S. Then S is commutative, and in fact, is a semilattice of abelian groups satisfying x2 = 1. Indeed, by Proposition 1.2(1), S is a semilattice of cancellative semigroups Sα , α ∈ I, such that each Sα satisfies x3 = x. By Proposition 1.1, each Sα is an abelian group satisfying x2 = 1. By Proposition 1.2(2), S is commutative. We can also view the generalizations of our exercise from a different perspective. A semigroup S is regular if for each a ∈ S, there exists b ∈ S such that aba = a. This is equivalent to asserting that each a ∈ S has an inverse a′ ∈ S satisfying aa′ a = a and a′ aa′ = a′ . If each a ∈ S has a unique inverse, then S is said to be an inverse semigroup. Equivalently, an inverse semigroup is precisely a regular semigroup in which all the idempotents commute. A semigroup S such that each element has a commuting inverse aa′ = a′ a is said to be completely regular. Equivalently, a completely regular semigroup is a union of groups. A completely regular, inverse semigroup is called a Clifford semigroup. A Clifford semigroup is characterized as a semilattice of groups. (For further details on regular semigroups, see, for instance, [3].) Note in particular that every Clifford semigroup is separative. This gives us a different way of viewing our exercise. A semigroup satisfying x3 = x for all x is completely regular, with the commuting inverse of each x being given by x′ = x. It is easy to see that a regular, cancellative semigroup is a group by essentially the same argument as above: xx′ xy = xy and yxx′ x = yx, so x′ xy = y and yxx′ = y for all x, y ∈ S. A semigroup (or more generally, any magma) with both a left identity element and a right identity element has a (necessarily unique) identity element 1, and we have xx′ = x′ x = 1 for all x ∈ S. Thus we have another proof of Proposition 1.2. In this paper, we will extend three commutativity theorems from group theory to semigroups. Our first result, which was our original motivation, is based on a recent preprint of Venkataraman [8]. She proved that in a finite groups, if squares commute with squares and cubes commute with cubes then the group is commutative; she also proposed the problem of extending her result to infinite groups. More generally, in the same paper, she asked if a group satisfying the conditions xp y p = y p xp and xq y q = y q xq for all x where p and q are relatively prime is necessarily commutative. Although we did not know it when we began our investigation, this is apparently a folk result in group theory [9], although we have not been able to find a reference in the literature. (Note that the proofs given in the cited website do 2 not generalize directly to semigroups.) In the spirit of our discussion above, we prove that Venkataraman’s desired result holds more generally. Theorem 1.4. Let S be a separative or completely regular semigroup such that, for all x, y ∈ S, xp y p = y p xp and xq y q = y q xq where p and q are relatively prime positive integers. Then S is commutative. In Example 2.2, we note that this theorem cannot be extended from completely regular semigroups to general regular semigroups. It is easy to see that a group, or more generally a cancellative semigroup, is commutative if and only if (xy)2 = x2 y 2 for all x, y. The direct implication is trivial; for the converse, xyxy = xxyy implies yx = xy after cancellation. In the same vein is the following well-known exercise ([2], §2.3, Exer. 4): If G is a group such that (ab)i = ai bi for three consecutive integers i for all a, b ∈ G, show that G is abelian. The slightly awkward wording allows two interpretations: that the integers i depend on the elements a, b, or that the same integers i work for all a, b. The proof for groups is essentially the same in either case. Our generalizations require both readings. Theorem 1.5. Let S be a semigroup. (1) Suppose S is separative and suppose that for each a, b ∈ S, there exist three consecutive nonnegative integers i such that (ab)i = ai bi . Then S is commutative. (2) Suppose S is an inverse semigroup and suppose that there exist three consecutive nonnegative integers i such that (ab)i = ai bi for all a, b ∈ S. Then S is commutative. Part (2) of this theorem cannot be formulated in the same way as part (1) is; see Example 3.2. In addition, part (2) cannot be generalized to other types of regular semigroups; see Example 3.3. Another commutativity theorem for groups was motivated for us by another known exercise [2, Exer. 24, p. 48]: Let G be a finite group whose order is not divisible by 3. Suppose that (ab)3 = a3 b3 for all a, b ∈ G. Prove that G must be abelian. The finiteness is not essential and the condition can be replaced with the assumption that G is a group with no elements of order 3, that is, G satisfies the condition x3 = 1 =⇒ x = 1 (1) for all x ∈ G. More generally, a group G satisfying (ab)3 = a3 b3 for all a, b ∈ G can be described by a more general theorem of Alperin [1] as a quotient of a subgroup of a direct product of abelian groups and groups of exponent 3. The condition (1) rules out groups of exponent 3, and so G is abelian. The existence of nonabelian groups of exponent 3, such as the unique one of order 27, shows that some additional hypothesis like (1) is needed to conclude commutativity. There are two reasonable reformulations of (1) for semigroups. First, if a semigroup S satisfies (ab)3 = a3 b3 for all a, b ∈ S, then this just asserts that the cubing mapping S → S; x 7→ x3 is an endomorphism. From this point of view, (1) asserts that in groups, the kernel of this endomorphism is trivial, or equivalently, that the endomorphism is injective. 3 This latter formulation makes sense in any semigroup S: x3 = y 3 =⇒ x = y (2) for all x ∈ S. Another reformulation of (1) for groups which works for any semigroup S, possibly without an identity element, is weaker, but more straightforward: x4 = x =⇒ x2 = x (3) for all x ∈ S. To see that this is weaker, suppose (2) holds and x4 = x. Then (x2 )3 = x6 = x3 , and so applying (2) yields x2 = x. Theorem 1.6. Let S be a semigroup satisfying (xy)3 = x3 y 3 for all x ∈ S. (1) If S is separative and satisfies (2), then S is commutative. (2) If S is an inverse semigroup and satisfies (3), then S is commutative. The hypothesis of part (1) of Theorem 1.6 cannot be weakened to (3); see Example 4.2 below. Also, neither part of the theorem extends to other types of regular semigroups; see Example 4.3. All of our investigations were aided by the automated deduction tool Prover9 created by McCune [4]. Automated theorem provers are especially good at equational reasoning, being able to derive consequences of equational axioms much faster and more efficiently than humans. Any currently available automated theorem prover would have sufficed for this project, but Prover9 has the advantage that its input and output are easily readable by mathematicians with no familiarity with such tools. For example, here are the axioms in an input file for the special case of Theorem 1.4 where S is a group, p = 2 and q = 3: % group axioms (x * y) * z = x * (y * z). % associativity e * x = x. x * e = x. % identity element x’ * x = e. x * x’ = e. % inverses % x^2 y^2 = y^2 x^2 (x * x) * (y * y) = (y * y) * (x * x). % x^3 y^3 = y^3 x^3 (x * (x * x)) * (y * (y * y)) = (y * (y * y)) * (x * (x * x)). The goal is just x * y = y * x. % commutativity Here each equation is interpreted by Prover9 to be universally quantified in the variables. Everything written after a % symbol is a comment. Notice that the association of terms in any equation is made explicit; while there are settings in Prover9 which allow one to avoid parenthesization of the input, they do not generally improve readability of proofs. Since we are working in semigroups, the associative law is part of any input file, and is heavily used throughout proofs, mostly as a rewrite rule. While this can lengthen proofs, it actually causes little to no trouble for a human reader, who can skip many lines where the rule is being applied. 4 Running Prover9 with its default settings on the above input gives a proof in less than half a minute on a not particularly fast computer. The proof has 174 steps. Some of the steps are long and unpleasant; for instance, the longest one has an equation with 67 symbols in it (variables and occurrences of the operations ∗ and ′ . Here is a more typical one from the proof, split into two lines: 961 x * (y * (x’ * (y * y))) = y * (y * (x * (y * x’))). [para(864(a,2),51(a,1,2,2)),rewrite([14(7)])]. The number 961 is a clause identification number which is an internal index that Prover9 uses to keep track of kept clauses. The part in square brackets is the justification for clause 961. Here “para” is short for paramodulation, which is the primary inference used in equational reasoning. Paramodulation refers to the substitution of one side of an equation into a subterm of another equation. In this case, clause 864 was plugged into a subterm of clause 51. This was followed by a rewrite of the resulting clause by clause 14. It is not terribly enlightening to show the details of this particular step in the proof nor any other step, because it turns out not to be necessary for translation into humanly readable form. A proof of 167 steps is, by the standards of automated theorem provers, not very long, and so it is reasonable to try to obtain a human proof. For familiar associative structures such as groups, lattices, rings, and so on, this is usually easy, albeit sometimes time-consuming. Given two equations and being told that under the axioms of group theory, the two yield a third is usually enough for someone familiar with groups to see how the proof goes. In addition, a human reader can take numerous shortcuts. For example, here is another step in the proof, omitting the justification: 11605 x * (y * (x * y’)) = x * x. A human reader can immediately see that the proof is essentially finished: cancel x on each side of the identity and then multiply on the right by y to get commutativity. Prover9, on the other hand, took 14 additional steps to reach commutativity. In other words, the “out of the box” proof that Prover9 found was far from optimal. Experienced users can tweak Prover9’s many parameters and use various specialized techniques to find proofs faster, to find shorter proofs, and so on. For example, changing the term ordering from the default lexicographic path ordering (LPO) to the Knuth-Bendix ordering gets a different proof in just 10 seconds and the new proof is 19 steps shorter than the first one. Certainly the most interesting use of Prover9 was in our investigation of Theorem 1.4. Conditions such as xp y p = y p xp for all x, y where p is an arbitrary but fixed positive integer cannot be directly encoded in Prover9 (or any other first-order theorem prover) because it has no built-in description of the integers. Instead, we had to look at several special cases such as the one above. It was only after examination of several special cases that we realized that many of the steps in the proofs were similar. This enabled us to see the pattern of the proof of Theorem 1.4 for groups. (Recall that at this point, we were not aware that the theorem was a known folk result.) In particular, the special cases led us to our formulation of Lemma 2.1 below as containing the essential idea of the proofs. It was also at this same point in our investigations that we realized the theorem holds more generally in cancellative, and then separative semigroups. This motivated us to look at a sampling of other commutativity theorems in various classes of semigroups. 5 After this paper was submitted, we became aware of the recently published paper of Moghaddam and Padmanabhan [5]. The results contained therein are different from ours, but the spirit of the work is exactly the same: by extracting the essential features of syntactic proofs of commutativity theorems for groups, they were able to extend them to cancellative semigroups. 2. Proof of Theorem 1.4 The goal of this section is to prove Theorem 1.4. We start with the following key lemma. Lemma 2.1. Let S be a cancellative semigroup and suppose that there exists a map g : S → S satisfying the following conditions: for all x, y ∈ S, (a) xg(x) = g(x)x; (b) g(x)g(y) = g(y)g(x); (c) xg(x) · yg(y) = yg(y) · xg(x). Then the semigroup S is commutative. Proof. We claim that the following identity holds: g(g(x)y)y = yg(g(x)y) . (4) In fact, (a) g(x)y g(g(x)y) = g(g(x)y) g(x)y | {z } | {z } | {z } | {z } u g(u) u g(u) = g(g(x)y) g(x) y | {z } |{z} g(u) g(x) (b) = g(x) g(g(x)y) y, |{z} | {z } g(x) g(u) which, eliminating g(x) by left cancellation, gives (4). Our next claim is that g(x)y = yg(x). We start by observing that (c) yg(y) g(x)y g(g(x)y) = g(x)y g(g(x)y) yg(y). | {z } | {z } | {z } | {z } u u g(u) 6 g(u) (5) Now, (b) g(x)y g(y)g(g(x)y) y = g(x)y g(g(x)y)g(y) y | | {z } {z } g(y)g(u) g(u)g(y) = g(x)yg(g(x)y) g(y)y | {z } (a) = g(x)yg(g(x)y) yg(y) | {z } (5) = yg(y)g(x)yg(g(x)y) (b) yielding = y g(x)g(y) yg(g(x)y) | {z } (4) = yg(x)g(y) g(g(x)y)y, | {z }     g(x)y · g(y)g(g(x)y)y = yg(x) · g(y)g(g(x)y)y , which, by right cancellation, implies g(x)y = yg(x), as claimed. Now the proof that xy = yx is straightforward: (c) (b) x yg(x) g(y) = x g(x)y g(y) = yg(y)xg(x) = y xg(y) g(x) = yxg(x)g(y), | {z } | {z } | {z } and xy = yx follows by right cancellation. This completes the proof of the lemma.  The previous lemma opens the gate to the proof of our first main theorem. Proof of Theorem 1.4. We may assume without loss of generality that p, q > 1. Suppose first that S is cancellative. Since p and q are relatively prime, by Bezout’s identity there exist integers r, s such that pr + qs = 1. Since one of pr or qs must be negative, we assume without loss of generality that qs < 0; thus −qs > 0 and x−qs ∈ S for all x ∈ S. Since q > 0, we have s < 0 so that −s > 0; thus x−s ∈ S for all x ∈ S. As pr > 0 and p > 0, we have r > 0 and xpr , xr ∈ S for all x ∈ S. Let g(x) = x−qs . We claim that g(x) satisfies the three properties (a), (b) and (c) of the previous lemma. By associativity, we have xg(x) = g(x)x so that (a) holds. Regarding (b) we have g(x)g(y) = x−qs y −qs = (x−s )q (y −s )q = (y −s )q (x−s )q = y −qs x−qs = g(y)g(x). The second equality holds because by assumption the qth powers commute. Finally, regarding (c) we have xg(x)yg(y) = xx−qs yy −qs = x1−qs y 1−qs = xpr y pr = (xr )p (y r )p = (y r )p (xr )p = y pr xpr = y 1−qs x1−qs = yy −qsxx−qs = yg(y)xg(x). The fourth equality holds because pth powers commute. We have proved that S admits a function g : S → S satisfying the three conditions of the previous lemma. It follows that S is commutative. 7 Next assume that S is separative. By Proposition 1.2, S is a semilattice of cancellative semigroups Sα , each of which satisfies the hypotheses of the theorem. It follows that each Sα is commutative. By Proposition 1.2 again, S is commutative. Finally, assume that S is completely regular. If e, f ∈ S are idempotents, then ef = p p e f = f p ep = f e. It follows that S is an inverse semigroup. Since S is both completely regular and inverse, it is a Clifford semigroup, hence is a semilattice of groups. In particular, S is separative and the desired result follows.  Example 2.2. Theorem 1.4 does not generalize from completely regular semigroups to other types of regular semigroups. For example, let S be the Brandt semigroup of order 5. Then for every positive integer p and every x ∈ S, xp is an idempotent. Thus the hypotheses of the theorem are satisfied since idempotents commute in inverse semigroups, but S is not commutative. 3. Proof of Theorems 1.5 We first need a lemma which will prove useful in both this section and the next. Lemma 3.1. Let S be an inverse semigroup and suppose there exists an integer k > 1 such that (xy)k = xk y k for all x ∈ S. Then S is a Clifford semigroup. Proof. Denote the unique inverse of an element x ∈ S by x′ . We will show that xx′ = x′ x for all x ∈ S. It will follow that S is completely regular, hence Clifford. First, since (x′ x)k = x′ x, we have (x′ )k xk = x′ x (6) ′ k−1 k−1 ′ for all x ∈ S. Next, recalling that (x ) = (x ) in inverse semigroups, we compute (6) (x′ )k−1 xk = (xk−1 )′ xk = (x′ )k−1xk−1 · xx′ x = xx′ · (x′ )k−1xk−1 x = x(x′ )k xk = xx′ x = x , | {z } where we used the fact that idempotents commute in the third equality. Thus (x′ )k−1xk = x . (7) Next, we have (7) (7) x′ xx = x′ x(x′ )k−1 xk = (x′ )k−1xk = x , where we used k > 1 in the second equality. Thus we have both x′ xx = x , ′ ′ (8) ′ xx x = x , (9) where (9) follows from (8) by replacing x with x′ and using x′′ = x. Finally, we compute (8) (9) xx′ = x′ xxx′ = xx′ x′ x = x′ x , where we used commuting idempotents in the second equality. This completes the proof of the lemma.  Proof of Theorem 1.5. We begin with part (1) and suppose first that S is cancellative. One of the standard proofs of Herstein’s exercise ([2], §2.3, Exer. 4) only uses cancellation and so applies here. Say that the three consecutive nonnegative integers are i, i + 1, i + 2. Then ai bi ab = (ab)i ab = (ab)i+1 = ai+1 bi+1 . Cancel ai on the left and b on the right to get 8 bi a = abi . Repeating the same argument with i + 1 in place of i gives bi+1 a = abi+1 . Thus bi · ab = abi b = abi+1 = bi+1 a = bi · ba. Cancelling gives ab = ba. Now suppose S is separative. By Proposition 1.2, S is a semilattice of cancellative semigroups Sα . Each Sα satisfies the hypothesis of the theorem, hence is commutative. By Proposition 1.2, S is commutative. Now we turn to part (2) and assume that S is an inverse semigroup satisfying the hypotheses of the theorem. Applying Lemma 3.1 with k = i + 1, we have that S is a Clifford semigroup. In particular, S is separative. Since the hypotheses of part (2) are stronger than those of part (1), we may now apply part (1) to conclude that S is commutative.  Example 3.2. Let S be any nonClifford inverse semigroup with a zero 0, for instance, the Brandt semigroup of order 5 will suffice. Let b be any element such that bb′ 6= b′ b. Then (0b)k = 0k bk for all k ≥ 1. This shows that part (2) of Theorem 1.5 cannot be strengthened to be like part (1). Example 3.3. Let S = {e, f } be the 2-element left (say) zero semigroup. Then trivially (xy)k = xk y k for all x, y ∈ S and all positive integers k, but S is not commutative. Thus Theorem 1.5 does not extend to arbitrary regular semigroups or even completely regular semigroups. 4. Proof of Theorem 1.6 We start with a lemma of some independent interest. Lemma 4.1. Let S be a cancellative semigroup satisfying (xy)3 = x3 y 3 for all x, y ∈ S. Then for all x, y ∈ S, x3 y = yx3 . (10) Proof. First, cancellation on both sides of (xy)3 = x3 y 3 gives (yx)2 = x2 y 2 for all x, y ∈ S. Using this, we compute (x · yx)(x · yx) = (yx)2 x2 = x2 y 2 x2 . Cancelling on both sides, we obtain xy 2 x = yx2 x (11) (11) for all x, y ∈ S. Next, x · y 2x2 · x = x(xy)2 x = xy · x2 · xy. Cancelling xy on the left gives yx3 = x3 y for all x ∈ S, as desired.  Finally, we prove our last main result. Proof of Theorem 1.6. For part (1), assume first that S is cancellative and satisfies (2). Then (10) shows that the image C = {x3 | x ∈ S} of the cubing map S → S; x 7→ x3 is commutative. The condition (2) asserts that this map is injective, hence S is isomorphic to C. In particular, S is commutative. Now assume S is separative. By Proposition 1.2, S is a semilattice of cancellative semigroups Sα , each of which satisfies both (2) and (xy)3 = x3 y 3 for all x ∈ Sα . By the argument above, each Sα is commutative. Applying Proposition 1.2 again, we have that S is commutative. For (2), now let S be an inverse semigroup satisfying both (3) and (xy)3 = x3 y 3 for all x ∈ S. By Lemma 3.1, S is a Clifford semigroup, hence a semilattice of groups Sα . Each group Sα satisfies (3) as well, but in groups, (3) is equivalent to (2). In particular, S is a separative semigroup satisfying the conditions of part (1), and so S is commutative.  9 Example  4.2. The  hypothesisof part (1) of Theorem 1.6 cannot be weakened to (3). Indeed, 1 a let S = | a, b ∈ Z+ with matrix multiplication as the operation. Then S is a 0 b cancellative semigroup without idempotents and thus trivially satisfies (3). However, S is not commutative. Example 4.3. Let S be as in Example 3.2 and note once again that (xy)3 = x3 y 3 is trivially satisfied for all x, y ∈ S. Since S is idempotent, conditions (2) and (3) both hold. However S is not commutative. Thus neither part of Theorem 1.6 extends to other types of regular semigroups. References [1] J. L. Alperin, The classification of n-abelian groups, Canad. J. Math. 21 (1969), 1238–1244. [2] I. N. Herstein, Topics in Algebra, Second edition. Xerox College Publishing, Lexington, Mass.-Toronto, Ont., 1975. [3] J. M. Howie, Fundamentals of semigroup theory, London Mathematical Society Monographs. New Series, 12. Oxford Science Publications. The Clarendon Press, Oxford University Press, New York, 1995. [4] W. W. McCune, Prover9 and Mace4, version 2009-11A. http://www.cs.unm.edu/~mccune/prover9/ [5] G. I. Moghaddam and R. Padmanabhan, Commutativity theorems for cancellative semigroups, Semigroup Forum 95 (2017), 448–454. [6] A. Nagy, Special classes of semigroups, Advances in Mathematics (Dordrecht) 1, Kluwer Academic Publishers, Dordrecht, 2001. [7] M. Petrich, Introduction to Semigroups, Merrill Research and Lecture Series. Charles E. Merrill Publishing Co., Columbus, Ohio, 1973. [8] G. Venkataraman, Groups in which squares and cubes commute, https://arxiv.org/abs/1605.05463. [9] A group such that am bm = bm am and an bn = bn an (m, n coprime) is abelian? https://math.stackexchange.com/questions/326702/a-group-such-that-am-bm-bm-am-and-an-bn-bn-an-m-n(Araújo) Colégio Planalto, R. Armindo Rodrigues 28, 1600–414 Lisboa, Portugal (Kinyon) Department of Mathematics, University of Denver, Denver, CO 80208, USA (Kinyon) CEMAT-CIÊNCIAS, Departamento de Matemática, Faculdade de Ciências, Universidade de Lisboa, 1749-016, Lisboa, Portugal E-mail address: [email protected] 10
4math.GR
CLASSIFICATION OF EXTERNAL ZONOTOPAL ALGEBRAS arXiv:1803.09966v1 [math.CO] 27 Mar 2018 GLEB NENASHEV Abstract. In this paper we work with power algebras associated to hyperplane arrangements. There are three main types of these algebras, namely, external, central, and internal zonotopal algebras. We classify all external algebras up to isomorphism in terms of zonotopes. Also, we prove that unimodular external zonotopal algebras are in one to one correspondence with regular matroids. For the case of central algebras we formulate a conjecture. 1. Introduction In this paper we work with power algebras, which are quotients of polynomial rings by power ideals. We consider zonotopal ideals, which are associated to zonotopes. These ideals were independently introduced in two different ways. There are three types of algebras. We will work with the definition from F. Ardila and A. Postnikov [2]; it comes from algebras generated by the curvature forms of tautological Hermitian linear bundles [3, 28], see also papers [4, 5, 14, 15, 16, 22, 23, 26, 27, 29], where people work with quotients algebras by these ideals. At the same time the definition and the name was established by O. Holtz and A. Ron [12]; it comes from Box-Splines and from Dahmen-Micchelli space [1, 8, 10], see also the papers [9, 11, 13, 18, 19, 20, 21, 30]. Let A ∈ Rn×m be a matrix of rank n. Denote by y1 , . . . , ym ∈ Rn the columns and by t1 , . . . , tn ∈ Rm the rows. For a matrix A, we define the zonotope M ZA := [0, yi ] ⊂ Rn i∈[m] as the Minkovskii sum of intervals [0, yi ], i ∈ [m]. By F (A) we denote the set of facets of ZA . For any facet H ∈ F (A), we define m(H) as the number of non-zero coordinates of the vector ηH A ∈ Rm , where ηH ∈ Rn is a normal for H. (k) Let CA be the quotient algebra (k) (k) CA := R[x1 , . . . , xn ]/IA , Key words and phrases. Commutative algebra, Power ideals, Zonotopes, Matroids, Lattice points. 1 2 G. NENASHEV (k) where IA is the zonotopal ideal generated by the polynomials (k) pH = (ηh · (x1 , . . . , xn ))m(H)+k , H ∈ F (A). There are 3 main cases, where k = ±1 and 0; they were considered in [2, 12]. (1) • k = 1 : CAEx = CA is the external zonotopal algebra for A; (0) • k = 0 : CAC = CA is the central zonotopal algebra for A; (−1) • k = −1 : CAIn = CA is the internal zonotopal algebra for A. Remark 1. The case k > 1 is not “zonotopal”, because the ideal Î (k) generated by ph = (h · (x1 , . . . , xn ))m(h)+k , h ∈ Rn is different from I (k) . They coincide only for the case where k ≤ 1. In the case k ≤ −5, Hilbert series is not a specialization of the corresponding Tutte polynomial, see [2]. Theorem 1 (cf. [2, 4, 12, 20], External [27], Central for graphs [26]). For a matrix A ∈ Rn×m , the Hilbert series of zonotopal algebras are given by • H(CAEx ) = q m−n TA (1 + q, 1q ); • H(CAC ) = q m−n TA (1, 1q ); • H(CAIn ) = q m−n TA (0, 1q ), where TA is the Tutte polynomial of the vector configuration of the columns of A (i.e., vectors y1 , . . . , ym ). There are other definitions of external algebras from [27]. Let Φm be the square-free commutative algebra generated by φi , i ∈ [m], i.e., with relations φi φj = φj φi , i, j ∈ [m] and φ2i = 0, i ∈ [m]. Theorem 2 (cf. [27]). The external algebra CAEx is isomorphic to the subalgebra of ΦEx A := Φm generated by Xi := ti · (φ1 , . . . , φm ), i ∈ [n]. In papers [15, 16] we constructed the analogue of Theorem 2 in the case of central and internal zonotopal algebras for totally unimodular matrices, see the definition below. The main interesting examples of zonotopal algebras arise for totally unimodular matrices and for graphs. The matrix A is totally unimodular if any its minors is equal to ±1 or 0. In this case the total dimensions of the algebras have a nice interpretation. Theorem 3 (cf. [12]). Let A ∈ Rn×m be a totally unimodular matrix of rank n. Then the total dimension CLASSIFICATION OF EXTERNAL ZONOTOPAL ALGEBRAS 3 • dim(CAEx ) is equal to the number of lattice points of ZA ; • dim(CAC ) is equal to the volume of ZA ; • dim(CAIn ) is equal to the number of interior lattice points of ZA . The main examples of totally unimodular matrices are graphs. Namely, let G be a graph on n vertices; then the incidence matrix of any orientation of G is totally unimodular. To construct the zonotopal algebra, we should forget exactly one row for each connected component of G. These algebras are independent (up to isomorphism) of the choice of orientations and rows. These graphical algebras were considered in [14, 15, 22, 23, 27]. In the graphical case Theorem 3 can be written in graph theory terminology. Theorem 4 (cf. [26]). Let G be a graph. Then the total dimension • dim(CGEx ) is equal to the number of forests in G; • dim(CGC ) is equal to the number of trees in G (in the connected case). It is well-known that the number of lattice points (volume) of the corresponding zonotope and the number of forests (trees) of a graph are the same, see for example [6, 17] (Points of the zonotope correspond to score vectors). Example 1. Let G be graph on the vertex set {0, 1, 2} with 4 edges (0, 1), (0, 2), (1, 2), and (1, 2), see fig. 1, left. Let us orient all edges in the sense of increasing corresponding number. Consider the incidence matrix after forgetting of 0-th row   −1 0 1 1 A := , 0 −1 −1 −1 see zonotope ZA on fig. 1, right. 1 2 b 1 -3 b -2 b 0 b b -1 0b -1 b 0 1 2 -2 b b b -3 b b 2 3 4 b -4 Figure 1. A graph and its corresponding zonotope. The zonotope ZA has 6 facets. We need the set of its normals (note that parallel facets have the same normal up to a factor). There are 3 normals 4 G. NENASHEV • • • It is η1 = (1, 0); η2 = (0, 1); η3 = (1, 1). easy to check that m(η1 ) = m(η2 ) = 3 and m(η3 ) = 2. Hence, (k) 3+k 2+k IA = hx3+k i. 1 , x2 , (x1 + x2 ) Then • H(CAEx ) = 1 + 2q + 3q 2 + 3q 3 + q 4 and dim(CAEx ) = 10; • H(CAC ) = 1 + 2q + 2q 2 and dim(CAC ) = 5; • H(CAIn ) = 1 + q and dim(CAIn ) = 2. It is easy to check that 10, 5, and 2 are exactly the number of lattice points, the area, and the number of interior lattice points of ZA , respectively. Furthermore, 10 and 5 are the number of forests and trees in G. In this case the Tutte polynomial is given by TG (x, y) = TA (x, y) = x + y + x2 + xy + y 2 , Anyone can check the formulas for the Hilbert series. The following important property of external graphical algebras was proved in [23]. Theorem 5 (cf. [23]). Given two graphs G1 and G2 . Then the following are equivalent: • CGEx1 and CGEx2 are isomorphic as non-graded algebras; • CGEx1 and CGEx2 are isomorphic as graded algebras; • the graphical matroids MG1 and MG2 are isomorphic. The following conjecture was formulated for the central case: Conjecture 1 (cf. [23]). Given two connected graphs G1 and G2 , the following are equivalent: • CGC1 and CGC2 are isomorphic as non-graded algebras; • CGC1 and CGC2 are isomorphic as graded algebras; • the bridge-free matroids MG1 and MG2 are isomorphic. Here the bridge-free matroid of a graph is its graphical matroid after deleting all bridges. In the paper [22], the K-theoretic filtration was considered, see defiEx nition there. Denote by KG the K-theoretic filtration of CGEx. Theorem 6 (cf. [22]). Given two graphs G1 and G2 without isolated Ex Ex vertices, the filtered algebras KG and KG are isomorphic if and only 1 2 if G1 and G2 are isomorphic. The structure of this paper is as follows: in § 2 we present a classification of external zonotopal algebras and a conjecture for the central case; in § 3 we prove our classification. CLASSIFICATION OF EXTERNAL ZONOTOPAL ALGEBRAS 5 Acknowledgments. This material is based upon work supported by the National Science Foundation under Grant DMS-1440140 while the author was staying at the Mathematical Sciences Research Institute in Berkeley, California, during the program “Geometric and Topological Combinatorics” in the fall 2017. He also would like to thank the participiants of the PA-seminar for their comments. 2. Main results Definition 1. Two linear spaces V1 ⊂ Rm1 and V2 ⊂ Rm2 are called z-equivalent if m1 = m2 = m and there is an invertible diagonal matrix D ∈ Rm×m and a permutation π ∈ Sm such that V1 = V2 (πD). The matrices A1 ∈ Rn1 ×m1 of rank n1 and A2 ∈ Rn2 ×m2 of rank n2 are called z-equivalent if the span of rows of A1 is z-equivalent to the span of rows of A2 . Remark 2. It is easy to see that z-equivalence is an equivalence relation. In the case when A1 and A2 do not have proportional columns, we can say that the matrix A1 is equivalent to A2 if and only if their zonotopes are equivalent (since we can reconstruct the “matrix” from the zonotope in this case). This equivalence is weaker than that of matroids. Proposition 7. If two matrices A1 and A2 are z-equivalent, then the matroids MA1 and MA2 are isomorphic. It is easy to check that CAEx1 and CAEx2 are isomorphic if A1 and A2 are z-equivalent. The converse also holds. Theorem 8. Let A1 ∈ Rn1 ×m1 and A2 ∈ Rn2 ×m2 be two matrices of rank n1 and n2 respectively. Then the following are equivalent: • CAEx1 and CAEx2 are isomorphic as non-graded algebras; • CAEx1 and CAEx2 are isomorphic as graded algebras; • A1 and A2 are z-equivalent. Corollary 1. Let A1 ∈ Rn1 ×m1 and A2 ∈ Rn2 ×m2 be two matrices of ranks n1 and n2 respectively, with isomorphic external algebras CAEx1 ∼ = CAEx2 . Then the matroids MA1 and MA2 are isomorphic. The following theorems shows that unimodular external zonotopal algebras are in one to one correspondence with regular matroids. Theorem 9. Let A1 ∈ Rn1 ×m1 and A2 ∈ Rn2 ×m2 be two unimodular matrices of rank n1 and n2 respectively. Then the following are equivalent: 6 G. NENASHEV • • • • CAEx1 and CAEx2 are isomorphic as non-graded algebras; CAEx1 and CAEx2 are isomorphic as graded algebras; A1 and A2 are z-equivalent. the matroids MA1 and MA2 are isomorphic. Since for graphs we have a totally unimodular matrix, all graphical matroids are regular; the converse is almost true. Every regular matroid may be constructed by combining graphic matroids, cographic matroids, and a certain ten-element matroid R10 , see [25] or the book [24]. In the graphical case the last theorem says that the algebra remembers graph up to 2-isomorphism, see [31]. For the central case, we can extend Conjecture 1 for all matrices. For a matrix A, we say that a column is a bridge-column if after deleting it the rank decreases. Conjecture 2. Let A1 ∈ Rn1 ×m1 and A2 ∈ Rn2 ×m2 be two matrices of ranks n1 and n2 respectively. Then the following are equivalent: • CAC1 and CAC2 are isomorphic as non-graded algebras; • CAC1 and CAC2 are isomorphic as graded algebras; • A′1 and A′2 are z-equivalent, where A′i ∈ R(ni −ki )×(ni −ki ) is the submatrix of Ai resulting after deleting all ki bridge-columns and those ki rows such that rk(A′i ) = ni − ki . 3. Proofs Let be a finite dimension algebra over R. We say that an element PB k r = i=1 a2i a2i+1 is reducible if ai ∈ B, i ∈ [2k] are nilpotent elements. For a nilpotent element a ∈ B we define the length ℓ(a) as the maximal ℓ such that aℓ 6= 0. Proof of Theorem 8. Clearly, we have 1 ⇐= 2 ⇐= 3, so we will prove 1 =⇒ 3. Let CAEx be our algebra. We will work with the square-free definition, i.e., CAEx is a subalgebra of Φm , where m = max(ℓ(a) : a ∈ CAEx ). (note that we can work with Φm only theoretically, i.e., we do not know this embedding). We know which element is the unit, so we can chose basis x1 , . . . , xn of nilpotents of CAEx with the following property: ℓ(x + r) ≥ ℓ(x), CAEx for any reducible r ∈ and x ∈ span{x1 , . . . , xn }. Since we can define the algebra via some matrix A, then there is such basis. Any element has the representation m X ai,k φi + ri , xi = k=1 CLASSIFICATION OF EXTERNAL ZONOTOPAL ALGEBRAS 7 where ai,k ∈ R and ri is reducible. Let A′ = {ai,k : (i, k) ∈ [n] × [m]} be the corresponding matrix. Our goal is to reconstruct A′ up to zequivalece. Consider the projective space Pn−1 over R. To finish the proof we should find the multiset A := {(a1,k , a2,k , . . . , an,k ) ∈ Pn−1 , k ∈ [m]}. Define the set S of all non-zeroes s ∈ R such that there are i 6= j ∈ [n] and a non-zero t ∈ R for which ℓ(xi − sxj ) < ℓ(xi − txj ). It is easy to see that S is exactly the set   ai,k : i, j ∈ [n], k ∈ [m], and ai,k , aj,k 6= 0 . aj,k Then S is a finite set. Define a theoretical set S of rows of X as S := {(s1 , s2 , . . . , sn ) ∈ Pn−1 , si ∈ S ∪ {0}}. Any element of A is an element of S, so it is enough to find the multiplicity of any s ∈ S. Consider the following partial order on elements of Pn−1 : (p1 , p2 , . . . , pn ) ≥ (p′1 , p′2 , . . . , p′n ) if there is t ∈ R such that ( tpi ∀i ∈ [n], p′i = 0. Note that if, for any s, we know the summary multiplication of all s′ ≥ s in A, then we can calculate multiplicity of all elements. Given s ∈ S, then the summary multiplication of all s′ ≥ s is equal to ! ! X X ℓ bi xi − ℓ ci xi , i∈I i∈I where • I ⊆ [n] is the support of s; • bi , i ∈ I are generic; P • ci , i ∈ I are generic with the linear condition i∈I ci si = 0. Let us check it: ! ! ! m m X X X X X ai,k φk ) = ai,k φk + rk ) = ℓ bi ( ℓ bi xi = ℓ bi ( i∈I i∈I i∈I k=1 m X X =ℓ ( bi ai,k )φk k=1 i∈I ! = #{i ∈ k : k=1 X i∈I bi ai,k 6= 0}, 8 G. NENASHEV Similarly we have ℓ X i∈I ci xi ! = #{i ∈ k : X ci ai,k 6= 0}. i∈I P Since bi , i ∈ I and ci , i ∈ I are generic P with one condition P i∈I ci si = 0, we have the following property: if i∈I bi ai,k 6= 0 then i∈I ci ai,k = 0 if and only if (a1,k , . . . , an,k ) ≥ s. Hence, we can compute the multiplicity of any s.  Proof of Theorem 9. We know 1 ⇐⇒ 2 ⇐⇒ 3 =⇒ 4 by Theorem 8, where we also reconstructed a matrix, so we know the matroid. 3 ⇐= 4. Let A1 and A2 be two totally unimodular matrices which give the same regular matroid (we assume that the order of elements are the same). Also if M is a regular matroid, then all orientations of M differ only by reorientations (see Corollary 7.9.4 [7]). Hence, we can multiply some columns of A2 by −1 and get A′2 such that A1 and A′2 have the same oriented matroid. It is well-known that if we have a totally unimodular matrix Ai , then all minimal linear dependents of its columns have coefficients ±1. We get that matrices A1 and A′2 have linear dependents with the same  coefficients and, hence, A1 ∼z A′2 ∼z A2 . References [1] A. A. Akopyan, A. A. Saakyan, A system of differential equations that is related to the polynomial class of translates of a box spline, Mat. Zametki 44:6 (1988), pp. 705–724 [2] F. Ardila, A. Postnikov, Combinatorics and geometry of power ideals, Trans. of the AMS 362:8 (2010), pp 4357–4384. [3] V. I. Arnold, Remarks on eigenvalues and eigenvectors of Hermitian matrices, Berry phase, adiabatic connections and quantum Hall effect, Selecta Mathematica 1:1 (1995), 1–19 [4] A. Berget, Products of linear forms and Tutte polynomials, European J. Combin. 31 (2010), pp. 1924–1935. [5] A. Berget, Internal Zonotopal Algebras and the Monomial Reflection Groups, https://arxiv.org/abs/1611.06446 [6] O. Bernardi, Tutte polynomial, subgraphs, orientations and sandpile model: new connections via embeddings, Electronic J. Combinatorics 15:1 (2008). [7] A. Björner, M. Las Vergnas, B. Sturmfels, N. White, G. M. Ziegler, Oriented matroids, volume 46 of Encyclopedia of Mathematics and its Applications (1999). [8] W. Dahmen, A. Micchelli, On the local linear independence of translates of a box spline, Studia Math. 82:3 (1985), pp.243–263 [9] C. De Boor, A. Ron, On polynomial ideals of finite codimension with applications to box spline theory, J. Math. Anal. Appl. 158:1 (1991), pp. 168–193 [10] C. De Concini, C. Procesi, Topics in hyperplane arrangements, polytopes and box-splines, Universitext, Springer, New York, 2011. CLASSIFICATION OF EXTERNAL ZONOTOPAL ALGEBRAS 9 [11] N. Dyn, A. Ron, Local approximation by certain spaces of exponential polynomials, approximation order of exponential box splines, and related interpolation problems, Trans. Amer. Math. Soc. 319 (1990), no. 1, 381–403. [12] O. Holtz, A. Ron, Zonotopal algebra, Advances in Mathematics 227 (2011), pp 847–894. [13] O. Holtz, A. Ron, Z. Xu, Hierarchical zonotopal, spaces.Transactions of the American Mathematical Society 364.2 (2012): 745-766. [14] B. Huang, Monomization of Power Ideals and Generalized Parking Functions, https://math.mit.edu/research/highschool/primes/materials/2014/Huang.pdf [15] A. N. Kirillov, G. Nenashev, On Q-deformations of Postnikov-Shapiro algebras, Séminaire Lotharingien de Combinatoire, 78B.55, FPSAC (2017) 12 pp. [16] A. N. Kirillov, G. Nenashev, Unimodular zonotopal algebra, in preparation [17] D. J. Kleitman, K. J. Winston, Forests and score vectors, Combinatorica 1:1 (1981), pp 49–54. [18] M. Lenz, Zonotopal algebra and forward exchange matroids. Advances in Mathematics 294 (2016), 819–852. [19] M. Lenz, Lattice Points in Polytopes, Box Splines, and Todd Operators. International Mathematics Research Notices 2015:14 (2016), 5289–5310. [20] M. Lenz, Hierarchical Zonotopal Power Ideals, European Journal of Combinatorics 33 (2012), pp. 1120-1141. [21] L. Nan, A. Ron , External zonotopal algebra, Journal of Algebra and its Applications 13.02 (2014):1350097. [22] G. Nenashev, B. Shapiro, “K-theoretic” analog of Postnikov-Shapiro algebra distinguishes graphs, Journal of Combinatorial Theory, Series A, 148 (2017), pp. 316–332. [23] G. Nenashev, Postnikov-Shapiro algebras, graphical matroids and their generalizations, https://arxiv.org/abs/1509.08736 [24] J. G. Oxley, Matroid theory, Oxford University Press, USA, 2006. [25] P. D. Seymour, Decomposition of regular matroids, Journal of combinatorial theory, Series B, 28:3 (1980), pp.305–359. [26] A. Postnikov, B. Shapiro, Trees, parking functions, syzygies, and deformations of monomial ideals, Trans. Amer. Math. Soc. 356:8 (2004), pp 3109–3142. [27] A. Postnikov, B. Shapiro, M. Shapiro, Algebras of curvature forms on homogeneous manifolds, Differential topology, infinite-dimensional Lie algebras, and applications, Amer. Math. Soc. Transl. Ser. 2, 194 (1999), pp 227–235. [28] B. Shapiro, M. Shapiro, On the ring generated by Chern 2-forms on SLn /B, C. R. Acad. Sci. Paris. I Math. 326:1 (1998), pp 75–80. [29] J. J. Shan, A special case of Postnikov-Shapiro conjecture https://arxiv.org/abs/1307.5895 [30] B. Sturmfels, Z. Xu, Sagbi bases of Cox-Nagata rings, J. Eur. Math. Soc. 12 (2010), no. 2, 429–459 [31] H. Whitney, 2-isomorphic graphs, American Journal of Mathematics 55 (1933), pp. 245–254. Department of Mathematics, Stockholm University, S-10691, Stockholm, Sweden E-mail address: [email protected]
0math.AC
Soft Computing Techniques for Change Detection in remotely sensed images : A Review Ms Madhu Khurana1 and Dr Vikas Saxena2 1 Dept. Of Computer Science & Engineering, ABES Engineering College Ghaziabad-201009,India [email protected] 2 Department of CS & IT, Jaypee Institute of Information Technology, Noida – 201307, India [email protected] Abstract With the advent of remote sensing satellites, a huge repository of remotely sensed images is available. Change detection in remotely sensed images has been an active research area as it helps us understand the transitions that are taking place on the Earth’s surface . This paper discusses the methods and their classifications proposed by various researchers for change detection. Since use of soft computing based techniques are now very popular among research community, this paper also presents a classification based on learning techniques used in soft-computing methods for change detection. Keywords : change detection, COP-kmeans, constrained kmeans,k-means, fuzzy k-means, ISODATA, Semi supervised SVM, remote sensing, soft-computing, HMRF 1. Introduction In Remote Sensing, change detection means assessing or measuring the change on the Earth's surface by jointly processing multi-temporal images of the same geographical area acquired at different times. This field has attracted a lot of effort in research due to its applications in various areas as Land-use and land-cover (LULC), Forest or Vegetation change, Forest mortality, defoliation and damage assessment, Wetland change, Urban expansion, Damage assessment, Crop monitoring, Changes in glacier mass balance, Environmental change and Deforestation, regeneration & selective logging[1]. Change detection (CD) on earth's surface is an active research topic since it can help in monitoring and optimal planning of Earth's resources and also help to arrest undesired changes. Any change detection system should be able to (a) define the change area and change rate; (b) distribution of change areas; (c) change trajectories; and (d) the accuracy assessment of the change detection methods. [2] The result of any CD is affected by various factors s.a. spatial, spectral, thematic and temporal constraints; radiometric resolution, atmospheric conditions and soil moisture conditions. The methods being developed are usually application specific. Various techniques have been developed for CD using both pixel based as well as object based approaches. 2. Change Detection Process : An overview The change detection systems designed use the data generated by different satellites having different radiometric resolutions, spatial resolution & orbiting frequency. Most commonly SPOT (Systeme Pour l'Observation de la Terre(SPOT) satellite system), NOAA’s AVHRR (Advanced Very High Resolution Radiometer, http://www.noaa.gov/), MODIS (Moderate Resolution Imaging Spectroradiometer, http://modis.gsfc.nasa.gov/index.php), LANDSAT (http://landsat.gsfc.nasa.gov/?page_id=9) data is used. Also very high resolution data from optical satellites s.a QuickBird, IKONOS, EROS and GeoEye can also be used. For CD systems to give good results, the multitemporal images taken should be of the same spatial and radiometric resolution, and proper registration of the images should be done, so as to avoid false alarms. Also the images should have near anniversary acquisition dates, so as to overcome the problems of sun angle and phenological differences. As discussed by D. Lu et. al in [2], the process of change detection includes three major steps Step 1: Image preprocessing –Before applying any Change Detection algorithm on the multitemporal images, we need to carry radiometric corrections and image registration, so as to increase the accuracy of the CD. It may also include geometric rectification, atmospheric corrections and also topographic corrections, if the terrain contains mountains. Radiometric correction is done to reduce the inconsistency between the values surveyed by sensors arising due to different imaging seasons, different solar altitudes, different angles or different cloud or snow covers[11]. Also image registration of multi-temporal images is required so as to avoid false change detection for pixel-based CD methods. Image registration may not be necessary for feature-based CD methods where extracted features can be compared for change detection[11]. Jianya (2008) suggested that image registration and change detection should be integrated in a single algorithm. Step 2 : Change Detection Algorithm or technique : we choose a technique or algorithm to detect and analyze the change. Selecting an algorithm for change detection is a difficult task. Different algorithms can be studied and the algorithm best suited for the application area, can be selected, depending on the kind of results expected. If the application only requires whether a change has occurred or not, then some set of algorithms may be suited while if we also want to work on change area and the direction of change, another set may be suitable. The algorithm will also depend upon the radiometric and spatial resolutions of the images, some pixel based method may not be suited for VHR images[4]. The spatial resolution dictates the kind of study that can be performed on the RS data, if the resolution is coarse the change over a large area only can be done, if we wish to perform a sub-metric change detection, then the data available should support such resolutions. Step 3 : Accuracy Assessment : Accuracy assessment determines the quality of information retrieved from remotely sensed data. We can have a qualitative or a quantitative accuracy assessment. In qualitative assessment we assess the accuracy by looking at the map and comparing it with what we see on the ground while in case of quantitative assessment we try to identify and measure the remote sensing error by comparing it with the ground truth.[11] Designing a change detection system requires a deliberate effort to understand the kind of changes that need to be observed. Deciding on the period for which data is required (or temporal difference between the data images), spectral resolution and the nature of result expected will guide in data collection. If the changes to be observed cover a large geographical area (like land cover – land change), the images with less radiometric resolution will suffice, else in case we need to observe the changes in detail (sub-metric), high resolution images would be required. Images from different resolutions can also be combined in an application, using GIS software, here pre-processing would be required to bring the images at same resolution, followed by change detection. 3. Existing Classifications of CD Techniques In the past different classifications of the CD methods have been proposed. This section discusses some proposed classifications. A. Singh [3] in his paper on review of the digital change detection techniques in 1989 categorized the change detection research on the basis of (a) The data transformation used & (b) the analysis technique used to detect the change. He classified the research work done till that time into various categories. A brief overview of all the prevalent techniques s.a. image differencing, image rationing, image regression, vegetation index differencing , principal component analysis, post-classification comparison and Direct multidate classification, Change Vector Analysis (CVA) was offered. While evaluating these techniques on the basis of literature reviewed, it was concluded that different CD methods produced different change maps. It was observed that most of the results were not compared with the ground truth and thus the capability of these methods were poorly evaluated. The paper provided the best results for each technique of CD. The accuracy for these techniques was in the range of 51% to 74%. Jianya et. al[11] in 2008 proposed two broad groups for classifying the CD methods, namely, bi-temporal and temporal trajectory analysis. Bi-temporal methods measures the change between two date images while temporal trajectory analysis analyses the change based on continuous timescale measuring not only the change between two dates but also the progress of change over the period. Further he gave seven categories for CD methods, namely, direct comparison, classification, object-oriented method, model method, time-series analysis, visual analysis and hybrid method. M.Hussain et. al[4] in a recent paper(2013) have reviewed and categorized the change detection methods based on the unit of analysis, i.e. pixel based and object based approaches. In the pixel based methods the analysis is done on the basis of variation in pixel intensities while object based approaches, first extract objects from the image and then try to perform change detection based upon the objects extracted. The object based methods are more suitable for Very High Resolution (VHR) images. The subclasses with each category are defined and the CD methods are categorized based upon these classes. Figure 1 is the pictorial representation of the classification provided by the authors. Figure 1 : Classification of change detection methods(As in M.Hussain et. al (2013)) The advantages and disadvantages as well as examples where these method have been used, has been discussed by Hussain et.al(2013), the interested readers can refer it for more details. 4. Soft Computing Based Change Detection Methods Soft computing is a fusion of methodologies designed to model and enable solutions to real life problems, which are not modeled or too difficult to model mathematically. It has the capability to tolerate imprecision, uncertainty, approximate reasoning and partial truth. Soft computing is a collection of Evolutionary computing, neural networks(NN) (including neural computing), fuzzy systems (including fuzzy logic(FL)) , machine learning(ML), and probabilistic computing(PC). Evolutionary computing(EC) encompasses Genetic Algorithms, Evolutionary strategies & Evolutionary programming. Change detection methods using soft computing can be divide into various categories depending upon learning paradigm being used by the system, another distinction can be made on the techniques being used to model to find the solution. Soft computing techniques, NN, EC, ML, FL and PC are complementary to each other rather than competitive. Therefore a combination of these techniques is usually used to model a real life problem. Fuzzy logic plays a critical role as it provides the tolerance for imprecision and allows to take decision in a human like manner. Change detection(CD) in remote sensing requires large amount of data to be analyzed. Automatic and unsupervised CD techniques can reduce the time required for manual image analysis. Also it is difficult to gather the precise ground truth about the entire regions being covered by the RS images. The following section provides a classification of CD methods based on soft-computing techniques being used. 5 Classification based on Learning Paradigm 5.1 Unsupervised Change Detection Following pre-processing and calculation of the difference image, we need to classify the data in the difference image into change and no-change sets. Unsupervised CD techniques do not require training data. So the task is to discriminate the data into changed and unchanged sets. The problem reduces to clustering the data into two groups, changed and unchanged. We need to partition the data into disjoint groups where each group contains similar data. Unsupervised methods can be divided into contextinsensitive (based on spectral information) (A.Singh. 1989) and context sensitive(using spatial information)(Ghosh 20014). Histogram equalization is an example of context-insensitive method of classification which does not use neighborhood information(spatial relations). Markov Random Fields are used to overcome the problems of context-insensitive methods. [15] A number of clustering algorithms can be used[12] : Hard C- Means (HCM) or K-means : The set of patterns are to be divided into c clusters( or k clusters). We randomly chose c number of patterns as the initial cluster centers. Then the distance of each pattern from each cluster center is calculated and we assign the pattern to cluster having minimum distance. Once the assignment has been done for all the patterns in the dataset, we again calculate the new cluster centers by taking the mean of all the patterns in the cluster. Again the distance of each pattern is calculated from the cluster centers and the pattern reassigned to the nearest cluster centers. This process continues till the centers become fixed i.e. there is no change in the cluster centers over an iteration. The distance measure can be defined for a specific problem but usually the Euclidean distance is used. The clusters thus formed can be further analyzed for designating them as change or no-change clusters. ISODATA (Iterative Self Organizing Data Analysis Technique) : ISODATA is a method of unsupervised classification. Unlike k-means, no a-priori information about the number of clusters is required. It starts with some random no. of clusters and the clusters can be split or merged depending upon the parameters defined by the user. User gives the parameters to this algorithm as various threshold values. The program iterates until the threshold is reached. Some fast variations of the algorithm are defined, s.a., ISOCLUS by Memarsadeghi N. et. al (2007). Fuzzy C-Means (FCM) : The fuzzy C-Means is a classification technique, where each pattern can have membership in more than one cluster, the degree of membership varies in different clusters. The algorithm uses functional optimization, where it attempts to minimize the objective function defined as : where m > 1 is the fuzzifier, which controls the fuzziness of the algorithm. The higher the value of m, more fuzzy is the algorithm, mostly the values used are between 1.5 to 2.5. The algorithm outputs clusters with similar shapes, sizes and densities, which might not give good results in various situations.[13] [12][15] Gustafson-Kessel clustering (GKC) : GKC is also a fuzzy clustering technique. It is a modification of FCM, where FCM uses Euclidean distance to measure the distance between the cluster center and the patterns, GKC uses an adaptive distance norm. Gustafson and Kessel suggested an adaptive distance measure using fuzzy covariance matrix. GKC can be used to detect clusters with ellipsoidal cluster, by adapting the cluster shape automatically.[13] [12][15] 5.2 Semi-supervised Change Detection Unsupervised methods are best suited for change detection applications, since ground truth may not be available in many scenarios. Also labeling the complete training set may not be possible. In case, some data is available, where labels are provided, the advantages of both supervised and unsupervised learning can be utilized. A few labeled training patterns can be used along with unlabeled patterns for learning. Semi supervised learning can improve the classification results, in case of nonavailability of the sufficient labeled data [13]. S.Basu[16] proposed that semi-supervised clustering can be improved by defining pairwise constraints i.e. pairs of instances labeled as belonging to same or different clusters. Thus supervision is added in the form of these constraints, which are used to either modify the objective function or the distance measure. Various semi-supervised algorithms have been explored for the classification of remotely sensed images. (iv) K-means based algorithms : As discussed earlier kmeans is a very popular algorithm used for clustering the data. A number of modifications have been proposed to the basic k-means algorithm to adapt it for semisupervised learning, i.e. incorporating some label data to help it learn in a better manner. This section discusses some such variations. (i) Seeded k-means : The initial cluster centers are randomly chosen in standard k-means algorithm, here the cluster centers are initialized by the mean of the seeds belonging to that cluster. The labeled data is only used to find the initial cluster centers. Once the cluster centers have been initialized, the algorithm follows the same steps as standard kmeans. The seeds are also reassigned to other clusters, if they are nearest to the cluster, thus restricting the impact of defining seeds only to the initialization step [15]. (ii) Constrained k-means : This is same as seeded kmeans, with the only difference being that the seeds are not reassigned to any other clusters, i.e., their membership is not re-calculated [15]. (iii) COP k-means : This is an extension of standard kmeans algorithm, defined by Wagstaff et. al (2001). It defines the labeled information in the form of ‘must-link’ and ‘cannot-link’ constraints. Both the constraints have to be satisfied for assigning a pattern to a cluster. The distance of the pattern from all the clusters is determined and arranged in the ascending order based on the distance of the pattern from the cluster. For assigning the pattern to a cluster, the cluster at the top of the list is considered first, if assigning the pattern to this cluster does not violate any constraints, then the pattern is assigned to this cluster otherwise the next cluster on the list is considered. Assigning a pattern to a cluster means that the patterns which were already assigned to this cluster do not have a ‘cannot-link’ constraint defined for the unlabelled pattern. Also it indicates that the patterns assigned to the different clusters do not have a ‘must-link’ constraint with the said pattern. In case any of the constraints are violated, the next cluster on the list is checked. The rest of the steps are similar to the standard k-means algorithm, apart from the assignment step. Semi-supervised HMRF k-means : Basu et. al [16] in 2004 proposed a k-means algorithm based on hidden Markov Random Field (HMRF). HMRF has two components : a) A hidden field ,L, whose variables are unobservable, i.e., unobservable cluster labels for the patterns b) An observable set, X, of random variable, i.e. the patterns The Maximum a-posteriori (MAP) configuration of HMRF model is same as maximizing the posteriori probability Pr(L|Ψ). The hidden random variables Ii are linked with neighborhood Ni. The must-link constraints M and cannot-link constraints C define the neighborhood over the hidden labels such that neighbors of a point xi are all the points which have must-link or cannot-link relations with the said data point. The random field defined over the hidden variables is a Markov Random Field. The HMRF K-means algorithm, takes as input the set of data points, must-link constraints M , cannotlink constraints C, the distance measure D, and constraint violation costs w and w` . It tries to minimize the objective function. The algorithm iteratively assigns the cluster-labels on the datapoints to minimize the objective function, recalculates the centroids based on assignments, recalculates the distance measure D. The process follows till convergence. The other details of the method can be found in the paper by Basu et. al [16]. (v) Semi-supervised kernel k-means : A weighted kernel-based approach for semi-supervised learning was proposed by Kulis et. al. The patterns are mapped to a higher dimensional space with the help of a non-linear kernel and a positive weight is associated with each pattern. The algorithm defined a ‘reward’ for obeying the constraint instead of a penalty for constraint violation. Whenever the patterns having an associated mustlink constraint are assigned the same cluster, the penalty is subtracted from the objective function, thus reducing the cost Semi-supervised Support Vector Machine (S3VM) : Standard Support Vector Machines can handle partially labeled datasets by assuming unlabeled datasets as additional optimization variables. Transductive SVM’s (TSVMs) were introduced by Vapnik and Sterin (1977) [17]. TSVM uses both labeled and unlabeled data to discriminate the boundary such that it does not pass through dense regions. Transductive learner is one which works on labeled and unlabeled data and cannot work on unforeseen data. While Vapnik et. al. named it as the transductive, it actually is an inductive learner as the resulting classifier works on the entire data space. Given a set of data, the SVMs classify it such that the hyperplane distinguishing the two classes has the maximum margin. The details of the S3VMs can be found in the paper by Vapnik et. al [17]. 5.3 Supervised Change Detection Supervised change detection methods require the presence of ground truth, i.e. labeling of training set into various so as to use this information for proper classification. Supervised methods are superior in the sense that they can recognize the kind of change. They are robust to the different atmospheric and light conditions at time of acquisition. Many methods discussed by A.Singh and Hussain et.al. in their classifications fall into this category. Post classification methods, direct multi-date classification and kernel based methods fall under this category[15]. A lot of work has been done in CD using these techniques. The interested readers can refer [3],[4],[6] for details of these techniques. 5.3 Active Learning Algorithms Active learning is to train the classifier on a small set of well-chosen examples. The Active learning algorithms are iterative in nature. At each iteration some labeled samples are provided to the model, the model adapts itself to samples provided and then it presents the user with a set of unlabeled samples and the user ranks them, the model is again adapted with the new set of samples provided. The model keeps on improving its adaptation to the classification problem. Active learning requires interaction between the user and the model. [18] The main focus in active learning is that the ranking of the unlabeled samples be such that it is able to discriminate between the two classes. The algorithms can be divided into three families : (i) Committee-based heuristics : This method quantifies the uncertainty of a pixel by considering a committee of learners[18]. Each member of the committee labels the pixels in the pool to be labeled by considering a different hypothesis about the classification problem. The algorithm then selects the samples showing maximum disagreement between the different classification models in the committee [18]. Query-by-boosting and query-by-bagging are the heuristics used to limit the search. In remote sensing Normalized Entropy Query-by-Bagging (nEQB) and Adaptive Maximum Disagreement (AMD) algorithms have been used for classification between different classes[18]. (ii) Large margin based heuristics : The algorithms in this category try to increase the margin between different classes. SVMs are used as the base methods for active learning. The distance to the hyperplane in SVM can be used as the distance measure in the active learning algorithm to decide the value of the decision function. Most popular and researched algorithm in remote sensing is Margin Sampling (MS), where in a multiclass one-against-all setting, the distance to each hyperplane is calculated and the samples are decided on the basis of heuristic calculated as selecting the minimum distance to any of the hyperplanes. The samples with minimum distance are the samples on the margin and are the ones which become the support vectors. Other algorithms using Multiclass Level Uncertainty (MCLU), Significance Space Construction(SSC) have been discussed in [18], which can be referred for details. It is important to have diversity among the samples used for classification, as it helps to better classify the samples. General diversity based algorithms have also been designed which try to constraint each iteration with diversity among the candidate samples[18]. (iii) Posterior probability-based heuristics : In this class of methods, posterior probabilities of class membership are used to rank the candidates. The posterior probability distribution is considered per class for each candidate or change in overall posterior probability. These probabilities are used to select the samples which might maximize the change in posterior probability. Heuristics like KL-Max or Breaking-Ties (BT) can be used [18]. 6. Classification based on Soft Computing Techniques 6.1 Neural Networks based approaches Neural networks model the way the training sets would be used to learn. Different types of neural networks are in use now a days. The multiple layers can be used for learning from complex data. Using neural networks for any application requires us to define the architecture of neural network, the activation functions for neurons and the learning algorithm. There are various architectures prominent now a days, for eg, Multi layer perceptron model, self organizing maps, competitive networks, Hopfield. Similarly various activation functions can be defined like sigmoidal, tangent hyperbolic, radial basis etc. The most important aspect of a neural network is the training algorithm that we select, back propagation algorithm, gradient descent has been extensively in NNs. The NNs are quite suitable for remote sensing images, since they have the capability of self-learning, which helps in the NN learning the classification on its own. Table 1 : Classification based on learning techniques Technique Sub-Category Advantages Disadvantages Examples Unsupervised Change Detection HCM -unsupervised learning - no labeled data is required, less cost -May be struck in local minima, if initial cluster centroids are such ISODATA - no apriori information about data is required - effective at identifying spectral clusters in data - Little user effort required FCM -able to label overlapping pixels into multiple classes, able to handle uncertainty, imprecision in classification - is distribution free GKC -uses adaptive distance norm to measure the distance between clusters -can extract clusters with different shapes - more effective results -uses background knowledge in the form of instance level constraints - time consuming if data is very unstructured -Algorithm can spiral out of control leaving only one class -Can also be struck in local minima -Extracts clusters of same size, densities and circular shape, fails to perform if the clusters have different shapes -Performance depends on proper selection of fuzzifiers. - the parameter ρi for defining the shape, should be selected properly. M.Roy(2013,2014) Wagstaff(2001), L Gomez(2003), Mishra et al(2012) A.Ghosh(2011) N. Memarsadeghi (2007) Bo Li.(2010) Semi-supervised Change Detection k-means based COP-k means Seeded kmeans Constraint kmeans Semisupervised HRMF kmeans Semisupervised kernel kmeans Semi supervised SVM (TSVM) Active Learning Methods Supervised Change Detection M.Roy(2013,2014) Mishra et al(2012) A.Ghosh(2011) Mishra et al(2012) A.Ghosh(2011) M.Roy(2013,2014) - a poor decision in the early stage of algorithm, may lead to non assignments of a data in any cluster. - execution time increase as the no. of constraints increase - the original labels are lost after reassignment Wagstaff(2001), M.Roy[2013) - it may be unable to assign a data point to any of the clusters, as that might violate the constraints M.Roy(2013,2014) Wagstaff(2001) Bennett et. al (2000) - Uses both constraints & an underlying distortion measure for clustering -can cluster input data only in the form of vectors Basu(2004), M.Roy(2013,2014) -discovers clusters with non-linear boundaries, after applying kernel function - can be used for both graph based & vector based input data -unlabeled data helps find a boundary between the classes which is away from dense regions -selection of kernel function for a problem domain Kullis (2005) -to find exact boundary is a NP hard problem - computationally expensive, difficult to work with large data sets Vapnik (1977) M.Chi(2007) -uses labeled patterns for initialization of cluster centers - rate of convergence is higher -the labeled patterns are not reassigned to any other cluster, leading to less time requirement M.Roy(2013,2014) Committeebased heuristics -these methods can be applied to any model or combination of models Tuia D (2011) Large margin based heuristics Posterior probabilitybased heuristics -diversity criteria improves the quality of results. Tuia D (2011) - If batch size is large, simple heuristics like BT should be used - Should be avoided if the initial training set is small. Refer [3], [4], [6] for details Tuia D (2011) The learning paradigm can be supervised, semisupervised or un-supervised. In [19] Hopfield type neural networks and self organizing maps have been successfully used for change detection. An overall energy function has been defined for the network and a change detection map is formed as a result. Eliptical Basis NN, MLP have been used in [13] and a multiple classifier system has been designed for classification. is repeated on all the parent pairs, thus creating a new population in the process. The above defined steps are repeated till some termination criteria is met. GA has been used along with fuzzy clustering in [12],[13]. Multiobjective cost function optimization is utilized in [26] for GA and the main advantage is it can also work without computing the difference image and can be used in different types of input satellite images. As per [26] the main drawback was the computational cost, it increase with the size of image. 6.2 Fuzzy Logic based approaches 6.4 Hybrid approaches The Change detection problem in remote sensing demands that the pixels be classified as change or nochange class, but there are pixels that overlap between these classes. Fuzzy logic helps us define the membership function for any pixel in different classes, thus it lets us handle the imprecision we have in assigning the pixel to a particular class. In [12], [13] fuzzy clustering has been used for classification using FCM and GKC and fuzzy k nearest neighbour as explained in the previous section. 6.3 Genetic Algorithms (GA) based methods Genetic algorithms belong to evolutionary computing paradigm. This technique is widely used in optimization problems, where we need to optimize some objective function, which is highly non-linear. Genetic algorithms overcome the problem of local maxima that we face using fuzzy clustering. It helps us to explore a large solution space, to find the optimal solution. The probable solutions to a problem are coded as chromosomes (representation of solution as strings). Mostly the chromosomes are coded as strings of 0’s and 1’s. The set of chromosomes is defined as population. A fitness function is associated with the chromosomes(solutions) and a fitness value is evaluated for each particular chromosome. Initially a random set of solutions is generated, and the fitness value for each of these solutions is calculated. Based on this fitness value, a set of two chromosomes is selected using some selection mechanism, known as parent chromosomes. Then two operations crossover and mutation are applied on these parents(solutions) to generate two offspring’s (Children). During crossover a crossover point is selected and the strings are exchanged between the parent strings at this point to create the new offspring’s with a probability defined as crossover probability. After crossover operation, mutation operation with some defined mutation probability is done on the produced offspring’s. During mutation, some of the bits are flipped in the produced offsprings to generate the new offspring’s. This operation As discussed earlier that the techniques NN, FL and GA are complimentary to each other, i.e., we can use a combination of these techniques to create solutions for any problem domain. Mostly NN is combined with FL, where FL is used to represent the data while NN is used for learning and inducting the results. In change detection a combination of these techniques have been used by many and they have been found to produce better results. In [12] A. Ghosh has combined FL with GA and Simulated Annealing (SA) and analyzed the results thus obtained. Fuzzy clustering has been found to be less costly & simple and perform better when compared to other context sensitive techniques. 7. Conclusion Change detection in remotely sensed images is an important aspect of the applications intended for observing the changes occurring due to natural or manmade processes and restraining the damages being caused by them to Earth’s Environment, and planning the utilization of Earths’ resources. This paper discussed the basic process of change detection along with the classifications proposed for these methods. The classification based on learning techniques used in softcomputing methods in Change detection has been proposed and discussed. References [1] Bruzzone, L., & Bovolo, F. (2013). A Novel Framework for the Design of Change-Detection Systems for Very-HighResolution Remote Sensing Images. Proceedings of IEEE. [2] Lu, D., Mausel, P., Brondizio, E., & Moran, E. (2004). Change detection techniques. International journal of remote sensing, 25(12), 2365-2401. [3] Singh, A. (1989). Review Article Digital change detection techniques using remotely-sensed data. International journal of remote sensing, 10(6), 989-1003. [4] Hussain, M., Chen, D., Cheng, A., Wei, H., & Stanley, D. (2013). Change detection from remotely sensed images: From pixel-based to object-based approaches. ISPRS Journal of Photogrammetry and Remote Sensing, 80, 91106. [5] Dianat, R., & Kasaei, S. (2010). Change detection in optical remote sensing images using difference-based methods and spatial information. Geoscience and Remote Sensing Letters, IEEE, 7(1), 215-219. [6] A. J. Radke, S. Andra, O. Al-Kofahi, and B. Roysam, Image change detection algorithms: A systematic survey, IEEE Trans. on Image Process., vol. 14, no. 3, pp. 294– 307, Mar. 2005. [7] P. R. Coppin, I. Jonckheere, and K. Nachaerts, Digital change detection in ecosystem monitoring: A review, Int. J. Remote Sens., vol. 25, no. 9, pp. 1565–1596, May 2004. [8] F. Bovolo, A multilevel parcel-based approach to change detection in very high resolution multitemporal images, IEEE Geosci. Remote Sens. Lett., vol. 6, no. 1, pp. 33–37, Jan. 2009. [9] R. A. Rensink, Change detection, Annu. Rev. Psychol., vol. 53, pp. 245–277, 2002. [10] S. Spotorno and S. Faure, Change detection in complex scenes: Hemispheric contribution and the role of perceptual and semantic factors, Perception, vol. 40, pp. 5–22,2011. [11] Jianyaa, G., Haiganga, S., Guoruia, M., Qimingb, Z., 2008. A Review of Multi-Temporal Remote Sensing Data Change Detection Algorithms, ISPRS Congress, Beijing, China, pp. 757–762. [12] A.Ghosh,N.S. Mishra, S.Ghosh, Fuzzy clustering algorithms for unsupervised change detection in remote sensing images, Information Sciences, pp. 699-715,2011 [13] M.Roy,S.Ghosh, A.Ghosh,A Novel approach for change detection of remotely sensed images using semi-supervised multiple classifier system, Information Sciences, pp 35-47, 2014. [14] Erkan, A.N.; Camps-Valls, G.; Altun, Y., "Semi-supervised remote sensing image classification via maximum entropy," Machine Learning for Signal Processing (MLSP), 2010 IEEE International Workshop on , vol., no., pp.313,318, Aug. 29 2010-Sept. 1 2010 doi: 10.1109/MLSP.2010.5589199 [15] M.Roy,S.Ghosh, A.Ghosh , Change detection in remotely sensed images using semi-supervised clustering algorithms, Int. J. Knowledge Engineering and Soft Data Paradigms, Vol. 4, No. 2, 2013 [16] Sugato Basu, Mikhail Bilenko, Raymond J. Mooney, A Probabilistic Framework for SemiSupervised Clustering, Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining(KDD-2004), pp. 59-68, Seattle, WA, August 2004. [17] Vladimir N. Vapnik and A. Sterin. On Structural Risk Minimization or Overall Risk in a Problem of Pattern Recognition. Automation and Remote Control, 10(3):14951503, 1977. [18] Tuia, D.; Volpi, M.; Copa, L.; Kanevski, M.; Munoz-Mari, J., "A Survey of Active Learning Algorithms for Supervised Remote Sensing Image Classification," Selected Topics in [19] [20] [21] [22] [23] [24] [25] [26] Signal Processing, IEEE Journal of , vol.5, no.3, pp.606,617, June 2011 S.Ghosh, S. Patra, A.Ghosh ,A Neural Approach to Unsupervised Change Detection of Remote-Sensing Images, Speech, Audio, Image and Biomedical Signal Processing using Neural Networks, Studies in Computational Intelligence Volume 83, 2008, pp 243-268 Wagstaff, K., Cardie, C., Rogers, S. and Schroedl, S. ‘Constrained K-Means clustering with background knowledge’, in C.E. Brodley and A.P. Danyluk (Eds.): Proceedings 18th International Conference on Machine Learning (ICML-2001), pp.577–584, Morgan Kaufmann, Williamstown, MA, USA. Kulis, B., Basu, S., Dhillon, I. and Mooney, R.J. ‘Semisupervised graph clustering: a kernel approach’, in Proceedings of the 22nd International Conference on Machine Learning, Germany, 2005. N. Memarsadeghi, D. M. Mount, N. S. Netanyahu, and J. L. Moigne, “A fast implementation of the isodata clustering algorithm,” International Journal of Computational Geometry & Applications, vol. 17,no. 1, pp. 71–103, 2007. Mingmin Chi; Bruzzone, L., "Semisupervised Classification of Hyperspectral Images by SVMs Optimized in the Primal," Geoscience and Remote Sensing, IEEE Transactions on , vol.45, no.6, pp.1870,1880, June 2007 Bo Li; Hui Zhao; Zhenhua Lv, "Parallel ISODATA Clustering of Remote Sensing Images Based on MapReduce," Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2010 International Conference on , vol., no., pp.380,383, 10-12 Oct. 2010 K.P. Bennett, P.S. Bradley, and A. Demiriz, Constrained K-Means Clustering, Microsoft Research, MSR-TR-200065, 2000 Çelık, Turgay; Yetgın, Zeki, Change detection without difference image computation based on multiobjective cost function optimization, Turkish Journal of Electrical Engineering & Computer Sciences; Vol. 19 Issue 6, p941, Nov 2011 Madhu Khurana has done B.Sc(Comp.Sc) from HansRaj College, Delhi University in 1990, M.Tech(I.T.) from GGSIPU, Delhi in 2009. Currently pursuing Ph.D from JIIT Noida, India. Worked in various companies from 1990 to 1993. Followed by working as a freelance consultant to various National Banks and Trading companies by providing services for system development and maintenance. Academic experience of 11 years, presently working in ABES Engineering College, Ghaziabad for last 7+ years. . Her research interest area is Digital Image Processing and Soft Computing. Vikas Saxena is Associate professor in Dept of CSE&IT at JIIT, Noida. He has more than 12 years of experience in academics. His research interest areas are--DIP, Computer vision and Watermarking. He has more than 40 research paper published in repute international jounals and conferences.
9cs.NE
BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS arXiv:1710.08668v1 [cs.LO] 24 Oct 2017 YOTAM M. Y. FELDMAN, ODED PADON, NEIL IMMERMAN, MOOLY SAGIV, AND SHARON SHOHAM Tel Aviv University, Tel Aviv, Israel e-mail address: [email protected] Tel Aviv University, Tel Aviv, Israel UMass, Amherst, USA Tel Aviv University, Tel Aviv, Israel Tel Aviv University, Tel Aviv, Israel Abstract. We consider the problem of checking whether a proposed invariant ϕ expressed in first-order logic with quantifier alternation is inductive, i.e. preserved by a piece of code. While the problem is undecidable, modern SMT solvers can sometimes solve it automatically. However, they employ powerful quantifier instantiation methods that may diverge, especially when ϕ is not preserved. A notable difficulty arises due to counterexamples of infinite size. This paper studies Bounded-Horizon instantiation, a natural method for guaranteeing the termination of SMT solvers. The method bounds the depth of terms used in the quantifier instantiation process. We show that this method is surprisingly powerful for checking quantified invariants in uninterpreted domains. Furthermore, by producing partial models it can help the user diagnose the case when ϕ is not inductive, especially when the underlying reason is the existence of infinite counterexamples. Our main technical result is that Bounded-Horizon is at least as powerful as instrumentation, which is a manual method to guarantee convergence of the solver by modifying the program so that it admits a purely universal invariant. We show that with a bound of 1 we can simulate a natural class of instrumentations, without the need to modify the code and in a fully automatic way. We also report on a prototype implementation on top of Z3, which we used to verify several examples by Bounded-Horizon of bound 1. Key words and phrases: Decidable Logic, Quantifier Instantiation, EPR, Inductive Invariants, Deductive Verification, Decision Procedures. ∗ A preliminary version of this paper appeared in [FPI+ 17]. LOGICAL METHODS IN COMPUTER SCIENCE © Y.M.Y. Feldman, O. Padon, N. Immerman, M. Sagiv, and S. Shoham Creative Commons DOI:10.2168/LMCS-??? 1 2 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM 1. Introduction This paper addresses a fundamental problem in automatic program verification: how to prove that a piece of code preserves a given invariant. In Floyd-Hoare style verification this means that we want to automatically prove the validity of the Hoare triple {P }C{P } where P is an assertion and C is a command. Often this is shown by proving the unsatisfiability of a formula of the form P (V ) ∧ δ(V, V 0 ) ∧ ¬P (V 0 ) (the verification condition) where P (V ) denotes the assertion P before the command, P (V 0 ) denotes the assertion P after the command, and δ(V, V 0 ) is a two-vocabulary formula expressing the meaning of the command C as a transition relation between pre- and post-states. When C is a loop body, such a P is an inductive invariant and can be used to prove safety properties of the loop (if it also holds initially and implies the desired property). For infinite-state programs, proving the validity of {P }C{P } is generally undecidable even when C does not include loops. Indeed, existing Satisfiability Modulo Theory (SMT) solvers can diverge even for simple assertions and simple commands. Recent attempts to apply program verification to prove the correctness of critical system’s design and code [HHK+ 15] identify this as the main hurdle for using program verification. The difficulty is rooted in powerful constructs used in the SMT-based verification of interesting programs. Prominent among these constructs are arithmetic and other program operations modelled using background theories, and logical quantifiers. In this paper we target the verification of applications in which the problem can be modelled without interpreted theories. This is in line with recent works that show that although reasoning about arithmetic is crucial for low-level code, in many cases the verification of high-level programs and designs can be performed by reasoning about quantification in uninterpreted theories. Specifically, the decidable Effectively Propositional logic (EPR) has been successfully applied to application domains such as linked-list manipulation [IBI+ 13], Software-Defined Networks [BBG+ 14] and some distributed protocols [PMP+ 16, PLSS17]. Without interpreted theories it remains to address the complications induced by the use of quantifiers, and specifically by the use of alternating universal (∀) and existential (∃) quantifiers. In the presence of quantifier alternation, the solver’s ability to check assertions is hindered by the following issues: (1) An infinite search space of proofs that must be explored for correct assertions. A standard form of proofs with quantified formulas is instantiation, in which the solver attempts to replace universal quantifiers by a set of ground terms. The problem of exploring the inifnite set of candidates for instantiation is sometimes manifested in matching loops [DNS05]. (2) A difficulty of finding counterexamples for invalid assertions, notably when counterexamples may be of infinite size. Current SMT techniques often fail to produce models of satisfiable quantified formulas [GM09, RTG+ 13]. This is somewhat unfortunate since one of the main values of program verification is the early detection of flaws in designs and programs. The possibility of infinite counterexamples is a major complication in this task, as they are especially difficult to find. In uninterpreted domains, infinite counterexamples usually do not indicate a real violation and are counterintuitive to programmers, yet render assertions invalid in the context of general first-order logic (on which SMT proof techniques are based). Hence infinite counter-models pose a real problem in the verification process. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 3 Previous works on EPR-based verification [IBI+ 13, BBG+ 14, PMP+ 16] used universally quantified invariants with programs expressed by ∃∗ ∀∗ formulas (EPR programs)1. In that setting, checking inductive invariants is decidable, hence problems (1) and (2) do not occur. In particular, EPR enjoys the finite-model property, and so counterexamples are of finite size. EPR programs are in fact Turing-complete [PMP+ 16], but universal invariants are not always sufficient to express the program properties required for verification. For example, [HHK+ 15] describes a client-server scenario with the invariant that “For every reply message sent by the server, there exists a corresponding request message sent by a client”. (See Example 3.6 for further details.) This invariant is ∀∗ ∃∗ and thus leads to verification conditions with quantifier alternation. This kind of quantifier alternation may lead to divergence of the solver as problems (1) and (2) re-emerge. This paper aims to expand the applicability of the EPR-based verification approach to invariants of more complex quantification. We focus on the class of ∀∗ ∃∗ invariants. ∀∗ ∃∗ invariants arise in interesting programs, but, as we show, checking inductiveness of invariants in this class is undecidable. We thus study problems (1),(2) above for this setting using the notion of bounded quantifier instantiation, a technique we term Bounded-Horizon. Main results. This paper explores the utility of limited quantifier instantiations for checking ∀∗ ∃∗ invariants, and for dealing with the problems that arise from quantifier alternation: divergence of the proof search and infinite counter-models. We consider instantiations that are bounded in the depth of terms. Bounded instantiations trivially prevent divergence while maintaining soundness. Although for a given bound the technique is not complete, i.e. unable to prove every correct invariant, we provide completeness guarantees by comparing bounded instantiations to the method of instrumentation, a powerful technique implicitly employed in previous works [IBI+ 13, KBI+ 17, PMP+ 16]. Instrumentation tackles a ∀∗ ∃∗ invariant by transforming the program in a way that allows the invariant to be expressed using just universal quantifiers, and, accordingly, makes the verification conditions fall in EPR. We show that for invariants that can be proven using a typical form of instrumentation, bounded instantiations of a small bound are also complete, meaning they are sufficiently powerful to prove the original program without modifications and in a fully automatic way. This is encouraging since instrumentation is labor-intensive and error-prone while bounded instantiations are completely automatic. This result suggests that in many cases correct ∀∗ ∃∗ invariants of EPR programs can be proven using a simple proof technique. Typically in such cases existing tools such as Z3 will also manage to automatically prove the verification conditions. However, bounded instantiations guarantee termination a-priori even when the invariant is not correct. In this case, when the bounded instantiation procedure terminates, it returns a logical structure which satisfies all the bounded instantiations. This structures is not necessarily a true counterexample but “approximates” one. Interestingly, this capability suggests a way to overcome the problem of infinite models. This problem arises when the user provides an invariant that is correct for finite models but is not correct in general first-order logic. In such cases, state-of-the-art SMT solvers typically produce “unknown” or timeout as they fail to find infinite models. The user is thus left with very little aid from the solver when attempting to make progress and successfully verify the program. In contrast, bounded quantifier instantiation can be used to find finite models with increasing sizes, potentially 1 ∃∗ ∀∗ transition relations can be extracted from code by existing tools for C code manipulating linked lists [IBI+ 13, IBR+ 14, KBI+ 17] and for the modeling language RML [PMP+ 16] which is Turing-complete. 4 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM indicating the existence of an infinite model, and provide hints as to the source of the error. This information allows the user to modify the program or the invariant to exclude the problematic models. We demonstrate this approach on a real example in which such a scenario occurred in one of our verification attempts. We show that the provided models assist in identifying and fixing the error, allowing the user to successfully verify the program. We also implemented a prototype tool that performs bounded instantiations of bound 1, and used it to verify several distributed protocols and heap-manipulating programs. The implementation efficiently reduces the problem of checking inductiveness with bound 1 to a Z3 satisfiability check on which the solver always terminates, thereby taking advantage of Z3’s instantiation techniques while guaranteeing termination. Outline. The rest of the paper is organized as follows: Section 2 provides some technical background and notations. In Section 3 we define the Bounded-Horizon algorithm and discuss its basic properties. Section 4 defines the concept of instrumentation as used in this work, and shows that Bounded-Horizon with a low bound is at least as powerful. Section 5 relates instrumentation to bounded instantiation in the converse direction, showing that other forms of instrumentation can simulate quantifier instantiation of arbitrarily high depth. In Section 6 we show how bounded instantiations can be used to tackle the problem of infinite counterexamples to induction when the verification conditions are not valid. Section 7 describes our implementation of Bounded-Horizon of bound 1, and provides initial evaluation of its ability to prove some examples correct by bound 1 instantiation. Section 8 discusses related work, and Section 9 concludes. The discussion of the undecidability of checking inductiveness of ∀∗ ∃∗ invariants is deferred to Appendix A. 2. Preliminaries In this section we provide background and explain our notation. Σ will always denote a relational first-order vocabulary, which may contain constant symbols, ci , and relation symbols, rj , but no function symbols. For a formula ϕ we denote by const[ϕ] the set of constants that appear in ϕ. We write that ϕ ∈ ∃∗ (Σ) to mean that ϕ is an existential formula defined over vocabulary Σ. Similarly, the class of universal formulas is denoted by ∀∗ (Σ). We say that ϕ is quantifier-free, denoted ϕ ∈ QF(Σ) if it contains no quantifiers, and that it is alternation free, denoted ϕ ∈ AF(Σ), if it can be written as a Boolean combination of formulas in ∃∗ (Σ). FOL(Σ) stands for arbitrary first-order formulas over Σ. A term or formula is ground if it does not contain free variables. A sentence is a ground formula. EPR. The effectively-propositional (EPR) fragment of first-order logic, also known as the Bernays-Schönfinkel-Ramsey class, consists of ∃∗ ∀∗ (Σ) sentences. Such sentences enjoy the small model property; in fact, a satisfiable EPR sentence has a model of size no larger than the number of its constants plus existential quantifiers. Thus satisfiability of EPR sentences is decidable [Ram30]. EPR Transition Relation. We specify a transition relation via an EPR sentence, δ, over a vocabulary Σ ] Σ0 where Σ is a relational vocabulary used to describe the source (or pre-) state of a transition and Σ0 = {a0 | a ∈ Σ} is used to describe the target (or post-) state. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 5 Inductive Invariants. A first-order sentence I over Σ is an inductive invariant for δ if I ∧ δ → I 0 is valid, or, equivalently, if I ∧ δ ∧ ¬I 0 is unsatisfiable2, where I 0 results from substituting every constant and relation symbol in I by its primed version (i.e. I 0 ∈ FOL(Σ0 )). Counterexample to Induction. Given a first-order sentence I over Σ and transition relation δ (over Σ ] Σ0 ), a counterexample to induction is a structure A (over Σ ] Σ0 ) s.t. A |= I ∧ δ ∧ ¬I 0 . Skolemization. Let ϕ(z1 , . . . , zn ) ∈ FOL(Σ). The Skolemization of ϕ, denoted ϕS , is a universal formula over Σ ] ΣS , where ΣS consists of fresh constant symbols and function symbols, obtained as follows. We first convert ϕ to negation normal form (NNF) using the standard rules. For every existential quantifier ∃y that appears under the scope of the universal quantifiers ∀x1 , . . . , ∀xm , we introduce a fresh function symbol fy ∈ ΣS of arity n + m. We replace each bound occurrence of y by fy (z1 , . . . , zn , x1 , . . . , xm ), and remove the existential quantifier. If n + m = 0 (i.e., ϕ has no free variables and ∃y does not appear in the scope of a universal quantifier) a fresh constant symbol is used to replace y. It is well known that ϕS → ϕ is valid and ϕS and that ϕ are equi-satisfiable. 3. Bounded-Horizon In this section, we define a systematic method of quantifier instantiation called BoundedHorizon as a way of checking the inductiveness of first-order logic formulas, and explore some of its basic properties. Undecidability. We first justify the use of sound but incomplete algorithms, such as the Bounded-Horizon algorithm, for the problem of checking inductiveness of ∀∗ ∃∗ formulas. For a universal formula I ∈ ∀∗ (Σ), the formula I ∧ δ ∧ ¬I 0 is in EPR (recall that δ is specified in EPR). Hence, checking inductiveness amounts to checking the unsatisfiability of an EPR formula, and is therefore decidable. The same holds for I ∈ AF (Σ). However, this is no longer true when quantifier alternation is introduced. In Appendix A we show that checking inductiveness of ∀∗ ∃∗ formulas is indeed undecidable, even when the transition relation is restricted to EPR (see Theorem A.3). Thus, an attempt to check inductiveness must sacrifice either soundness, completeness, or termination. Techniques based on quantifier instantiation usually prefer completeness over termination. In contrast, the Bounded-Horizon algorithm guarantees termination a-priori, possibly at the expense of completeness (but is surprisingly powerful nonetheless). We now move to define the Bounded-Horizon algorithm for and discuss its basic properties in checking inductiveness. Bounded-Horizon Instantiations. Let δ ∈ ∃∗ ∀∗ (Σ, Σ0 ) be an EPR transition relation and I ∈ FOL(Σ) a candidate invariant. We would like to check the satisfiability of I ∧ δ ∧ ¬I 0 , and equivalently of Ind = IS ∧ δS ∧ (¬I 0 )S . Recall that ϕS denotes the Skolemization of ϕ, and note that IS and (¬I 0 )S possibly add Skolem functions to the vocabulary. Roughly speaking, for a given k ∈ N, Bounded-Horizon instantiates the universal quantifiers in Ind, while restricting the instantiations to produce ground-terms of function nesting at most k. We then check if this (finite) set of instantiations is unsatisfiable; if it is already unsatisfiable then we have a proof that I is inductive. Otherwise we report that I is not known to be 2 In this paper, unless otherwise stated, satisfiability and validity refer to general models and are not restricted to finite models. Note that for EPR formulas, finite satisfiability and general satisfiability coincide. 6 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM inductive. The idea is to choose a (preferably small) number k and perform instantiations bounded by k instead of full-blown instantiation. As we will show, this algorithm is sound but not necessarily complete for a given k. Below we provide the formal definitions. We start with the notion of instantiations, and recall Herbrand’s theorem which establishes completeness of proof by unrestricted instantiations. Suppose that some vocabulary Σ̃ including constants and function symbols is understood (e.g., Σ̃ = Σ ] ΣS , where ΣS includes Skolem constants and function symbols). Definition 3.1 (Instantiation). Let ϕ(x) ∈ ∀∗ (Σ̃) be a universal formula with n free variables and m universal quantifiers. An instantiation of ϕ by a tuple t of n + m ground terms, denoted by ϕ[ t ], is obtained by substituting t for the free variables and the universally quantified variables, and then removing the universal quantifiers. Note that an instantiation is a quantifier-free sentence. ∗ Theorem 3.2 n (Herbrand’s Theorem). Let ϕ ∈ ∀ (Σ̃). Then o ϕ is satisfiable iff the (potentially infinite) set ϕ[ t ] | t is a tuple of ground terms over Σ̃ is satisfiable. We now turn to restrict the depth of terms used in instantiations. Definition 3.3 (Bounded-Depth Terms). For every k ∈ N, we define BHTk to be the set of ground terms over Σ̃ with function symbols nested to depth at most k. BHTk is defined by induction over k, as follows. Let C be the set of constants in Σ̃, F the set of functions, and for every f ∈ F let Arityf be the arity of f . Then BHT0 = C BHTk = BHTk−1 ∪ {f (t1 , . . . tm ) | f ∈ F, m = Arityf , t1 , . . . , tm ∈ BHTk−1 }. We will also write t ∈ BHTk for a tuple of terms t, to mean that every entry of t is in BHTk (the number of elements in t should be clear from the context). Note that the set of S ground terms is BHT∞ = k∈N BHTk . Definition 3.4 (Depth of Instantiation). Let ϕ ∈ ∀∗ (Σ̃) and t ∈ BHT∞ . The depth of instantiation, denoted depth(ϕ[ t ]), is the smallest k such that all ground terms that appear in ϕ[ t ] are included in BHTk . We are now ready to define the algorithm and discuss its basic soundness and completeness properties. Bounded-Horizon algorithm. Given a candidate invariant I ∈ FOL(Σ), a transition relation δ over Σ ] Σ0 , and k ∈ N, the Bounded-Horizon algorithm constructs the formula Ind = IS ∧ δS ∧ (¬I 0 )S , and checks if the set  (3.1) Ind[ t ] | t ∈ BHTk , depth(Ind[ t ]) ≤ k is unsatisfiable. If it is unsatisfiable, then I is provably inductive w.r.t. δ with BoundedHorizon of bound k. Otherwise we report that I is not known to be inductive. Note that the satisfiability check performed by Bounded-Horizon is decidable since the set of instantiations is finite, and each instantiation is a ground quantifier-free formula. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 7 Bounded-Horizon for ∀∗ ∃∗ Invariants. We illustrate the definition of Bounded-Horizon in the case that I ∈ ∀∗ ∃∗ (Σ). Let I = ∀x. ∃y. α(x, y) where α ∈ QF. Then IS = ∀x. α(x, f (x)) where f are new Skolem function symbols. δS introduces Skolem constants but no function symbols, and in this case so does (¬I 0 )S . The Bounded-Horizon check of bound k can be approximately3 understood as checking the (un)satisfiability of ^ ^ ^     IS [ t ] ∧ δS [ t ] ∧ ¬I 0 S [ t ] . (3.2) t∈BHTk−1 t∈BHTk t∈BHTk Lemma 3.5 (Soundness). For every k ∈ N, Bounded-Horizon with bound k is sound, i.e., if Bounded-Horizon of bound k reports that I ∈ FOL(Σ) is inductive w.r.t. δ, then I is indeed inductive. Proof. Assume that I is not inductive w.r.t. δ, so there is a structure A such that A |= IS ∧ δS ∧ (¬I 0 )S . In particular A |= Ind[ t ] for every t ∈ BHT∞ and in particular for every t ∈ BHTk such that depth(Ind[ t ]) ≤ k. Hence, Bounded-Horizon of bound k will not report that I is inductive. As the algorithm is sound for any k, the crucial question that remains is an appropriate choice of k. A small k is preferable for efficiency, but a larger k could allow for proving more invariants. In the following example, a bound of even 1 suffices for proving that the invariant is inductive. We then show that for every correct invariant there is a suitable bound k, but a single choice of k cannot prove all correct invariants. Later, in Section 4, we show that bound of 1 or 2 is surprisingly powerful nonetheless. Example 3.6. Figure 1 presents a simple model of the client-server scenario described in [HHK+ 15]. The program induces an EPR transition relation, and its invariant is provable by Bounded-Horizon of bound 1. We first explain this example while ignoring the annotations denoted by “/@”. The system state is modeled using three binary relations. The req relation stores pairs of users and requests, representing requests sent by users. The resp relation similarly stores pairs of users and replies, representing replies sent back from the server. The match relation maintains the correspondence between a request and its reply. The action new request models an event where a user u sends a new request to the server. The action respond models an event where the server responds to a pending request by sending a reply to the user. The request and response are related by the match relation. The action check is used to verify the safety property that every response sent by the server has a matching request, by aborting the system if this does not hold. A natural inductive invariant for this system is I = ∀u, p. resp(u, p) → ∃q. req(u, q) ∧ match(q, p). The invariant proves that the then branch in action check will never happen and thus the system will never abort. This invariant is preserved under execution of all actions, and this fact is provable by Bounded Horizon of bound 1. 3 Equation (3.2) is an under-approximation of the set of instantiations used for bound k; variables that do not appear in IS under a function symbol can be taken from BHTk in the conjunction without increasing the total depth of instantiation beyond k, and are therefore allowed in bounded instantiation of bound k. This approximation is illustrative nonetheless, and will be useful in the proofs in Section 4. 8 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM req := ∅; resp := ∅; match := ∅; action new request(u) { q := new request; req := req ∪ {(u, q)} /@ r := r ∪ {(u, y) | match(q, y)} } action respond(u, q) { assume req(u, q); p := new response; match := match ∪ {(q, p)}; /@ r := r ∪ {(x, p) | req(x, q)} resp := resp ∪ {(u, p)} } action check(u, p) { if resp(u, p) ∧ ∀q. req(u, q) → ¬match(q, p) /@ ,→ if resp(u, p) ∧ ¬r(u, p) then abort } Invariant I = ∀u, p. resp(u, p) → ∃q. req(u, q) ∧ match(q, p) /@ r(x, y) ≡ ∃z. req(x, z) ∧ match(z, y) /@ Invariant Ib = ∀u, p. resp(u, p) → r(u, p) Figure 1. Example demonstrating a ∀∗ ∃∗ invariant that is provable with bound 1. The reader should first ignore the instrumentation code denoted by /@ (see Example 4.1). This example models a simple client-server scenario, with the safety property that every response sent by the server was triggered by a request from a client. Verification of this example requires a ∀∗ ∃∗ invariant. This example is inspired by [HHK+ 15]. The complete program is provided in [add] (files client server ae.ivy, client server instr.ivy). Lemma 3.7 (Completeness for some k). For every I ∈ FOL(Σ) and δ such that I is inductive w.r.t. δ there exists a finite k ∈ N s.t. I is provably inductive w.r.t. δ with Bounded-Horizon of bound k. Proof. From Theorem 3.2 and compactness there is a finite unsatisfiable set S of instantiations. Take k to be the maximal depth of the instantiations in S. For example, if I ∈ ∀∗ then Bounded-Horizon of bound 0 is complete. However, as expected due to the undecidability of checking inductiveness (see Appendix A), BoundedHorizon is not complete for a given k for arbitrary invariants. Example 3.8. An example of a program and an inductive invariant for which a bound of 0 or 1 is insufficient appears in Figure 2. In this example the server operates as a middleman between clients and the database (DB), and is used to anonymize user requests before they reach the database. The server performs a translation p between clients’ identity and an anonymous unique id, sends a translated request to the DB, and forwards the DB’s response to the clients. The safety property is that every response sent by the server was triggered by a request from a client. The inductive invariant states, in addition to the safety property, that every server request to the DB was triggered by a client’s request from the server, and that every DB response was triggered by a server’s request. Proving that the invariant is inductive under the action server recv db response requires the prover to understand that for the response from the DB there is a matching request from the server to the DB, and that for this request to the DB there is a matching request from the client to the server. Every such translation requires another level of nesting in the instantiation. In this example, a bound of 2 manages to prove inductiveness. This example can be lifted to require an even larger depth of instantiation by adding more translation entities similar to the server, and describing the invariant in a similar, modular, way. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 9 req := ∅; resp := ∅; db req := ∅; db resp := ∅; t := ∅; action new request(u) { action server recv request(u, q) { q := new request; assume req(u, q); req := req ∪ {(u, q)} id := new DB request id; } t := t ∪ {(id , u)}; action db recv request(id , q) { db req := db req ∪ {(id , q)} assume db req(id , q); } p := DB response ensuring db(q, p); db resp := db resp ∪ {(id , p)} } action server recv db response(id , p) { action check(u, p) { assume db resp(id , p); assume resp(u, p); resp := resp ∪ {(x, p) | t(id , x)} if ∀q. req(u, q) → ¬db(q, p) } then abort } Invariant I = ∀u, p. resp(u, p) → ∃q. req(u, q) ∧ db(q, p) ∧ ∀id , q. db req(id , q) → ∃u. t(id , u) ∧ req(u, q) ∧ ∀id , p. db resp(id , p) → ∃q. db req(id , q) ∧ db(q, p) ∧ ∀id , u1 , u2 . t(id , u1 ) ∧ t(id , u2 ) → u1 = u2 Figure 2. Example demonstrating a ∀∗ ∃∗ invariant that is provable only with bound 2. The server anonymizes requests from clients to the database (DB) and forwards the answer to the client. The server performs a translation t between clients’ identity and an anonymous unique id. The safety property is that every response sent by the server to a client was triggered by a request from the client. The inductive invariant further states that every server request to the DB was triggered by a client’s request from the server, and that every DB response was triggered by a server’s request. The complete program corresponding to this Figure appears in [add] (file client server db ae.ivy). Small Bounded-Horizon for ∀∗ ∃∗ Invariants. Despite the incompleteness, we conjecture that a small depth of instantiations typically suffices to prove inductiveness. The intuition is that an EPR transition relation has a very limited “horizon” of the domain: it interacts only with a small fraction of the domain, namely elements pointed to by program variables (that correspond to logical constants in the vocabulary). When performing the Bounded-Horizon check with bound 1 on a ∀∗ ∃∗ invariant I = ∀x. ∃y. α(x, y), we essentially assume that the existential part of the invariant ψ(x) = ∃y. α(x, y) holds on all program variables — but not necessarily on all elements of the domain — and try to prove that it holds on all elements of the domain after the transition. We expect that for most elements of the domain, the correctness of ψ is maintained simply because they were not modified at all by the transition. For elements that are modified by the transition, we expect the correctness after modification to result from the fact that ψ holds for the elements of the domain that are directly involved in the transition. If this is indeed the reason that ψ is maintained, a bound of 1 sufficiently utilizes ψ in the pre-state to prove the invariant in the post-state, i.e. to prove that it is inductive. 10 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM This is the case in Example 3.6. Additional examples are listed in Section 7. The example of Figure 2 itself also admits a different invariant that is provable by bound 1. Section 4 further studies the power of Bounded-Horizon with a low bound. 4. Power of Bounded-Horizon for Proving Inductiveness We now turn to investigate the ability of Bounded-Horizon to verify inductiveness. In this section we provide sufficient conditions for its success by relating it to the notion of instrumentation (which we explain below). We show that Bounded-Horizon with a low bound of 1 or 2 is as powerful as a natural class of sound program instrumentations, those that do not add existential quantifiers. Section 7 demonstrates the method’s power on several interesting programs that we verified using Bounded-Horizon of bound 1. 4.1. Instrumentation. We present our view of the instrumentation procedure used in previous works [IBI+ 13, KBI+ 17, PMP+ 16] to eliminate the need for quantifier-alternation, thus reducing the verification task to a decidable fragment. The procedure begins with a program that induces a transition relation δ ∈ ∃∗ ∀∗ (Σ ∪ Σ0 ). The purpose of instrumentation is to modify δ into another transition relation δb that admits an inductive invariant with simpler quantification (e.g., universal, in which case it is decidable to check). We note that instrumentation is generally a manual procedure. For simplicity, we describe the instrumentation process informally, but provide the semantic soundness requirement in Definition 4.2. The instrumentation process is thoroughly described in a recent work [PLSS17]. The instrumentation procedure consists of the following three steps: (1) Identify a formula ψ(x) ∈ FOL(Σ) (usually ψ will be existential) that captures information that is needed in the inductive invariant. Extend the vocabulary with an instrumentation relation r(x) that intentionally should capture the derived relation b = Σ ∪ {r} denote the extended vocabulary4. defined by ψ(x). Let Σ (2) Add update code that updates r when the original (“core”) relations are modified, and maintains the meaning of r as encoding ψ. The update code must not block executions of real code, and can possibly be a sound approximation. Sometimes it can be generated automatically via finite differencing [RSL10]. (3) Modify the program to use r. Often this is performed by rewriting some program conditions, keeping in mind that r encodes ψ. This means replacing some quantified expressions by uses of r. Example 4.1. In the example of Figure 1, to achieve a universal invariant we add an instrumentation relation r defined by r(x, y) ≡ ∃z. req(x, z) ∧ match(z, y) (step 1). The simple form of ψ allows us to obtain precise update code, which appears as annotations marked with /@ in lines that mutate req and match (step 2). We also replace the if condition in the action check by an equivalent condition that uses r (step 3). The line marked with /@ ,→ in the check action replaces the line above it. The resulting program has the invariant Ib = ∀u, p. resp(u, p) → r(u, p), which is universal. 4It is also possible to instrument the program with constants rather than relations. This can be emulated by adding a unary relation c(x) representing the constant, and adding the assumption that c contains exactly one element to the invariant. This form is in line with the conditions of Theorem 4.12. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 11 b ∪Σ b 0 ) denote the transition relation induced by the modified program Let δb ∈ ∃∗ ∀∗ (Σ (modifications occur in steps 2,3). The soundness of the instrumentation procedure is b formalized in the following connection between ψ, δ, and δ: b ∪Σ b 0 ) is a sound instrumentation for Definition 4.2 (Sound Instrumentation). δb ∈ ∃∗ ∀∗ (Σ ∗ ∗ 0 δ ∈ ∃ ∀ (Σ ∪ Σ ) and ψ ∈ FOL(Σ) if b δ → δ[ψ/r, ψ 0 /r0 ] is valid. Definition 4.2 ensures that the instrumented program includes at least all the behaviors of the original program, when r is interpreted according to ψ. Thus, if the instrumented program is safe, then it is sound to infer that the original program is safe. The instrumentation procedure does not require the user to know an inductive invariant for the original program. However, if a sound instrumentation which leads to an invariant exists, then an inductive invariant for the original δ can be produced by substituting back the “meaning” of r as ψ (thus, safety of the original program is implied): b be an inductive Lemma 4.3. Let δb be a sound instrumentation for δ and ψ, and Ib ∈ FOL(Σ) b b invariant for δ. Then I = I[ψ/r] is inductive w.r.t. δ. Proof. Ib ∧ δb → Ib0 is valid, thus, so is (Ib ∧ δb → Ib0 )[ψ/r, ψ 0 /r0 ]. δb is a sound instrumentation for δ, so (using Definition 4.2) I ∧ δ → I 0 is valid. b Note that typically the quantification structure of I is more complex than that of I. b Remark 4.4. In the expression δ[ψ/r, ψ 0 /r0 ] the update code of r in δb becomes a constraint over the core relations in Σ. In a sound instrumentation this constraint is required to follow from the way the core relations are updated by δ, essentially meaning that r is updated in a way that is consistent with its interpretation as ψ. Instrumentation without additional existential quantifiers. In order to relate instrumentation to Bounded-Horizon instantiations, we consider the typical case where the b This happens instrumentation process of δ does not add new existential quantifiers to δ. when the update code does not introduce additional existential quantifiers. Formally: b Σ b 0 ). Definition 4.5 (Existential Naming). Let δb = ∃z1 , . . . zm . ϕ(z1 , . . . , zm ) where ϕ ∈ ∀∗ (Σ, b b An existential naming η for (δ, δ) is a mapping η : {z1 , . . . , zm } → const[δS ] ∪ const[δS ]. We b to be ϕ[η(z1 )/z1 , . . . , η(zm )/zm ]. define η(δ) An existential naming provides a Skolemization procedure which uses existing constants rather than fresh ones. If such η exists, it maps the (Skolemized) existential quantifiers in δb to their counterparts in δ. For example, the instrumentation in Figure 1 results in δb that has an existential naming w.r.t. the original δ. Note that it is possible that δb has in fact fewer existential quantifiers than δ, for example due to the rewriting of conditions (as happens in the example of Figure 1 — see the if statement in action check). An instrumentation without additional existentials is an instrumentation from δ to b the δb whose soundness can be shown while respecting an existential naming from δ to δ; existential naming matches the existential quantifiers of δ with the vocabulary of δb in a sound way: 12 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM Definition 4.6 (Instrumentation Without Additional Existenials). δb is a sound instrumentation without additional existentials for δ if there exists an existential naming η such that b δS → η(δ)[ψ/r, ψ 0 /r0 ] is valid. 4.2. From Instrumentation to Bounded-Horizon. The results described in this section show that if there is an instrumentation without additional existentials, then BoundedHorizon with a low bound is able to prove the original invariant, without specific knowledge of the instrumentation and without manual assistance from the programmer. This is the case in the example of Figure 1, which admits an instrumentation that transforms the invariant to a universal invariant (see Example 4.1) in a form that matches Theorem 4.9, and indeed the original invariant is provable by Bounded-Horizon of bound 1. Interestingly, in case Bounded-Horizon with a small bound does not prove inductiveness the results imply that either the invariant is not inductive or no instrumentation that does not add existential quantifiers can be used to show that it is inductive (even with the programmer’s manual assistance). This is the case in the example of Figure 2, where a bound of 1 does not suffice.5 While we show that instrumentation that does not add existentials is at most as powerful as Bounded-Horizon with a low bound, sound instrumentations that do add existentials to the program (thereby not satisfying Definition 4.6) can be used to simulate quantifier instantiation of an arbitrary depth. This topic is explored in Section 5. In the remainder of this section we will assume that δb is a sound instrumentation without additional existentials for δ, and η is the corresponding naming of existentials. Further, we b assume that Ib is an inductive invariant for δb and denote I = I[ψ/r]. Results. We now state the results whose proofs are presented in the rest of this section. Theorem 4.9 and Theorem 4.10 consider I ∈ ∀∗ ∃∗ that is transformed to Ib ∈ ∀∗ . In Theorem 4.9 we show that a bound of 1 suffices to prove that I is inductive for δ when ψ ∈ ∃∗ (that is, the instrumentation defining formula is existential) and the instrumentation b or when ψ ∈ ∀∗ and r appears only negatively in I. b relation r appears only positively in I, This is an attempt to explain the success of bound 1 instantiations in proving our examples (see Section 7). In Theorem 4.10 we show that a bound of 2 suffices in the more general b setting of ψ ∈ AF (with no restriction on appearances of r in I). Theorem 4.12 considers a generalization to I that is 1-alternation and transformed to Ib ∈ AF. We show that a bound of 2 suffices in this case. 5Strictly speaking this shows that there is no such instrumentation where the instrumentation relation appears only positively in the invariant, which is the most common case. Examples that require an even larger bound (sketched above) do not admit any instrumentation without additional existential quantifiers that transforms the invariant to a universal form. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 13 Proof idea. The rest of the section is devoted to proofs of the these claims. The intuition behind the proofs is that the instrumented invariant is universal, so the fact that it is inductive can be shown by instantiating the universal quantifiers with the constants. Relating between the instrumented and original program, this constitutes a proof that the instrumented invariant is inductive (for the original program), where the proof is by instantiating the universal quantifiers with the constants, essentially by the same set of instantiations. With the existential quantifiers present in the program without instrumentation, this implies a proof by bounded instantiations. The formal proofs handle the fine details of which quantifiers are instantiated, and with what constants, to establish the results. To highlight the main points in the formal proof, the crux of the argument is as follows: Assume for the sake of contradiction that I cannot be shown to be inductive for δ by BoundedHorizon of a low bound, and take a counterexample to induction of the instantiated I (see Equation (4.2) in the proof of Lemma 4.8). By the assumption that δb is an instrumentation without additional existentials for δ, we can utilize properties of substitution to obtain a counterexample to induction for the instantiated Ib w.r.t. δb (see Equation (4.5)). By the assumption that Ib ∈ ∀∗ and δb ∈ ∃∗ ∀∗ , we use complete instantiation to argue that we have obtained a true counterexample to induction of Ib w.r.t. δb (see Equation (4.9)), in contradiction to the premise. Remark 4.7. The results of this section also apply when multiple instrumentation relations ψ1 , . . . , ψt ∈ FOL(Σ) are simultaneously substituted instead of the relation symbols r1 , . . . , rt b in δb and I. 4.3. Power for ∀∗ ∃∗ Invariants. We now establish that low bounds are sufficient for the Bounded-Horizon check, assuming that a sound instrumentation without additional b and I ∈ ∀∗ ∃∗ . To do so, we first prove the existentials exists, in the case of Ib ∈ ∀∗ (Σ) following lemma. Lemma 4.8. Let δb be a sound instrumentation of δ without new existentials and with b and let α = α naming η. Write Ib = ∀x. α b(x) where α b ∈ QF(Σ) b[ψ/r]. Then, ^  0 α(c) ∧ δS ∧ (¬I )S (4.1) c∈C n is unsatisfiable, where C = const[δS ∧ (¬I 0 )S ] and n is the number of universal quantifiers in b I. Proof. Assume not, i.e., there exists a structure A0 such that, ^  A0 |= α(c) ∧ δS ∧ (¬I 0 )S . (4.2) c∈C n b Let C b ∧ (¬Ib0 ) ]. Then, b = const[η(δ) We will show that Ib is not inductive for δ. S ^  0 A1 |= α(c) ∧ δS ∧ (¬I )S (4.3) b n c∈(C∪C) b \ C as some arbitrary where A1 is the same as A0 but also interprets any constant in C constant in C. Thus α(c) holds for the new constants as well. 14 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM Removing some conjuncts from Equation (4.3), we get, ^  A1 |= α(c) ∧ δS ∧ (¬I 0 )S . (4.4) bn c∈C By assumption (Definition 4.6), it follows that, ^  b A1 |= α(c) ∧ η(δ)[ψ/r, ψ 0 /r0 ] ∧ (¬I 0 )S . (4.5) bn c∈C Recall that I 0 = Ib0 [ψ 0 /r0 ]. Since A1 |= (¬Ib0 [ψ 0 /r0 ])S , it follows that A1 |= (¬Ib0 )S [ψ 0 /r0 ]. In the latter formula, some existentially quantified variables from ψ or ¬ψ may remain, whereas in the former formula they were replaced by Skolem constants. Thus this is just a corollary of the fact that γS → γ is valid for any γ. Thus we have shown,   ^  b ∧ (¬Ib0 ) [ψ/r, ψ 0 /r0 ]. (4.6) A1 |= α b(c) ∧ η(δ) S bn c∈C Now, consider the structure Ab that expands A1 by interpreting r and r0 the way that A1 interprets ψ and ψ 0 , respectively. Then, ^  b ∧ (¬Ib0 ) . α b(c) ∧ η(δ) (4.7) Ab |= S bn c∈C Since the formula in Equation (4.7) is universal, it is also satisfied by Ab|Cb , the substructure b Ab, i.e., A’s b interpretation of the constant symbols C b (recall that of Ab with universe C 0 b b b C = const[η(δ) ∧ (¬I )S ]). Thus,  b ∧ (¬Ib0 ) . Ab|Cb |= ∀x. α b(x) ∧ η(δ) (4.8) S b → δb (for the same reasons), we know, Finally, since γS → γ is valid and so is η(δ) Ab|Cb |= Ib ∧ δb ∧ ¬Ib0 . (4.9) b But this contradicts the fact that Ib is inductive for δ. The following results are corollaries of Lemma 4.8. b or ψ ∈ ∀∗ Theorem 4.9. Let Ib ∈ ∀∗ . Assume ψ ∈ ∃∗ and r appears only positively in I, b Then I = I[ψ/r] b and r appears only negatively in I. is inductive for δ with Bounded-Horizon ∗ ∗ of bound 1. (Note that I ∈ ∀ ∃ .) Proof. Let Ib = ∀x. α b(x) where α b ∈ QF. In both cases of the claim α = α b[ψ/r] ∈ ∃∗ , and so b This implies that the satisfiability check of all the universal quantifiers in I are those of I. Lemma 4.8 is simply the Bounded-Horizon satisfiability check with bound 1, and it shows that the result must be unsatisfiable. More formally, assume for the sake of contradiction that I is not inductive w.r.t. δ with Bounded-Horizon of bound 1. Let α(x) = ∃y1 , . . . , ym . θ(x, y1 , . . . , ym ) where θ ∈ QF, and let αS (x) = θ(x, f1 (x), . . . , fm (x)) BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 15 be its Skolemization with fresh Skolem function symbols f1 , . . . , fm (introduced for y1 , . . . , ym , respectively). Then there is a structure A satisfying ^ ^ ^     αS [ t ] ∧ δS [ t ] ∧ ¬I 0 S [ t ] . (4.10) t∈BHT0 t∈BHT1 t∈BHT1 Since αS has no universal quantifiers, the instantiation is just a substitution of the free variables, and A satisfies ^ ^ ^     αS (t) ∧ δS [ t ] ∧ ¬I 0 S [ t ] . (4.11) t∈BHT0 t∈BHT1 t∈BHT1 By reducing A to the elements pointed to by BHT1 terms we have that ^   A|BHT1 |= αS (t) ∧ δS ∧ ¬I 0 S (4.12) t∈BHT0 Note that in A|BHT1 the interpretations of the Skolem functions are possibly partial functions. The functions appear in the formula of Equation (4.12) only grounded, and applied on BHT0 , and these cases the interpretations of the functions are defined. (In particular, they can be extended to total functions in an arbitrary way, and the resulting structure still satisfies Equation (4.12).) We now move from the Skolem functions back to existential quantifiers. By the valuation that to every existentially quantified variable yi in α assigns the interpretation of fi (t) in A|BHT1 (recall that fi (t) appears in αS instead of the quantifier ∃yi in α), we know that ^   A|BHT1 |= (4.13) α(t) ∧ δS ∧ ¬I 0 S . t∈BHT0 Recall that BHT0 = const[δS ∧ ¬I 0 A|BHT1 |=  S ]. Therefore, Equation (4.13) can be rewritten as ^   α(c) ∧ δS ∧ ¬I 0 S (4.14) c∈C n  0 b where C n = const[δS ∧ ¬I S ]n and is the number of universal quantifiers in I (and I). b and By Lemma 4.8 this is a contradiction to the assumption that Ib is inductive w.r.t. δ, the claim follows. b Theorem 4.10. Let Ib ∈ ∀∗ . If ψ ∈ AF then I = I[ψ/r] is inductive for δ with Bounded∗ ∗ Horizon of bound 2. (Note that I ∈ ∀ ∃ .) Proof. As before, Let Ib = ∀x. α b(x) where α b ∈ QF. ψ ∈ AF implies that α = α b[ψ/r] ∈ AF . Let  α(x) = ∀v1 θ1,1 (x, v1 ) ∨ ∃z1 θ1,2 (x, z1 ) ∧ . . .  (4.15) ∧ ∀vr θr,1 (x, vr ) ∨ ∃zr θr,2 (x, zr ) where θ1,1 , θ1,2 , . . . , θr,1 , θr,2 ∈ QF. Assume for the sake of contradiction that I is not inductive w.r.t. δ with Bounded-Horizon of bound 2. For brevity denote ^ ^    ξ(k) = δS [ t ] ∧ ¬I 0 S [ t ] t∈BHTk t∈BHTk 16 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM and let gi (x) denote the fresh Skolem function introduced for zi in αS . By the assumption that inductiveness is not provable using Bounded-Horizon of bound 2, ^  αS [ t ] ∧ ξ(2) (4.16) t∈BHT1 is satisfiable by a structure A. In particular ^  θ1,1 (c, d1 ) ∨ θ1,2 (c, g1 (c)) ∧  . . . ∧ θr,1 (c, dr ) ∨ θr,2 (c, gr (c)) ∧ ξ(1) (4.17) is satisfied by A, where the conjunction is over c ∈ BHT0 and d1 , . . . , dr ∈ BHT1 (with the relevant arity). Note that the difference from Equation (4.16) is that there are fewer conjuncts here, because the full Bounded-Horizon check with bound 2 has conjuncts for each c ∈ BHT1 and not just BHT0 , and we have ξ(1) instead of ξ(2). Reduce A to the elements pointed by BHT1 terms, let A↓ = A|BHT1 . Now, ^   ∀v1 θ1,1 (c, v1 ) ∨ ∃z1 θ1,2 (c, z1 ) ∧ . . . c∈BHT0 (4.18)  ∧ ∀vr θr,1 (c, vr ) ∨ ∃zr θr,2 (c, zr ) ∧ ξ(1) is satisfied by A↓ . This is because: • The universal quantifiers are semantically equivalent to a conjunction over all BHT1 elements because the domain was reduced, and • The existential quantifiers are justified by the following valuation: the valuation assigns every zi the interpretation of gi (c). With this valuation the conjunctions of formula 4.18 are all guaranteed by the conjunctions in formula 4.17. Now formula 4.18 exactly means that ^  A↓ |= α(c) ∧ ξ(1). (4.19) c∈BHT0 As in the proof of Theorem 4.9, using Lemma 4.8, this is a contradiction to the assumption b and the claim follows. that Ib is inductive w.r.t. δ, 4.4. Generalization to 1-Alternation Invariants. We now generalize the results of Section 4.3 to 1-alternation invariants. A formula is 1-alternation if it can be written as b and I = I[ψ/r] b a Boolean combination of ∀∗ ∃∗ formulas. In the sequel, Ib ∈ AF(Σ) ∈ 1-alternation(Σ). b be an inductive invariant for δb ∈ ∃∗ ∀∗ (Σ). b Lemma 4.11. Let ψ ∈ FOL(Σ). Let Ib ∈ AF(Σ) b = ∀x. α b Let α1 = α Write IbS = ∀x. α c1 (x) and (¬I) c2 (x), where α c1 , α c2 ∈ QF(Σ). c1 [ψ/r] and S BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 17 b Σ b 0 ) be a sound instrumentation of δ α2 = α c2 [ψ/r]. Let δ ∈ ∃∗ ∀∗ (Σ) and let δb ∈ ∃∗ ∀∗ (Σ, without new existentials and with naming η. Then, ^ ^   α1 (c1 ) ∧ δS ∧ α2 (c2 ) (4.20) c1 ∈C n c2 ∈C m is unsatisfiable, where C = const[IbS ∧ δS ∧ (¬I 0 )S ], n is the number of universal quantifiers b . in IbS and m is the number of universal quantifiers in (¬I) S Proof. The proof is similar to that of Lemma 4.8, with the transformations applied to the conjunction are performed both on the invariant in the pre-state and in the post-state. Assume not, i.e., there exists a structure A0 such that, ^ ^   A0 |= α1 (c1 ) ∧ δS ∧ α2 (c2 ) . (4.21) c1 ∈C n c2 ∈C m b Let C b ∧ (¬Ib0 ) ]. Then, b = const[IbS ∧ η(δ) We will show that Ib is not inductive for δ. S ^ ^   A1 |= (4.22) α1 (c1 ) ∧ δS ∧ α2 (c2 ) . bn c1 ∈C bm c2 ∈ C b \ C as some arbitrary where A1 is the same as A0 but also interprets any constant in C constant in C. By the assumption (Definition 4.6), it follows that, ^ ^   b A1 |= α1 (c1 ) ∧ η(δ)[ψ/r, ψ 0 /r0 ] ∧ α2 (c2 ) . (4.23) bn c1 ∈ C Thus we have shown,  ^  b ∧ α c1 (c1 ) ∧ η(δ) A1 |= bn c1 ∈C bm c2 ∈C  α c2 (c2 ) [ψ/r, ψ 0 /r0 ]. ^ (4.24) bm c2 ∈C Now, consider the structure Ab that expands A1 by interpreting r and r0 the way that A1 interprets ψ and ψ 0 , respectively. Then, ^ ^   b ∧ Ab |= α c1 (c1 ) ∧ η(δ) α c2 (c2 ) (4.25) bn c1 ∈ C bm c2 ∈ C Since the formula in Equation (4.25) is universal, it is also satisfied by Ab|Cb , the subb Ab, i.e., A’s b interpretation of the constant symbols C. b Thus, structure of Ab with universe C   b ∧ ∀x. α Ab|Cb |= ∀x. α c1 (x) ∧ η(δ) c2 (x) . (4.26) b ∧ (¬Ib0 ) ]. b was defined as C b = const[Ib ∧ η(δ) Recall that C S b → δb is valid, we know, Finally, since γS → γ is valid and for the same reasons η(δ) Ab|Cb |= Ib ∧ δb ∧ ¬Ib0 . (4.27) b But this contradicts the fact that Ib is inductive for δ. 18 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM The following result is a corollary of Lemma 4.11. b Theorem 4.12. Let Ib ∈ AF. If ψ ∈ AF then I = I[ψ/r] is inductive for δ with BoundedHorizon of bound 2. (Note that I ∈ 1-alternation.) c1 [ψ/r] ∈ AF and α2 (x) = α c2 [ψ/r] ∈ AF (recall that Proof. ψ ∈ AF implies that α1 (x) = α α c1 , α c2 ∈ QF). By the assumption that inductiveness is not provable using Bounded-Horizon of bound 2, ^ ^ ^    (α1 )S [ t ] ∧ δS [ t ] ∧ (α2 )S [ t ] (4.28) t∈BHT1 t∈BHT2 t∈BHT1 is satisfiable, where (α1 )S , (α2 )S introduce Skolem functions. Let A be such a satisfying structure, and A↓ = A|BHT1 . Because α1 ∈ AF, in the same way as in the proof of Theorem 4.10, ^ A↓ |= (4.29) α1 (c) c∈BHT0 and in the same way, since α2 ∈ AF as well, the same structure has ^ A↓ |= α2 (c). (4.30) c∈BHT0 b Overall we have Note that from Equation (4.28), A↓ |= δ. ^ ^  A↓ |= α1 (c) ∧ δS ∧ c∈BHT0 α2 (c)  (4.31) c∈BHT0 b and by Lemma 4.11 this is a contradiction to the assumption that Ib a is inductive w.r.t. δ. 5. Instrumentation for High Depth Instantiations In this section we discuss the connection between quantifier instantiation and program instrumentation in the converse direction, i.e. simulating quantifier instantiation with instrumentation. In Section 4 we showed that instrumentation without adding existential quantifiers is powerful at most as bounded instantiations with a low bound. In this section we show that allowing additional existentials does increase the power of instrumentation in proving ∀∗ ∃∗ invariants. In particular, we show how to systematically construct instrumented programs in a way that corresponds to quantifier instantiation for ∀∗ ∃∗ -invariants: performing the required instantiations within the program allows expressing the invariant in a form that falls in the decidable fragment. Together with Section 4, this makes the point that, in the context of invariant checking, the form of instrumentation by a derived relation studied in this paper directly corresponds to quantifier instantiation. As before, the instrumentation process begins with a program that does not have a universal inductive invariant. We would like to transform the program in a sound way to a b As before, we start by identifying some program that has a universal inductive invariant I. ∗ existential formula ψ(x) ∈ ∃ (Σ) that expresses needed information, and encode it using an instrumentation relation r, with the meaning that “r(x) ≡ ψ(x)”. As before, we present the procedure for a single formula and instrumentation relation, but it can be used with multiple formulas and instrumentation relations (see Remark 4.7). BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 19 b express existential Intuitively, adding the instrumentation relation r lets Ib ∈ ∀∗ (Σ) information by referring to r. The modifications to the program must encode enough of “r(x) ≡ ψ(x)” to make Ib inductive. As opposed to the instrumentation described in Section 4.1, this will be done by instantiating the correspondence between ψ(t) and r(t) for specific variables in the program, using assume statements. This replaces the rewriting of program conditions that use ψ to use r. This approach is also extended to obtain deep instantiations which simulate Bounded-Horizon with an arbitrary bound. Local Instantiations. Rather than rewriting ψ(t) to r(t) in the program, we would like to enforce r to be interpreted according to ψ in the pre-state, i.e., to enforce ∀x. ψ(x) ↔ r(x). The direction ∀x. ψ(x) → r(x) is an EPR formula (since ψ ∈ ∃∗ ), and thus we can simply conjoin it to the verification conditions without sacrificing decidability. The converse implication, ∀x. r(x) → ψ(x), is a ∀∗ ∃∗ formula, and adding it to the verification condition will lead to undecidability. Note that Bounded-Horizon with bound 1 is analogous to enforcing r(t) → ψ(t) for every t that is a program variable. Inspired by this, we define the following instrumentation that lets the user locally enforce the definition of r for program variables. Definition 5.1 (Local Instantiation). Let ψ(x) = ∃y. ϕ(x, y). To generate an instantiation of ∀x. r(x) → ∃y. ϕ(x, y) on some tuple of program variables t, we instrument the program by adding new program variables c, and inserting the following code: c := ∗; assume r(t) → ϕ(t, c) This code uses the havoc statement, which sets the value of c to arbitrary values, followed by an assume statement that restricts the execution such that if r(t) holds, then ϕ(t, c) holds (see [PMP+ 16] for the formal semantics). Thus, this code realizes the restriction that r(t) → ∃y. ϕ(t, y), and also assigns to the new program variables c, the witnesses for the existential quantifiers. We call this addition to the program a local instantiation, as it imposes the connection between r and ψ locally for some program variables t. Lemma 5.2 (Soundness of Local Instantiations). If δb is obtained from δ by a local instantiation then δb is a sound instrumentation by Definition 4.2. Proof. The code added by a local instantiation for t that uses new variables c translates a new constraint in δb of the form γ = ∃c. r(t) → ϕ(t, c). Since ∀x. r(x) ↔ ψ(x) ⇒ γ, we have b which implies the condition of Definition 4.2. ∀x. r(x) ↔ ψ(x) ∧ δ ⇒ δ, Remark 5.3. The combination of adding ∀x. ψ(x) → r(x) to the verification condition and allowing the user to perform local instantiations on the program variables is at least as powerful as rewriting program conditions, since any rewrite of ψ(t) to r(t) can be simulated by a local instantiation on t. Instantiations for the Invariant. The mechanism of local instantiations is designed to b support instantiations of ∀x. ψ(x) ↔ r(x) required to prove that the invariant I = I[ψ/r] is preserved by the program. This proof is carried out by showing that (∀x. ψ(x) ↔ r(x)) ∧ 0 is unsatisfiable. This may require instantiating the definition of r on b Ib ∧ δ ∧ ¬(I[ψ/r]) Skolem constants that come from the negation of the invariant in the post-state. Thus, we extend our instrumentation method by adding new “program variables” that represent the elements of the domain on which the invariant is potentially violated in the post-state. For 20 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM /@ r1 (x, y) ≡ ∃z. req(x, z) ∧ db(z, y) /@ r2 (x, y) ≡ ∃z. t(x, z) ∧ req(z, y) /@ r3 (x, y) ≡ ∃z. db req(x, z) ∧ db(z, y) /@ Invariant Ib = ∀u, p. resp(u, p) → r1 (u, p) ∧ /@ ∀id , q. db req(id , q) → r2 (id , q) ∧ /@ ∀id , p. db resp(id , p) → r3 (id , p) ∧ /@ ∀id , u1 , u2 . t(id , u1 ) ∧ t(id , u2 ) → u1 = u2 action server process db response(id , p) { # instantiate r3 on (id , skp ) (depth 1) /@ c1 := ∗; /@ assume r3 (id , skp ) → db req(i, c1 ) ∧ db(c1 , skp ); # instantiate r2 on (id , c1 ) (depth 2) /@ c2 := ∗; /@ assume r2 (id , c1 ) → t(id , c2 ) ∧ req(c2 , c1 ); ... } action check(u, p) { # instantiate r1 on (u, p) (depth 1) /@ c3 := ∗; /@ assume r1 (u, p) → req(u, c3 ) ∧ db(c3 , p); ... } Figure 3. An illustration of instrumentation by local instantiations for the example of Figure 2. The instrumentation adds three instrumentation relations r1 , r2 , r3 , and performs three local instantiations in order to prove that the invariant is inductive. Note that an instantiation depth of 2 is used, in accordance with the fact that the original invariant is provable using bound 2 but not bound 1. The complete model corresponding to this Figure appears in [add] (file client server db instr.ivy). b we add a special program variable skx which every universally quantified variable x in I, can be used in local instantiations, enhancing their power to prove that Ib is inductive. Obtaining Deep Instantiations. Applying local instrumentation on a tuple t that consists of original program variables, or variables that represent Skolem constants, corresponds to instantiations of Bounded-Horizon with bound 1. However, once a local instantiation is performed, new program variables c are added. Performing a local instantiation on these new variables now corresponds to instantiation from depth 2. By iteratively applying local instantiations, where each iteration adds new program variables, we can thus obtain quantifier instantiations of arbitrary depth. Illustrating Example. Figure 3 illustrates the local instantiation procedure on the example of Figure 2. Recall that the ∀∗ ∃∗ invariant I of Figure 2 is not provable using BoundedHorizon of bound 1, but is provable using Bounded-Horizon of bound 2. The instrumentation BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 21 presented in Figure 3 introduces three instrumentation relations to encode the existential b parts of I, thereby producing the instrumented universal invariant I. b we use local instantiations in the actions check and To prove the inductiveness of I, server process db response. In server process db response, we instantiate the definition of r3 on (id , skp ), and assign the existential witness to c1 . Intentionally, c1 gets the request that was sent from the server to the DB that led to the response skp being sent from the DB to the server. skp is the response that supposedly causes a violation of the invariant when the action server process db response is executed (the instantiations are used to prove that a violation does not occur). This instantiation is of depth 1. Next, we make an instantiation of the definition of r2 on (id , c1 ) and obtain a new existential witness c2 . The use of c1 here makes this instantiation depth 2. The check action includes another instantiation of depth 1, which is simply used to prove that the abort cannot happen (similarly to rewriting a program condition). The reader can observe that the local instantiations introduced during the instrumentation process closely correspond to the instantiations required to prove that the original ∀∗ ∃∗ invariant I (see Section 3). We note that the process of instrumentation by local instantiations discussed here is different in spirit from those of Section 4: instrumentation by local instantiation consists of almost nothing but adding existential quantifiers to the transition relation, as opposed to the condition in Definition 4.6 where we do not allow the instrumentation to add new existential quantifiers. 6. Partial Models for Understanding Non-Inductiveness When conducting SMT-based deductive verification (e.g., using Dafny [Lei10]), the user constructs both the formal representation of the system and its invariants. In many cases, the invariant I is initially not inductive w.r.t. the given program, due to a bug in the program or in the invariant. Therefore, deductive verification is typically an iterative process in which the user attempts to prove inductiveness, and when this fails the user adapts the program, the invariant, or both. In such scenarios, it is extremely desirable to present the user with a counterexample to induction in the form of a state that satisfies I but makes a transition to a state that violates it. Such a state can be obtained from a model of the formula Ind = I ∧ δ ∧ ¬I 0 which is used to check inductiveness. It explains the error, and guides the user towards fixing the program and/or the invariant [Lei10, FLL+ 02]. However, in many cases where the check involves quantifier alternation, current SMT solvers are unable to produce counterexamples. Instead, SMT solvers usually diverge or report “unknown” [GM09, RTGK13]. In such cases, Bounded-Horizon instantiations can be used to present a concrete logical structure which is comprehensible to the user, obtained as a model of the (finite) instantiations of the formula Ind. While this structure is not a true counterexample (as it is only a model of a subset of the instantiations of the formula), it can still guide the user in the right direction towards fixing the program and/or the invariant. We illustrate this using a simple leader-election protocol in a ring [CR79], whose model is presented in Figure 4. The protocol assumes that nodes are organized in a directional ring topology with unique IDs, and elects the node with the highest ID as the leader. Each node sends its own ID to its successor, and forwards messages when they contain an ID higher than its own ID. A node that receives its own ID is elected as leader. We wish to prove a 22 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM action receive packet(n, m) { assume pending(m, n) pending := pending \ {(m, n)} if m = n then leader := leader ∪ {n} else if n < m then assume ring next(n, n0 ) pending := pending ∪ {(m, n0 )} else # do not forward } pending := ∅; . . . # ring topology action send packet(n) { assume ring next(n, m) pending := pending ∪ {(n, m)} sent := sent ∪ {n} } Figure 4. A sketch of the leader election protocol discussed in this section (the complete program appears in [add], file ring leader termination.ivy). (a) (b) (c) Figure 5. Leader-election in a ring protocol as an illustration of the use of partial models for incorrect programs and invariants. (a),(b) show partial models of bound 1 and 2, respectively, and (c) illustrates an infinite structure that explains the root cause of the non-inductiveness. termination property which states that once all nodes have sent their ID, and there are no pending messages in the network, there must be an elected leader. To verify this we use a relational model of the protocol, similar to [PMP+ 16], and specify the property via the following formula: (∃n. leader(n)) ∨ (∃n1 , n2 . ¬sent(n1 ) ∨ pending(n1 , n2 )) (6.1) A natural attempt of proving this using an inductive invariant is by conjoining Equation (6.1) (which is not inductive by itself) with the following property (this was the authors’ actual next step in proving this termination property): ∀n1 . sent(n1 ) ∧ ¬leader(n1 ) → ((∃n2 . pending(n1 , n2 )) ∨ (∃n2 . n1 < n2 )) (6.2) BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 23 meaning that if a node has sent its own ID but has not (yet) become leader, then there is either a message pending in the network with the node’s ID, or a node with a higher ID. Alas, the conjunction of Equations (6.1) and (6.2) is still not an inductive invariant for the protocol (as we explain below). Since Equation (6.2) contains ∀∗ ∃∗ quantification, the associated inductiveness check is outside of the decidable EPR fragment. Indeed, Z3 diverges when it is used to check Ind. This is not surprising since the formula has no satisfying finite structures, but has an infinite model (a scenario that is not unusual for ∀∗ ∃∗ formulas). On the other hand, applying Bounded-Horizon (with any bound) to Ind results in a formula that has finite models. These concrete models are partial models of Ind. Figs. 5(a) and (b) show partial models (restricted to the pre-states) obtained with bounds of 1 and 2, respectively, on this example. These models are not true counterexamples to induction: the sub-formula of Equation (6.2) residing under the universal quantifier does not hold for all the elements of the domain. It does, however, hold for all elements with which the quantifier was instantiated, which are the elements above the dashed line in the figure. These elements have all sent their own ID, which was blocked by their successor that has a higher ID, so none of them is the leader. In a finite model, this has to end somewhere, because one of the nodes must have the highest ID. Hence, no finite counter-model exists. However, extrapolating from Figure 5(a) and (b), we can obtain the infinite model depicted in Figure 5(c). This model represents an infinite (“open”) ring in which each node has a lower ID than its successor. This model is a true model of the formula Ind generated by the invariant in Equations (6.1) and (6.2), but the fact that it is infinite prevented Z3 from producing it. Since we use tools that check general (un)satisfiability, which is not limited to finite structures, the only way to prove that an invariant is inductive is to exclude infinite counterexamples to induction as well. Using Bounded-Horizon instantiations, we are able to obtain meaningful partial models that provide hints to the user of what is missing. In this case, the solution is to add an axiom to the system model which states that there is a node with maximal ID: ∃n1 . ∀n2 . n2 ≤ n1 . With this additional assumption, the formula Ind is unsatisfiable so the invariant is inductive, and this is proven both by Z3’s instantiation heuristics and by Bounded-Horizon with a bound of 1. This illustrates the usefulness of Bounded-Horizon when the invariant is not inductive. 7. Implementation and Initial Evaluation In this section, we describe our implementation of Bounded-Horizon of bound 1 and present an initial evaluation of the technique on several examples. While discussing the examples, we note that certain types of ghost code that records properties of the history of an execution can be viewed as a special case of instrumentation, and demonstrate how the Bounded-Horizon technique circumvents the need for augmenting the program with such ghost code. 7.1. Implementation. We implemented a prototype of Bounded-Horizon of bound 1 on top of Z3 [DMB08] and used it within Ivy [PMP+ 16] and the framework of [IBI+ 13]. Our implementation works by adding “guards” that restrict the range of universal quantifiers to the set of constants where necessary. Technically, recall that we are considering the satisfiability of Ind = IS ∧ δS ∧ (¬I 0 )S .6 Let ∀x. θ be a subformula of Ind. If θ contains 6 Skolemization is performed via Z3, taking advantage of heuristics that reduce the number of different Skolem functions. 24 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM  W function symbol applications7, we transform the subformula to ∀x. c x = c → θ where c ranges over const[Ind]. The resulting formula is then dispatched to the solver. This is a simple way to encode the termination criterion of bound 1 while leaving room for the solver to perform the necessary instantiations cleverly. The translation enlarges the formula by O(#Consts · #∀) although the number of bounded instantiations grows exponentially with #∀. The exponential explosion is due to combinations of constants in the instantiation, a problem we defer to the solver. Z3 terminates on the class of formulas because during the Model-Based Quantifier Instantiation process every instantiation of a universally quantified formula has the same truth value in the model as an instantiation using one of the existing ground terms (constants and then BHT1 terms). Z3’s instantiation engine will produce instantiations using existing terms rather than create superfluous new terms [Bjø]. An alternative approach of implementation is to integrate the termination criterion of the bound with the solver’s heuristics more closely (see [BRK+ 15]). 7.2. Examples. We applied the procedure to the incorrect example of Section 6, and also successfully verified several correct programs and invariants using bound 1. These examples are (the examples’ code can be found in [add]): • The client-server example of Figure 1. • List reverse [IBI+ 13], where the invariant states that the n edges (“next” pointers) are reversed. The invariant is ∀∗ ∃∗ due to the encoding of n via n∗ as explained in [IBI+ 13]. • Learning switch [BBG+ 14], in which the routing tables of the switches in the network are automatically constructed through observing the source packets arriving on each switch’s links. The invariant states that in every routing path, every routing node has a successor. • Hole-punching firewall [BBG+ 14], in which the firewall allows a packet from an external host to enter the network only if the host is recorded as trusted by the firewall. The invariant states that if a packet from an external host then is allowed, then there previously was an internal host that contacted the external host. We explored two modeling alternatives: using a ghost history relation, or existentially quantifying over time. We elaborate on this topic and this example below. • Leader election in a ring [CR79, PMP+ 16] with the invariant discussed in Section 6. (See Section 6 for full details.) Derived Relations Over the History. Sometimes expressing verification conditions requires modifications to the program in which the state is augmented with additional relations, but these relations cannot be defined as derived relations over the core program relations. Often the reason is that the property of interest depends not only on the current program state, but also on previous states in the execution history. An example where such a scenario occurs is a hole-punching firewall. In this example, a firewall controls packets entering and leaving the organization’s network. Packets from outside the organization are allowed if they originate from a host that is considered trusted. A host hosto is considered trusted if some host hosti in the organization’s network has previously sent a packet to hosti . This correctness condition depends on previous states in the execution history, and cannot be expressed in an inductive invariant without changing the vocabulary. 7 This in fact implements the approximation as of Equation (3.2). The exact bound 1 per Equation (3.1) can be implemented by a more careful consideration of which universally quantified variables should be restricted, but this was not necessary for our examples. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 25 A common method to overcome this problem is to introduce a ghost state to record historical information, and ghost code to mutate the ghost state, implementing this book-keeping. In the hole-punching firewall example, the user can add a relation ever-pending(host1 , host2 ), and add ghost code that adds the tuple (host1 , host2 ) to ever-pending whenever host1 sends a packet to host2 . We observe that it is sometimes possible to think of such ghost relations as standard derived relations, defined over a vocabulary in which past states are available, and view the procedure of adding appropriate ghost code as an instrumentation by a derived relation as defined in this paper (Definition 4.2). The ideas is as follows: In our first-order setting, we can lift the vocabulary to encode the time explicitly with a classical encoding (see e.g. [Aba89]), by adding a new parameter t to every relation and constant symbol. in the transition relation, references to p(·) are replaced by p(tnow , ·) and p0 (·) by p(t0now , ·), where tnow is a new constant that represents the current time. tnow is incremented in every transition (according to some total order on time). The transition relation also need to include the requirement that the previous states are not modified by the current transition, meaning that ∀t < tnow . ∀x. p(t, x) ↔ p0 (t, x). Call this modified transition relation δt . We now proceed to express the ghost relation as a derived relation over the history. In the example of the hole-punching firewall, the relation ever-pending can now be expressed by the derived relation ψ(host1 , host2 ) ≡ ∃t. t ≤ tnow ∧ pending(t, host1 , host2 ). With this construcrtion, we can directly use the derived relation in the inductive invariant instead of the ghost relation. Viewing the addition of the ghost relation and ghost code as a sound instrumentation, Lemma 4.3 implies that an inductive invariant for the program with ghost state enduces an inductive invariant for δt . This invariant is defined over the vocabulary that records the entire history, but without the ghost relation symbol. The value of this point of view is that the results of this paper imply that in certain cases the user can prove an invariant expressed over the history using bounded instantiations with a low bound, without resorting to ghost code manipulations. The reasoning is as follows: If adding the ghost code does not add existential quantifiers, then augmenting the program with the ghost code can be thought of as instrumentation without additional existentials. If, additionally, the derived relation — now defined over the entire execution history — can be expressed as a combination of universal and existential properties, Theorem 4.10 applies, showing that Bounded-Horizon with a low-bound is therefore guaranteed to prove the inductiveness of the invariant expressed for δt , with no need to add the ghost code. These conditions are satisfied by the hole-punching firewall example. We manually performed the transformation of the transition relation to a vocabulary over the history in Ivy [PMP+ 16], and successfully proved the inductive invariant with Bounded-Horizon of bound 1. 7.3. Initial Evaluation. An initial evaluation of the method’s performance appears in Table 1. 26 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM Table 1. Experimental results. Program Client-server List reverse Learning switch Hole-punching firewall with ghost Hole-punching firewall ∃ time Leader-election in a ring (correct) Leader-election in a ring (incorrect) #∀ 14 47 70 15 32 41 40 #Func 1 3 1 1 2 1 1 #Consts 15 15 7 18 21 21 20 #∀↓ 2 4 37 3 3 1 1 B1 Total 58 ms 319 ms 245 ms 75 ms 102 ms 113 ms 1112 ms B1 Solve 3 ms 211 ms 65 ms 4 ms 4 ms 36 ms 1008 ms Baseline Z3 3 ms 50 ms 33 ms 4 ms 4 ms 27 ms — B1 Total is the time in milliseconds for the bound 1 implementation. It is compared to Baseline Z3 which is the solving time in milliseconds of Ind as is (with quantifier alternation) by Z3. B1 Solve measures the solving time of the formula restricted to bound 1, which demonstrates that most of the overhead occurs when constructing the formula. #∀ is the number of universal quantifiers in Ind, #Func the number of different Skolem function symbols, and #Consts the number of constants. #∀↓ is the number of universally quantified variables that were restricted in the bound 1 check. Measurements were performed on a 3.5GHz Intel i5-4690 CPU with 8GB RAM running Linux 3.13 x86 64. The results are encouraging because they suggest that the termination strategy of Bounded-Horizon, at least for bound 1, can be combined with existing instantiation techniques to ensure termination with only a slight performance penalty. Most encouraging is the satisfiable example of Section 6. On this instance, Z3 was able to return “sat” within seconds, although to do so, in theory, the solver must exhaust the entire set of bounded instantiations. This suggests that the Bounded-Horizon termination criterion might indeed be useful for “sat” instances on which the solver may diverge. 8. Related Work Quantifier instantiation. The importance of formulas with quantifier-alternation for program verification has led to many developments in the SMT and theorem-proving communities that aim to allow automated reasoning with such formulas. The Simplify system [DNS05] promoted the practical usage of quantifier triggers, which let the user affect the quantifier instantiation procedure in a clever way. Similar methods are integrated into modern SMT solvers such as Z3 [DMB08]. Recently, a method for annotating the source code with triggers has been developed for Dafny [LP16]. The notion of instantiation depth is related to the notions of matching-depth [DNS05] and instantiation-level [GBT09] which are used for prioritization within the trigger-based instantiation procedure. In addition to user-provided triggers, many automated heuristics for quantifier instantiation have been developed, such as Model-Based Quantifier Instantiation [GM09]. Even when quantifier instantiation is refutation-complete, it is still important and challenging to handle the SAT cases, which are especially important for program verification. Accordingly, many works (e.g., [RTGK13]) consider the problem of model finding. Local Theory Extensions and Psi-Local Theories [Sof05, IJS08, BRK+ 15] identify settings in which limited quantifier instantiations are complete. They show that completeness is achieved exactly when every partial model can be extended to a (total) model. In such settings Bounded-Horizon instantiations are complete for invariant checking. However, Bounded-Horizon can also be useful when completeness cannot be guaranteed. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 27 Classes of SMT formulas that are decidable by complete instantiations have been studied by [GM09]. In the uninterpreted fragment, a refined version of Herbrand’s Theorem generates a finite set of instantiations when the dependencies are stratified. Bounded-Horizon is a way to bound unstratified dependencies. Natural Proofs. Natural proofs [QGSM13] provide a sound and incomplete proof technique for deductive verification. The key idea is to instantiate recursive definitions over the terms appearing in the program. Bounded-Horizon is motivated by a similar intuition, but focuses on instantiating quantifiers in a way that is appropriate for the EPR setting. Decidable logics. Different decidable logics can be used to check inductive invariants. For example, Monadic second-order logic [HJJ+ 95] obtains decidability by limiting the underlying domain to consist of trees only, and in particular does not allow arbitrary relations, which are useful to describe properties of programs. There are also many decidable fragments of first-order logic [BGG01]. Our work aims to transcend the class of invariants checkable by a reduction to the decidable logic EPR. We note that the example of Section 6 does not fall under the Loosely-Guarded Fragment of first-order logic [Hod02] due to a use of a transitivity axiom, and does not enjoy the finite-model property. Abstractions for verification of infinite-state systems. Our work is closely related to abstractions of infinite-state systems. These abstractions aim at automatically inferring inductive invariants in a sound way. We are interested in checking if a given invariant is inductive either for automatic and semi-automatic verification. The View-Abstraction approach [AHH13, AHH14, AHH15] defines a useful abstraction for the verification of parameterized systems. This abstraction is closely related to universally quantified invariants. An extension of this approach [AHH14] adds contexts to the abstraction, which are used to capture ∀∗ ∃∗ invariants in a restricted setting where nodes have finite-state and are only related by specific topologies. Our work is in line with the need to use ∀∗ ∃∗ invariants for verification, but applies in a more general setting (with unrestricted high-arity relations) at the cost of losing completeness of invariant checking. Our work is related to the TVLA system [LS00, SRW02] which allows the programmers to define instrumentation relations. TVLA also employs finite differencing to infer sound update code for updating instrumentation relations [RSL10], but generates non-EPR formulas and does not guarantee completeness. The focus operation in TVLA implements materialization which resembles quantifier-instantiation. TVLA shows that very few built-in instrumentation relations can be used to verify many different programs. Instrumentation and update formulas. The idea of using instrumentation relations and generating update formulas is not limited to TVLA and was also used for more predictable SMT verification [LQ06, LQ08]. Instrumentation for Decidable Logics. The technique of instrumentation by derived relations to allow decidable reasoning is further discussed in a recent work [PLSS17]. Several variants of Paxos are proved safe using models in the decidable logic of EPR with stratified functions, whose use is enabled by instrumentation. Efficiently mplementing a bounded instantiations scheme that bounds instantiations only where they are unstratified is an interesting challenge, in hope of relieving the need for instrumentation also for such cases. 28 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM 9. Conclusion We have provided an initial study of the power of bounded instantiations for tackling quantifier alternation. This paper shows that quantifier instantiation with small bounds can simulate instrumentation. This is a step in order to eliminate the need for instrumenting the program, which can be error-prone. The other direction, i.e. simulating quantifier instantiation with instrumentation, was also presented for conceptual purposes, although it is less appealing from a practical point of view. We are encouraged by our initial experience that shows that various protocols can be proven with small instantiation bounds, and that partial models are useful for understanding the failures of the solver to prove inductiveness. Some of these failures correspond to non-inductive claims, especially those due to infinite counterexamples. In the future we hope to leverage this in effective deductive verification tools, and explore meaningful ways to display infinite counterexamples to the user. Other interesting directions include further investigation into the automation of program transformations for the purpose of verification (of which instrumentation is an example), including types of ghost code, and the use of Bounded-Horizon for automatically inferring invariants with quantifier-alternation. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 29 References [Aba89] [add] [AHH13] [AHH14] [AHH15] [BBG+ 14] [BGG96] [BGG01] [Bjø] [BRK+ 15] [CR79] [DMB08] [DNS05] [FLL+ 02] [FPI+ 17] [GBT09] [GM09] [HHK+ 15] [HJJ+ 95] [Hod02] [IBI+ 13] [IBR+ 14] Martı́n Abadi. The power of temporal proofs. Theor. Comput. Sci., 65(1):35–83, June 1989. Full code materials. http://www.cs.tau.ac.il/research/yotam.feldman/papers/tacas17/ examples_code.zip. Parosh Aziz Abdulla, Frédéric Haziza, and Lukás Holı́k. All for the price of few. In Verification, Model Checking, and Abstract Interpretation, 14th International Conference, VMCAI 2013, Rome, Italy, January 20-22, 2013. Proceedings, pages 476–495, 2013. Parosh Aziz Abdulla, Frédéric Haziza, and Lukáš Holı́k. Block me if you can! In International Static Analysis Symposium, pages 1–17. Springer, 2014. Parosh Abdulla, Frédéric Haziza, and Lukáš Holı́k. Parameterized verification through view abstraction. International Journal on Software Tools for Technology Transfer, pages 1–22, 2015. Thomas Ball, Nikolaj Bjørner, Aaron Gember, Shachar Itzhaky, Aleksandr Karbyshev, Mooly Sagiv, Michael Schapira, and Asaf Valadarsky. Vericon: towards verifying controller programs in software-defined networks. In ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI ’14, Edinburgh, United Kingdom - June 09 - 11, 2014, page 31, 2014. E. Börger, E. Grädel, and Y. Gurevich. The Classical Decision Problem. Springer-Verlag, 1996. Egon Börger, Erich Grädel, and Yuri Gurevich. The classical decision problem. Springer Science & Business Media, 2001. Nikolaj Bjørner. personal communication. Kshitij Bansal, Andrew Reynolds, Tim King, Clark W. Barrett, and Thomas Wies. Deciding local theory extensions via e-matching. In Computer Aided Verification - 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part II, pages 87–105, 2015. Ernest Chang and Rosemary Roberts. An improved algorithm for decentralized extrema-finding in circular configurations of processes. Communications of the ACM, 22(5):281–283, 1979. L. De Moura and N. Bjørner. Z3: An efficient SMT solver. In TACAS, 2008. David Detlefs, Greg Nelson, and James B. Saxe. Simplify: a theorem prover for program checking. J. ACM, 52(3):365–473, 2005. Cormac Flanagan, K. Rustan M. Leino, Mark Lillibridge, Greg Nelson, James B. Saxe, and Raymie Stata. Extended static checking for java. In Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Berlin, Germany, June 17-19, 2002, pages 234–245, 2002. Yotam M. Y. Feldman, Oded Padon, Neil Immerman, Mooly Sagiv, and Sharon Shoham. Bounded quantifier instantiation for checking inductive invariants. In TACAS, 2017. Yeting Ge, Clark W. Barrett, and Cesare Tinelli. Solving quantified verification conditions using satisfiability modulo theories. Ann. Math. Artif. Intell., 55(1-2):101–122, 2009. Yeting Ge and Leonardo De Moura. Complete instantiation for quantified formulas in satisfiabiliby modulo theories. In International Conference on Computer Aided Verification, pages 306–320. Springer, 2009. Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob R. Lorch, Bryan Parno, Michael L. Roberts, Srinath T. V. Setty, and Brian Zill. Ironfleet: proving practical distributed systems correct. In Proceedings of the 25th Symposium on Operating Systems Principles, SOSP, pages 1–17, 2015. Jesper G. Henriksen, Jakob L. Jensen, Michael E. Jørgensen, Nils Klarlund, Robert Paige, Theis Rauhe, and Anders Sandholm. Mona: Monadic second-order logic in practice. In Tools and Algorithms for Construction and Analysis of Systems, First International Workshop, TACAS ’95, Aarhus, Denmark, May 19-20, 1995, Proceedings, pages 89–110, 1995. Ian Hodkinson. Loosely guarded fragment of first-order logic has the finite model property. Studia Logica, 70(2):205–240, 2002. Shachar Itzhaky, Anindya Banerjee, Neil Immerman, Aleksandar Nanevski, and Mooly Sagiv. Effectively-propositional reasoning about reachability in linked data structures. In CAV, volume 8044 of LNCS, pages 756–772, 2013. Shachar Itzhaky, Nikolaj Bjørner, Thomas W. Reps, Mooly Sagiv, and Aditya V. Thakur. Property-directed shape analysis. In Computer Aided Verification - 26th International Conference, CAV 2014, Held as Part of the Vienna Summer of Logic, VSL 2014, Vienna, Austria, July 18-22, 2014. Proceedings, pages 35–51, 2014. 30 [IJS08] Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM Carsten Ihlemann, Swen Jacobs, and Viorica Sofronie-Stokkermans. On local reasoning in verification. In Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pages 265–281, 2008. [Imm99] Neil Immerman. Descriptive complexity. Graduate texts in computer science. Springer, 1999. [IRR+ 04] Neil Immerman, Alexander Moshe Rabinovich, Thomas W. Reps, Shmuel Sagiv, and Greta Yorsh. The boundary between decidability and undecidability for transitive-closure logics. In CSL, 2004. [KBI+ 17] Aleksandr Karbyshev, Nikolaj Bjørner, Shachar Itzhaky, Noam Rinetzky, and Sharon Shoham. Property-directed inference of universal invariants or proving their absence. J. ACM, 64(1):7:1–7:33, 2017. [Lei10] K Rustan M Leino. Dafny: An automatic program verifier for functional correctness. In Logic for Programming, Artificial Intelligence, and Reasoning, pages 348–370. Springer, 2010. [LP16] K. Rustan M. Leino and Clément Pit-Claudel. Trigger selection strategies to stabilize program verifiers. In Computer Aided Verification - 28th International Conference, CAV 2016, Toronto, ON, Canada, July 17-23, 2016, Proceedings, Part I, pages 361–381, 2016. Shuvendu K. Lahiri and Shaz Qadeer. Verifying properties of well-founded linked lists. In Proceed[LQ06] ings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2006, Charleston, South Carolina, USA, January 11-13, 2006, pages 115–126, 2006. Shuvendu K. Lahiri and Shaz Qadeer. Back to the future: revisiting precise program verification [LQ08] using SMT solvers. In Proceedings of the 35th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2008, San Francisco, California, USA, January 7-12, 2008, pages 171–182, 2008. [LS00] Tal Lev-Ami and Shmuel Sagiv. TVLA: A system for implementing static analyses. In Static Analysis, 7th International Symposium, SAS 2000, Santa Barbara, CA, USA, June 29 - July 1, 2000, Proceedings, pages 280–301, 2000. [PLSS17] Oded Padon, Giuliano Losa, Mooly Sagiv, and Sharon Shoham. Paxos made epr: Decidable reasoning about distributed protocols. Proc. ACM Program. Lang., 1(OOPSLA):108:1–108:31, October 2017. [PMP+ 16] Oded Padon, Kenneth L. McMillan, Aurojit Panda, Mooly Sagiv, and Sharon Shoham. Ivy: safety verification by interactive generalization. In Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2016, Santa Barbara, CA, USA, June 13-17, 2016, pages 614–630, 2016. [QGSM13] Xiaokang Qiu, Pranav Garg, Andrei Stefanescu, and Parthasarathy Madhusudan. Natural proofs for structure, data, and separation. In ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI ’13, Seattle, WA, USA, June 16-19, 2013, pages 231–242, 2013. [Ram30] F. P. Ramsey. On a problem of formal logic. Proceedings of the London Mathematical Society, s2-30(1):264–286, 1930. [RSL10] Thomas W. Reps, Mooly Sagiv, and Alexey Loginov. Finite differencing of logical formulas for static analysis. ACM Trans. Program. Lang. Syst., 32(6), 2010. [RTG+ 13] Andrew Reynolds, Cesare Tinelli, Amit Goel, Sava Krstic, Morgan Deters, and Clark Barrett. Quantifier instantiation techniques for finite model finding in SMT. In Automated Deduction CADE-24 - 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings, pages 377–391, 2013. [RTGK13] Andrew Reynolds, Cesare Tinelli, Amit Goel, and Sava Krstic. Finite model finding in SMT. In Computer Aided Verification - 25th International Conference, CAV 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings, pages 640–655, 2013. [Sof05] Viorica Sofronie-Stokkermans. Hierarchic reasoning in local theory extensions. In Automated Deduction - CADE-20, 20th International Conference on Automated Deduction, Tallinn, Estonia, July 22-27, 2005, Proceedings, pages 219–234, 2005. [SRW02] Shmuel Sagiv, Thomas W. Reps, and Reinhard Wilhelm. Parametric shape analysis via 3-valued logic. ACM Trans. Program. Lang. Syst., 24(3):217–298, 2002. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 31 Appendix A. Undecidability For a universal formula I ∈ ∀∗ (Σ), the formula I ∧ δ ∧ ¬I 0 is in EPR (recall that δ is specified in EPR). Hence, checking inductiveness amounts to checking the unsatisfiability of an EPR formula, and is therefore decidable. The same holds for I ∈ AF (Σ). However, this is no longer true when quantifier alternation is introduced. For example, checking inductiveness of I ∈ ∀∗ ∃∗ (Σ) amounts to checking unsatisfiability of a formula in a fragment for which satisfiability is undecidable. In this section we show that checking inductiveness of ∀∗ ∃∗ formulas is indeed undecidable, even when the transition relation is restricted to EPR. The undecidability of the problem justifies sound but incomplete algorithms for checking inductiveness, one of which is the Bounded-Horizon algorithm (defined in Section 3) which we study in this paper. Finite and infinite structures. We begin by showing that the problem is undecidable when structures, or program states, are assumed to be finite. This is the intention in most application domains [Imm99] (including the examples in Section 7), especially when the program does not involve numerical computations. Nevertheless, in this paper we mostly concern ourselves with the problem of checking inductiveness when structures may also be infinite. This is because SMT-based deductive verification relies on proof techniques from standard first-order logic, whose semantics are defined over general structures, i.e. both finite and infinite. We thus establish an undecidability result for this setting as well. It is interesting to note that the discrepancy between the intended finiteness of the domain and the proof techniques, which cannot incorporate this assumption, re-emerges in Section 6. We refer to inductiveness over finite structures when the validity of I ∧ δ → I 0 is considered over finite structures, and to inductiveness over general structures when it is considered over both finite and infinite structures. Scope of the proofs. The undecidability proofs of this section are by reductions from tiling problems. Although technically it is also possible to prove the results by a trivial reduction from the satisfiability of ∀∗ ∃∗ formulas (since invariants for the transition relation true are necessarily either valid or unsatisfiable), we believe that the proofs presented here demonstrate the intuition behind the inherent difficulty of checking inductiveness of ∀∗ ∃∗ formulas in a more profound and robust way. To further provide intuition, we prove the undecidability of a closely related problem, that of checking inductive invariants for safety of transition systems. Given a transition relation δ (over Σ ] Σ0 ), a sentence ϕ0 (over Σ) describing the set of initial states and a sentence ϕP (over Σ) describing the safety property, the problem is to check whether ϕ0 → I (initiation), I ∧ δ → I 0 (consecution), and I → ϕP (safety) are valid (over finite or general structures). We will consider this problem when I ∈ ∀∗ ∃∗ , ϕ0 ∈ ∀∗ , ϕP ∈ ∀∗ , in instances where ϕ0 → I and I → ϕP are valid (so it only remains to check whether I ∧ δ → I 0 is valid). With these restrictions, the undecidability of the problem of checking inductive invariants for safety of transition systems over general structures implies the undecidability of the problem of checking inductiveness as used elsewhere in this paper. We now proceed to state the undecidability results and their proofs. A.1. Inductiveness Over Finite Structures. Theorem A.1. It is undecidable to check given I ∈ ∀∗ ∃∗ and δ ∈ EPR whether I is inductive for δ over finite structures. 32 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM The proof is based on a reduction from a variant of tiling problems. We start by defining the specific tiling problem used in the proof of this theorem: Definition A.2 ([IRR+ 04]). A halting-tiling problem consists of a finite set of tiles T with designated tiles Tstart , Thalt ∈ T , along with horizontal and vertical adjacency relations H, V ⊆ T × T . A solution to a halting-tiling problem is an arrangement of instances of the tiles in a finite rectangular grid (“board”) such that the tile Tstart appears in the top left position, the tile Thalt appears in the end of a row (the rightmost position in some row), and the adjacency relationships H, V are respected, meaning: if a tile t2 appears immediately to the right of t1 it must hold that (t1 , t2 ) ∈ H, and if a tile t2 appears immediately below t1 it must hold that (t1 , t2 ) ∈ V. The problem is undecidable [IRR+ 04]. The proof is by a reduction from the halting problem: given a Turing machine we can compute a halting-tiling problem such that the problem has a solution iff the machine halts (on the empty input). In the reduction, rows represent the tape of the Turing machine as it evolves over time (computation steps). The tiles encode the location of the head and the current (control) state of the machine. The horizontal and vertical constraints ensure that successive tiled rows correspond to a correct step of the machine, and the locality of constratins is possible by the locality of computation in a Turing machine. See [BGG96] for further details. Proof of Theorem A.1. The proof is by a reduction from non-tilability in the halting-tiling problem (Definition A.2) to the problem of checking inductive invariants for safety of a transition system over finite structures where the initiation and safety requirements are valid. We think of the transition relation δ as incrementally placing tiles in a rectangle. Vocabulary. To express locations on the board, we use a total order for both the horizontal and vertical dimensions of the board. We add an immediate predecessor relation j = i − 1 which is true if j < i and there is no element of the order between j, i. We use a constant 0 for the minimal element of the order. These notions can be defined using a universally quantified formula.8 A location is a pair of elements of the order, a vertical and horizontal component. We sometimes use the term board order to refer to the lexicographic order of pairs of elements of the order. The transition system keeps track of the last tile placed on the board by a relation M (i, j) which is true only for the last updated location. Since the placing of tiles occurs in a sequential manner we also call this board location maximal, and a location active if it comes before the maximal location in the board order. The active area is the set of active locations. The state of tiles on the board is represented by a set of relations {Tk }, one for each tile type, encoding the locations on the board where a tile of type Tk is placed. In this proof we also use a constant max to be an element of the total order, representing the width of the rectangle. 8 The assumption that there exists a predecessor is left for the invariant to state explicitly when necessary, as this is the heart of the ∀∗ ∃∗ quantification in the proof. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 33 Transitions. In every step the transition system places a valid tile in the next board location. The next board location is considered while respecting the width of the rectangle, moving to the next row if the horizontal component of the current tile is max. Placing a tile of type Tnext on the board is done by an EPR update of the (two-vocabulary) form ∀i, j. M 0 (i, j) ↔ ((j = 0 ∧ M (i − 1, max) ∨ (j 6= 0 ∧ M (i, j − 1)))  0 ∀i, j. Tnext (i, j) ↔ Tnext (i, j) ∨ M 0 (i, j) (A.1) ∀i, j. Tk0 (i, j) ↔ Tk (i, j) ∀Tk 6= Tnext . The transition system nondeterministically chooses a tile Tnext type that respects the adjacency relationships. These relationships are with the tiles in the board location preceding the current location in the horizontal and vertical components, expressible using the immediate predecessor relation and existential quantification on these predecessors. (Note that the existential quantifiers do not need to reside in the scope of universal quantifiers — they depend only on the current location.) Because the set of tile types T is finite, expressing the allowed tile types given the two adjacent locations can be done by a quantifier-free formula. Overall the EPR formula describing a step of the system consists of a disjunction between choices for Tnext . Each of these possible choices is described via a conjunction of the guard that makes sure that it is legal to place Tnext , and a corresponding update to the relation that is a conjunction of the formulas in Equation (A.1). Initial state. Initially we only have Tstart placed in the upper-left corner, so ∀i, j. Tstart (i, j) ↔ (i = 0 ∧ j = 0) and ∀i, j. ¬Tk (i, j) for every other tile type Tk . Safety property. The safety property states that the special tile Thalt , is not placed on the board in the end of a row (in a max position) in the active area. Invariant. The invariant states that in the active area we have a valid partial tiling. We require this by a ∀∗ ∃∗ formula saying that for every tile placed in an active location (except for the maximal location) there is a successor tile, placed in the next board location, that conforms to the (local) ajdacency relations.9 We also conjoin the safety property to the invariant. Reduction argument. The invariant holds for the initial state, and trivially implies the safety property. If there exists a valid tiling with Thalt in the end of a row, a counterexample to induction can be obtained by encoding this valid tiling in the post-state and that same tiling without Thalt , which is the last-placed tile, in the pre-state. For the converse, assume that the invariant is not inductive over finite structures, i.e., there exists a finite counterexample to induction, and show that there exists a solution to the halting-tiling problem. The reasoning is as follows: A finite state satisfying the invariant induces a valid finite partial tiling (defined by the active area of the board in the structure). Since the transition system always places a tile that respects the adjacency relations, it is easy to see that a counterexample to induction must be such that the transition places Thalt on the board in the end of a row, and that this also induces a valid partial finite tiling in 9 We specify the requirement in this forward fashion, rather than requiring that every tile has a valid predecessor, in order to easily reuse this invariant in the proof of Theorem A.3. 34 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM the post-state. Thus a finite counterexample to induction implies the existence of a valid finite tiling with Thalt in the end of a row, which is a solution to the halting-tiling problem. Thus the invariant is inductive iff the halting-tiling problem does not have a solution. A.2. Inductiveness Over General Structures. Theorem A.3. It is undecidable to check given I ∈ ∀∗ ∃∗ and δ ∈ EPR whether I is inductive for δ over general (finite and infinite) structures. The proof is based on a reduction from a variant of tiling problems. We start by defining the specific tiling problem used in the proof of this theorem: Definition A.4. A lower-triangular infinite-tiling problem consists of a finite set of tiles T , along with horizontal and vertical adjacency relations H, V ⊆ T × T . A solution to a lower-triangular infinite-tiling problem is an arrangement of instances of the tiles in the lower-triangular plane (i.e. a total function {(i, j) ∈ N×N | i ≤ j} → T ) where the adjacency relationships H, V are respected, meaning: if a tile t2 appears immediately to the right of t1 it must hold that (t1 , t2 ) ∈ H, and if a tile t2 appears immediately below t1 it must hold that (t1 , t2 ) ∈ V. The problem is undecidable The proof is by a reduction from the non-halting problem: given a Turing machine we can compute a lower-triangular infinite-tiling problem such that the problem has a solution iff the machine does not halt (on the empty input). The encoding is similar to [IRR+ 04]. Proof of Theorem A.3. The proof is by a reduction from non-tilability in the lower-triangular infinite-tiling problem (Definition A.4) to the problem of checking inductive invariants for safety of a transition system (over general structures) where the initiation and safety requirements are valid. We construct a transition relation similar to the one in the proof of Theorem A.1, with some changes, as described below. Discussion and motivation. To provide some intuition to the difference between the reductions, we remark that both of the proofs in this section are in essence a reduction from the halting (or non-halting) problem. The proof of Theorem A.1 encodes runs of the machine as finite tilings, and asks whether a tiling that represents a terminating computation, encoded by Thalt , is possible. This reduction is no longer adequate when structures may be infinite. The reason is that an infinite valid partial tiling may not correspond to reachable configuration of the Turing machine, so there may be such an infinite tiling with Thalt even though the Turing machine never halts.10 In fact, the reduction in this proof must be in the opposite direction: the invariant should be inductive iff the machine does not terminate, whereas in the proof of Theorem A.1 the invariant is inductive iff the machine does terminate. This is because satisfiability is recursively-enumerable over finite structures and co-recursively-enumerable over general structures (due to the existence of proofs), which reflects on checking inductiveness through the satisfiability check of the formula I ∧ δ ∧ ¬I 0 . 10 One way to construct such a tiling, using a tile in row ω of the board, is utilized in the proof that follows. BOUNDED QUANTIFIER INSTANTIATION FOR CHECKING INDUCTIVE INVARIANTS 35 Thus, we would like to have a counterexample to induction when the machine never halts, i.e. has an infinite run. As before, runs of the machine are encoded via tiling, only that now an infinite structure can encode an infinite run of the machine. (It is not necessary that an infinite tiling represents a valid infinite run of the machine, but every infinite run can be represented by such a structure.) We would like to “detect” this situation. Our way to do this is by the observation that induction on the number of rows, or execution steps, must hold when the number of rows is finite (but unbounded), as in Theorem A.1, but does not necessarily hold when there may be an infinite number of rows. This idea is implemented by a relation P with the invariant that it is preserved under successive board locations. In an infinite structure this does not imply that P is true for all locations. A flag f is used to express a transition that is aware of P not being globally true. Another technical detail is the lower-triangular formulation of the tiling problem, which is used to construct the infinite computation of the transition system by placing a single tile in each step. Returning to the proof, we describe the reduction and highlight its differences from the reduction in Theorem A.1. Following the lower-triangular formulation of the tiling proble, we restrict the board order to the lower-triangular part (locations (i, j) such that i ≤ j) and ignore other locations when considering successor in the board order. Vocabulary. We add a relation P over board locations, and a Boolean flag (nullary predicate) f. Transitions. In each step the transition system places a valid tile in the next board location, similar to the proof of Theorem A.1. The difference is that the criterion for moving to place tiles in the next tile is when the current location (i, j) has i = j (whereas in Theorem A.1 the criterion was j = max). To maintain the invariant that P is preserved under successor of active tiles in the board, when we place a new tile, if P holds for the maximal location before the step, set P to true for the new maximal location. If P does not hold for the new maximal location, turn f to false. Initial state. P is true for the first location (0, 0) only, and f is true. In this proof, initially the board is empty. Safety property. The safety property now asserts that f is true. Invariant. As before, the invariant states that the active board represents a valid partial tiling, i.e. every active tile except for the maximal one has a valid successor. The invariant also states that P is preserved under successor of board, i.e.: if (i1 , j1 ) and (i2 , j2 ) are successive active board locations w.r.t. the board order, then if P holds for (i1 , j1 ) is must also hold for (i2 , j2 ). We also conjoin the safety property to the invariant. Reduction argument. The invariant holds for the initial state, and trivially implies the safety property. Assume that there is no solution to the lower-triangular infinite-tiling problem, and show that the invariant is inductive. The reasoning is as follows: A state satisfying the invariant induces a partial valid tiling — either finite or infinite — over the active area of the board. Since there is no valid partial tiling with an infinite number of rows, the number of active locations must be finite (the number of columns in the active domain is bounded by 36 Y.M.Y. FELDMAN, O. PADON, N. IMMERMAN, M. SAGIV, AND S. SHOHAM the number of rows, since we are discussing lower-triangular tilings). Because P is preserved under successor of the board order, by induction on the number of locations, P must hold for the maixmal location. After a transition is taken, f remains true. Since the transition system always places a tile that respects the horizontal and vertical ajdacency relations and sets P to true for the new maximal location, it is easy to see that the rest of the invariant is preserved by a transition as well. For the converse direction, if there is a solution to the lower-triangular infinite-tiling problem, then there is an infinite structure encoding this tiling. The transition begins with the infinite valid tiling, with a new additional row after this infinite sequence of tiled rows. (Recall that the board dimensions are axiomatized using a total order; the additional row index corresponds to ordinal ω of vertical order.) We place some tile in the first column of this row as in some valid row in the tiling. Note that when placing tiles in this row we need not worry about vertical constraints, because they were expressed in a forward fashion, and this row is not a successor of any other row. The first leftmost location in the new row is set to be the maximal active one, and we set P to be false for this location. Note that this does not violate the invariant: P is preserved under successor of the board location, but nonetheless does not hold for the location in the additional row (it is not the successor of any location). The transition will now place a new tile and turn f to false, P does not hold for the current maximal location, thereby violating the invariant. Thus the invariant is inductive iff the infinite tiling problem does not have a solution. This work is licensed under the Creative Commons Attribution-NoDerivs License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nd/2.0/ or send a letter to Creative Commons, 171 Second St, Suite 300, San Francisco, CA 94105, USA, or Eisenacher Strasse 2, 10777 Berlin, Germany
6cs.PL
Where is my forearm? Clustering of body parts from simultaneous tactile and linguistic input using sequential mapping Karla Štěpánová1,2 , Matěj Hoffmann1,3 , Zdeněk Straka1 , Frederico B. Klein4 , Angelo Cangelosi4 , Michal Vavrečka2 (1) Center for Machine Perception, Department of Cybernetics, Faculty of Electrical Engineering, Czech Technical University in Prague (2) Czech Institute of Informatics, Robotics, and Cybernetics, CTU in Prague (3) iCub Facility, Istituto Italiano di Tecnologia (4) School of Computing, Electronics and Mathematics, Plymouth University, Plymouth, UK arXiv:1706.02490v1 [cs.NE] 8 Jun 2017 Abstract is an umbrella term uniting higher level representations, for perception more than for action, and accessible to consciousness. Schwoebel and Coslett (2005) amassed evidence for distinguishing between three types of body representations: body schema, body structural description, and body semantics—constituting a kind of hierarchy. The body structural description is a topological map of locations derived primarily from visual input that defines body part boundaries and proximity relationships. Finally, body semantics is a lexical–semantic representation of the body including body part names, functions, and relations with artifacts (e.g., shoes are used on the feet, and feet can be used to kick a football). While the details of every particular taxonomy or hierarchy can be discussed, clearly, there is a trend from continuous, modality-specific representations (like the tactile homunculus) to multimodal, more aggregated representations. This may be first instantiated by increasing receptive field size and combining sensory modalities, as it is apparent in somatosensory processing, e.g. areas relatively specialized on proprioception or touch and with small receptive fields (like Brodmann areas 3a and 3b), touch and proprioception are getting increasingly combined in areas 1 and 2. Then, going from anterior to posterior parietal cortex, the receptive fields grow further and somatosensory information is combined with visual. One can then ask whether this process of bottom-up integration or aggregation may give rise to discrete entities, or categories, similar to individual body parts. Vignemont et al. (2009) focused on how body segmentation between hand and arm could appear based on a combined tactile and visual perception. They explored category boundary effect which appeared when two tactile stimuli were presented: these stimuli felt farther away when they were applied across the wrist than when they were applied within a single body part (palm or forearm). In conclusion, they suggest that the representation of the body is structured in categorical body parts delineated by joints, and that this categorical representation modulates tactile spatial perception. Next to the essentially bottom-up clustering of Humans and animals are constantly exposed to a continuous stream of sensory information from different modalities. At the same time, they form more compressed representations like concepts or symbols. In species that use language, this process is further structured by this interaction, where a mapping between the sensorimotor concepts and linguistic elements needs to be established. There is evidence that children might be learning language by simply disambiguating potential meanings based on multiple exposures to utterances in different contexts (cross-situational learning). In existing models, the mapping between modalities is usually found in a single step by directly using frequencies of referent and meaning co-occurrences. In this paper, we present an extension of this one-step mapping and introduce a newly proposed sequential mapping algorithm together with a publicly available Matlab implementation. For demonstration, we have chosen a less typical scenario: instead of learning to associate objects with their names, we focus on body representations. A humanoid robot is receiving tactile stimulations on its body, while at the same time listening to utterances of the body part names (e.g., hand, forearm and torso). With the goal at arriving at the correct “body categories”, we demonstrate how a sequential mapping algorithm outperforms one-step mapping. In addition, the effect of data set size and noise in the linguistic input are studied. 1 Introduction Body representation has been the topic of psychological, neuroanatomical and neurophysiological studies for many decades. Spurred by the account of Head and Holmes (1911) and their proposal of superficial and postural schema, a number of different concepts has been proposed since: body schema, body image, and corporeal schema being only some of them. Body schema is usually thought of as more “low-level”, sensorimotor representation of the body used for action. Body image 1 multimodal body-related information, an additional “categorization” of body parts is imposed through language, such as when the infant hears her parents naming the body parts. Interestingly, recent research (Majid, 2010) showed that there are some cross-linguistic variabilities in naming body parts and this may in turn override or influence the “bottom-up” multimodal (nonlinguistic) body part categorization. While the field is relatively rich in experimental observations, the mechanisms behind the development and operation of these representations are still not well understood. Here, computational and in particular robotic modeling ties in—see (Hoffmann et al., 2010; Schillaci et al., 2016) for surveys on body schema in robots. Petit and Demiris (2016) developed an algorithm for the iCub humanoid robot to associate labels for body parts and later proto-actions with their embodied counterparts. These could then be recombined in a hierarchical fashion (e.g., “close hand” consists of folding individual fingers). Mimura et al. (2017) used Dirichlet process Gaussian mixture model with latent joint to provide a Bayesian body schema estimation based on tactile information. Their results suggest that kinematic structure could be estimated directly from tactile information provided by a moving fetus without any additional visual information—albeit with a lower accuracy. Our own work on the iCub humanoid robot has thus far focused on learning primary representations—tactile (Hoffmann et al., 2017) and proprioceptive (Hoffmann and Bednarova, 2016). In this work, we use the former (the “tactile homunculus”) as input for further processing—interaction with linguistic input. In this work, we strive to find segmentation of body parts based on a simultaneous tactile and linguistic information. However, body part categorization and mapping to body part names is one instance of a more general problem of segmenting objects from the environment, learning compressed representations (loosely speaking: concepts, categories, symbols) to stand in for them and associating them with words to which the infant is often exposed simultaneously. Borghi et al. (2004), for example, studied the interaction of object names with situated action on the same objects. We made use of a newly proposed sequential mapping algorithm which extends an idea of one-step mapping (Smith et al., 2006) and compared its overall accuracy to one-step mapping as well as to accuracies of segmenting individual body parts. We further explore how the accuracy of the learned mapping is influenced by a level of noise in the linguistic domain and data set size. The sequential mapping strategy was shown to be very robust as it can find the mapping under circumstances of very noisy input and clearly outperformed the one-step mapping. Complete source code used for generating results in this article is publicly available at https://github. com/stepakar/sequential-mapping. This article is structured as follows. The inputs and their preprocessing and the mapping algorithms are described in Section 2. This is followed by Results (Section 3) and a Discussion and Conclusion. 2 Materials and Methods In this section, we will first present the inputs and their preprocessing pipelines: tactile input (Section 2.1) and linguistic input (Section 2.2). In total, 9 body parts of the right half of the robot’s upper body were stimulated: torso/chest, upper arm, forearm, palm and 5 fingertips. Tactile stimulation coincided with an utterance of the body part’s name. Then, the one-step and sequential mapping algorithms (sections 2.3.1 and 2.4) are presented, and a description of the evaluation (Section 2.5). 2.1 Tactile inputs and processing To generate tactile stimulation pertaining to different body parts, we built on our previous work on the iCub humanoid robot. In particular, the “tactile homunculus” (Hoffmann et al., 2017)—a primary representation of the artificial sensitive skin the robot is covered with (see Fig. 1 – one half of the robot’s upper body). In the current work, the skin was not physically stimulated anymore, but the activations were emulated and then relayed to the “homunculus”, as detailed below. 2.1.1 Emulated tactile input We created a YARP (Metta et al., 2006) software module to generate virtual skin contacts1 . A skin part was randomly selected and then stimulated. The number of pressure-sensitive elements (henceforth taxels) for different skin parts was 440 for the torso, 380 for upper arm, 230 for forearm, and 104 for the hand (44 for palm and 5 × 12 for fingertips)—1154 taxels in total. Once the skin part was randomly selected, a small region was also randomly picked within that part for the tactile stimulation—10 taxels at a time, corresponding to the triangular modules the skin is composed of. For the hand, the situation was slightly different: the entire hand was treated as one skin part. Then, within the hand, a random choice was made between 5 subregions on the palm skin (8 to 10 taxels) and 5 fingertips (12 taxels each). Data was collected for 100 minutes, corresponding to approximately 2000 individual 3 second stimulations. For all skin parts, the stimulation lasted for 3 seconds and was sampled at 10 Hz. A label–body part name–was saved along with the tactile data. These labels are used to generate the linguistic input and for performance evaluation later, but do not directly take 1 https://github.com/robotology/peripersonal-space/ tree/master/modules/virtualContactGeneration part in the clustering of tactile information. Please note that there were separate labels for the palm and individual fingers, while these were all treated as one “skin part” in the virtual touch generation and hence the number of samples per finger, for example, was lower than for other non-hand body parts. 2.1.2 First layer – “tactile homunculus” The input layer of the “tactile homunculus” (Hoffmann et al., 2017) consists of a vector, a(t), of activations of 1154 taxels at time t—the output of the previous section—that have binary values (1 when a taxel is stimulated, 0 otherwise). The output layer then forms a 7 × 24 (168 “neurons” in total) grid – see Figure 1 B. This layer is a compressed representation of the skin surface—the receptive fields of neurons (the parts of skin they respond to) are schematically color-coded. However, this code (and “clustering”) is not available as part of the tactile input. The output layer will be represented as a single vector x(t) = [x1 (t), ..., x168 (t)]. The activations of the output neurons, xi (t), are calculated as dot products of the weight vector ui corresponding to the i-th output neuron and the tactile activation vector a(t) as follows: xi (t) = ui · a(t) 2.1.3 (1) Second layer – GMM The output of the first layer, vector x(t) (168 elements, continuous-valued) serves as input to the second tactile processing layer. This layer aims to cluster individual body parts and represent them as abstract models. Resulting models T j are subsequently mapped in the multimodal layer to clusters found in the language layer. To process the outputs from the first layer, we used a Gaussian mixture model (GMM), which is a convex mixture of D-dimensional Gaussian densities l(x|θ j ). In this case, each tactile model T j is described by a set of parameters θ j . The posterior probabilities p(θ j |x) are computed as follows: p(θ j |x) = J X rkj l(x|θ j ), (2) j=1 1 1 exp[− (x−m j )T (S j )−1 (x−m j )], l(x|θ j ) = p p D 2 (2π) |S j | (3) where x is a set of D-dimensional continuous-valued data vectors, rkj are the mixture weights, J is the number of tactile models, parameters θ j are cluster centers m j and covariance matrices S j . Mixture of Gaussians is trained by the EM algorithm (Dempster et al., 1977). Number of tactile models J is in this model preset based on the number of different linguistic labels. In future, we plan to use an adaptive extension of GMM algorithm such as gmGMM (Štepánová and Vavrečka, 2016) to detect this number autonomously. An output of this layer for each data point x(t) is the vector y(t) of J output parameters describing the data point (the likelihood that the data point belongs to each individual cluster in a mixture). This corresponds to the fuzzy memberships (distributed representation). 2.2 Linguistic inputs and processing Tactile stimulation of a body part was accompanied with the corresponding utterance. In our case, where we have 9 separate body parts, these are ’torso’, ’upper arm’, ’forearm’, ’palm’, ’little finger’, ’ring finger’, ’middle finger’, ’index finger’ and ’thumb’. Linguistic and tactile inputs are processed simultaneously. We conducted experiments with spoken language input—one-word utterances pronounced by a nonnative English speaker. To process this data, we made use of CMU Sphinx (an open-source flexible Markov model-based speech recognizer system) (Lamere et al., 2003) and achieved 100% accuracy of word recognition. The word-forms are extracted from the audio input and compared to prelearned language models by means of the log-scale scores p(wnt |Li ) of the audio matching. Based on these data, posterior probability can be computed. However, in the current work, we employed a shortcut and used the labels (ground truth) directly. This allowed us to fully explore the effect of misclassification in linguistic subdomain to mapping accuracy. The noise to the language data was added subsequently and evenly to all classes (a given proportion of labels was randomly permuted). 2.3 Cross-situational learning One possible way how to establish mapping between sensorimotor concepts and linguistic elements is to use frequencies of referent and meaning co-occurrences, that is, the ones with the highest co-occurrence are mapped together (Smith et al., 2006; Xu and Tenenbaum, 2007). This method is usually called crosssituational learning and supposes the availability of the ideal associative learner who can keep track and store all co-occurrences in all trials, internally memorizing and representing the word–object co-occurrence matrix of input. This allows the learner to subsequently choose the most strongly associated referent (Yu and Smith, 2012). 2.3.1 One-step mapping The simplest one-step word-to-referent learning algorithm only accumulates word-referent pairs. This can be viewed as Hebbian learning: the connection between a Fig. 1: iCub skin and tactile homunculus. (A) Photograph of the iCub robot with artificial skin exposed on the right half of the upper body (1154 taxels in total). (B) Representation of tactile inputs learned using a Self-Organizing Map – a 24 × 7 neuronal sheet. (C) Schematics with skin patches unfolded and colored to mark the correspondence with B. Arrows illustrate the relationship in orientation between skin parts and the learned map (Hoffmann et al., 2017). word and an object is strengthened if the pair co-occurs in a trial. To extend this basic idea, we can enable also forgetting by introducing a parameter η, which can capture the memory decay (Yu and Smith, 2012). Supposing that at each trial t we observe an object ont and hear a corresponding word wnt (Nt possible associations), we can describe the update of the strength of the association between word model L(i) and object—in our case tactile model T ( j)—as follows: A(i, j) = R X t=1 η(t) Nt X δ(wnt , i)δ(ont , j), (4) n=1 where R is the number of trials, δ is the Kronecker delta function (equal to 1 when both arguments are identical and 0 otherwise), wnt and ont indicate the nth word–object association that the model attends to and attempts to learn in the trial t and η(t) is the parameter controlling the gain of the strength of association. Now let’s assume that the word w(i) is modeled by the model Li in the language domain and object (referent) o( j) is modeled by the model T m(i) in the tactile domain. Our goal is to find the corresponding model T m(i) from tactile subdomain for each model Li from language domain to assign them together. Indices m(i) are found as follows: ∀i : m(i) = argmax A(i, j), (5) i where A is the co-occurrence matrix computed in the Eq. 4 (element A(i, j) captures co-occurrence between the word w(i) and object o( j)). 2.4 Sequential mapping algorithm To capture dynamic competition among models, we extend the basic one-step mapping algorithm for crosssituational learning by sequential addition of inhibitory connections. The inhibitory mechanisms and situationtime dynamics were already partially included into the model of cross-situational learning proposed by McMurray et al. (2012). Even though our model shares some similarities with the model proposed by McMurray, it stems from different computational mechanisms. After a reliable assignment between a language and tactile model is found, inhibitory connections among this tactile model and all other language models are added. Thanks to this mechanism, mutual exclusivity principle (the fact that children prefer mapping where object has only one label to multiple labels (Markman, 1990)) is guaranteed. The assignment between tactile models T j and language models L j is found using the following iterative procedure: 1. Tactile and language data are clustered separately and the corresponding posterior probabilities are found. 2. For each data point the most probable tactile and language clusters are selected and the data point is assigned to these clusters. 3. Co-occurrence matrix with elements A(i, j) is computed and the best assignment is selected: [im, m(im)] = argmax argmax A(i, j). i j (6) In this step, the tactile model T m(im) is assigned to the language model Lim . 4. Inhibitory connections are added between the assigned tactile model T m(im) and all language models Li , where i , im (mutual exclusivity). 5. Assigned data points (data points which belong to both T m(im) and Lim ) are deleted from the data set. 6. If data set is not empty or not all tactile clusters are assigned to some language cluster go to (1), else stop. 2.5 Evaluation Accuracy of the learned mapping is calculated in the following manner: We cluster output activations from the tactile homunculus and assign each data point to the most probable cluster. Then, we find indices m(i) for all clusters as defined in equation 5 for one-step mapping and equation 6 for sequential mapping. Based on this mapping we can assign each data point to the language label. These language labels are subsequently compared to the ground truth (the body part name is equivalent to the language label prior to the application of noise). Accuracy is then computed as: acc = T P/N (7) where T P (true positive) is the number of correctly assigned data points and N is the number of all data points. 3 Results We studied the performance of one-step vs. the sequential mapping algorithms on the ability to cluster individual body parts from simultaneous tactile and linguistic input. That is, all the skin regions on the same body part should “learn” that they belong together (to the forearm, say), thanks to the co-occurrences with the body part labels. In addition, the effect of data set size and levels of noise in the linguistic domain are investigated (Section 3.1). A detailed analysis of the mapping accuracy for individual body parts and a backward projection onto the tactile homunculus are shown in sections 3.2 and 3.3 respectively. 3.1 Comparison of accuracy of one-step mapping to sequential mapping The performance of the one-step and sequential mapping algorithms is shown in Fig. 2. The comparison is provided for different data set sizes (namely for 6 different data sets with number of data points from 64 to 63806) and noise levels. As can be seen, the accuracy of sequential mapping remains very stable and outperforms one-step mapping for all values of the noise (in the linguistic domain) and all data set sizes. For smaller data sets, we can see a steeper drop in accuracy with increasing noise in the language data. 3.2 Accuracy of mapping for individual body parts The accuracy calculated in the previous section and Fig. 2 is an overall accuracy and we don’t take into account the number of data points per individual body part. To explore the performance in more detail, we focused also on the accuracy of sequential mapping for individual body parts. The results for the data set with 3190 and 638 data points can be seen in Fig. 3 top and bottom panel, respectively. The accuracy for all body parts decreases with increasing noise in the linguistic input. The accuracy for fingers is significantly lower—this is due to the lower number of samples per finger (see Section 2.1.1). Comparing the top and bottom panel in Fig. 3 demonstrates poorer performance with higher variance, especially for the fingers. 3.3 Projecting results of sequential mapping back onto homunculus After tactile data from homunculus are clustered and these clusters are mapped to appropriate language clusters (representing body parts utterances), we can project these labels back onto the original tactile homunculus. Considering that xi (t) are activations of neuron i in the homunculus, D is the whole data set consisting of vector of homunculus activations for each data point, and LangLabel(d) is the language label assigned to a data point d based on the sequential mapping procedure described in the Section 2.4, we can project results of sequential mapping onto the homunculus in a following manner. First, we compute strength of activation nki of each neuron i for a given language label k as follows: nki = X xi (t), i ∈ {1, . . . , 168}, (8) x(t)∈Dk where Dk = {d ∈ D|LangLabel(d) = k} and k = {torso, upper arm, forearm, palm, little finger, ring finger, middle finger, index finger, thumb}. Afterwards, we visualize for each neuron how much it is activated for individual body parts. Results for data sets of differing size and level of noise in the linguistic domain can be seen in Fig. 4. Clearly, for large enough data sets and limited noise, the mapping from language to the tactile modality is successful in delineating the body part categories (the fingers with fewer data points being more challenging)—as can be seen by comparing panels A and B. Fig. 2: Accuracy of one-step vs. sequential mapping for different levels of noise in language. Number denotes the size of data set, SM - sequential mapping and OM - one-step mapping. The mean and standard deviation from 20 repetitions is visualized. Fig. 3: Accuracy of sequential mapping for individual body parts: Visualization of sequential mapping accuracy based on the noise in linguistic data for 2 data set sizes: 3190 data points (upper) and 638 data points (lower) , noise in language data 0-100%(random). The mean and standard deviation from 40 repetitions are visualized. 4 Discussion and Conclusion To study the problem of associating (mapping) between sensorimotor or multimodal information, concepts or categories, and language or symbols, we have chosen a specific but less studied instance of this problem: segmentation and labeling of body parts. Perhaps, from a developmental perspective, this could be plausible, as Fig. 4: Projection of mapping results back onto the tactile homunculus – sample runs of the algorithm. Color code for individual body parts is the same as in Fig. 1. (A) Original homunculus with true labels. (B) Results from data set with 6381 data points and 10% noise. (C) Results from 638 data points and 80% noise. the body may be the first “object” the infant is discovering. The self-exploration occurs in the sensorimotor domain, but at the same time or slightly later, the infant is exposed to utterances of body part names. In this work, we study the mapping between the tactile modality and body part labels from linguistic input. We present a new algorithm for mapping language to sensory modalities (sequential mapping), compare it to one-step mapping and test it on the body part categorization scenario. Our results suggest that this mapping procedure is robust, resistant against noise, and sequential mapping shows better performance than onestep mapping for all data set sizes and also slower performance degradation with increasing noise in the linguistic input. Furthermore, we explored accuracy of the sequential mapping for individual body parts, revealing that body parts less represented in the data set— fingers—were categorized less accurately. This problem might be mitigated with increased overall data set size; yet, dealing with clusters with uneven data point number is a common problem of clustering algorithms (in our case GMM). Projecting the labels or categories induced by language back onto the tactile homunculus showed that the body part categories are quite accurate. Given the nature of the tactile input—the skin is a continuous receptor surface—and the random-uniform tactile input generator used, the linguistic input was the only one that can facilitate cluster formation. However, more realistic, non-uniform touch and, in particular, the addition of additional modalities (proprioception, vision) should enable bottom-up non-linguistic body part category formation, as described by (Vignemont et al., 2009), for example. These constitute possible directions of our future work: the “modal” cluster formation will interact with the labels imposed by language. Furthermore, thus far, only one half of the body was considered— corresponding to the lateralized representations in the tactile homunculus—, but one can imagine stimulating both left and right arm, for example, while hearing always the same utterance: ‘upper arm’. Further study of the brain areas involved in this processing is needed, in order to develop models more closely inspired by the functional cortical networks, like in (Caligiore et al., 2010) that model the experimental findings of (Borghi et al., 2004). For our experiments we used artificially generated linguistic input (i.e., body part labels) with added noise (i.e. wrong labels with a certain probability). In the future, we are planning to use actual auditory input (spoken words) with real noise. This will also add the additional dimension of similarity in the auditory domain: ‘arm’ and ‘forearm’ are phonetically closer to each other than to, say, ‘torso’. Thus, the linguistic modality will not constitute crisp, discrete labels anymore, but these will have to be extracted first—opening up further possibilities for bidirectional interaction with other modalities. 5 Acknowledgement K.S. and M.H. were supported by the Czech Science Foundation under Project GA17-15697Y. M.H. was additionally supported by a Marie Curie Intra European Fellowship (iCub Body Schema 625727) within the 7th European Community Framework Programme. Z.S. was supported by The Grant Agency of the CTU Prague project SGS16/161/OHK3/2T/13. M.V. was supported by European research project TRADR funded by the EU FP7 Programme, ICT: Cognitive systems, interaction, robotics (Project Nr. 609763). References Borghi, A. M., Glenberg, A. M. and Kaschak, M. P. (2004). Putting words in perspective. Memory & Cognition, 32(6):863–873. Caligiore, D., Borghi, A. M., Parisi, D. and Baldassarre, G. (2010). Tropicals: A computational embodied neuroscience model of compatibility effects. Psychological Review, 117(4):1188. Dempster, A. P., Laird, N. M. and Rubin, D. B. (1977). Maximum likelihood from incomplete data via the EM algorithm. Journal of the royal statistical society. Series B (methodological), pp. 1–38. Head, H. and Holmes, H. G. (1911). Sensory disturbances from cerebral lesions. Brain, 34:102–254. Hoffmann, M. and Bednarova, N. (2016). The encoding of proprioceptive inputs in the brain: knowns and unknowns from a robotic perspective. Vavrecka, M., Becev, O., Hoffmann, M. and Stepanova, K. (eds.), In Kognice a umělý život XVI [Cognition and Artificial Life XVI], pp. 55–66. Hoffmann, M., Marques, H., Hernandez Arieta, A., Sumioka, H., Lungarella, M. and Pfeifer, R. (2010). Body schema in robotics: A review. Autonomous Mental Development, IEEE Transactions on, 2(4):304–324. Hoffmann, M., Straka, Z., Farkas, I., Vavrecka, M. and Metta, G. (2017). Robotic homunculus: Learning of artificial skin representation in a humanoid robot motivated by primary somatosensory cortex. IEEE Transactions on Cognitive and Developmental Systems. Lamere, P., Kwok, P., Gouvea, E., Raj, B., Singh, R., Walker, W., Warmuth, M. and Wolf, P. (2003). The cmu sphinx-4 speech recognition system. In IEEE Intl. Conf. on Acoustics, Speech and Signal Processing (ICASSP 2003), Hong Kong, vol. 1, pp. 2–5. Citeseer. Majid, A. (2010). Words for parts of the body. Words and the mind: How words capture human experience, pp. 58–71. Markman, E. M. (1990). Constraints children place on word meanings. Cognitive Science, 14(1):57–77. McMurray, B., Horst, J. S. and Samuelson, L. K. (2012). Word learning emerges from the interaction of online referent selection and slow associative learning. Psychological review, 119(4):831. Metta, G., Fitzpatrick, P. and Natale, L. (2006). Yarp: yet another robot platform. International Journal on Advanced Robotics Systems, 3(1):43–38. Mimura, T., Hagiwara, Y., Taniguchi, T. and Inamura, T. (2017). Bayesian body schema estimation using tactile information obtained through coordinated random movements. Advanced Robotics, 31(3):118– 134. Petit, M. and Demiris, Y. (2016). Hierarchical action learning by instruction through interactive grounding of body parts and proto-actions. In Robotics and Automation (ICRA), 2016 IEEE International Conference on, pp. 3375–3382. IEEE. Schillaci, G., Hafner, V. V. and Lara, B. (2016). Exploration behaviors, body representations, and simulation processes for the development of cognition in artificial agents. Frontiers in Robotics and AI, 3:39. Schwoebel, J. and Coslett, H. B. (2005). Evidence for multiple, distinct representations of the human body. Journal of cognitive neuroscience, 17(4):543–553. Smith, K., Smith, A. D., Blythe, R. A. and Vogt, P. (2006). Cross-situational learning: a mathematical approach. Lecture Notes in Computer Science, 4211:31–44. Štepánová, K. and Vavrečka, M. (2016). Estimating number of components in gaussian mixture model using combination of greedy and merging algorithm. Pattern Analysis and Applications, pp. 1–12. Vignemont, d. F., Majid, A., Jola, C. and Haggard, P. (2009). Segmenting the body into parts: evidence from biases in tactile perception. The Quarterly Journal of Experimental Psychology, 62(3):500–512. Xu, F. and Tenenbaum, J. B. (2007). Word learning as bayesian inference. Psychological review, 114(2):245. Yu, C. and Smith, L. B. (2012). Modeling crosssituational word–referent learning: Prior questions. Psychological review, 119(1):21.
2cs.AI
arXiv:1708.01396v1 [math.AC] 4 Aug 2017 GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES II TONY J. PUTHENPURAKAL AND SUDESHNA ROY Abstract. Let A be a commutative Noetherian ring containing a field K of characteristic zero and let R = A[X1 , . . . , Xm ]. Consider R as standard graded with deg A = 0 and deg Xi = 1 for all i. We present a few results about the behavior of the graded components of local cohomology modules HIi (R) where I is an arbitrary homogeneous ideal in R. We mostly restrict our attention to the Vanishing, Tameness and Rigidity problems. 1. introduction 1.1. Standard assumption: Throughout this paper A is a commutative Noetherian ring containing a field K of characteristic zero. Let R = A[X1 , . . . , Xm ] be standard graded with deg A = 0 and deg Xi = 1 for all i. We also assume m ≥ 1. Let I be a homogeneous ideal L in R and M = HIi (R). It is well-known that M is a graded R-module. Set M = n∈Z Mn . In paper [4], the first author studied graded components of local cohomology modules when A is a regular ring containing a field K of characteristic zero and he proved that they satisfy many good properties. In this paper we show that few of the results proved in [4] (in particular Theorems 1.2, 1.3 and 1.6) hold true in considerably general setting. In this paper we show that under assumptions as in 1.1 the following results hold true. We first show Theorem 1.2. (with hypotheses as in 1.1). If Mn = 0 for all |n| ≫ 0 then M = 0. L In view of Theorem 1.2, it follows that if M = HIi (R) = n∈Z Mn is non-zero then either Mn 6= 0 for infinitely many n ≪ 0, OR, Mn 6= 0 for infinitely many n ≫ 0. We show that M is tame. More precisely Theorem 1.3. (with hypotheses as in 1.1). Then we have (a) The following assertions are equivalent: (i) Mn 6= 0 for infinitely many n ≪ 0. (ii) Mn 6= 0 for all n ≤ −m. (b) The following assertions are equivalent: (i) Mn 6= 0 for infinitely many n ≫ 0. (ii) Mn 6= 0 for all n ≥ 0. Surprisingly non-vanishing of a single graded component of M = HIi (R) is very strong. We prove the following rigidity result: Date: August 7, 2017. Key words and phrases. local comohology, graded local cohomology, Weyl algebra, generalized Eulerian modules. 1 2 TONY J. PUTHENPURAKAL AND SUDESHNA ROY Theorem 1.4. (with hypotheses as in 1.1). The we have (a) The following assertions are equivalent: (i) Mr 6= 0 for some r ≤ −m. (ii) Mn 6= 0 for all n ≤ −m. (b) The following assertions are equivalent: (i) Ms 6= 0 for some s ≥ 0. (ii) Mn 6= 0 for all n ≥ 0. (c) (When m ≥ 2.) The following assertions are equivalent: (i) Mt 6= 0 for some t with −m < t < 0. (ii) Mn 6= 0 for all n ∈ Z. We also give examples to show that Theorems 1.7, 1.8, 1.9, 1.13, 1.14 from [4] are false if we don’t assume that A is regular. Techniques used to prove our results: The main idea in [4] is that if A = K[[Y1 , . . . , Yd ]] then graded local cohomology modules over R = A[X1 , . . . , Xm ] become holonomic over an appropriate ring of differential operators, see [4, Theorem 4.2]. Furthermore local cohomology modules are “generalized Eulerian” see [4, Theorem 3.6] (we will discuss this property later). One of the observation we first made was that in Theorems 1.2, 1.3 and 1.6 in [4] the generalized Eulerian property of local cohomology modules was used more crucially. Furthermore in [4] the generalized Eulerian property of local cohomology modules was proved very generally. We now discuss the techniques used to prove our results: Let A be a Noetherian ring containing a field of characteristic zero. Let R = A[X1 , . . . , Xm ], graded with deg A = 0 and deg Xi = 1 for all i. Let Am (A) be the mth Weyl-algebra on A. We consider it a graded ring with deg A = 0, deg Xi = 1 and deg ∂i = −1. We note that R is a graded subring of Am (A). If E is a graded Am (A)-module and e is a homogeneous P element of E then set |e| = deg e. m Consider the Eulerian operator E = i=1 Xi ∂i . If f ∈ R is homogeneous then it is easy to check that Ef = |f |f . We say a graded Am (A)-module W is Eulerain if Ew = |w|w for each homogeneous element w of W . Notice R is an Eulerian Am (A)-module. We say W is generalized Eulerian if for each homogeneous w of W there exists a depending on w such that (E − |w|)a w = 0. The notion of Eulerian modules was introduced in the case A is a field K by Ma and Zhang [9] (they also defined the notion of Eulerian D-modules in characteristic p > 0, where D is the ring of K-linear differential operators on R = K[X1 , . . . , Xm ]). Unfortunately however the class of Eulerian D-modules is not closed under extensions (see 3.5(1) in [9]). To rectify this, the first author introduced the notion generalized Eulerian D-modules (in characteristic zero), see [6]. The next technique that we use is the technique of de Rham cohomology, Koszul homology of generalized Eulerian modules. We generalize several properties which were proved when A = K, a field and the relevant module was holonomic over Am (K). The final technique we use to prove vanishing and tameness property of local cohomology modules is that local cohomology modules is countably generated over R = A[X1 , . . . , Xm ]. We can exploit this fact if A contains an uncountable field. This was observed first in [7]. By base change one can always assume that A contains an uncountable field, see 6.1. GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES 3 Remark 1.5. Note that practically all the proofs in this paper use techniques which were first developed by several researches (including the first author) for holonomic modules over some appropriate ring of differential operators. In the generality we consider, we do not have the notion of holonomic modules. However we have the notion of generalized Eulerian modules. After carefully rewriting several proofs we were able to deduce our results. The paper is organized as follows. In Section 2, we discuss a few preliminary results that we need. In Section 3, we define generalized Eulerian modules on Am (A), the mth -Weyl algebra over A and talk about some basic properties of these modules. In Section 4, some properties of Am (A)-modules are discussed. In Section 5, we show that HIi (M ) has some nice properties due to its countable generation as an R = A[X1 , . . . , Xm ]-module. In Section 6 and Section 7 we prove our main results regarding vanishing, tameness and rigidity of graded local cohomology modules. In the last Section we give examples to show that Theorems 1.7, 1.8, 1.9, 1.13, 1.14 from [4] are false if we don’t assume that A is regular. Convention: Throughout modules considered are left modules over some ring (commutative or not). Usually A, B, R, S will denote commutative rings. The only non-commutative ring we will consider will be Am (A), the mth Weyl algebra over a commutative ring A. 2. Preliminaries In this section we define Lyubeznik functor T and discuss a few preliminary results that we need. 2.1. Lyubeznik functors Let B be a commutative Noetherian ring and let X = Spec(B). Let Y be a closed subset of X. If M is a B-module and if Y is a locally closed subscheme of Spec(B), we denote by HIi (M ) the ith local cohomology module of M supported in Y . Suppose Y = Y2 − Y1 where Y1 ⊂ Y2 are two closed subsets of X, then we have an exact sequence of functors (2.1.1) (−) → · · · . · · · → HYi 1 (−) → HYi 2 (−) → HYi (−) → HYi+1 1 A Lyubeznik functor T is any functor of the form T = T1 ◦ T2 ◦ · · · ◦ Tm where each Ti is either HYi (−) for some locally closed subset Y of X or the kernel, image or cokernel of some arrow appearing in (2.1.1) for closed subsets Y1 , Y2 of X such that Y1 ⊂ Y2 . We need the following result from [10, Lemma 3.1] regarding the behavior of Lyubeznik functor under flat maps. Proposition 2.2. Let φ : B → C be a flat homomorphism of Noetherian rings. Let M be any B-module and T be a Lyubeznik functor on Mod(B). Then there exists a Lyubeznik functor Tb on Mod(C) and isomorphisms Tb (M ⊗B C) ∼ = T (M ) ⊗B C which is functorial in M . 2.3. Graded Lyubeznik functors Let B be a commutative Noetherian ring and let R = B[X1 , . . . , Xm ] be standard graded. We say Y is homogeneous closed subset of Spec(R) if Y = V (f1 , . . . , fs ), where fi ’s are homogeneous polynomials in R. We say Y is homogeneous locally closed subset of Spec(R) if Y = Y ′′ − Y ′ where Y ′ ⊂ Y ′′ are homogeneous closed 4 TONY J. PUTHENPURAKAL AND SUDESHNA ROY subsets of Spec(R). Let ∗ Mod(R) be the category of graded R-modules. Then we have an exact sequence of functors on ∗ Mod(R), (2.3.2) · · · → HYi ′ (−) → HYi ′′ (−) → HYi (−) → HYi+1 ′ (−) → · · · . Definition 2.4. A graded Lyubeznik functor T is a composite functor of the form T = T1 ◦ T2 ◦ · · · ◦ Tm where each Tj is either HYi j (−) for some homogeneous locally closed subset Yj of Spec(R) or the kernel, image or cokernel of any arrow appearing in (2.3.2) with Y = Yj , Y ′ = Yj′ and Y ′′ = Yj′′ such that Yj = Yj′′ − Yj′ and Yj′ ⊂ Yj′′ are homogeneous closed subsets of Spec(R). 2.5. Graded Lyubexnik functor under flat maps: Let φ : B → C be a flat homomorphism of Noetherian rings and let R = B[X1 , . . . , Xm ] be standard graded. Set S = R ⊗B C = C[X1 , . . . , Xm ]. Clearly φ induces a map φ′ : R → S. Let T be a graded Lyubeznik functor on ∗ Mod(R). If Y is a homogeneous closed subset of Spec(R), say Y = V (f1 , . . . , fs ). Set Y ′ = V (f1′ , . . . , fs′ ) where fi′ = φ′ (fi ). We note that Y ′ is a homogeneous closed subset of Spec(S). Furthermore it is clear that we have a homogeneous isomorphism HYi (−) ⊗B C = HYi ′ (−). If Y is a homogeneous locally closed subset of Spec(R), say Y = Y2 − Y1 . Set Y ′ = Y2′ − Y1′ . Then clearly Y ′ is a homogeneous locally closed subset of Spec(S). Furthermore applying the functor (−) ⊗B C to (2.3.2) yields an exact sequence · · · → HYi 1′ (−) → HYi 2′ (−) → HYi ′ (−) → HYi+1 ′ (−) → · · · . 1 ∗ More generally if T is a graded Lyubeznik functor on Mod(R) then T ⊗B C is a graded Lyubeznik functor on ∗ Mod(S). 3. Generalized Eulerian modules Let A be a commutative Noetherian ring containing a field K of characteristic zero. Let Am (A) be the mth -Weyl algebra over A. Notice Am (A) = A⊗K Am (K) = AhX1 , . . . , Xm , ∂1 , . . . , ∂m i. We can consider Am (A) graded, by giving deg A = 0, deg Xi = 1, deg ∂i = −1. The Euler operator on Am (A), denoted by Em , is defined as Em := m X Xi ∂i . i=1 Note that deg Em = 0. Let E be a graded Am (A)-module. For any homogeneous element e ∈ E, set |e| = deg e. Definition 3.1. A graded Am (A)-module M is said to be generalized Eulerian if for each homogeneous element e of E there exists a positive integer a (depending on e) such that (Em − |e|)a · e = 0. The following result from [4, Theorem 3.6] is extremely useful to us. Theorem 3.2. Let T (R) be a graded Lyubeznik functor on ∗ Mod(R). Then T (R) is a generalized Eulerian Am (A)-module. The following result is well-known. GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES 5 Lemma 3.3. If Γ is left (resp. right) Noetherian (not necessarily commutative) ring then for all m ≥ 1, the Weyl Algebra Am (Γ) is also left (resp. right) Noetherian for all m. The following property of generalized Eulerian modules is proved in [4]. Lemma 3.4. [4, Proposition 3.11] Let 0 → M1 → M2 → M3 → 0 be a short exact sequence of Am (A)-modules. Then M2 is generalized Eulerian if and only if M1 and M3 are generalized Eulerian. First we develop some basic properties. Proposition 3.5. Let M be a generalized Eulerian Am (A)-module. Then for i = 0, 1, the Am−1 (A)-module Hi (∂m ; M )(−1) is generalized Eulerian. Proof. From the short exact sequence ∂ m M → H0 (∂m ; M ) → 0 0 → H1 (∂m ; M ) → M (1) −→ we get H1 (∂m ; M ) = ker ∂m = {a ∈ M | ∂m a = 0} and H0 (∂m ; M ) = M/∂m M . Note Am−1 (A) is a sub-ring of Am (A). Further as ∂m commutes with all elements ∂ m M is Am−1 (A)-linear. So H0 (∂m ; M ) and in Am−1 (A) we get the map M (1) −→ H1 (∂m ; M ) are Am−1 (A)-modules. Note that H1 (∂m ; M )(−1) ⊆ M . Let ξ ∈ H1 (∂m ; M )(−1) be homogeneous. As M is generalized Eulerian so we have (Em − |ξ|)a ξ = 0 for some a ≥ 1. Now by definition Em = Em−1 + Xm ∂m . Since Xm ∂m commutes with Em−1 so we have 0 = (Em−1 − |ξ| + Xm ∂m )a ξ = ((Em−1 − |ξ|)a + (∗)Xm ∂m )ξ. Here ∗ denotes the irrelevant terms. As ∂m ξ = 0 we get that (Em−1 − |ξ|)a ξ = 0. Thus H1 (∂m ; M )(−1) is a generalized Eulerian Am−1 (A)-module. Let ξ ′ ∈ H0 (∂m ; M )(−1) be homogeneous of degree r. Since H0 (∂m ; M )(−1) = (M/∂m M )(−1) so ξ ′ = α + ∂m M where α ∈ Mr−1 . As M is generalized Eulerian we get 0 = (Em − r + 1)b α = 0 for some b ≥ 1. Now Em = Em−1 + Xm ∂m = Em−1 + ∂m Xm − 1. Therefore Em − r + 1 = Em−1 − r + ∂m Xm . Moreover, ∂m Xm commutes with Em−1 . Thus 0 = (Em−1 − r + ∂m Xm )b α = (Em−1 − r)b α + ∂m · (∗)α. Going mod ∂m M we get (Em−1 − r)b ξ ′ = 0. Hence H0 (∂m ; M )(−1) is a generalized Eulerian Am−1 (A)-module.  Proposition 3.6. Let M be a generalized Eulerian Am (A)-module. Then for i = 0, 1, the Am−1 (A)-module Hi (Xm ; M ) is generalized Eulerian. Proof. From the short exact sequence X m M → H0 (Xm ; M ) → 0 0 → H1 (Xm ; M ) → M (−1) −→ we get H1 (Xm ; M ) = ker Xm = {a ∈ M | Xm a = 0} and H0 (Xm ; M ) = M/Xm M . Note Am−1 (A) is a sub-ring of Am (A). Further as Xm commutes with all elements X m M is Am−1 (A)-linear. So H0 (Xm ; M ) and in Am−1 (A) we get the map M (−1) −→ H1 (Xm ; M ) are Am−1 (A)-modules. 6 TONY J. PUTHENPURAKAL AND SUDESHNA ROY Let η ∈ H1 (Xm ; M ) be homogeneous. Note that η ∈ H1 (Xm ; M )r ⊆ M (−1)r = Mr−1 . As M is generalized Eulerian so we have (Em − (r − 1))b η = 0 for some b ≥ 1. Now ∂m Xm − Xm ∂m = 1 and by definition Em = Em−1 + Xm ∂m . Therefore Em = Em−1 + ∂m Xm − 1. Thus (Em−1 − r + ∂m Xm )b η = 0. Since ∂m Xm commutes with Em−1 so we have 0 = (Em−1 − r + ∂m Xm )b η = (Em−1 − r)b η + (∗)∂m Xm η. As Xm η = 0 we get that (Em−1 − r)b η = 0 for some b ≥ 1. Thus H1 (Xm ; M ) is a generalized Eulerian Am−1 (A)-module. Let η ′ ∈ H0 (Xm ; M ) be homogeneous of degree r. Since H0 (Xm ; M ) = M/Xm M so η ′ = β + Xm M where β ∈ Mr . As M is generalized Eulerian we get 0 = (Em − r)a β = 0 for some a ≥ 1. Now Em = Em−1 + Xm ∂m . Also Xm ∂m commutes with Em−1 . Thus 0 = (Em−1 − r + Xm ∂m )a β = (Em−1 − r)a β + Xm · (∗)β. Going mod Xm M we get (Em−1 − r)a η ′ = 0. Hence H0 (Xm ; M ) is a generalized Eulerian Am−1 (A)-module.  The following two results are crucial. Proposition 3.7. Let M be a generalized Eulerian A1 (A)-module. Then for l = 0, 1, the module Hl (∂1 ; M ) is concentrated in degree −1 (i.e., Hl (∂1 ; M )j = 0 for j 6= −1). ∂ 1 M is A-linear. So Hl (∂1 ; M ) is an A-module for l = 0, 1. Proof. The map M (1) −→ Thus we have an exact sequence of A-modules ∂ 1 M → H0 (∂1 ; M ) → 0. 0 → H1 (∂1 ; M ) → M (1) −→ Let ξ ∈ H1 (∂1 ; M )(−1) be homogeneous and non-zero. Notice H1 (∂1 ; M )(−1) ⊆ M . Since M is generalized Eulerian so we have (X1 ∂1 − |ξ|)a ξ = 0 for some a ≥ 1. Now (X1 ∂1 − |ξ|)a = (∗)∂1 + (−1)a |ξ|a . As ∂1 ξ = 0 we get (−1)a |ξ|a ξ = 0. Since ξ 6= 0 so we get |ξ| = 0, i.e., ξ ∈ H1 (∂1 ; M )(−1)0 = H1 (∂1 ; M )−1 . Hence H1 (∂1 ; M ) is concentrated at −1. Let ξ ′ ∈ H0 (∂1 ; M ) be non-zero and homogeneous of degree r. Therefore ξ ′ ∈ (M/∂1 M )r and hence ξ ′ = α + ∂1 M for some α ∈ Mr . Since M is generalized Eulerian so we have (X1 ∂1 − r)b α = 0 for some b ≥ 1. Since ∂1 X1 − X1 ∂1 = 1, we can write 0 = (∂1 X1 − (r + 1))b α = (∂1 · (∗) + (−1)b (r + 1)b )α. Now going mod ∂1 M we get (−1)b (r + 1)b ξ ′ = 0. As ξ ′ 6= 0 so r = −1, i.e., ξ ′ ∈ H0 (∂1 ; M )−1 . Hence H0 (∂1 ; M ) is concentrated at −1.  GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES 7 Proposition 3.8. Let M be a generalized Eulerian A1 (A)-module. Then for l = 0, 1, the module Hl (X1 ; M ) is concentrated in degree 0 (i.e., Hl (X1 ; M )j = 0 for j 6= 0). X 1 M is A-linear. So Hl (X1 ; M ) is an A-module for Proof. The map M (−1) −→ l = 0, 1. Thus we have an exact sequence of A-modules X 1 M → H0 (X1 ; M ) → 0. 0 → H1 (X1 ; M ) → M (−1) −→ Let η ∈ H1 (X1 ; M )(1) ⊆ M be homogeneous and non-zero. Since M is generalized Eulerian so we have (X1 ∂1 − |η|)b η = 0 for some b ≥ 1. Since ∂1 X1 − X1 ∂1 = 1, we can write 0 = (∂1 X1 − (|η| + 1))b η = (∗)X1 η + (−1)b (|η| + 1)b η. As X1 η = 0 and η 6= 0, we get |η| = −1, i.e., η ∈ H1 (X1 ; M )(1)−1 = H1 (X1 ; M )0 . Hence H1 (X1 ; M ) is concentrated at 0. Let η ′ ∈ H0 (X1 ; M ) be non-zero and homogeneous of degree r. Therefore η ′ ∈ (M/X1 M )r and hence η ′ = β + X1 M for some β ∈ Mr . Since M is generalized Eulerian so we have (X1 ∂1 − r)a β = 0 a for some a ≥ 1. a a Notice (X1 ∂1 − r) = X1 · (∗) + (−1) r . Thus X1 · (∗)β + (−1)a ra β = 0. In M/X1 M , we have (−1)a ra η ′ = 0. As η ′ 6= 0, we get r = 0, i.e., η ′ ∈ H0 (X1 ; M )0 . Hence H0 (X1 ; M ) is concentrated at 0.  4. Some properties of modules over the Weyl algebra of a Noetherian ring containing a field of characteristic zero We prove that some properties of Am (K)-modules can be extended to Am (A)modules. The following result is similar to [2, Theorem 6.2]. Note that in [2, Theorem 6.2], M is assumed to be holonomic. t a = 0 for some Lemma 4.1. Let M be an Am (A)-module. Set N1 = {a ∈ M | ∂m t t ≥ 1} and N2 = {a ∈ M | Xm a = 0 for some t ≥ 1}. Then (1) N1 is a Am (A)-submodule of M . (2) N1 = ∂m N1 . (3) N2 is a Am (A)-submodule of M . (4) N2 = Xm N2 . s Proof. (1) Let b ∈ N1 . Then ∂m b = 0 for some s ≥ 1. Now ∂i ∂j = ∂j ∂i for all i, j s s and Xi ∂j = ∂j Xi for all i 6= j in Am (A). Thus ∂m ∂i b = ∂i ∂m b = 0 for all i and s s ∂m Xi b = Xi ∂m b = 0 for all i 6= m. Therefore ∂i b ∈ N1 for all i and Xi b ∈ N1 for α α α−1 all i 6= m. Moreover, for any α ≥ 1 we have ∂m Xm = Xm ∂m + α∂m . Therefore s+1 s+1 s ∂m Xm b = Xm ∂m b + (s + 1)∂m b = 0 and hence Xm b ∈ N1 . It follows that N1 is a Am (A)-submodule of M . s (2) Clearly ∂m N1 ⊆ N1 . Let b ∈ N1 . Then ∂m b = 0 for some s ≥ 1. We will use induction on s to prove N1 ⊆ ∂m N1 . If s = 1, then ∂m (Xm b) = Xm (∂m b) + b = b. Since Xm N1 ⊆ N1 so we get b ∈ ∂m N1 . We now assume that s ≥ 2 and the result s s s s−1 s−1 is true for s − 1. If ∂m b = 0 then we get ∂m Xm b = Xm ∂m b + s∂m b = s∂m b. It 8 TONY J. PUTHENPURAKAL AND SUDESHNA ROY s s−1 s−1 follows that ∂m Xm b − s∂m b = ∂m (∂m Xm b − sb) = 0. Thus ∂m Xm b − sb ∈ N1 and hence by induction hypothesis ∂m Xm b − sb ∈ ∂m N1 . Since ∂m Xm b ∈ ∂m N1 so we get that sb ∈ ∂m N1 . Therefore b ∈ ∂m N1 and the result follows. s (3) Let b ∈ N2 . Then Xm b = 0 for some s ≥ 1. Now Xi Xj = Xj Xi for all i, j s s and Xi ∂j = ∂j Xi for all i 6= j in Am (A). Thus Xm Xi b = Xi Xm b = 0 for all i and s s Xm ∂i b = ∂i Xm b = 0 for all i 6= m. Therefore Xi b ∈ N2 for all i and ∂i b ∈ N2 for α α α−1 all i 6= m. Moreover, for any α ≥ 1 we have Xm ∂m = ∂m Xm − αXm . Therefore s+1 s+1 s Xm ∂m b = ∂m Xm b − (s + 1)Xm b = 0 and hence ∂m b ∈ N2 . It follows that N2 is a Am (A)-submodule of M . s (4)Clearly Xm N2 ⊆ N2 . Let b ∈ N2 . Then Xm b = 0 for some s ≥ 1. We will use induction on s to prove N2 ⊆ Xm N2 . If s = 1, then Xm (∂m b) = ∂m (Xm b)−b = −b. Since ∂m N2 ⊆ N2 so we get b ∈ Xm N2 . We now assume that s ≥ 2 and the result is s s s s−1 s−1 true for s − 1. If Xm b = 0 then we get Xm ∂m b = ∂m Xm b − sXm b = −sXm b. It s s−1 s−1 follows that Xm ∂m b + sXm b = Xm (Xm ∂m b + sb) = 0. Thus Xm ∂m b + sb ∈ N2 and hence by induction hypothesis Xm ∂m b + sb ∈ Xm N2 . Since Xm ∂m b ∈ Xm N2 so we get that sb ∈ Xm N2 . Therefore b ∈ Xm N2 and the result follows.  4.2. Fourier transform: Let F : Am (A) → Am (A) be an automorphism of Am (A) defined by F (∂i ) = −Xi and F (Xi ) = ∂i for all i. Clearly F (X∂) = F (X)F (∂). Notice F (1) = F (∂i Xi − Xi ∂i ) = F (∂i )F (Xi ) − F (Xi )F (∂i ) = −Xi ∂i + ∂i Xi = 1. Also note that F : R = A[X1 , . . . , Xm ] → A[∂1 , . . . , ∂m ] = S (restriction map) is an isomorphism. Let M F denote a new module such that M F = M as an abelian group and the action of R on M F is defined by r · m = F (r)m where r ∈ R and m ∈ M F . The new module M F is called the Fourier transform of M . Similarly −1 we define s ∗ n = F −1 (s)n where s ∈ S and n ∈ M F . Now for any s ∈ S −1 and m ∈ (M F )F we have s ∗ m = F −1 (s) · m = F (F −1 (s))m = sm. Hence −1 (M F )F = M . Let R be a commutative S Noetherian ring and I be an ideal in R. Let M be an R-module. Set ΓI (M ) = i≥1n∈N (0 :M I n ), the submodule of M consisting of all elements of M which are annihilated by some power of I. Lemma 4.3. Let M be an Am (A)-module. Set R = A[X1 , . . . , Xm ] and S = A[∂1 , . . . , ∂m ]. Let I and J be homogeneous ideals in R and S respectively. Then ΓI (M ) and ΓJ (M ) are also Am (A)-modules. Proof. Clearly R is a commutative ring contained in the left Noetherian ring Am (A). Let I be a homogeneous ideal in R. Claim: I l+1 ∂i u ⊆ I l u for all 1 ≤ i ≤ m; l ≥ 0 and for any u ∈ M . Proof. We know that I l+1 = hg1 · · · gl+1 | gi ∈ Ii. Moreover, ∂i g1 · · · gl+1 = g1 · · · gl+1 ∂i + ∂i (g1 · · · gl+1 ). Thus g1 · · · gl+1 ∂i u = ∂i g1 · · · gl+1 u − ∂i (g1 · · · gl+1 )u. Pl+1 By chain rule we get ∂i (g1 · · · gl+1 ) = i=1 g1 · · · ∂i (gi ) · · · gl+1 . It follows that g1 · · · gl+1 ∂i u ∈ I l u. Let u ∈ ΓI (M ). Then I s u = 0 for some s ≥ 0. Now I s+1 ∂i u ⊆ ∂i I s u = 0. Therefore ∂i u ∈ ΓI (M ) and hence ∂i ΓI (M ) ⊆ ΓI (M ) for all i. Moreover, Xi ΓI (M ) ⊆ ΓI (M ) and AΓI (M ) ⊆ ΓI (M ). It follows that ΓI (M ) is a Am (A)submodule of M . Now ΓF (I) (M F ) = {m ∈ M F | F (I)s m = 0 for some s ≥ 0}. Since F is a ring homomorphism so we get F (I)s m = F (I s )m = I s · m for any s ≥ 0. Therefore ΓI (M )F = ΓF (I) (M F ). Let J be a homogeneous ideal in S. Set I = F −1 (J). Clearly I is a homogeneous ideal in R and F (I) = F (F −1 (J)) = J. Now we have GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES 9 ΓI (M F ) ⊆Am (A) M F , i.e., ΓF (J) (M F ) ⊆Am (A) M F . Taking F −1 both side we get ΓJ (M ) ⊆Am (A) M .  Remark 4.4. Since (X1 , . . . , Xm ) and (∂1 , . . . , ∂m ) are homogeneous ideals in R and S respectively so by the above lemma it follows that Γ(X) (M ) and Γ(∂) (M ) are Am (A)-modules. Proposition 4.5. Let M be a generalized Eulerian Am (A)-module. Then (1) Γ(X1 ,...,Xm ) (M )j = 0 for all j ≥ −m + 1. (2) Γ(∂1 ,...,∂m ) (M )j = 0 for all j ≤ −m. Proof. (1) Use induction on m. Let m = 1. By Lemma 4.1 we have Γ(X1 ) (M ) = X 1 Γ(X1 ) (M ) is surjective. Thus we get X1 Γ(X1 ) (M ), i.e., the map Γ(X1 ) (M )(−1) −→ a short exact sequence X 1 Γ(X1 ) (M ) → 0. 0 → L → Γ(X1 ) (M )(−1) −→ (4.5.3) Since M is generalized Eulerian we get by Lemma 3.4 and Remark 4.4 that Γ(X1 ) (M ) is a generalized Eulerian A1 (A)-module. Therefore L = H1 (X1 ; Γ(X1 ) (M )) and is concentrated at degree 0 by Proposition 3.8. Thus by the exact sequence (4.5.3) X 1 Γ(X1 ) (M )j for all j 6= 0. Therefore we have 0 → Γ(X1 ) (M )j−1 −→ X1 X1 X1 X1 Γ(X1 ) (M )0 ֒→ Γ(X1 ) (M )1 ֒→ Γ(X1 ) (M )2 ֒→ Γ(X1 ) (M )3 ֒→ · · · . Let u ∈ Γ(X1 ) (M )i for some i ≥ 0. Then X1l u = 0 for some l ≥ 1. Since Γ(X1 ) (M )i ֒→ Γ(X1 ) (M )i+l so we get u = 0 and hence Γ(X1 ) (M )i = 0 for all i ≥ 0. We now assume the result is true for m − 1. Notice Γ(X) (M ) ⊆ M is generalized t a = 0 for some t ≥ 1}. Eulerian Am (A)-module. Set N = {a ∈ Γ(X) (M ) | Xm Since (Xm ) ⊆ (X) we have N = Γ(X) (M ). By Lemma 4.1, N = Xm N , i.e., X m Γ(X) (M ) is a surjective map. Thus we get a short exact sequence Γ(X) (M )(−1) −→ (4.5.4) X m 0 → V → Γ(X) (M )(−1) −→ Γ(X) (M ) → 0. By Proposition 3.6, V = H1 (Xm ; Γ(X) (M )) is a generalized Eulerian Am−1 (A)module. Notice V = Γ(X1 ,··· ,Xm−1 ) (V ). So by induction hypothesis we have Vj = 0 for all j ≥ −(m − 1) + 1 = −m + 2. Now from exact sequence (4.5.4) we have Xm Xm Xm Γ(X) (M )−m+1 ֒→ Γ(X) (M )−m+2 ֒→ Γ(X) (M )−m+3 ֒→ · · · . l Let u ∈ Γ(Xm ) (M )−m+j for some j ≥ 1. Then Xm u = 0 for some l ≥ 1. Since Γ(X) (M )−m+j ֒→ Γ(X) (M )−m+j+l so we get u = 0 and hence Γ(X) (M )i = 0 for all i ≥ −m + 1. (2) Similarly like above we will use induction on m. Let m = 1. By Lemma 4.1, ∂ 1 Γ(∂1 ) (M ) is surjective. Thus Γ(∂1 ) (M ) = ∂1 Γ(∂1 ) (M ), i.e., the map Γ(∂1 ) (M )(1) −→ we get a short exact sequence (4.5.5) ∂ 1 Γ(∂1 ) (M ) → 0. 0 → L → Γ(∂1 ) (M )(1) −→ Since M is generalized Eulerian so we get by Lemma 3.4 and Remark 4.4 that Γ(∂1 ) (M ) ⊆ M is a graded generalized Eulerian A1 (A)-module. Therefore L = H1 (∂1 ; Γ(∂1 ) (M )) and is concentrated at degree −1 by Proposition 3.7. Thus by 10 TONY J. PUTHENPURAKAL AND SUDESHNA ROY ∂ 1 Γ(∂1 ) (M )j for all j 6= −1. the exact sequence (4.5.5) we have 0 → Γ(∂1 ) (M )j+1 −→ Therefore ∂1 ∂1 ∂1 ∂1 Γ(∂1 ) (M )−1 ֒→ Γ(∂1 ) (M )−2 ֒→ Γ(∂1 ) (M )−3 ֒→ Γ(∂1 ) (M )−4 ֒→ · · · . Let u ∈ Γ(∂1 ) (M )i for some i ≤ −1. Then ∂1l u = 0 for some l ≥ 1. Since Γ(∂1 ) (M )i ֒→ Γ(∂1 ) (M )i−l so we get u = 0 and hence Γ(∂1 ) (M )i = 0 for all i ≥ 0. We now assume the result is true for m − 1. Notice Γ(∂) (M ) ⊆ M is generalized t a = 0 for some t ≥ 1}. Since Eulerian Am (A)-module. Set N = {a ∈ Γ(∂) (M ) | ∂m ∂ m (∂m ) ⊆ (∂) we have N = Γ(∂) (M ). By Lemma 4.1, N = ∂m N , i.e., Γ(∂) (M )(1) −→ Γ(∂) (M ) is a surjective map. Thus we get a short exact sequence (4.5.6) ∂ m Γ(∂) (M ) → 0. 0 → V → Γ(∂) (M )(1) −→ By Proposition 3.6, V = H1 (∂m ; Γ(∂) (M )) is a generalized Eulerian Am−1 (A)module. Notice V = Γ(∂1 ,··· ,∂m−1 ) (V ). So by induction hypothesis we have Vj = 0 for all j ≤ −(m − 1) = −m + 1. From exact sequence (4.5.6) we have ∂m ∂m ∂m Γ(∂) (M )−m ֒→ Γ(∂) (M )−m−1 ֒→ Γ(∂) (M )−m−2 ֒→ · · · . l Let u ∈ Γ(∂m ) (M )−m−j for some j ≥ 0. Then ∂m u = 0 for some l ≥ 1. Since Γ(∂) (M )−m−j ֒→ Γ(∂) (M )−m−j−l so we get u = 0 and hence Γ(∂) (M )j = 0 for all j ≤ −m.  5. Countable generation Throughout this section B is a commutative Noetherian ring. We say a B-module M is countably generated if there exists a countable set of generators of M as a B-module. The following result is well-known. We give a proof for the convenience of the reader. f g Lemma 5.1. Let 0 → X1 −→ X2 −→ X3 → 0 be a short exact sequence of Bmodules. Then X2 is countably generated if and only if X1 and X3 are countably generated. Proof. We may assume that f is inclusion S and g is the quotient map. Let X2 be countably generated. So we have X2 = i∈N Di where Di ’s are finitely generated B-modules and DS0 ⊆ D1 ⊆ D2 · · · . Now f (X1 ) = X1 is a submodule of X2 . Thus X1 = X2 ∩ X1 = i∈N (Di ∩ X1 ). Moreover, B is a Noetherian ring and Di ∩ X1 is a submodule of Di . Therefore Di ∩X1 is finitely generated and hence X1 is countably generated. Since X3 ∼ = X2 /X1 as B-modules so we get X3 is countably generated with same generating set as of X2 . Conversely, let X1 and X3 are generated by {αn }n≥1 and {γn }n≥1 respectively. Let βi ∈ X2 be such that g(βi ) = βi = γi . Claim: X2 is generated by {α1 , . P . . , β1 , . . .}. Proof.PLet x ∈ X2 . Then g(x) = bi γi where bi = 0 for all but finitely manyPi. Set ∗ x∗ = bi βi . Then g(x) = g(x∗ ) and hence x−x∗ ∈ P ker g = XP ai αi 1 . So x−x = where ai = 0 for all but finitely many i. Thus x = bi βi + ai αi . The result follows.  The following result is definitely known. We give a proof for the convenience of the reader. GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES d0 d1 11 d2 Lemma 5.2. Let X : 0 → X 0 −→ X 1 −→ X 2 −→ · · · be a co-chain complex of countably generated B-modules. Then H i (X) is countably generated for all i. Proof. Notice ker di is a submodule of X i . Since X i is countably generated so by Lemma 5.1 we get ker di is countably generated. Thus, it follows from Lemma 5.1 that H i (X) = ker di / image di−1 is countably generated.  Lemma 5.3. Let I be an ideal in B. Let M be a countably generated B-module. Then HIi (M ) is countably generated. Proof. Let I = (f1 , . . . , fs ). Consider the Čech complex C:0→M → s M Mfi → · · · → Mf1 ···fs → 0. i=1 Claim: If N is a countably generated B-module then Nf is countably generated for any f ∈ B. S Proof. Clearly Nf = i≥1 N1/f i . Choose a countable generating set C of N . Then i C S1/f i = {c/f | c ∈ C} is a generating set of N1/f i as a B-module and hence C i is a generating set of Nf . Since C is a countable set so is C1/f i . Thus Si≥1 1/f C i≥1 1/f i is a countable set. It follows that Nf is countably generated. Since M is countably generated so we get C is a complex of countably generated B-modules. Thus by Lemma 5.2 it follows that HIi (M ) = H i (C) is countably generated.  Lemma 5.4. Let T be a Lyubeznik functor on Mod(B). Then T (M ) is a countably generated B-module for any countably generated B-module M . Proof. Let Y be any locally closed subset of Spec(B) with Y = Y ′′ − Y ′ where Y ′ , Y ′′ are closed subsets of Spec(B). Then for any countably generated B-module N we have exact sequence HYi ′′ (N ) → HYi (N ) → HYi+1 ′ (N ). Now by Lemma 5.3 we get HYi ′′ (N ) and HYi+1 ′ (N ) are countably generated. Moreover, B is Noetherian. So by Lemma 5.1 it follows that HYi (N ) is countably generated. Thus kernel and cokernel of any arrow appearing in the long exact sequence · · · → HYi ′ (N ) → HYi ′′ (N ) → HYi (N ) → HYi+1 ′ (N ) → · · · are countably generated. Set T = T1 ◦ T2 ◦ · · · ◦ Tm . Then by the above argument we get that Tj (N ) is countably generated for any countably generated B-module N and for all j. Notice T (M ) = (T1 ◦ T2 ◦ · · · ◦ Tm )(M ) = T1 (· · · (Tm (M ))). Hence T (M ) is countably generated for any countably generated B-module M .  Now we have the following result from [7, Lemma 2.3]. Lemma 5.5. Let E be a countably generated B-module. Then AssB (E) is a countable set. In particular, AssB T (B) is a countable set for any Lyubeznik functor T on Mod(B). Proof. The result follows from Lemma 5.3 and Lemma 5.5.  5.6. Let A be a commutative Noetherian ring containing a field K of characteristic zero. Let R = A[X1 , . . . , Xm ] and S = A[∂1 , . . . , ∂m ]. We consider R and S are graded rings with deg A = 0, deg Xi = 1 and deg ∂i = −1. 12 TONY J. PUTHENPURAKAL AND SUDESHNA ROY Lemma 5.7. Let M (1) M is a countably (2) M is a countably (3) M is a countably be an Am (A)-module. The following are equivalent: generated Am (A)-module. generated R-module. generated S-module. Proof. Notice R and S are sub-rings of Am (A). So clearly (2) =⇒ (1) and (3) =⇒ (1). Set Am (A) = D. We now prove (1) =⇒ (3). S Let M be a countably generated D-module. Therefore M = i∈N Mi where Mi ’s are finitely generated D-modules and M0 ⊆ M1 ⊆ M2 · · · . Since Mi is a finitely generated D-module so there exists a surjectiveS map Dli → Mi → 0 for some li ≥ 0. Moreover, as a S-module we have D = i∈N Di , where Di is a left (resp. right) S-module generated by all monomials in X1 , . . . , Xm of degree less than or equal to i. Clearly Di ’s are finitely generated left (resp. right) S-modules and D0 ⊆ D1 ⊆ D2 · · · . Thus D is a countably generated left (resp. right) S-module and so is Dli . Furthermore by Lemma 5.1 we get Mi is countably generated Smodule for all i. It follows that M is a countably generated S-module. To prove (1) =⇒ (2) we just have to replace S by R and Xi by ∂i for all i in the proof of (1) =⇒ (3). This completes the proof.  We need the following result from [4, Proposition 12.1] to prove the result next to it. Proposition 5.8. Let f : U → V be a homomorphism of commutative Noetherian rings. Let M be a B-module. Then AssU M = {P ∩ U | P ∈ AssV M }. We now prove the following nice result. L Proposition 5.9. Let M = i∈Z Mi be a countably generated R-module and is a generalized Eulerian Am (A)-module. Let K be uncountable of characteristic zero. Then there exists some homogeneous element η ∈ K[X1 , . . . , Xm ] of degree 1 such ·η that Mi → Mi+1 is an injective map for all i ≥ −m + 1 and some homogeneous ·ξ element ξ ∈ K[∂1 , . . . , ∂m ] of degree −1 such that Mi → Mi−1 is an injective map for all i ≤ −m. Proof. By Proposition 4.5 we have Γ(X) (M )j = 0 for all j ≥ −m + 1. Now we have a short exact sequence 0 → Γ(X) (M ) → M → M/Γ(X) (M ) → 0. Therefore Mj = M/Γ(X) (M ) j for all j ≥ −m + 1. Again R is Noetherian and I = (X1 , . . . , Xm ) is an ideal in R. So by [5, Lemma 6.2], AssR M = {P ∈ AssR M | P + (X)}. Γ(X) (M ) Set M = M/Γ(X) (M ). Note if P ∈ AssR M then P is homogeneous. Now by Lemma 5.1 we get M is countably generated R-module and hence by Lemma 5.5 it follows that AssR M is a countable set. Notice C = K[X1 , . . . , Xm ] ⊂ R is a sub-ring. So by Proposition 5.8 we have AssC M = AssR M ∩ C. Thus for any Q ∈ AssC M then there exists some P ∈ AssR M such that Q = P ∩ C and hence Q is homogeneous. Also as AssR M is a countable set so is AssC M . Now GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES 13 S for any P ∈ AssR M we have P ∩ C1 ( C1 . Denote H = P ∈AssR M P ∩ C1 . Since K is uncountable so H ( C1 . Thus there exists some η ∈ C1 − H. Now η = b1 X1 + · · · + bm Xm ∈ K[X1 , · · · , Xn ] is a non-zero divisor on M . Thus ·η Mj → Mj+1 is an injective map for all j ≥ −m + 1. By Proposition 4.5 we have Γ(∂) (M )j = 0 for all j ≤ −m. Now we have a short exact sequence 0 → Γ(∂) (M ) → M → M/Γ(∂) (M ) → 0. Therefore Mj =  M/Γ(∂) (M ) j for all j ≤ −m. Again S is Noetherian and I = (∂1 , . . . , ∂m ) is an ideal in S. So by [5, Lemma 6.2], AssS M = {P ∈ AssS M | P + (∂)}. Γ(∂) (M ) Set M = M/Γ(∂) (M ). Note if P ∈ AssS M then P is homogeneous. Since M is a countably generated R-module so by Lemma 5.7 we have M is a countably generated S-module. Then by Lemma 5.1 we get M is a countably generated S-module. So by Lemma 5.5 it follows that AssS M is a countable set. Notice T = K[∂1 , . . . , ∂m ] ⊂ S is a sub-ring. So by Proposition 5.8 we have AssT M = AssS M ∩ T . Thus for any Q ∈ AssT M then there exists some P ∈ AssS M such that Q = P ∩ T and hence Q is homogeneous. Also as AssS M is a countable set soSis AssT M . Now for any P ∈ AssS M we have P ∩ T−1 ( T−1 . Denote H = P ∈AssS M P ∩ T−1 . As K is uncountable so H ( T−1 . Thus there exists some ξ ∈ T−1 − H. Now ξ = a1 ∂1 + · · · + am ∂m ∈ K[∂1 , . . . , ∂m ] is a non-zero divisor on ·ξ M . Thus Mj → Mj−1 is an injective map for all j ≤ −m.  As a consequence of Proposition 5.9 we get the following results. Corollary 5.10. Let K be uncountable. Let T be a graded Lyubeznik functor on L Mod(R) and set M = T (R) = n∈Z Mn . Then there exists some homogeneous ·η element η ∈ K[X1 , . . . , Xm ] of degree 1 such that Mi → Mi+1 is an injective map for all i ≥ −m + 1 and some homogeneous element ξ ∈ K[∂1 , . . . , ∂m ] of degree −1 ∗ ·ξ such that Mi → Mi−1 is an injective map for all i ≤ −m. Proof. By Lemma 5.4 we have M is a countably generated R-module. Moreover, by Theorem 3.2 we have M is a generalized Eulerian Am (A)-module. So the result follows from Proposition 5.9.  L Corollary 5.11. Let K be uncountable. Let M = i∈Z Mi be a countably generated R-module and a generalized Eulerian Am (A)-module. If M 6= 0 then Mj 6= 0 for infinitely many j ≫ 0 OR Mj 6= 0 for infinitely many j ≪ 0. Proof. Suppose if possible there exists r ≥ −m + 1 such that Mr 6= 0 and Mn = 0 for all n > r. But by Lemma 5.9 there exists some homogeneous element η ∈ ·η K[X1 , . . . , Xm ] of degree 1 such that Mi → Mi+1 is an injective map for all i ≥ ·η −m + 1. In particular, we have an injective map Mr → Mr+1 . Thus Mr+1 6= 0, a contradiction. Again let if possible there exists s ≤ −m such that Ms 6= 0 and Mn = 0 for all n < s. But by Lemma 5.9 there exists some homogeneous element ξ ∈ K[∂1 , . . . , ∂m ] ·ξ of degree −1 such that Mi → Mi−1 is an injective map for all i ≤ −m. In particular, ·ξ we have an injective map Ms → Ms−1 . Thus Ms−1 6= 0, a contradiction.  14 TONY J. PUTHENPURAKAL AND SUDESHNA ROY L Corollary 5.12. Let K be uncountable. Let M = i∈Z Mi be a countably generated R-module and a generalized Eulerian Am (A)-module. Then Mn0 6= 0 for some n0 ≥ −m + 1 =⇒ Mn 6= 0 for all n ≥ n0 , Mn0 6= 0 for some n0 ≤ −m =⇒ Mn 6= 0 for all n ≤ n0 . Proof. By Corollary 5.10 there exists some degree 1 homogeneous element η ∈ η K[X1 , . . . , Xm ] such that Mi → Mi+1 is an injective map for all i ≥ −m + 1. In ·η particular, for n0 ≥ −m + 1 we have an injective map Mn0 → Mn0 +1 and hence Mn0 +1 6= 0. Proceeding similarly we get Mn 6= 0 for all n ≥ n0 . Furthermore by Corollary 5.10 there exists some homogeneous element ξ ∈ ·ξ K[∂1 , . . . , ∂m ] of degree −1 such that Mj → Mj−1 is an injective map for all ·ξ j ≤ −m. In particular, for n0 ≤ −m we have an injective map Mn0 → Mn0 −1 and hence Mn0 −1 6= 0. Proceeding similarly we get Mn 6= 0 for all n ≤ n0 .  6. Vanishing and Tameness 6.1. Key fact: Let A be a commutative Noetherian ring containing a field K of characteristic zero. Let R = A[X1 , . . . , Xm ] be standard graded with deg A = 0 and deg Xi = 1Lfor all i. Let T be a graded Lyubeznik functor on ∗ Mod(R) and set M = T (R) = n∈Z Mn . For convenience we have to assume K is uncountable. If this is not the case, then consider the flat extension A → A[[Y ]]Y . Set B = A[[Y ]]Y . Then by [7, Remark 3.1, Proposition 3.2] we have B contains a uncountable field K[[Y ]]Y and B is a faithfully flat extension of A. Set S = B[X1 , . . . , Xm ] and N = M ⊗R S. Now by Lemma 5.4 we have M is a countably generated R-module. So N is a countably generated S-module. Furthermore the flat extension A → A[[Y ]]Y induces a flat homomorphism R → S. By Sub-section 2.5 we get T ⊗R S is a graded Lyubeznik functor on ∗ Mod(S). Set Tb = T ⊗R S. Notice N = Tb (S) = M ⊗R S = L M ⊗A B = n∈Z (Mn ⊗A B). Since B is a faithfully flat extension of A so we have M = 0 if and only if N = 0 and Mn = 0 if and only if Mn ⊗A B = 0. Vanishing of the components plays a crucial role in the study of the graded local cohomology. We first prove the following result. Theorem 6.2. Let A be a commutative Noetherian ring containing a field K of characteristic zero. Let R = A[X1 , . . . , Xm ] be a standard graded with deg A = 0 and deg Xi = L 1 for all i. Let T be a graded Lyubeznik functor on ∗ Mod(R) and set M = T (R) = n∈Z Mn . If Mn = 0 for all |n| ≫ 0 then M = 0. Proof. By the above discussion it is enough to prove the result considering K is uncountable. Moreover by Theorem 3.2 we have M is a generalized Eulerian Am (A)module. Therefore if M 6= 0 then by Corollary 5.11 we have Mj 6= 0 for infinitely many j ≫ 0 OR Mj 6= 0 for infinitely many j ≪ 0, a contradiction.  The following result shows that T (R) is tame. Theorem 6.3. Let A be a commutative Noetherian ring containing a field K of characteristic zero. Let R = A[X1 , . . . , Xm ] be a standard graded with deg A = 0 and deg Xi = L 1 for all i. Let T be a graded Lyubeznik functor on ∗ Mod(R) and set M = T (R) = n∈Z Mn . Then Mn0 6= 0 for some n0 ≥ −m + 1 =⇒ Mn 6= 0 for all n ≥ n0 , Mn0 6= 0 for some n0 ≤ −m =⇒ Mn 6= 0 for all n ≤ n0 . GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES 15 Proof. Similarly as Theorem 6.2 it is enough to prove the result considering K is uncountable. Furthermore, by Theorem 3.2 we have M is a generalized Eulerian Am (A)-module. So by Corollary 5.12 we get Mn0 6= 0 for some n0 ≥ −m + 1 =⇒ Mn 6= 0 for all n ≥ n0 , Mn0 6= 0 for some n0 ≤ −m =⇒ Mn 6= 0 for all n ≤ n0 . The result follows.  7. Rigidity We first show the following result. L Theorem 7.1. Let M = n∈Z Mn be a generalized Eulerian Am (A)-module. Then (I) The following conditions are equivalent: (a) Mn 6= 0 for infinitely many n < 0. (b) There exists r such that Mn 6= 0 for all n ≤ r. (c) Mn 6= 0 for all n ≤ −m. (d) Ms 6= 0 for some s ≤ −m. (II) The following conditions are equivalent: (a) Mn 6= 0 for infinitely many n ≥ 0. (b) There exists s such that Mn 6= 0 for all n ≥ s. (c) Mn 6= 0 for all n ≥ 0. (d) Mt 6= 0 for some t ≥ 0. Proof. (I) Clearly (c) =⇒ (b) =⇒ (a) =⇒ (d). We only have to prove (d) =⇒ (c). We will do this by induction on m. We first assume m = 1. Consider the exact sequence (7.1.7) ∂ 1 Mj → H0 (∂1 ; M )j → 0. 0 → H1 (∂1 ; M )j → Mj+1 −→ Since M is a generalized Eulerian Am (A)-module so by Proposition 3.7, we get that Hl (∂1 ; M ) is concentrated in degree −1 for l = 0, 1. Thus by exact sequence (7.1.7) it follows that Mj ∼ = M−1 for all j ≤ −2. ∼ Ms 6= 0 for all j ≤ −1. Hence Mj = We now assume that m ≥ 2 and the result is proved for m − 1. Consider the exact sequence (7.1.8) ∂ m Mj → H0 (∂m ; M )j → 0. 0 → H1 (∂m ; M )j → Mj+1 −→ By Proposition 3.5 we get Hl (∂m ; M )(−1) is a generalized Eulerian Am−1 (A)module for l = 0, 1. We consider the following three cases: Case 1: H0 (∂m ; M )(−1)j 6= 0 for some j ≤ −m + 1. By induction hypothesis it follows that H0 (∂m ; M )(−1)j 6= 0 for all j ≤ −m + 1. Hence H0 (∂m ; M )j 6= 0 for all j ≤ −m. So by exact sequence (7.1.8) we get that Mj 6= 0 for all j ≤ −m. Case 2: H1 (∂m ; M )(−1)j 6= 0 for some j ≤ −m + 1. By induction hypothesis it follows that H1 (∂m ; M )(−1)j 6= 0 for all j ≤ −m + 1. Hence H1 (∂m ; M )j 6= 0 for all j ≤ −m. So by exact sequence (7.1.8) it follows that Mj+1 6= 0 for all j ≤ −m which implies Mj 6= 0 for all j ≤ −m + 1. Thus Mj 6= 0 for all j ≤ −m. Case 3: Hl (∂m ; M )(−1)j = 0 for l = 0, 1 and for ALL j ≤ −m + 1. 16 TONY J. PUTHENPURAKAL AND SUDESHNA ROY By exact sequence (7.1.8) it follows that Mj ∼ = M−m+1 for all j ≤ −m+1. Hence Mj ∼ = Ms 6= 0 for all j ≤ −m. (II) Clearly (c) =⇒ (b) =⇒ (a) =⇒ (d). We only have to prove (d) =⇒ (c). To do this we use induction on m. We first assume m = 1. Consider the exact sequence (7.1.9) X 1 Mj → H0 (X1 ; M )j → 0. 0 → H1 (X1 ; M )j → Mj+1 −→ Since M is a generalized Eulerian Am (A)-module so by Proposition 3.8, we get that Hl (X1 , M ) is concentrated in degree 0 for l = 0, 1. Thus by the exact sequence (7.1.9) it follows that Mj ∼ = M0 for all j ≥ 0. ∼ Hence Mj = Mt 6= 0 for all j ≥ 0. We now assume that m ≥ 2 and the result is proved for m − 1. Consider the exact sequence (7.1.10) X m Mj → H0 (Xm ; M )j → 0. 0 → H1 (Xm ; M )j → Mj−1 −→ By Proposition 3.6 we have Hl (Xm ; M ) is a generalized Eulerian Am−1 (A)-module. We consider the following three cases: Case 1: H0 (Xm ; M )j 6= 0 for some j ≥ 0. By induction hypothesis we get H0 (Xm ; M )j 6= 0 for all j ≥ 0. So by exact sequence (7.1.10) it follows that Mj 6= 0 for all j ≥ 0. Case 2: H1 (Xm ; M )j 6= 0 for some j ≥ 0. By induction hypothesis We get H1 (Xm ; M )j 6= 0 for all j ≥ 0. So by exact sequence (7.1.10) it follows that Mj−1 6= 0 for all j ≥ 0, and hence Mj 6= 0 for all j ≥ −1. Thus the result follows. Case 3: Hl (Xm ; M )j = 0 for l = 0, 1 and for ALL j ≥ 0. By exact sequence (7.1.10) we get Mj ∼ = Mt 6= 0 = M−1 for all j ≥ 0. Hence Mj ∼ for all j ≥ 0.  Corollary 7.2. Let A be a commutative Noetherian ring containing a field of characteristic zero. Let R = A[X1 , . . . , Xm ] be standard graded with deg A = 0 and ∗ deg Xi = 1 for Lall i. Let T be a graded Lyubeznik functor on Mod(R) and set M = T (R) = n∈Z Mn . Then (I) The following conditions are equivalent: (a) Mn 6= 0 for infinitely many n < 0. (b) There exists r such that Mn 6= 0 for all n ≤ r. (c) Mn 6= 0 for all n ≤ −m. (d) Ms 6= 0 for some s ≤ −m. (II) The following conditions are equivalent: (a) Mn 6= 0 for infinitely many n ≥ 0. (b) There exists s such that Mn 6= 0 for all n ≥ s. (c) Mn 6= 0 for all n ≥ 0. (d) Mt 6= 0 for some t ≥ 0. Proof. By [4, 3.2(2)] and [4, Theorem 3.6] we have T (R) is a graded generalized Eulerian Am (A)-module. Therefore by Theorem 7.1, T (R) satisfies properties (I) and (II).  We now prove the following crucial result. GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES 17 L Theorem 7.3. Let M = n∈Z Mn be a generalized Eulerian Am (A)-module. If m ≥ 2, then the following assertions are equivalent: (i) Mn 6= 0 for all n ∈ Z. (ii) There exists r with −m < r < 0 such that Mr 6= 0. Proof. (i) =⇒ (ii) is clear. We only have to prove (ii) =⇒ (i). We use induction on m. Let m = 2. Then we have M−1 6= 0. Claim 1: Mi 6= 0 for infinitely many i ≤ 0. Proof. Suppose if possible Claim 1 is false. Then by Theorem 7.1 we get Mi = 0 for all i ≤ −2. Now we have exact sequence (7.3.11) ∂ 2 Mi → H0 (∂2 ; M )i → 0. 0 → H1 (∂2 ; M )i → Mi+1 −→ Therefore Hl (∂2 ; M )i = 0 for all i ≤ −3 and l = 0, 1. Moreover, by Proposition 3.5 we have Hl (∂2 ; M )(−1) is a generalized Eulerian A1 (A)-module. Therefore by Theorem 7.1 it follows that Hl (∂2 ; M )(−1)i = 0 for all i ≤ −1 and hence Hl (∂2 ; M )i = 0 for i ≤ −2. From the exact sequence (7.3.11) for i = −2, we get M−1 ∼ = M−2 = 0 which contradicts our hypothesis. So Claim 1 is correct. Thus by Theorem 7.1, Mi 6= 0 for i ≤ −2. Claim 2: Mi 6= 0 for infinitely many i ≥ 0. Proof. Suppose if possible Claim 2 is false. Then by Theorem 7.1 we get Mi = 0 for all i ≥ 0. Consider the exact sequence (7.3.12) X 2 Mi → H0 (X2 , M )i → 0. 0 → H1 (X2 , M )i → Mi−1 −→ So H1 (X2 , M )i = 0 = H0 (X2 , M ) for all i ≥ 1. Moreover, by Proposition 3.6 we have Hl (X2 , M ) is generalized Eulerian for l = 0, 1. Thus by Theorem 7.1 it follows that Hl (X2 , M ) = 0 for all i ≥ 0. From the exact sequence (7.3.12) for j = 0, we get M−1 ∼ = M0 = 0. This contradicts our hypothesis. So Claim 2 is true. Thus by Theorem 7.1 it follows that Mi 6= 0 for all i ≥ 0. Hence the result is true when m = 2. We now assume m ≥ 3 and the result is known for m − 1. We have Mr 6= 0 for some r with −m < r < 0. We want to show Mi 6= 0 for all i ∈ Z. Claim 3: Mi 6= 0 for infinitely many i ≤ 0. Proof. Suppose if possible Claim 3 is false. Then by Theorem 7.1 we get Mi = 0 for all i ≤ −m. Consider the exact sequence (7.3.13) ∂ m Mi → H0 (∂m ; M )i → 0. 0 → H1 (∂m ; M )i → Mi+1 −→ Therefore Hl (∂m ; M )i = 0 for all i ≤ −m − 1 and for l = 0, 1. Moreover, by Proposition 3.5 we have Hl (∂m ; M )(−1) is a generalized Eulerian Am−1 (A)-module. Thus for l = 0, 1; by Theorem 7.1 it follows that Hl (∂m ; M )(−1)i = 0 for all i ≤ −m + 1 and by induction hypothesis we get that Hl (∂m ; M )(−1)i = 0 for −m + 1 < i ≤ −1. Hence Hl (∂m ; M )i = 0 for i ≤ −2. Now by exact sequence (7.3.13) we get M−1 ∼ = M−m . = M−m+1 ∼ = ··· ∼ = M−2 ∼ 18 TONY J. PUTHENPURAKAL AND SUDESHNA ROY This implies M−m ∼ = Mr 6= 0, a contradiction to our assumption. So Claim 3 is correct. Thus by Theorem 7.1 it follows that Mi 6= 0 for i ≤ −m. Claim 4: Mi 6= 0 for infinitely many i ≥ 0. Proof. Suppose if possible Claim 4 is false. Then by Theorem 7.1 it follows that Mi = 0 for all i ≥ 0. Consider the exact sequence (7.3.14) X m Mi → H0 (Xm ; M )i → 0 0 → H1 (Xm ; M )i → Mi−1 −→ So H1 (Xm ; M )i = 0 = H0 (Xm ; M )i for all i ≥ 1. Moreover, by Proposition 3.6 we have Hl (Xm ; M ) is generalized Eulerian for l = 0, 1. So for l = 0, 1 by Theorem 7.1 it follows that Hl (Xm ; M )i = 0 for all i ≥ 0 and by induction hypothesis we get Hl (Xm ; M )i = 0 for −m + 1 < i < 0. Thus Hl (Xm ; M )i = 0 for i ≥ −m + 2. Now by exact sequence (7.3.14) we get M−m+1 ∼ = M0 . = ··· ∼ = M−1 ∼ = M−m+2 ∼ This implies Mr ∼ = M0 = 0, a contradiction to our hypothesis. So Claim 4 is correct. Thus by Theorem 7.1 it follows that Mi 6= 0 for i ≥ 0. As m ≥ 3 we also have to prove that if c 6= r and −m < c < r then Mc 6= 0. Suppose if possible Mc = 0. We will consider the following two cases: Case 1: c < r. By Proposition 3.6 we have H1 (Xm ; M ) is a generalized Eulerian Am−1 (A)-module. Moreover, by exact sequence (7.3.14) we get H1 (Xm ; M )c+1 = 0. Notice −m + 1 < c + 1 ≤ r < 0 (as −m < c < r). So by induction hypothesis H1 (Xm ; M )i = 0 for −m + 1 < i < 0. Again by exact sequence (7.3.14) we also get H0 (Xm ; M )c = 0. Moreover, by Proposition 3.6 we have H0 (Xm ; M ) is a generalized Eulerian Am−1 (A)-module. We will consider two sub-cases. Sub-case 1.1: −m + 1 < c < r < 0. By induction hypothesis we have H0 (Xm ; M )i = 0 for −m + 1 < i < 0. Thus by exact sequence (7.3.14) we get, M−1 ∼ = M−m+1 . = ··· ∼ = M−m+2 ∼ = M−2 ∼ Hence Mr ∼ = Mc = 0, a contradiction to our hypothesis. Sub-case 1.2: c = −m + 1. We have H0 (Xm ; M )−m+1 = 0. Therefore by induction hypothesis we have H0 (Xm ; M )i = 0 for − m + 1 < i < 0. ∼ Mc = 0, a contradiction So by an argument similar to Sub-case 1.1, we get Mr = to our hypothesis. Thus our assumption is false. Hence Mc = 6 0 for −m + 1 < c < r. Case 2: c > r. By Proposition 3.5 we have H1 (∂m ; M )(−1) is a generalized Eulerian Am−1 (A)module. Moreover, by exact sequence (7.3.13) we get that H1 (∂m ; M )(−1)c = H1 (∂m ; M )c−1 = 0. Notice −m + 1 ≤ r < c < 0 (as −m < r < 0 and −m < c < 0). So by induction hypothesis H1 (∂m ; M )(−1)i = 0 for −m + 1 < i < 0. Thus H1 (∂m ; M ) = 0 for −m < i < −1. GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES 19 Again by exact sequence (7.3.13) we also get H0 (∂m ; M )c = 0. Moreover, by Proposition 3.5 we have H0 (∂m ; M )(−1) is a generalized Eulerian Am−1 (A)-module. We will consider two sub-cases: Sub-case 2.1: c 6= −1. We have −m + 2 < c + 1 < 0 and H0 (∂m ; M )(−1)c+1 = 0. So by induction hypothesis we get H0 (∂m ; M )(−1)i = 0 for −m + 1 < i < 0. Thus H0 (∂m ; M )i = 0 for −m < i < −1. Therefore by exact sequence (7.3.13) we get M−1 ∼ = M−m+1 . = ··· ∼ = M−m+2 ∼ = M−2 ∼ Hence Mr ∼ = Mc = 0, a contradiction to our hypothesis. Sub-case 2.2: c = −1. Then we have H0 (∂m ; M )(−1)0 = 0. So by induction hypothesis H0 (∂m ; M )(−1)i = 0 for −m + 1 < i < 0 and hence H0 (∂m ; M )i = 0 for −m < i < −1. Therefore by an argument similar to Sub-case 2.1, we get Mr ∼ = Mc = 0, a contradiction to our hypothesis. Thus our assumption is false. Hence Mc 6= 0 for r < c < 0. The result follows.  An important consequence of the Theorem 7.3 is the following. Corollary 7.4. Let A be a commutative Noetherian ring containing a field of characteristic zero. Let R = A[X1 , . . . , Xm ] be standard graded with deg A = 0 and ∗ deg Xi = 1 for Lall i. Let T be a graded Lyubeznik functor on Mod(R) and set M = T (R) = n∈Z Mn . If m ≥ 2, then the following assertions are equivalent: (i) Mn 6= 0 for all n ∈ Z. (ii) There exists r with −m < r < 0 such that Mr 6= 0. Proof. By [4, 3.2(2)] and [4, Theorem 3.6] we have T (R) is a graded generalized Eulerian Am (A)-module. Therefore by Theorem 7.3, T (R) satisfies the equivalent conditions.  The above result shows that non-vanishing of a single graded component of M = T (R) will assure non-vanishing of its infinitely many graded components. 8. Some examples Let A be a Noetherian ring containing a field K of characteristic zero. Let R = A[X1 , . . . , Xm ] be standard graded with m ≥ 1 and I be a homogeneous ideal L in R. Set M = HIi (R) = n∈Z Mn . In this section we give some examples which show that some results of [4] are false if A is not regular. 8.1. In [4, Theorem 1.7] it is shown that if A is a regular domain and Mn 6= 0 then Mn is NOT finitely generated as an A-module. This is not true in general. i Example. Let (A, m) be a local domain with dimension d such that Hm (A) is finitely i i generated and non-zero for some i < d. Take I = mR. Then HI (R)0 = Hm (A) is non-zero and finitely generated as an A-module. 8.2. In [4, Theorem 1.8] it is shown that if A is a regular ring and P is a prime ideal in A then either or µj (P, Mn ) = ∞ for all n ∈ Z µj (P, Mn ) < ∞ for all n ∈ Z. 20 TONY J. PUTHENPURAKAL AND SUDESHNA ROY This does not hold in general. Example. There exists example of Noetherian local ring (A, m) with HJi (A) having infinite zeroth Bass number over m for some ideal J in A, see L [11] (also see [3, i Chapter 20, Section 5]). Now M = HJR (R) = HJi (A) ⊗A R = n∈N Mn . So in this case µ0 (m, Mn ) = 0 for n < 0 (as Mn = 0) and µ0 (m, Mn ) is infinite for n ≥ 0. 8.3. Assume m = 1. In [4, Theorem 1.9] it is shown that if A is a regular ring and P is a prime ideal in A then µj (P, Mn ) < ∞ for all n ∈ Z. This is not true if A is not regular. Example. In Example 8.2, take m = 1. 8.4. In [4, Theorem S 1.13] it is shown that if A is regular local or a smooth affine K-algebra then n∈Z AssA Mn is a finite set. This is false in general. Example. There exists affine or local ring A such that Ass(HI2 (A)) is an infinite set. For example, take K be an arbitrary field and consider the hypersurface A = K[s, t, u, v, x, y]/(sv 2 x2 − (s + t)vxuy + tu2 y 2 ). 2 Then H(x,y) (A) has infinitely many associated primes, see [3, Example 22.17]. Localization of A at the homogeneous maximal ideal (s, t, u, v, x, y) gives L a local ex2 ample. Take I = (x, y)R. Since M = HI2 (R) = H(x,y) (A) ⊗A R = n∈N Mn so in both cases AssA M0 is infinite. 8.5. In [4, Theorem 1.14] it is shown that if A is regular then injdim Mn ≤ dim Mn for all n ∈ Z. The following example shows that this is not true in general. Example. Let (A, m) be a Noetherian local ring containing a field with dim A > 0 0 0 0 and depth A = 0. Now M = HmR (R) = Hm (A) ⊗A R. Thus M0 = Hm (A) and hence M0 is a finitely generated A-module. If injdim M0 < ∞ then by [2, Corollary 9.6.2] we get A is Cohen-Macaulay, a contradiction. So injdim M0 is infinite. References [1] M. P. Brodmann and R. Y. Sharp, Local cohomology: an algebraic introduction with geometric applications, Cambridge Studies in Advanced Mathematics 60, Cambridge University Press, Cambridge, 2013. [2] J.-E. Björk, Rings of Differential Operators, North-Holland Mathematical Library, Vol. 21, North-Holland Publishing Co., Amsterdam, New York, 1979. [3] S. B. Iyengar, G. J. Leuschke, A. Leykin, C. Miller, E. Miller, A. K. Singh and U. Walther, Twenty Four Hours of Local Cohomology, Graduate Studies in Mathematics, Vol. 87, American Mathematical Society, 2011. [4] T. J. Puthenpurakal, Graded components of local cohomology modules, Preprint: arXiv:1701.01270. [5] T. J. Puthenpurakal, de Rham Cohomology of Local Cohomology Modules, Algebra and its Applications, Springer Proceedings in Mathematics and Statistics, Vol. 174 (2016), 159-181, Springer, Singapore; Editors: S. Rizvi, A. Ali, V. Filippis. [6] T. J. Puthenpurakal, de Rham cohomology of local cohomology modules: The graded case, Nagoya Math. J., Vol. 217 (2015), 1-21. [7] T. J. Puthenpurakal, Associated primes of Local Cohomology Modules over Regular Rings, Pacific Journal of Mathematics, Vol. 282 (2016), No. 1, 233-255. [8] T. J. Puthenpurakal and J. Singh, On derived functors of Graded local cohomology modules, Preprint: arXiv:1612.02968. GRADED COMPONENTS OF LOCAL COHOMOLOGY MODULES 21 [9] L. Ma and W. Zhang, Eulerian graded D-modules, Math. Res. Lett., Vol. 21 (2014), No. 1, 149-167. [10] G. Lyubeznik, Finiteness Properties of Local Cohomology Modules (an Application of Dmodules to Commutative Algebra), Inv. Math., Vol. 113 (1993), 41-55. [11] R. Hartshorne, Affine duality and cofiniteness, Invent. Math., Vol. 9 (1969/1970), 145-164. Department of Mathematics, Indian Institute of Technology Bombay, Powai, Mumbai 400 076, India E-mail address: [email protected] E-mail address: [email protected]
0math.AC
Dynamic Actuator Selection and Robust State-Feedback Control of Networked Soft Actuators arXiv:1804.01615v1 [cs.SY] 4 Apr 2018 Nafiseh Ebrahimi∗,∗∗ , Sebastian Nugroho† , Ahmad F. Taha†,‡ , Nikolaos Gatsis† , Wei Gao∗ , Amir Jafari∗,∗∗ Abstract—The design of robots that are light, soft, powerful is a grand challenge. Since they can easily adapt to dynamic environments, soft robotic systems have the potential of changing the status-quo of bulky robotics. A crucial component of soft robotics is a soft actuator that is activated by external stimuli to generate desired motions. Unfortunately, there is a lack of powerful soft actuators that operate through lightweight power sources. To that end, we recently designed a highly scalable, flexible, biocompatible Electromagnetic Soft Actuator (ESA). With ESAs, artificial muscles can be designed by integrating a network of ESAs. The main research gap addressed in this work is in the absence of system-theoretic understanding of the impact of the realtime control and actuator selection algorithms on the performance of networked soft-body actuators and ESAs. The objective of this paper is to establish a framework that guides the analysis and robust control of networked ESAs. A novel ESA is described, and a configuration of soft actuator matrix to resemble artificial muscle fiber is presented. A mathematical model which depicts the physical network is derived, considering the disturbances due to external forces and linearization errors as an integral part of this model. Then, a robust control and minimal actuator selection problem with logistic constraints and control input bounds is formulated, and tractable computational routines are proposed with numerical case studies. I. I NTRODUCTION , B RIEF L ITERATURE R EVIEW, PAPER C ONTRIBUTIONS AND O RGANIZATION The emerging field of soft robotics represents the foundation of future robotic systems with plethora of applications in human-robot interaction, locomotion, and rehabilitation technologies [1]. A crucial component of soft robotics is a soft actuator that is activated to generate desired motions. Unfortunately, there is a lack of actuators in rehabilitation applications that are portable, adoptable to different joint sizes, while still matching the performance of the mammalian muscles in terms of response time and output power-to-size ratio. Consequently, the next generation of soft actuators that achieve assistive functions raises challenges to actuation design and analysis, materials engineering, modeling, and realtime robust control and optimization—the main theme of the proposed research. Motivated by these challenges we have recently designed a bio-inspired highly scalable, flexible, biocompatible Electromagnetic Soft Actuator (ESA) [2] which we explain next. As shown in Fig. 1, a human skeletal muscle with bundles of sarcomeres (composed by actin and myosin) behaves like ‡ Corresponding † Department of author. ∗ Department of Mechanical Engineering. Electrical and Computer Engineering. ∗∗ Advanced Robotic Manipulators (ARM) Lab. All authors are with the University of Texas at San Antonio, 1 UTSA Circle, San Antonio, TX 78249. Emails: {nafiseh.ebrahimi, ahmad.taha, amir.jafari, nikolaos.gatsis, wei.gao}@utsa.edu, [email protected] material is based upon work supported by the National Science Foundation under Grant CMMI-DCSD-1728629. Fig. 1. ExoMuscles: the future of artificial muscles. a network of soft actuators. A network of ESA can be integrated inside an artificial muscle (coined as ExoMuscle) warped around the joints as active braces, mimicking a human muscle. Notably, it is analytically and experimentally confirmed that by scaling down the size of ESA, the ratio between resulting force to cross-section area (F/CSA) of ESA increases [2]. It is essential in obtaining large forces over a relatively small space using ESAs. Latest relevant studies focus either on the design of soft material or the construction of soft actuators into artificial muscles. The main research gap lies in the absence of system-theoretic understanding of the impact of realtime control algorithms on the performance of networked softbody actuators in general, and ESA networks in specific. The objective of this paper is to establish a framework that guide the design, analysis, and robust control of ESA networks forming artificial muscles under uncertainty. Series elastic and variable stiffness actuators (SEA/VSAs) are implemented and designed because of their ability to minimize large forces due to shocks, to safely interact with the user, and their ability to store and release energy in passive elastic elements [3]–[5]. However, they are made of intrinsically rigid components. As a result, they are bulky. Actuators based on shape memory alloys have highly nonlinear behavior, low energy efficiency and low response speed [6], despite their advantages that include high power to weight ratio, mechanism simplicity, silent actuation, and low driving voltage. Pneumatic artificial muscles [7], [8] have been vastly used in robotics. However, they require stationary power sources and accessories such as air pump and valves. Dielectric elastomer actuators [9], [10] are popularly referred to as artificial muscles because of their actuation speed, low density, and silent operation. Unfortunately, they demand high operating voltages—preventing their operation with onboard batteries. Another dimension for successful operation of soft robotics in general, and artificial muscles in specific, is the realtime transient control problem which refers to the optimal current injections for each actuator in an networked system—as well as determining the subset of actuators to be activated given a desired motion and maximum input current. To that end, the problem of (a) simultaneously obtaining a minimal actuator subset while (b) designing localized, robust control laws for activated actuators is needed. Unfortunately, this routine of actuator selection and robust control is known to be a combinatorial, NP-hard problem. To address this challenge, various quantitative notions of network controllability and observability have been used [11]–[13] and different techniques that are based on heuristics or simple linear timeinvariant dynamics are presented in [14]–[16]. Little is known about the interplay between actuator selection and the robust control problems with disturbances when maximum input bounds are imposed—for generic dynamic systems as well as for networked soft-body actuators. In this paper, we focus on addressing this gap which transcends ExoMuscles, and can be applied to various soft robotics. The paper contributions and organization are as follows. • The novel ESA and its properties are described, and a configuration of soft actuator matrix to resemble artificial muscle fiber is presented (Section II). This is followed by the derivation of a physical network model of soft actuators. Disturbances due to external forces and linearization errors are considered as an essential part of the model (Section III). • A robust control and minimal actuator selection problem formulation with actuator constraints and maximum input voltage bounds is investigated in Section IV. This formulation can be written as a nonconvex optimization problem with mixed-integer nonlinear matrix inequalities. To address the computational difficulties in solving this routine, tractable routines are explored in Section V and VI. • Numerical tests are presented in Section VII showing the performance of the relaxations. The results suggest that network of ESAs can be robustly controlled with a subset of available actuators, while still yielding reasonable energy and stability performance. II. S OFT ACTUATOR AND S YSTEM C ONFIGURATION A. Electromagnetic Soft Actuator (ESA) Components Fig. 2 shows the electromagnetic soft actuator we recently designed [2] and its components. It is made of biocompatible and magnetically permeable soft silicone that surrounds the copper wire coils and a soft silicone-ferromagnetic core. This actuator is made mostly of silicone rubber so that it can have low stiffness. The major components of the soft actuator include helical coil, soft silicone ferromagnetic core, inner layer, spring linkage and outer layer. The helical coils are made of 100 turn of 34 American wire gauge copper. The outer layer of ESA which is included to shield and boost the resultant magnetic field consists of a mixture of 40% iron oxide and 60% silicone rubber. This part is included to make a layer of electromagnetic suspension to strengthen the generated field and increase the force. Fig. 2. Intrinsically soft electromagnetic actuator composed of two wire coils located on both sides of silicone spring linkage and a soft siliconeferromagnetic core inside the coils having a clearance fit respect to them. B. Electromagnetic Soft Actuator Test Setup Two helical coils are embedded in silicone rubber and powered having a variable input between 0 and 12 Volts to control the force and position of the soft actuator. The helical coil provides the electromotive force of the soft actuator by the reaction of magnetic field to the current passing through it. The produced magnetic field causes the helical coil to react to magnetic field from a permanent magnet core fixed to the soft actuators frame, thereby provides expansion/contraction to the ESA. The spring linkage is the system that provides the elongation for the soft actuator as the electromotive force is axially applied. Moreover, there are some electrical components and circuitry including: main power switch, power supply, voltage regulator, the Arduino Mega Microcontroller, H-bridge and the soft actuator to facilitate our design and test implementation. In order to obtain the generated force by ESA, force measurements were conducted at various voltages by means of a load cell. The soft actuator was fixed horizontally so that it could push against the load cell as voltage applied. The load cell is fixed using some clamps so that it stayed stationary. The force measurements were taken at various voltages and presented in Fig. 3. The relationship between the voltage and force is assumed to be linear for simplicity F (t) ≈ 0.0146V (t) − 0.0088. (1) This experimental part in the paper is needed for any ESA used to obtain the slop of the above curve. The verification of the relationship between the input force and voltage is essential in yielding a tractable computational framework instead of a nonlinear model that would further complicate the analysis and design of robust control methods with disturbances. The next section presents an aggregate statespace model for networked ESAs that extends to networked soft-body actuators. III. S TATE -S PACE M ODELING FOR E XO M USCLES The scalability of the actuator allows us to exert greater force from a brace with specific dimensions by embedding of spring linkage. Each actuator connected to the next one through another spring (k2 ) and damper (c2 ). Fig. 4 depicts the schematic mass-spring-damper model of a 2-by-4 matrix of mass-spring-damper networks. In each column of the matrix, the two masses of each actuator are attached to the subsequent ones. This structure resembles the actual muscle mechanism since there are columns of myosin and actin— akin to our proposed configuration. The motion dynamics of the ExoMuscle are Force vs. Voltage 0.2 Force (N) 0.15 0.1 0.05 ẋ(t) = Ax(t) + Bu u(t) + Bd d(t), 0 0 2 4 6 8 10 12 Voltage (V) Fig. 3. Electromagnetic soft actuator generated force due to applying voltage to the coils caused interaction between the ferromagnetic core and magnetized coils. Fig. 4. Network with limited number of ESAs Forming ExoMuscles. more smaller soft actuator cells in a constant volume of the brace. Our proposed structure for the ExoMuscle is a matrix of several ESA actuators. Every single actuator is generating a partial force by means of applying voltage. As a result, the total generated force of the array also is controllable by the voltage. Our suggested model resembles the structure and function of human muscle components. We consider the actuator as building blocks in developing simulated artificial muscle fiber. Fig. 1 illustrate that a human skeletal muscle is composed of several longitudinal muscle fibers. Each muscle fiber can then be further broken down into smaller myofibers, which themselves are serial chains of sarcomeres. Each sarcomere is composed of parallel arrangement of muscle actuation units Actin and Myosin. Following the same fashion, we first built the sarcomere part of our model by arranging bunch of soft actuators in parallel. Then, by connecting the modeled artificial sarcomeres in series and through silicone spring linkage which also modeled by spring and damper, we constructed an array representing artificial fibers. It is notable that the ExoMuscles would be the combination of artificial fibers in different arrangements and textures and would be used as active braces for rehabilitation and assistive application. To achieve the analytical model of the proposed exo-muscle, firstly, we model each ESA with the typical system of mass, spring damper as shown in Fig. 4. Each soft actuator can be modeled by two masses (m) representing two conductive coils, one spring (k1 ) and one damper (c1 ) simulating the behavior (2) where x(t) ∈ R2rc=nx is the state-vector collecting all the deflection and velocities of each mass-spring subsystem; u(t) ∈ Rrc=nu collects all the input forces (or current injections) of all ESAs in the ExoMuscle; d(t) ∈ Rrc=nd includes the disturbances from external forces; A, Bu and Bd are a function of the parameters of the ExoMuscles, as well as the configuration which we discussed in the previous sections. In short, the ExoMuscle has nx states, nu control inputs (N = nu /2 ESAs), and nd external disturbances that are naturally matched by the control input. We give a concrete example of a network of two series ESAs; the dynamics of ESAs can be written as mẍ1 (t) = −(k1 + k2 )x1 (t) − (c1 + c2 )ẋ1 (t) + k1 x2 (t) + c1 ẋ2 (t) + F1 (t) + F1ex (t) (3a) mẍ2 (t) = k1 x1 (t) − (k1 + k2 )x2 (t) + k2 x3 (t) + c1 ẋ1 (t) − (c1 + c2 )ẋ2 (t) + c2 ẋ3 (t) + F1 (t) + F1ex (t) (3b) mẍ3 (t) = k2 x2 (t) − (k1 + k2 )x3 (t) + k1 x4 (t) + c2 ẋ2 (t) − (c1 + c2 )ẋ3 (t) + c2 ẋ4 (t) + F2 (t) + F2ex (t) (3c) mẍ4 (t) = k1 x3 (t) − (k1 + k2 )x4 (t) + k2 x5 (t) + c1 ẋ3 (t) − (c1 + c2 )ẋ4 (t) + c2 ẋ5 (t) + F2 (t) + F2ex (t) (3d) where k1 and c1 are the stiffness and damping coefficients between two masses of one actuator and k2 and c2 are the stiffness and damping coefficients between two ESAs; xi (t) denote the deflection; F1,2 (t) are the generated forces via applying voltage to the first and second coils of first actuator ex (that we wish to solve for); F1,2 (t) are the unknown, yet matched external forces and disturbances. The next section investigates novel methods that optimally determine the combination of time-varying activated actuators in addition to the optimal input forces (input voltages) for all actuators, while considering worst-case disturbances and uncertainties due to the nature of the ESA networks. It is noteworthy to mention that there are two sources of disturbance in our model. Firstly, the approximation of actual force-voltage graph by a straight line. Secondly, the constant portion of (1) considered as a kind of disturbance inasmuch as the fact that practically in the absence of applied voltage there is no exerted force from soft actuator. IV. ROBUST C ONTROL AND ACTUATOR S ELECTION The previous sections focus on the modeling and the design of output-force maximizing methods for networked soft bodies and ExoMuscles, thereby achieving the high-level objectives of soft robotics. The objective of the remaining of the paper is two-fold. First, to investigate combinatorial optimal control methods that guide the selection of specific actuators for different time-periods under uncertainty and actuator logistic constraints. Second, to simultaneously design local control laws for individual actuators while taking into account bounds on the input energy (maximum input current/voltage) and worst-case disturbance scenarios. The objectives/challenges are coupled, and the theme of these methods is a set of tractable computational methods that explore solutions to the two challenges. A. Robust Control Law and Actuator Selection First, we define Γ ∈ Rnu ×nu to be a diagonal matrix with binary variables Γi that select the optimal actuators, where Γi = 1 if the ith actuator is selected and 0 otherwise. The ExoMuscles dynamics derived in Section III with the timevarying actuator selection in time-period j can be written as ẋ(t) = Ax(t) + Bu Γj u(t) + Bd d(t), (4a) p(t) = Cx(t) + Du(t). (4b) The performance index p(t) is a vector that quantifies the quantities to be minimized where C and D reflect the weights—akin to the linear quadratic regulator cost function. The need for designing a robust control law for various time periods is due to: (a) the need to deactivate actuators to avoiding overheating, (b) the possibility of fatigue which impacts the performance of actuators, and (c) potential damages to actuators which means that these have to be deactivated permanently. Other logistic constraints also justify the need for a time-varying actuator selection with robust control. We solve for variable Γj via this framework which is reflected via the following optimization routine. minimize j j K ,Γ subject to T X kp(t)k∞ j=1 kd(t)k∞ + αΓ trace(Γj ) (5a) (4), u(t) = K j x(t), ku(t)k ≤ umax (5b) Γji ∈ {0, 1}N , Γj ∈ Aj . (5c) Problem (5) minimizes the impact of the worst-case disturbance kd(t)k∞ on the performance index, in addition to the weighted number of activated actuators (weight is αΓ ). The constraints are the uncertain physics-based dynamics, the state-feedback controller through time-varying gain K j which is fortunately possible through soft sensors and dynamic state estimation methods, input-voltage budget constraints umax , binary constraints on the actuator selection, and logistic constraints Γj ∈ Aj as described above. We do not elaborate on soft sensors and the observability of the dynamic system here, but we assume that the states are available. Since soft sensors cannot measure all the states of the ExoMuscle, a simple state estimator can be used to obtain x̂(t), the estimate of x(t). The input constraints can be considered on the maximum available input voltage, whereas the logistic constraints represent simple actuator-based rules for various time-periods. The optimization problem (5) is a very challenging combinatorial, non-convex optimization problem. B. Problem Formulation Using the notion of L∞ -stability of LTI systems under disturbances from [17], we can show that Problem (5) can be written as an optimization problem with mixed-integer nonlinear matrix inequalities (MI-NMI). Assuming that the initial conditions are x0 and that kd(t)k∞ ≤ ρ, then, if there exist real matrices P = P >  0 and Y , binary diagonal matrix Γ, and scalars {µ0 , µ1 , µ2 } > 0 for all time-periods that are the solution to optimization problem (6) (given in the next page) with optimal value f ∗ , then the time-varying, adaptive feedback controller u(t) = K j x(t) with K j = −Y j (P j )−1 guarantees that  q j j j µ0 µ1 + µ2 , ∀j kp(t)k2 ≤ µρ, µ = max and that the closed loop system with unknown inputs with the selected actuators is L∞ -stable with performance level∗ µ with minimal number of actuators. We have recently analytically proved that (6) is in fact an accurate representation of (5); the proof is not presented in here, and left for an extended version of this manuscript† . This formulation implies that regardless of the disturbance that the system is subject to, then the performance index remains within a neighborhood of the origin (or the final desired state) with the the best performance index µ. Unfortunately, the optimization routine (6) is challenging to solve due to the MI-NMIs. Section V outlines efficient computational methods to bound the optimal value f ∗ of (6). V. M ETHODS TO B OUND THE S OLUTION OF (6) This section is dedicated to develop numerical computing methods that, in general, solve nonconvex optimization problems with MI-NMIs and in specific, robust control with actuator selection for uncertain soft-body dynamics (4). A. Approach 1: Relaxing The Integer Constraints The first approach is based on relaxing the integer constraints Γ ∈ {0, 1} to Γ ∈ [0, 1]. This approach is common in various problems where integer variables appear in nonlinear and linear optimization [18]–[20]. Later in this section, we discuss a simple approach to recover the integer variables from the real, continuous solutions. Given this relaxation, and after removing the dependence on time-period j simplicity, Problem (6) becomes nonconvex problem with bilinear matrix inequalities (BMI) that can be written as L∗ = minimize µ0 µ1 + µ2 + αΓ trace(Γ) subject to (6b), (6c), Γ ∈ [0, 1], Γ ∈ A, (7a) (7b) where L∗ ≤ f ∗ due to the integer relaxation and hence the expansion of the feasible space. BMIs appear in various ∗ The reader is referred to [17] for more the definition of L ∞ stability, but in short this definition entails that the states of the linear system under disturbances are guaranteed to be bounded in a tube centered at the origin of radius µ. † The interested reader can contact the corresponding author for more information related to the derivation. f∗ = T X minimize {P ,Y,µ0 ,µ1 ,µ2 ,α}j µj0 µj1 + µj2 + αΓ trace Γj P j A> + AP j + αP j −Y j> Γj> Bu> − Bu Γj Y j Bd>  j 2 −µ0 ρ x0 −µj1 P j   Bd  0, O −αµj0 I CP j + DY j " 2  u j − max x> 0 ρ2 P  0, j j j −P µ0 Y optimal control and state estimation problems in dynamic systems [21], [22]. Various methods have investigated upper bounds to optimization problems with BMIs; see [23]. However, these methods have a widely acknowledged limitation: they offer no intuition or direction on recovering the optimal solution (unless costly, inefficient global optimization is used) to nonconvex problems with BMIs, that is L∗ in (6). B. Upper Bound on L∗ (6a) j=1  subject to    O −µj2 I O  P j C > + Y j> D > 0 O −I (6b) # µ0 Y j>  0, Γji ∈ {0, 1}N , Γj ∈ Aj , j = 1, . . . , T. −µj0 I (6c) approach can be applied to the other bilinearities and the objective function, leading to the approximation of (7) to a convex problem L∗u = min Co (µ0 , µ1 , µ2 ) + αΓ trace(Γ) (9a) s.t. C(P , Γ, Y , µ0 , µ1 ), Γi ∈ [0, 1], Γ ∈ A, (9b) where C(·) collects all the convex approximations of the bilinear terms of the constraints in (7), while Co (·) convexifies the nonconvex terms in the objective function of (7). The explicit form of (7) with all the linear matrix inequalities and constraints is not provided in this paper due to the lack of space. However, following the convex approximation of the first constraint, other approximations can similarly be derived. This problem is solved iteratively, given the linearization points, until a certain stopping criteria is satisfied as described in Algorithm 1—similar to all SCAs. It is noteworthy to mention that such approximations yield desirable convergence properties as discussed in our recent work [24]. Here, we present an approach based on successive convex approximations (SCA) to obtain an upper bound L∗u on L∗ . Before discussing the SCA, we note that (6) has the following BMI terms: −Bu ΓY − Y > Γ> Bu> , µ1 P , µ0 Y , in addition to this nonconvex bilinear part of the objective function µ0 µ1 . We show how the SCA works for the most important bilinearity −Bu ΓY − Y > Γ> Bu> involving the actuator variables, and leave the other BMIs for brevity. First, notice that the aforementioned bilinear term can be written as  > 1 −Bu ΓY − Y > ΓBu> = Bu Γ − Y > Bu Γ − Y > − Algorithm 1 Solving SCA for (9). 2| {z } initialize the bilinear terms, k = 0 P(Γ,Y ) input: MaxIter, tol  > 1 while k < MaxIter do Bu Γ + Y > Bu Γ + Y > . 2| {z } Solve (9) H(Γ,Y ) if |L∗uk − L∗uk−1 | < tol then The term P(Γ, Y ) is convex in Y and Γ, while H(Γ, Y ) break is concave in Y and Γ, and hence its first-order Taylor else approximation is a global over-estimator. Let Γ0 , Y0 be k ←k+1 the linearization point, and let Hl (Γ, Y ; Γ0 , Y0 ) denote the end if linearization of H(Γ, Y ) at the point (Γ0 , Y0 ). It holds that end while H(Γ, Y )  Hl (Γ, Y ; Γ0 , Y0 ) for all Γ0 , Y0 and Γ, Y . The initialization point can be chosen as Γ0 = Inu (that is, all C. Recovering the Integer Variables ESAs are activated). The bilinear terms can now be upper The solutions above generate real, continuous values for bounded and approximated via the actuator selection decision variable Γi ∈ [0, 1]. To obtain   the binary selection, the real actuator selection from the AP + P A> + αP optimal solution of (9) and Algorithm 1 can be ranked in  −Bu ΓY − Y > ΓBu> Bd  > decreasing order. Then, actuators are added up until a closed Bd −αµ0 I   loop system metric is satisfied. Alternatively, all actuators AP + P A> + αP with Γreal ≥ 0.5 can be activated. This approach yields i  +0.5(Hl + P) Bd  = C1 (P , Γ, Y , µ0 ). (8) effective results in highly nonconvex mixed-integer nonlinear Bd> −αµ0 I programs [25], [26]. Any solution that we obtain from this Notice that the RHS of (8) is indeed an LMI in terms of approach yields an upper bound U ∗ on f ∗ since the selection P , Γ, Y , and µ0 . Hence C1 (·) is a convex constraint. This will be feasible for the original problem (6). Therefore, Approach 1 yields tight lower and upper bounds on the optimal solution of (6): L∗ ≤ f ∗ ≤ U ∗ . VI. A PPROACH 2: K EEPING THE I NTEGER VARIABLES As a departure from relaxing the integer constraints, we investigate methods that transform Problem (6) to a mixedinteger semidefinite program (MI-SDP). This is useful as the recent studies [26]–[28] have investigated and developed efficient, open-source solvers to solve MI-SDPs. To see how that can be implemented, we examine the major mixedinteger nonlinear term Ξ = ΓY . Due to the binary and diagonal nature of Γ, we can write Ξi,(a,b) = Γi Zi,(a,b) if Γi = 1 and Ξi,(a,b) = 0 if Γi = 0 for i = 1, . . . , N, a = 1, 2 (each actuator has two control inputs) and b = 1, . . . , nx , This relationship can be equivalently written as |Ξi,(a,b) − Zi,(a,b) | ≤ M (1 − Γi ), |Ξi,(a,b) | ≤ M Γi (10) M is a sufficiently large positive constant; matrix Ξ replaces ΓY in the first matrix inequality (6b) as follows   Bd AP + P A> + αP − Bu Ξ − Ξ> Bu>  0. Bd> −αµ0 I (11) The overall optimization problem using the Big-M method can be written as min T X µj0 µj1 + µj2 + αΓ trace(Γj ) (12a) j=1 −µj1 P j s.t.  O CP j + DY j  O −µj2 I O  P j C > + Y j> D > 0 O −I (12b) (6c), (10), (11). (12c) Considering that α, µ0 , µ1 are all predetermined constants (not variables), then (12) is in fact a MI-SDP with Γ, µ2 , Y , Ξ, and P as the optimization variables. MI-SDPs can be solved via either off-the-shelf and industry-grade solvers or recently developed solver in [27]. Many of these implementations use branch-and-bound to solve MI-SDPs. The user can also choose α, µ0 , µ1 to be variables, but that requires then performing the SCA with the MI-SDP to obtain solutions. VII. N UMERICAL T ESTS In this numerical tests, we demonstrate the applicability of the proposed method to the networked of artificial muscles consisting of 8 actuators, where each actuator has 6 rows of mass-spring systems. With this particular configuration,  > > the state vector can be express as x(t) = x> p (t) xv (t) where the vectors xp (t) ∈ R16 and xv (t) ∈ R16 respectively collect the states of position and velocity of the whole system. The state space of the system is of the form ẋ(t) = Ax(t) + Bu u(t) + Bd d(t), p(t) = Cx(t) + Du(t) where A depicts the network of ESAs described in (3) with parameters m = 2.94 × 10−3 kg, k = 0.343 N/m, c = 1.75×10−16 N · s/m . The mass of each coil is obtained by measurement. Stiffness of the silicone rubber linkage is achievable according to its 100% Modulus, average cross section and length using Hook’s Law. Damping coefficient is assumed to be very small [29]. The remaining state-space matrices are specified as follows     0.01 × I8 C = 0.1 × I16 O16×16 , D = . O8×8 A sinusoidal signal is chosen to simulate the disturbance, which is represented as d(t) = cos(0.1t) with kd(t)k∞ = 2.8284. The numerical tests are performed by assuming zero initial conditions within a timespan of tspan = [0, 60] sec. For simplicity, we solve the problem in one time period only, that is j = 1 and leave the multi-time period numerical tests for extensions of this work. All numerical tests are performed using MATLAB R2017b running on a 64-bit Windows 10 with 2.5GHz Intel Core i7-6500U CPU and 8 GB of RAM. The details of the numerical tests are grouped into three following sections: (Scenario A) We show the results for the L∞ control problem without actuator selection, to test the robustness of the system with a full set of 8 actuators; (Scenario B) We solve the SCA followed by the slicing algorithm discussed in Section V; (Scenario C) We solve the formulation based on MI-SDPs shown in Section VI. Scenarios B and C return a specific feedback gain matrix K ∗ = Y ∗ (P −1 )∗ and Γ∗ as the computed actuator selection. YALMIP [30] and MOSEK [31] are used to solve all of the optimization problems. A. Results for Different Optimization Methods We do not list all of the specific details and parameters in the implementation of the SCAs. However, all the codes used to run the numerical tests are available upon request by contacting the corresponding author. 1) Scenario A: Here, we put our interest to find the best performance index of the system with full set of 8 actuators. Since the problem involves BMIs, we solve the SCA formulation of (6) by setting Γ = I. The initialization of SCA is performed by setting umax = 250 (which is much larger that what controllers require), α = 10−3 , µ0 = 30, and µ1 = 4. Since the SCA requires a starting point that lies inside the relative interior of the feasible set, then we define a constant 1 = 10−4 such that all the LMIs in (6) are  −1 I, which is common in these studies [23], [24]. For the SCA iterations, we follow Algorithm 1 with stopping criteria specified by maximum number of iterations, that is set to be 50, and convergence of the objective function defined by |L∗uk − L∗uk−1 | ≤ 10−2 . Table I illustrates the values achieved in this scenario √ for α, µ = µ0 µ1 + µ2 which is the performance level of the Pclosed loop system, the computational time ∆t(sec), and i Γi (the total number of activated actuators). Fig. 5a depicts the system performance in terms of the norm of the disturbance signal d(t), the state x(t), and the performance vector p(t). TABLE I N UMERICAL RESULTS FOR THE THREE SCENARIOS : (A) F ULLY ACTUATED SYSTEM , (B) M INIMALLY ACTUATED SYSTEM VIA CONVEX PROGRAMMING , (C) M INIMALLY ACTUATED SYSTEM VIA THE MI-SDP. Scenario (A) (B) (C) α 0.169 0.104 0.100 µ 0.44 0.62 0.63 P i 8 3 2 Γi ∆t(s) 58.3 189.9 74.4 Diag(Γ) {1, 1, 1, 1, 1, 1, 1, 1} {0, 0, 0, 0, 1, 0, 1, 1} {0, 0, 0, 1, 0, 0, 0, 1} 2) Scenario B: In this scenario, we use the same parameters as those in Scenario A. First, an optimal solution is computed from (9) and Algorithm 1. Next, based on the output of Algorithm 1, an integer solution is computed via a simple slicing algorithm as discussed in Section V-C. The numerical results are shown in Scenario B of Table I, whereas the comparison between performance index and disturbance is shown in Fig. 5-b. 3) Scenario C: In this particular test, the user can define α, µ0 , µ1 to be variables, but that requires then performing the SCA with the MI-SDP to obtain solutions. Alternatively, we can predefine these variables to be constants. To that end, we use values similar to the solutions of Scenario B. The values are α = 0.1 , µ0 = 1, and µ1 = 0.4, with big-M constant M = 103 ; see (10). The MI-SDP is solved through YALMIP’s branch-and-bound algorithm. The results of this test are shown in Table I and Fig. 5-c. B. Discussion and Insights The following preliminary conclusions are drawn from the experiments. • Scenario A uses all actuators. Consequently, it should provide the user with the best performance index µ in comparison with the other scenarios. This is corroborated by the numerical experiments; see Table I. • In Scenario B, a suboptimal solution of the actuator selection is given. In this scenario, the system only needs 3 actuators to be activated with performance index µ comparable to the one in Scenario A. The selection of actuator can be seen in Scenario B of Table I. This illustrates an interesting observation: similar performance index µ can be obtained with fewer number of actuators. • In Scenario C, the MI-SDP approach gives the least number of active actuators with computational time similar to that of Scenario A and performance index slightly worse than that of Scenario B; see ∆t(s) and µ in Table I. The specific actuator selection of actuator is shown in Table I. • The comparison of the input norm ||u(t)|| which measures the energy of the control input (the voltage) is depicted in Fig. 6 for the three scenarios. The results illustrate that the one with fewest number of actuators (Scenario C) requires much bigger input energy during the first 20 seconds in comparison with Scenario A or B that utilizes more active actuators. The control input norm for Scenarios A and B are comparable, although the latter tends to be bigger due to the utilization of fewer actuators. This presents another interesting observation: fewer actuators can be activated while not requiring much more input energy and also maintaining a comparable performance index. • Fig. 7 illustrates the trajectory of the first state x1 (t) for all scenarios. We can see that the damping of the oscillation of x1 (t) for Scenario C is better than those of Scenario A or B. This happens because Scenario C uses more input energy to control the states, compared with the other scenarios. VIII. S UMMARY AND C ONCLUSIONS The objective of this paper is to establish a framework that guides the design, analysis, and robust control of softbody and ESA networks under uncertainty. A novel ESA is described, and a configuration of soft actuator matrix to resemble artificial muscle fiber is presented. A mathematical model which depicts the physical network is derived, considering the disturbances due to external forces and linearization errors as an integral part of this model. Combinatorial optimal control problems for uncertain dynamic ExoMuscles with actuator selection are formulated. To address the computational complexity, efficient computational routines are formulated based on convex programming and mixed-integer convex programming. Numerical tests show a promising simulated performance. Future work will focus on implementing the controller on an actual ExoMuscle testbed. One of the limitations of the proposed networked ESAs is their resolution, which is highly dependent to the number of actuation units embedded in the system. Compared to the real muscle composed of tremendous number of muscle actuation units, ExoMuscles are considered discrete and the resolution depends on the number and consequently the size of actuators. To achieve higher resolution we need to take advantage of high precision technologies such as accurate 3D printers. R EFERENCES [1] C. Majidi, “Soft robotics: A perspectivecurrent trends and prospects for the future,” Soft Robotics, vol. 1, no. 1, pp. 5–11, 2013. [Online]. Available: https://doi.org/10.1089/soro.2013.0001 [2] M. Harrison and A. Jafari, “A novel highly scalable soft electromagnetic actuator,” Soft Robotics, Under Review. [3] V. Grosu, C. Rodriguez-Guerrero, S. Grosu, B. Vanderborght, and D. Lefeber, “Design of smart modular variable stiffness actuators for robotic assistive devices,” IEEE/ASME Transactions on Mechatronics, vol. PP, no. 99, pp. 1–1, 2017. [4] A. Jafari, N. G. Tsagarakis, I. Sardellitti, and D. G. Caldwell, “A new actuator with adjustable stiffness based on a variable ratio lever mechanism,” IEEE/ASME Transactions on Mechatronics, vol. 19, no. 1, pp. 55–63, 2014. [5] Y. Liu, Y. Zhang, and Q. Xu, “Design and control of a novel compliant constant-force gripper based on buckled fixed-guided beams,” IEEE/ASME Transactions on Mechatronics, vol. 22, no. 1, pp. 476– 486, 2017. [6] A. Borboni, R. Faglia, and M. Palpacelli, “Shape memory actuator with slider and slot layout and single fan cooling,” in 2014 IEEE/ASME 10th International Conference on Mechatronic and Embedded Systems and Applications (MESA), Conference Proceedings, pp. 1–6. [7] Y. Dang, L. K. Cheng, M. Stommel, and W. Xu, “Technical requirements and conceptualization of a soft pneumatic actuator inspired by human gastric motility,” in 2016 23rd International Conference on Mechatronics and Machine Vision in Practice (M2VIP), Conference Proceedings, pp. 1–6. [8] Y. L. Park and R. J. Wood, “Smart pneumatic artificial muscle actuator with embedded microfluidic sensing,” in 2013 IEEE SENSORS, Conference Proceedings, pp. 1–4. [9] H. Godaba, J. Li, Y. Wang, and J. Zhu, “A soft jellyfish robot driven by a dielectric elastomer actuator,” IEEE Robotics and Automation Letters, vol. 1, no. 2, pp. 624–631, 2016. 3 3 3 2.5 2.5 2.5 2 2 2 1.5 1.5 1.5 1 1 1 0.5 0.5 0.5 0 0 0 10 20 30 40 50 60 0 0 10 20 (a) 30 (b) 40 50 60 0 10 20 30 40 50 60 (c) Fig. 5. Norm of x(t), p(t), and d(t) for the (a) fully-actuated system (Scenario A), (b) the SCA Scenario B, and (c) the MI-SDP Scenario C. 4.5 4 3.5 3 2.5 2 1.5 1 0.5 0 0 10 20 30 40 50 60 Fig. 6. Comparison of the norm of u(t) for Scenarios A, B, and C. 0.015 0.01 0.005 0 -0.005 -0.01 -0.015 0 10 20 30 40 50 60 Fig. 7. Comparison of the trajectory of x1 (t) for Scenarios A, B, and C. [10] J. Zou, G. Y. Gu, and L. M. Zhu, “Open-loop control of creep and vibration in dielectric elastomer actuators with phenomenological models,” IEEE/ASME Transactions on Mechatronics, vol. 22, no. 1, pp. 51–58, 2017. [11] J. Ruths and D. Ruths, “Control profiles of complex networks,” Science, vol. 343, no. 6177, pp. 1373–1376, 2014. [12] S. Pequito, S. Kar, and A. Aguiar, “A framework for structural input/output and control configuration selection in large-scale systems,” IEEE Transactions on Automatic Control, vol. 61, no. 2, pp. 303–318, 2016. [13] S. Pequito, G. Ramos, S. Kar, A. P. Aguiar, and J. Ramos, “The robust minimal controllability problem,” Automatica, vol. 82, pp. 261–268, 2017. [14] T. Summers, F. Cortesi, and J. Lygeros, “On submodularity and controllability in complex dynamical networks,” IEEE Transactions on Control of Network Systems, vol. 3, no. 1, pp. 91–101, 2016. [15] N. K. Dhingra, M. R. Jovanović, and Z.-Q. Luo, “An admm algorithm for optimal sensor and actuator selection,” in IEEE Conference on Decision and Control. IEEE, 2014, pp. 4039–4044. [16] P. V. Chanekar, N. Chopra, and S. Azarm, “Optimal actuator placement for linear systems with limited number of actuators,” in 2017 American Control Conference (ACC), May 2017, pp. 334–339. [17] T. A. Pancake, “Analysis and control of uncertain/nonlinear systems in the presence of bounded disturbance inputs,” Ph.D. dissertation, Purdue University, 2000. [18] M. A. Duran and I. E. Grossmann, “An outer-approximation algorithm for a class of mixed-integer nonlinear programs,” Mathematical programming, vol. 36, no. 3, pp. 307–339, 1986. [19] M. R. Bussieck and A. Pruessner, “Mixed-integer nonlinear programming,” SIAG/OPT Newsletter: Views & News, vol. 14, no. 1, pp. 19–22, 2003. [20] S. Boyd and L. Vandenberghe, Convex optimization. Cambridge university press, 2004. [21] S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan, “Linear matrix inequalities in system and control theory,” 1994. [22] J. G. VanAntwerp and R. D. Braatz, “A tutorial on linear and bilinear matrix inequalities,” Journal of process control, vol. 10, no. 4, pp. 363–385, 2000. [23] Q. T. Dinh, S. Gumussoy, W. Michiels, and M. Diehl, “Combining convex–concave decompositions and linearization approaches for solving bmis, with application to static output feedback,” IEEE Transactions on Automatic Control, vol. 57, no. 6, pp. 1377–1390, 2012. [24] A. F. Taha, N. Gatsis, T. Summers, and S. Nugroho, “Time-varying sensor and actuator selection for uncertain cyber-physical systems,” arXiv preprint arXiv:1708.07912, 2017. [25] P. Belotti, C. Kirches, S. Leyffer, J. Linderoth, J. Luedtke, and A. Mahajan, “Mixed-integer nonlinear optimization,” Acta Numerica, vol. 22, pp. 1–131, 2013. [26] J. Lee and S. Leyffer, Mixed integer nonlinear programming. Springer Science & Business Media, 2011, vol. 154. [27] T. Gally, M. E. Pfetsch, and S. Ulbrich, “A framework for solving mixed-integer semidefinite programs,” Optimization Methods and Software, pp. 1–39, 2017. [28] M. Tawarmalani and N. V. Sahinidis, “Global optimization of mixedinteger nonlinear programs: A theoretical and computational study,” Mathematical programming, vol. 99, no. 3, pp. 563–591, 2004. [29] “Ecoflex series,” https://www.smooth-on.com/tb/files/ECOFLEX SERIES TB.pdf, accessed: 09-14-2017. [30] J. Lofberg, “Yalmip: A toolbox for modeling and optimization in matlab,” in Computer Aided Control Systems Design, 2004 IEEE International Symposium on. IEEE, 2004, pp. 284–289. [31] A. Mosek, “The mosek optimization software,” Online at http://www. mosek. com, vol. 54, pp. 2–1, 2010.
3cs.SY
Skyline Computation with Noisy Comparisons Frederik Mallmann-Trenn1,2 , Claire Mathieu1,3 , and Victor Verdugo1,4 arXiv:1710.02058v1 [cs.DS] 5 Oct 2017 1 École normale supérieure, CNRS, PSL Research University, Paris, France, {mallmann, cmathieu, victor.verdugo}@di.ens.fr 2 Simon Fraser University 3 Collège de France; work partly done while visiting IRIF (Université Paris-Diderot) 4 Universidad de Chile October 6, 2017 Abstract Given a set of n points in a d-dimensional space, we seek to compute the skyline, i.e., those points that are not strictly dominated by any other point, using few comparisons between elements. We study the crowdsourcing-inspired setting ([FRPU94]) where comparisons fail with constant probability. In this model, Groz & Milo [GM15] show three bounds on the query complexity for the skyline problem. We provide two output-sensitive algorithms computing the skyline with query complexity O(nd log(dk)) and O(ndk log(k)), where k is the size of the skyline. These results improve significantly on the state-of-the-art and are tight for low dimensions. 1 Introduction Skylines have been studied extensively, since the 1960s in statistics [BS66], then in algorithms and computational geometry [KLP75] and in databases [BKS01; CCM13; GSG07; KRR02]. Depending on the field of research, the skyline is also known as the set of maximum vectors, the dominance frontier, admissible points, or Pareto frontier. The skyline of a set of points consists of those points which are not strictly dominated by any other point. A point p is dominated by another point q if pi ≤ qi for every coordinate (attribute or dimension) i. It is strictly dominated if in addition the inequality is strict for at least one coordinate; see Figure 1 (from [GM15]) for an example. In many contexts, comparing attributes is not straightforward. Consider the example of finding optimal cities from [GM15]. To compute the skyline with the help of the crowd we can ask people questions of the form “is the education system superior in city x or city y?” or “can I 1 salary skyline point dominated point education quality Figure 1: Given a set of points X, the goal is to find the set of skyline points, i.e.,points are not dominated by any other points. expect a better salary in city x or city y”. Of course, people are likely to make mistakes, and so each question is typically posed to multiple people. Our objective is to minimize the number of questions that need to be issued to the crowd, while returning the correct skyline with high probability. Thus, much attention has recently been given to computing the skyline when information about the underlying data is uncertain [MWK+11], and comparisons may give erroneous answers. One may consider that the location of each point is determined by a probability distribution over a set of locations, or that data is incomplete [KML08; LEB13]. Some previous work [PJLY07; AAA+11] model uncertainty about the output by computing a ρ-skyline: points having probability at least ρ to be in the skyline. In this paper, we work in the noisy comparison model, which was introduced in the seminal paper [FRPU94] and has been studied in [GM15; BMW16]: We assume queries are of the type is the i-th coordinate of point p (strictly) smaller than that of point q?, and the outcome of each such query is independently correct with probability greater than some constant better than 1/2 (for definiteness we assume probability 2/3). Our goal is to recover the exact skyline, with error probability at most δ. In the context of crowdsourcing this model has been considered in order to capture the fact that people might incur in errors when comparing elements. We refer to [AZH+15] about skyline computation using the crowd and [LWZF16] for a survey in crowdsourced data management. Results In many settings the skyline consists of very few points compared to the input size, motivating the study of output-sensitive algorithms. Our measure of complexity is the number of queries. This is expressed as a function of three parameters: n = |X|, the number of data items (points); d, the number of attributes (dimensions); and k = |sky(X)|, the size of the skyline (output). 2 Theorem 1.1. Given δ ∈ (0, 1/2) and a set X of data items, SkyLowDim-Search(X, δ) outputs a subset of X which, with probability at least 1 − δ, is the skyline of X. The expected number of queries is O(nd log(dk/δ)). Theorem 1.2. Given δ ∈ (0, 1/2) and a set X of data items, SkyHighDim-Search(X, δ) outputs a subset of X which, with probability at least 1 − δ, is the skyline of X. The expected number of queries is O(ndk log(k/δ) + dk 2 log(kn/δ)). Additionally, we prove that the bound of Theorem 1.1 is (up to constant factors) essentially tight whenever d ≤ k c for any constant c: Theorem 1.3. Let A be an algorithm that computes the skyline with error probability less than 1/10. Then the expected number of queries of A is Ω(nd log k). Techniques In previous work, Groz and Milo [GM15] give three algorithms. Of the three algorithms, the third (iii) algorithm is simply based on sorting all the input points in each dimension and thus reduces the problem to the case of computing the skyline in the noiseless setting. Our algorithm SkylineLowDim uses a natural but quite different idea: it is to use discretization, by sampling, sorting all the sample points in each dimension to define buckets, then placing points into buckets, and identifying “skyline buckets”. Eliminating points in dominated buckets, we reduce the input size significantly allowing us to apply a cruder algorithm to solve the problem on the smaller input. One interesting aspect of our discretization is that a fraction of the input will be, due to the low query complexity, incorrectly discretized yet we are able to recover the correct skyline. Algorithms (i) and (ii) from [GM15], recover the skyline points one by one. They iteratively compute the maximum point, in lexicographic order, among those not dominated by the skyline points already found.1 The idea behind our algorithm SkylineHighDim is that it is more efficient to separate the two tasks: finding a point p not dominated by the skyline points already found, on the one hand, and computing a maximum point (in lexicographic order) among those dominating p, on the other hand; we optimize queries carefully for the latter of the two tasks (Algorithm MaxLex). Our lower bound constructs a technical reduction from the problem of identifying null vectors among a collection of vectors, each having at most one non-zero coordinate. That problem can be studied using a two-phase process inspired from [FRPU94]. Context Groz and Milo [GM15] start the research line of computing the skyline in the noisy setting and they give three algorithms showing three upper bounds on the query complexity: (i) O(ndk log(dk)), (ii) O(ndk 2 log(k)), and (iii) O(nd log(dn)). Here, we improve the first two bounds by a factor of k and we improve on the third bound. When do our bounds improve asymptotically on the existing bounds? We are focused on settings where the output size k is quite small compared to n: assume that k = no(1) (If k = nΩ(1) then the simple bound (iii) from [GM15] is best.) Moreover, 1 The difference between (i) and (ii) is due to different subroutines to check dominance. 3 • If the dimension is relatively low: d = k O(1) , then Theorem 1.1 is best, beating (i) by a factor of k, and is in fact optimal by Theorem 1.3. This comprises in particular the constant dimension setting: Our bound O(n log k) is tight and improves on O(n log n) ([GM15]) for small enough k (e.g. poly-log n). • If the dimension is quite high: d = 2ω(k) , then Theorem 1.2 is best, beating (ii) by a factor of k. Roadmap In Section 2, we provide the preliminaries, which the reader might wish to skip on first reading. Section 3 introduces our algorithm for low dimensions (Theorem 1.1) and Section 4.2 introduces the counterpart for high dimensions (Theorem 1.2). Section 5, contains our lower bound (Theorem 1.3). 2 Preliminaries Algorithm SkyLowDim-Search(X, δ) guesses an upper bound k for |skyline(X)| by a super-exponentially increasing sequence of guesses (similarly to [Cha96; GM15]). This reduces the problem to that of computing skyline(X) given a rough upper bound k on its cardinality, a problem solved by our Algorithm SkylineLowDim(k, X, δ). Algorithm SkyLowDim-Search(X, δ) input: X set of points, δ error probability output: skyline(X) error probability: δ 1: 2: 3: 4: 5: (see Theorem 1.1) k ← (bd/δc)2 repeat δ ← δ/2 ; k ← k 2 ; S ← SkylineLowDim(k, X, δ) until |S| < k Output S Similarly, algorithm SkyHighDim-Search(X, δ) guesses an upper bound k for |skyline(X)| by a exponentially increasing sequence of guesses. This reduces the problem to that of computing skyline(X) given an upper bound k on its cardinality, a problem which will be solved by Algorithm SkylineHighDim(k, X, δ). 2.1 Subroutines used by our algorithms Sorting, searching and skyline. Before we state our Algorithm SkylineLowDim, we introduce the subroutines it builds on, namely, SkyGM from [GM15], and NoisySearch and NoisySort from [FRPU94]. In particular, the algorithm SkyGM yields the complexity in (i) and (ii). The pseudocode of these three routines is provided in the Appendix. 4 Algorithm SkyHighDim-Search(X, δ) (see Theorem 1.2) input: X set of points, δ error probability output: skyline(X) error probability: δ. 1: Initialize j ← 0, k ← 1 2: repeat 3: j ← j + 1 ; k ← 2k ; S ← SkylineHighDim(k, X, δ/8j ) 4: until |S| < k 5: Output S Theorem 2.1 ([GM15]). Given δ ∈ (0, 1/2) and a set X of data items, algorithm SkyGM(X, δ) outputs a subset of X which, with probability at least 1 − δ, is the skyline of X. The expected number of queries is (i) O(ndk 2 log(k/δ)) or (ii) O(ndk log(dk)). The complexity depends on the dominance test used. In the noisy binary search problem the input is the following: an element y, and an ordered list (y1 , y2 , . . . , ym−1 ), accessible by comparisons that each have error probability at most p, and a parameter δ; the goal is to output the interval I = (yi−1 , yi ] such that y ∈ I. Theorem 2.2 ([FRPU94]). There exists an algorithm, NoisySearch, that solves the noisy binary search problem with success probability 1 − δ and expected number of comparisons O(log(m/δ)). In the noisy sort problem the input correspond to an unordered set Y = {y1 , y2 , . . . , ym }, whose elements are accessible by comparisons that each have error probability at most p, and a parameter δ. The goal is to output an ordering of Y that is the correct non-decreasing sorted order. Theorem 2.3 ([FRPU94]). There exists an algorithm, NoisySort, that solves the noisy sorting problem with success probability 1−δ and expected number of comparisons O(m log(m/δ)). Boosting. A folklore approach to deal with noise is to take an algorithm for the noiseless setting and repeat each noisy operation enough times to reduce noise and boost the success probability; this increases the query complexity by logarithmic factors. We use this approach in a variety of settings, so we formalize it with a (higher order) algorithm which we call BoostProb. See Section B.2. Proposition 2.4. Algorithm BoostProb(⊗, δ1 , δ2 ) takes as input two parameters δ1 and δ2 that are the desired two-sided errors, and a test ⊗ (query or algorithm) that returns either true or false with error probability at most 1/3. BoostProb incorrectly outputs true (false positive) w.p. δ1 and incorrectly outputs false (false negative) w.p. δ2 . Let T⊗ be the expected query time of test ⊗. BoostProb has expected query complexity O(log(1/δ1 ))T⊗ if ⊗ should return true (YES instances) and O(log(1/δ2 ))T⊗ otherwise (NO instances). 5 For our algorithm SkylineLowDim to be able to eliminate dominated buckets, we design an efficient subroutine to test whether a bucket is empty of points. In the Bucket-emptiness problem the input corresponds to a bucket B, a set of points Y and two error parameters δ1 and δ2 . The goal is to decide whether Y ∩ B = ∅; the algorithm incorrectly outputs true w.p. at most δ1 , and incorrectly outputs false w.p. at most δ2 . (The two-sided error is used to improve the query complexity). We leave the description of the algorithm IsEmpty and it analysis to Section B.2. Lemma 2.5. Algorithm IsEmpty(B, Y, δ1 , δ2 ) solves Bucket-emptiness with expected query complexity O(d|Y | log(1/δ1 )) + O(d log(d|Y |/δ2 )). 3 3.1 Skyline computation in low dimension: Theorem 1.1 Overview Algorithm SkylineLowDim(k, X, δ) input: k integer, X set of points, δ error probability output: min{k, |skyline(X)|} points of skyline(X) error probability: δ δ 0 ← δ/(2dk)5 and s ← dk 2 log(d2 k 2 /δ 0 ) 2: if k 5 ≥ n or d5 ≥ n then 3: Output SkyGM(X, δ 0 ) {Phase (i): bucketing} 4: for each dimension i ∈ {1, 2, . . . , d} do 5: Si ← NoisySort(sample of X of size s, i, δ 0 /d) 6: Remove duplicates so that, with prob. 1 − δ 0 /d, the values in Si are all distinct 7: for each point p ∈ X do Q 8: Place p in set XB associated to B = di=1 Ii , with Ii = NoisySearch(pi , Si , δ 0 /(dk)). 9: for each bucket  B do true if XB = ∅, 10: emptyB ← unknown otherwise. {Phase (ii): elimination} 11: while ∃B with emptyB = unknown and ∀B 0 dominating B: emptyB 0 = true do 12: emptyB ← IsEmpty(B, XB , δ 0 /k, δ 0 /n) 13: if more than |X|/ log(|X|) buckets B have emptyB = false then Output SkylineLowDim(k, X, δ) 14: X 0 ← ∪{XB : emptyB = false and ∀B 0 dominating B: emptyB 0 = true } {Phase (iii): solve reduced problem} 15: Output SkylineHighDim(k, X 0 , δ 0 ). 1: 6 y bucket a bucket b p1 bucket c bucket d bucket e p2 p3 bucket f bucket g x Figure 2: An illustration of the bucket dominance. We say a bucket i dominates another bucket j if it is non-empty and has strictly larger coordinates. Dominated buckets are gray-striped and dominating buckets are orange-striped, and boxed. Here bucket b dominates c and f but not a, d, e or g. Bucket b is undominated because all buckets to the Northeast are empty. All points in all undominated buckets are handed to the third phase, ensuring that the skyline points p1 , p2 , and p3 are among these points. 7 Algorithm SkylineLowDim(k, X, δ) uses phases. In the first phase, bucketing: we sort the i-th coordinate of a random sample to define s + 1 intervals in each dimension Q i ∈ [d], d hence (s + 1) buckets, where each bucket is a product of intervals of the form i Ii ; then we place each point p of X in those buckets by searching for each dimension for the interval Ii containing pi . In the second uses elimination: Say that Q phase, Algorithm SkylineLowDim(k, X, δ)Q a bucket B = i Ii is dominated by a different bucket B 0 = i Ii0 if in every dimension max Ii ≤ min Ii0 . Then every point in B 0 dominates every point in B, so no skyline point belongs to a bucket dominated by a non-empty bucket. We test buckets for emptiness and eliminate points placed in buckets that are dominated by non-empty buckets. See Figure 2 for an illustration. In the third phase Algorithm SkylineLowDim(k, X, δ) simply calls the Algorithm SkylineHighDim to find the skyline of the remaining points.2 3.2 Algorithm SkylineLowDim We can now formally define the Algorithm SkylineLowDim that was outlined in section 3.1. In the third phase we have eliminated enough points that we can call our other (less efficient) algorithm SkylineHighDim (see Section 4.2) on the residual instance. 3.3 Analysis: Proof of Theorem 1.1 The error probability analysis follows by carefully considering the operations made by the algorithm. We leave that analysis to the Appendix, and focus on the query complexity analysis. To study the query complexity of algorithm SkylineLowDim we need some structure about the bucketing. We say the assignment performed in line 8 is decent if the following holds: For every j ∈ {1, . . . , d} and for every interval I in Sj , at most 4|X|/(dk 2 ) points with distinct j coordinate are placed in I, that is, 4|X| . dk 2 Otherwise, if the condition above does not hold for an interval we say that I is dense. |{pj : I = NoisySearch(pj , Sj , δ 0 /(dk))}| ≤ Lemma 3.1. With probability at least 1 − 1/k, the assignment performed in line 8 is decent. We first study the expected number of queries performed during the execution of i SkylineLowDim(ki , X, δ), where ki = bd/δc2 . Throughout this section we assume ki5 , d5 ≤ n = |X| since otherwise the algorithm just calls SkyGM and thus the correctness simply follows from the correctness of SkyGM. We now study the query complexity of each phase in SkylineLowDim. 2 Alternatively, one could use an algorithm provided by Groz and Milo [GM15], it is only important that the size of the input set is reduced to n/k to cope with the larger runtime of the mentioned algorithms. 8 • Phase (i) Bucketing. On line 5: by Theorem 2.3 (noisy sorting) the expected number of queries performed is d · O(dki2 log(16d2 ki2 /δ)) = O(dn log(ki d/δ)), by the assumption over ki and d. On line 8: by Theorem 2.2 (noisy search) the expected number of queries is nd · O(log(16d2 ki3 /δ)) = O(nd log(dki /δ)). • Phase (ii) Elimination. On line 12: by Lemma 2.5, since (conditioned on an execution where NoisySort and NoisySearch were both correct) at most γ = ki3 d log(16d2 ki2 /δ) buckets tested are non-empty. Observe that γ < |X|/ log(|X|) due to line 2. The resulting conditional expected query complexity is O(|X|d log(dki /δ)). An incorrect execution of algorithms NoisySort and NoisySearch can cause at most |X|/ log(|X|) buckets to be verified, however, the probability of such an error is at most 1/k. The probability of failing i times due to line 13 is at most 1/k i . Thus, resulting conditional expected query complexity is O(|X|d log(dki /δ)). Hence, by law of total expectation, and since the probability of executing the expected number of queries is at most O(|X|d log(dki /δ)). • Phase (iii) Recovering the skyline. On line 15: We claim that on expectation |X 0 | = O(n/ki ). which gives, by Theorem 4.3, O(|X 0 |dk log(dki /δ)). We proceed by proving the claim. Assume that the point assignment is decent, which is, by Lemma 3.1, w.p. 1 − 1/k the case. Let Qp be the set of points which were strictly dominated by p and in some bucket B which was not dominated resulting in p ∈ X 0 . Let Bp be the bucket of p. Consider every dimension i. If Ii of Bp is of type (`, r], then because the assignment was decent there are at most L = 4|X|/(dki2 ) points in Qp w.r.t. to dimension i. If Ii of Bp is of type I = [x], x ∈ R, then for every q ∈ Qp correctly assigned to I we see that p dominates q. Thus summing over all dimensions we have |Qp | ≤ |X|/ki2 and [ |X 0 | ≤ Qp ≤ |X|/ki . p∈skyline(X) Suppose now that an error occurred (which happens w.p. at most 1/k) we derive, as before, |X 0 | ≤ |X|. Thus, similarly as before, the expected size of |X 0 | is |X 0 | = O(n/ki ), yielding the claim. Hence, the expected number of queries of that last line is O(nd log(dki /δ)). Let Oi be the output of SkylineLowDim(ki , X, δ/2i ). Recall that SkyLowDim-Search(X, δ) terminates as soon as |Oi | = 6 ki . Whenever ki > |skyline(X)| such an output is returned w.p. at least 1 − δ/2i . Let Z denote the variable denoting the number of extra iterations due to failure, Set γ = log(logd/δ |skyline(X)|) and recall that log(·) = log2 (·). Since i ki ≤ (d/δ)2 , the number of iterations is bounded by dγe + 1 + Z. Therefore, the runtime 9 of SkylineLowDim(ki , X, δ/2i ) is bounded by O(nd log(2i dki /δ)). This implies that the total expected query complexity is upper bounded by dγe+1+Z X O(nd log(2i dki /δ)). i=1 To obtain the claimed bound, we first show that dγe+1+Z X i=1 log(2i dki /δ) ≤ 32 · 2Z log |skyline(X)|. (1) By using this inequality and that P ( Z = i ) ≤ δ i and δ < 1/2 is enough to conclude, since       ∞ X |skyline(X)|d |skyline(X)|d i P ( Z = i ) = O nd log . O nd2 log δ δ i=0 We now check that (2) holds: dγe+1+Z X i=1 dγe+1+Z i log(2 dki /δ) ≤ 2 X i=1 dγe+1+Z log(dki ) ≤ 2 dγe+2+Z ≤ 4 log(d/δ) · 2 X i log((d/δ)2 +1 ) i=1 ≤ 32 · 2Z log(d/δ) logd/δ |skyline(X)| = 32 · 2Z log |skyline(X)|. 4 Skyline computation in high dimension: Theorem 1.2 Algorithm SkylineHighDim builds the skyline incrementally by discovering skyline points one by one. We obtain an additional skyline point by first looking for a point p which is not dominated by the current set of skyline points; p itself is not necessarily a skyline point. Then we find a skyline point p∗ dominating p: it has to be a new, additional skyline point and can thus be added to the set. We note that an algorithm from [GM15] also builds the skyline incrementally, but it looks for a point that is simultaneously not dominated by the current skyline and is itself a skyline point: by separating those two tasks and optimizing each, we gain a factor of k in complexity. 4.1 Subroutines: Domination and Lexicographic Maximum Algorithm SkylineHighDim uses a subroutine for the Domination Problem: the input is a set of points S, a point q ∈ S, and two error parameters δ1 and δ2 . The goal is to check whether the point q is not dominated by S, that is, there is no point in S that dominates q on every dimension. Our subroutine is a more efficient variant of an approach already taken in [GM15, Lemma 5]. The algorithm and analysis can be found in Section B.4. 10 Lemma 4.1. There is an algorithm for the domination problem, SetDominates(S, q, δ1 , δ2 ), that is correct w.r.t. to its specification and has expected query complexity O(|S|d log(1/δ2 ) + d log(|S|/δ1 )). Algorithm SkylineHighDim also uses a subroutine for Lex-Maximum: the input is a point p, a set of points S and an error probability δ. This algorithm computes the maximum point in the lexicographic order3 in S that is not dominated by p. In [GM15, Proposition 2], the authors sketch an algorithm doing the same. Algorithm MaxLex aims to find the maximum point in lexicographic order, among the ones that dominate p, by keeping a counter for each point, that is increased when that point is found to dominate p and decreased when it is either less than another point in lexicographic order or found not to dominate p. The increments are chosen in such a way that the counter of the unknown desired output point performs a random walk biased upwards with non-uniform step size, the others perform random walks biased downwards, and we always compare (and compare to p) the points with the largest current counters. We leave the full description of the algorithm and its analysis to Section B.4. Lemma 4.2. There is an algorithm for lex-maximum, MaxLex(p, S, δ), that is correct w.r.t. to its specification and has expected query complexity O(|S|d log(1/δ)).. 4.2 Algorithm SkylineHighDim We are now ready to give the full description of the algorithm SkylineHighDim. Theorem 4.3. Suppose k ≥ |skyline(X)|. Then, SkylineHighDim(k, X, δ) outputs skyline(X) w.p. at least 1 − δ with expected query complexity O(dkn log(k/δ)). The proof of Theorem 1.2 follows the same lines as the proof of Theorem 1.1, so we leave it to the Appendix. 5 Lower Bound-Theorem 1.3 In this section, we exhibit an Ω(dn log k) lower bound on the query complexity in the noisy skyline problem, denoted Skyline. To that end, we define a noisy vector problem, in which one is given k vectors each of length ` and needs to decide for each vector whether it is the all-zero vector. We prove a lower bound for this problem and reduce it to Skyline yielding the desired result. 3 Given two points, p = (p1 , p2 . . . , pd ) and q = (q1 , q2 . . . , qd ) the first one is lexicographically smaller than the second one, denoted by p ≤lex q , if pi < qi for the first i where pi and qi differ. If there is no such i meaning that the points are identical we use the id of the points in the input as a tie-breaker, ensuring that we obtain a total order. 11 Algorithm SkylineHighDim(k, X, δ) (see Theorem 4.3) input: X set of points, k upper bound on skyline size, δ error probability output: min{k, skyline(X)} skyline points w.p. 1 − δ Initialize S0 ← ∅, C ← X for i = 1 to k do {Find a point p not dominated current skyline points} while C not empty do Pick an arbitrary p ∈ C if not SetDominates(Si , p, δ/4k, δ/(4k|X|)) (check if p is already dominated) then break C ← C \ {p} {Find a skyline point dominating p} Compute p∗ ← MaxLex(C, p, δ/2k) Si ← Si−1 ∪ {p∗ } Output Sk 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 5.1 (k, `)-Null-Vectors: definition and lower bound Definition 1. In the (k, `)-Null-Vectors the input S is a collection {v1 , v2 , . . . , vk } of k P vectors such that for each i, vi ∈ {0, 2}` and vji ≤ 2, and the output is a vector jP (w1 , w2 , . . . , wk ) ∈ {0, 2}k such that for each i, wi = j vji . We define the distribution µ over vectors of {0, 2}` as follows.  (0, 0, . . . , 0) with probability 1/2    (1, 0, . . . , 0) with probability 1/(2`) v= . ..    (0, . . . , 0, 1) with probability 1/(2`) For inputs to (k, `)-Null-Vectors, we will consider the product distribution µk . Lemma 5.1. For (k, `)-Null-Vectors under the product distribution µk , if A is is a deterministic algorithm with success probability at least 3/4, then the worst case number of queries of A is Ω(`k log k). The proof can be found in Section B.5. 5.2 Reduction from (k, `)-Null-Vectors to Skyline Step 1. Assume, for simplicity, that d − 2 divides k. From an input S = {u1 , u2 , . . . , uk } to the (k, `)-Null-Vectors, we first show how to construct an input IS for Skyline with n points 12 in d dimensions and a skyline that is likely to be of size k, where n = (` + d − 2)k/(d − 2). We first randomly permute the entries of each ui , by using k independent permutations, resulting in Sπ = {v1 , v2 , . . . , vk }. Partition Sπ into k/(d − 2) blocks of d − 2 vectors, where for j ∈ {0, 1, . . . , k/(d − 2) − 1}, block Sπj = {vj(d−2)+i : i ∈ [d − 2]}. For each block, define ` + d − 2 points, as displayed (one point per row) on Figure 3, and the union over all blocks is the input IS to the Skyline. Formally, we define point p(t) with t = j` + i as follows.   if d0 = d − 1, j    if d0 = d,  n − j (i) pd0 := 1 if d0 = i − ` and ` ≤ i ,   j·(d−2)+i   vi if d0 = i and i ∈ [d − 2],    0 otherwise. d−2 pj·(`+d−2)+1 j·(`+d−2)+2 2 p .. . pj·(`+d−2)+` pj·(`+d−2)+`+1 .. . p(j+1)·(`+d−2) Sπj 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 1 j j j j j j j j j j j j n−j n−j n−j n−j ` n−j n−j n−j n−j n−j n−j d−2 n−j n−j Figure 3: Block (j, n − j) of the reduction. The vectors of Sπj placed in this block are vj·(d−2)+1 , vj·(d−2)+2 , . . . , vj·(d−2)+(d−2) . Step 2. Because of the non-domination implied by the last two coordinates of any point, the skyline of the set of points is the sum over all blocks of the skyline of each block. Fix an arbitrary block and focus on the first d − 2 dimensions. For each dimension, the corresponding column (whose first ` coordinates are those of some vector vi ) contains exactly one 1 (on the row of some point p) and possibly one 2 , the remaining entries being all 0. Thus it is easy to verify that p is part of the skyline if and only if vi = ~0. From the output sky(I) it is now easy to construct the output of the (k, `)-Null-Vectors: For all blocks, for all dimensions ≤ d − 2, if p ∈ sky(I) then wi ← 0 else wi ← 2. This yields the correct output w = (w1 , w2 , . . . , wk ). Thus we derive the following observation. Observation 1. Given the set of points sky(IS ), one can recover the solution to the (k, `)Null-Vectors without further queries. 13 In the following we prove that the construction is likely to have k skyline points. Observation 2. Let E be the event that the input IS has exactly k skyline points. Then, √ P ( E ) ≥ 1 − 1/k as long as k ≤ 5 n. Proof. First observe that, by construction, regardless of whether E holds, every block contains at most d − 2 skyline points: Consider an arbitrary block. The last two dimensions are identical for each point belonging to that block and we focus thus on the first d − 2 dimensions. There are exactly d − 2 points with one coordinate being 1 and all of these points are potential skyline points. In particular, take any such point p and assume that the i’th coordinate of p is 1. Then p is part of the skyline if and only if the vector vi is the null vector. Moreover, every block can have at most d − 2 entries with value 2 and each such 2 eliminating one potential skyline point. Thus, there are at most d − 2 skyline points per block. Consider the vertices vi1 , vi1 +1 , . . . , vi2 of any block. We say they are collision free if 0 the following holds: if vjj∗ = 2 for j ∈ [i1 , i2 ], then vjj∗ = 0 for all j 0 ∈ [i1 , i2 ] \ {j}. Observe that if the vertices of any block are collision free, then each of the first d − 2 dimensions is dominated by a distinct skyline point and thus there d − 2 skyline points in that block. Thus, if the vectors of every block are collision free, then there d − 2 skyline points per block and summing up over all k/(d − 2) blocks, we get that there are thus k skyline points in total. Thus, in order to bound P ( E ) it suffices to bound the probability that all blocks are collision free.. Recall that the random permutations π1 , π2 , . . . , πk permute each vector vi independently. Since in a block at most k 2 pairs may collide, and each collision happens with probability 1/`, the expected number of collisions per block is at most k 2 /`. The expected number of collisions over all blocks is thus, by the Union bound, at most (k/(d − 2)) · k 2 /` ≤ 1/k, by assumption on k. Thus, the claim follows by applying Markov inequality. 5.3 Proof of Theorem 1.3 Suppose for the sake of contradiction that there exists an algorithm A recovering the skyline for any input with exactly k skyline points, with error probability at most 1/10, and using o(nd log k) queries in expectation. By Markov’s inequality, the probability that the number of queries exceeds 5 times the expectation is at most 1/5, so truncating the execution at that point adds 1/5 to the error probability, transforming A into an algorithm B that recovers the skyline for any input with exactly k skyline points, with error probability at most 1/5 + 1/10 < 1/3, and using o(5nd log k) queries in the worst case. We claim that this implies that one can solve the (k, `)-Null-Vectors with o(nd log k) w.p. at least 1/3 contradicting Lemma 5.1. 14 Let S be the input of the (k, `)-Null-Vectors. We cast S as an input IS of B as described in Section 5.2. By Observation 2, the event E holds w.p. at least 1 − 1/k and thus there are k skyline points. By assumption, B can thus compute the skyline w.p. at least 1/2 − 1/k ≥ 1/3, where we used the Union bound. Thus, by Observation 1, one can obtain w.p. at least 1/3 the solution to (k, `)-Null-Vectors using o(nd log k) queries, a contradiction. Future Work We show that that the query complexity is Θ(dn log(dk) whenever d ≤ k c for any constant c. The arising questions is thus what the query complexity is when d = ω(k c ). In the light of the upper bound O(dkn log k) of Theorem 1.2 we conjecture that there exists an algorithm achieving a query complexity of Θ(dn log(k). Furthermore, we believe that for constant dimensions, the correct bound is O(n log k) regardless of the instance (assuming that there are exactly k-skyline points) even if the algorithm knows the instance up to a permutation—in other words, we believe that our algorithm is instance-optimal for constant dimensions. Acknowledgements We gratefully acknowledge Vincent Cohen-Addad for sharing his insights and ideas. References [AAA+11] P. Afshani, P. K. Agarwal, L. Arge, K. G. Larsen, and J. M. Phillips. “(Approximate) Uncertain Skylines”. In: Proceedings of the 14th International Conference on Database Theory. ICDT ’11. Uppsala, Sweden: ACM, 2011, pp. 186–196. url: http://doi.acm.org/10.1145/1938551.1938576 (cit. on p. 2). [AZH+15] A. Asudeh, G. Zhang, N. Hassan, C. Li, and G. V. Zaruba. “Crowdsourcing pareto-optimal object finding by pairwise comparisons”. In: Proceedings of the 24th ACM International on Conference on Information and Knowledge Management. ACM. 2015, pp. 753–762 (cit. on p. 2). [BS66] O. Barndorff-Nielsen and M. Sobel. “On the Distribution of the Number of Admissible Points in a Vector Random Sample”. English. In: Theory of Probability and its Applications 11.2 (1966), pp. 249–21. url: http://search. proquest.com/docview/915869827?accountid=15867 (cit. on p. 1). 15 [BKS01] S. Börzsönyi, D. Kossmann, and K. Stocker. “The Skyline Operator”. In: Proceedings of the 17th International Conference on Data Engineering. IEEE Computer Society, 2001, pp. 421–430. url: http://dl.acm.org/citation. cfm?id=645484.656550 (cit. on p. 1). [BMW16] M. Braverman, J. Mao, and S. M. Weinberg. “Parallel Algorithms for Select and Partition with Noisy Comparisons”. In: Proceedings of the Forty-eighth Annual ACM Symposium on Theory of Computing. STOC ’16. Cambridge, MA, USA, 2016, pp. 851–862 (cit. on p. 2). [Cha96] T. M. Chan. “Optimal output-sensitive convex hull algorithms in two and three dimensions”. In: Discrete & Computational Geometry 16.4 (1996), pp. 361–368. url: http://dx.doi.org/10.1007/BF02712873 (cit. on p. 4). [CCM13] J. Chomicki, P. Ciaccia, and N. Meneghetti. “Skyline Queries, Front and Back”. In: SIGMOD Rec. 42.3 (2013), pp. 6–18. url: http://doi.acm.org/10. 1145/2536669.2536671 (cit. on p. 1). [FRPU94] U. Feige, P. Raghavan, D. Peleg, and E. Upfal. “Computing with Noisy Information”. In: SIAM Journal on Computing 23.5 (1994), pp. 1001–1018 (cit. on pp. 1–5, 27–29). [Fel68] W. Feller. An Introduction to Probability Theory and Its Applications. Vol. 1. Wiley, 1968. url: http://www.amazon.ca/exec/obidos/redirect?tag= citeulike04-20%7B%5C&%7Dpath=ASIN/0471257087 (cit. on p. 17). [GSG07] P. Godfrey, R. Shipley, and J. Gryz. “Algorithms and Analyses for Maximal Vector Computation”. In: The VLDB Journal 16.1 (2007), pp. 5–28. url: http://dx.doi.org/10.1007/s00778-006-0029-7 (cit. on p. 1). [GM15] B. Groz and T. Milo. “Skyline Queries with Noisy Comparisons”. In: Proceedings of the 34th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems. PODS ’15. Melbourne, Victoria, Australia: ACM, 2015, pp. 185–198. url: http://doi.acm.org/10.1145/2745754.2745775 (cit. on pp. 1–5, 8, 10, 11, 29). [KML08] M. E. Khalefa, M. F. Mokbel, and J. J. Levandoski. “Skyline query processing for incomplete data”. In: 2008 IEEE 24th International Conference on Data Engineering. IEEE. 2008, pp. 556–565 (cit. on p. 2). [KRR02] D. Kossmann, F. Ramsak, and S. Rost. “Shooting Stars in the Sky: An Online Algorithm for Skyline Queries”. In: Proceedings of the 28th International Conference on Very Large Data Bases. VLDB ’02. Hong Kong, China: VLDB Endowment, 2002, pp. 275–286. url: http://dl.acm.org/citation.cfm? id=1287369.1287394 (cit. on p. 1). 16 [KLP75] H. T. Kung, F. Luccio, and F. P. Preparata. “On Finding the Maxima of a Set of Vectors”. In: J. ACM 22.4 (1975), pp. 469–476. url: http://doi.acm. org/10.1145/321906.321910 (cit. on p. 1). [LWZF16] G. Li, J. Wang, Y. Zheng, and M. Franklin. “Crowdsourced data management: A survey”. In: (2016) (cit. on p. 2). [LEB13] C. Lofi, K. El Maarry, and W.-T. Balke. “Skyline queries in crowd-enabled databases”. In: Proceedings of the 16th International Conference on Extending Database Technology. ACM. 2013, pp. 465–476 (cit. on p. 2). [MWK+11] A. Marcus, E. Wu, D. Karger, S. Madden, and R. Miller. “Human-powered Sorts and Joins”. In: Proc. VLDB Endow. 5.1 (2011), pp. 13–24. url: http: //dx.doi.org/10.14778/2047485.2047487 (cit. on p. 2). [PJLY07] A J. Pei, B. Jiang, X. Lin, and Y. Yuan. “Probabilistic Skylines on Uncertain Data”. In: Proceedings of the 33rd International Conference on Very Large Data Bases. VLDB ’07. Vienna, Austria: VLDB Endowment, 2007, pp. 15–26. url: http://dl.acm.org/citation.cfm?id=1325851.1325858 (cit. on p. 2). Auxiliary Claims Proposition A.1 ([Fel68, Chapter XIV.2, XIV.3]). Let p ∈ (0, 1) \ {1/2} and b, s ∈ N. Consider a discrete time Markov chain (Zt )t≥0 with state space Ω = [0, b] where • Z0 = s ∈ [0, b] • P ( Zt = i | Zt−1 = i − 1 ) = p for i ∈ [1, b − 1], t ≥ 1 • P ( Zt = i | Zt−1 = i + 1 ) = 1 − p for i ∈ [1, b − 1], t ≥ 1 • P ( Zt = i | Zt−1 = i ) = 1 for i ∈ {0, b}, t ≥ 1 Let T = min{t ≥ 0 | Zt ∈ {0, b}}. Then,  P ( ZT = b ) =   P ( ZT = 0 ) = 1−p p 1−p p s b −1 and −1  s 1−p 1−p − p p .  b 1−p − 1 p 17 b Moreover, E(T ) = B s b − · 1 − 2p 1 − 2p 1−  1−p p 1−  1−p p s b . Appendix B.1 Error probability analysis of SkylineLowDim The probability that the output of SkyLowDim-Search(X, δ) is incorrect is the probability that there exists P an iteration such that SkylineLowDim(k, X, δ) is incorrect, which by the union bound j≥1 δ/2j ≤ δ, hence the error probability in Theorem 1.1. In the following we show that P ( output of SkylineLowDim(k, X, δ) incorrect ) ≤ δ 2(dk)5 (2) The proof proceeds by examining possible sources of error during the execution of Algorithm SkylineLowDim(k, X, δ) and bounding the probability that they occur. Let δ 0 = δ/(2dk)5 . Observe that if k 5 ≥ n or d5 ≥ n and SkyGM returns an incorrect skyline, then by Theorem E.1 this happens w.p. at most δ 0 . • Phase (i) Bucketing. Some sample is incorrectly sorted in line 5: by Theorem 2.3 and Union Bound over i ∈ [d], error probability is at most δ 0 . The samples are correctly sorted in line 5, but some points considered in line 6 are either deleted when they should have been kept, or kept when they should have been deleted: by Theorem 2.3 and Union Bound over i ∈ [d], j ∈ [s − 1], error probability at most δ 0 . The samples are sorted correctly, but some skyline point is placed in the wrong buckets: by Theorem 2.2 and Union Bound over i ∈ [d] and p ∈ skyline(X), error probability at most δ 0 . • Phase (ii) Deleting dominated buckets. The samples are sorted and filtered correctly and the skyline points are placed in the correct buckets, but on line 12 some bucket that contains a skyline point is (incorrectly) tested as empty: Let p ∈ B be a skyline point. By assumption, p ∈ XB . By the specification of IsEmpty, the probability that B is (incorrectly) tested as empty is bounded by δ 0 /k. Applying the Union Bound on the at most min{k, |skyline(X)|} buckets where this might happen, the error probability is at most δ 0 . (Note that this never happens more than k times because as soon as more than k skyline buckets are tested non-empty, the algorithm stops with an error message.) The samples are sorted and filtered correctly and the skyline points are placed in the correct buckets, but on line 12 some bucket that dominates a bucket containing 18 a skyline point is (incorrectly) tested as empty: For each dominating bucket, by Lemma 2.5 this has probability at most δ 0 /n. There are at most n such buckets (since each has XB = 6 ∅), so by the Union Bound the probability overall in this case is at most δ 0 . • Phase (iii) Recovering the skyline. Finally, if the call to SkylineHighDim on line 15 results in an error, that has probability at most δ 0 by the specification of SkylineHighDim. Overall, the error probability sum up to at most 16δ 0 and thus (2) holds. Proof of Lemma 3.1. Recall that δ 0 = δ/(2dk)5 . For the ease of presentation we will assume that the line 6 is executed after the points are assigned to buckets (line 8). Assume the points of X are ordered w.r.t. to their j’th dimension, breaking ties arbitrarily. Consider these ordered points to be divided into blocks, each one having ` = |X|/(dk 2 ) consecutive points. In particular, the number of blocks is at most dk 2 . Consider now the samples after line 5. Each block contains one sample with probability at least 1 − (1 − `/|X|)s−1 ≥ 1 − δ 0 /d2 k 2 . Thus, in this event, the distance between any two samples is at most 2` which implies that the number of distinct values is bounded by 2`. Furthermore, with probability δ 0 /(dk 2 ) the number of points placed incorrectly between any two samples in line 5 is at most 2|X|/(dk 2 ) w.p. at least 1 − δ 0 , by Theorem 2.2 and Chernoff bounds4 . Moreover, recall that by assumption, line 6 was executed correctly. We thus get that that the number of points in I is bounded by 2` (maximum distance between two samples) plus 2|X|/(dk 2 ) (the incorrectly sorted points), and the points added through the removal of duplicates (line 6), but these have all the same j-th coordinate. Therefore, |{pj : p was sorted into I in line 8}| ≤ 2` + 2|X| 4|X| = . 2 dk dk 2 By taking the union bound over all d dimensions and over all s intervals, the error probability is at most 3δ 0 . B.2 Subroutines analysis for SkylineLowDim Proof of Proposition 2.4. By symmetry, assume that ⊗ should return true. Every query ⊗ returns true w.p. at least 2/3, by assumption, so the difference between the number of queries returning true and the number of queries returning false is a random walk with bias 2/3. The algorithm outputs false if and only if a biased random walk starting at s = log(1/δ2 ) reaches 0 before reaching b = log(1/δ2 ) + log(1/δ1 ). Applying Proposition A.1 part 1, the probability of reaching 0 is bounded by 2− log(1/δ2 ) = δ2 . 4 we assume k5 , d5 ≤ n since otherwise the algorithm just calls SkyGM. 19 Algorithm BoostProb(⊗, δ1 , δ2 ) input: a test ⊗ (query or algorithm) returning either true or false w.p. at least 2/3 output: whether ⊗ should return true error: incorrectly outputs true w.p. δ1 and incorrectly outputs false w.p. δ2 . Execute/query ⊗ until one of the following two cases. The number of times the outcome was true exceeds the number of false by log(1/δ1 ). In this case output true. The number of times the outcome was false exceeds the number of true by log(1/δ2 ). In this case output false. Furthermore, using Proposition A.1 part 2 we derive the claimed bound on the number of queries it takes for the algorithm to outputs either true or false since this happens when the random walk reaches either 0 or b. Each query takes T (⊗) expected time, concluding the proof. Algorithm for Bucket-emptiness. To prove Lemma 2.5 we require an algorithm for testing whether a given point belongs or not to a bucket. The following algorithm, InBucket, solves this problem with constant error probability. Q Algorithm InBucket(p, B = di=1 Ii ) input: p point, B bucket output: whether p ∈ B error: incorrect output w.p. 1/16 for each dimension i ∈ [d] do if BoostProb(pi ∈ / Ii , 1/(16d), 1/16) then Output false Output true Lemma B.1. InBucket(p, B) is correct w.r.t. to its specification and has expected query complexity O(d). Proof. Suppose p ∈ B. In all d dimensions i we have pi ∈ Ii . By the Union bound, the probability that BoostProb(pi ∈ / Ii , 1/(16d), 1/16) returns incorrectly true is at most d × 1/(16d) = 1/16. The query complexity is, by Proposition 2.4 and linearity of expectation, d · O(1) = O(d). Now suppose that p 6∈ B. Let i be a dimension such that pi ∈ / Ii . For that value of i, the probability that BoostProb(pi ∈ / Ii , 1/(16d), 1/16) incorrectly returns false is at most 1/16. The expected query complexity for that i is, by query complexity of BoostProb, O(log(d)). If the algorithm observes correctly that pi 6∈ Ii , then it terminates without testing any further dimensions. Thus, the expected total query complexity is given by two terms: the 20 expected query complexity for all dimensions i such that pP i ∈ Ii , and the expected query complexity for all dimensions i such that pi ∈ / Ii : d · O(1) + j≥0 O(log d) · 161j = O(d). Now we can describe the algorithm IsEmpty, which solves the Bucket-emptiness problem. The idea is simple: we iterate over every point in Y , calling a boosted version of the InBucket subroutine, since we look for a two-sided error algorithm. Q Algorithm IsEmpty(B = i Ii , Y = {y1 , . . . , ym }, δ1 , δ2 ) input: B bucket, Y set of points, δ1 , δ2 error probabilities output: whether Y ∩ B = ∅ error: incorrectly outputs true w.p. δ1 and incorrectly outputs false w.p. δ2 . for each point p ∈ Y do if BoostProb(InBucket(p, B), δ2 /m, δ1 ) then Output false Output true Proof of Lemma 2.5. Suppose B is empty. For all m points p ∈ Y we have p ∈ / B. By the Union bound, the probability that BoostProb(InBucket(p, B), δ2 /m, δ1 ) returns incorrectly true is at most m · δ2 /m = δ2 . The query complexity is, by Proposition 2.4 and linearity of expectation, mT (InBucket(p, B)) log(1/δ1 ), which is O(dm log(1/δ1 ). Now suppose that B is non-empty. Let p be a point of Y such that p ∈ B. For that value of p, the probability that BoostProb(InBucket(p, B), δ2 /m, δ1 ) incorrectly returns false is at most δ1 . The expected query complexity for this test is O(d log(m/δ2 )). If the algorithm observes correctly that p ∈ B, then it terminates without testing any further points. Thus, the expected total query complexity is given by two terms: the expected query complexity for all points p such that p ∈ / B, and the expected query complexity for all points p such that p ∈ B: X m · d log(1/δ1 ) + O(d log(m/δ2 )) · δ1j = O(dm log(1/δ1 )) + O(d log(m/δ2 )), j≥0 hence the claimed bounds. B.3 Proof of Theorem 1.2 Proof of Theorem 4.3. We first study the correctness of algorithm SkylineHighDim(k, X, δ), that is, with error probability at most δ the algorithm returns min{k, |skyline(X)|} skyline points. We will check that at every iteration i ∈ {1, . . . , k} the probability error is at most δ/k, that is, the probability of not recovering a skyline point is at most δ/k. Then, the overall error probability by the algorithm is at most δ. Let Si be the skyline 21 points identified after the first i iterations. Here are the possible error sources for Algorithm SkylineHighDim(k, X, δ) at iteration i: • Phase (i) testing domination. An skyline point is incorrectly certified as dominated in line 6, or a dominated point is certified to be non dominated by SetDominates. By Lemma B.2, this happens with probability error at most δ/(4k) for the first source of error. For the second source of error this happens w.p. at most |X| · δ/(4k|X|) = δ/2k, by the union bound. • Phase (ii) computing lex-maximum. The dominance test was performed correctly, but the MaxLex computation is incorrect in line 10: by Proposition 4.2 this happens with probability at most δ/2k. Overall, the probability that all iterations are correct is at least 1 − k(δ/2k + δ/2k) = δ, by the union bound. We now consider the query complexity of SkylineHighDim(k, X, δ). Observe that every point in p ∈ X will consider at most twice In any call of SetDominates(Si , p, ·, ·). Thus, by Lemma B.2, the expected query complexity is O(|Si |d log(4k|X|/δ)) = O(dk log(k|X|/δ) per found skyline point and O(d log(|Si |k/δ)) for each non-skyline point. This gives a total expected query complexity of O(k 2 d log(k|X|/δ)) + O(|X|d log(k/δ)) as claimed. This finishes the proof. Proof of Theorem 1.2. First consider the error probability of SkylineHighDim(ki , X, δ/8i ). This error probability is bounded by δ/2i for the i’th iteration. Thus, by the union bound, the probability that for no ki an error occurred is at most δ. We now consider the query complexity. Let Oi be the set of the output of Algorithm SkylineHighDim(ki , X, δ/8i ). Recall that SkylineHighDim(X, δ) terminates as soon as |Oi | 6= ki . Whenever ki > |skyline(X)| such an output is returned w.p. at least 1 − δi . Let Z denote the variable denoting the number of ’extra’ increase due to failure, i.e., ki > |skyline(X)|, but |Oi | = 6 |ki |. Set γ = log(|skyline(X)|) and recall that log(·) = log2 (·). i Since ki = 2 , the number of iterations is bounded by dγe + 1 + Z. Therefore, the query complexity of SkylineHighDim(ki , X, δ/8i ) is bounded by O(ndki · log(2i ki /δ)) + O(ki2 d log(ki n/δ)), which in turns implies that the total expected query complexity is bounded by dγe+1+Z X O(ndki · log(8i ki /δ) + ki2 d log(ki n/δ)). i=1 22 Let k = |skyline(X)|. We first show the following statement dγe+1+Z X ki log ki (ki /δ) ≤ O(2Z Z · k log(k/δ)). i=1 We have dγe+1+Z X i=1 dγe+1+Z dγe+1+Z i i 2 log(8 ki /δ) ≤ X 2 i 4 /δ) log(kdγe+1+Z i=1 ≤ X 4 /δ) log(kdγe+1+Z 2i i=1 Z Z = O(2 · k log(k · 2 /δ)). Note that P ( Z = i ) ≤ δ i and δ ≤ 1/8. Therefore, the total expected number of queries is thus ! ∞ X Z i O 2 Z · k log(k/δ)δ = O(k log(k/δ)). i=0 Similarly, we can show the following statement dγe+1+Z X i=1 ki2 log ki (ki n/δ) ≤ O(4Z Z · k 2 log(kn/δ)). Using P ( Z = i ) ≤ δ i and δ ≤ 1/8 we get ∞ X i=0 O(4Z Z · k 2 log(kn/δ)) · P ( Z = i ) = O(k 2 log(kn/δ)). Overall we obtain the number of queries claimed in the theorem. B.4 Subroutines analysis for SkylineHighDim The algorithm SetDominates is based on a two-sided algorithm for the basic problem Domination: the input is two points p and q and two error parameters δ1 and δ2 . The goal is to check whether p dominates q. The following algorithm solves this problem. With that at hand, the algorithm SetDominates runs over every point in S, and breaks with true as soon as it finds a point dominating q. 23 Algorithm Dominates(p, q) input: points p, q and two error parameters δ1 and δ2 output: whether p dominates q error probability: 1/16 for each dimension i do if BoostProb(pi <i qi , 1/(16d), 1/16) then Output false Output true Algorithm SetDominates(S, q, δ1 , δ2 ) input: Set of points S, a point q, and two error parameters δ1 and δ2 output: whether there exists a p ∈ S that dominates q error: incorrectly outputs true w.p. δ1 and incorrectly outputs false w.p. δ2 . for each p ∈ S do if BoostProb(Dominates(p, q), δ1 /|S|, δ2 ) (i.e., test if p ≥ q) then Output true Output false In the following lemma we study the algorithm Dominates. The proof of Lemma 4.1 follows directly, from the if line and the application of union bound. Lemma B.2. The algorithm Dominates(p, q) is correct w.r.t. to its specification and has expected query complexity O(d). Proof. Suppose p dominates q. Thus in all dimensions i we have pi ≥ qi . Hence, for any dimensions, the probability that BoostProb(pi < qi , 1/(16d), 1/16) returns incorrectly true is at most 1/(16d). Taking the union bound over all d dimensions yields the desired bound on the probability of incorrectly returning false. The query complexity is, by Proposition 2.4 (query complexity of BoostProb) and linearity of expectation, d · O(1) = O(d). Now suppose that p does not dominate q. The query complexity for dimension i with pi ≥ qi is due to the fact that the query complexity of BoostProb is, in expectation, O(log(1/16)) = O(1). Since p does not dominate q, there exists a dimensions i such that pi < qi . The expected query complexity is, by Proposition 2.4, O(log(16d)). If the algorithm observes correctly that pi < qi , then it terminates without testing any further dimensions. The probability that BoostProb(pi < qi , 1/(16d), 1/16) returns incorrectly false is at most 1/16. Thus, the case that the algorithm does not observes that pi < qi , happens only w.p. 24 1/16 and hence the expected total query complexity is given by |{i∈{1,2,...,d} : pi <qi }|−1 d · O(1) + X O(log d) · j=0 1 = O(d). 16j Algorithm Lex(p, q) input: points p, q output: whether p >lex q error probability: 1/16 for each dimension i do if BoostProb(pi >i qi , 1/(32d), 1/32) then Output true else if BoostProb(qi , >i pi , 1/(32d), 1/32) then Output false Output true Algorithm MaxLex(p, S, δ) input: Point p, set S containing p, error probability δ output: the point p∗ ∈ S which has the maximum lexicographic order among those that dominate p error probability: δ For all q ∈ S, c(q) ← log(1/δ) repeat Let q1 ← argmaxq∈S c(q); Let q2 ← argmaxq∈S\{q1 } c(q) if Lex(q1 , q2 ) (i.e., q1 >lex q2 ) then x ← q1 , y ← q2 else x ← q2 , y ← q1 c(y) ← c(y) − 1 if Dominates(x, p) (i.e., x ≥ p) then c(x) ← c(x) + 1/2 else c(x) ← c(x) − 1 until c(q2 ) ≤ −2 Output argmaxq∈S c(q). 25 Observation 3. Consider MaxLex. There exists a iteration t ≤ 10(|S| + 3)(log(1/δ) + 3) (of the repeat loop) in which all but first counter are smaller than −1, in symbols, if q 6= arg maxp∈S c(p), then c(q) ≤ −1. Proof. Let τ = 10(|S| + 3)(log(1/δ) + 3). First observe that after any iteration all but the largest and second largest counter have a value which differs by at most 1. Furthermore, the sum of the counters at iteration t0 is at most |S| log(1/δ) − t0 /2 implying that after 2τ /5 = 4(|S| + 3)(log(1/δ) + 3) iterations all but the largest c(q1 ) and second largest counter c(q2 ) must be smaller than −2. At this iteration 2τ /5, the sum of the first two counters is at most c(q1 ) + c(q2 ) ≤ 2 log(1/δ) + τ /5. Thus after further 3τ /5 iterations, at least one of the counters c(q1 ) or c(q2 ) must have been −1. Thus there exists an iteration where all but one counter are −1 or smaller. Proof of Lemma 4.2. Let q ∗ be the maximum in lexicographic order in S that is not dominated by p. By Observation 3, there is an iteration where all but the first counter are smaller than −2. Thus, it suffices to show that, with probability error at most δ, it holds that c(q ∗ ) > −1, implying that q ∗ must be the point returned by the algorithm. Let Xt denote the value of the counter c(q ∗ ) at the time where q ∗ took part in t comparisons and we will say that Xt is the counter of q ∗ after t time steps (the time steps are thus the number of comparisons q ∗ took part in). Let Yt denote the value of the counter c(q ∗ ) after point q ∗ took part of t rounds, which are defined as follows. Each round consists out of one or two time-steps. A round ends when either Xt increased two times or decreased at least once. Hence, given the outcome of all time-steps one can group them into rounds. Furthermore, let τ (t) be the time-step at which round t ends. Let Et be the event that Xτ (t)+1 = Xτ (t) + 1/2. Note that ¬Et implies Xτ (t)+1 = Xτ (t) − 1. Moreover, define Yt = Xτ (t) and   if ¬Et , Xτ (t) − 1 Yt+1 = Xτ (t) − 1/2 if Et and ¬Et+1   Xτ (t) + 1 if Et and Et+1 Let T = min{t ≥ 0 : Xt ∈ {0, 20(|S| + 3)(log(1/δ) + 3)}}. We will show that for all t ∈ Z we have Yt > 0 which implies that for all t ∈ Z we have Xt > 0 − 1 = −1 since every round consists of at most two time-steps. Consider the random walk (Zt )t≥0 with state space [0, b] in Proposition A.1, where b = 2τ = 20(|S| + 3)(log(1/δ) + 3). Let Z0 = Y0 = X0 = log(1/δ). Conditioning on Ft and Yt = i − 1 (the latter implying that Xτ (t) = i − 1) we have for i − 1 ∈ [1, b − 1] P ( Yt+1 = i ) = P ( Et+1 |Et ) · P ( Et ) ≥ (1 − 2/12) · (1 − 2/12) ≥ 2/3 = P ( Zt = i|Zt−1 = i − 1 ) , where we used the union bound. Thus P ( Yt+1 = i|Yt = i − 1 ) ≥ P ( Zt+1 = i|Zt = i − 1 ) . 26 By Proposition A.1 parameters p = 10/12, s = log(1/δ), b we have that  b  s 1−p 1−p − p p P ( ZT = 0 ) = ≤ 2− log(1/δ) = δ.  b 1−p −1 p Thus, w.p. 1 − δ we have (Zt ) > 0. And hence P ( q ∗ is not returned ) ≤ P ( Xτ ≤ −1 ) ≤ P ( Yτ ≤ 0 ) ≤ P ( Zt ≤ 0 ) = P ( ZT = 0 ) ≤ δ, which proves the correctness w.r.t. to the specification of MaxLex. By Lemma B.2, executing Lex and Dominates requires O(d log(1/δ2 ) + log(d/δ1 )) = O(d) queries in expectation. Furthermore, by Observation 3, the total number of iterations is bounded by 10(|S| + 3)(log(1/δ) + 3). This finishes the proof. B.5 Missing Proofs Section 5 Proof of Lemma 5.1. The proof is by contradiction. Assume that A is an algorithm with success probability at least 3/4 and worst case number of queries T ≤ (`k log3 k)/1000. We assume that the adversary is generous, i.e. the adversary tells the truth for every entry (i, j) such that vji = 0, and that lies with probability 1/3 otherwise. Generalizing the 2-phase computational model by Feige, Peleg, Raghavan and Upfal [FRPU94], we will give the algorithm more leeway and study a 4-phase computation model, defined as follows. In the first phase, the algorithm queries every entry vji (log3 k)/100 times. In the second phase, the adversary reveals to the algorithm all remaining hidden entries (i, j) such that vji = 2, except for a single random one. In the third phase, the algorithm can strategically and adaptively choose kl/10 entries, and the adversary reveals their true value at no additional cost. Finally, in phase 4, the algorithm outputs wi = 2 for every vector where it found an entry equal to 2, and wi = 0 for the rest of the vectors. To see how the two models are related, observe that since T ≤ (`k log3 k)/20, by Markov’s inequality at most a set S of `k/10 entries are queried by algorithm A more than (log3 k)/2 times, so at the end of the first phase we have queried every entry at least as many times as A, except for those `k/10 entries, and in the beginning of the third phase there is all the necessary information to simulate the execution of A, adaptively finding S (and getting those values correctly), hence the success probability of the three-phase algorithm is greater than or equal to the success probability of A. Also observe that, thanks to the definition of µ and to the generosity of the adversary, any execution where all queries to a vector lead to 0 answers must lead to an output where wi = 0—else the algorithm would be incorrect when µ selects the null vector. We now sketch the analysis of the success probability of the three-phase algorithm. Due to the definition of µ, with probability at least 9/10 the ground-truth input drawn 27 √ from µk has k/2 ± O( k) vectors that contain an entry equal to 2. At the end of the first phase, and due the fact that the adversary √ is generous, we have that at most of them have been identified. There remain √ k/2 ± O( k) vectors that appear to be all zeroes, and about (k/2)(1/3)(log3 k)/2 = (1/2) k of those vectors contain a still-hidden entry whose true value is 2. During the third phase, all of √ those hidden 2’s are revealed except for one. At that point, there still remain k/2 ± O( k) vectors whose entries appear to be all zeroes, there is a 2 hidden somewhere uniformly at random, but all entries have been queried an equal number of times, all in vain. To find that remaining hidden entry (and therefore decide which √ wi is equal to 2), the algorithm has no information to distinguish between the `(k/2 ± O( k)) remaining entries. Since, the algorithm may only select `k/10 elements to query further, the algoirthm’s √ success probability after the fourth phase cannot be better than (k`/10)/(`(k/2 ± O( k))) < 1/4, a contradiction. C The NoisySearch algorithm input: a point y, and an ordered list (y1 , y2 , . . . , ym−1 ), accessible by comparisons that each have error probability at most p, and a parameter δ output: an interval I = (yi−1 , yi ) or [yi ] error probability: δ Here, we recall the algorithm from [FRPU94] whose performance is given in Theorem 2.2. It is best described by first rephrasing standard binary search to search for y in an ordered set Y = (y1 , y2 , . . . , yn ) The binary search algorithm can be viewed as a downwards walk from the root in a search tree whose nodes represent intervals. Letting y0 denote −∞ and yn denote +∞, each tree node represents an interval [yi , yj ], the root represents (y0 , yn ], each leaf represents (yi−1 , yi ] for some i, and the left and right child of the node representing (yi , yj ] represent (yi , yk ] and (yk , yj ] respectively, with k = (i + j)/2. When the walk is at a node representing (yi , yj ], if the node has two children (yi , yk ] and (yk , yj ] then the algorithm compares y to yk and proceeds to the left or right child according to the result of the comparison. The algorithm stops when a leaf is reached, after log2 n steps of the downwards walk, and returns the interval of the current node. The noisy search algorithm can be viewed as a biased random walk from the root in a search tree that extends the noiseless search tree, each leaf (yi−1 , yi ] being the parent of an infinite chain, each of whose nodes are also labeled (yi−1 , yi ]. When the walk is at a node representing (yi , yj ], the noisy search algorithm first performs two comparisons to check whether yi < y ≤ yj . If the answer is negative, then the walk moves to the parent node; if the answer is positive, then, if the node has only one child then the walk proceeds to the child node, and if the node has two children (yi , yk ] and (yk , yj ] then the algorithm compares y to yk and proceeds to the left or right child according to the result of the comparison. The algorithm stops after c log n/δ steps of the random walk and returns the interval of the 28 current node. D The NoisySort algorithm Here, we recall the algorithm from [FRPU94] whose performance is given in Theorem 2.3. Algorithm D.1 NoisySort(Y, i, δ) [FRPU94] input: Set of points Y = (y1 , y2 , . . . , yn ), coordinate i, δ error prob. output: Sorted list of i’th coordinates of points in Y error probability: δ Z←∅ for ` = 1 to n do 3: (zj−1 , zj ] ← NoisySearch(y`,i , Z, δ/n) 4: Update list Z by inserting y` between zj−1 and zj in Z 5: Output Z. 1: 2: E The SkyGM algorithm The idea of SkyGM is to sort the points correctly on each dimension and to use any skyline algorithm in the noiseless setting to deduce the skyline. Theorem E.1 ( [GM15, Theorem 3] ). The algorithm SkyGM is correct w.r.t. to its specification and has an expected query complexity of O(dn log(dn/δ)). Algorithm SkyGM(X, δ) ([GM15, Algorithm 3]) input: X set of points, δ error probability output: skyline(X) error probability: δ. for dimension i ∈ {1, 2, . . . , d} do 2: Si ← NoisySort(X, i, δ/d) 3: Deduce skyline(X) from S1 , S2 , . . . , Sd and output it. 1: 29
8cs.DS
Conflict management in information fusion with belief functions arXiv:1709.04182v1 [cs.AI] 13 Sep 2017 Arnaud Martin Abstract In Information fusion, the conflict is an important concept. Indeed, combining several imperfect experts or sources allows conflict. In the theory of belief functions, this notion has been discussed a lot. The mass appearing on the empty set during the conjunctive combination rule is generally considered as conflict, but that is not really a conflict. Some measures of conflict have been proposed and some approaches have been proposed in order to manage this conflict or to decide with conflicting mass functions. We recall in this chapter some of them and we propose a discussion to consider the conflict in information fusion with the theory of belief functions. 1 Introduction The theory of belief functions was first introduced by [5] in order to represent some imprecise probabilities with upper and lower probabilities. Then [30] proposed a mathematical theory of evidence with is now widely used for information fusion. Combining imperfect sources of information leads inevitably to conflict. One can consider that the conflict comes from the non-reliability of the sources or the sources do not give information on the same observation. In this last case, one must not combine them. Let Ω = {ω1 , . . . , ωn } be a frame of discernment of exclusive and exhaustive hypothesis. A mass function m, also called basic belief assignment (bba) is the mapping from elements of the power set 2Ω (composed by all the disjunctions of Ω ) onto [0, 1] such that: (1) ∑ m(X) = 1. X∈2Ω A. Martin IRISA, University of Rennes 1 e-mail: [email protected] 1 2 Arnaud Martin A focal element X is an element of 2Ω such that m(X) 6= 0. If the focal elements are nested, the mass functions is consonant. A simple mass function, noted Aw is given by:  m(A) = w (2) m(Ω ) = 1 − w This mass function allows to show that we can model an imprecise information (if A is an union of singletons ωi ) and an uncertain information (if w > 0). All nondogmatic mass functions (with m(Ω ) > 0)) can be decomposed by a set of simple mass functions [30]. Constraining m(0) / = 0 corresponds to a closed-world assumption [30], while allowing m(0) / ≥ 0 corresponds to an open world assumption [32]. Smets interpreted this mass on the empty set such as an non-expected hypothesis and normalizes it in the pignistic probability defined for all X ∈ 2Ω , with X 6= 0/ by: BetP(X) = |X ∩Y | m(Y ) . |Y | 1 − m(0) / Y ∈2Ω ,Y 6=0/ ∑ (3) The pignistic probability can be used in the decision process such as a compromise between the credibility and the plausibility. The credibility is given for all X ∈ 2Ω by: bel(X) = ∑ m(Y ), (4) Y ⊆X,Y 6=0/ The plausibility is given for all X ∈ 2Ω by: pl(X) = m(Y ) = bel(Ω ) − bel(X c ) = 1 − m(0) / − bel(X c ), ∑ (5) Y ∈2Ω ,Y ∩X6=0/ where X c is the complementary of X. Hence, if we note the decision function fd that can be the pignistic probability, the credibility or the plausibility, we choose the element A ∈ 2Ω for a given observation if: A = argmax ( fd (X)) . (6) X∈Ω The decision is made on the mass function obtained by the combination of all the mass function from the sources. The first combination rule has been proposed by Dempster [5] and is defined for two mass functions m1 and m2 , for all X ∈ 2Ω , with X 6= 0/ by: mDS (X) = 1 1−κ ∑ A∩B=X m1 (A)m2 (B), (7) Conflict management in information fusion with belief functions where κ = ∑ 3 m1 (A)m2 (B) is the inconsistence of the combination and generally A∩B=0/ called conflict. We call it here the global conflict such as the sum of all partial conflicts. To stay in an open world, Smets [32] proposes the non-normalized conjunctive rule given for two mass functions m1 and m2 and for all X ∈ 2Ω by: mConj (X) = ∑ m1 (A)m2 (B) := (m1 ∩ m2 )(X). (8) A∩B=X These both rules allow to reduce the imprecision of the focal elements and to increase the belief on concordant elements after the fusion. The main assumptions to apply these rules are the cognitive independence and the reliability of the sources. Based on the results of these rules, the problem enlightened by the famous Zadeh’s example [38] is the repartition of the global conflict. Indeed, consider Ω = {ω1 , ω2 , ω3 } and two experts opinions given by m1 (ω1 ) = 0.9, m1 (ω3 ) = 0.1, and m2 (ω2 ) = 0.9, m1 (ω3 ) = 0.1, the mass function resulting in the combination using Dempster’s rule is m(ω3 ) = 1 and using conjunctive rule is m(0) / = 0.99, m(ω3 ) = 0.01. Therefore, several combination rules have been proposed to manage this global conflict [33, 19]. As observed in [17, 20], the weight of conflict given by κ = mConj (0) / is not a conflict measure between the mass functions. Indeed, the conjunctive-based rules are not idempotent (as the majority of the rules defined to manage the global conflict): the combination of identical mass functions leads generally to a positive value of κ. Hence, new kind of conflict measures are defined in [20]. In the following section 2, we recall some measures of conflict in the theory of belief functions. Then, in section 3 we present the ways to manage the conflict either before the combination, or in the combination rule. The last section 4 presents some decision methods in order to consider the conflict during this last step of information process. 2 Modeling conflict First of all, we should not mix up conflict measure and contradiction measure. The measures defined by [16, 34] are not conflict measures, but some discord and specificity measures (to take the terms of [15]) we call contradiction measures. We define the contradiction and conflict measures by the following definitions: Definition A contradiction in the theory of belief functions quantifies how a mass function contradicts itself. Definition (C1) The conflict in the theory of belief functions can be defined by the contradiction between two or more mass functions. Therefore, is the mass of the empty set or the functions of this mass (such as − ln(1 − mConj (0)) / proposed by [30]) a conflict measure? It seems obvious that the property of the non-idempotence is a problem to use this as a conflict measure. 4 Arnaud Martin However, if we define a conflict measure such as Conf(m1 , m2 ) = mConj (0), / we note that Conf(m1 , mΩ ) = 0 where mΩ (Ω ) = 1 is the ignorance. Indeed, the ignorance is the neutral element for the conjunctive combination rule. This property seems to be followed from a conflict measure. Other conflict measures have been defined. In [14], a conflict measure is given by: plT1 .pl2 (9) Conf(m1 , m2 ) = 1 − kpl1 kkpl2 k where pl is the plausibility function and plT1 .pl2 the vector product in 2n space of both plausibility functions. However, generally Conf(m1 , mΩ ) 6= 0, that seems counter-intuitive. Auto-conflict Introduced by [28], the auto-conflict of order s for one source is given by: ! s as = ∩ m (0). / (10) j=1 where ∩ is the conjunctive operator of Equation (8). The following property holds: as ≤ as+1 , meaning that due to the non-indempotence of ∩ , the more masses m are combined with itself the nearer to 1 κ is, and so in a general case, the more the number of sources is high the nearer to 1 κ is. The behavior of the auto-conflict was studied in [20] and it was shown that we should take into account the auto-conflict in the global conflict in order to really define a conflict. In [37], the auto-conflict was defined and called the plausibility of the belief structure with itself. The autoconflict is a kind of measure of the contradiction, but depends on the order s of the combination. A measure of contradiction independent on the order has been defined in [31]. Conflict measure based on a distance With the definition of the conflict (C1), we consider sources to be in conflict if their opinions are far from each other in the space of corresponding bba’s. That suggests a notion of distance. That is the reason why in [20], we give a definition of the measure of conflict between sources assertions through a distance between their respective bba’s. The conflict measure between 2 experts is defined by: Conf(1, 2) = d(m1 , m2 ). (11) Conflict management in information fusion with belief functions 5 We defined the conflict measure between one source j and the other M − 1 sources by: Conf( j, E ) = M 1 Conf(i, j), ∑ M − 1 i=1,i6= j (12) where E = {1, . . . , M} is the set of sources in conflict with j. Another definition is given by: Conf( j, M) = d(m j , mM ), (13) where mM is the bba of the artificial source representing the combined opinions of all the sources in E except j. A comparison of distances in the theory of belief functions is presented in [14]. We consider the distance defined in [13] as the most appropriate. This distance is defined for two basic belief assignments m1 and m2 on 2Ω by: r 1 (m1 − m2 )T D(m1 − m2 ), dJ (m1 , m2 ) = (14) 2 where D is an 2|Ω | × 2|Ω | matrix based on Jaccard dissimilarity whose elements are:  1, if A = B = 0, /    (15) D(A, B) = |A ∩ B|   , ∀A, B ∈ 2Ω .  |A ∪ B| An interesting property of this measure is given by Conf(m, m) = 0. That means that there is no conflict between a source and itself (that is not a contradiction). However, we generally do not have Conf(m, mΩ ) = 0, where mΩ (Ω ) = 1 is the ignorance. Conflict measure based on inclusion degree and distance We have seen that we cannot use the mass on the empty set as a conflict measure because of the non-idempotence of the conjunctive rule. We also have seen that the conflict measure based on the distance is not null in general for the ignorance mass. The conjunctive rule does not transfer mass on the empty set if the mass functions are included. We give here some definitions of the inclusion. Definition 1: strict inclusion We say that the mass function m1 is included in m2 if all the focal elements of m1 are included in each focal elements of m2 . 6 Arnaud Martin Definition 2: light inclusion We say that the mass function m1 is included in m2 if all the focal elements of m1 are included in at least one focal element of m2 . Definition We note this inclusion by m1 ⊆ m2 . The mass functions are included if m1 is included in m2 or m2 is included in m1 . In [25], we propose a conflict measure base on five following axioms. Let note Conf(m1 , m2 ) a conflict measure between the mass functions m1 and m2 . We present hereafter essential properties that must verify a conflict measure. 1. Non-negativity: Conf(m1 , m2 ) ≥ 0 (16) A negative conflict does not make sense. This axiom is,therefore, necessary. 2. Identity: Conf(m1 , m1 ) = 0 (17) Two equal mass functions are not in conflict. This property is not reached by the global conflict, but seems natural. 3. Symmetry: Conf(m1 , m2 ) = Conf(m2 , m1 ) (18) The conflict measure must be symmetric. We do not see any case where the nonsymmetry can make sense. 4. Normalization: 0 ≤ Conf(m1 , m2 ) ≤ 1 (19) This axiom is may not be necessary to define a conflict measure, but the normalization is very useful in many applications requiring a conflict measure. 5. Inclusion: Conf(m1 , m2 ) = 0, if and only if m1 ⊆ m2 or m2 ⊆ m1 (20) This axiom means that if the focal elements of two mass functions are not conflicting (the intersection is never empty), the mass functions are not in conflict and the mass functions cannot be in conflict if they are included. This axiom is not satisfied by a distance based conflict measure. These proposed axioms are very similar to ones defined in [7]. If a conflict measure satisfied these axioms that is not necessary a distance. Indeed, we only impose the identity and not the definiteness (Conf(m1 , m2 ) = 0 ⇔ m1 = m2 ). The axiom of inclusion is less restrictive and makes more senss for a conflict measure. Moreover, we do not impose the triangle inequality (Conf(m1 , m2 ) ≤ Conf(m1 , m3 ) + Conf(m3 , m2 )). It can be interesting to have Conf(m1 , m2 ) ≥ Conf(m1 , m3 ) + Conf(m3 , m2 ) meaning that an expert given the mass function m3 can reduce the conflict. Therefore, a distance (with the property of the triangle inequality) cannot be used directly to define a conflict measure. We see that the axiom of inclusion seems very important to define a conflict measure. This is the reason why we define in [25] a degree of inclusion to measure how Conflict management in information fusion with belief functions 7 two mass functions are included. Let the inclusion index: Inc(X1 ,Y2 ) = 1 if X1 ⊆ Y2 and 0 otherwise, where X1 and Y2 are two focal elements of m1 and m2 respectively. According to the definition 1 and definition 2, we introduce two degrees of inclusion of m1 in m2 . A strict degree of inclusion of m1 in m2 is given by: dincS (m1 , m2 ) = 1 |F1 ||F2 | X ∑ ∈F ∑ Inc(X1 ,Y2 ) (21) 1 Y2 ∈F2 1 where F1 and F2 are the set of focal elements of m1 and m2 respectively, and |F1 |, |F2 | are the number of focal elements of m1 and m2 . This definition is very strict, so we introduce a light degree of inclusion of m1 in m2 given by: 1 max Inc(X1 ,Y2 ). (22) dincL (m1 , m2 ) = |F1 | X ∑ ∈F Y2 ∈F2 1 1 Let δinc (m1 , m2 ) a degree of inclusion of m1 and m2 define by: δinc (m1 , m2 ) = max(dinc (m1 , m2 ), dinc (m2 , m1 )) (23) This degree gives the maximum of the proportion of focal elements from one mass function included in another one. Therefore, δinc (m1 , m2 ) = 1 if and only if m1 and m2 are included, and the axiom of inclusion is reached for 1 − δinc (m1 , m2 ). Hence, we define in [25], a conflict measure between two mass functions m1 and m2 by: Conf(m1 , m2 ) = (1 − δinc (m1 , m2 ))dJ (m1 , m2 ) (24) where dJ is the distance defined by the equation (14). All the previous axioms are satisfied. Indeed the axiom of inclusion is 1 − δinc (m1 , m2 ) and the distance dJ satisfied the other axioms. Moreover 0 ≤ δinc (m1 , m2 ) ≤ 1, by the product of 1 − δinc and dJ , all the axioms are satisfied. For more than two mass functions, the conflict measure between one source j and the other M − 1 sources can be defined from equations (12) or (13). 3 Managing conflict The role of conflict is essential in information fusion. Different ways can be used to manage and reduce the conflict. The conflict can come from the low reliability of the sources. Therefore, we can use this conflict to estimate the reliability of the sources if we cannot learn it on databases as proposed in [20]. Hence, we reduce the conflict before the combination, but we can also directly manage the conflict in the rule of combination as generally made in the theory of belief functions such as explained in [33, 19]. According to the application, we do not search always to reduce the conflict. For example, we can use the conflict measure such as an indicator of the inconsis- 8 Arnaud Martin tence of the fusion for example in databases [2]. Conflict information can also be an interesting information in some applications such as presented in [29]. 3.1 Managing the conflict before the combination The conflict appearing while confronting several experts’ opinions can be used as an indicator of the relative reliability of the experts. We have seen that there exist many rules in order to take into account the conflict during the combination step. These rules do not make the difference between the conflict (global or local conflict) and the auto-conflict due to the non-idempotence of the majority of the rules. We propose here the use of a conflict measure in order to define a reliability measure, that we consider before the combination, in a discounting procedure. When we can quantify the reliability of each source, we can weaken the basic belief assignment before the combination by the discounting procedure:  α m j (X) = α j m j (X), ∀X ∈ 2Ω r {Ω } (25) mαj (Ω ) = 1 − α j (1 − m j (Ω )). α j ∈ [0, 1] is the discounting factor of the source j that is, in this case, the reliability of the source j, eventually as a function of X ∈ 2Ω . Other discounting procedures are possible such as the contextual discounting [26], or a discounting procedure based on the credibility or the plausibility functions [39]. According to the applications, we can learn the discounting factors α j , for example, from the confusion matrix [22]. In many applications, we cannot learn the reliability of each source. A general approach to the evaluation of the discounting factor without learning is given in [10]. For a given bba the discounting factor is obtained by the minimization on α of a distance given by: Dist α j = ∑ BetP j (A) − δA, j 2 , (26) A∈Ω where BetP j is the pignistic probability (Equation (3)) of the bba given by the source j and δA, j = 1 if the source j supports A and 0 otherwise. This approach is interesting with the goal of making decision based on pignistic probabilities. However, if the source j does not support a singleton of Ω , the minimization on α j does not work well. In order to combine the bbas of all sources together, we propose here to estimate the reliability of each source j from the conflict measure Con f between the source j and the others by: α j = f (Conf( j, M)), where f is a decreasing function. We can choose: (27) Conflict management in information fusion with belief functions 9  1/λ α j = 1 − Conf( j, M)λ , (28) where λ > 0. We illustrate this function for λ = 2 and λ = 1/2 on figure 1. This function allows to give more reliability to the sources with few conflict with the other. Fig. 1 Reliability of one source based on conflict of the source with the other sources. Other definitions are possible. The credibility degree defined in [4] is also based on the distance given in the Equation (14), and could also be interpreted as the reliability of the source. However the credibility degree in [4] is integrated directly in the combination with a weighted average. Our reliability measure allows the use of all the existing combination rules. 3.2 Managing the conflict in the combination According to the application, if we cannot reduce the conflict before the combination, we can do it by incorporating it into a combination rule. The choice of the combination rule is not easy, but it can be done by utilizing the conflict and the assumption on its origin. Indeed the Dempster rule can be apply if the sources are independent and reliable. Dempster’s rule is given for S sources for all X ∈ 2Ω , X 6= 0/ by: mDS (X) = S mConj (X) 1 m j (Y j ) = , ∑ ∏ 1 − mConj (0) / Y1 ∩...∩Ys =X j=1 1−κ (29) where κ = mConj (0), / Y j ∈ 2Ω is the answer of the source S j , and m j (Y j ) the associated mass function. This normalization by 1 − mConj (0) / hide the conflict and so this 10 Arnaud Martin rule is interesting only if we consider the closed-world and if the sources are not highly conflicting. If the assumption of independent and reliable sources are not reached, the application of the Dempster’s rule can produce some global conflict. Conflict coming from a false assumption of closed world In the closed world, the elements of the frame of discernment are assumed exhaustive. If m(0) / > 0, this mass can be interpreted such as another element, and so the assumption on the exhaustiveness of the frame of discernment is false. Hence, Smets [33] proposed the use of the conjunctive rule given for S sources for all X ∈ 2Ω by: S mConj (X) = ∑ ∏ m j (Y j ). (30) Y1 ∩...∩Ys =X j=1 Here, the sources must be cognitively independent and reliable while the open-world is considered. Hence, the mass on the empty set can be interpreted as another element unknown by the sources. In fact, in the proposed model by Smets, the conflict is transfered during the decision step by the pignistic probability [32], hiding the conflict to the end. This rule cannot be used in applications with a high value of κ. The global conflict come from the sum of the partial conflict. Hence, if the global conflict can be interpreted as an unknown element, all the partial conflict can be interpreted as many unknown elements. In that case we can keep the partial conflict in order to decide on these elements (see section 4 for this consideration). Therefore the assumption of the exclusivity is considered here as false. Under this assumption, the mass functions are no more defined on the power set 2Ω but on the so called hyper power set1 DΩ . Therefore the space Ω is closed by the union and intersection operators. This extension of the power set, lead to a lot of reflexions around this new expressiveness taking the name of DSmT (DempsterShafer modified Theory). One can also consider a partial exclusiveness of the frame of discernment. Hence, we introduce the notation DΩ r in [23] in order to integrate some constraints on the exclusiveness of some elements of Ω and so reduce the hyper power set size. Under these assumptions, we define the PCR6 rule in [18], given by: 1 This notation is introduced by [8] and D come from the Dedeking lattice. Conflict management in information fusion with belief functions 11 mPCR6 (X) = mConj (X) s−1  ∏ mσ j ( j0 ) (Yσ j ( j0 ) )     j0 =1  , (31)   s−1   m j (X)+ ∑ mσ j ( j0 ) (Yσ j ( j0 ) ) S + 2 ∑ m j (X) j=1 ∑ S−1 ∩ Yσ ( j0 ) ∩X=0/ j0 =1 j s−1 (Yσ (1) ,...,Yσ (S−1) )∈(DΩ r ) j  j0 =1 j where σ is given by:  σ j ( j0 ) = j0 if j0 < j, 0 0 σ j ( j ) = j + 1 if j0 ≥ j, (32) This rule transfers the partial conflicts on the elements that generate it, proportionally to their masses. This rule has been used in many applications allowing for good results. Conflict coming from the assumption of source’s independence If we consider some dependent sources, the conjunctive rule cannot be used. If we want to combine mass functions coming from dependent sources, the combination rule has to be idempotent. Indeed, if we combine two identical dependent mass functions (coming from different dependent sources), we have to obtain the same mass function without any global conflict. The simplest way to obtain a non-idempotent rule is the average of the mass functions such given in [27] by: mMean (X) = 1 s S ∑ m j (Y j ). (33) j=1 We showed the interest in a such rule in [28], but in that case the sources have to be assumed totally reliable. If the sources give high conflicting information, this rule can provide some errors in the decision process. The cautious rule [6] could be used to combine mass functions for which independence assumption is not verified. Cautious combination of S non-dogmatic mass functions m j , j = 1, 2, · · · , S is defined by the bba with the following weight function: S w(A) = ∧ w j (A), A ∈ 2Ω \ Ω . (34) j=1 We thus have S mCautious (X) = ∩ A(Ω A ∧ w j (A) j=1 , (35) 12 Arnaud Martin where Aw j (A) is the simple support function focused on A with weight function w j (A) issued from the canonical decomposition of m j . Note also that ∧ is the min operator. When the dependence/independence of the sources is estimated, another rule was proposed in [3]. Conflict coming from source’s ignorance Another possible interpretation of the reason for the conflict is the ignorance of the sources. Indeed, if a source is highly ignorant, it should give a categorical mass function on Ω . Therefore, [36] interprets the global conflict coming from the ignorance of the sources and transfers the mass on the total ignorance (i.e. on Ω ) in order to keep the closed world assumption. In the case of high conflict, the result of the fusion is the ignorance. This rule is given by: mY (X) = mConj (X), ∀X ∈ 2Ω , X 6= 0, / X 6= Ω mY (Ω ) = mConj (Ω ) + mConj (0) / mY (0) / = 0. (36) A source can also be ignorant not on all but only on some focal elements. Hence, [9] proposed a clever conflict repartition by transferring the partial conflicts on the partial ignorances. This rule is given for all X ∈ 2Ω , X 6= 0/ by: S mDP (X) = ∑ S ∏ m j (Y j ) + Y1 ∩...∩Ys =X j=1 ∑ Y1 ∪ . . . ∪Ys = X Y1 ∩ . . . ∩Ys = 0/ ∏ m j (Y j ), (37) j=1 where Y j ∈ 2Ω is a focal element of the source S j , and m j (Y j ) the associated mass function. This rule has a high memory complexity, such as the PCR6 rule, because it is necessary to manage the partial conflict. Conflict coming from source reliability assumption If we have no knowledge of the reliability of the sources, but we know that at least on source is reliable, the disjunctive combination can be used. It is given for all X ∈ 2Ω by: S mDis (X) = ∑ ∏ m j (Y j ). Y1 ∪...∪Ys =X j=1 (38) Conflict management in information fusion with belief functions 13 The main problem of this rule is the lost of specificity after combination. One can also see the global conflict κ = mConj (0) / such as an estimation of the conflict coming from the unreliability of the sources. Therefore, the global conflict can play the role of a weight between a conjunctive and disjunctive comportment of the rule such introduced by [12]. This rule is given for X ∈ 2Ω , X 6= 0/ by: mFlo (X) = β1 (κ)mDis (X) + β2 (κ)mConj (X), (39) where β1 and β2 can be defined by: κ , 1 − κ + κ2 1−κ β2 (κ) = . 1 − κ + κ2 β1 (κ) = (40) In a more general way, we propose in [19] to regulate the conjunctive/disjunctive comportment taking into consideration the partial combinations. The mixed rule is given for m1 and m2 for all X ∈ 2Ω by: mMix (X) = δ1 m1 (Y1 )m2 (Y2 ) ∑ ∑ Y1 ∪Y2 =X + δ2 m1 (Y1 )m2 (Y2 ). (41) Y1 ∩Y2 =X If δ1 = β1 (κ) and δ2 = β2 (κ) we obtain the rule of [12]. Likewise, if δ1 = 1 − δ2 = 0 we obtain the conjunctive rule, and if δ1 = 1 − δ2 = 1 the disjunctive rule. With δ1 (Y1 ,Y2 ) = 1 − δ2 (Y1 ,Y2 ) = 1l{0} / (Y1 ∩ Y2 ) we get back to the rule of [9] by taking into account partial conflicts. The choice of δ1 = 1 − δ2 can also be made from a dissimilarity such as: δ2 (Y1 ,Y2 ) = |Y1 ∩Y2 | , min(|Y1 |, |Y2 |) (42) where |Y1 | is the cardinality of Y1 . Jaccard dissimilarity can also be considered by: δ2 (Y1 ,Y2 ) = |Y1 ∩Y2 | . |Y1 ∪Y2 | (43) Therefore, if we have a partial conflict between Y1 and Y2 , |Y1 ∩Y2 | = 0 and the rule transfers the mass on Y1 ∪Y2 . In that case Y1 ⊂ Y2 (or the contrary), Y1 ∩Y2 = Y1 and Y1 ∪Y2 = Y2 , hence with δ2 given by (42) the rule transfers the mass on Y1 and with δ2 given by (43) on Y1 and Y2 according to the ratio |Y1 |/|Y2 | of cardinalities. In the case Y1 ∩Y2 6= Y1 ,Y2 and 0, / the rule transfers the mass on Y1 ∩Y2 and Y1 ∪Y2 according to equations (42) and (43). With such weights, the Mix rule considers partial conflict according to the imprecision of the elements at the origin of the conflict. 14 Arnaud Martin Conflict coming from a number of sources When we have to combine a many sources, the assumption of the reliability of all the sources is difficult to consider especially if the sources are human. The disjunctive rule (38) assume that at least one source is reliable but a precise decision will be difficult to take. Moreover, the complexity of main rules managing the conflict in a clever way is too high such as the rules given by (41) and (31). That is the reason why we introduce in [40] a new rule according to the following assumptions: • The majority of sources are reliable; • The larger extent one source is consistent with others, the more reliable the source is; • The sources are cognitively independent. w For each mass function m j we consider the set of mass functions {Ak j , Ak ⊂ Ω } w coming from the canonical decomposition. If group the simple mass functions Ak j in c clusters (the number of distinct Ak ) and denote by sk the number of simple mass functions in the cluster k, the proposed rule is given by: sk 1−αk +αk mLNS = ∩ ∏ wj j=1 (Ak ) (44) k=1,··· ,c where αk = sk c . (45) ∑ si i=1 How to choose the combination rule? To answer the delicate question on which combination rule to choose, many authors propose a new rule. Of course, we could propose a no free lunch theorem showing that there is no a best combination rule. To answer this question, we propose in [24] a global approach to transfer the belief. Indeed, the discounting process, the reduction of the number of focal elements, the combination rules and the decision process can be seen such as a transfer of belief and we can define these transfers in joint operator. However, it seems to difficult to propose a global approach which will be too general to be applied. In [24], we define a rule integrating only the reliability given for X ∈ 2Ω by: S m(X)= ∑ ∏ m j (Y j )w(X, m(Y), T (Y), α(Y)), Y∈(2Ω )S j=1 (46) Conflict management in information fusion with belief functions 15 where Y = (Y1 , . . . ,YS ) is the response vector of the S sources, m j (Y j ) the associated masses (m(Y) = (m1 (Y1 ), . . . , m j (Ys )), w is a weight function, α is the matrix of terms αi j of the reliability of the source S j for the element i of 2Ω , and T (Y) is the set of elements of 2Ω , on which we transfer the elementary masses m j (Y j ) for a given vector Y. This rule has been illustrated in a special case integrating the local reliability, but it seems even too complex to be easily applied. Hence, the best way to choose the combination rule is to identify the assumptions that we can or we have to make and choose the adapted rule according to these assumptions. However, we know that a given rule can provide good results in a context where the assumptions are satisfy this rule. Hence, another way to evaluate and compare some rules of combination, is to study the results (after decision) of the combined masses, e.g. on generated mass functions. In [28], from generated mass functions, we study the difference of the combination rules in terms of decisions. We showed that we have to take into account the decision process. We will present some of them in the next section in the context of conflicting mass functions. 4 Decision with conflicting bbas The classic functions used for decision making such as the pignistic probability, the credibility and the plausibility are increasing by sets inclusion. We cannot use these functions directly to decide on other elements than the singletons. When the assumption of exclusiveness of the frame of discernment is not made, such as in the equation (31), we can decide on DΩ r . That can be interesting from the data mining point of view such as we show in [21]. The approach proposed by [1] has been extend to the consideration of DΩ r in [23] allowing to decide on any element of DΩ r by taking into account the mass function and the cardinality. Hence, we choose the element A ∈ DΩ r for a given observation if: A = argmax (md (X) fd (X)) , (47) X∈DΩ r where fd is the considered decision function such as the credibility, plausibility or pignistic probability calculated from the mass function coming from the result of the combination rule, and md is the mass function defined by:   1 , (48) md (X) = Kd λX CM (X)ρ CM (X) is the cardinality of X of DΩ r , defined by the number of disjoint parts in the Venn diagram, ρ is a parameter with its values in [0, 1] allowing to decide from the intersection of all the singletons (with ρ = 1) until the total ignorance Ω (with ρ = 0). The parameter λX enables us to integrate the lost of knowledge on one of 16 Arnaud Martin the elements X of DΩ r . The constant Kd is a normalization factor that guaranties the condition of equation (1). Without any constraint on DΩ , all the focal elements contain the intersection of the singletons. One cannot choose the plausibility such as decision function fd . The choice of the parameter ρ is not easy to make. It depends on the size of Ω . According to the application, it can be more interesting to define a subset on which we want to take the decision. Hence, we can envisage the decision on any subset of DΩ r , noted D, and equation (47) becomes simply: A = argmax (md (X) fd (X)) . (49) X∈D Particularly this subset can be defined according to the expected cardinality of the element on which we want to decide. With the same spirit, in [11], another decision process is proposed by: A = argmax (dJ (m, mX )) , (50) X∈D where mX is the categorical mass function m(X) = 1, and m is the mass function coming from the combination rule. The subset D is the set of elements on which we want to decide. This last decision process allows also a decision on imprecise elements of the power set 2Ω and to control the precision of expected decision element without any parameter to fit. 5 Conclusion In this chapter, we propose some solutions to the problem of the conflict in information fusion in the context of the theory of belief functions. In section 2 we present some conflict measures. Today, there is no consensus in the community on the choice of a conflict measure. Measuring the conflict is not an easy task because a mass function contains some information such as auto-conflict, we can interpret differently. The proposed axioms are a minimum that a conflict measure has to reach. In section 3, we discuss how to manage the conflict. Based on the assumption that conflict comes from the unreliability of the sources, with a conflict estimation for each source, the best to do is to discount the mass function according to the reliability estimation (and so the conflict measure). Another way to manage the conflict, is the choice of the combination rule. Starting from the famous Zadeh’s example, many combination rules have been proposed to manage the conflict. In this chapter, we present some combination rules (without exhaustiveness) according to the assumptions that the rules suppose. Hence, we distinguish the assumptions of: open/closed world, dependent/independent sources, ignorant/not-ignorant sources, reliable/unreliable sources, few/many sources. Conflict management in information fusion with belief functions 17 To end this chapter, when the assumption of exclusiveness of the frame of discernment is not make, and so when we postpone the matter of conflict to the decision, we present some adapted decision processes. These decision methods are also adapted to decide on some imprecise elements of the power set. Of course, all the exposed methods here must be selected according to the application, to the possible assumptions, and to the final expected result. References 1. Appriou, A. Uncertainty Theories and Multisensor Data Fusion, Wiley-IEEE Press (2014) 2. Chebbah, M., Ben Yaghlane, B., Martin, A. Reliability estimation based on conflict for evidential database enrichment, Belief, Brest, France (2010) 3. Chebbah, M., Martin, A., Ben Yaghlane, B., Combining partially independent belief functions Decision Support Systems, vol. 73, pp. 37-46 (2015) 4. L.Z. Chen, W.K. Shi, Y. Deng and Z.F. Zhu, A new fusion approach based on distance of evidences, Journal of Zhejian University Science, vol. 6A, no. 5, pp. 476-482, (2005) 5. Dempster, A.P. Upper and Lower probabilities induced by a multivalued mapping, Annals of Mathematical Statistics, vol. 83, pp. 325-339, (1967) 6. T. Denœux, Conjunctive and disjunctive combination of belief functions induced by nondistinct bodies of evidence, Artificial Intelligence, vol 172, pp. 234-264, (2008) 7. Destercke, S. and Burger, T., Revisiting the notion of conflicting belief functions, Belief, Compiègne, France, 2012) 8. Dezert, J. Foundations for a new theory of plausible and paradoxical reasoning Information &; Security. An International Journal, vol. 9, pp. 13-57, (2002) 9. Dubois, D., Prade, H., Representation and combination of uncertainty with belief functions and possibility measures Computational Intelligence, vol. 4, pp. 244-264, (1988) 10. Z. Elouedi, K. Mellouli and Ph. Smets, Assessing Sensor Reliability for Multisensor Data Fusion within the Transferable Belief Model, IEEE Transactions on Systems; man, and Cybernetics - Part B: Cybernetics, vol. 34, no. 1, pp. 782-787, (2004) 11. Essaid, A. and Martin, A. and Smits, G., and Ben Yaghlane, B., A Distance-Based Decision in the Credal Level International Conference on Artificial Intelligence and Symbolic Computation (AISC 2014), pp. 147-156 (2014) 12. Florea, M. C., Jousselme, A.-L., Bossé, E., Grenier, D., Robust combination rules for evidence theory Information Fusion, vol. 10, pp. 183-197, (2009) 13. Jousselme, A.-L., Grenier D. and Bossé, E. A new distance between two bodies of evidence, Information Fusion, vol. 2, pp. 91-101, (2001) 14. Jousselme, A.-L. and Maupin, P. Distances in evidence theory: Comprehensive survey and generalizations, International Journal of Approximate Reasoning, (2011) 15. Klir, G.J. Measures of uncertainty in the Dempster-Shafer theory of evidence, Advances in the Dempster-Shafer Theory of Evidence, John Wiley and Sons, New York, R.R. Yager and M. Fedrizzi and J. Kacprzyk edition, pp. 35-49, (1994) 16. George, T. and Pal, N.R. Quantification of conflict in Dempster-Shafer framework: a new approach, International Journal of General Systems, vol. 24(4), pp. 407-423, (1996) 17. Liu, W. Analyzing the degree of conflict among belief functions, Artificial Intelligence, vol. 170, pp. 909-924, (2006) 18. Martin, A. Osswald, C. Human Experts Fusion for Image Classification Information and Security: An International Journal, Special issue on Fusing Uncertain, Imprecise and Paradoxist Information (DSmT), vol. 20, pp. 122-143, (2006) 19. Martin, A. and Osswald, C. Toward a combination rule to deal with partial conflict and specificity in belief functions theory, International Conference on Information Fusion, Québec, Canada, (2007) 18 Arnaud Martin 20. Martin, A., Jousselme, A.-L. and Osswald, C. Conflict measure for the discounting operation on belief functions, International Conference on Information Fusion, Cologne, Germany, (2008) 21. Martin, A. and Quidu, I., Decision Support with Belief Functions Theory for Seabed Characterization International Conference on Information Fusion, Cologne, Germany, (2008) 22. A. Martin, Comparative study of information fusion methods for sonar images classification, International Conference on Information Fusion, Philadelphia, USA, (2005) 23. Martin, A., Implementing general belief function framework with a practical codification for low complexity, chapter 7, Advances and Applications of DSmT for Information Fusion, American Research Press Rehoboth, vol. 3, pp. 217-274, (2009) 24. Martin, A. Reliability and combination rule in the theory of belief functions International Conference on Information Fusion, pp. 529-536 (2009) 25. A. Martin, About conflict in the theory of belief functions, Belief, Compiègne, France, (2012) 26. D. Mercier, B. Quost and T. Denœux, Refined modeling of sensor reliability in the belief function framework using contextual discounting, vol. 9, pp. 246-258, Information Fusion, (2006) 27. Murphy, C., Combining belief functions when evidence conflicts Decision Support Systems, vol. 29, pp. 1-9 (2000) 28. Osswald, C. and Martin, A. Understanding the large family of Dempster-Shafer theory’s fusion operators - a decision-based measure, International Conference on Information Fusion, Florence, Italy, (2006) 29. Rominger, C. and Martin, A. Using the conflict: An application to sonar image registration, Belief, Brest, France, (2010) 30. Shafer, G., A mathematical theory of evidence. Location: Princeton University Press, (1976) 31. Smarandache F., Martin A., and Osswald, C., Contradiction measures and specificity degrees of basic belief assignments, International Conference on Information Fusion, Boston, USA, (2011) 32. Smets, Ph., Constructing the pignistic probability function in a context of uncertainty, Uncertainty in Artificial Intelligence, vol. 5, pp. 29-39, (1990) 33. Smets, Ph., Analyzing the combination of conflicting belief functions, Information Fusion, vol. 8, no. 4, pp. 387-412, (2007) 34. Wierman, M.J., Measuring Conflict in Evidence Theory, IFSA World Congress and 20th NAFIPS International Conference, vol. 3(21), pp. 1741-1745, (2001) 35. Yager, R.R. Entropy and Specificity in a Mathematical Theory of Evidence, International Journal of General Systems, vol. 9, pp. 249-260, (1983) 36. Yager, R. R. On the Dempster-Shafer Framework and New Combination Rules Informations Sciences, vol. 41, pp. 93-137 (1991) 37. Yager, R.R. On Considerations of Credibility of Evidence International, Journal of Approximate Reasoning, vol. 7, 45-72, (1992) 38. Zadeh, L.A. A mathematical theory of evidence (book review), AI magazine, vol. 5, 81-83, (1984) 39. C. Zeng and P. Wu, A reliability discounting strategy based on plausibility function of evidence, International Conference on Information Fusion, Québec, Canada, (2007) 40. Zhou, K. and Martin, A. and Pan, Q., Evidence combination for a large number of sources, submitted to International Conference on Information Fusion, Xian, China, (2017)
2cs.AI
SIM-TO-REAL OPTIMIZATION OF COMPLEX REAL WORLD MOBILE NETWORK WITH IMPERFECT INFORMATION VIA DEEP REINFORCEMENT LEARNING FROM SELF-PLAY Yongxi Tan1,Jin Yang1,Xin Chen2,Qitao Song2,Yunjun Chen2,Zhangxiang Ye2,Zhenqiang Su1 1 Futurewei Tech. Inc., NJ Research Center, USA {yongxi.tan,jin.yang,zhenqiang.su}@huawei.com 2 Huawei Technologies Co. Ltd, P.R.China {chenxin,songqitao,chenyunjun,yezhangxiang}@huawei.com ABSTRACT Mobile network that millions of people use every day is one of the most complex systems in real world. Optimization of mobile network to meet exploding customer demand and reduce CAPEX/OPEX poses greater challenges than in prior works. Actually, learning to solve complex problems in real world to benefit everyone and make the world better has long been ultimate goal of AI. However, it still remains an unsolved problem for deep reinforcement learning (DRL), given incomplete/imperfect information in real world, huge state/action space, lots of data needed for training, associated time/cost, interactions among multi-agents, potential negative impact to real world, etc. To bridge this reality gap, we proposed a DRL framework to direct transfer optimal policy learned from multi-tasks in source domain to unseen similar tasks in target domain without any further training in both domains. First, we distilled temporal-spatial relationships between cells and mobile users to scalable 3D image-like tensor to best characterize partially observed mobile network. Second, inspired by AlphaGo, we used a novel self-play mechanism to empower DRL agent to gradually improve its intelligence by competing for best record on multiple tasks. Third, a decentralized DRL method is proposed to coordinate multi-agents to compete and cooperate as a team to maximize global reward and minimize potential negative impact. Using 7693 unseen test tasks over 160 unseen simulated mobile networks and 6 field trials over 4 commercial mobile networks in real world, we demonstrated the capability of our approach to direct transfer the learning from one simulator to another simulator, and from simulation to real world. This is the first time that a DRL agent successfully transfers its learning directly from simulation to very complex real world problems with incomplete and imperfect information, huge state/action space and multi-agent interactions. 1. INTRODUCTION Using deep neural network (LeCun et al., 2015) for a rich representation of high-dimensional visual input and as an universal function approximator, deep reinforcement learning (DRL) have achieved unprecedented success in some challenging domains, such as Atari game (Mnih et al., 2015), Go (Silver et al., 2016; Silver et al., 2017). The ultimate goal of AI is creating agent that can not only learn like human, but also make the world better by solving complex problems in real world. However, application of DRL in complex real world problems still remains an unsolved problem due to imperfect information (Moravčík et al., 2017; Brown & Sandholm 2018), huge state/action space, big gap between simulation and real world (Rusu et al., 2016; Tobin et al., 2017; Bousmalis & Levine 2017), multi-agent interactions (Vinyals et al., 2017), time/cost, etc. In this work, we use DRL for one-shot optimization of real world mobile network that millions of people use every day. Coverage & capacity optimization (CCO) of mobile network is crucial for mobile carrier to meet exploding customer demand and reduce CAPEX/OPEX (Fan et al., 2014), e.g., $11B CAPEX for Verizon in 2016 (Celentano, 2016), Cisco acquired Intucell for $475M (Marketwired, 2013). However, it poses much more difficult challenges than in prior works. First, mobile network is one of the most complex systems in real world since it is a multiusers, multi-cells (Macro, Small), multi-technologies (3G, 4G, 5G) heterogeneous network, in !1 ! ! Figure 1: DRL framework ! Figure 2: Distill tensor ! Figure 3: Self play Figure 4: Cooperate which mobile services (app, video, IOT) are consumed by billions of devices and many resource management decisions need to be made to provide seamless services. Second, it is critical to take actions only once (one-shot) since CCO involves time-consuming (1-3 days) and costly site visits to adjust vertical (Tilt) or horizontal (Azimuth) angle of cell antennas. Third, important state information is typically missing (e.g., user location, map and material of building) and erroneous (e.g., wrong Tilt or Azimuth). Fourth, action space is huge: (11 Tilt*13 Azim.)^50≈ 5.8e107 possible actions for 50 cells. At last, coordinating actions of multiple cells is crucial since cell action has significant impact to coverage of itself and interference to neighbor cells. 2. 2.1. METHODS DRL FRAMEWORK TO TRANSFER LEARNING FROM SOURCE DOMAIN TO TARGET DOMAIN As in Figure 1, given the discrepancy between source and target domain, we use the same perception PNN as input for DRL agent in both domains, by projecting observations OS and OT from source and target domain to PNN via ψS(OS) and ψT(OT). Second, if tasks in source and target domain are similar, source and target task distributions can be thought of drawn from the same task population Ω, and direct transfer of policy can be treated as a generalization problem. Therefore, we design and generate sufficient amount of diversified tasks in source domain to minimize the difference between source task distribution and target task distribution from view of agent. Ideally, we want to learn optimal policy πT* in target domain to transit from initial state S0T to optimal state S*T =TT(S0T, πT*) in one-shot. In practice, we instead learn optimal policy πS* in source domain to approximate πT*, and further approximate πS* by a neural network πSθ(PNN) with weight θ: πSθ ≈ πS* ≈ πT*, since S0T is partially observable. 2.2. DISTILL TEMPORAL-SPATIAL RELATIONSHIPS TO SCALABLE 3D IMAGE-LIKE TENSOR Given the complex temporal-spatial relationships between cells and mobile users, discrepancy between simulator and real world, and capability of convolutional neural network (CNN) to exploit spatially local pattern (LeCun et al., 1998), we distill local observations of each agent/cell into scalable 3D tensor as field of view for DRL agent. As in Figure 2, for each cell C1, we rank all neighbor cells Ni based on relationships between C1 and Ni, e.g., inter-site distance (ISD), overall interference. We then select most important neighbors (e.g., 24) and put C1 in center and arrange Ni around C1 in X-Y axis of tensor based on its rank. At last, for each channel along Z-axis, we extract relevant information from temporal-spatial relationships between each pair of cells in X-Y axis, such as, topology (ISD), key performance indicator (cell load, throughput), measured signal (averaged signal strength, averaged interference), etc. 2.3. SELF-PLAY TO GRADUALLY IMPROVE INTELLIGENCE VIA COMPETITION Inspired by AlphaGo, we use a novel self-play mechanism to encourage competition for best record on multi-tasks, just like athletes compete for world record in decathlon. As in Figure 3, for initial state Si0 of task Ti drawn from a distribution, if new actions achieve better immediate global reward over all cells Rnew than the best record Rbest in history by a threshold: ∆Rg=Rnew-Rbest>=Thge, we encourage them by backpropagating a gradient, ge=Te(R–B(s))*dθ, here Te is a function (e.g., 2*Abs(x), Abs is absolute value function), R is expected total reward, B(s) is baseline in REINFORCE (Williams 1992), dθ is gradient w.r.t. weights θ. If ∆Rg<=Thgp, we penalize them by gradient gp=Tp(R–B(s))*dθ, here Tp is a function, e.g, -1*Abs. If Thgp<∆Rg <Thge, we use simulated annealing (SA) to decide if accepting them by comparing an uniform random number ∈ [0,1] with acceptance probability Pg=1/(1+exp(∆Rg/Tg)), here Tg is global SA temperature annealed according to certain cooling schedule (e.g., exponential). 2.4. DECENTRALIZED SELF-PLAY, COMPETITIVE AND COOPERATIVE DRL (S2C) !2 ! ! Figure 5: 5 Mobile Network ! ! Figure 6: Validation results of DRL agents Figure 7: Test results of S2C agent We proposed a decentralized self-play competitive/cooperative DRL method (S2C), to coordinate multiagents to compete as a team for best global reward via self-play and cooperate with each other to minimize negative impact. As in Figure 4, each cell/agent takes action by its local view PNN. When actions are accepted at global level, if local reward Rc for cell ci is larger than a threshold Rc>=Thce, then accept action for ci with gradient ge; if Rc<=Thcp, then reject it with gradient gp; if Thcp<Rc<Thce, we use SA with acceptance probability Pc=1/(1+exp(Rc/Tc)), here Tc is cell level SA temperature. 3. 3.1. EXPERIMENTS AND RESULTS DECENTRALIZED MULTI-AGENT MULTI-TASK DEEP REINFORCEMENT LEARNING IN SIMULATOR First, we generated 2,380,000 CCO tasks Ti in Netlab simulator, with 10,000 random Tilt settings as initial states for each of 238 simulated mobile networks (<=60 cells, 400-620 users; 5 shown in Figure 5). We designed a SA agent to optimize each training task in 10 steps to generate labels (Si0 tensor for each cell in Ti, best Tilt action in 10 shots) for supervised learning (SL-DNN) by a depth-14 residual network (He et al., 2015) with 32×32×12 input and 11 output Tilt ∈ ! [-5,5]. Using 146k training data, we achieved 78.4% accuracy <=1 degree and 91.5% <=2 degree for 16k validation data. We then use weights of SL-DNN to initialize CNN for 4 DRL agents, DQN (Mnih et al., 2015), Double Q (Hasselt et al., 2016), A3C (Mnih et al., 2016), and S2C. We use 160k-320k training tasks over 80-160 mobile networks (distributed over 640 simulators on 80 VMs) to train agents for one-shot CCO in 8 epochs with 4-16 threads, and 300-500 validation tasks (15-25 mobile networks) per epoch. As in Figure 6, S2C achieved better result, in terms of immediate global reward averaged over all validation tasks (Left, 6.46% for S2C), and ratio of validation tasks with positive global reward (Right, 94% for S2C). We also tested the same S2C policy for 5481 unseen tasks over 238 mobile networks in Netlab without retraining. As in Figure 7 (Upper), it achieved 5.60% average global reward and 92% ratio of test tasks with positive gain. We further verified cross-domain generalization power by testing the same S2C policy for 7693 unseen tasks over 160 unseen mobile networks (100-140 cells, 2480-19840 users) in another simulator Unet, without any further training in both simulators. As in Figure 7 (Lower), it also achieved good results with 4.93% average global reward and 95.7% ratio of test tasks with positive gain. 3.2. DIRECT TRANSFER LEARNING FROM SIMULATION TO REAL WORLD MOBILE NETWORK To verify the generalization capability of our approach to direct transfer learning from simulation to unseen CCO tasks in unseen very complex real world mobile network without any further training in both domains, we performed 6 field trials over 4 commercial mobile networks that have never been simulated in both simulators, and are very different from all simulated mobile networks, e.g., multi-frequency (MF) or carrier aggregations (CA) has never simulated before, user distribution/number in real world mobile network is temporal-spatial dynamic and very different from static distribution/number in simulators, very different cell/building layouts and radio propagation. We separated commercial mobile network A into 2 neighboring clusters C1/C2 (66/47 cells, MF), and performed a trial for each one, with 2.03% RSRP (coverage indicator) and 5.62% RSRQ (interference/capacity indicator) improvement in C1, and 3.17% RSRP, 4.86% RSRQ improvement for C2. The 3rd trial was done for whole mobile network A (113 cells, MF), and no significant improvement was observed since most gain has been achieved in first 2 trials. In 4th trial, we achieved 10.79% RSRP and 6.74% RSRQ improvement for mobile network B (151 cells, MF). In 5th trial for mobile network C (131 cells, MF/CA), no significant improvement was observed due to either little room for optimization or significant difference between mobile network C and task distributions in simulation. In 6th trial, we achieved 9.55% RSRP and 12.42% RSRQ improvement for commercial mobile network D (159 cells, MF/CA). !3 REFERENCES Noam Brown, Tuomas Sandholm. Superhuman AI for heads-up no-limit poker: Libratus beats top professionals. Science, 359:418-424, 2018. Konstantinos Bousmalis, Sergey Levine. Closing the Simulation-to-Reality Gap for Deep Robotic Learning. Google Research Blog, https://research.googleblog.com/2017/10/closing-simulation-to-reality-gap-for.html, 2017 John Celentano. Verizon Wireless: The Big Spender in 2016. AGL Media Group, http:// www.aglmediagroup.com/verizon-wireless-the-big-spender-in-2016/, 2016 Shaoshuai Fan, Hui Tian, Cigdem Sengul. Self-optimization of coverage and capacity based on a fuzzy neural network with cooperative reinforcement learning. EURASIP Journal on Wireless Communications and Networking, 2014:57, 2014. Hado van Hasselt, Arthur Guez, David Silver. Deep Reinforcement Learning with Double Q-learning. AAAI'16 Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2094-2100, 2016. Kaiming He, Xiangyu Zhang, Shaoqing Ren, Jian Sun. Deep Residual Learning for Image Recognition. Preprint at https://arxiv.org/abs/1512.03385, 2015 Yann LeCun, Léon Bottou, Yoshua Bengio, and Patrick Haffner. Gradient-based learning applied to document recognition. Proceedings of the IEEE, 86:2278-2324, 1998. Yann LeCun, Yoshua Bengio and Geoffrey Hinton. Deep Learning. Nature, 521:436-444, 2015. Marketwired. Cisco Announces Intent to Acquire Intucell. http://www.marketwired.com/press-release/ciscoannounces-intent-to-acquire-intucell-nasdaq-csco-1748745.htm, 2013 Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A. Rusu, Joel Veness, Marc G. Bellemare, Alex Graves, Martin Riedmiller, Andreas K. Fidjeland, Georg Ostrovski, Stig Petersen, Charles Beattie, Amir Sadik, Ioannis Antonoglou, Helen King, Dharshan Kumaran, Daan Wierstra, Shane Legg, Demis Hassabis. Human-level control through deep reinforcement learning. Nature, 518:529–533, 2015. Volodymyr Mnih, Adrià Puigdomènech Badia, Mehdi Mirza, Alex Graves, Timothy P. Lillicrap, Tim Harley, David Silver, Koray Kavukcuoglu. Asynchronous Methods for Deep Reinforcement Learning. Preprint at https://arxiv.org/abs/1602.01783, 2016 Matej Moravčík, Martin Schmid, Neil Burch, Viliam Lisý, Dustin Morrill, Nolan Bard, Trevor Davis, Kevin Waugh, Michael Johanson, Michael Bowling. DeepStack: Expert-Level Artificial Intelligence in No-Limit Poker. Science, 356:508-513, 2017 Josh Tobin, Rachel Fong, Alex Ray, Jonas Schneider, Wojciech Zaremba, Pieter Abbeel. Domain Randomization for Transferring Deep Neural Networks from Simulation to the Real World. IROS, 2017 Andrei A. Rusu, Matej Vecerik, Thomas Rothörl, Nicolas Heess, Razvan Pascanu, Raia Hadsell. Sim-to-Real Robot Learning from Pixels with Progressive Nets. Preprint at https://arxiv.org/abs/1610.04286, 2016. David Silver, Aja Huang, Chris J. Maddison, Arthur Guez, Laurent Sifre, George van den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, Sander Dieleman, Dominik Grewe, John Nham, Nal Kalchbrenner, Ilya Sutskever, Timothy Lillicrap, Madeleine Leach, Koray Kavukcuoglu, Thore Graepel, Demis Hassabis. Mastering the game of Go with deep neural networks and tree search. Nature, 529:484–489, 2016. David Silver, Julian Schrittwieser, Karen Simonyan, Ioannis Antonoglou, Aja Huang, Arthur Guez, Thomas Hubert, Lucas Baker, Matthew Lai, Adrian Bolton, Yutian Chen, Timothy Lillicrap, Fan Hui, Laurent Sifre, George van den Driessche, Thore Graepel, Demis Hassabis. Mastering the game of Go without human knowledge. Nature, 550:354–359, 2017. Oriol Vinyals, Timo Ewalds, Sergey Bartunov, Petko Georgiev, Alexander Sasha Vezhnevets, Michelle Yeo, Alireza Makhzani, Heinrich Küttler, John Agapiou, Julian Schrittwieser, John Quan, Stephen Gaffney, Stig Petersen, Karen Simonyan, Tom Schaul, Hado van Hasselt, David Silver, Timothy Lillicrap, Kevin Calderone, Paul Keet, Anthony Brunasso, David Lawrence, Anders Ekermo, Jacob Repp, Rodney Tsing. StarCraft II: A New Challenge for Reinforcement Learning. Preprint at https://arxiv.org/abs/1708.04782, 2017. !4 Ronald J. Williams. Simple Statistical Gradient-Following Algorithms for. Connectionist Reinforcement Learning. Machine Learning, 8:229–256, 1992 !5
2cs.AI
Goal-Driven Dynamics Learning via Bayesian Optimization arXiv:1703.09260v2 [cs.SY] 22 Sep 2017 Somil Bansal, Roberto Calandra, Ted Xiao, Sergey Levine, and Claire J. Tomlin Abstract— Real-world robots are becoming increasingly complex and commonly act in poorly understood environments where it is extremely challenging to model or learn their true dynamics. Therefore, it might be desirable to take a taskspecific approach, wherein the focus is on explicitly learning the dynamics model which achieves the best control performance for the task at hand, rather than learning the true dynamics. In this work, we use Bayesian optimization in an active learning framework where a locally linear dynamics model is learned with the intent of maximizing the control performance, and used in conjunction with optimal control schemes to efficiently design a controller for a given task. This model is updated directly based on the performance observed in experiments on the physical system in an iterative manner until a desired performance is achieved. We demonstrate the efficacy of the proposed approach through simulations and real experiments on a quadrotor testbed. I. I NTRODUCTION Given the system dynamics, optimal control schemes such as LQR, MPC, and feedback linearization can efficiently design a controller that maximizes a performance criterion. However, depending on the system complexity, it can be quite challenging to model its true dynamics. Moreover, for a given task, a globally accurate dynamics model is not always necessary to design a controller. Often, partial knowledge of the dynamics is sufficient, e.g., for trajectory tracking purposes a local linearization of a non-linear system is often sufficient. In this paper we argue that, for complex systems, it might be preferable to adapt the controller design process for the specific task, using a learned system dynamics model sufficient to achieve the desired performance. We propose Dynamics Optimization via Bayesian Optimization (aDOBO), a Bayesian Optimization (BO) based active learning framework to learn the dynamics model that achieves the best performance for a given task based on the performance observed in experiments on the physical system. This active learning framework takes into account all past experiments and suggests the next experiment in order to learn the most about the relationship between the performance criterion and the model parameters. Particularly important for robotic systems is the use of data-efficient approaches, where only few experiments are needed to obtain improved performance. Hence, we employ BO, an optimization method often used to optimize a performance criterion All authors are with the Department of Electrical Engineering and Computer Sciences, University of California, Berkeley. {somil, roberto.calandra, t.xiao, svlevine, tomlin}@eecs.berkeley.edu ∗ This research is supported by NSF under the CPS Frontiers VehiCal project (1545126), by the UC-Philippine-California Advanced Research Institute under project IIID-2016-005, and by the ONR MURI Embedded Humans (N00014-16-1-2206). Cost Function Current Linear Dynamics New Linear Dynamics Optimal Control Scheme Controller Bayesian Optimization Actual System Cost Output Cost Evaluator Fig. 1: aDOBO: A Bayesian optimization-based active learning framework for optimizing the dynamics model for a given cost function, directly based on the observed cost values. while keeping the number of evaluations of the physical system small [1]. Specifically, we use BO to optimize the dynamics model with respect to the desired task, where the dynamics model is updated after every experiment so as to maximize the performance on the physical system. A flow diagram of our framework is shown in Figure 1. The current linear dynamics model, together with the cost function (also referred to as task/performance criterion), are used to design a controller with an appropriate optimal control scheme. The cost (or performance) of the controller is evaluated in closedloop operation with the actual (unknown) physical plant. BO uses this performance information to iteratively update the dynamics model to improve the performance. This procedure corresponds to optimizing the linear system dynamics with the purpose of maximizing the performance of the final controller. Hence, unlike traditional system identification approaches, it does not necessarily correspond to finding the most accurate dynamics model, but rather the model yielding the best controller performance when provided to the optimal control method used. Traditional system identification approaches are divided into two stages: 1) creating a dynamics model by minimizing some prediction error (e.g., using least squares) 2) using this dynamics model to generate an appropriate controller. In this approach, modeling the dynamics can be considered an offline process as there is no information flow between the two design stages. In online methods, the dynamics model is instead iteratively updated using the new data collected by evaluating the controller [2]. Our approach is an online method. Both for the online and the offline cases, creating a dynamics model based only on minimizing the prediction error can introduce sufficient inaccuracies to lead to suboptimal control performance [3]–[8]. Using machine learning techniques, such as Gaussian processes, does not alleviate this issue [9]. Instead, authors in [3] proposed to optimize the dynamics model directly with respect to the controller performance, but since the dynamics model is optimized offline, the resultant model is not necessarily optimal for the actual system. We instead explicitly find the dynamics model that produces the best control performance for the actual system. Previous studies addressed the problem of optimizing a controller using BO. In [10]–[12], the authors tuned the penalty matrices in an LQR problem for performance optimization. Although interesting results emerge from these studies, tuning penalty matrices may not achieve the desired performance when an accurate system model is not available. Our approach overcomes these challenges as it does not rely on an accurate system dynamics model. In [13], the authors directly learn the parameters of a linear feedback controller using BO. However, a typical controller might be non-linear and can contain hundreds of parameters; it is not feasible to optimize such high-dimensional controllers using BO [1]. Since aDOBO does not aim at directly learning the controller, it is agnostic to the dimensionality of the controller. It can leverage the low-dimensional structure of the dynamics to optimize the high-dimensional controllers. Moreover, it does not need to impose any structure on the controller and can easily design general non-linear controllers as well (see Sec. IV). The problem of updating a system model to improve control performance is also related to adaptive control, where the model parameters are identified from sensor data, and subsequently the updated model is used to design a controller (see [14]–[18]). However, in adaptive control, the model parameters are generally updated to get a good prediction model and not necessarily to maximize the controller performance. In contrast, we explicitly take into account the observed performance and search for the model that achieves the highest performance. To the best of our knowledge, this is the first method that optimizes a dynamics model to maximize the control performance on the actual system. Our approach does not require the prior knowledge of an accurate dynamics model, nor of its parameterized form. Instead, the dynamics model is optimized, in an active learning setting, directly with respect to the desired cost function using data-efficient BO. II. P ROBLEM F ORMULATION Consider an unknown, stable, discrete-time, potentially non-linear, dynamical system zk+1 = f (zk , uk ), k ∈ {0, 1, . . . , N − 1} , (1) where zk ∈ Rnx and uk ∈ Rnu denote the system state and the control input at time k respectively. Given an initial state z0 , the objective is to design a controller that minimizes the cost function J subject to the dynamics in (1) J0∗ = min −1 uN 0 N −1 J0 (zN ) 0 , u0 = min N −1 X −1 uN 0 i=0 with system matrices (Aθ , Bθ ). The system matrices are parameterized by θ ∈ M ⊆ Rd , which is to be varied during the learning procedure. For a given θ and the current system state zk , let πk (zk , θ) denote the optimal control sequence for the linear system (Aθ , Bθ ) for the horizon {k, k +1, . . . , N } N −1 πk (zk , θ) := ūkN −1 = arg min Jk (zN ), k , uk −1 uN k (3) subject to zj+1 =Aθ zj + Bθ uj . The key difference between (2) and (3) is that the controller is designed for the parameterized linear system as opposed to the true system. As θ is varied, different matrix pairs (Aθ , Bθ ) are obtained, which result in different controllers π(·, θ). Our aim is to find, among all linear models, the linear model (Aθ∗ , Bθ∗ ) whose controller π(·, θ∗ ) minimizes J0 (ideally achieves J0∗ ) for the actual system, i.e., N −1 θ∗ = arg min J0 (zN ), 0 , u0 θ∈M subject to zk+1 = f (zk , uk ) , uk = πk1 (zk , θ), (4) where πk1 (zk , θ) denotes the 1st control in the sequence πk (zk , θ). To make the dependence on θ explicit, we refer to J0 in (4) as J(θ) here on. Note that (Aθ∗ , Bθ∗ ) in (4) may not correspond to an actual linearization of the system, but simply to the linear model that gives the best performance on the actual system when its optimal controller is applied in a closed-loop fashion on the actual physical plant. We choose LTI modeling to reduce the number of parameters used to represent the system, and make the dynamics learning process data efficient. Linear modeling also allows to efficiently design the controller in (3) for general cost functions (e.g., using MPC for any convex cost J). In general, the effectiveness of linear modeling depends on both the system and the control objective. If f is linear, a linear model is trivially sufficient for any control objective. If f is non-linear, a linear model may not be sufficient for all control tasks; however, for regulation and trajectory tracking tasks, a linear model is often adequate (see Sec. V). A linear parameterization is also used in adaptive control for similar reasons [18]. Nevertheless, the proposed framework can handle more general model classes as long as the optimal control problem in (3) can be solved for those classes. Since f is unknown, the shape of the cost function, J(θ), in (4) is unknown. The cost is thus evaluated empirically in each experiment, which is often expensive as it involves conducting an experiment. Thus, the goal is to solve the optimization problem in (4) with as few evaluations as possible. In this paper, we do so via BO. III. BACKGROUND l(zi , ui ) + g(zN , uN ) , subject to zk+1 =f (zk , uk ) , (2) N −1 where zN := (z , z , . . . , z ). u is similarly defined. i i+1 N i i One of the key challenges in designing such a controller is the modeling of the unknown system dynamics in (1). In this work, we model (1) as a linear time-invariant (LTI) system In order to optimize (Aθ , Bθ ), we use BO. In this section, we briefly introduce Gaussian processes and BO. A. Gaussian Process (GP) Since the function J(θ) in (4) is unknown a priori, we use nonparametric GP models to approximate it over its domain M. GPs are a popular choice for probabilistic nonparametric regression, where the goal is to find a nonlinear map, J(θ) : M → R, from an input vector θ ∈ M to the function value J(θ). Hence, we assume that function values J(θ), associated with different values of θ, are random variables and that any finite number of these random variables have a joint Gaussian distribution dependent on the values of θ [19]. For GPs, we define a prior mean function and a covariance function (or kernel), k(θi , θj ), which defines the covariance between any two function values, J(θi ) and J(θj ). In this work, the mean is assumed to be zero without loss of generality. The choice of kernel is problem-dependent and encodes general assumptions such as smoothness of the unknown function. In the experimental section, we employ the 5/2 Matèrn kernel where the hyperparameters are optimized by maximizing the marginal likelihood [19]. This kernel function implies that the underlying function J is differentiable and takes values within the 2σf confidence interval with high probability. The GP framework can be used to predict the distribution of the performance function J(θ∗ ) at an arbitrary input θ∗ based on the past observations, D = {θi , J(θi )}ni=1 . Conditioned on D, the mean and variance of the prediction are µ(θ∗ ) = kK −1 J ; σ 2 (θ∗ ) = k(θ∗ , θ∗ ) − kK −1 kT , (5) where K is the kernel matrix with Kij = k(θi , θj ), k = [k(θ1 , θ∗ ), . . . , k(θn , θ∗ )] and J = [J(θ1 ), . . . , J(θn )]. Thus, the GP provides both the expected value of the performance function at any arbitrary point θ∗ as well as a notion of the uncertainty of this estimate. B. Bayesian Optimization (BO) Bayesian optimization aims to find the global minimum of an unknown function [1], [20], [21]. BO is particularly suitable for the scenarios where evaluating the unknown function is expensive, which fits our problem in Sec. II. At each iteration, BO uses the past observations D to model the objective function, and uses this model to determine informative sample locations. A common model used in BO for the underlying objective, and the one that we consider, are Gaussian processes (see Sec. III-A). Using the mean and variance predictions of the GP from (5), BO computes the next sample location by optimizing the so-called acquisition function, α (·). Different acquisition functions are used in literature to trade off between exploration and exploitation during the optimization process [1]. For example, the next evaluation for expected improvement (EI) acquisition function [22] is given by θ∗ = arg minθ α (θ) where α (θ) = σ(θ)[uΦ(u) + φ(u)]; u = (µ(θ) − T )/σ(θ). (6) Φ(·) and φ(·) in (6), respectively, are the standard normal cumulative distribution and probability density functions. The target value T is the minimum of all explored data. Intuitively, EI selects the next parameter point where the expected improvement over T is maximal. Repeatedly evaluating the system at points given by (6) thus improves the observed performance. Note that optimizing α (θ) in (6) does not require physical interactions with the system, but only evaluation of the GP model. When a new set of optimal Algorithm 1: aDOBO algorithm 1 2 3 4 5 6 7 8 9 10 11 D ←− if available: {θ, J (θ)} Prior ←− if available: Prior of the GP hyperparameters Initialize GP with D while optimize do 0 Find θ∗ = arg minθ α (θ); θ ←− θ∗ N −1 N z0 = {}, u0 = {} for i = 0 : N − 1 do 0 Given zi and (Aθ0 , Bθ0 ), compute πi (zi , θ ) 0 Apply πi1 (zi , θ ) on the real system and measure zi+1 N zN 0 ←− (z0 , zi+1 ) 0 N −1 u0 ←− (u0N −1 , πi1 (zi , θ )) 0 12 13 N −1 Evaluate J(θ ) := J0 (zN ) using (2) 0 , u0 0 0 Update GP and D with {θ , J(θ )} parameters θ∗ is determined, they are finally evaluated on the real objective function J (i.e., the system). IV. DYNAMICS O PTIMIZATION VIA BO (aDOBO) This section presents the technical details of aDOBO, a novel framework for optimizing dynamics model for maximizing the resultant controller performance. In this work, θ ∈ Rnx (nx +nu ) , i.e., each dimension in θ corresponds to an entry of the Aθ or Bθ matrices. This parameterization is chosen for simplicity, but other parameterizations can easily be used. Given an initial state of the system z0 and the current system dynamics model (Aθ0 , Bθ0 ), we design an optimal 0 control sequence π0 (z0 , θ ) that minimizes the cost function N −1 J0 (zN ), i.e., we solve the optimal control problem 0 , u0 in (3). The first control of this control sequence is applied on the actual system and the next state z1 is measured. 0 We then similarly compute π1 (z1 , θ ) starting at z1 , apply the first control in the obtained control sequence, measure N −1 z2 , and so on until we get zN . Once zN are 0 and u0 −1 obtained, we compute the true performance of uN on 0 −1 the actual system by analytically computing J0 (zN , uN ) 0 0 0 using (2). We denote this cost by J(θ ) for simplicity. We next update the GP based on the collected data sample 0 0 {θ , J(θ )}. Finally, we compute θ∗ that minimizes the corresponding acquisition function α (θ) and repeat the process for (Aθ∗ , Bθ∗ ). Our approach is illustrated in Figure 1 and summarized in Algorithm 1. Intuitively, aDOBO directly learns the shape of the cost function J(θ) as a function of linearizations (Aθ , Bθ ). Instead of learning the global shape of this function through random queries, it analyzes the performance of all the past evaluations and by optimizing the acquisition function, generates the next query that provides the maximum information about the minima of the cost function. This direct minima-seeking behavior based on the actual observed performance ensures that our approach is data-efficient. Thus, in the space of all linearizations, we efficiently and directly search for the linearization whose corresponding controller minimizes J0 on the actual system. States Control inputs 0 1 v x 1.5 -1 0.5 0 10 20 -2 30 0 10 20 30 0.5 ! y 1 -1 -2 Fig. 2: Dubins car: mean and standard deviation of η during the learning process (over 10 trials). aDOBO reaches within the 10% of the optimal cost in just 100 iterations, starting from a random dynamics model. Using a log warping on the cost function further accelerates the learning. Since the problem in (3) is an optimal control problem for the linear system (Aθ0 , Bθ0 ), depending on the form of the cost function J, different optimal control schemes can be used. For example, if J is quadratic, the optimal controller is a linear feedback controller given by the solution of a Riccati equation. If J is a general convex function, the optimal control problem is solved through a general convex MPC solver, and the resultant controller could be non-linear. Thus, depending on the form of J, the controller designed by aDOBO can be linear or non-linear. This property causes aDOBO to perform well in the scenarios where a linear controller is not sufficient, as shown in Sec. VI-B. More generally, the proposed framework is modular and other control schemes can be used that are more suitable for a given cost function, which allows us to capture a richer controller space. Note that the GP in our algorithm can be initialized with dynamics models whose controllers are known to perform well on the actual system. This generally leads to a faster convergence. For example, when a good linearization of the system is known, it can be used to initialize D. When no information is known about the system a priori, the initial models are queried randomly. Finally, note that aDOBO can also be used when the real system is stochastic. In this case, aDOBO will minimize the expected cost. V. N UMERICAL S IMULATIONS In this section, we present some simulation results on the performance of the proposed method for controller design. A. Dubins Car System For the first simulation, we consider a three dimensional non-linear Dubins car whose dynamics are given as ẋ = v cos φ, ẏ = v sin φ, φ̇ = ω , (7) where z := (x, y, φ) is the state of system, p = (x, y) is the position, φ is the heading, v is the speed, and ω is the turn rate. The input (control) to the system is u := (v, ω). For simulation purposes, we discretize the dynamics at a frequency of 10Hz. Our goal is to design a controller that steers the system to the equilibrium point z ∗ = 0, u∗ = 0 starting from the state z0 := (1.5, 1, π/2). In particular, we 0 10 20 30 Horizon (N) 0 10 20 Horizon (N) Learned Optimal Fig. 3: Dubins car: state and control trajectories for the learned and the true system. The two trajectories are very similar, indicating that the learned dynamics model represents the system behavior accurately around the desired state. want to minimize the cost function N −1 J0 (zN )= 0 , u0 N −1 X  T zkT Qzk + uTk Ruk + zN Qf zN . (8) k=0 We choose N = 30. Q, Qf and R are all chosen as identity matrices of appropriate sizes. We also assume that the dynamics are not known; hence, we cannot directly design a controller to steer the system to the desired equilibrium. Instead, we use aDOBO to find a linearization of dynamics in (7) that minimizes the cost function in (8), directly from the experimental data. In particular, we represent the system in (7) by a parameterized linear system zk+1 = Aθ zk + Bθ uk , design a controller for this system and apply it on the actual system. Based on the observed performance, BO suggests a new linearization and the process is repeated. Since the cost function is quadratic in this case, the optimal control problem for a particular θ is an LQR problem, and can be solved efficiently. For BO, we use the MATLAB library BayesOpt [23]. Since there are 3 states and 2 inputs, we learn 15 parameters in total, one corresponding to each entry of the Aθ and Bθ matrices. The bounds on the parameters are chosen randomly as M = [−2, 2]15 . As acquisition function, we use EI (see eq. (6)). Since no information is assumed to be known about the system, the GP was initialized with a random θ. We also warp the cost function J using the log function before passing it to BO. Warping makes the cost function smoother while maintaining its monotonic properties, which makes the sampling process in BO more efficient and leads to a faster convergence. For comparison, we compute the true optimal controller that minimizes (8) subject to the dynamics in (7) using the non-linear solver fmincon in MATLAB to get the minimum achievable cost J0∗ across all controllers. We use the percentage error between the true optimal cost J0∗ and the cost achieved by aDOBO as our comparison metric in this work ηn = 100 × (J0∗ − J(θn ))/J0∗ , (9) where J(θn ) is the best cost achieved by aDOBO by iteration n. In Fig. 2, we plot ηn for Dubins car. As learning progresses, aDOBO gathers more and more information about the minimum of J0 and reaches within 10% of J0∗ in just 100 iterations, demonstrating its effectiveness in designing a controller for an unknown system just from the experimental data. Fig. 2 also highlights the effect of warping in BO. A well warped function converges faster to the optimal performance. We also compared the control and state trajectories obtained from the learned controller with the optimal control and state trajectories. As shown in Fig. 3, the learned system matrices not only achieve the optimal cost, but also follow the optimal state and control trajectories very closely. Even though the trajectories are very close to each other for the true system and its learned linearization, this linearization may not correspond to any actual linearization of the system. The next simulation illustrates this key property of aDOBO more clearly. B. A Simple 1D Linear System not even be required as far as the control performance is concerned. C. Cart-pole System We next apply aDOBO to a cart-pole system (M + m)ẍ − mlψ̈ cos ψ + mlψ̇ 2 sin ψ = F , lψ̈ − g sin ψ = ẍ cos ψ , where x denotes the position of the cart with mass M , ψ denotes the pendulum angle, and F is a force that serves as the control input. The massless pendulum is of length l with a mass m attached at its end. Define the system state as z := (x, ẋ, ψ, ψ̇) and the input as u := F . Starting from the state (0, 0, π6 , 0), the goal is to keep the pendulum straight up, while keeping the state within given lower and upper bounds. In particular, we want to minimize the cost For this simulation, we consider a simple 1D linear system zk+1 = zk + uk , (10) where zk and uk are the state and the input of the system at time k. Although the dynamics model is very simple, it illustrates some key insights about the proposed method. Our goal is to design a controller that minimizes (8) starting from the state z0 = 1. We choose N = 30 and R = Q = Qf = 1. We assume that the dynamics are unknown and use aDOBO to learn the dynamics, where θ := (θ1 , θ2 ) ∈ R2 are the dynamics parameters to be learned. The learning process converges in 45 iterations to the true optimal performance (J0∗ = 1.61), which is computed using LQR on the real system. The converged parameters are θ1 = 1.69 and θ2 = 2.45, which are Fig. 4: Cost of the actual vastly different from the system in (10) as a function true parameters θ1 = 1 and of the linearization parameters θ2 = 1, even though the (θ1 , θ2 ). The parameters obactual system is a linear tained by aDOBO (the pink system. To understand X) yield to performance very this, we plot the cost close to the true system paobtained on the true rameters (the green ∗). Note system J0 as a function that aDOBO does not necesof linearization parameters sarily converge to the true pa(θ1 , θ2 ) in Fig. 4. Since rameters. the performances of the two sets of parameters are very close to each other, a direct performance based learning process (e.g., aDOBO) cannot distinguish between them and both sets are equally optimal for it. More generally, a wide range of parameters lead to similar performance on the actual system. Hence, we can expect the proposed approach to recover the optimal controller and the actual state trajectories, but not necessarily the true dynamics or its true linearization. This simulation also suggests that the true dynamics of the system may (11) N −1 J0 (zN )= 0 , u0 N −1 X  T zkT Qzk + uTk Ruk + zN Qf zN k=0 +λ N X max(0, z − zi , zi − z), i=0 (12) where λ penalizes the deviation of state zi below z and above z. We assume that the dynamics are unknown and use aDOBO to optimize the dynamics. For simulation, we discretize the dynamics at a frequency of 10Hz. We choose N = 30, M = 1.5Kg, m = 0.175Kg, λ = 100 and l = 0.28m. The Q = Qf = diag([0.1, 1, 100, 1]) and R = 0.1 matrices are chosen to penalize the angular deviation significantly. We use z = [−2, −∞, −0.1, −∞] and z = [2, ∞, ∞, ∞], i.e., we are interested in controlling the pendulum while keeping the cart position within [−2, 2], and limiting the pendulum overshoot to 0.1. The optimal control problem for a particular linearization is a convex MPC problem and solved using YALMIP [24]. The true J0∗ is computed using fmincon. As shown in Fig. 5, aDOBO reaches within 20% of the optimal performance in 250 iterations and continue to make progress towards finding the optimal controller. This simulation demonstrates that the proposed method (a) is also applicable to highly non-linear systems, (b) can handle general convex cost functions that are not necessarily quadratic, and (c) different optimal control schemes can be used within the proposed framework. Since an MPC controller can in general be non-linear, this implies that the proposed method can also design complex non-linear controllers with an LTI parametrization. VI. C OMPARISON WITH OTHER METHODS In this section, we compare our approach with some other online learning schemes for controller design. A. Tuning (Q, R) vs aDOBO In this section, we consider the case in which the cost function J0 is quadratic (see Eq. (8)). Suppose that the actual linearization of the system around z ∗ = 0 and u∗ = 0 is Percentage error in J 0 40 30 ,= 0 ,= 0.1 ,= 0.2 20 10 0 0 100 200 300 400 500 Iteration Fig. 5: Cart-pole system: mean and standard deviation of η during the learning process. The learned controller reaches within 20% of the optimal cost in 250 iterations, demonstrating the applicability of aDOBO to highly non-linear systems. known and given by (A∗ , B ∗ ). To design a controller for the actual system in such a case, it is a common practice to use an LQR controller for the linearized dynamics. However, the resultant controller may be sub-optimal for the actual nonlinear system. To overcome this problem, authors in [10], [11] propose to optimize the controller by tuning penalty matrices Q and R in (8). In particular, we solve θ∗ = arg min θ∈M N −1 J0 (zN ), 0 , u0 sub. to zk+1 = f (zk , uk ), ∗ uk = K(θ)zk , (13) ∗ K(θ) = LQR(A , B , WQ (θ), WR (θ), Qf ) , where K(θ) denotes the LQR feedback matrix obtained for the system matrices (A∗ , B ∗ ) with WQ and WR as state and input penalty matrices, and can be computed analytically. For further details of LQR method, we refer interested readers to [25]. The difference between optimization problems (4) and (13) is that now we parameterize penalty matrices WQ and WR instead of system dynamics. The optimization problem in (13) is solved using BO in a similar fashion as we solve (4) [10]. The parameter θ, in this case, can be initialized by the actual penalty matrices Q and R, instead of a random query, which generally leads to a much faster convergence. An alternative approach is to use aDOBO, except that now we can use (A∗ , B ∗ ) as initializations for the system matrices A and B. Actual penalty matrices Q and R are used for aDOBO. When (A∗ , B ∗ ) are known to a good accuracy, (Q, R) tuning method is expected to converge quickly to the optimal performance compared to aDOBO as it needs to learn fewer parameters, i.e., (nx + nu ) (assuming diagonal penalty matrices) compared to nx (nx + nu ) parameters for aDOBO. However, when there is error in (A∗ , B ∗ ) (or more generally if dynamics are unknown), the performance of the (Q, R) tuning method can degrade significantly as it relies on an accurate linearization of the system dynamics, rendering the method impractical for control design purposes. To compare the two methods we use the Dubins car model in Eq. (7). The rest of the simulation parameters are same as Section V-A. We compute the linearization of Dubins car around z ∗ = 0 and u∗ = 0 using (7) and add random matrices (Ar , Br ) to them to generate A0 = (1 − α)A∗ + αAr and B 0 = (1−α)B ∗ +αBr . We then initialize both methods with (A0 , B 0 ) for different αs. As shown in Fig. 6, the (Q, R) tuning method outperforms aDOBO, when there is no noise Fig. 6: Dubins car: Comparison between tuning the penalty matrices (Q, R) [10] (dashed curves), and aDOBO (solid curves) for different noise levels in (A∗ , B ∗ ), the true linearized dynamics around the desired goal state. When the true linearized dynamics are known perfectly, the (Q, R) tuning method outperforms aDOBO because fewer parameters are to be learned. Its performance, however, drops significantly as noise increases, rendering the method impractical for the scenarios where system dynamics are not known to a good accuracy. in (A∗ , B ∗ ). But as α increases, its performance deteriorates significantly. In contrast, aDOBO is fairly indifferent to the noise level, as it does not assume any prior knowledge of system dynamics. The only information assumed to be known is penalty matrices (Q, R), which are generally designed by the user and hence are known a priori. B. Learning K vs aDOBO When the cost function is quadratic, another potential approach is to directly parameterize and optimize the feedback matrix K ∈ Rnx nu in (13) [13] as N −1 θ∗ = arg min J0 (zN ), 0 , u0 θ∈M sub. to zk+1 = f (zk , uk ), (14) uk = Kθ zk . The advantage of this approach is that only nx nu parameters are learned compared to nx (nx + nu ) parameters in aDOBO, which is also evident from Fig. 7a, wherein the learning process for K converges much faster than that for aDOBO. However, a linear controller might not be sufficient for general cost functions, and non-linear controllers are required to achieve a desired performance. As shown in Sec. V-C, aDOBO is not limited to linear controllers; hence, it outperforms the K learning method in such scenarios. Consider, for example, the linear system xk+1 = xk + yk , yk+1 = yk + uk , (15) and the cost function in Eq. (12) with state zk = (xk , yk ), N = 30, z = [0.5, −0.4] and z = [∞, ∞]. Q, Qf and R are all identity matrices of appropriate sizes, and λ = 100. As evident from Fig. 7b, directly learning a feedback matrix performs poorly with an error as high as 80% from the optimal cost. Since the cost is not quadratic, the optimal controller is not necessarily linear; however, since the controller in (14) is restricted to a linear space, it performs rather poorly in this case. In contrast, aDOBO continues to improve performance and reaches within 20% of the optimal cost within few iterations, because we implicitly parameterize a much richer controller space via learning A (a) Dubins car (b) System of Eq. (15) Fig. 7: Mean and standard deviation of η obtained via directly learning the feedback controller K [13] and aDOBO for different cost functions. (a) Comparison for the quadratic cost function of Eq. (8). Directly learning K converges to the optimal performance faster because fewer parameters are to be learned. (b) Comparison for the non-quadratic cost function of Eq. (12). Since the optimal controller for the actual system is not necessarily linear in this case, directly learning K leads to a poor performance Iteration 200 400 600 aDOBO 53 ± 50% 27 ± 12% 17 ± 7% Learning Control Sequence 605 ± 420% 357 ± 159% 263 ± 150% TABLE I: System in (15): mean and standard deviation of η for aDOBO, and for directly learning the control sequence. Since the space of control sequence is huge, the error is substantial even after 600 iterations. and B. In this example, we capture non-linear controllers by using a linear dynamics model with a convex MPC solver. Since the underlying system is linear, the true optimal controller is also in our search space. Our algorithm makes sure that we make a steady progress towards finding that controller. However, we are not restricted to learning a linear controller K. One can also directly learn the actual control sequence to be applied to the system (which also captures the optimal controller). This approach may not be data-efficient compared to aDOBO as the control sequence space can be very large depending on the problem horizon, and will require a large number of experiments. As shown in Table I, the performance error is more than 250% even after 600 iterations, rendering the method impractical for real systems. C. Adaptive Control vs aDOBO In this work, we aim to directly find the best linearization based on the observed performance. Another approach is to learn a true linearization of the system based on the observed state and input trajectory during the experiments. The underlying hypothesis is that as more and more data is collected, a better linearization is obtained, eventually leading to an improved control performance. This approach is in-line with the traditional model identification and the N −1 adaptive control frameworks. Let (j zN ) denotes the 0 , j u0 state and input trajectories for experiment j. We also let Di = N −1 ∪ij=1 (j zN ). After experiment i, we fit an LTI model 0 , j u0 of the form zk+1 = Ai zk + Bi uk using least squares on data in Di and then use this model to obtain a new controller for experiment i+1. We apply the approach on the linear system in (15) and the non-linear system in (7) with the cost function in (8). For the linear system, the approach converges to the true system dynamics in 5 iterations. However, this approach Iteration 200 400 600 aDOBO 6 ± 3.7% 2.2 ± 1.1% 1.8 ± 0.7% Learning via LS 166.7 ± 411% 75.9 ± 189% 70.7 ± 166% TABLE II: Dubins car: mean and standard deviation of η obtained via learning (A, B) through least squares (LS), and through aDOBO. performs rather poorly on the non-linear system, as shown in Table II. When the underlying system is non-linear, all state and input trajectories may not contribute to the performance improvement. A good linearization should be obtained from the state and input trajectories in the region of interest, which depends on the task. For example, if we want to regulate the system to the equilibrium (0, 0), a linearization of the system around (0, 0) should be obtained. Thus, it is desirable to use the system trajectories that are close to this equilibrium point. However, a naive prediction error based approach has no means to select these “good” trajectories from the pool of trajectories and hence can lead to a poor performance. In contrast, aDOBO does not suffer from these limitations, as it explicitly utilizes a performance based optimization. A summary of the advantages and limitations of the four methods is provided in Table III. VII. Q UADROTOR P OSITION T RACKING E XPERIMENTS We now present the results of our experiments on Crazyflie 2.0, which is an open source nano quadrotor platform developed by Bitcraze. Its small size, low cost, and robustness make it Fig. 8: The Crazyflie 2.0 an ideal platform for testing new control paradigms. Recently, it has been extensively used to demonstrate aggressive flights [26], [27]. For small yaw, the quadrotor system is modeled asa rigid body with  a ten dimensional state vector s := p, v, ζ, ω , which includes the position p = (x, y, z) in an inertial frame I, linear velocities v = (vx , vy , vz ) in I, attitude (orientation) represented by Euler angles ζ, and angular velocities ω.   The system is controlled via three inputs u := u1 , u2 , u3 , where u1 is the thrust along the z-axis, and u2 and u3 are Method (Q, R) learning [10] F learning [13] (A, B) learning via least squares aDOBO Advantages Only (nx + nu ) parameters are to be learned so learning will be faster. Only nx nu parameters are to be learned so learning will be faster. Can lead to a faster convergence when the underlying system is linear Does not require any prior knowledge of system dynamics. Applicable to general cost functions. Limitations Performance can degrade significantly if the dynamics are not known to a good accuracy. Approach may not perform well for non-quadratic cost functions. Approach is not suitable for non-linear system. Number of parameters to be learned is higher, i.e., (n2x + nx nu ). rolling, pitching moments respectively. The full non-linear dynamics of a quadrotor are derived in [28], and its physical parameters are computed in [26]. Our goal in this experiment is to track a desired position p∗ starting from the initial position p0 = [0, 0, 1]. Formally, we minimize % improvement in J TABLE III: Relative advantages and limitations of different methods for automatic controller design. Percentage error in cost wrt the nominal controller 10 0 -10 0 10 20 30 40 50 60 Iteration N −1 J0 (s̄N )= 0 , u0 N −1 X  s̄Tk Qs̄ + uTk Ruk + s̄TN Qf s̄ , (16) k=0  where s̄ := p − p∗ , v, ζ, ω . Given the dynamics in [28], the desired optimal control problem can be solved using LQR; however, the resultant controller may still not be optimal for the actual system because (a) true underlying system is nonlinear and (b) the actual system may not follow the dynamics in [28] exactly due to several unmodeled effects, as illustrated in our results. Hence, we assume that the dynamics of vx and vy are unknown, and model them as     f vx φ = Aθ + Bθ u1 , (17) f vy ψ  where A and B are parameterized through θ. Our goal is to learn the parameter θ∗ that minimizes the cost in (16) for the actual Crazyflie using aDOBO. We use N = 400; the penalty matrix Q is chosen to penalize the position deviation. In our experiments, Crazyflie was flown in presence of a VICON motion capture system, which along with on-board sensors provides the full state information at 100Hz. The optimal control problem for a particular linearization in (17) is solved using LQR. For comparison, we compute the nominal optimal controller using the full dynamics in [28]. Figure 9 shows the performance of the controller from aDOBO compared with the nominal controller during the learning process. The nominal controller outperforms the learned controller initially, but within a few iterations, aDOBO performs better than the controller derived from the known dynamics model of Crazyflie. This is because aDOBO optimizes controller based on the performance of the actual system and hence can account for unmodeled effects. In 45 iterations, the learned controller outperforms the nominal controller by 12%, demonstrating the performance potential of aDOBO on real systems. VIII. C ONCLUSIONS AND F UTURE W ORK In this work, we introduce aDOBO, an active learning framework to optimize the system dynamics with the intent of maximizing the controller performance. Through simulations and real-world experiments, we demonstrate that Fig. 9: Crazyflie: percentage error between the learned and the nominal controller. The nominal controller is obtained by using the full 12D non-linear dynamics model of the quadrotor. As learning progresses, aDOBO outperforms the nominal controller by 12% on the actual system, indicating the capability of aDOBO to overcome modeling errors. aDOBO achieves the optimal control performance even when no prior information is known about the system dynamics. Several interesting future directions emerge from this work. The dynamics model learned through aDOBO maximizes the performance on a single task. The obtained dynamics model thus may not necessarily perform well on a similar but different task. It will be interesting to generalize aDOBO to optimize the dynamics for a class of tasks, e.g., regulating to different states. Leveraging the state and input trajectory data, along with the observed performance, to further increase the data-efficiency of the learning process is another promising direction. During the learning process, aDOBO can query parameters which might lead to an unstable behavior on the actual system and can cause safety concerns. In such cases, it might be desirable to combine aDOBO with the exploration methods that explicitly take safety into account, e.g., such as SafeOpt [29], [30]. Finally, since BO is not scalable to higher-dimensional systems (roughly beyond 30-40 parameters) [1], exploring alternative ways to scale aDOBO to more complex non-linear dynamics models is another interesting direction. R EFERENCES [1] B. Shahriari, K. Swersky, Z. Wang, R. P. Adams, and N. de Freitas, “Taking the human out of the loop: A review of Bayesian optimization,” Proceedings of the IEEE, vol. 104, no. 1, pp. 148–175, 2016. [2] M. P. Deisenroth, D. Fox, and C. E. Rasmussen, “Gaussian processes for data-efficient learning in robotics and control,” Transactions on Pattern Analysis and Machine Intelligence (PAMI), 2015. [3] J. Joseph, A. Geramifard, J. W. Roberts, J. P. How, and N. Roy, “Reinforcement learning with misspecified model classes,” in International Conference on Robotics and Automation, 2013, pp. 939–946. [4] P. L. Donti, B. Amos, and J. Z. Kolter, “Task-based end-to-end model learning,” arXiv preprint arXiv:1703.04529, 2017. [5] C. G. Atkeson, “Nonparametric model-based reinforcement learning,” in Advances in neural information processing systems, 1998, pp. 1008– 1014. [6] P. Abbeel, M. Quigley, and A. Y. Ng, “Using inaccurate models in reinforcement learning,” in International conference on Machine learning, 2006, pp. 1–8. [7] M. Gevers, “Identification for control: From the early achievements to the revival of experiment design,” European journal of control, vol. 11, no. 4-5, 2005. [8] H. Hjalmarsson, M. Gevers, and F. De Bruyne, “For model-based control design, closed-loop identification gives better performance,” Automatica, vol. 32, no. 12, 1996. [9] D. Nguyen-Tuong and J. Peters, “Model learning for robot control: a survey,” Cognitive Processing, vol. 12, no. 4, pp. 319–340, 2011. [10] A. Marco, P. Hennig, J. Bohg, S. Schaal, and S. Trimpe, “Automatic LQR tuning based on Gaussian process global optimization,” in International Conference on Robotics and Automation, 2016. [11] S. Trimpe, A. Millane, S. Doessegger, and R. D’Andrea, “A selftuning LQR approach demonstrated on an inverted pendulum,” IFAC Proceedings Volumes, vol. 47, no. 3, pp. 11 281–11 287, 2014. [12] J. W. Roberts, I. R. Manchester, and R. Tedrake, “Feedback controller parameterizations for reinforcement learning,” in Symposium on Adaptive Dynamic Programming And Reinforcement Learning (ADPRL), 2011, pp. 310–317. [13] R. Calandra, A. Seyfarth, J. Peters, and M. P. Deisenroth, “Bayesian optimization for learning gaits under uncertainty,” Annals of Mathematics and Artificial Intelligence, vol. 76, no. 1, pp. 5–23, 2015. [14] K. J. Åström and B. Wittenmark, Adaptive control. Courier Corporation, 2013. [15] M. Grimble, “Implicit and explicit LQG self-tuning controllers,” Automatica, vol. 20, no. 5, pp. 661–669, 1984. [16] D. Clarke, P. Kanjilal, and C. Mohtadi, “A generalized LQG approach to self-tuning control part i. aspects of design,” International Journal of Control, vol. 41, no. 6, pp. 1509–1523, 1985. [17] R. Murray-Smith and D. Sbarbaro, “Nonlinear adaptive control using nonparametric Gaussian process prior models,” IFAC Proceedings Volumes, vol. 35, no. 1, pp. 325–330, 2002. [18] S. Sastry and M. Bodson, Adaptive control: stability, convergence and robustness. Courier Corporation, 2011. [19] C. E. Rasmussen and C. K. I. Williams, Gaussian Processes for Machine Learning. The MIT Press, 2006. [20] H. J. Kushner, “A new method of locating the maximum point of an arbitrary multipeak curve in the presence of noise,” Journal of Basic Engineering, vol. 86, p. 97, 1964. [21] M. A. Osborne, R. Garnett, and S. J. Roberts, “Gaussian processes for global optimization,” in Learning and Intelligent Optimization (LION3), 2009, pp. 1–15. [22] J. Močkus, “On bayesian methods for seeking the extremum,” in Optimization Techniques IFIP Technical Conference, 1975. [23] R. Martinez-Cantin, “BayesOpt: a Bayesian optimization library for nonlinear optimization, experimental design and bandits.” Journal of Machine Learning Research, vol. 15, no. 1, pp. 3735–3739, 2014. [24] J. Lofberg, “YALMIP: A toolbox for modeling and optimization in MATLAB,” in International Symposium on Computer Aided Control Systems Design, 2005, pp. 284–289. [25] D. J. Bender and A. J. Laub, “The linear-quadratic optimal regulator for descriptor systems: discrete-time case,” Automatica, 1987. [26] B. Landry, “Planning and control for quadrotor flight through cluttered environments,” Master’s thesis, MIT, 2015. [27] S. Bansal, A. K. Akametalu, F. J. Jiang, F. Laine, and C. J. Tomlin, “Learning quadrotor dynamics using neural network for flight control,” in Conference on Decision and Control, 2016, pp. 4653–4660. [28] N. Abas, A. Legowo, and R. Akmeliawati, “Parameter identification of an autonomous quadrotor,” in International Conference On Mechatronics, 2011, pp. 1–8. [29] Y. Sui, A. Gotovos, J. Burdick, and A. Krause, “Safe exploration for optimization with Gaussian processes,” in International Conference on Machine Learning, 2015, pp. 997–1005. [30] F. Berkenkamp, A. P. Schoellig, and A. Krause, “Safe controller optimization for quadrotors with Gaussian processes,” in International Conference on Robotics and Automation, 2016, pp. 491–496.
3cs.SY
Exploiting generalisation symmetries in accuracy-based learning classifier systems: An initial study Larry Bull Abstract. Modern learning classifier systems typically exploit a niched genetic algorithm to facilitate rule discovery. When used for reinforcement learning, such rules represent generalisations over the state-action-reward space. Whilst encouraging maximal generality, the niching can potentially hinder the formation of generalisations in the state space which are symmetrical, or very similar, over different actions. This paper introduces the use of rules which contain multiple actions, maintaining accuracy and reward metrics for each action. It is shown that problem symmetries can be exploited, improving performance, whilst not degrading performance when symmetries are reduced. 12 1 INTRODUCTION Learning Classifier Systems (LCS) [Holland, 1976] are rulebased systems, where the rules are usually in the traditional production system form of “IF condition THEN assertion”. An evolutionary algorithm and/or other heuristics are used to search the space of possible rules, whilst another learning process is used to assign utility to existing rules, thereby guiding the search for better rules. LCS are typically used as a form of reinforcement learner, although variants also exist for supervised [Bernadó Mansilla & Garrell, 2003], unsupervised [Tammee et al., 2007] and function [Wilson, 2002] learning. Almost twenty years ago, Stewart Wilson introduced a form of LCS in which rule utility is calculated solely by the accuracy of the predicted consequences of rule assertions/actions – the “eXtended Classifier System” (XCS) [Wilson, 1995]. Importantly, XCS makes a clear connection between LCS and modern reinforcement learning (see [Sutton & Barto, 1998]): XCS uses a genetic algorithm (GA) [Holland, 1975] to discover regularities in the problem thereby enabling generalisations over the complete state-action-reward space. It has been found able to solve a number of well-known problems optimally (e.g., see [Butz, 2006]). Modern LCS, primarily XCS and its derivatives, have been applied to a number of real-world problems (e.g., see [Bull, 2004]), particularly data mining (e.g., see [Bull et al., 2008]), to great effect. Formal understanding of modern LCS has also increased in recent years (e.g., see [Bull & Kovacs, 2005]). XCS uses a niched GA, that is, it runs the GA over rules which are concurrently active. Initially, following [Booker, 1985] (see also [Fogarty, 1994]), the GA was run in the match set [M], i.e., the subset of rules whose condition matches the current state. The primary motivation for restricting the GA in this way is to avoid the recombination of rule conditions which generalise over very different areas of the problem space. Wilson Dept. of Computer Science & Creative Tech., UWE BS16 1QY, UK. Email: [email protected]. [1998] later increased the niching to action sets [A], i.e., the subset of [M] whose action matches the chosen output of the system. Wilson correctly highlighted that for tasks with asymmetrical generalisations per action, the GA would still have the potential to unhelpfully recombine rules working over different sub-regions of the input space unless it is moved to [A]. Using two simple benchmark tasks, he didn’t show significant changes in performance but did show a decrease in the number of unique rules maintained when some asymmetry existed from the use in [A]. Modern XCS uses the [A] form of GA, which has been studied formally in various ways (e.g., see [Bull, 2002; 2005][Butz et al., 2004][Butz et al., 2007]). It can be noted that the first LCS maintained separate GA populations per action [Holland & Reitman, 1978] (see [Wilson, 1985] for a similar scheme). The degree of symmetry within the state-action-reward space across all problems is a continuum. As noted, running the GA in niches of concurrently active rules identifies those whose conditions overlap in the problem space. However, using the GA in [A] means that any common structure in the problem space discovered by a rule with one action must wait to be shared through the appropriate mutation of its action. Otherwise it must be rediscovered by the GA for rules with another action(s). As the degree of symmetry in the problem increases, so the potentially negative effect of using the GA in [A] on the search process increases. This paper proposes a change in the standard rule structure to address the issue and demonstrates it using a slightly simplified version of XCS, termed YCS [Bull, 2005]. 2 YCS: A SIMPLE ACCURACY-BASED LCS YCS is without internal memory, the rule-base consists of a number (P) of condition-action rules in which the condition is a string of characters from the traditional ternary alphabet {0,1,#} and the action is represented by a binary string. Associated with each rule is a predicted reward value (r), a scalar which indicates the error () in the rule’s predicted reward and an estimate of the average size of the niches in which that rule participates (). The initial random population has these parameters initialized, somewhat arbitrarily, to 10. On receipt of an input message, the rule-base is scanned, and any rule whose condition matches the message at each position is tagged as a member of the current match set [M]. An action is then chosen from those proposed by the members of the match set and all rules proposing the selected action form an action set [A]. A version of XCS’s explore/exploit action selection scheme will be used here. That is, on one cycle an action is chosen at random and on the following the action with the highest average fitness-weighted reward is chosen deterministically. The simplest case of immediate reward R is considered here. Reinforcement in YCS consists of updating the error, the niche size estimate and then the reward estimate of each member of the current [A] using the Widrow-Hoff delta rule with learning rate : j  j + ( |R - rj| - j ) (1) rj  rj + ( R - rj ) (2) j  j + ( |[A]| - j ) (3) The original YCS employs two discovery mechanisms, a panmictic (standard global) GA and a covering operator. On each time-step there is a probability g of GA invocation. The GA uses roulette wheel selection to determine two parent rules based on the inverse of their error: fj = ( 1 / (jv + 1) ) (4) Here the exponent v enables control of the fitness pressure within the system by facilitating tuneable fitness separation under fitness proportionate selection (see [Bull, 2005] for discussions). Offspring are produced via mutation (probability ) and crossover (single point with probability ), inheriting the parents’ parameter values or their average if crossover is invoked. Replacement of existing members of the rulebase uses roulette wheel selection based on estimated niche size. If no rules match on a given time step, then a covering operator is used which creates a rule with the message as its condition (augmented with wildcards at the rate p#) and a random action, which then replaces an existing member of the rulebase in the usual way. Parameter updating and the GA are not used on exploit trials. last system cycle upon which it was part of a GA (a development of [Booker, 1989]). The GA is applied within the current action set [A] when the average number of system cycles since the last GA in the set is over a threshold GA. If this condition is met, the GA time-stamp of each rule is set to the current system time, two parents are chosen according to their fitness using standard roulette-wheel selection, and their offspring are potentially crossed and mutated, before being inserted into the rule-base as described above. YCS is therefore a simple accuracy-based LCS which captures the fundamental characteristics of XCS: “[E]ach classifier maintains a prediction of expected payoff, but the classifier’s fitness is not given by the prediction. Instead the fitness is a separate number based on an inverse function of the classifier’s average prediction error” [Wilson, 1995] and a “classifier’s deletion probability is set proportional to the [niche] size estimate, which tends to make all [niches] have about the same size, so that classifier resources are allocated more or less equally to all niches” [ibid]. However, YCS does not include a number of other mechanisms within XCS, such as niche-based fitness sharing, which are known to have beneficial effects in some domains (see [Butz et al., 2004]). The pressure within XCS and its derivatives to evolve maximally general rules over the problem space comes from the triggered niche GA. Selection for reproduction is based upon the accuracy of prediction, as described. Thus within a niche, accurate rules are more likely to be selected. However, more general rules participate in more niches as they match more inputs. Rules which are both general and accurate therefore typically reproduce the most: the more general and accurate, the more a rule is likely to be selected. Any rule which is less general but equally accurate will have fewer chances to reproduce. Any rule which is over general will have more chances to reproduce but a lower accuracy (see [Butz et al., 2004] for detailed analysis). Under the new rule representation scheme introduced here each rule consists of a single condition and each possible action. Associated with each action are the two parameters updated according to equations 1 and 2: Traditional rule – condition: action: reward: error: niche New rule – Figure 1: Schematic of YCS as used here. The niche GA mechanism used here is XCS’s time-based approach under which each rule maintains a time-stamp of the condition: action1: reward: error: niche action2: reward: error action3: reward: error … actionN: reward: error All other processing remains the same as described. In this way, any symmetry is directly exploitable by a single rule whilst still limiting the possibility for recombining rules covering different parts of the problem space since the GA is run in [A], as Wilson [1998] described. Any action which is not correctly associated with the generalisation over the problem space represented by the condition will have a low accuracy and can be ignored in any post processing of rules for knowledge discovery. The generalisation process of modern LCS is implicitly extended to evolve rules which are accurate over as many actions as possible since they will participate in more niches. Note that the niche size estimate can become noisier than in standard YCS/XCS. Similarly, any effects from the potential maintenance of inaccurate generalisations in some niches due to their being accurate in other niches are not explored here. Initial results do not indicate any significant disruption however. 3 EXPERIMENTATION 3.1 Symmetry Following [Wilson, 1995], the well-known multiplexer task is used in this paper. These Boolean functions are defined for binary strings of length l = k + 2k under which the k bits index into the remaining 2k bits, returning the value of the indexed bit. A correct classification results in a payoff of 1000, otherwise 0. For example, in the k=4 multiplexer the following traditional rules form one optimal [M] (error and niche size not shown): 1111###############1: 1: 1000 1111###############1: 0: 0 Figure 2 shows the performance of YCS using the new multi-action rule representation on the 20-bit multiplexer (k=4) problem with P=1000, p#=0.6, =0.04, v=10, =0.5, GA=25 and =0.2. After [Wilson, 1995], performance, taken here to mean the fraction of correct responses, is shown from exploit trials only, using a 50-point running average, averaged over twenty runs. It can be seen that optimal performance is reached around 60,000 trails. Figure 2 also shows the average specificity, taken here to mean the fraction of non-# bits in a condition, for the LCS. That is, the amount of generalization produced. The maximally general solution to the 20-bit multiplexer has specificity 5/20 = 0.25 and YCS can be seen to produce rulebases with an average specificity very close to the optimum. The average error of rules can also be seen to decrease over time. Figure 3 shows the performance of YCS using the traditional rule representation with the same parameters. As can be seen, optimal performance is not reliably reached in the allowed time. Figure 4 shows the performance of the same system with P=2000, with optimality reached around 60,000 trials (matching that of XCS with the same equivalent parameters, e.g., [Butz et al., 2004]). That is, with double the rule-base resource, the GA is able to reliably (re)discover the problem structure in all [A] over the same time period using the traditional rule representation. Hence, in a problem with complete symmetry between [A], the new rule representation presented here significantly improves the efficiency of the GA. Figure 2: Performance of new rule representation. Figure 3: Performance of traditional rule representation. 3.2 Less Symmetry To reduce the symmetry in the multiplexer in a simple way, an extra bit can be added. Here an incorrect response becomes sensitive to the value of the extra input bit: if it is set, the reward is 500, otherwise it is 0. That is, using the new rule representation, it is no longer possible for just one rule to use the same generalisation over the input space to accurately predict the reward for each action in a given [M]. The following traditional rules represent one optimal [M]: 1111###############1#: 1: 1000 1111###############11: 0: 500 1111###############10: 0: 0 Figure 4: As Figure 3 but with larger population size. Figure 5 shows how YCS is unable to solve the less symmetrical 20-bit multiplexer using the new rule representation with P=1000. Figures 6 and 7 show how the performance of YCS with and without the new representation (respectively) is optimal and roughly equal with P=2000. Note that the new representation still only requires two rules per [M], as opposed to three in the traditional scheme. However, although there is a slight increase in learning speed with the new scheme, it is not statistically significant (T-test, time taken to reach and maintain optimality over 50 subsequent exploit cycles, p>0.05). Figures 8 and 9 show there is significant benefit (p≤0.05) from the new representation when k=5, i.e., the harder 37-bit multiplexer (P=5000). 3.3 Multiple Actions Multiplexers are binary classification problems. To create a multi-class/multi-action variant in a simple way the case where the data bit is a ‘1’ is altered to require an action equal to the value of the address bits for a correct response. In this way there are 2k possible actions/classes. Under the new format with k=3, one optimal [M] could be represented as the single rule: Figure 6: As Figure 5 but with larger population size. 111#######1: 8: 1000 7: 0 6: 0 5: 0 4: 0 3: 0 2: 0 1: 0 0: 0 Figures 10 and 11 show the performance of YCS with and without the new representation (respectively) with k=3 and P=2000. As can be seen, both representations are capable of optimal performance with the parameters used but the new representation learns significantly faster ((p≤0.05). Figure 5: Performance of new scheme on less symmetrical task. Figure 7: Performance of traditional rules on less symmetrical task (vs. Figure 6). Figure 8: Performance of new scheme on less symmetrical multiplexer when k=5. Figure 9: Performance of traditional rules on less symmetrical multiplexer when k=5. 3.4 Imbalance The frequency of state visitation is rarely close to uniform in most reinforcement learning tasks. For example, in a spatial maze navigation task, those states at or near a goal will typically be visited more often than those states far from a goal. In data mining, real-world data does not typically contain equal examples of all cases of the underlying concept space - known as the class imbalance problem, and often tackled through under/over sampling. This bias of sampling the problem space can cause difficulties in the production of accurate generalisations since over general rules can come to dominate niches due to their frequency of use (updating and reproduction) in more frequently visited states. Orriols-Puig and Bernado Mansilla [2008] introduced a heuristic specifically for (limited to) binary classification tasks which dynamically alters the learning rate ( and frequency of GA activity (GA) to address the issue in accuracy-based LCS. They show improved learning in both imbalanced multiplexers and well-known data sets. The new rule representation would appear to have some potential to address the issue of imbalance generally when there is symmetry in the underlying problem space, i.e., both for reinforcement learning and data mining. Since all actions are maintained by all rules, information about all actions is maintained in the population. Whilst over general conditions will quickly emerge for the same reasons as for the traditional representation, later in the search, the use and updating of the correct actions for less frequently visited states will indicate their true value and the GA will (potentially) adjust generalisations appropriately. An imbalanced multiplexer (akin to [Orriols-Puig & Bernado Mansilla, 2008]) can be created by simply introducing a probabilistic bias in sampling action ‘1’ compared to ‘0’. Figures 12 and 13 show the performance of YCS with and without the new representation (respectively) with k=4, P=2000 and a bias of 80% (4:1). Exploit cycle testing remains unbiased, as before. As can be seen, the new representation is able to cope with the bias, whereas the equivalent traditional rule representation is not. The same was generally found to be true for various levels of bias, k, etc. (not shown). Figure 10: Performance of new scheme on multi-action task. Figure 11: Performance of traditional rules on multi-action task. Figure 12: Performance of new scheme on the imbalanced task. REFERENCES Figure 13: Performance of the traditional scheme on the imbalanced task. 4 CONCLUSIONS & FUTURE WORK This paper has proposed the use of rules which contain multiple actions, maintaining accuracy and reward metrics for each action. This somewhat minor alteration appears to provide benefits over the traditional approach in a variety of scenarios. Future work should also consider the new, general rule structure proposed here with more complex representations such as realvalued intervals (e.g., see [Stone & Bull, 2003]) or genetic programming (e.g., see [Preen & Bull, 2013]), together with delayed reward tasks. Kovacs and Tindale [2013] have recently highlighted issues regarding the niche GA, particularly with respect to overlapping problems. They compare the performance of an accuracy-based LCS with a global GA (see also [Bull, 2005]), a niche GA, and a global GA which uses the calculated selective probabilities of rules under a niche GA. The aim being to avoid the reduced actual selection of accurate, general rules due to overlap within a given niche. Using the 11-bit multiplexer (k=3) problem they show a possible slight increase in performance from their new scheme over the niche GA, with the global GA performing worst. Their new scheme shows an increase in the number of unique rules maintained compared to the niche GA and they postulate this increase in rule diversity may explain the suggested difference in performance. This seems likely given the multiplexer does not contain any overlap. Note that Wilson [1994] proposed using both a global and niche GA together “to offset any inbreeding tendency” within niches. Since they used a supervised form of XCS which only maintains the highest reward entries of the state-action-reward map (UCS) [Bernado Mansilla & Garrell, 2003], the exploitation of symmetry does not help to explain their findings. The effect of the new representation in overlapping problems remains to be explored. The related use of multiple conditions per action may be a more appropriate approach. Bernado Mansilla, E. & Garrell, J. (2003) Accuracy-Based Learning Classifier Systems: Models, Analysis and Applications to Classification Tasks. Evolutionary Computation 11(3): 209-238. Booker, L.B. (1985) Improving the Performance of Genetic Algorithms in Classifier Systems. In J.J. Grefenstette (ed) Proceedings of the First International Conference on Genetic Algorithms and their Applications. Lawrence Erlbaum Associates, pp80-92. Booker, L.B. (1989) Triggered Rule Discovery in Classifier Systems. In J. Schaffer (ed) Proceedings of the Third International Conference on Genetic Algorithms and their Applications. Morgan Kaufmann, pp265-274. Bull, L. (2002) On Accuracy-based Fitness. Soft Computing 6(3-4): 154161. Bull, L. (2004)(ed) Applications of Learning Classifier Systems. Springer. Bull, L. (2005) Two Simple Learning Classifier Systems. In L. Bull & T. Kovacs (eds) Foundations of Learning Classifier Systems. Springer, pp63-90. Bull, L. & Kovacs, T. (2005)(eds) Foundations of Learning Classifier Systems. Springer. Bull, L., Bernado Mansilla, E & Holmes, J. (2008)(eds) Learning Classifier Systems in Data Mining. Springer. Butz, M. (2006) Rule-based Evolutionary Online Learning Systems. Springer. Butz, M., Kovacs, T., Lanzi, P-L & Wilson, S.W. (2004) Toward a Theory of Generalization and Learning in XCS. IEEE Transactions on Evolutionary Computation 8(1): 28-46 Butz, M., Goldberg, D., Lanzi, P-L. & Sastry, K. (2007) Problem solution sustenance in XCS: Markov chain analysis of niche support distributions and the impact on computational complexity. Genetic Programming and Evolvable Machines 8(1): 5-37 Fogarty, T.C. (1994) Co-evolving Co-operative Populations of Rules in Learning Control Systems. In T.C. Fogarty (ed) Evolutionary Computing. Springer, pp195-209. Holland, J.H. (1975) Adaptation in Natural and Artificial Systems. University of Michigan Press. Holland, J.H. (1976) Adaptation. In R. Rosen & F.M. Snell (eds) Progress in Theoretical Biology, 4. Academic Press, pp313-329. Holland, J.H. & Reitman, J.H. (1978) Cognitive Systems Based in Adaptive Algorithms. In Waterman & Hayes-Roth (eds) Patterndirected Inference Systems. Academic Press. Kovacs, T. & Tindale, R. (2013) Analysis of the niche genetic algorithm in learning classifier systems. In Proceedings of the Genetic and Evolutionary Computation Conference. ACM Press, pp1069-1076. Orriols-Puig, A. & Bernado Mansilla, E. (2008) Evolutionary Rule-based Systems for Imbalanced Data Sets. Soft Computing 13(3): 213-225. Preen, R. & Bull, L. (2013) Dynamical Genetic Programming in XCSF. Evolutionary Computation 21(3): 361-388. Stone, C. & Bull, L. (2003) For Real! XCS with Continuous-Valued Inputs. Evolutionary Computation 11(3): 299-336 Sutton, R.S. & Barto, A.G. (1998) Reinforcement Learning. MIT Press. Tammee, K., Bull, L. & Ouen, P. (2007) Towards Clustering with XCS. In D. Thierens et al. (eds) Proceedings of the Genetic and Evolutionary Computation Conference. ACM Press, pp1854-1860 Wilson, S.W. (1985) Knowledge Growth in an Artificial Animal. J.J. Grefenstette (ed) Proceedings of the First International Conference on Genetic Algorithms and their Applications. Lawrence Erlbaum Associates, pp16-23. Wilson, S.W. (1994) ZCS: A Zeroth-level Classifier System. Evolutionary Computation 2(1):1-18. Wilson, S.W. (1995) Classifier Fitness Based on Accuracy. Evolutionary Computation 3(2):149-177. Wilson, S.W. (1998) Generalization in the XCS Classifier System. In Koza et al. (eds.) Genetic Programming 1998: Proceedings of the Third Annual Conference. Morgan Kaufmann, pp322-334. Wilson, S.W. (2002) Classifiers that Approximate Functions. Natural Computing 1(2-3): 211-234.
9cs.NE
arXiv:1802.08774v1 [cs.CV] 24 Feb 2018 Tool Detection and Operative Skill Assessment in Surgical Videos Using Region-Based Convolutional Neural Networks Amy Jin, Serena Yeung, Jeffrey Jopling, Jonathan Krause, Dan Azagury, Arnold Milstein, and Li Fei-Fei Stanford University Stanford, CA 94305 Abstract Five billion people in the world lack access to quality surgical care. Surgeon skill varies dramatically, and many surgical patients suffer complications and avoidable harm. Improving surgical training and feedback would help to reduce the rate of complications—half of which have been shown to be preventable. To do this, it is essential to assess operative skill, a process that currently requires experts and is manual, time consuming, and subjective. In this work, we introduce an approach to automatically assess surgeon performance by tracking and analyzing tool movements in surgical videos, leveraging region-based convolutional neural networks. In order to study this problem, we also introduce a new dataset, m2cai16-tool-locations, which extends the m2cai16-tool dataset with spatial bounds of tools. While previous methods have addressed tool presence detection, ours is the first to not only detect presence but also spatially localize surgical tools in real-world laparoscopic surgical videos. We show that our method both effectively detects the spatial bounds of tools as well as significantly outperforms existing methods on tool presence detection. We further demonstrate the ability of our method to assess surgical quality through analysis of tool usage patterns, movement range, and economy of motion. 1. Introduction Five billion people in the world lack access to safe surgical care [1]. According to the World Health Organization, there is a global mortality rate of 0.5-5% for major procedures, and up to 25% of patients undergoing operations that require a stay in the hospital suffer complications [2]. Many of these complications are caused by poor individual and team performance, for which inadequate training and feedback play an important role [3, 4, 5]. These outcomes can be improved, as studies show that half of all adverse surgical Figure 1: Real-time automated surgical video analysis could facilitate objective and efficient assessment of surgical skill and provide feedback on surgical performance. In this work, we introduce an approach to: (1) automatically detect, classify, and localize surgical instruments in real-world laparoscopic surgical videos; and (2) efficiently analyze surgical performance based on the extracted tool information. events are preventable. One major challenge to improving these outcomes is that surgeons currently lack individualized, objective feedback on their surgical technique and how to improve it. Manual assessment of surgeon performance requires expert supervision which is both subjective and time consuming, with many operations lasting hours. Real time automated surgical video analysis could provide a way to objectively and efficiently assess surgical skill. A number of works address frame-level tool detection in laparoscopic surgical videos, including [6, 7, 8, 9], as a part of the 2016 M2CAI Tool Presence Detection Challenge which includes a m2cai16-tool dataset [10]. However, rich analysis of surgeon performance involves analyz- ing tool movement such as movement range and economy of motion, and requires detecting the spatial bounds of tools in addition to their presence. In this work, we address this task of spatial tool detection in laparoscopic surgical videos, which to our knowledge has not been previously studied. In order to study this, we introduce a new dataset, m2cai16-tool-locations, which extends the m2cai16-tool dataset with spatial bounds of tools. We develop an approach leveraging region-based convolutional neural networks (R-CNNs) to perform spatial detection of tools, and show that our method is able to both effectively detect the spatial bounds of tools as well as significantly outperform previous work on detecting tool presence. Finally, because our deep learning approach allows for tool localization in addition to frame-level detection, it enables richer analysis of tool movements. We demonstrate the ability of our method to assess surgical quality through analysis of tool usage patterns, movement range, and economy of motion (Figure 1). We extract key quantitative and qualitative metrics that are proven to reflect surgical skill [11]. We collaborated with surgeons who manually reviewed each surgical video. Their assessments substantiated our findings, validating the ability of our method to efficiently and accurately assess surgical quality. This enables not only avoiding the subjectivity inherent to human assessment, but also significantly reduces the time it takes to analyze a procedure. In summary, we introduce m2cai16-tool-locations, a new dataset extending the m2cai16-tool dataset with spatial bounds of the tools. We use an approach leveraging regionbased convolutional neural networks to effectively perform spatial detection of the tools, and show that conversion of these detections to frame-level presence detections also significantly outperforms state-of-the-art on that task. Importantly, we demonstrate that our spatial detections in these real-world laparoscopic surgical videos enables automatic assessment of surgical quality through analysis of tool usage patterns, movement range, and economy of motion. 2. Related Work Early work on surgical tool detection, categorization, and tracking include those based on radio frequency identification (RFID) tags [12]; segmentation, contour processing and 3D modelling [13]; and the Viola-Jones detection framework [14]. Furthermore, deep learning approaches based on convolutional neural networks have shown impressive performance on computer vision tasks [15], and works including [6, 7, 8, 9] leverage deep learning architectures to achieve state-of-the-art performance on surgical tool presence detection and phase recognition. As a part of the M2CAI 2016 Tool Presence Detection Challenge [10], they introduced a benchmark for surgical tool presence detection. While several existing studies address frame-level presence detection, Sarikaya et al. perform surgical tool localization in videos of robot-assisted surgical training tasks, using multimodal convolutional neural networks [16]. Automated surgical scene understanding and skill assessment are further areas of study. A few studies have addressed specific components of surgical video analysis, including surgical phase recognition and activity recognition. As a part of the M2CAI 2016 Surgical Workflow Challenge, works including [17, 18, 9, 19] address surgical phase recognition in cholecystectomy videos. Additionally, Zia et al. specifically analyze task-specific suturing and knot-tying videos, using symbolic, texture, and frequency features [20]. Similarly, Lalys et al. propose a framework using Hidden Markov Model and visual features, such as shape, color, and texture, to identify surgical tasks [14]. Lea et al. use skipchain conditional random field as well as handcrafted features to classify actions in short segments of robotic surgery training tasks, including suturing and knot tying [21]. Also, Reiter et al. perform surgical tool localization and pose estimation. However, their approach is limited to robotic arms that return kinematic data [22]. A limitation to these task-specific studies is that surgical training tasks differ substantially from and do not accurately reflect surgical performance in real-world surgeries. Our work builds on these prior contributions and uses region-based convolutional neural networks [23] to detect the spatial bounds of tools, enabling richer, more comprehensive assessment of surgical quality in real-world laparoscopic cholecystectomies, or minimally invasive surgical removal of the gallbladder. Moreover, while studies often only use short segments of procedures or of surgeons performing simulated training tasks to analyze surgical skill, our work leverages unedited, full-length surgical operations. This differentiation is crucial for performance assessment, since real-time operations include smoke, lens fogging, variable anatomy, and different usage patterns not found in simulation scenarios. Limited segments of real operations may not give a comprehensive assessment of surgical performance. Thus, both simulation and video segments of actual operations are limited in their ability to facilitate assessment of surgical performance. In contrast, our extracted metrics are generated from comprehensive postoperative assessment of full surgical procedures. They have the added benefit of being able to be correlated with postoperative clinical results, thus providing the link between surgical skill and outcomes. 3. Dataset There are few existing datasets on automated tool identification. Most center around frame-level tool presence detection, including m2cai16-tool, which was released for the M2CAI 2016 Tool Presence Detection Challenge, and Figure 2: Top: the seven tools in m2cai16-tool-locations. Bottom: example frames with their spatial tool annotations. Color of the bounding box corresponds to tool identity. Tool Number of annotated instances Grasper Bipolar Hook Scissors Clipper Irrigator Specimen Bag Total Number of Frames 923 350 308 400 400 485 275 3141 2532 Table 1: Number of annotated frames for each tool. Cholec80 [9]. Both m2cai16-tool and Cholec80 contain cholecystectomy surgical videos performed at the University Hospital of Strasbourg in France, where each surgical video frame is labeled with binary annotations indicating tool presence. Sarikaya et al. also address tool localization in videos of robot-assisted surgical training tasks [16]. We expand upon these earlier works and introduce a new dataset to study the task of surgical tool localization in real-world laparoscopic surgeries and to enable higher-level analysis of surgical videos. In order to study this task, a dataset containing annotations of spatial bounds of tools is required. However, to the best of our knowledge, no such dataset currently exists for real-world laparoscopic surgical videos. We therefore collect and introduce a new dataset, m2cai16-tool-locations, which extends the m2cai16-tool dataset [10] with spatial annotations of tools. We will publicly release this dataset. m2cai16-tool consists of 15 videos recorded at 25 fps of cholecystectomy procedures. Videos 1 to 10 are used for training the R-CNN and videos 11 to 15 are used for testing the model. The videos, whose durations range from 20 to 75 minutes, are downsampled to 1 fps for processing. As a result, the dataset contains 23,000 frames labeled with binary annotations indicating presence or absence of seven surgical tools: grasper, bipolar, hook, scissors, clip applier, irrigator, and specimen bag. In m2cai16-tool-locations, we label 2532 of the frames, under supervision and spot-checking from a surgeon, with the coordinates of spatial bounding boxes around the tools. We use 50%, 30%, and 20% for training, validation, and test splits. The 2532 frames were selected from among the 23,000 total frames. We first annotate all frames containing just one tool, and increase the number of annotated instances per tool class by additionally labeling frames with two and three tools. The breakdown of number of annotations per tool class is detailed in Table 1. Figure 2 shows each tool in the dataset, its number of spatial annotations, and examples of annotations in a number of frames. 4. Approach Our approach for spatial detection of surgical tools is based on Faster R-CNN [23], a region-based convolutional neural network described in more detail below. The input is a video frame, and the output is the spatial coordinates of bounding boxes around any of the seven surgical instruments in Figure 2. This output allows us to perform qualitative and quantitative analyses of tool movements, from tracking tool usage patterns to evaluating motion economy, and to correlate these measures with surgical skill, ultimately setting the stage for higher-level analysis of surgical performance. The Faster R-CNN architecture we use is shown in Figure 3. The base network is a VGG-16 convolutional neural network [24] with 16 convolutional layers, which extracts powerful visual features. On top of this network is a region proposal network (RPN) that shares convolutional features with object detection networks. For each input image, the RPN generates region proposals likely to contain an object, and features are pooled over these regions before being passed to a final classification and bounding box refinement network. The use of the RPN enables significant computational gains over related previous work, R-CNN [25] and Fast R-CNN [26]. The RPN is trained by optimizing the following loss function for each image: Figure 3: Faster R-CNN architecture. The input to the network is a frame from a surgical video. The base network of Faster R-CNN is a VGG-16 convolutional neural network. This is connected to a region proposal network (RPN) that shares convolutional features with object detection networks. For each input image, the RPN generates region proposals likely to contain an object, and features are pooled over these regions before being passed to a final classification and bounding box refinement network. The output is the spatial bounding box positions of detected surgical tools in the video frame. 1 X L({pi }, {ti }) = Lcls (pi , p∗i ) Ncls i 1 X ∗ +λ p Lreg (ti , t∗i ) Nreg i i (1) Here i indexes “anchors” corresponding to each sliding window position of the input feature map, pi is the anchor’s objectness probability, and ti is the coordinates of the predicted bounding box. p∗i is the ground-truth label of whether an anchor is a true object location based on Intersection over Union (IoU) with ground-truth annotations, and t∗i is the coordinates of the ground-truth box corresponding to a positive anchor. The loss function is therefore a weighted combination of a classification loss Lcls for the binary objectness label and a regression loss Lreg for bounding box coordinates. Ncls and Nreg are normalization constants and λ weights the contributions of classification and regression. The classification and bounding box refinement networks on top of the pooled regions of interest are trained using standard cross-entropy and regression loss functions. While Faster R-CNN has shown impressive performance on detection of everyday objects, the domain of surgical videos and surgical tools has quite different visual characteristics. We pre-train the network on the ImageNet dataset [15], where a large amount of data is available to learn general visual features, and then fine-tune the network on our m2cai16-tool-locations dataset, where a smaller amount of data is labeled with the surgical tools of interest. To train the RPN, we assign a binary objectness label to each anchor at each sliding window position of the feature map. We also assign a positive label to anchors with an overlap greater than 0.8 with the ground-truth box or if those do not exist, to an anchor or anchors with the highest Intersection over Union (IoU), and a negative label to anchors with an IoU of less than 0.3. We fine-tune the VGG-16 network to optimize model performance using stochastic gradient descent. We modify the classification layer of the network to output softmax probabilities over the seven tools. All layers are fine-tuned for 40K iterations with a mini-batch size of 50, and a 3×3 kernel size is used. We perform data augmentation by randomly flipping frames horizontally. The learning rate is initialized at 10−3 for all layers, and decreased by a factor of 10 every 10K iterations. Total training time was approximately two days on an NVIDIA Tesla K40 GPU, and the network’s processing speed at deployment is 5 fps, achieving real-time surgical tool detection. 5. Results In this section, we quantitatively evaluate our approach on the tasks of spatial detection and frame-level presence detection of surgical tools, using m2cai16-tool-locations and m2cai16-tool, respectively. We demonstrate strong performance on the new task of spatial detection, and by leveraging spatial annotations, we significantly outperform existing works on presence detection. Finally, we qualitatively illustrate the ability of our approach to analyze tool usage patterns, movement range, and economy of motion for assessment of surgical performance. 5.1. Spatial detection To the best of our knowledge, this study was the first to perform surgical tool localization in real-world laparoscopic surgical videos, which would set the stage for richer analysis of surgical performance. Table 2 presents performance using average precision (AP) on spatial detection of Figure 4: Example frames of spatial detection results. Bounding box color corresponds to predicted tool identity. Correct predictions are boxed in green (top), and mistakes are boxed in red (bottom). The model is able to successfully detect, classify, and localize surgical instruments despite varying tool positions and angles, and despite some parts of the tools being occluded, as shown in column (c). the surgical tools in m2cai16-tool-locations. Tool AP Grasper Bipolar Hook Scissors Clipper Irrigator Specimen Bag mAP 48.3 67.0 78.4 67.7 86.3 17.5 76.3 63.1 Table 2: Spatial detection average precision (AP) per-class and mean average precision (mAP) in m2cai16-tool-locations. Clipper achieves highest performance, likely due to its well-visualized usage pattern. Irrigator has notably low performance, likely due to its generic shape (it looks like the pole of every other instrument) and its lack of use in every procedure. Intersection over Union (IoU) of 0.5 with a ground-truth bounding box for a given class is considered to be a correct detection. The overall mAP is 63.1, indicating strong performance overall. Clipper is the highest performing tool, likely due to its usage pattern: while only present for a specific step in cholecystectomies, surgeons make sure it is well visualized the entire time it is being used. Thus, its consistent usage pattern may have contributed to its high performance. The irrigator, on the other hand, is difficult likely due to its generic shape (it looks like the pole of every other instrument) and its lack of use in every procedure. Figure 4 provides example frames of detection results. Columns (a) through (d) display frames with increasing numbers of tools present in them; from left to right, either 1, 2, or 3 tools are present per frame. We find that our model is able to successfully detect, classify, and localize surgical instruments despite varying tool positions and angles, and despite some parts of the tools being occluded, as shown in column (c). (1) through (4) present incorrect or partially incorrect detections. In (1), the clipper is mistaken as a scissor; perhaps the angle of the tool renders its identity ambiguous. In (2), the center grasper bounding box is a false positive; rather, the structure and shape of the gallbladder and liver form an outline that may appear to be a grasper to the model. Interestingly, in both (3) and (4), the poles of the hook and grasper, respectively, are identified as an irrigator. This mistake is not surprising, as the irrigator tip takes on the generic shape of any pole of a tool. Additionally, (4) presents a false negative, as the grasper in the center of the frame is left undetected by the model. Overall, our model has strong performance on the task of spatial tool detection. 5.2. Frame-level presence detection The spatial detections output from our model can also be converted to frame-level presence predictions, and evaluated on the m2cai16-tool presence detection benchmark. Table 3 presents AP performance on frame-level presence detection of tools in m2cai16-tool. Tool AP Grasper Bipolar Hook Scissors Clipper Irrigator Specimen Bag mAP 87.2 75.1 95.3 70.8 88.4 73.5 82.1 81.8 Table 3: Frame-level presence detection average precision (AP) per-class and mean average precision (mAP) in m2cai16-tool. Hook achieves the highest performance, perhaps due to its distinct tip shape. Scissors has lowest performance, most likely due to its brief usage during the operation and common two-pronged tip shape. Hook achieves the highest performance; one possible explanation is that it has a distinct tip shape, making it easily distinguishable from other tools. Clipper, grasper, and specimen bag also perform well, while bipolar and irrigator are more frequently misidentified, perhaps due to their generic tip shapes as well as sparse and irregular appearances, as usage of these tools is not absolutely essential during the cholecystectomy procedure. For the bipolar and irrigator, usage is conditional on the real-time circumstances of the operation. The bipolar, an instrument for dissection and hemostasis, is used to prevent likely bleeding, or to cauterize bleeding when it does occur. The irrigator, an instrument used for flushing and suctioning an area, is typically used during a cholecystectomy procedure when blood accumulates in the surgical field. Scissors has lowest performance, most likely due to its brief usage during the operation and common two-pronged tip shape. Figure 5 compares mAP performance with winners of the 2016 M2CAI Tool Presence Detection Challenge [10]. By leveraging the new spatial annotations during training, our approach is able to significantly outperform all previous work. In comparison to the M2CAI 2016 Tool Presence Figure 5: Comparison with winners of the M2CAI Tool Presence Detection Challenge [10] on frame-level presence detection in m2cai16-tool. By leveraging the new spatial annotations during training, our approach is able to significantly outperform all previous work. Detection Challenge studies, we achieve a 28% improvement in accuracy, increasing mAP from 63.8 to 81.8, using just 2,500 of the 23,000 frames—roughly a tenth of the data—in m2cai16-tool, which the previous studies used in its entirety to train their tool presence detection models. We also surpass EndoNet [9], a novel CNN architecture based on AlexNet [27], in the tool presence detection task. 5.3. Assessment of Surgical Performance The current standard for surgical performance assessment is to have an expert surgeon observe the operation in its entirety and provide feedback to the surgeon performing the surgery. The Global Operative Assessment of Laparoscopic Skills (GOALS) rating system, is a validated rubric for grading surgeons on laparoscopic surgery performance. For each of the five assessment domains of GOALS—depth perception, bimanual dexterity, efficiency, and tissue handling, and autonomy, surgeons are rated on a scale of 1 to 5, from least to most technically proficient, totaling to a final score out of 25. Operative skill significantly impacts patient outcomes. Birkmeyer et al. [28] has demonstrated that performance on standardized ratings of surgical skill are correlated with patient complication rates and hospital readmissions. Despite this, most surgeons get no formal feedback on their operative performance. The process of manually rating surgeries is time-consuming and subject to bias. Motivated by these factors, we use the output of our deep learning model, which consists of frame-by-frame tool presence, identity, and location information, to extract key metrics that are proven to reflect surgical skill, such as instrument usage times and path length [11]. We also create visual depictions of the progression of the operation, like instrument usage timelines and tool trajectory maps, to parallel the GOALS rating system. By working with a group of surgeons who each independently reviewed and rated each testing video manually, we are able to validate our approach to assess surgical performance on the five testing videos in our dataset. In the fol- Figure 6: Timelines (top), heat maps (middle), and trajectories (bottom) of tool usage for the testing videos 1 through 4 in m2cai16-tool. In the timelines, (a)-(g) correspond to Grasper, Bipolar, Hook, Scissors, Clipper, Irrigator, and Specimen Bag, respectively. These metrics effectively measure bimanual dexterity, efficiency, and overall operative skill and enable us to efficiently examine back and forth switching of instruments, movement range, and motion patterns of tools. We find that testing video 2 correlates with the most well-executed surgery, reflecting focused and skillful execution of each step of the surgical procedure. In contrast, the surgeons in the other testing videos have much less economy of motion, handle the instruments with less dexterity, and struggle with certain parts of the procedure. lowing paragraphs, we interweave the surgeons’ independent ratings and comments with our objective analyses of the surgical performance in each video. To assess instrument usage patterns, we generate timelines displaying tool usage over the course of each of the five testing videos (Figure 6, top). In examining the timelines, we find that testing video 2 correlates with the most well-executed surgery. The surgery itself is efficient, and the number of times that different instruments are switched out for one another is minimal, reflecting focused and skillful execution of each step of the surgical procedure. On the contrary, the timeline for testing video 3 reflects inefficient and poorer technique, with more frequent switching back and forth of instruments. Moreover, the instrument usage timelines and bar graphs quantifying the total time each instrument is used reflect the level of technical proficiency in handling tissue (Figure 7). The longer presence and periodic appearance of the bipolar in testing video 3 indicates rough tissue handling resulting in tissue damage, as the bipolar is used to stop bleeding. To study the movement range of the surgical instruments, Figure 7: Total instrument usage times, by video. Reflecting level of skill in handling tissue, the longer presence of the bipolar in testing video 3 indicates tissue damage, as the bipolar is used to stop bleeding. we generate heat maps of bounding box occurrences and locations. Figure 6, middle shows the heat maps of the testing videos. As an indicator of technical proficiency, especially of bimanual dexterity and efficiency, the heat maps reveal the surgical skill demonstrated in testing video 2 to be the Depth Perception Bimanual Dexterity Efficiency Tissue Handling Total Video 1 Video 2 Video 3 Video 4 2.67 3.00 2.00 2.33 10.00 4.67 4.67 4.67 4.67 18.67 2.33 2.00 2.33 2.67 9.33 3.67 3.33 3.00 3.33 13.33 Table 4: Average composite GOALS ratings for the four test- Figure 8: Total distance traveled by the tools during the clipping phase, by video. Testing video 2 reflects the most technically excellent surgery, with the greatest economy of motion and most deft tool handling. highest among the test set once again. Better surgeons generally handle instruments in a more focused region of the operative field, exhibiting greater precision and economy of motion. Finally, our deep learning model for automated tool detection and localization enabled tool tracking to study motion patterns. To further gain insight into bimanual dexterity and efficiency, we generated tool trajectory maps for the clipping phase of each of the five testing videos. We chose to examine this phase in particular because placing clips on the cystic artery and cystic duct is one of the most important steps of the cholecystectomy procedure. If these clips are placed in the wrong place, or if they come loose, the patient can suffer devastating complications. The clipper (blue) and grasper (red) trajectories in testing video 2 reflect the deftness with which the surgeon placed the clips. The trajectory maps for testing videos 2 and 3 also provide valuable information for evaluating bimanual dexterity. While the clipper is used to clip the cystic artery and cystic duct, the grasper is used to hold the gallbladder in place and facilitate clip application. Based on the trajectory maps, the surgeons in testing videos 2 and 3 adeptly maneuver the grasper in a way such that they do not need to constantly adjust position, tension, or grip, in contrast to the trajectory maps for testing videos 1, 4, and 5. Indeed, when surgeons manually reviewed each of the testing videos to rate them with GOALS, they found that the surgeon in testing video 1 struggled to place the clips properly. He or she placed an additional clip, had difficulty prying it loose, and ultimately removed it. We also quantitatively measured efficiency by computing total distance traveled by the tools during the clipping phase (Figure 8). Once again, testing video 2 reflects the most technically excellent surgery, with the greatest economy of motion and most deft tool handling. ing videos, including average subcomponent scores, as rated independently by the three surgeons. According to these ratings, the surgeon in testing video 2 is the most skilled, with a high score of 18.67 out of a maximum of 20.00, and the surgeons in testing videos 1 and 3 need to improve their operative technique, with scores of 10.00 and 9.33, respectively. These findings are consistent with our analyses based on the extracted assessment metrics, proving our approach to be a much more efficient way to review surgeon performance. 5.4. Validation of approach with GOALS In addition to the blinded, subjective assessments of the test videos embedded in the preceding paragraphs, the three surgeons independently rated four of the test videos using a modified version of the GOALS assessment rubric. For this study the autonomy domain was omitted, which can only be assessed in person and is not applicable to every surgery. Thus, the total possible score for each video was 20. Test videos 1-4 received average composite scores of 10.00, 18.67, 9.33, and 13.33. The scores and subcomponent scores of GOALS, such as the efficiency score, directly correlated with the metrics extracted by our algorithm, such as the heat maps and tool trajectories. Table 4 presents the GOALS surgeon ratings for each of the testing videos. 6. Conclusion In this work, we present a new dataset m2cai16-toollocations and an approach based on region-based convolutional neural networks, to address the task of spatial tool detection in real-world laparoscopic surgical videos. We show that our method achieves strong performance on the new spatial detection task, outperforms previous work on frame-level presence detection, and runs in real-time at a frame rate of 5fps. Furthermore, it can be used to extract rich surgical assessment metrics such as tool usage patterns, movement range, and economy of motion, which directly correlate with independent assessments of the same videos made by experienced surgeons. Future work includes continuing to build on the types of meaningful information that can be automatically extracted from surgical videos, including smoothness of motion, tissue damage, repeated movements, and phase of procedure, as well as developing an automated GOALS rating system. References [1] B. Alkire, N. Raykar, M. Shrime, T. Weiser, et al. Global access to surgical care: a modelling study. The Lancet Global Health, 3(6):e316–e323, 2015. [2] T. Weiser, S. Regenbogen, K. Thompson, et al. An estimation of the global volume of surgery: a modelling strategy based on available data. The Lancet, 372(9633):139–144, 2008. [3] A. Gawande, E. Thomas, M. Zinner, and T. Brennan. The incidence and nature of surgical adverse events in Colorado and Utah in 1992. Surgery, 126(1):66–75, 1999. [4] M. Healey, S. Shackford, T. Osler, F. Rogers, and E. Burns. Complications in surgical patients. Archives of Surgery, 137(5):611–618, 2002. [5] A. Kable, R. Gibberd, and A. Spigelman. Adverse events in surgical patients in Australia. International Journal for Quality in Health Care, 14(4):269–276, 2002. [6] M. Sahu, A. Mukhopadhyay, A. Szengel, and S. Zachow. Tool and Phase recognition using contextual CNN features. 2016. [7] A. Twinanda, D. Mutter, J. Marescaux, M. de Mathelin, and N. Padoy. Single- and Multi- Task Architectures for Tool Presence Detection Challenge at M2CAI 2016. arXiv preprint arXiv:1610.08851, 2016. [8] A. Raju, S. Wang, and J. Huang. M2CAI Surgical Tool Detection Challenge Report. 2016. [9] A. Twinanda, S. Shehata, D. Mutter, J. Marescaux, M. de Mathelin, and N. Padoy. EndoNet: A Deep Architecture for Recognition Tasks on Laparoscopic Videos. IEEE Transactions on Medical Imaging, 36(1):86–97, 2016. [10] Tool Presence Detection Challenge Results. http: //camma.u-strasbg.fr/m2cai2016/index.php/ tool-presence-detection-challenge-results. [11] N. Stylopoulosu, S. Cotin, S. Dawson, et al. CELTS: a clinicallybased Computer Enhanced Laparoscopic Training System. Medicine Meets Virtual Reality 11: NextMed: Health Horizon, 94:336, 2003. [12] M. Kranzfelder, A. Schneider, A. Fiolka, et al. Real-time instrument detection in minimally invasive surgery using radiofrequency identification technology. Journal of Surgical Research, 185(2):704–710, 2013. [13] S. Speidel, J. Benzko, S. Krappe, et al. Automatic classification of minimally invasive instruments based on endoscopic image sequences. In SPIE medical imaging, pages 72610A–72610A. International Society for Optics and Photonics, 2009. [14] F. Lalys, L. Riffaud, D. Bouget, and P. Jannin. A framework for the recognition of high-level surgical tasks from video images for cataract surgeries. IEEE Transactions on Biomedical Engineering, 59(4):966–976, 2012. [15] O. Russakovsky, J. Deng, H. Su, J. Krause, S. Satheesh, S. Ma, Z. Huang, A. Karpathy, A. Khosla, M. Bernstein, et al. ImageNet Large Scale Visual Recognition Challenge. International Journal of Computer Vision, 115(3):211–252, 2015. [16] D. Sarikaya, J. Corso, and G. Khurshid. Detection and localization of robotic tools in robot-assisted surgery videos using deep neural networks for region proposal and detection. IEEE Transactions on Medical Imaging, 36(7):1542–1549, 2017. [17] Y. Jin, Q. Dou, H. Chen, et al. EndoRCN: Recurrent Convolutional Networks for Recognition of Surgical Workflow in Cholecystectomy Procedure Video. 2016. [18] R. Cadene, T. Robert, N. Thome, and M. Cord. M2CAI Workflow Challenge: Convolutional Neural Networks with Time Smoothing and Hidden Markov Model for Video Frames Classification. 2016. [19] R. Stauder, D. Ostler, M. Kranzfelder, et al. The TUM LapChole dataset for the M2CAI 2016 workflow challenge. 2017. [20] A. Zia, Y. Sharma, V. Bettadapura, E. Sarin, et al. Automated videobased assessment of surgical skills for training and evaluation in medical schools. International Journal of Computer Assisted Radiology and Surgery, 11(9):1623–1636, 2016. [21] C. Lea, G. Hager, and R. Vidal. An improved model for segmentation and recognition of fine-grained activities with application to surgical training tasks. IEEE, 2015. [22] A. Reiter, P. Allen, and T Zhao. Articulated surgical tool detection using virtually-rendered templates. Computer Assisted Radiology and Surgery, 2012. [23] S. Ren, K. He, R. Girshick, and J. Sun. Faster R-CNN: Towards RealTime Object Detection with Region Proposal Networks. In Advances in neural information processing systems, pages 91–99, 2015. [24] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. [25] R. Girshick, J. Donahue, T. Darrell, and J. Malik. Rich feature hierarchies for accurate object detection and semantic segmentation. In Proceedings of the IEEE conference on computer vision and pattern recognition, pages 580–587, 2014. [26] R. Girshick. Fast R-CNN. In Proceedings of the IEEE International Conference on Computer Vision, pages 1440–1448, 2015. [27] A. Krizhevsky, I. Sutskever, and G. Hinton. ImageNet Classification with Deep Convolutional Neural Networks. 2012. [28] J. Birkmeyer, J. Finks, A. O’reilly, et al. Surgical Skill and Complication Rates after Bariatric Surgery. New England Journal of Medicine, 369(15):1434–1442, 2013.
1cs.CV
SOME ALGEBRAS WITH THE WEAK LEFSCHETZ PROPERTY arXiv:1606.01812v1 [math.AC] 6 Jun 2016 DAVID COOK II AND UWE NAGEL Dedicated to Winfried Bruns at the occasion of his 70th birthday. Abstract. Using a connection to lozenge tilings of triangular regions, we establish an easily checkable criterion that guarantees the weak Lefschetz property of a quotient by a monomial ideal. It is also shown that each such ideal also has a semistable syzygy bundle. 1. Introduction Recently, there have been many investigations of the presence of the weak Lefschetz property (see, e.g., [1, 2, 4, 9, 13, 14, 15, 16, 17, 18]). A standard graded Artinian algebra A over a field K is said to have the weak Lefschetz property if there is a linear form ℓ ∈ A such that the multiplication map ×ℓ : [A]i → [A]i+1 has maximal rank for all i (i.e., it is injective or surjective). The name is a reminder that the Hard Lefschetz Theorem guarantees this property for the cohomology ring of a compact Kähler manifold. It is a desirable property, e.g., its presence constrains the Hilbert function (see [11]). Many algebras are expected to have the weak Lefschetz property. However, establishing this fact is often very challenging. The recent lecture notes of Harima, Maeno, Morita, Numata, Wachi, and Watanabe [10] and the survey [17] provide an excellent review of the state of knowledge on the Lefschetz properties. The authors have developed a combinatorial approach towards deciding the presence of the weak Lefschetz property for monomial algebras in three variables in [5, 7]. It relies on a study of lozenge tilings of so-called triangular regions. The needed results are recalled in Subsection 2.1. This approach has been used, for example, to investigate the weak Lefschetz property of monomial algebras of type two [7] and quotients by ideals with fours generators [8]. Furthermore, we showed in [8] that there is a connection between lozenge tilings and semistability of syzygy bundles (see Theorem 2.2). Here we use these methods to establish sufficient conditions for the presence of the weak Lefschetz property as well as the semistability of the syzygy bundle (see Theorem 3.8). These conditions are easily expressed and checked using triangular regions (see Remark 3.9). As a consequence, we describe infinite families of ideals which satisfy these conditions. The number of generators of these ideals can be arbitrarily large. As a simple example, consider the following ideal I = (x12 , x6 y 2 z 3 , x3 y 2z 7 , xy 7 z 3 , xy 5 z 5 , xyz 9 , y 12 , z 12 ). Our criterion immediately gives that its quotient has the weak Lefschetz property. 2010 Mathematics Subject Classification. 05B45, 05E40, 13E10. Key words and phrases. Monomial ideals, weak Lefschetz property, lozenge tilings. The second author was partially supported by the National Security Agency under Grant Number H9823012-1-0247 and by the Simons Foundation under grants #208869 and #317096. 1 2 D. COOK II AND U. NAGEL 2. Algebraic triangular regions We recall facts needed to establish our main results in the following section. Let R = K[x, y, z] be the standard graded polynomial ring over the field K. Unless specified otherwise, K is always a field of characteristic zero. All R-modules are assumed to be finitely generated and graded. Let I be a monomial ideal of R. Then A = R/I = ⊕j≥0 [A]j is the sum of finite vector spaces, called the homogeneous components (of A) of degree j. The Hilbert function of A is the function hA : Z → Z given by hA (j) = dimK [A]j . The socle of A, denoted soc A, is the annihilator of m = (x, y, z), the homogeneous maximal ideal of R, that is, soc A = {a ∈ A | a · m = 0}. 2.1. Triangular regions labeled by monomials. Now we briefly review a connection between monomial ideals and triangular regions; for a more thorough discussion see [5]. For an integer d ≥ 1, the triangular region is the triangular region (of R) in degree d, denoted Td , is an equilateral triangle of side length d composed of d2 downward-pointing  (▽) and d+1 upward-pointing (△) equilateral unit triangles. These triangles are labeled by 2 the monomials in [R]d−2 and [R]d−1 , respectively, as follows: place xd−1 at the top y d−1 at the bottom-left, and z d−1 at the bottom-right; the remaining labels are found via interpolation. See Figure 2.1(i) for an illustration. (i) T4 (ii) T4 (xy, y 2, z 3 ) Figure 2.1. A triangular region with respect to R and with respect to R/I. The triangular region (of R/I) in degree d, denoted by Td (I), is the part of Td that is obtained after removing the triangles labeled by monomials in I. Note that the labels of the downward- and upward-pointing triangles in Td (I) form K-bases of [R/I]d−2 and [R/I]d−1 , respectively. See Figure 2.1(ii) for an example. Notice that the regions missing from Td in Td (I) can be viewed as a union of (possibly overlapping) upward-pointing triangles of various side lengths that include the upward- and downward-pointing triangles inside them. Each of these upward-pointing triangles corresponds to a minimal generator xa y b z c of I that has, necessarily, degree at most d − 1. The value d − (a + b + c) is the side length of the puncture associated to xa y b z c , regardless of possible overlaps with other punctures. See Figure 2.2 for an example. We say that two punctures overlap if they share at least an edge. Two punctures are said to be touching if they share precisely a vertex. SOME ALGEBRAS WITH THE WEAK LEFSCHETZ PROPERTY (i) Td (xa y b z c ) 3 (ii) T10 (xy 3 z 2 ) Figure 2.2. Td (I) as constructed by removing punctures. 2.2. Tilings & the weak Lefschetz property. A lozenge is a union of two unit equilateral triangles glued together along a shared edge, i.e., a rhombus with unit side lengths and angles of 60◦ and 120◦ . Lozenges are also called calissons and diamonds in the literature. See Figure 2.3. Figure 2.3. A triangular region T ⊂ T8 together with on of its 13 tilings. Fix a positive integer d and consider the triangular region Td as a union of unit triangles. Thus a subregion T ⊂ Td is a subset of such triangles. We retain their labels. As above, we say that a subregion T is ▽-heavy, △-heavy, or balanced if there are more downward pointing than upward pointing triangles or less, or if their numbers are the same, respectively. A subregion is tileable if either it is empty or there exists a tiling of the region by lozenges such that every triangle is part of exactly one lozenge. Since a lozenge in Td is the union of a downward-pointing and an upward-pointing triangle, and every triangle is part of exactly one lozenge, a tileable subregion is necessarily balanced. Let T ⊂ Td be any subregion. Given a monomial xa y b z c with degree less than d, the monomial subregion of T associated to xa y b z c is the part of T contained in the triangle a units from the bottom edge, b units from the upper-right edge, and c units from the upperleft edge. In other words, this monomial subregion consists of the triangles that are in T and the puncture associated to the monomial xa y b z c . We previously established a characterization of tileable triangular regions associated to monomial ideals. Theorem 2.1. [5, Theorem 2.2] Let T = Td (I) be a balanced triangular region, where I ⊂ R is any monomial ideal. Then T is tileable if and only if T has no ▽-heavy monomial subregions. 4 D. COOK II AND U. NAGEL A subregion T ⊂ Td can be associated to a bipartite planar graph G that is an induced subgraph of the honeycomb graph. Lozenge tilings of T can be then related to perfect matchings on G. The connection was used by Kuperberg in [12], the earliest citation known to the authors, to study symmetries on plane partitions. Using this connection, the bi-adjacency matrix of T is the bi-adjacency matrix Z(T ) := Z(G) of the graph G associated to T . If T = Td (I) for some Artinian ideal I, then Z(T ) is the transpose of the matrix defined by ×(x + y + z) : [R/I]d−2 → [R/I]d−1 using monomial bases in the reverse-lexicographic order (see [7, Proposition 4.5]). Based on results by Migliore, Miró-Roig, and the second author [15], we established the following criterion for the presence of the weak Lefschetz property. Theorem 2.2. [7, Corollary 4.7] Let I be an Artinian monomial ideal in R = K[x, y, z]. Then R/I has the weak Lefschetz property if and only if, for each positive integer d, the matrix Z(Td (I)) has maximal rank. It is well-known that the permanent of Z(G) enumerates the perfect matchings of G. A perfect matching of G can be signed via the permutation it generates; thus a lozenge tiling τ of T can be similarly signed (see [5]). Hence the signed tilings of the region are related to the determinant of the bi-adjacency matrix. Theorem 2.3. [5, Theorem 3.5] If T ⊂ Td is a non-empty balanced subregion, then the signed lozenge tilings of T are enumerated by det Z(T ). We recursively define a puncture of T ⊂ Td to be a non-floating puncture if it touches the boundary of Td or if it overlaps or touches a non-floating puncture of T . Otherwise we call a puncture a floating puncture. We further have the regions with only even floating punctures have an easier enumeration. Corollary 2.4. [5, Corollary 4.7] Let T be a tileable triangular region, and suppose all floating punctures of T have an even side length. Then every lozenge tiling of T has the same perfect matching sign as well as the same lattice path sign, and so perm Z(T ) = | det Z(T )| > 0. 2.3. Tileability & semistability of the syzygy bundle. Let I be a monomial ideal of R whose punctures in Td (corresponding to the minimal generators of I having degree less than d) have side lengths that sum to m. Then we define the over-puncturing coefficient of I in degree d to be od (I) = m − d. If od (I) < 0, od (I) = 0, or od (I) > 0, then we call I under-punctured, perfectly-punctured, or over-punctured in degree d, respectively. Let now T = Td (I) be a triangular region with punctures whose side lengths sum to m. Then we define similarly the over-puncturing coefficient of T to be oT = m − d. If oT < 0, oT = 0, or oT > 0, then we call T under-punctured, perfectly-punctured, or over-punctured, respectively. Note that oT = od (J(T )) ≤ od (I), and equality is true if and only if the ideals I and J(T ) are the same in all degrees less than d. Perfectly-punctured regions admit a numerical tileability criterion. Proposition 2.5. [8, Corollary 2.4] Let T = Td (I) be a triangular region. Then any two of the following conditions imply the third: (i) T is perfectly-punctured; (ii) T has no over-punctured monomial subregions; and (iii) T is tileable. SOME ALGEBRAS WITH THE WEAK LEFSCHETZ PROPERTY 5 Let I be an Artinian ideal of S = K[x1 , . . . , xn ] that is minimally generated by forms f1 , . . . , fm . The syzygy module of I is the graded module syz I that fits into the exact sequence m M 0 → syz I → S(− deg fi ) → I → 0. i=1 Its sheafification syzI f is a vector bundle on Pn−1 , called the syzygy bundle of I. It has rank m − 1. c1 (E) Let E be a vector bundle on projective space. The slope of E is defined as µ(E) := rk(E) . Furthermore, E is said to be semistable if the inequality µ(F ) ≤ µ(E) holds for every coherent subsheaf F ⊂ E. Using the characterization of semistability for monomial ideals given by Brenner [3], we previously established a connection to tileability. Theorem 2.6. [8, Theorem 3.3] Let I be an Artinian ideal in R = K[x, y, z] generated by monomials whose degrees are bounded above by d, and let T = Td (I). If T is non-empty, then any two of the following conditions imply the third: (i) I is perfectly-punctured; (ii) T is tileable; and (iii) syzI f is semistable. We note that Brenner and Kaid showed in [4, Corollary 3.3] that, for almost complete intersections, nonsemistability implies the weak Lefschetz property in characteristic zero. 3. The criterion In this section we will establish sufficient conditions that guarantee the presence of the weak Lefschetz property. We use this result to exhibit explicit infinite families of ideals such that their quotients have the weak Lefschetz property. We begin with a necessary condition for the presence of the weak Lefschetz property. Proposition 3.1. Let I be a monomial ideal such that Td (I) is a balanced region that is not tileable. Put J = I +(xd , y d , z d ). Then R/J never has the weak Lefschetz property, regardless of the characteristic of K. Proof. Since Td (I) = Td (J) is not tileable, Theorem 2.3 gives det Z(Td (J)) = 0. Thus, Z(Td (J)) does not have maximal rank. Now we conclude by Theorem 2.2.  We illustrate the preceding proposition with an example. Example 3.2. Consider the regions depicted in Figure 3.1. These regions are both balanced, but non-tileable as they contain ▽-heavy monomial subregions (see Theorem 2.1). In particular, the monomial subregion associated to xy 2 z in T and the monomial subregion associated to xy 2 z 2 in T ′ are both ▽-heavy. Thus, R/(x6 , y 7, z 8 , xy 5 z, xy 2 z 3 , x3 y 2z) and R/(x6 , y 7, z 7 , xy 4 z 2 , xy 2z 4 , x2 y 2 z 2 ) both fail to have the weak Lefschetz property, regardless of the characteristic of the base field. Now we use Proposition 3.1 in order to relate the weak Lefschetz property and semistability of syzygy bundles (see Section 2.3). In preparation, we record the following observation. Recall that the monomial ideal of a triangular region T ⊂ Td is the largest ideal J whose minimal generators have degrees less than d such that T = Td (J). 6 D. COOK II AND U. NAGEL (i) T = T8 (x6 , y 7 , z 8 , xy 5z, xy 2 z 3 , x3 y 2z) (ii) T ′ = T8 (x6 , y 7, z 7 , xy 4 z 2 , xy 2 z 4 , x2 y 2z 2 ) Figure 3.1. Two balanced non-tileable triangular regions. Lemma 3.3. Let J ⊂ R be the monomial ideal of a triangular region T ⊂ Td . Then: (i) The region T has no overlapping punctures if and only if each degree of a least common multiple of two distinct minimal generators of J is at least d. (ii) The punctures of T are not overlapping nor touching if and only if each degree of a least common multiple of two distinct minimal generators of J is at least d + 1. Proof. Let m1 and m2 be two distinct minimal generators of J. Then their associated punctures overlap if and only if there is a monomial of degree d − 1 that is a multiple of m1 and m2 . The existence of such a monomial means precisely that the degree of the least common multiple of m1 and m2 is at most d − 1. Now claim (i) follows. Assertion (ii) is shown similarly by observing that the punctures to m1 and m2 touch if and only if there is a monomial of degree d that is a multiple of m1 and m2 .  The following consequence is useful later on. Corollary 3.4. Assume T ⊂ Td is a triangular region whose punctures are not overlapping nor touching, and let J be the monomial ideal of T . Then R/J does not have non-zero socle elements of degree less than d − 1. Proof. Since J is a monomial ideal, every minimal first syzygy of J corresponds to a relation mi ni − mj nj = 0 for suitable monomials ni and nj , where mi and mj are distinct monomial minimal generators of J. Applying Lemma 3.3 to the equality mi ni = mj nj , we conclude that the degree of each first syzygy of J is at least d + 1. It follows that the degree of every second syzygy of J is at least d + 2. Each minimal second syzygy of J corresponds to a socle generator of R/J. Hence, the degrees of the socle generators of R/J are at least d − 1 .  Remark 3.5. The converse of Corollary 3.4 is not true in general. For example, the socle generators of R/(x6 , y 7, z 8 , xy 5z, xy 2 z 3 , x3 y 2z) have degrees greater than 7, but two punctures of T8 (x6 , y 7, z 8 , xy 5z, xy 2 z 3 , x3 y 2z) touch each other (see Figure 3.1). Recall that perfectly-punctured regions were defined above Proposition 2.5. This concept is used in the proof of the following result. Theorem 3.6. Let I ⊂ R be an Artinian ideal whose minimal monomial generators have degrees d1 , . . . , dt . Set d1 + · · · + dt d := . t−1 Assume the following conditions are satisfied: (i) The number d is an integer. SOME ALGEBRAS WITH THE WEAK LEFSCHETZ PROPERTY 7 (ii) For all i = 1, . . . , t, one has d > di . (iii) Each degree of a least common multiple of two distinct minimal generators of I is at least d. Then the syzygy bundle of I is semistable if R/I has the weak Lefschetz property. Proof. Consider the triangular region T = Td (I). By assumption (iii) and Lemma 3.3, we obtain that the punctures of T do not overlap. Recall that the side length of the puncture to a minimal generator of degree di is d − di . The definition of d is equivalent to t X d= (d − di ). i=1 We conclude that the region T is balanced and perfectly-punctured. Combined with the weak Lefschetz property of R/I, the first property implies that T is tileable by Proposition 3.1. Now Theorem 2.6 gives the semistability of the syzygy bundle of I.  The converse of the above result is not true, in general. Example 3.7. Consider the ideal J = (x7 , x4 y 2z 2 , xy 3 z 3 , y 7 , z 7 ). Its syzygy bundle is semistable, and its triangular region T9 (J) is perfectly-puntured. However, R/J does not have the weak Lefschetz property. Notice though that R/I has the weak Lefschetz property, where I is the very similar ideal I = (x7 , x5 yz, xy 3 z 3 , y 7, z 8 ). Both regions, T9 (I) and T9 (J) are tileable and symmetric. In fact, they are examples of mirror symmetric regions that are studied in [6] Under stronger assumptions the converse to Theorem 3.6 is indeed true. Theorem 3.8. Let I ⊂ R be an Artinian ideal with minimal monomial generators m1 , . . . , mt . Set d1 + · · · + dt d := , t−1 where di = deg mi . Assume the following conditions are satisfied: (i) The number d is an integer. (ii) For all i = 1, . . . , t, one has d > di . (iii) If i 6= j, then the degree of the least common multiple of mi and mj is at least d + 1. (iv) If mi is not a power of x, y, or z, then d − di is even. Then the syzygy bundle of I is semistable if and only if R/I has the weak Lefschetz property. Proof. By Theorem 3.6, it is enough to show that R/I has the weak Lefschetz property if the syzygy bundle of I is semistable. Consider the region T = Td (I). In the proof of Theorem 3.6 we showed that T is balanced and perfectly-punctured. Hence T is tileable by Theorem 2.6. Since all floating punctures of T have an even side length by assumption (iv), Theorem 2.3 and Corollary 2.4 give that Z(T ) has maximal rank. Assumption (iii) means that the punctures of T are not overlapping nor touching (see Lemma 3.3). Hence, Corollary 3.4 yields that the degrees of the socle generators of R/I are at least d − 1. Therefore, Theorem 2.2 proves that R/I has the weak Lefschetz property.  8 D. COOK II AND U. NAGEL Remark 3.9. The assumptions of Theorem 3.8 have the following interpretation using the triangular region Td (I). Assumptions (ii) means that each minimal generator of I gives a puncture of positive side length of Td (I). Condition (i) expresses the fact that the side lengths of all punctures add up to d, that is, Td (I) is perfectly punctured. Assumption (iv) says that all non-corner punctures have an even side length, and Condition (iii) is the requirement that no punctures of Td (I) touch or overlap. We now show that, for all positive integers d1 , . . . , dt with t ≥ 3 that satisfy the numerical assumptions (i), (ii), and (iv) of Theorem 3.8, there is a monomial ideal I whose minimal generators have degrees d1 , . . . , dt to which Theorem 3.8 applies and guarantees the weak Lefschetz property of R/I. Example 3.10. Let d1 , . . . , dt be t ≥ 3 positive integers satisfying the following numerical conditions: t (i) The number d := d1 +···+d is an integer. t−1 (ii) For all i = 1, . . . , t, one has d > di . (iii) At most three of the integers d − di are not even. Re-indexing if needed, we may assume that d3 ≤ min{d1 , d2} and that d−di is even whenever 4 ≤ i ≤ t. Consider the following ideal I = (xd1 , y d2 , z d3 , m4 , . . . , mt ), where m4 = xd−d3 yz −d−1+d3 +d4 if t ≥ 4, m5 = x2d−d3 −d4 y 2z 2d−2+d3 +d4 +d5 if t ≥ 5, and ( Pi−1 Pi xd−d3 y 1+ k=4 (d−dk ) z −d(i−3)−1+ k=3 dk if 6 ≤ i ≤ t and i is even Pi−1 Pi mi = x−1+ k=3 (d−dk ) y 2 z −d(i−3)−1+ k=3 dk if 7 ≤ i ≤ t and i is odd. Note that deg mi = di for all i. One easily checks that the degree of the least common multiple of any two distinct minimal generators of I is at least d + 1, that is, the punctures of Td (I) do not overlap nor touch each other. Figure 3.2. The region corresponding to d1 = d2 = d3 = 12 and d4 = · · · = d8 = 11 in Example 3.10. Corollary 3.11. If I is an ideal as defined in Example 3.10, then R/I has the weak Lefschetz property and the syzygy bundle of I is semistable. SOME ALGEBRAS WITH THE WEAK LEFSCHETZ PROPERTY 9 Proof. By construction, the considered ideals satisfy assumptions (i)–(iv) of Theorem 3.8. Furthermore, the region Td (I) has no over-punctured monomial subregions. Hence, it is tileable by Proposition 2.5. (Alternatively, one can exhibit a family of non-intersecting lattice paths to check tileability.) By Theorem 2.6, it follows that the syzygy bundle of I is semistable, and hence R/I has the weak Lefschetz property by Theorem 3.8.  Remark 3.12. Given an integer t ≥ 3, there are many choices for the integers d1 , . . . , dt , and thus for the ideals exhibited in Example 3.10. A convenient choice, for which the description of the ideal becomes simpler, is d1 = 2t − 4, d2 = d3 = d − 1, and d4 = · · · = dt = d − 2, where d is any integer satisfying d ≥ 2t − 3. Then the corresponding ideal is I = (x2t−4 , y d−1, z d−1 , xyz d−4 , x3 y 2z d−7 , m6 , . . . , mt ), where mi = ( xy 2i−7 z d+4−2i x2i−8 y 2z d+4−2i if 6 ≤ i ≤ t and i is even if 7 ≤ i ≤ t and i is odd. If d = 13 and t = 8, then this gives the ideal I mentioned in the introduction. Its triangular region T13 (I) is depicted in Figure 3.2. References [1] M. Boij, J. Migliore, R. Miró-Roig, U. Nagel, F. Zanello, On the shape of a pure O-sequence, Mem. Amer. Math. Soc. 218 (2012), no. 1024, vii+78 pp. [2] M. Boij, J. Migliore, R. Miró-Roig, U. Nagel, F. Zanello, On the Weak Lefschetz Property for Artinian Gorenstein algebras of codimension three, J. Algebra 403 (2014), 48–68. [3] H. Brenner, Looking out for stable syzygy bundles, Adv. Math. 219 (2008), no. 2, 401–427. [4] H. Brenner, A. Kaid, Syzygy bundles on P2 and the Weak Lefschetz Property, Illinois J. Math. 51 (2007), no. 4, 1299–1308. [5] D. Cook II, U. Nagel, Signed lozenge tilings, Preprint, 2015; arXiv:1507.02507. [6] D. Cook II, U. Nagel, Signed lozenge tilings of mirror symmetric regions, in preparation. [7] D. Cook II, U. Nagel, The weak Lefschetz property for monomial ideals of small type, Preprint, 2015; arXiv:1507.3853. [8] D. Cook II, U. Nagel, Syzygy bundles and the weak Lefschetz property of almost complete intersections, Preprint, 2016. [9] B. Harbourne, H. Schenck, A. Seceleanu, Inverse systems, Gelfand-Tsetlin patterns and the weak Lefschetz property, J. Lond. Math. Soc. (2) 84 (2011), no. 3, 712–730. [10] T. Harima, T. Maeno, H. Morita, Y. Numata, A. Wachi, J. Watanabe, The Lefschetz properties, Lecture Notes in Mathematics, 2080, Springer, 2013. [11] T. Harima, J. Migliore, U. Nagel, J. Watanabe, The weak and strong Lefschetz properties for Artinian K-algebras, J. Algebra 262 (2003), no. 1, 99–126. [12] G. Kuperberg, Symmetries of plane partitions and the permanent-determinant method, J. Combin. Theory Ser. A 68 (1994), no. 1, 115–151. [13] A. Kustin, H. Rahmati, A. Vraciu, The resolution of the bracket powers of the maximal ideal in a diagonal hypersurface ring, J. Algebra 369 (2012), 256–321. [14] J. Li, F. Zanello, Monomial complete intersections, the weak Lefschetz property and plane partitions, Discrete Math. 310 (2010), no. 24, 3558–3570. [15] J. Migliore, R. Miró-Roig, U. Nagel, Monomial ideals, almost complete intersections and the weak Lefschetz property, Trans. Amer. Math. Soc. 363 (2011), no. 1, 229–257. [16] J. Migliore, R. Miró-Roig, U. Nagel, On the weak Lefschetz property for powers of linear forms, Algebra Number Theory 6 (2012), no. 3, 487–526. [17] J. Migliore, U. Nagel, A tour of the weak and strong Lefschetz properties, J. Commut. Algebra 5 (2013), 329–358. 10 D. COOK II AND U. NAGEL [18] R. P. Stanley, Weyl groups, the hard Lefschetz theorem, and the Sperner property, SIAM J. Algebraic Discrete Methods 1 (1980), no. 2, 168–184. Department of Mathematics & Computer Science, Eastern Illinois University, Charleston, IL 46616 E-mail address: [email protected] Department of Mathematics, University of Kentucky, 715 Patterson Office Tower, Lexington, KY 40506-0027 E-mail address: [email protected]
0math.AC
Fast Simulation of Probabilistic Boolean Networks (Technical Report) Andrzej Mizera, Jun Pang, and Qixia Yuan ∗ arXiv:1605.00854v1 [cs.CE] 28 Apr 2016 Computer Science and Communications, University of Luxembourg, Luxembourg [email protected] Abstract. Probabilistic Boolean networks (PBNs) is an important mathematical framework widely used for modelling and analysing biological systems. PBNs are suited for modelling large biological systems, which more and more often arise in systems biology. However, the large system size poses a significant challenge to the analysis of PBNs, in particular, to the crucial analysis of their steadystate behaviour. Numerical methods for performing steady-state analyses suffer from the state-space explosion problem, which makes the utilisation of statistical methods the only viable approach. However, such methods require long simulations of PBNs, rendering the simulation speed a crucial efficiency factor. For large PBNs and high estimation precision requirements, a slow simulation speed becomes an obstacle. In this paper, we propose a structure-based method for fast simulation of PBNs. This method first performs a network reduction operation and then divides nodes into groups for parallel simulation. Experimental results show that our method can lead to an approximately 10 times speedup for computing steady-state probabilities of a real-life biological network. 1 Introduction Systems biology aims to model and analyse biological systems from a holistic perspective in order to provide a comprehensive, system-level understanding of cellular behaviour. Computational modelling of a biological system plays a key role in systems biology. It connects the field of traditional biology with mathematics and computational science, providing a way to organize and formalize available biological knowledge in a mathematical model and to identify missing biological information using formal means. Together with biochemical techniques, computational modelling promotes the holistic understanding of real-life biological systems, leading to the study of large biological systems. This brings a significant challenge to computational modelling in terms of the state-space size of the system under study. Among the existing modelling frameworks, probabilistic Boolean networks (PBNs) is well-suited for modelling large-size biological systems. It is first introduced by Shmulevich et al. [1,2] as a probabilistic generalisation of the standard Boolean networks (BNs) to model gene regulatory networks (GRNs). The framework of PBNs incorporates rule-based dependencies between genes and allows the systematic study of global network dynamics; meanwhile, it is capable of dealing with uncertainty, which naturally occurs at different levels in the study of biological systems. ∗ Supported by the National Research Fund, Luxembourg (grant 7814267). 2 Mizera, Pang and Yuan Focusing on the wiring of a network, PBNs is essentially designed for revealing the long-run (steady-state) behaviour of a biological system. Comprehensive understanding of the long-run behaviour is vital in many contexts. For example, attractors of a gene regulatory network (GRN) are considered to characterise cellular phenotypes [3]. There have been a lot of studies in analysing the long-run behaviour of biological systems for better understanding the influences of genes or molecules in the systems [4]. Moreover, steady-state analyses have been used in gene intervention and external control [5,6], which is of special interest to cancer therapists to predict the potential reaction of a patient to treatment. In the context of PBNs, many efforts have been devoted to computing their steady-state probabilities. In [7,8], efficient numerical methods are provided for computing the steady-state probabilities of small-size PBNs. Those methods utilise an important characteristics of PBNs, i.e., a PBN can be viewed as a discrete-time Markov chain (DTMC) and its dynamics can be studied with the use of the rich theory of DTMCs. The key idea of those methods relies on the computation of the transition matrix of the underlying DTMC of the studied PBN. They perform well for small-size PBNs. However, in the case of large-size PBNs, the state-space size becomes so huge that the numerical methods are not scalable any more. Many efforts are then spent on addressing the challenge of the huge state-space in large-size PBNs. In fact, the use of statistical methods and Monte Carlo methods remain the only feasible approach to address the problem. In those methods, the simulation speed is an important factor in the performance of these approaches. For large PBNs and long trajectories, a slow simulation speed could render these methods infeasible as well. In our previous work [9], we have considered the two-state Markov chain approach and the Skart method for approximate analysis of large PBNs. Taking special care of efficient simulation, we have implemented these two methods in the tool ASSA-PBN [10] and successfully used it for the analysis of large PBNs with a few thousands of nodes. However, the required time cost is still expected to be reduced. This requirement is of great importance for the construction of a model, e.g., parameter estimation, and for a more precise and deep analysis of the system. In this work, we propose a structure-based method to speed up the simulation process. The method is based on analysing the structure of a PBN and consists of two key ideas: first, it removes the unnecessary nodes in the network to reduce its size; secondly, it divides the nodes into groups and performs simulation for nodes in a group simultaneously. We show with experiments that our structure-based method can significantly reduce the computation time for approximate steady-state analyses of large PBNs. To the best of our knowledge, our proposed method is the first one to apply structure-based analyses for speeding up the simulation of a PBN. Structure of the paper. After presenting preliminaries in Section 2, we describe our structure-based simulation method in Section 3. We perform an extensive evaluation and comparison of our method with the previous state-of-art methods in Section 4 on a large number of randomly generated PBNs and a large real-life PBN model of apoptosis in hepatocytes. We conclude our paper with some discussions in Section 5. Fast Simulation of Probabilistic Boolean Networks 2 2.1 3 Preliminaries Probabilistic Boolean networks (PBNs) A PBN G(X, F) models elements of a biological system with a set of binary-valued nodes X = {x1 , x2 , . . . , xn }. For each node xi ∈ X, the update of its value is guided by (i) (i) (i) a set of predictor functions Fi = { f1 , f2 , . . . , f`(i) }, where `(i) is the number of pre(i) dictor functions for node xi . Each f j is a Boolean function whose inputs are a subset of nodes, referred to as parent nodes of xi . For each node xi , one of its predictor functions will be selected to update the value of xi at each time point t. This selection is in (i) (i) (i) accordance with a probability distribution Ci = (c1 , c2 , . . . , c`(i) ), where the individual probabilities are the selection probabilities for the respective elements of Fi and they sum to 1. The value of node xi at time point t is denoted as xi (t) and the state of the PBN at time point t is denoted as s(t) = (x1 (t), x2 (t), . . . , xn (t)). The state space of the PBN is S = {0, 1}n and it is of size 2n . There are several variants of PBNs with respect to the selection of predictor functions and the synchronisation of nodes update. In this paper, we consider the independent synchronous PBNs, i.e., the choice of predictor functions for each node is made independently and the values of all the nodes are updated synchronously. The transition from state s(t) to state s(t + 1) is performed by randomly selecting a predictor function for each node xi from Fi and by applying those selected predictor functions to update the values of all the nodes synchronously. We denote f (t) the combination of all the selected predictor functions at time point t. The transition of state s(t) to s(t + 1) can then be denoted as s(t + 1) = f (t)(s(t)). Perturbations of a biological system are introduced by a perturbation rate p ∈ (0, 1) in a PBN. The dynamics of a PBN is guided with both perturbations and predictor functions: at each time point t, the value of each node xi is flipped with probability p; and if no flip happens, the value of each node xi is updated with selected predictor functions synchronously. Let γ(t) = (γ1 (t), γ2 (t), . . . , γn (t)), where γi (t) ∈ {0, 1} and P(γi (t) = 1) = p for all t and i ∈ {1, 2, . . . , n}. The transition of s(t) to s(t + 1) in PBNs with perturbations is given by ( s(t) ⊕ γ(t) if γ(t) 6= 0 (1) s(t + 1) = f (t)(s(t)) otherwise, where ⊕ is the element-wise exclusive or operator for vectors. According to Equation (1), perturbations allow the system to move from a state to any other state in one transition, hence render the underlying Markov chain irreducible and aperiodic. Thus, the dynamics of a PBN with perturbations can be viewed as an ergodic DTMC [1]. Based on the ergodic theory, the long-run dynamics of a PBN with perturbations is governed by a unique limiting distribution, convergence to which is independent of the choice of the initial state. The density of a PBN is measured with its predictor function number and parent F φ (i), where n is nodes number. For a PBN G, its density is defined as D(G) = n1 ∑Ni=1 the number of nodes in G, NF is the total number of predictor functions in G, and φ (i) is the number of parent nodes for the ith predictor function. 4 2.2 Mizera, Pang and Yuan Simulating a PBN A PBN can be simulated via two steps based on its definition. First, perturbation is verified for each individual node and a node value is flipped if there is a perturbation. Second, if no perturbation happens for any of the nodes, the network state is updated by selecting predictor functions for all the nodes and applying them. For efficiency reason, the selection of predictor functions for each node xi is performed with the alias method [11], which allows to make a selection among choices in constant time irrespective of the number of choices. The alias method requires the construction of an alias table of size proportional to the number of choices, based on the selection probabilities of Ci . 3 Structure-based Parallelisation The simulation method described in the above section requires to check perturbations, make a selection and perform updating a node for n times in each step. In the case of large PBNs and huge trajectory (sample) size, the simulation time cost can become prohibitive. Intuitively, the simulation time can be reduced if the n-time operations can be speeded up, for which we propose two solutions. One is to perform network reduction such that the total number of nodes is reduced. The other is to preform node-grouping in order to parallelise the process for checking perturbations, making selections, and updating nodes. For the first solution, we analyse the PBN structure to identify those nodes that can be removed and remove them to reduce the network size; while for the second solution, we analyse the PBN structure to divide nodes into groups and perform the operations for nodes in a group simultaneously. We combine the two solutions together and refer to this simulation technique as structure-based parallelisation. We formalise the two solutions in the following three steps: the first solution is described in step 1 and the second solution is described in steps 2 and 3. Step 1. Remove unnecessary nodes from the PBN. Step 2. Parallelise the perturbation process. Step 3. Parallelise updating a PBN state with predictor functions. We describe these three steps in the following subsections. 3.1 Removing unnecessary nodes We first identify those nodes that can be removed and preform network reudction. When simulating a PBN without perturbations, if a node does not affect any other node in the PBN, the states of all other nodes will not be affected after removing this node. If this node is not of interest of the analysis, e.g., we are not interested in analysing its steadystate, then this node is dispensable in a PBN without perturbations. We refer to such a dispensable node as a leaf node in a PBN and define it as follow: Definition 1 (Leaf node). A node in a PBN is a leaf node (or leaf for short) if and only if either (1) it is not of interest and has no child nodes or (2) it is not of interest and has no other children after iteratively removing all its child nodes which are leaf nodes. Fast Simulation of Probabilistic Boolean Networks 5 Algorithm 1 Checking perturbations of leaf nodes in a PBN 1: procedure C HECK L EAF N ODES(t) 2: if rand() > t then return true; 3: else return false; 4: end if 5: end procedure According to the above definition, leaf nodes can be simply removed without affecting the simulation of the remaining nodes in a PBN without perturbations. In the case of a PBN with perturbations, perturbations in the leaf nodes need to be considered. Updating states with Boolean functions will only be performed when there is no perturbation in both the leaf nodes and the non-leaf nodes. Perturbations of the leaf nodes can be checked in constant time irrespective of the number of leaf nodes as describe in Algorithm 1. The input t in this algorithm is the probability that no perturbation happens in all the leaf nodes. It can be computed easily as t = (1 − p)` , where p is the perturbation rate for each node and ` is the number of leaf nodes in the PBN. With the consideration of their perturbations, the leaf nodes can be removed without affecting the simulation of the non-leaf nodes in a PBN with perturbations as well. Since the leaves are not of interest, results of analyses performed on the simulated trajectories of the reduced network, i.e.,. containing only non-leaf nodes, will be the same as performed on trajectories of the original network, i.e., containing all the nodes. 3.2 Performing perturbations in parallel The second step of our method speeds up the process for determining perturbations. Normally, perturbations are checked for nodes one by one. In order to speed up the simulation of a PBN, we perform perturbations for k nodes simultaneously instead of one by one. For those k nodes, there are 2k different perturbation situations. We compute the probability for each situation and construct an alias table based on the distribution. With the alias table, we make a choice c among 2k choices and perturb the corresponding nodes based on the choice. The choice c is an integer in [0, 2k ) and for the whole network the perturbation can then be performed k nodes by k nodes using the logical bitwise exclusive or operation which outputs true only when inputs differ. To save memory, the alias table can be reused for all the groups since the perturbation rate for each node is the same. It might happen that the number of nodes in the last perturbation round will be less than k nodes. Assume there is k0 nodes in the last round and k0 < k. For those k0 nodes, we can reuse the same alias table to make the selection in order to save memory. After getting the choice c, we perform c = c&m, where & is a bitwise and operation and m is a mask constructed by setting the first k0 bits of m’s binary representation to 1 and the remaining bits to 0. Theorem 1. The above process for determining perturbations for the last k0 nodes guarantees that the probability for each of the k0 nodes to be perturbed is still p. Proof. Without loss of generality, we assume that in the last k0 nodes, t nodes should be perturbed and the positions of the t nodes are fixed. The probability for those t 6 Mizera, Pang and Yuan Algorithm 2 The group perturbation algorithm 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: procedure P REPARE P ERTURBATION(n, k) g = dn/ke; k = dn/ge; k0 = n − k ∗ (g − 1); construct the alias table A p and mask; return [A p , mask]. end procedure procedure P ERTURBATION(A p , mask, s) i = 0; perturbed = false; repeat c = Next(A p ); //Next(A p ) returns a random integer based on A p if c! = 0 then s = s ⊕ (c << (i ∗ k)); //shift c to flip only the bits (nodes) of current group perturbed = true; end if i + +; until i = g − 1 c = Next(A p ) & mask; if c! = 0 then s = s ⊕ (c << (i ∗ k)); perturbed = true; end if return [s, perturbed]. end procedure 0 fixed nodes to be perturbed is pt (1 − p)k −t . When we make a selection from the alias 0 table for k nodes, there are 2k−k different choices corresponding to the case that t fixed 0 position nodes in the last k nodes are perturbed. The sum of the probabilities of the 0 0 0 i k−k0 −i = pt (1 − p)k0 −t . 2k−k different choices is [pt (1 − p)k −t ] · ∑k−k t u i=0 p (1 − p) We describe the process for constructing groups and performing perturbations based on the groups in Algorithm 2. Algorithm 2 requires three inputs: n is the number of nodes,1 k is the maximum number of nodes that can be perturbed simultaneously and s is the PBN’s current state which is represented by an integer. As perturbing one node equals to flipping one bit of s, perturbing nodes in a group is performed via a logical bitwise exclusive or operation (see line 11 of Algorithm 2). Perturbing k nodes simultaneously requires 2k double numbers to store the probabilities of 2k different choices. The size of k is therefore restricted by the available memory.2 3.3 Updating nodes in parallel The last step to speed up PBN simulation is to update a number of nodes simultaneously in accordance with their predictor functions. For this step, we need an initialisation pro1 In our methods, it is clear that steps 2 and 3 are independent of step 1. Thus, we consistently use n to denote the number of nodes in a PBN. 2 For the experiments, we set k to 16 and k could be bigger as long as the memory allows. However, a larger k requires larger table to store the 2k probabilities and the performance of a CPU drops when accessing an element of a much larger table due to the large cache miss rate. Fast Simulation of Probabilistic Boolean Networks 7 cess to divide the n nodes into m groups and compute the combined predictor functions for each group. After this initialisation, we can select a combined predictor function for each group based on a sampled random number and apply this combined function to update the nodes in the group simultaneously. We first describe how predictor functions of two nodes are combined. The combination of functions for more than two nodes can be performed iteratively. Let xα and xβ be the two nodes to be considered. Their predictor functions are denoted as (α) (α) (α) (β ) (β ) (β ) Fα = { f1 , f2 , . . . , f`(α) } and Fβ = { f1 , f2 , . . . , f`(β ) }. The corresponding selec(α) (α) (β ) (β ) β tion probabilities are denoted as Cα = {c1 , c2 , . . . , cα`(α) } and Cβ = {c1 , c2 , . . . , c`(β ) }. After the grouping, the number of combined predictor functions is `(α) ∗ `(β ). We de(α) (β ) (α) (β ) (α) note the set of combined predictor functions as F̄αβ = { f1 · f1 , f1 · f2 , . . . , f`(α) · (β ) (α) f`(β ) }, where for i ∈ [1, `(α)] and j ∈ [1, `(β )], fi (β ) · fj is a combined predictor func- (α) (β ) tion that takes the input nodes of functions fi and f j as its input and (α) (β ) the Boolean output of functions fi and f j into integers as output. The combines combined integers range in [0, 3] and their 2-bit binary representations (from right to left) repre(α) (β ) sent the values of nodes xα and xβ . The selection probability for function fi · f j is (α) (β ) `(α) `(β ) (α (β ) ci ∗ c j . It holds that ∑i=1 Σ j=1 (ci ∗ c j ) = 1. With the selection probabilities, we can compute the alias table for each group so that the selection of combined predictor function in each group can be performed in constant time. We now describe how to divide the nodes into groups. Our aim is to have as few groups as possible so that the updating of all the nodes can be finished in as few rounds as possible. However, fewer groups lead to many more nodes in a group, which will result in a huge number of combined predictor functions in the group. Therefore, the number of groups has to been chosen properly so that the number of groups is as small as possible, while the combined predictor functions can be stored within the memory limit of the computer performing the simulation. Besides, nodes with only one predictor function should be considered separately since selections of predictor functions for those nodes are not needed. In the rest of this section, we first formulate the problem for dividing nodes with more than one predictor function and give our solution afterwards; then we discuss how to treat nodes with only one predictor function. Problem description. Let S be a list of n items {µ1 , µ2 , . . . , µn }. For i ∈ [1, n], item µi represents a node in a PBN with n nodes and its weight is assigned by a function ω(µi ), which returns the number of predictor functions of node µi . We aim to find a minimum integer m to distribute the nodes into m groups such that the sum of the combined predictor functions numbers of the m groups will not exceed a memory limit θ . This is equivalent to finding a minimum m and an m-partition S1 , S2 , . . . Sm of S, i.e., S =  S1 ∪ S2 ∪ · · · ∪ Sm and Sk ∩ S` = 0/ for k, ` ∈ {1, 2, . . . , m}, such that ∑m ω(µ ) ≤ θ. Π j µ ∈S i=1 j i Solution. The problem in fact has two outputs: an integer m and an m-partition. We first try to estimate a potential value of m, i.e., the lower bound of m that could lead to an m-partition of S which satisfies ∑m i=1 Πµ j ∈Si ω(µ j ) ≤ θ . With this estimate, we then try to find an m-partition satisfying the above requirements. 8 Mizera, Pang and Yuan Algorithm 3 The greedy algorithm 1: procedure F IND PARTITIONS(S, m) 2: sort S with descending orders based on the weight of items in S; 3: initialise A, an array of m lists; j = 0; //initially, each A[i] is an empty list 4: repeat //S[ j] ( j starts from 0) is the jth item in S 5: among the m elements of A, 6: find the one with the smallest total weight and add S[ j] to it; 7: j + +; 8: until j = S.size() //S.size() returns the number of items in S 9: return A. 10: end procedure Denote the weight of a sub-list Si as wi and wi = Πµ j ∈Si ω(µ j ). The inequality in the problem description can be rewritten as ∑m i=1 wi ≤ θ . We first compute the minimum value of m̂ satisfying the following inequality and denote this minimum value as m̂min . q n ω(µ ) ≤ θ . (2) m̂ · m̂ Πi=1 i Theorem 2. m̂min is the lower bound of m that allows a partition to satisfy ∑m i=1 wi ≤ θ . Proof. This is equivalent to proving that m̂min −1 ∑ 0 wi > θ , (3) i=1 0 where wi is the weight of the ith sub-list in an arbitrary partition of S into m̂min − 1 sub-lists. Since m̂p min is the minimum value of m̂ that satisfies Inequality (2), we have n ω(µ ) > θ . Hence, (m̂min − 1) · (m̂min −1) Πi=1 i (m̂min − 1) · q (m̂min −1) m̂min −1 Πi=1 wi > θ . 0 (4) Based on the inequality of arithmetic and geometric means, we have m̂min −1 ∑ 0 wi ≥ (m̂min − 1) · q (m̂min −1) m̂min −1 Πi=1 wi . 0 (5) i=1 Inequality (3) follows from Inequality (4) and Inequality (5). t u Starting from the lower bound, we try to find a partition of S into m sub-lists that satisfies ∑m i=1 wi ≤ θ . Since the arithmetic and geometric means of non-negative real numbers are equal if and only if every number is the same, we get the heuristic that the weight of the m sub-lists should be as equal as possible so that the sum of the weights is as small as possible. Our problem then becomes similar to the NP-hard multi-way number partition problem: to divide a given set of integers into a collection of subsets, Fast Simulation of Probabilistic Boolean Networks 9 Algorithm 4 Partition n nodes into groups. 1: procedure PARTITION(G, θ ) 2: compute two lists S and S0 based on G; //S0 contains nodes with one predictor function 3: compute the lower bound m̂; m = m̂; 4: repeat 5: A1 = F IND PARTITIONS(S, m); 6: compute the sum of the weight of the m partitions and assign it to sum; 7: m = m + 1; 8: until sum < θ 9: divide S0 into A2 ; //partition nodes with only one predictor function 10: merge A1 and A2 into A; 11: return A. 12: end procedure so that the sum of the numbers in each subset are as nearly equal as possible. We adapt the greedy algorithm (see Algorithm 3 for details) for solving the multi-way number partition problem, by modifying the sum to multiplication, in order to solve our partition problem.3 If the m-partition we find satisfies the requirement ∑m i=1 wi ≤ θ , then we get a solution to our problem. Otherwise, we need to increase m by one and try to find a new m-partition. We repeat this process until the condition ∑m i=1 wi ≤ θ is satisfied. The whole partition process for all the nodes is described in Algorithm 4. Nodes with only one predictor function are treated in line 9. We divide such nodes into groups based on their parent nodes, i.e., we put nodes sharing the most common parents into the same group. In this way, the combined predictor function size can be as small as possible such that the limited memory can handle more nodes in a group. The number of nodes in a group is also restricted by the combined predictor function size, i.e., the number of parent nodes in this group.4 The partition is performed with an algorithm similar to Algorithm 3. The difference is that in each iteration we always add a node into a group which shares most common parent nodes with this node. 3.4 The new simulation method We describe our new method for simulating PBNs in Algorithm 5. The procedure P REPARATION describes the whole preparation process of the three steps (network reduction for Step 1, and node-grouping for Step 2 and Step 3). The four inputs of the procedure P REPARATION are respectively the PBN network G, the memory limit θ , the maximum number k of nodes that can be put in a group for perturbation and the maximum number of parent nodes in a group. The P REPARATION procedure takes these inputs, performs network reduction and node grouping. The reduced network and the 3 There exist other algorithms to solve the multi-way number partition problem, and we choose the greedy algorithm for its efficiency. 4 In our experiments, the maximum number of parent nodes in one group is set to 18. Similar to the value of k in step 2, the number can be larger as long as the memory can handle. However, the penalty from large cache miss rate will diminish the benefits by having fewer groups when the number of parent nodes is too large. 10 Mizera, Pang and Yuan Algorithm 5 Structure-based PBN simulation. 1: 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: 24: procedure P REPARATION(G, θ , k) perform network reduction for G and store the reduced network in G0 get the number of nodes n and perturbation rate p from G; get the number of nodes n0 from G0 ; t = pow(1 − p, n − n0 ); [A p , mask] =P REPARE P ERTURBATION(n0 , k); PA =PARTITION(G0 , θ ); for each group in PA, compute its combined functions F, and its alias table A, and the cumulative number of nodes in the group cum; return [A p , mask,t, A, F, cum]. end procedure procedure PARALLEL S IMULATION(A p , mask, A, F, cum,t, s) [s, perturbed] =P ERTURBATION(A p , mask, s); //perform perturbations by group if perturbed || C HECK L EAF N ODES(t) then return s; //check perturbations of leaves else i = 0; s0 = 0; count = size(A); //size(A) returns the number of elements in array A repeat index = Next(A[i]); //select a random integer based on the alias table of group i f = F.get(index); //obtain the predictor function at the given index v = f [s]; // f [s] returns the integer output of f based on state s s0 = s0 | (v << cum[i]); //shift v to update only nodes in the current group i + +; until i = count − 1; end if return s0 . end procedure grouped nodes information are then provided for the PARALLEL S IMULATION procedure via six parameters: A p and mask are the alias table and mask used for performing perturbations of non-leaf nodes as explained in Algorithm 2; t is used for checking perturbations in leaf nodes as explained in Algorithm 1; A is an array containing the alias tables for predictor functions in all groups; F is an array containing predictor functions of all groups; and cum is an array storing the cumulative number of nodes in each group. Perturbations for leaf nodes and non-leaf nodes have been explained in Algorithms 1 and 2. We now explain how nodes in a group are simultaneously updated with combined predictor function. It is performed via the following three steps: 1) a random combined predictor function is selected from F based on the alias table A; 2) the output of the combined predictor function is obtained according to the current state s; 3) the nodes in this group are updated based on the output of the combined predictor function. To save memory, states are stored as integers and updating a group of nodes is implemented via a logical bitwise or operation. To guarantee that the update is performed on the required nodes, a shift operation is needed on the output of the selected function (line 19). The number of bits to be shifted for the current group is in fact the cumulative number of nodes of all its previous groups, which is stored in the array cum. Fast Simulation of Probabilistic Boolean Networks 4 11 Evaluation The evaluation of our new simulation method is performed on both randomly generated networks and a real-life biological network. All the experiments are performed on a high performance computing (HPC) machines, each of which contains a CPU of Intel Xeon X5675 @ 3.07 GHz. The program is written in Java and the initial and maximum Java virtual machine heap size is set to 4GB and 5.89GB, respectively. The evaluation data is available at http://satoss.uni.lu/software/ASSA-PBN/benchmark. 4.1 Randomly generated networks With the evaluation on randomly generated networks, we aim not only to show the efficiency of our methods, but also to answer how much speedup our method is likely to provide for a given PBN. The first step of our new simulation method performs a network reduction technique, which is different from the node-grouping technique in the later two steps. Therefore, we evaluate the contribution of the first step and the other two steps to the performance of our new simulation method separately. We name the original simulation method as Methodold ; the simulation method applying the network reduction technique as Methodreduction ; and the simulation method applying both the network reduction and node-grouping techniques as Methodnew . Methodreduction and Methodnew require preprocessing of the PBN under study, which leads to a certain computational overhead. However, the proportion of the pre-processing time in the whole computation decreases with the increase of the sample size. In our evaluation, we first focus on comparisons without taking pre-processing into account to evaluate the maximum potential performance of our new simulation method; we then show how different sample sizes will affect the performance when pre-processing is considered. How does our method perform? Intuitively, the speedup due to the network reduction technique is influenced by how much a network can be reduced and the performance of node-grouping is influenced by both the density and size of a given network. Hence, the evaluation is performed on a large number of randomly generated PBNs covering different types of networks. In total, we use 2307 randomly generated PBNs with different percentages of leaves ranging between 0% and 90%; different densities ranging between 1 and 8.1; and different network sizes from the set {20, 50, 100, 150, 200, 250, 300, 350, 400, 450, 500, 550, 600, 650, 700, 750, 800, 850, 900, 950, 1000}. We simulate 400 million steps for each of the 2307 PBNs with the three different simulation methods and compare their time costs. For the network reduction technique the speedups are computed as the ratio between the time of Methodreduction and the time of Methodold . The obtained speedups are between 1.00 and 10.90. For node-grouping, the speedups are computed as the ratio between the time of Methodnew and the time of Methodreduction . We have obtained speedups between 1.56 and 4.99. We plot in Figure 1 the speedups of the network reduction and node-grouping techniques with respect to their related parameters. For the speedups achieved with network reduction, the related parameters are the percentage of leaves and the density. In fact, there is little influence from density to the speedup resulting from network reduction as the speedups do not change much 12 Mizera, Pang and Yuan (a) Methodreduction over Methodold . (b) Methodnew over Methodreduction . Fig. 1: Speedups contributed from network reduction and node-grouping. with the different densities (see Figure 1a). The determinant factor is the percentage of leaves. The more leaves a PBN has, the more speedup we can obtain for the network. For the speedups obtained from node-grouping, the related parameters are the density and the network size after network reduction, i.e., the number of non-leave nodes. Based on Figure 1b, the speedup with node-grouping is mainly determined by the network density: a smaller network density could result in a larger speedup contributed from the node-grouping technique. This is mainly due to the fact that sparse network has a relatively small number of predictor functions in each node and therefore, the nodes will be partitioned into fewer groups. Moreover, while the performance of network reduction is largely influenced by the percentage of leaves, the node-grouping technique tends to provide a rather stable speedup. Even for large dense networks, the technique can reduce the time cost almost by half. The combination of these two techniques results in speedups (time of Methodnew over time of Methodold ) between 1.74 and 41.92. We plot in Figure 2 the speedups in terms of the percentage of leaves and density. The figure shows a very good performance of our new method on sparse networks with large percentage of leaves. What is the influence of sample size? We continue to evaluate the influence of sample size on our proposed new PBN simulation method. The pre-processing time for the network reduction step is relatively very small; therefore our evaluation focuses on the influence to the total time cost of all the 3 steps, i.e., the speedup of Methodnew with respect to Methodold . We selected 9 representative PBNs from the above 2307 PBNs, with respect to their densities, percentages of leaves and the speedups we have obtained. We simulate the 9 PBNs for different sample size using both Methodold and Methodnew . We show the average pre-processing time of Methodnew and the obtained speedups of Methodnew (taking into account pre-processing time costs) with different sample sizes in Table 1. As expected, with the increase of the sample size, the influence of preprocessing time becomes smaller and the speedup increases. In fact, in some cases, the pre-processing time is relatively so small that its influence becomes negligible, e.g., for networks 7 and 8 when the sample size is equal or greater than 100 million. Moreover, Fast Simulation of Probabilistic Boolean Networks 13 Fig. 2: Speedups of Methodnew over Methodold . network # 1 2 3 4 5 6 7 8 9 size 900 950 1000 600 800 900 450 550 1000 percentage pre-processing density of leaves time (second) 1.11 0.84 0.30 67.83 68.38 68.00 89.78 88.55 89.10 6.72 6.96 7.00 4.25 3.94 3.89 1.60 1.72 1.75 28.12 32.35 33.72 162.21 43.17 36.58 0.23 0.24 1.08 speedup with different sample sizes (million) 1 10 100 400 0.65 0.59 0.58 0.13 0.66 0.69 21.44 20.26 10.04 1.49 1.47 1.45 1.08 3.05 3.56 37.59 35.94 31.83 1.71 1.73 1.71 4.51 6.75 6.90 41.62 36.47 35.09 1.73 1.75 1.73 6.89 7.69 7.70 41.84 36.62 37.19 Table 1: Influence of sample sizes on the speedups of Methodnew over Methodold . often with a sample size larger than 10 million, the effort spent in pre-processing can be compensated by the saved sampling time (simulation speedup). Performance prediction. To predict the speedup of our method for a given network, we apply regression techniques on the results of the 2307 PBNs to fit a prediction model. We use the normalised percentage of leaves and the network density as the predictor variables and the speedup of Methodnew over Methodold as the response variables in the regression model since network size does not directly affect the speedup based on the plotted pictures. In the end, we obtained a polynomial regression model shown in Equation 6, which can fit 90.9% of the data: y = b1 + b2 ∗ x1 + b3 ∗ x12 + b4 ∗ x2 + b5 ∗ x22 , (6) where [b1 , b2 , b3 , b4 , b5 ] = [2.89, 2.71, 2.40, −1.65, 0.71], y represents the speedup, x1 represents the percentage of leaves and x2 represent the network density. The result of a 10-fold cross-validation of this model supports this prediction rate; hence we believe 14 Mizera, Pang and Yuan this model does not overfit the given data. Based on this model, we can predict how much speedup is likely to be obtained with our proposed method for a given PBN. 4.2 An apoptosis network In this section, we evaluate our method on a real-life biological network, i.e., an apoptosis network containing 96 nodes [12]. This network contains 37.5% of leaves and has a density of 1.78, which is suitable for applying our method to gain speedups. The apoptosis network has been analysed in [9]. In one of the analyses, i.e., the longterm influences [13] on complex2 from each of its parent nodes: RIP-deubi, complex1, and FADD, 7 steady-state probabilities of the apoptosis network need to be computed. In this evaluation, we compute the 7 steady-state probabilities using our proposed structure-based simulation method (Methodnew ) and compare it with the original simulation method (Methodold ). The precision and confidence level of all the computations, as required by the two-state Markov chain approach [14], are set to 10−5 and 0.95, respectively. The results of this computation are shown in Table 2. The sample sizes required by both methods are very close for computing same steady-state probabilities. Note that the speedups are computed based on the accurate data, which are slightly different from the truncated and rounded data shown in the table. We have obtained speedups (Methodnew over Methodold ) between 7.67 and 10.28 for computing those 7 probabilities. In total, the time cost is reduced from 1.5 hours to about 10 mins. 5 Discussion and Conclusion In this work, we propose a structure-based method for speeding up simulations of PBNs. Using network reduction and node-grouping techniques, our method can significantly improve the simulation speed of PBNs. We show with experiments that our new simulation method is especially efficient in the case of analysing sparse networks with a large number of leaf nodes. The node-grouping technique gains speedups by using more memory. Theoretically, as long as the memory can handle, the group number can be made as small as possible. However, this causes two issues in practice. First, the pre-processing time increases dramatically with the group number decreasing. Second, the performance of the method drops a lot when operating on large memories due to the increase of cache miss rate. Therefore, in our experiments we do not explore all the available memory to maximise the groups. Reducing the pre-processing time cost and the cache miss rate would be two future works to further improve the performance of our method. We also plan to apply our method for the analysis of real-life large biological networks. References 1. Shmulevich, I., Dougherty, E.R.: Probabilistic Boolean Networks: The Modeling and Control of Gene Regulatory Networks. SIAM Press (2010) 2. Trairatphisan, P., Mizera, A., Pang, J., Tantar, A.A., Schneider, J., Sauter, T.: Recent development and biomedical applications of probabilistic Boolean networks. Cell Communication and Signaling 11 (2013) 46 Fast Simulation of Probabilistic Boolean Networks 15 Methodold Methodnew probability # sample size pre-processing sample size total speedup time (minute) (million) time (second) (million) time (minute) 1 2 3 4 5 6 7 147.50 452.35 253.85 49.52 315.06 62.22 255.88 9.51 28.65 14.88 2.96 17.73 3.69 16.74 4.57 3.10 3.42 3.38 4.40 3.13 4.01 147.82 452.25 253.99 50.39 305.43 50.28 256.61 1.05 2.79 1.74 0.36 2.05 0.39 1.70 9.09 10.28 8.54 8.31 8.39 7.67 9.88 Table 2: Performance of Methodold and Methodnew on an apoptosis network. 3. Kauffman, S.A.: Homeostasis and differentiation in random genetic control networks. Nature 224 (1969) 177–178 4. Shmulevich, I., Dougherty, E.R., Zhang, W.: From boolean to probabilistic boolean networks as models of genetic regulatory networks. Proceedings of the IEEE 90(11) (2002) 1778–1792 5. Shmulevich, I., Dougherty, E.R., Zhang, W.: Gene perturbation and intervention in probabilistic Boolean networks. Bioinformatics 18(10) (2002) 1319–1331 6. Shmulevich, I., Dougherty, E.R., Zhang, W.: Control of stationary behavior in probabilistic Boolean networks by means of structural intervention. Journal of Biological Systems 10(04) (2002) 431–445 7. Shmulevich, I., Gluhovsky, I., Hashimoto, R., Dougherty, E., Zhang, W.: Steady-state analysis of genetic regulatory networks modelled by probabilistic Boolean networks. Comparative and Functional Genomics 4(6) (2003) 601–608 8. Trairatphisan, P., Mizera, A., Pang, J., Tantar, A.A., Sauter, T.: optPBN: An optimisation toolbox for probabilistic boolean networks. PLOS ONE 9(7) (2014) 9. Mizera, A., Pang, J., Yuan, Q.: Reviving the two-state markov chain approach (technical report). Available online at http://arxiv.org/abs/1501.01779 (2015) 10. Mizera, A., Pang, J., Yuan, Q.: ASSA-PBN: a tool for approximate steady-state analysis of large probabilistic Boolean networks. In: Proc. 13th International Symposium on Automated Technology for Verification and Analysis. LNCS, Springer (2015) Available at http:// satoss.uni.lu/software/ASSA-PBN/. 11. Walker, A.: An efficient method for generating discrete random variables with general distributions. ACM Transactions on Mathematical Software 3(3) (1977) 253–256 12. Schlatter, R., Schmich, K., Vizcarra, I.A., Scheurich, P., Sauter, T., Borner, C., Ederer, M., Merfort, I., Sawodny, O.: ON/OFF and beyond - a Boolean model of apoptosis. PLOS Computational Biology 5(12) (2009) e1000595 13. Shmulevich, I., Dougherty, E.R., Kim, S., Zhang, W.: Probabilistic Boolean networks: a rule-based uncertainty model for gene regulatory networks. Bioinformatics 18(2) (2002) 261–274 14. Raftery, A.E., Lewis, S.: How many iterations in the Gibbs sampler? Bayesian Statistics 4 (1992) 763–773
5cs.CE
Computer Algebra and Material Design Akihito Kikuchi arXiv:1612.02275v4 [cond-mat.mtrl-sci] 17 Feb 2018 Canon Inc, Tokyo, Japan∗ 1 Abstract This article is intended to an introductory lecture in material physics, in which the modern computational group theory and the electronic structure calculation are in collaboration. The effort of mathematicians in the field of group theory have ripened as a new trend, called “computer algebra”, outcomes of which now can be available as handy computational packages, and would also be useful to physicists with practical purposes. This article, in the former part, explains how to use the computer algebra for the applications in the solid-state simulation, by means of one of the computer algebra package, the GAP system. The computer algebra enables us to obtain various group theoretical properties with ease, such as the representations, the character tables, the subgroups, etc. Furthermore, it would grant us a new perspective of material design, which could be executed in mathematically rigorous and systematic way. Some technical details and some computations which require the knowledge of a little higher mathematics (but computable easily by the computer algebra) are also given. The selected topics will provide the reader with some insights toward the dominating role of the symmetry in crystal, or, the “mathematical first principles” in it. In the latter part of the article, we analyze the relation between the structural symmetry and the electronic structure in C60 (as an example to the system without periodicity). The principal object of the study is to illustrate the hierarchical change of the quantum-physical properties of the molecule, in accordance with the reduction of the symmetry (as it descends down in the ladder of subgroups). As an application, this article also presents the computation of the vibrational modes of the C60 by means of the computer algebra. In order to serve the common interest of the researchers, the details of the computations (the required initial data and the small programs developed for the purpose) are explained as minutely as possible. ∗ akihito [email protected] (The corresponding author) 2 I. INTRODUCTION In the history of physics, the cooperation of physicists and mathematicians has yielded a great harvest in the first half of the twentieth century, as the installation of group theory in quantum mechanics[1]. One of the main applications is realized in the field of solid-state physics[2–4]. In subsequent years, however, such productive relationship between physics and mathematics became enfeebled, as physicists and mathematicians were pursuing their own interests separately. In material science, the typical tool of study has turned into “first principle electronic structure computation”, in which rapid computers are intensively used so that the quantitative simulation could be achieved. In contrast, the group theoretical view in the quantum physics is rather a qualitative one, which could explain the likeness in similar material structures but could not illuminate the origin of subtle but distinct differences. The standpoints of group theoretical analysis, and of first principles simulation, are located at cross-purposes. This is one of the reasons which brought about the breaking-off between the group theory and the first principles electronic structure computation. There is another hardship which hinders the collaboration of mathematics and physics. The computation of the “representation” in group theory[5–9], useful in physical applications, requires special arts, which is recondite to non-experts. Thus, for the purpose of general use, the character tables are listed up in literature and textbooks (recently, moreover in databases). Traditionally we are obliged to consult with the non-electric data, which is prone to troublesome errors. Such a circumstance has little affinity to the modern style of computational physics, where necessary data should easily be accessible on the computer or computed anew by the researcher. Nevertheless, it must be stressed here that such a cumbersome situation has already become surmountable. The development of the effective computer architectures and the program packages for computational group 3 theory in recent decades have benefited mathematicians so well that they could actually obtain definite symbolic or numeric solutions to the problems of their own, not only in proving the existence of the solution[10, 11]. These computational tools are not restricted to mathematicians, but available to every scientific researcher. Powerful outcomes by mathematicians, also, will confer a modernized viewpoint to the material science, so that the conventional computational tools could be assisted and improved, although, in the present state, most of the material scientists seem to be content in having old-fashioned knowledge of mathematics. This article takes several examples in the group theoretical analysis in the electronic structure calculation and presents the details of the computation so that the readers would know how to use modern mathematical packages of computational group theory. The necessary group theoretical data are computed by the desktop computer, without references to other resources, and are applicable to the analysis of the quantum physics in materials which is principally governed by the symmetry of the system. The article furthermore expounds the possible style of the systematic material design, by which the electronic structure might be controlled artificially from the viewpoint of the structural symmetry. From these topics, the potentiality of the cooperation of computer algebra and first-principles electronic structure (which are legitimate heirs of group theory and quantum mechanics) may be observed. To be fair, there are a lot of works of physicists who make use of computer algebra, although the works of pedagogical purpose are not so many. My article is only one of them. And here I list up some of such works for the benefit of readers. The vibrational spectrum of C60 is analyzed in the thesis of Mooij[13]. The representation of the group is computed by the computer algebra system Maple; the vibrational modes are computed by the reduction of the size of the dynamical matrix (of the empirical potential model); the parameters of these models are fit against the experimental data for the optically active modes. My article also treats the vibra4 tional modes of this molecule, but it does not arrive at the quantitative computation of vibrational frequencies. My article, by means of GAP, classifies geometrically possible deformations with respect to irreducible representations and generates the basis set of deformations in the symbolic formulas, although the obtained results could be applied to more quantitative studies. The book by El-Batanouny and Wooten treats the wide range of topics related to the symmetry in the condensed matter[14]. The interest of the research is almost the same as my article. One of the principal difference to my article is this: the authors of this book developed the programs for the group theoretical study by means of Mathematica, while I adopt the GAP system. The authors of this book developed Mathematica programs which compute the characters of groups by means of Dixon’s method and applied them toward various topics. (I should say this: the GAP package computes the characters of groups by the same method, so we can directly step into applications in physics, as end-users of mathematics.) I recommend the readers to read the book along with my article, if possible, in order to solidify their understanding. The book by Stauffer et al treats the general topics on the computer simulation and the computer algebra[15]. The adopted computer algebra system is ”reduce”, for the purpose of symbolic computations, and the application to the physics is rather introductory. Hergert and coworkers made the group-theoretical analysis of electronic and photonic band structure[16, 17]. The symmetry properties of Schrödinger equation and Maxwell equation are investigated. The computer algebra system Mathematica enables them to simplify group theoretical study. As for the introduction to the computational physics, the book by Thijssen will be useful[18]. In the study of quantum chemistry, Sakiyama and Waki utilized the computer 5 algebra system GAP[19]. The possible conformations (for a hexakis-methylamine nickel(ii) complex cation) are generated by the programs built on GAP, and the stability of possible formations is computed and compared through the quantitative electronic structure computation. In the thesis of Rykhlinskaya, the author developed a computer algebra package ”Bethe” in the framework of Maple, and applied it to the symmetric molecular geometry and symmetries, the vibrational analysis of the molecule, and the analysis of the atomic behavior and the atoms in the crystal field[20].The applications of Bethe are demonstrated in the article of Fritzshche[21]. Barnett gave us the review article in the application of computer algebra, not only in the life science but in the material science[22]. The interest of the author is centered on the symbolic computation (especially in chemistry), not of the computer group theory. However, we can find useful references there, if we extend our researches beyond group theory. “Bilbao Crystallographic Server” is an online database of crystallography[23–25]. From this server, we can find data of crystallographic point groups and space groups and useful programs. Also, there are studies of the group theoretical property of C60 by mathematicians[26, 27]. The authors of these articles (Chung, Kostant, and Sternberg) discuss the embedding of the icosahedral group (of C60 symmetry) into a larger group, which is a realization of the statement of Galois. And they analyze the energy spectrum of the molecule by the representation theory, with the hope that their results will find applications in the physical properties of the molecule. Eick and Souvignier give us a survey of the algorithms for space groups and crystallographic groups available in the computer algebra system GAP and in the software packages Carat and Cryst[28]. It seems to me, that the application of the GAP system to the group theoretical 6 analysis in the material science is still undeveloped, although a great deal of the products in the pure mathematics can be attainable easily from GAP. Some of these related works explain to us how to use the computational packages developed on some computer algebra system, and provide us with those packages, but they are not kind enough to explain their implementation. So in my article, I intend to present ”the raw programs” and ”the raw computed results” so that the readers may have experience on the actual computations by GAP. Again, I must say this: the examples taken in the following chapters are not novel, and a lot of group theoretical analysis is already done, without the aid of computer algebra. I only show an easier way of these analyses by means of a desktop PC. If readers thought that some of the methods are unfamiliar or novel, they are not of my invention, in the strict sense: they would be well-known things in the field of pure mathematics, and they are only interpretations in the viewpoint of physics. II. COMPUTATION OF GROUP THEORETICAL PROPERTIES USING “GAP” The computational discrete algebra package GAP is one of the powerful tools for the computation in the group theory[12]. It can be applied to the determination of the group theoretical properties which are necessary for solid-state electronic structure computation. For this purpose, the point group of the crystal must be determined. The group operations are to be listed up; the multiplication table is to be prepared; through which the character table is computed. At first, the concept of the character of the group is explained here. Let us consider an equilateral triangle as in Fig. 1. There are operations in the plane, such as, the rotation by 60 degrees at the center of mass, and the reflection at an axis which con7 nects the center of mass and one of the vertexes. These operations exchange vertexes among themselves but fix the triangle unmoved. In the mathematical terminology, these operations consist a group C3v . These operations are the permutation of the vertexes, numbered as 1,2, and 3 in the clockwise direction. FIG. 1. A triangle, as the object of the symmetric operation. The symmetric operation can be through the permutations of three symbols, 1,2,3, or the rotations and reflections in the x-y plane. They are expressed as  E=  B=  D= 1 2 3 1 2 3 1 2 3 1 3 2 1 2 3 3 1 2   ,A =    ,C =    ,F =  1 2 3 2 1 3 1 2 3 3 2 1 1 2 3 2 3 1  ,  ,  . In the above the top and the bottom low denote the initial and the final arrangements 8 of the vertexes respectively. These operations can also be expressed by six rotation matrices in the x-y plane:  E=  B=  D= 1 0 0 1  ,A =  √ 3 2 − 12 √ 3 2 1 0  , 0 −1  √  3 1 − − 23 2  , , C =  √2 3 1 1 − 2 2 2  √  √  3 1 − − 23 2  . , F =  √2 3 1 − 21 − 2 2 √ − 12 −   The multiplication table of these elements is written in table 1. E A B C D F E E A B C D F A A E F D C B B B D E F A C C C F D E B A D D B C A F E F F C A B E D TABLE 1. The multiplication table. The multiplications xy between the elements in the left column x and in the top row y are shown. Let us examine these maps: Γ1 : E, A, B, C, D, F → 1 Γ10 : E, D, F → 1; A, B, C → −1 (Determinant of matrices) Γ2 : E, A, B, C, D, F → E, A, B, C, D, F (Identity map as matrices) (1) One can see that the multiplication table is kept unaltered by these maps with the replacement of the six symbols to corresponding targets. The geometrical operations 9 in the triangle, forming a group, are represented by these maps, even if not always faithfully; the viewpoint can be switched from geometrical one to numerical one. This is an example of the representation of the group; all elements in the group are represented by proxies of scalars or matrices; the multiplications among them are subject to the same rule as the original group elements. The trace of the matrix representation, such as Γ2 , is called “character”, having certain properties favorable to the application of quantum physics, as will be seen later. The character table of C3v is given in table 2. E Γ1 1 Γ10 1 Γ2 2 A 1 -1 0 B 1 -1 0 C 1 -1 0 D 1 1 -1 F 1 1 -1 TABLE 2. The character table of C3v . As can be seen in the multiplication table, the group elements are divided into subsets such as Cl(a) = {g ∈ G| there exists x ∈ G such as g = xax−1 }. (2) These subsets are called conjugacy classes. The elements in the same conjugacy class have a common value of the character; it is customary for character tables to be labeled by conjugacy classes, not by each group elements. The conjugacy classes for C3v are given by three subsets: {E}, {A, B, C} and {D, F}. The gap computation for this example proceeds as follows. The group is defined by the minimal set of generators including a rotation and a reflection: gap> G:=Group((1,2,3),(1,2)); Group([ (1,2,3), (1,2) ]) 10 The program returns the results in the shorthand notation preferred by mathematicians. gap> Elements(G); [ (), (2,3), (1,2), (1,2,3), (1,3,2), (1,3) ] gap> M:=MultiplicationTable(G); [ [ 1, 2, 3, 4, 5, 6 ], [ 2, 1, 4, 3, 6, 5 ], [ 3, 5, 1, 6, 2, 4 ], [ 4, 6, 2, 5, 1, 3 ], [ 5, 3, 6, 1, 4, 2 ], [ 6, 4, 5, 2, 3, 1 ] ] The multiplication table is given by a matrix, which is represented by a doubly nested list; each of the inner lists should be read as one of the lows in the matrix. The entry Mij shows the result of the multiplication gi · gj between elements gi and gj . Subgroups and generators are computed by: gap> AllSubgroups(G); [ Group(()), Group([ (2,3) ]), Group([ (1,2) ]), Group([ (1,3) ]), Group([ (1,2,3) ]), Group([ (1,2,3), (2,3) ]) ] gap> GeneratorsOfGroup(G); [ (1,2,3), (1,2) ] gap> G.1; (1,2,3) gap> G.2; (1,2) gap> S:=Subgroup(G,[(1,2)]); Subgroup(G,[(1,2)]); gap> Elements(S); [ (), (1,2) ] gap> A:=Group((1,2,3)); 11 Group([ (1,2,3) ]) gap> IsSubgroup(G,A); true gap> IsSubgroup(A,G); false gap> A:=Group((1,2,3,4)); Group([ (1,2,3,4) ]) gap> IsSubgroup(G,A); false The group can also be defined from the multiplication table as gap> G2:=GroupByMultiplicationTable(M); <group of size 6 with 6 generators> gap> Elements(G2); [ m1, m2, m3, m4, m5, m6 ] The elements in the group constructed from the multiplication tables are represented by abstract symbols m1,m2,...,m6. In order to construct the group from the rotation in the Euclidean space, the generating set of the rotation matrices should be given. gap> M1:=[[-1/2,ER(3)/2],[-ER(3)/2,-1/2]]; [ [ -1/2, -1/2*E(12)^7+1/2*E(12)^11 ], [ 1/2*E(12)^7-1/2*E(12)^11, -1/2 ] ] gap> M2:=[[1,0],[0,-1]]; [ [ 1, 0 ], [ 0, -1 ] ] gap> G3:=Group(M1,M2); Group( 12 [ [ [ -1/2, -1/2*E(12)^7+1/2*E(12)^11 ], [ 1/2*E(12)^7-1/2*E(12)^11, -1/2 ] ], [ [ 1, 0 ], [ 0, -1 ] ] ]) Here ER(n) is √ n and E(n) is the primitive n-th root of unity exp(2πi/n). Let us inquire of the GAP package whether the three different definitions should generate equivalent groups. gap> G=G; true gap> G2=G; false gap> G3=G; false The GAP program decides that the three groups are not identical in the strict sense, because they are composed from different resources, i.e. permutations, abstract symbols, and matrices. However, we can construct isomorphisms among them. The following GAP command returns the isomorphism on the generators of the groups. gap> IsomorphismGroups(G,G); [ (1,2,3), (1,2) ] -> [ (1,2,3), (1,2) ] gap> IsomorphismGroups(G2,G); [ m1, m2, m3, m4, m5, m6 ] -> [ (), (2,3), (1,2), (1,2,3), (1,3,2), (1,3) ] gap> IsomorphismGroups(G,G2); [ (1,2,3), (1,2) ] -> [ m4, m3 ] gap> G4:=Group((1,2,3,4)) 13 gap> IsomorphismGroups(G,G4); fail The existence of the isomorphism between G and G3 can also be verified in this way. The conjugacy classes are computed by this command: gap> ConjugacyClasses(G); [ ()^G, (2,3)^G, (1,2,3)^G ] To access entries in the conjugacy classes, a special method is needed. The following cannot work well: gap> Elements(ConjugacyClasses(G)); [ ()^G, (2,3)^G, (1,2,3)^G ] Instead, using “List” command and anonymous functions in λ calculus, we can access each entry in the list: gap> List(Elements(G),x->x); [ (), (2,3), (1,2), (1,2,3), (1,3,2), (1,3) ] gap> List(Elements(G),x->x^-1); [ (), (2,3), (1,2), (1,3,2), (1,2,3), (1,3) ] gap> List(ConjugacyClasses(G),Elements); [ [ () ], [ (2,3), (1,2), (1,3) ], [ (1,2,3), (1,3,2) ] ] gap> List(ConjugacyClasses(G),Representative); [ (), (2,3), (1,2,3) ] The character table is computed by this command: gap> irrg:=Irr(G); [ Character( CharacterTable( Sym( [ 1 .. 3 ] ) ), [ 1, 1, 1 ] ), Character( CharacterTable( Sym( [ 1 .. 3 ] ) ), [ 1, -1, 1 ] ), Character( CharacterTable( Sym( [ 1 .. 3 ] ) ), [ 2, 0, -1 ] ) ] 14 The character table can be accessible as a numeral list, or as a map on the group elements: gap> List([1,2,3],y->List([1,2,3],x->irrg[y][x])); [ [ 1, 1, 1 ], [ 1, -1, 1 ], [ 2, 0, -1 ] ] gap> List([1,2,3],y->List(Elements(G),x->x^irrg[y])); [ [ 1, 1, 1, 1, 1, 1 ], [ 1, -1, -1, 1, 1, -1 ], [ 2, 0, 0, -1, -1, 0 ] ] The irreducible representation is computed by gap> rep:=IrreducibleRepresentations(G); [ Pcgs([ (2,3), (1,2,3) ]) -> [ [ [ 1 ] ], [ [ 1 ] ] ], Pcgs([ (2,3), (1,2,3) ]) -> [ [ [ -1 ] ], [ [ 1 ] ] ], Pcgs([ (2,3), (1,2,3) ]) -> [ [ [ 0, 1 ], [ 1, 0 ] ], [ [ E(3), 0 ], [ 0, E(3)^2 ] ] ] ] gap> List(Elements(G),x->x^rep[3]); [ [ [ 1, 0 ], [ 0, 1 ] ], [ [ 0, 1 ], [ 1, 0 ] ], [ [ 0, E(3)^2 ], [ E(3), 0 ] ], [ [ E(3), 0 ], [ 0, E(3)^2 ] ], [ [ E(3)^2, 0 ], [ 0, E(3) ] ], [ [ 0, E(3) ], [ E(3)^2, 0 ] ] ] This command returns the irreducible representations, giving the relations between the generators of the group and the matrix representation. The characters are computed by taking traces of the matrix representation. The character table is also computed by gap> tbl:=CharacterTable(G); CharacterTable( Sym( [ 1 .. 3 ] ) ) gap> Display(tbl); CT1 15 2 1 1 . 3 1 . 1 1a 2a 3a 2P 1a 1a 3a 3P 1a 2a 1a X.1 1 1 1 X.2 1 -1 1 X.3 2 . -1 To make use of the character table computed in this way, various subsidiary commands are prepared in GAP system. (N.B. The orderings of representations or characters by these commands do not always coincide with each other.) gap> ConjugacyClasses(tbl); [ ()^G, (2,3)^G, (1,2,3)^G ] gap> Irr(tbl); [ Character( CharacterTable( Sym( [ 1 .. 3 ] ) ), [ 1, -1, 1 ] ), Character( CharacterTable( Sym( [ 1 .. 3 ] ) ), [ 2, 0, -1 ] ), Character( CharacterTable( Sym( [ 1 .. 3 ] ) ), [ 1, 1, 1 ] ) ] Remark. There are various algorithms for the computation of characters. The simplest one, the Burnside algorithm, starts from the counting in the elements in the conjugacy classes, sets up a matrix, and the characters are computed through the eigenvalue problem. The Dixon (or Dixon-Schneider) algorithm goes in a more advanced way, employing the computation in the prime fields and the other techniques 16 of the symbolic computation, but it is effective in the large groups[29–31]. The latter algorithm is adopted in GAP. III. SOME PRELIMINARIES A. Projection operator Once the characters of the group are obtained, “projection operators” are constructed and assigned to each of the irreducible representation. The definition is as follows: P (p) = lp X (p)∗ χ · OT , |G| T ∈G T (3) where lp is the dimension of the irreducible representation,|G| is the order of the (p) group, and χT is the character of the group element T , which is allowed to be complex-valued. OT is the operator allotted to each T in the space in which the group action is defined. This operator acts on functions in the Euclidean space as follows: OT f (r) = f (T −1 (r)). (4) By this construction, we can distinguish whether a function belongs to the corresponding irreducible representation or not. If the projector is applied to the basis functions of the corresponding irreducible representations, these functions are invariant as a set: on the other hand, the projector is applied to the basis functions of different irreducible representations, the result of the projection goes to zero. (The epithet “invariant” should be understood in the following way: in many cases, plural basis functions belong to one irreducible representation. Through the group operations, these basis functions are interchanged with each other or re-expressed as the linear combination of them; moreover, they are never transformed into functions be17 longing to other representations. In a word, they are invariant as a subspace; if the subspace corresponding to a representation is minimal, no more being divisible, it is called irreducible. The whole of representations and characters of the arbitrary finite group could be computed exactly, without omission, by the principle of the group theory.) (p) If we know the explicit forms of the irreducible matrix representation Dij (R), the projection operator of the following form is useful: (p) Pkl = lp X (p)∗ D (OT ) · OT . |G| T ∈G kl (5) Owing to the definition of the partner functions OT |p; li = X (p) |p; jiDjl (T ) (6) j and the orthogonality theorem of the representation X (p)∗ (q) Dik (T )Dlm (T ) = T |G| δpq δil δkm lp (7) this projector transforms one basis vector into another basis in one irreducible representation: (p) Pkl |p; li = |p; ki. (8) Moreover it can project out k-th partner function of the irreducible representation P P (q) from an arbitrary function F = q j fj |q; ji as (p) (p) Pkk F = fk |p; ki. (9) At this junction, the connection between the group theory and the energy spec18 trum of the Schrodinger equations arises. Let the potential term be invariant under some symmetry operations. With this potential term, certain eigenfunctions should exist. When the symmetry operations are applied to the Schrodinger equation, the Laplacian, the potential, and the energy spectrum are invariant: the changeable is only the wavefunction, which is expressed by the basis functions in the irreducible representation. If the irreducible representation is one-dimensional, the wavefunction will be invariant up to a certain phase factor by the symmetry operation: on the other-hand, if the representation is multi-dimensional, the symmetry operation may generate different wave-functions which are other solutions to the same equation with the same eigenvalue. Such circumstances lead to the degeneracy of the energy spectrum. The identification of each wavefunction to its proper irreducible representation enables us to clarify the relation between the energy spectrum and the symmetry in the system, which is helpful in the analysis of the electronic properties of materials. B. Space group An n-dimensional space group S is a discrete subgroup in a group of Euclidean motions in Rn , such that the subgroup T in S, composed of pure translations(without rotations or reflections) is a free Abelian subgroup of rank n, having finite index in S. Thus an exact sequence of groups exists as 0 → T → S → P → 1, (10) in which S acts on T by means of the conjugation action t → s · t · s−1 , which represents the action of the point group P , defined as a factor group S/T , on the lattice translations. 19 In a more intuitive expression, the space group S is the set of symmetry operations in a periodic system; it is composed of rotations and reflections which fix components in the unit cell, combined with parallel movements along crystal axes; therefore S is of infinite order; the parallel movements, by themselves, compose the discrete subgroup T of infinite order, in which the direction and the stride of the movements are determined by the primitive lattice vectors. Meanwhile, the point group P is the set of the reminders of operations in S, taken modulo of the crystalline periodicity, i.e. with the parallel movements in T being nullified; it is a finite group and may include fractional translations, which are represented by linear combinations of fractions of primitive lattice vectors. C. Crystallographic group In the case of crystallographic group, the symmetry operation is the affine mapping, composed of the linear parts RT , including the reflection, rotation, and inversion, and the translation parts τT [28]. The definition is OT = {RT |τT } : r → RT · r + τT , (11) OT · OS = {RT · RS |τT + RT · τs }, (12) OT−1 = {RT−1 | − RT−1 · τT }. (13) The operation on the plane wave is OT exp(ikr) = exp(ik(RT−1 r − RT−1 τ )) = exp(i(RT · k)(r − τ )). (14) The affine mapping gives rise to the phase factor exp(−i(RT · k)τ )), which is not 20 unity at a general k-point. On the other hand, the matrix representation of the affine mapping is subject to the following relation: D(p,k) ({Rk |fRk + τn }) = e−ik·τn D(p,k) ({Rk |fR }) (15) The trace of the matrix D(p,k) is the character: therefore the phase-factors in the character and the wave-number part in the Bloch-type wavefunction (eikr in eikr uk (r) ) are canceled with each other as complex conjugates; in the general k-point, the phase shift in the character can actually be negligible in the projection operator.(Indeed there are textbooks or lectures omitting these terms.) However, if the Bloch-type P wavefunction is expressed by plane-wave expansion CG ei(k+G)r , one should be cautious. The phase shift in the periodic part is eiRk (G)τn , which remains without cancellation in the projection operation. D. Theoretical set-up for Wyckoff positions The mathematical definition of the Wyckoff positions is stated as follows. Let G be a space group, T be its translation lattice, K be its point group, tg be fractional translations. Each element in G has a form of {k|tk + t} for k ∈ K and t ∈ T , and acts on a vector v in V = Rn as {k|tk + y}(v) = k · v + tk + t. (16) The stabilizer of v ∈ V under this action is denoted as StabG (v)={g ∈ G|g(v) = v}. Let v ∈ V . An equivalence relations ∼ is set up if StabG (v) is conjugate to StabG (w),i.e. StabG (w)=StabG (g(v))=g StabG (w)g −1 for some g ∈ G. This equivalence classes of ∼ is called the Wyckoff positions of G. 21 This definition, given in the mathematicians’ terminology, is a little recondite for physicists. For a more intuitive understanding, it can be restated as: The Wyckoff positions are a set of coordinate points, composed from two subsets: [Type 1] The coordinate points which may be fixed by a certain symmetry operation of the point group. They are regarded as generators of the Wyckoff positions. [Type 2] The coordinate points generated from those in Type 1 subset by all of the symmetry operations. The command in GAP “WyckoffPositions(S)” returns the type 1 set for a space group S; the equivalent coordinate points to a generator “W” in type 1 set by the symmetry operations are computed from an another command “WyckoffOrbit(W)”. E. Units in the computation Throughout the computations of quantum physics in this article, we mainly use atomic units, abbreviated as a.u. if necessary; for the length, the Bohr radius(a0 u 5.292 × 10−11 m); for the energy, electron volt unit (eV) or the Hartree unit(Eh u 27.211eV). However, some computations adopt arbitrary unit in the energy. IV. APPLICATION 1: IDENTIFICATION OF WAVEFUNCTIONS TO IR- REDUCIBLE REPRESENTATIONS The application in this section is the classical example of group theory in quantum physics. 22 A. The simplest case: at Γ point In this section, the group-theoretical analysis of the wavefunction is exemplified. The wavefunctions at the Γ point in the diamond crystal are classified to corresponding irreducible representations. The treatment for the general k-point (k 6= 0) shall be discussed later.(The knowledge of the distinction between symmorphic or nonsymmorphic crystal is necessary; the existence of these two types of crystal makes the discussion not a little complicated.) At first, the character table should be computed. The symmetric operations in the diamond structure, whose unit cell is the minimal one, including two carbon atoms, are given in the appendix, as well as the multiplication table of these operations. When one uses the GAP packages, there are several options for the preparation of the point group; of which three types can be used. First: the symmetry operations are given as a set of the three-dimensional matrix. gap> MT[ 1]:=[[ 1, 0, 0],[ 0, 1, 0],[ 0, 0, 1]];; gap> MT[ 2]:=[[ 1, 0, 0],[ 0, -1, 0],[ 0, 0, -1]];; 0, 0],[ -1, .......................... gap> MT[ 48]:=[[ 0, 0, 1],[ 1, 0, 0]];; gap> G:=Group(MT); Second: the multiplication table in the group is supplied. gap> M:=[[1,2,3,...,48],[...],...,[...]];; gap> G:=GroupByMultiplicationTable(M); gap> Elements(G); [ m1, m2, m3, m4,............,m45, m46, m47, m48 ] In this case, the group elements are denoted by the symbolical way, m1,m2,...,m48. 23 Actually, all of the group elements are not necessarily provided to define a group: it is enough to give the smallest generating set, from which other elements are constructed. The group should be remade by means of the smallest generating set. (In the present implementation of GAP, especially when the multiplication table is supplied, the following tendency in the computation is observed: the computations for groups, constructed from the minimal generating set, are much quicker than those for groups where the all elements are stored as generators.) For the case of the diamond, the computation goes as: GS:=SmallGeneratingSet(G); [ m36, m48 ] G:=Group(GS); <group with 2 generators> The command “SmallGeneratingSet()” yields a reasonably small generating set. In the cases of finite solvable groups (a typical example of this is the crystal point group) and of finitely generated nilpotent groups, “MinimalGeneratingSet()” command is also available to get minimal generators, but the computation is timeconsuming. In addition, each element “elm” in the group “G“ can be expressed by generators, by means of Factorization(G,elm): gap> List(Elements(G),x->Factorization(G,x)); [ <identity ...>, x2^-1*x1*x2*x1, x2^2, (x2*x1)^2, x2^2*x1^2, x1*x2^2*x1, x1^2, x2^-1*x1^-1*x2^-1*x1, x1^-1*x2^-1*x1*x2, x2^-1*x1^2*x2, x2^-1*x1*x2*x1^-1, x1^-2, x2^-1*x1, x1^-1*x2^-1, x2*x1, x2*x1*x2^2, x2^2*x1*x2, x2*x1^-1, x1*x2, x2^-1*x1^-1, x1^-1*x2^-1*x1^2, x2^-1*x1^3, x2*x1*x2^2*x1^2, x2*x1^3, x1^3, x2^-1*x1^-1*x2^-1*x1^2, x2^2*x1^3, x1*x2^2*x1^2, x2^2*x1^-1, 24 x2*x1*x2, x1^-1, x2^-1*x1*x2, x1*x2^2, x2^2*x1, x2^-1*x1^-1*x2^-1, x1, x1^2*x2, x1*x2*x1^-1, x2*x1^-2, x1*x2^2*x1*x2, x2*x1*x2^2*x1, x2*x1^2, x1^-1*x2^-1*x1, x2^-1*x1^2, x1*x2*x1, x2^-1, x2*(x2*x1)^2, x2 ] Third: the crystallographic groups are defined by four-dimensional augmented matrices, in which both of the point group operations and the translations are inscribed. The notations for the augmented can be given in the following form   A v 0 1   (17) acting on column vectors (x, 1) from the right or, alternatively,   T A 0 v 1   (18) acting on low vectors (x, 1) from the left, which represent the affine mapping x → A · x + v.(Crystallographers prefer the later notation.) Once the crystallographic group is defined, the point group can easily be deduced. As for the diamond case, in the GAP computation, the crystallographic group is defined as follows. (The minimal generating set is used for simplicity.) gap> M1:=[[0,0,1,0],[1,0,0,0],[0,-1,0,0],[1/4,1/4,1/4,1]];; gap> M2:=[[0,0,-1,0],[0,-1,0,0],[1,0,0,0],[0,0,0,1]];; gap> S:=AffineCrystGroup([M1,M2]); <matrix group with 2 generators> gap> P:=PointGroup(S); Group([ [ [ 0, 0, 1 ], [ 1, 0, 0 ], [ 0, -1, 0 ] ], 25 [ [ 0, 0, -1 ], [ 0, -1, 0 ], [ 1, 0, 0 ] ] ]) By these preparations the conjugacy classes and the character table of the diamond crystal are computed as tables 3 and 4.(The group elements for the symmetry operation are given in a table in the appendix. The entries in the conjugacy classes are given by the numbering of the table of the group elements.) Class C.1 C.2 C.3 C.4 C.5 C.6 C.7 C.8 C.9 C.10 Group Elements 1 (The identity) 2,3,4 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 13 , 16 , 17 , 18 , 21 , 23 14 , 15 , 19 , 20 , 22 , 24 25 26 , 27 , 28 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 37 , 40 , 41 , 42 , 45 , 47 38 , 39 , 43 , 44 , 46 , 48 TABLE 3. Conjugacy classes of the point group in the diamond structure. The elements are indexed in the same way as the table of the symmetry operations. ) x.1 x.2 x.3 x.4 x.5 x.6 x.7 x.8 x.9 x.10 C.1 1 1 1 1 2 2 3 3 3 3 C.2 C.3 C.4 C.5 C.6 C.7 C.8 C.9 C.10 1 1 1 1 1 1 1 1 1 1 1 -1 -1 -1 -1 -1 1 1 1 1 -1 -1 1 1 1 -1 -1 1 1 1 1 -1 -1 -1 -1 -1 2 -1 0 0 -2 -2 1 0 0 2 -1 0 0 2 2 -1 0 0 -1 0 -1 1 -3 1 0 1 -1 -1 0 -1 1 3 -1 0 -1 1 -1 0 1 -1 -3 1 0 -1 1 -1 0 1 -1 3 -1 0 1 -1 TABLE 4. The character table of the basic diamond structure at Γ point. We can apportion the wavefunction at the Γ point to each irreducible representations by applying the projection operator. (It is enough to check whether the 26 numerical result of the projection remains almost as it is, or it nearly vanishes to zero.) The identification in the example of the diamond is given in table 5. In the numerical expansion coefficients of the wavefunctions, we can imagine the existence of a hidden mechanism, as is suggested by the succession of zeros, or the interchanges of specific values with the alteration of signs. The hierarchy and the symmetry in them can be unraveled and classified by the group theoretical analysis. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Ene. Rep. k1 0 -1 1 0 0 0 0 1 -1 -1 1 0 0 1 -1 k2 0 -1 1 -1 1 0 0 0 0 -1 1 -1 1 0 0 k3 0 -1 1 0 0 1 -1 0 0 0 0 -1 1 1 -1 kGk2 0 1.6243 1.6243 1.6243 1.6243 1.6243 1.6243 1.6243 1.6243 1.8756 1.8756 1.8756 1.8756 1.8756 1.8756 1 -0.9765 0.0742 0.0742 -0.0742 -0.0742 -0.0742 -0.0742 -0.0742 -0.0742 0 0 0 0 0 0 -2.1091 x.1 2 0 0.3519 0.3519 -0.1488 -0.1488 0.3159 0.3159 0.1848 0.1848 0.0285 0.0285 0.1325 0.1325 0.3968 0.3968 19.5799 x.10 3 0 -0.0007 -0.0007 0.1173 0.1173 0.301 0.301 -0.419 -0.419 -0.2391 -0.2391 0.3315 0.3315 -0.0935 -0.0935 19.5799 x.10 4 0 0.2934 0.2934 0.4172 0.4172 -0.1397 -0.1397 0.0159 0.0159 0.3432 0.3432 0.2199 0.2199 -0.0981 -0.0981 19.5799 x.10 5 0 -0.3562 0.3562 -0.0785 0.0785 0.084 -0.084 -0.5186 0.5186 0 0 0 0 0 0 25.1394 x.7 6 0 -0.1637 0.1637 0.5376 -0.5376 0.295 -0.295 0.0788 -0.0788 0 0 0 0 0 0 25.1394 x.7 7 0 -0.3913 0.3913 0.1078 -0.1078 -0.4612 0.4612 0.1777 -0.1777 0 0 0 0 0 0 25.1394 x.7 8 0 -0.3212 0.3212 -0.3212 0.3212 0.3212 -0.3212 0.3212 -0.3212 -0.1671 0.1671 -0.1671 0.1671 0.1671 -0.1671 33.1443 x.2 TABLE 5. The identification between the irreducible representation and the wavefunctions in diamond crystal at Γ point. Wavefunctions are expressed by coefficients (Ci , k1 , k2 , k3 ) in the plane wave expansion Ci exp(iGr); G = k1 G1 + k2 G2 + k3 G3 , where G1 , G2 , G3 are reciprocal vectors. The left columns (from the second to the fifth ) indicate (k1 , k2 , k3 , |G|2 ) and the remaining parts give the coefficients Ci . The energies and the irreducible representations are given in last two columns indicated by “Ene.” and “Rep.”, respectively. The carbon atoms are placed at ±(1/8 · a1 + 1/8 · a2 + 1/8 · a3 ) so that the coefficients of the wavefunctions in the plane wave expansion are real-valued. 27 B. Character table computation in super-cell It is a standard way to use the minimal unit cell. In the diamond structure, the minimal primitive cell is chosen to be the same as the face-centered one, in which two carbon atoms are located with the point-group G(I × O, C2 × S4 ). Meanwhile, one can choose the cubic unit cell; the volume of which is four times as large as the minimal cell, because the cubic cell is constructed from four of the simplest unit cell stuck together obliquely. The unit cell enlarged in a similar way, (if possible, in which extra atoms are embedded) is called super-cell. The point groups of the supercells are inevitably altered by the presence of extra fractional translations. The group theoretical computations for such super-cells will be difficult for bare human powers since the point group becomes larger and more complicated. Nevertheless, if one can use the computer algebra system, the character tables are easily computed. We should note that it is more advisable to compute characters of groups by ourselves if we can. Although the possible super-cells are infinite, the character tables available in textbooks and databases are limited, possibly only for the minimal unit cell. For the super-cell, actually, the point group of the minimal crystal can be extended by the semidirect product with a finite Abelian group, by which extra fractional translations in the enlarged cell are represented. (The construction of the semidirect product will be stated elsewhere in the following section of this article.) The easiest and straightest way for this is to remake the multiplication table. This can be done in the following way: first, apply possible fractional translations to group elements in symmetry operations of the minimal cell, so that all symmetry operations in the supercell are prepared in the following form: {E|τi }{Rj |σj }. 28 (19) By means of these new set of operations, we must construct the multiplication table in the super-cell: {Rj |σj + τi }{Rk |σk + τl } = {Rp |σp + τq }. (20) In the evaluation, we can make use of the multiplication table in the minimal cell: {Rj |σj }{Rk |σk } = {Rj · Rk |σj + Rj σk } ≡ {Rp |σp } (21) There is a relation: {Rj |σj + τi }{Rk |σk + τl } = {Rj · Rk |σj + τi + Rj σk + Rj τl } = {Rp |σp + τq }. (22) From the equations (21) and (22), it leads that τq ≡ σj + τi + Rj σk + Rj τl − σp (modulo translational vectors) (23) Using this τq , the extended multiplication table can be constructed with ease. The exemplary calculation for the diamond structure shall be executed in this section. The basic unit cell in the diamond structure is the face-centered one, including two atoms, The lattice vectors are defined as a1 = (0, 1/2, 1/2), a2 = (1/2, 0, 1/2), a3 = (1/2, 1/2, 0) (24) This basic unit cell could be extended four-fold, in which atomic coordinates are given by translations such as x → x + τi (i = 0, 1, 2, 3). The vectors τi are defined as: τ0 = (0, 0, 0), τ1 = (0, 1/2, 1/2), τ2 = (1/2, 0, 1/2), τ3 = (1/2, 1/2, 0) 29 (25) The extended unit cell is the cubic one, including eight atoms, to which the lattice vectors are defined as: a01 = (1, 0, 0), a02 = (0, 1, 0), a03 = (0, 0, 1) (26) Let F be the group composed of the four fractional translation vectors τi (i = 0, 1, 2, 3). And let T be the group of primitive lattice translations, composed of a01 , a02 , a03 and the zero vector. The factor group N(:=F/T) is a finite group, whose generators τ̂ are given by the projection of τi onto N. This factor group is the Klein four group, or Z2 ⊕ Z2 . The generators satisfy the following relations. 2 · τ̂i = τ̂0 (27) τ̂1 + τ̂2 + τ̂3 = τ̂0 The point-group G0 in the cubic unit cell is the semidirect product N o G, between the group of the fractional translations N and the point-group G in the basic unit cell. The new group includes 192 (= 48 × 4) elements. The textbooks or databases, however, only show the point group of the basic, minimal unit cells, but not those of the extended super-cells. In the latter cases, the point group is made of the semidirect product; one can compute its character tables by straightforwardly constructing the multiplication table, or, in a more complicated and elegant way, i.e. by making use of the induced representation of the group, when the group N is Abelian. The computation of the induced representation will be explained later. The group elements in the extended group are renumbered as follows: {E|τi }{Rj |sj } → (i × 48 + j)th element of the extended group 30 (28) The conjugacy classes and the character tables for the extended group are given in table 6 and 7. Class Group Elements Ĉ.1 [0,1] Ĉ.2 [0,2],[0,3],[0,4],[1,2],[2,3],[3,4] [0,5],[0,6],[0,7],[0,8],[0,9],[0,10],[0,11],[0,12], [1,5],[1,6],[1,7],[1,8],[1,9],[1,10],[1,11],[1,12], Ĉ.3 [2,5],[2,6],[2,7],[2,8],[2,9],[2,10],[2,11],[2,12], [3,5],[3,6],[3,7],[3,8],[3,9],[3,10],[3,11],[3,12] [0,13],[0,17],[0,21],[1,16],[1,17],[1,23], Ĉ.4 [2,16],[2,18],[2,21],[3,13],[3,18],[3,23] [0,14],[0,15],[0,19],[0,20],[0,22],[0,24], [1,14],[1,15],[1,19],[1,20],[1,22],[1,24], Ĉ.5 [2,14],[2,15],[2,19],[2,20],[2,22],[2,24], [3,14],[3,15],[3,19],[3,20],[3,22],[3,24] [0,16],[0,18],[0,23],[1,13],[1,18],[1,21], Ĉ.6 [2,13],[2,17],[2,23],[3,16],[3,17],[3,21] Ĉ.7 [0,25],[1,25],[2,25],[3,25] [0,26],[0,27],[0,28],[1,26],[1,27],[1,28], Ĉ.8 [2,26],[2,27],[2,28],[3,26],[3,27],[3,28] [0,29],[0,30],[0,31],[0,32],[0,33],[0,34],[0,35],[0,36], [1,29],[1,30],[1,31],[1,32],[1,33],[1,34],[1,35],[1,36], Ĉ.9 [2,29],[2,30],[2,31],[2,32],[2,33],[2,34],[2,35],[2,36], [3,29],[3,30],[3,31],[3,32],[3,33],[3,34],[3,35],[3,36] [0,37],[0,40],[0,41],[0,42],[0,45],[0,47], Ĉ.10 31 [1,41],[1,42],[2,45],[2,47],[3,37],[3,40] [0,38],[0,39],[0,43],[0,44],[0,46],[0,48], [1,38],[1,39],[1,43],[1,44],[1,46],[1,48], Ĉ.11 [2,38],[2,39],[2,43],[2,44],[2,46],[2,48], [3,38],[3,39],[3,43],[3,44],[3,46],[3,48] Ĉ.12 [1,1],[2,1],[3,1] Ĉ.13 [1,3],[1,4],[2,2],[2,4],[3,2],[3,3] [1,37],[1,40],[1,45],[1,47],[2,37],[2,40],[2,41],[2,42], Ĉ.14 [3,41],[3,42],[3,45],[3,47] TABLE 6: Conjugacy classes for the cubic diamond structure. The element {1|τj }{Ri |σi } is denoted as [j,i]. y.1 y.2 y.3 y.4 y.5 y.6 y.7 y.8 y.9 y.10 y.11 y.12 y.13 y.14 Ĉ.1 1 1 1 1 2 2 3 3 3 3 6 6 6 6 Ĉ.2 Ĉ.3 Ĉ.4 Ĉ.5 Ĉ.6 Ĉ.7 Ĉ.8 1 1 1 1 1 1 1 1 1 -1 -1 -1 -1 -1 1 1 -1 -1 -1 1 1 1 1 1 1 1 -1 -1 2 -1 0 0 0 -2 -2 2 -1 0 0 0 2 2 -1 0 -1 1 -1 -3 1 -1 0 -1 1 -1 3 -1 -1 0 1 -1 1 -3 1 -1 0 1 -1 1 3 -1 -2 0 -2 0 2 0 0 -2 0 2 0 -2 0 0 2 0 0 0 0 0 0 2 0 0 0 0 0 0 Ĉ.9 Ĉ.10 Ĉ.11 Ĉ.12 Ĉ.13 Ĉ.14 1 1 1 1 1 1 -1 1 1 1 1 1 1 -1 -1 1 1 -1 -1 -1 -1 1 1 -1 1 0 0 2 2 0 -1 0 0 2 2 0 0 1 -1 3 -1 1 0 -1 1 3 -1 -1 0 -1 1 3 -1 -1 0 1 -1 3 -1 1 0 0 0 -2 2 0 0 0 0 -2 2 0 0 -2 0 -2 -2 2 0 2 0 -2 -2 -2 TABLE 7. The character table of the cubic diamond unit cell at Γ point. The eight lowest eigenvalues in energy spectra in the minimal and cubic diamond cell are shown in table 8. There are two sets of threefold degeneracy in the former 32 case. On the other hand, in the latter, there is one sixfold degeneracy, which is attributable to the overlap of the spectra at the three X points in the Brillouin zone of the minimal unit cell. However, the character tables of the Γ point in the minimal diamond cell could not assign them in suitable representation; the character tables rebuilt for the cubic cell can do this. Minimal -2.11 19.58 19.58 19.58 25.14 25.14 25.14 33.14 Representation x.1 x.10 x.10 x.10 x.7 x.7 x.7 x.2 Cubic -2.11 6.74 6.74 6.74 6.74 6.74 6.74 13.03 Representation y.1 y.14 y.14 y.14 y.14 y.14 y.14 y.12 TABLE 8. The energy spectra at the Γ point in the minimal and cubic diamond unit cell (unit in eV). The assigned irreducible representations are also shown. V. APPLICATION 2: A SYSTEMATIC WAY OF THE MATERIAL DE- SIGNING A. How to manage quantum-dynamics in crystal? The group theoretical view will be able to bring about a systematic way of material design. In this section, although in the level of table-top exercise, a practicable form of material design is presented. In a nutshell, through the systematic reduction of the crystal symmetry, the band-structure could tactically be modulated; the degeneracy of the energy spectrum can be artificially split into different levels and the new energy-gap can be opened. Toward the systematic reduction of the crystal symmetry, the crystallographic concept, called Wyckoff positions, is utilized[28, 33]. This mathematical idea is not an abstract one, but actually computable by means of the computer algebra. 33 One should note this: the degeneracy of the energy spectrum is governed by the symmetry of the crystal. From the mathematical viewpoint, the point group of the crystal system is the manifestation of the symmetry; the subgroups of the point group describe the possible style with the reduced symmetry.(It is well known that a material has general tendency to reduce its own symmetry in order to release itself from the energetically unstable situation owing to the existence of the degeneracy of occupied energy levels.) By tracing the tree structure of the inclusion relations of the subgroup of the finite groups, one can enumerate every possibility of reduced symmetry. For each of reduced symmetries, one can compute group representations. The comparison of the character tables in the subgroups and the parent groups (by means of analyzing compatibility relations) one can rummage the possibility of the breaking-down of the energy spectrum degeneracy. The opening of the energy-gaps in the reduced symmetry will be speculated, sorted and classified with their group theoretical origins. This plan, therefore, will lead to a kind of systematic way of material design. It must be admitted that such a tactic still lacks in the sufficiently quantitative argument, since the only possible existence of energy-gap, together with their relationship with crystal symmetry reduction, is discussed. In order to evaluate the stability of the reduced structure or the actual possibility of its existence, one must employ massive first-principles computation. However, the group theoretical inspection has its own merit; it can be achieved by a light and quick computation, frugal in hardware usage; maybe simple computations in the level of elementary perturbation theory will do. Hence it can be applied to screening purposes for picking up candidates before serious massive first-principles computation. As an example, consider the crystallographic group of a cube, including following operations. • Three rotations along x, y, or z axes by 90 degrees. 34 FIG. 2. The paradigm of the crystal symmetry, or the subgroup lattice. • Exchange of x, y, and z axes ( Rotations along the diagonal in the cube by 120 degrees). • The inversion and reflections are omitted for simplicity. These rotations generate 24 operations in the cubic lattice to construct the point group. Using GAP, The relationship of the inclusion in subgroups (the lattice subgroup) can be inquired and visualized(Fig.2). The point group of the cubic lattice is located at the topmost node of the tree. We can trace the subgroups of lower symmetries in descending along the branches and finally arrive at the trivial group (the identity group), which is located at the root of the tree. This means that we can explore and predict the alternation of the band structure (viz, the splitting of the degenerated energy levels, or the opening of new band gaps) systematically, by consulting with the “paradigm” of the crystal symmetry. Now there arise following questions. Question 1. How to make up actual crystal structures in correspondence with the 35 subgroups of lower symmetries? Answer 1. The reduction of the symmetry may be occasioned, for example, by the presence of alien atoms, or the occurrence of point defects in the perfect crystal. The change in the electronic structure will be investigated by simple perturbation theory with sufficient accuracy. Question 2. In what positions alien atoms or point defects can be located? It is easy to cause the great change the symmetry, or, to abolish it completely. However, for the case with the small change in the symmetry, for example, that between neighboring connected entries in the subgroup lattice, can we set up favorable atomic dispositions? Answer 2. Choose an arbitrary point. Apply all of the operations of the subgroup in consideration to this coordinate. The number of the generated points is equal to the order of the subgroup. The set of these points is invariant with respect to the operation of the subgroup. By putting alien atoms or defects in this set of points, we can reduce the symmetry of the crystal, and, by continuing this way, descend through the subgroup lattice. Question 3. It is impossible for us to put alien atoms at arbitrary points in the crystal. With the view of the material design, a certain restriction should be imposed on the number of alien atoms. We would like to know the set of atomic sites, with a limitation in number, and invariant by the subgroup operation. Answer 3. Make use of the concept of the Wyckoff position. The mathematical definition is given in the appendix. In a familiar word of material sciences, the Wyckoff positions are the set of equivalent points in the unit cell, which are transformed among themselves by symmetry operations. In general, the total number of such points is the same as that of the symmetry operations (the 36 order of the point group). However, if the generating point of the Wyckoff position remains fixed by certain operations of the point group, the total number of Wyckoff positions will be fewer, which will be a factor of the order of the point group. In a mathematical word, it is equal to the order of some factor group. In GAP program, the Wyckoff position is easily computed from a “Cryst” package. In this example of the cubic lattice, the Wyckoff positions are classified as follows: • A discrete point (0,0,0). • A discrete point (1/2,1/2,1/2). • The centers of the edges of the cube:(1/2,0,0),(0,1/2,0),(0,0,1/2). • The centers of the faces:(1/2,1/2,0) (1/2,0,1/2),(0,1/2,1/2) • A segment (x,0,0) (0<x<1),invariant by 90-degrees rotation along the x axis. • A segment (0,y,0) (0<y<1), invariant by 90-degrees rotation along the y axis. • A segment (0,0,z) (0<z<1), invariant by 90-degrees rotation along the z axis. • A segment (x,1/2,1/2) (0<x<1),invariant by 90-degrees rotation along the x axis. • A segment (1/2,y,1/2) (0<y<1), invariant by 90-degrees rotation along the y axis. • A segment (1/2,1/2,z) (0<z<1), invariant 90-degrees rotation along the z axis. • A segment (t,t,t), invariant 120-degrees rotations which exchange three axes.(In a similar way, all of the diagonal lines of the cube belong to this type.) • Several segments (not discreet points), connected to the vertexes, the centers of the edges. 37 • Arbitrary points in the unit cell. In table 9, the Wyckoff positions of the group of full symmetry of the cubic cell and those of one of the subgroups are compared. These two groups have common generators of the Wyckoff positions. However, in some of them, the number of equivalent positions differs. By making use of such positions and stationing atoms in them, we can switch the crystal symmetry. For example, take the Wyckoff positions given in the 7-th low. They are in the orbit of the generating point (t, 0, 1/2). The group of No.11 and No.10 are isomorphic to the symmetric group S4 and the alternative group A4 respectively. In the full symmetry, given by the group of No.11, the orbit is composed of 12 points. On the other hand, in the reduced symmetry of the group No.10, these 12 points are split into two orbits, each of which includes 6 points. If atoms (say, of type W) are positioned in all of 12 points in the cubic lattice, the crystal symmetry remains unaltered as that of the group of No.11. However, if, in the half part of them, at the Wyckoff positions of the Group No.10, the atoms are replaced by those of type B, the crystal symmetry is reduced to the group of No.10. Those Wyckoff positions are illustrated in Fig. 3, where two split orbits are shown in B(black) and W(white) atoms. B. Control of band gaps by means of the Wyckoff positions In this section, the example of the material design discussed in the previous section is presented; in which ab-initio electronic structure calculations are executed, where the symmetry of the crystal is artificially altered and the band gaps are controlled. The exemplary calculation goes in the following way: in order to alter the crystal symmetry, certain coordinate points are chosen; and at these localities, we put impurities, which interact to electrons with short-ranged potentials; these impurities 38 +--------------+ | | | W | | | | B TOP B | | | | W | | | +--------------+--------------+--------------+--------------+ | | | | | | W | B | W | B | | | | | | | B LEFT B | W FRONT W | B RIGHT B | W REAR W | | | | | | | W | B | W | B | | | | | | +--------------+--------------+--------------+--------------+ | | | W | | | | B BOTTOM B | | | | W | | | +--------------+ FIG. 3. An illustration of split Wyckoff Orbit in the six faces of the cube. are assumed to be neutral; therefore they do not alter the net charge. The change in the symmetry of the crystal will be caused by the presence of impurities, the effects of which are expressed by model potentials with adjustable parameters. We use the following form of the scattering potential. It is given in the real space as 1 V (r) = C exp − 2 39  r rloc 2 ! . (29) Group NO.11 (#G=24) [0,0,0] [1/2,1/2,1/2] [0,1/2,1/2] [1/2,0,0] [t,0,0] [t,1/2,1/2] Size 1 1 3 3 6 6 [t,0,1/2] 12 [t,t,0] [t,t,1/2] [t,t,t] [t1,t2,t3] 12 12 8 24 Group NO.10 (#G=12) [0,0,0] [1/2,1/2,1/2] [0,1/2,1/2] [1/2,0,0] [t,0,0] [t,1/2,1/2] [0,t,1/2] [1/2,t,0] (Split in two) not existent not existent [t,t,t] [t1,t2,t3] Size 1 1 3 3 6 6 6 6 0 0 4 12 TABLE 9. The Wyckoff positions in the cubic lattice. The left three columns gives the generators and the right two show the number of equivalent points. The reciprocal space representation is   1 1 2 V (K) = Z exp − (rloc K) , Ω 2 (30) where Ω is the volume, required in the normalization of the plane wave √1Ω exp (iKr). p 3 and Z = C (2π)3 (rloc ). There are two parameters: Z is the strength of the potential and rloc is the effective range. A simple example is taken from diamond band structure. The coordinate of the carbon atoms are (0 · V1 + 0 · V3 + 0 · V3 ) (1/4 · V1 + 1/4 · V3 + 1/4 · V3 ). 40 (31) The lattice vectors are a a  V1 = , ,0 , 2 2  a a V2 = , 0, , 2 2 a a V3 = 0, , . 2 2 (32) In this structure, the lowest eight eigenvalues at Γ point are shown in table 10. There are two set of threefold degeneracy above and below the band gap, the energy Γ -2.11 19.58 19.58 19.58 25.14 25.14 25.14 33.14 Representation x.1 x.10 x.10 x.10 x.7 x.7 x.7 x.2 TABLE 10. The lowest eight eigenvalues at Γ point in the diamond structure (unit in eV). levels of which are at 19.58 eV and 25.14 eV. (The irreducible representations to them are x.10 and x.7 respectively, as given in the previous section.) The band gap (in exact terms, the degeneracy of the eigenvalues) is modified by the insertion of a single impurity in the crystal. Its position is chosen at (1/8 · V1 + 1/8 · V3 + 1/8 · V3 ). The point group of the genuine diamond structure ( of the order of 48) is reduced to its subgroup (of the order of 12.) The symmetry operations of the subgroup are shown in table 11. The character table of this subgroup is given in table 12. The rows S.1,..., S.6 show the character values of the subgroup, and the rows x.7 and x.10 shows those of the group of the full diamond symmetry (without impurity). In the rows of the table, there are two relations: x.7=S.2+S.5 and x.10=S.1+S.6; which are called matching relations.(In some mathematical context, they are referred as branching rules.) These relations indicate the threefold degeneracy in the energy levels in the full diamond symmetry split into two irreducible representations S.2 and S.5, or S.1 and S.6 with the presence of an impurity. The character values of the 41 TABLE 11. The symmetry operations with the presence of an impurity. The rows (from the second to the bottom ) show the rotation matrix R (R11, R12,..., R33) and the translation T (T1, T2, T3). 1 2 3 4 5 6 7 8 9 10 11 12 R11 R12 R13 R21 R22 R23 R31 R32 R33 T1 T2 T3 1 0 0 0 1 0 0 0 1 0 0 0 0 1 0 0 0 1 1 0 0 0 0 0 0 0 1 1 0 0 0 1 0 0 0 0 0 -1 0 -1 0 0 0 0 -1 1/4 1/4 1/4 -1 0 0 0 0 -1 0 -1 0 1/4 1/4 1/4 0 0 -1 0 -1 0 -1 0 0 1/4 1/4 1/4 -1 0 0 0 -1 0 0 0 -1 1/4 1/4 1/4 0 -1 0 0 0 -1 -1 0 0 1/4 1/4 1/4 0 0 -1 -1 0 0 0 -1 0 1/4 1/4 1/4 0 1 0 1 0 0 0 0 1 0 0 0 1 0 0 0 0 1 0 1 0 0 0 0 0 0 1 0 1 0 1 0 0 0 0 0 TABLE 12. The character table of the diamond structure with an impunity. The characters for each operation are shown here. S.1 S.2 S.3 S.4 S.5 S.6 x.7 x.10 1 1 1 1 1 2 2 3 3 2 1 1 1 1 -1 -1 0 0 3 1 1 1 1 -1 -1 0 0 4 1 -1 -1 1 0 0 -1 1 5 1 -1 -1 1 0 0 -1 1 6 1 -1 -1 1 0 0 -1 1 7 1 -1 1 -1 -2 2 -3 3 8 1 -1 1 -1 1 -1 0 0 9 1 -1 1 -1 1 -1 0 0 10 1 1 -1 -1 0 0 1 1 11 1 1 -1 -1 0 0 1 1 12 1 1 -1 -1 0 0 1 1 identity element, shown in the second columns from the left, are the degeneracy of the energy levels; so we can predict the threefold-degeneracy split into two different levels, viz. twofold and single levels. To inspect this, the actual computation is executed; where the impurity potential is set to be a weak Gaussian form. For example, set the parameters in Eq.30 as Z = −0.1a.u., rloc = 0.1a.u. The lowest eight eigenvalues are given in table 13. The 42 prediction by group theory is realized there. Γ -2.18 18.86 19.67 19.67 25.04 25.18 25.18 33.13 TABLE 13. The lowest eight eigenvalues at Γ point in the diamond structure with an impurity (unit in eV). In the practice of the artificial material design, for example, the following demand will arise: Demand: How to substantiate the situation, in which the band gap is altered, but the degeneracy of the energy levels is unaffected? Let us proceed with the example of the diamond. In the diamond structure, there are plural possible Wyckoff positions.(The computation can be done by GAP.) For example, chose the position of (1/8V1 +1/8V2 +1/8V3 ). By the symmetry operations, it is transformed into three other points such as: (5/8V1 + 1/8V2 + 1/8V3 ), (1/8V1 + 5/8V2 + 1/8V3 ), (1/8V1 + 1/8V2 + 5/8V3 ). If impurities are stationed at these four points, there is no change in the point group; thus the degeneracy of the energy spectrum remains unchanged. The computed energy spectrum is given in table 14, which guarantees the validity of the group theory. The band dispersions along Γ(0, 0, 0) − X(2π/a, 0, 0) are shown in Fig. 4, in which that of the basic diamond structure, and that with single impurity, and that with four impurities are compared. Γ -2.41 18.83 18.83 18.83 25.11 25.11 25.11 33.07 TABLE 14. The lowest eight eigenvalues at Γ point in the diamond structure with four impurities (unit in eV). There is a certain noteworthy point in these two cases (of the single impurity, and of the four impurities). In the former, the single impurity is located at(1/8V1 + 1/8V2 + 1/8V3 ); this point is one of the Wyckoff positions in the point group of the 43 crystal with the deteriorated symmetry; it remains fixed by any symmetry operation and not transformed into other positions; however, this point also belongs to the Wyckoff position of the perfect diamond crystal and there transformed to four points. We can interpret this circumstance as follows: the former example corresponds to a situation, where the only one of the four Wyckoff position in the latter case is chosen so that the symmetry of the crystal could be reduced. In a similar way, (but in a more general and liberal way, by inserting extra atoms or excavating vacancy site) we can reduce the crystal symmetry for the purpose of controlling the band structure; by doing this we can cleave into the degeneracy of the energy spectra and open extra energy gaps. C. A possible plan of material design in the super-cell Now we have seen that the band structure is controllable by the presence of impurities or defects, although the presented example is that of instructive purpose, and not realistic, as an only model case for the sake of illustrating a possible form of theoretical material design. The diamond structure is compressed in such a compact cell that the supernumerary atoms could not be actually stationed at arbitrary places, such as at Wyckoff positions. Meanwhile, in recent decades, crystalline materials which have a large unit cell such as In3 O2 have been put into practical use. At a glance, In3 O2 seems to have a huge complex structure. However, actually, it is a super-cell composed from the stacking of body-centered lattice of In-O, with oxygen vacancies. The band dispersion is almost free-electron-like; its behavior under the presence of doped Sn, viz. impurities in the cell, can be understood by the group theoretical view[34]. Furthermore, the modern material composing technologies, such as epitaxial growth, or micro atom-scale probes, may enable us to realize such microscopic disposition of atoms in the supercell structure, which will lead to 44 FIG. 4. The band dispersions in diamond structures altered by the presence of impurities, along Γ-L direction. The left figure is that without impurity: the center, with a single impurity: the right, with four impurities. an actual phase of material design. In the super-cell, there is a more broad freedom in the atomic arrangement, in which certain atoms could be replaced or removed so that the periodical arrangement of impurities or defects should be permitted. Now a principle of material design based on group theoretical view can be proposed. 45 1 Chose a certain crystal as a starting point: we may start from simple atomicand electronic- structures, such that we can execute the electronic structure computation easily, as the primitive module of the design. 2 Consider an enlarged cell, composed of the stacking of the minimal unit cell. (The crystal axes may be cut newly and a supercell should be created.) 3 We can determine the band structure and the band gap of the enlarged cell, simply by folding the band structure of the minimal cell.(The folding of the band structure is to re-distribute k-points of the old Brillouin zone to the new one in accordance with the new periodicity and to redraw the band dispersion by means of new k-points.) 4 Suppose a situation where the symmetry is reduced by the formation of the supercell with atomic displacements. Check the possibility of the opening of the extra band gaps (or the splitting of the degeneracy) at k-points with high symmetries, such as at Γ points and the boundary of the Brillouin zone. The group theoretical view, such as the character theory, the compatible relation, the subgroup lattices, or the Wyckoff positions, should be fully made use of. The change in the band structure may be quantitatively evaluated by simple perturbation theory. These sorts of trials-and-errors, by tracing the sequence of crystal symmetry, will help us to search crystal structures with more desirable band structure. VI. TECHNICAL DETAILS In the preceding sections of the article, the basics of the usage of computer algebra, concerning the computation of group theoretical properties, are explained and applied to the analysis of the wave-functions. Moreover, the possible scheme for 46 controlling band gaps, by means of tracing the sequence of subgroups, which corresponds to the reduction of crystal symmetry, is suggested through simple electronic structure computations. Meanwhile, in this part, the topics are rather promiscuous and technical, such as the computation of characters of the group of the supercell by means of “semi-direct product” which is an effective way to extend groups or the special treatment for non-symmorphic crystal, and so on. Moreover, “mathematical first principle” of crystal formation is demonstrated based on the cohomology theory, which shall explain to us how specific types of crystals, finite in number, can exist in accordance with the actions of certain point groups. The topics might arrive at somewhat higher mathematics, that may be not well-known to physicists. However, with the aid of computer algebra, one can conquer such hardships so that he might actually execute necessary computations. As for the fundamental knowledge of the group theory and its application, the reader should consult with standard references, such as Refs.[1–6] for the group theory, such as Refs.[7–9] for the representation theory, such as Refs.[10, 11] for the algorithm in the computer algebra. We make use of the computer algebra package GAP[12], as well as in the previous sections. A. Determination of crystal symmetry It is essential for us to determine the crystal symmetry in order to execute the group theoretical analysis. The symmetry operations which fix the crystal axes and atomic coordinates must be listed to construct the point group. The determination algorithm of the point group is composed of the following two stages. Stage 1. Determination of the point group of the lattice. Let A = (A1 , A2 , A3 ) be the lattice vectors. There are two large categories of the crystal system; the one of which is hexagonal, and the other 47 is cubic. In the former, rotations along the crystal axis by 60 degrees are allowed; in the latter, the rotations of this kind are composed of those by 90 degrees. The point group of arbitrary crystal system is given as a subgroup which is reduced from the full hexagonal or cubic symmetries. The full set of the symmetry operations (i.e. rotation matrices) for the hexagonal or cubic symmetry should be prepared, and from which admissible operations are extracted. For each operation R of the full symmetry group, compute the rotation of the lattice vectors: R · Ai (i = 1, 2, 3). (33) If the vector R · Ai protrudes out of the unit cell, it must be pulled back according to the crystal periodicity. Hereafter the pulling back of a vector x into the unit cell is denoted as P (x). For example, R · Ai = l · A1 + m · A2 + n · A3 for integers l, m, n, then exactly P (R · Ai ) = 0. Then store the operation R such as kP (R · Ai )k ≤  for all Ai (=1,2,3), with a threshold value  ( This is an attention needed only in the floating-point computation.) From the stored set of admissible operations {R}C , the point group of the crystal system is determined; in this stage, however, the symmetry preservation in the atomic positions is not yet checked. Stage 2. Determination of the point group of the crystal. The symmetry operations which fix atomic coordinates should be ex48 tracted now. The atom transformation table, the fractional translations associated to each rotation, and the multiplication table should be provided at the same time. Let X and Y be entries in the set of atomic positions {X}, and let T(X) and T(Y) be the corresponding type of atoms. For each R ∈ {R}L , and for each X ∈ {X}, compute R · X; and chose every Y ∈ {X} such as T(X) = T(Y). Now the vector τc = P (R · X − Y ) is a candidate for the fractional translation associated to R. If τc is the admissible fractional translation to R, the following conditions should be satisfied. Condition: for all X1 in the atomic coordinates, there exist a Y1 such that kτc − P (R · X1 − Y1 )k ≤ , and T (X1 ) = T (Y1 ). If this condition is satisfied, store R and τc as a symmetry operation {R|τc } in the point group of the crystal. This algorithm works well if the unit cell is minimal, in the sense that the fractional translation is uniquely determined; i.e. with respect to one symmetry operation of {R|t}, other operations, such as {E|s}{R|t} = {R|t + s}, do not coexist in the point group operations. If the unit cell is not minimal, in other words, if it is a supercell (the accumulation of the minimal unit cell), the existence of plural τ for one R cannot be negligible. The readers will be able to find and utilize subroutines or functions purposed for the identification of the crystal symmetry (possibly with more efficacy than the algorithm in this section)in the band calculation packages of one’s own. 49 B. Symmetry operations in the reciprocal space As for the plane wave, the symmetry operation in the real-space is given as {RT |τT } exp(ikr) = exp ik RT−1 r − RT−1 τT  = exp (i(RT · k) · (r − τT )) . (34) Consequently, it is more convenient to give operations with respect to reciprocal lattice vectors in the wave number space. If the wave-number-vector k is expressed as k1 · G1 + k2 · G2 + k3 · G3 , the rotation matrix for coefficients in the rotated vector RT · k is given as  0 R11 0 R12 0 R13   k  1       0 0  0  R21 R22 k2  . R23    0 0 0 k3 R31 R31 R33 (35) Thus the rotation matrix for the coefficients is computed from that in the Euclidean space as: R0 := (a1 , a2 , a3 )−1 RT (a1 , a2 , a3 ) T (36) where a1 , a2 , a3 are primitive lattice vectors. For the case of the face-centered unit cell, the gap computation is done as: gap> A:=[ [ 0, 1/2, 1/2 ], [ 1/2, 0, 1/2 ], [ 1/2, 1/2, 0 ] ];; gap> RM:=[ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ];; gap> TransposedMat(A^-1*TransposedMat(RM)*A); [ [ -1, 0, 0 ], [ -1, 0, 1 ], [ -1, 1, 0 ] ] The rotation matrices in the reciprocal space, as well as those in the real space, are given in the appendix for cubic and hexagonal symmetries. 50 C. The computation of the compatibility relation The irreducible representation of the diamond structure shows branching if the k-point moves from Γ point to non-zero k-point. The situation of the branching (the compatibility relation) can be checked by GAP. For this purpose, the computation goes as follows: • Compute the character table for the small group. Then, for each representation, evaluate the characters of elements in the small group, and store them in the lists S1 , S2 , ..., SN . (Let N be the number of the representations of the Small group.) • Compute character values of elements in the small group, using the irreducible representation at the Γ point, and store them in the lists G1 , G2 , ..., GM .(Let M be the number of the representations of the point group.) • If the j-th irreducible representation (G.j) branches into the composition of those in the small (S.i) as follows Gj = N X Cji × Si (37) i=1 the coefficients are computed by the inner product of the lists as Cji = Gj · Si / |#K| where |#K| is the order of the small group. For this purpose, this function can be used: GetCompati:=function(A,B) 51 (38) local repA,repB,AV,BV,CV; repA:=Irr(A); repB:=Irr(B); if ( false=IsSubgroup(A,B) ) then Print("A < B ; Inverse A and B."); return; fi; AV:=List(repA,y->List(Elements(B),x->x^y)); BV:=List(repB,y->List(Elements(B),x->x^y)); CV:=AV*TransposedMat(BV)/Size(B); return CV; end; This function computes the characters of the group elements in the group “B”, in two ways, those by the irreducible representation of group “A” and group “B”. The results are stored in two lists “AV” and “BV”. Each row of these lists contains the characters of each irreducible representation. By the computation of the inner product between these lists, the ramification of the representations is computed. Symmetry operations defined in wave-number space are used here. These matrices are three-dimensional ones given in Table 45.(They are stored in the list “MT[ ]” in the following computation.) The coordinate of the K point along Γ − X point is given, as the coefficients of reciprocal lattice vectors. gap> kx:=[0,1,1]; [ 0, 1, 1 ] The symmetry operations which fix the k-point are extracted, and from them, the small group is generated. gap> FL:=Filtered(MT,i->i*kx=kx); 52 [ [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ -1, 0, 0 ], [ -1, 0, 1 ], [ -1, 1, 0 ] ], [ [ 0, -1, 1 ], [ 0, 0, 1 ], [ -1, 0, 1 ] ], [ [ 0, 1, -1 ], [ -1, 1, 0 ], [ 0, 1, 0 ] ], [ [ 0, 1, -1 ], [ 0, 1, 0 ], [ -1, 1, 0 ] ], [ [ 0, -1, 1 ], [ -1, 0, 1 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 0, 1 ], [ 0, 1, 0 ] ], [ [ -1, 0, 0 ], [ -1, 1, 0 ], [ -1, 0, 1 ] ] ] We can directly construct the small group from the above list of the output. For the purpose of the comparison of the representations, however, the point group and the small group must be expressed by common abstract symbols such as “m1,m2,...”, which are employed to make up the multiplication table.(There is an alternative: the point group could be constructed from the 48 matrices of symmetry operations in wave-number space.) gap> FL:=List(FL,i->Position(MT,i)); [ 1, 2, 19, 20, 27, 28, 41, 42 ] gap> FL:=List(FL,i->Elements(G)[i]); [ m1, m2, m19, m20, m27, m28, m41, m42 ] gap> GS:=Group(FL); <group with 8 generators> The character table of the full point group GN is given as: gap> ConjugacyClasses(GN); [ m1^G, m2^G, m5^G, m13^G, m14^G, m25^G, m26^G, m29^G, m37^G, m38^G ] gap> Display(Irr(GN)); 53 [ [ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ], [ 1, 1, 1, -1, -1, -1, -1, -1, 1, 1 ], [ 1, 1, 1, -1, -1, 1, 1, 1, -1, -1 ], [ 1, 1, 1, 1, 1, -1, -1, -1, -1, -1 ], [ 2, 2, -1, 0, 0, -2, -2, 1, 0, 0 ], [ 2, 2, -1, 0, 0, 2, 2, -1, 0, 0 ], [ 3, -1, 0, -1, 1, -3, 1, 0, 1, -1 ], [ 3, -1, 0, -1, 1, 3, -1, 0, -1, 1 ], [ 3, -1, 0, 1, -1, -3, 1, 0, -1, 1 ], [ 3, -1, 0, 1, -1, 3, -1, 0, 1, -1 ] ] The character table of the small group is as follows: gap> List(ConjugacyClasses(GS),Elements); [ [ m1 ], [ m2 ], [ m19, m20 ], [ m27, m28 ], [ m41, m42 ] ] gap> Display(Irr(GS)); [ [ 1, 1, 1, 1, 1 ], [ 1, 1, -1, -1, 1 ], [ 1, 1, -1, 1, -1 ], [ 1, 1, 1, -1, -1 ], [ 2, -2, 0, 0, 0 ] ] The branching relations are computed now: gap> Display(GetCompati(GN,GS)); [ [ 1, 0, 0, 0, 0 ], [ 0, 1, 0, 0, 0 ], [ 0, 0, 1, 0, 0 ], [ 0, 0, 0, 1, 0 ], 54 [ 0, 1, 0, 1, 0 ], [ 1, 0, 1, 0, 0 ], [ 1, 0, 0, 0, 1 ], [ 0, 0, 0, 1, 1 ], [ 0, 0, 1, 0, 1 ], [ 0, 1, 0, 0, 1 ] ] This output list should be read as the indication of the following branching relation: POINT GROUP SMALL GROUP G.1 -> S.1 G.2 -> S.2 G.3 -> S.3 G.4 -> S.4 G.5 -> S.2 + S.4 G.6 -> S.1 + S.3 G.7 -> S.1 + S.5 G.8 -> S.4 + S.5 G.9 -> S.3 + S.5 G.10 -> S.2 + S.5 D. The character table at the boundary of the Brillouin zone 1. The necessity of the special treatment for the non-symmorphic crystal In general non-zero k-points, the wave-functions are apportioned to representations different to that of the Γ point. The new representations are deduced from subgroups of the point group; the subgroup admissible to each k-point must be 55 composed of operations which fix that k-point. The invariance on the k-point by symmetry operations should be kept up to the periodicity of the wave-space. Thus at the boundary of the Brillouin zone, different but equivalent k-points are mingled together in the representation. In general, it is sufficient to choose the subgroup which connects equivalent k-points and compute the representation in the same way as in Γ point. However, in special cases, this naive approach inevitably fails, owing to the existence of two different kinds of crystal structures, i.e. the distinction between the symmorphic and non-symmorphic ones. Let us review this troublesome situation. The matrix representation could be written as Dk ({α|τ }) = exp(−ik · τ )Γ(α). (39) Then the product is Dk ({α1 |τ1 })Dk ({α2 |τ2 }) = exp(−ik·(τ1 +τ2 ))Γ(α1 )Γ(α2 ) = exp(−ik·(τ1 +τ2 ))Γ(α1 α2 ). (40) The product should be equal to this: Dk ({α1 · α2 |α1 · τ2 + τ1 }) = exp(−ik · (α1 · τ2 + τ1 ))Γ(α1 α2 ). (41) These equations lead to the relation: exp(i(α1−1 · k − k) · τ2 ) = 1. (42) Certain conditions are required so that the above relation should be valid: 1 The k point is inside the Brillouin zone; α1−1 does not move k (i.e. α1 · k = k). 56 At the Γ point, this condition is always satisfied. 2 The k point is located at the boundary of the Brillouin zone: the vector α1 ·k−k may coincide with a certain reciprocal vector due to the periodicity on the wave space. The subgroups of the operations of these kinds are called small groups. In addition, the τ2 should be zero or a lattice translation vector in the real space. The crystal structure, in which the second condition always holds, is said to be symmorphic. In certain types of crystals, however, there exist affine mappings with non-zero τ2 , which are fractions of some lattice translational vectors. This type of the crystal is called non-symmorphic. Indeed, the diamond structure is nonsymmorphic one, as can be seen in the symmetry operations for this crystal. For the non-symmorphic case, therefore, the relation to be satisfied with respect to the product of the matrix representation does not hold at the boundary of the Brillouin zone. Thus it is necessary to employ special methods to treat this case. One of these treatments was proposed by Herring[32]. The intuitive interpretation of this method could be given in the following way. One should bear in mind these two points: First, at the Γ point, there is no problem in the representation even in the non-symmorphic case. Secondly, the k-point at the boundary of the Brillouin zone can be pulled back at the Γ point, if the unit cell is extended. For example, in a one-dimensional crystal with the lattice constant of a, the k-point k = π/a is at the boundary of the Brillouin zone. However, when the doubled unit cell (with the lattice constant 2a) is assumed, the k-point k = π/a agrees with the new primitive reciprocal lattice vector; hence it is equivalent to the Γ point. The irreducible representation at π/a in the small original cell can be deduced from that at the Γ point in the enlarged cell. Thus the difficulty in non-symmorphic representation can be eluded. We shall examine the actual computation of this method in the next section. 57 2. Herring Method: An example FIG. 5. Symmorphic and non-symmorphic one-dimensional crystals. Assume a double array of atoms, as in the Fig. 5. This figure shows two types of one-dimensional periodic lattice, consisted by double lines of atoms. In case I, two rows forms one dimensional periodic system of squares. In case II, the two lows are shifted by half of the lattice constants. The latter is of non-symmorphic type. The 58 symmetry operations which fix the k-point at k = π/a for the latter case is given as e = {E|0} (43) c = {C2 |0} A rotation by 180 degrees along the origin m = {σx |a/2} A reflection over x axis g = {σy |a/2} A reflection over y axis From the aforementioned reasons, the irreducible representation of this group is not the proper one to represent the small group at k = π/a. According to the Herring method, instead of this, a factor group G/I should be made use of, where G is a group of infinite order, composed of e0 = {E|2na}, (44) c0 = {C2 |2na}, m0 = {σx |a/2 + 2na}, g 0 = {σy |a/2 + 2na}, ē0 = {E|a + 2na}, c̄0 = {C2 |a + 2na}, m̄0 = {σx |3a/2 + 2na}, ḡ 0 = {σy |3a/2 + 2na}, and I is the normal subgroup composed of e0 = {E|2na}. (45) This factor group is the point group in the unit cell extended twofold in the x direction. By extending the unit cell, the k-points at the boundary of the original 59 Brillouin zone are pulled back at the Γ point in the new Brillouin zone. As the newly allotted Γ-point is the zero vector, the mathematical difficulty in the representation can be avoided. This situation should rather be interpreted as follows: the wavefunction at k = π/a has the periodicity of 2a, that is two times as large as the original lattice width. On the other hand, the wavefunction at k = 0 in the original Brillouin zone also matches into the periodicity of 2a.(Because originally it has periodicity of a) In the representation at the new Γ point, those in the old Γ point and the old boundary point are mingled with each other. These two different contributions, however, can be distinguishable. Let us check the character of the elements of following types {E|τ }, viz. of the simple fractional translations in the extended cell, in which the linear operation is the identity. With respect to the representation of the boundary of the Brillouin zone of the original smaller cell, the representation matrix should be represented as Dk=π/a ({E|a}) = exp(−i πa a)I d = −I d ; character of which is equal to −d ( d is the dimensionality of the representation). From Table 16 we can see the proper irreducible representation at k = π/a is given by Γ5 alone. e0 ē0 c0 c̄0 m0 m̄0 g0 ḡ 0 e0 e0 ē0 c0 c̄0 m0 m̄0 g0 ḡ 0 ē0 ē0 e0 c̄0 c0 m̄0 m0 ḡ 0 g0 c0 c0 c̄0 e0 ē0 g ḡ 0 m0 m̄0 c̄0 c̄0 c0 ē0 e0 ḡ 0 g0 m̄0 m0 m0 m0 m̄0 ḡ 0 g0 ē0 e0 c0 c̄0 m̄0 m̄0 m0 g0 ḡ 0 e0 ē0 c̄0 c0 g0 g0 ḡ 0 m̄0 m0 c̄0 c0 e0 ē0 ḡ 0 ḡ 0 g0 m0 m̄0 c0 c̄0 ē0 e0 TABLE 15. The Multiplication table of G/I. The first column and the top row show the representatives in G of the elements in G/I. The elements in the table are the products between the element a in the first column and the element b in the top row, a · b. The prediction by the character table can be verified. The electronic structure calculation is executed to the mismatched double allay of Na atoms: The two atoms 60 Γ1 Γ2 Γ3 Γ4 Γ5 e0 1 1 1 1 2 ē0 [c0 ,c̄0 ] [m0 ,m̄0 ] [g’, ḡ 0 ] 1 1 1 1 1 1 -1 -1 1 -1 1 -1 1 -1 -1 -1 -2 0 0 0 TABLE 16. The character table. The top row shows the elements in the conjugacy classes. The rows below shows the characters in the five irreducible representations. are placed at ±(1/4ax +1/8ay ) in the unit cell with ax = (a, 0, 0), ay = (0, 4a, 0), az = (0, 0, 5a) and a = 8.1au. This computation affirms that every pair of eigenvalues at the boundary of the Brillouin zone shows the double-fold degeneracy. k=0 -2.775 -2.124 -0.506 -0.479 0.139 0.753 0.780 1.054 k= π/a -0.717 -0.717 -0.072 -0.072 1.501 1.501 1.528 1.528 TABLE 17. Energy spectrum at k=0 and π/a in the mismatched double allay of Na atoms (unit in eV). The above example is a simple one-dimensional model. For a non-symmorphic three-dimensional crystal, the irreducible representation for the k-point at the boundary of the Brillouin zone can be computed in a similar way. For this purpose we should set up a supercell structure; its periodicity should be equal to that of the wavefunction at the boundary k-point in consideration; the symmetry operations to be taken into account of must be confined to ones which fix the boundary k-point up to the periodicity of the old Brillouin zone of the small cell. (To consider the full symmetry of the new super-cell may be superfluous); the irreducible representation at the Γ point in the supercell is the mixture of the wavefunctions at the Γ point and the k-point in consideration, but we can distinguish them by the comparison of the character of the pure fractional translation. The example of the three-dimensional case is the irreducible representation of diamond structure in the face-centered cell at X point 61 kX = [0, 2π/a, 0](= 1/2G2 + 1/2G3 ). The necessary super-cell is the cubic unit cell. We can check this: the primitive lattice vectors in the cubic cell is expressed by those in the face-centered cell as â1 = a1 + a2 − a3 , â2 = a1 − a2 + a3 and â3 = a1 + a2 − a3 ; so there are relations as â1 · kX = 0,â2 · kX = 0 and â1 · kX = 2π. These relations indicate that the wavefunction at kX in the face-centered cell fits itself into the cubic supercell, in the sense that the translations by the primitive lattice vector in the cubic cell causes no phase shift in the wavefunction. The symmetry operations for the small group at kX are constructed from those which fix kX (kX → kX ) and those which invert kX (kX → −kX ), due to the periodicity in the wave-number space. In contrast, the full symmetry operations in the cubic cell couples six wavefunctions at [±2π/a, 0, 0],[0, ±2π/a, 0],and [0, 0, ±2π/a]. As the wave-vector kX cannot be fixed, the corresponding irreducible representation for the full symmetry is not adequate for the small group at kX . (Elsewhere in this article, the point group of the full symmetry operations in the cubic unit cell is computed; from which the small group at kX can be derived as a subgroup.) E. The semidirect product and the induced representation In the previous section of this article, concerning the computation of the character tables for the supercell structures, we have to remake the multiplication table of the extended group by the presence of the fractional translation. However, if we make use of the mathematical idea of the semidirect product, we can treat such a problem more effectively. In this section, this concept is explained and the possible computation GAP is presented. The semidirect product A n G is obtained by extending a group G by an another group A in the following way. The elements in the new group are given as the 62 Cartesian product of each group: {(a, g); a ∈ A, g ∈ G}. (46) The multiplication is defined as (a1 , g1 ) · (a2 , g2 ) = (a1 g1 (a2 ), g1 g2 ), (47) in which the notation g1 (a2 ) means the automorphism in A acting on a2 , induced by g1 in G. The typical example of this is the affine mapping in crystallographic group. The definition is given as follows: OT = {RT |τT } : r → RT · r + τT (Affine mapping), (48) OT · OS = {RT · RS |τT + RT · τS }. (49) If the group A is Abelian, the representation of the semidirect product is given by χV (a, g) = 1 |Gx | X x(h(a))χU (hgh−1 ). (50) h∈G;hgh−1 ∈Gx Here Gx is the set of elements in G, such that the character x in A is fixed by the automorphism induced by elements in Gx . All of the irreducible representations of the semidirect product are exhausted by this formula through possible combinations of the character x in A and the irreducible representation χU of Gx .(For the theoretical background, consult references of pure mathematics[8, 35].) One of the simplest example is C3v = Group((1, 2, 3), (1, 2)) ≡ S3 . One can check the validity of this formula, taking C3 = Group((1, 2, 3)) as A and I = Group((1, 2)) 63 as G. Let us follow this computation. The character tables of those three groups are given as [()] [(1,2),(2,3),(3,1)] [(1,2,3),(1,3,2)] χ1 1 1 1 χ2 1 -1 1 χ3 2 0 1 TABLE 18. The character table of C3v . [eA =()] [aA =(1,2,3)] [a−1 A =(1,3,2)] x1 1 1 1 1 ω ω2 x2 2 x3 1 ω ω TABLE 19. The character table of C3 , where ω = exp(2π/3). y1 y2 [eG =()] [gG =(1,2)] 1 1 1 -1 TABLE 20. The character table of I. The automorphism on A by G is defined as: eG (eA ) = eA , eG (aA ) = aA , −1 eG (a−1 A ) = aA , gG (eA ) = eA , gG (aA ) = a−1 A , gG (a−1 A ) = aA . 64 (51) As a trivial case, take x1 . Since Gx1 = G, y1 can be chosen as χU . Since G is Abelian, i.e. hgh−1 = g, the formula is χV (a, g) = = 1 |Gx1 | 1 2 X x1 (h(a))y1 (hgh−1 ) (52) h∈G;hgh−1 ∈G X h∈G;hgh−1 ∈Gy1 1 x1 (h(a))y1 (g) = (1 + 1) = 1, 2 for all elements in the semidirect product. Again take x1 . Since Gx1 = G,y2 can also be chosen as χU . The formula is χV (a, g) = 1 2 X x1 (h(a))y2 (hgh−1 ). (53) h∈G;hgh(−1) ∈Gx1 It gives 1 χV (eA , eG ) = (1 + 1) = 1, 2 (54) 1 χV (aA , eG ) = χV (a−1 A , eG ) = (1 + 1) = 1, 2 1 χV (eA , gG ) = (−1 − 1) = −1, 2 1 χV (aA , gG ) = χV (a−1 A , gG ) = (−1 − 1) = −1. 2 Take x2 . Since Gx2 = hIdi (the trivial group of the identity), it must be χU = 1. The formula is χV (a, g) = X x2 (h(a))χU (hgh−1 ) h∈G;hgh−1 ∈G = x2 X x2 (h(a)) · 1. h∈G;hgh−1 ∈G 65 x2 (55) It gives χV (eA , eG ) = (1 + 1) = 2, (56) 2 χV (aA , eG ) = χV (a−1 A , eG ) = (ω + ω ) = −1, χV (eA , gG ) = 0, χV (aA , gG ) = χV (a−1 A , gG ) = 0. The last two characters are zero, since for any h, hgh−1 = g ∈ / hIdi, no terms are summed up. (N.B. When we take x1 , it seems plausible that we could also choose Gx1 = hIdi.Then the formula is X χV (a, g) = x1 (h(a))χU (hgh−1 ) h∈G;hgh−1 ∈G x1 X = (57) x1 (h(a)) · 1. h∈G;hgh−1 ∈<Id> It gives χV (eA , eG ) = 2, (58) χV (aA , eG ) = χV (a−1 A , eG ) = 2, χV (eA , gG ) = 0, χV (aA , gG ) = χV (a−1 A , gG ) = 0. However, this result is not irreducible. It is essential to use the maximal set of Gx .) There are other combinations of characters including x3 of C3v . However, they only produce the redundant results. The aforementioned computations are tedious and complicated; a naive imple66 mentation by means of GAP programming language could be given as in appendix G. In GAP, the semidirect product can be constructed by a built-in function. gap> A=Group((1,2,3)); Alt( [ 1 .. 3 ] ) gap> G=Group((1,2)); Sym( [ 1 .. 2 ] ) The automorphism in A is evaluated as follows: gap> au:=AutomorphismGroup(A); <group of size 2 with 1 generators> gap> auE:=Elements(au); [ [ (1,2,3) ] -> [ (1,2,3) ], [ (1,2,3) ] -> [ (1,3,2) ] ] gap> gens:=GeneratorsOfGroup(G); [ (1,2) ] The automorphism induced by G is defined as follows: (The generator (1,2) in G causes the automorphism in A as (1,2,3)->(1,3,2). Indeed (1,2,3)*(1,3,2)=1: this is the inversion.) gap> hom:=GroupHomomorphismByImages(G,au,gens,[auE[2]]); [ (1,2) ] -> [ [ (1,2,3) ] -> [ (1,3,2) ] ] gap> p:=SemidirectProduct(G,hom,A); Group([ (3,4,5), (1,2)(4,5) ]) gap> Irr(p); [ Character( CharacterTable( Group([ (3,4,5), (1,2)(4,5) ]) ), [ 1, 1, 1 ] ), Character( CharacterTable( Group([ (3,4,5), (1,2) (4,5) ]) ), [ 1, 1, -1 ] ), Character( CharacterTable( Group([ (3, 4,5), (1,2)(4,5) ]) ), [ 2, -1, 0 ] ) ] 67 F. The computation of the character table in the cubic diamond by GAP In this section, the character table in the cubic diamond structure is computed by GAP command for the semidirect product. The point group G of the basic diamond structure is extended by the Abelian group of fractional translations N. The point group G is given in the table in the appendix of this article, as the set of 48 three-dimensional matrices.(Although in the table accompanying fractional transformations are listed, the point group G is constructed solely from three-dimensional rotation matrices; the fractional translations are omitted in the point group construction; they are included in the Abelian group N.) The group N is the factor group F/T, where generators of F are τ1 := (1/4, 1/4, 1/4), τ2 := (1/4, −1/4, −1/4), τ3 := (−1/4, −1/4, 1/4) (59) and those of T are (1, 0, 0), (0, 1, 0), (0, 0, 1). (60) Using these generators, the group A and T are given as the vector space (or module) over integers. For the convenience, the group F/T can be expressed as another factor group A/B, where A := Group((1, 2, 3, 4), (5, 6, 7, 8), (9, 10, 11, 12)); (61) and B : = Group((1, 2, 3, 4)∧ 2 ∗ (5, 6, 7, 8)∧ 2, (5, 6, 7, 8)∧ 2 ∗ (9, 10, 11, 12)∧ 2, (62) (9, 10, 11, 12)∧ 2 ∗ (1, 2, 3, 4)∧ 2) ( : = Group((1, 3)(2, 4)(5, 7)(6, 8), (5, 7)(6, 8)(9, 11)(10, 12), (1, 3)(2, 4)(9, 11)(10, 12)); 68 This definition corresponds to the relations of the fractional translations in F/I; 4 ∗ τ̄i := (0, 0, 0) [Identity] (63) 2 ∗ (τ̄1 + τ̄2 ) = 2 ∗ (τ̄2 + τ̄3 ) = 2 ∗ (τ̄3 + τ̄1 ) ≡ (0, 0, 0) [Identity] (64) and The gap computation goes as follows: gap> A:=Group((1,2,3,4),(5,6,7,8),(9,10,11,12)); Group([ (1,2,3,4), (5,6,7,8), (9,10,11,12) ]) gap> B:=Group((1,2,3,4)^2*(5,6,7,8)^2,(5,6,7,8)^2*(9,10,11,12)^2, (9,10,11,12)^2*(1,2,3,4)^2); Group([ (1,3)(2,4)(5,7)(6,8), (5,7)(6,8)(9,11)(10,12), (1,3)(2,4) (9,11)(10,12) ]) gap> N:=FactorGroup(A,B); Group([ f1, f2, f3, f4 ]) gap> NaturalHomomorphismByNormalSubgroup(A,B); [ (1,2,3,4), (5,6,7,8), (9,10,11,12) ] -> [ f3, f2, f1 ] The last command returns the homomorphism from A to another group whose kernel is B: in other words, gives the mapping of A onto A/B. The tree generators (1,2,3,4),(5,6,7,8),(9,10,11,12) in A are mapped to f3,f2,f1 in A/B. gap> N.1; f1 gap> N.2; f2 gap> N.3; 69 f3 gap> N.4; f4 There is a newcomer f4; we must identify it. For this purpose, it is enough to compute the multiplication table of for generators. gap> NV:=[N.1,N.2,N.3,N.4]; [ f1, f2, f3, f4 ] gap> TransposedMat([NV])*[NV]; [ [ f4, f1*f2, f1*f3, f1*f4 ], [ f1*f2, f4, f2*f3, f2*f4 ], [ f1*f3, f2*f3, f4, f3*f4 ], [ f1*f4, f2*f4, f3*f4, <identity> of ... ] ] We can see the relation f1*f1=f2*f2=f3*f3=f4, which means that the element f4 corresponds to elements (1,2,3,4)^2, (5,6,7,8)^2, (9,10,11,12)^2, viz. the fractional transformation (1/2,1/2,1/2). The size of the fractional group is given as gap> Size(C); 16 Concerning this, the volume of the parallelepiped spanned by τi is gap> AbsoluteValue(Determinant(A)); 1/16 Thus, in the unit cubic cell, the translations by τi generates 16 discrete points, the number of which is equal to the order of F/I. 70 It is sufficient to define the automorphisms in N induced by G only for the generators of G: the candidates of which are two matrices, those of No.36 and No.48 in the list of symmetry operations.  0 0 1   0 0 −1       M36 :=  1 0 0  , M48 :=  0 −1 0    0 −1 0 1 0 0      Let us check the operations of these two matrices on τi . gap> A:=[[1,1,1],[-1,-1,1],[-1,1,-1]]/4; [ [ 1/4, 1/4, 1/4 ], [ -1/4, -1/4, 1/4 ], [ -1/4, 1/4, -1/4 ] ] gap> A:=TransposedMat(A); [ [ 1/4, -1/4, -1/4 ], [ 1/4, -1/4, 1/4 ], [ 1/4, 1/4, -1/4 ] ] gap> M36:=[[0,0,1],[1,0,0],[0,-1,0]]; [ [ 0, 0, 1 ], [ 1, 0, 0 ], [ 0, -1, 0 ] ] gap> M48:=[[0,0,-1],[0,-1,0],[1,0,0]]; [ [ 0, 0, -1 ], [ 0, -1, 0 ], [ 1, 0, 0 ] ] The generators are set to be the transposed forms of above matrices. gap> TM36:=TransposedMat(M36); [ [ 0, 1, 0 ], [ 0, 0, -1 ], [ 1, 0, 0 ] ] gap> TM48:=TransposedMat(M48); [ [ 0, 0, 1 ], [ 0, -1, 0 ], [ -1, 0, 0 ] ] gap> (A*TM36*A^-1); [ [ 0, -1, 0 ], [ 0, 0, -1 ], [ -1, 0, 0 ] ] gap> (A*TM48*A^-1); [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ -1, -1, -1 ] ] 71 (65) The last two computations (such as A · M · A−1 ) give the transformations on the row vectors (τi ) in A. The operations by M36 and M48 are given as: M 36 · τ1 = −τ2 (66) M 36 · τ2 = −τ3 M 36 · τ3 = −τ1 M 48 · τ1 = τ2 M 48 · τ2 = τ3 M 48 · τ3 = −τ1 − τ2 − τ3 Remark. In the definition of GAP, the semidirect product of a group N with a group G (acting on N via a homomorphism α from G into the automorphism group of N) is α the Cartesian product G × N with the multiplication (g, n)·(h, m) = (gh, nh m), since in GAP all groups act from the right. On the other hand, the familiar style for the physicists is {G|n} · {H|m} = {G · H|n + G ∗ m}, as in the crystallography; the point group acts from the left. However, these two different definitions are equivalent. This is based on this: the crystallography, the symmetry operation {M |t} is represented by an augmented matrix, which can take two forms. The one is the matrix of the form [ M 0 ] [ t 1 ] acting from the right on row vectors (x, 1). The another is [ M t ] [ 0 1 ] acting from the left on column vectors (x, 1). These two definitions are convertible by 72 transposition and one should interpret the GAP computations by the former definition. The generators used here, (M36, M48), should be replaced with their transposed forms. We can identify τi to three permutations: τ1 := (9, 10, 11, 12) ≡ f1 (67) τ2 := (5, 6, 7, 8) ≡ f2 τ3 := (1, 2, 3, 4) ≡ f3 Other identifications will do. But we use the identification consistent with the result of the “NaturalHomomorphismByNormalSubgroup” command. It suffices that the automorphism in N induced by G is defined at generators of groups. gap> gens:=GeneratorsOfGroup(N);; gap> CC1:=[gens[2]^-1,gens[3]^-1,gens[1]^-1,gens[4]];; gap> CC2:=[gens[2],gens[3],(gens[1]*gens[2]*gens[3])^-1,gens[4]];; gap> hom1:=GroupHomomorphismByImages(N,N,gens,CC1);; gap> hom2:=GroupHomomorphismByImages(N,N,gens,CC2);; The command “GroupHomomorphismByImage(G, H, gens, imgs)” defines a homomorphism from the group G to the group H through the mapping of the list “gens” of the generators of G to the list “imgs” of the images in H. If the definition of the mapping is irrelevant, the program returns a “fail” message. gap> CC3:=[gens[3]^-1,gens[1]*gens[3]^-1,gens[2]*gens[3]^-1];; gap> hom3:=GroupHomomorphismByImages(N,N,[gens[1],gens[2],gens[3]],CC3); fail 73 Let G be the point group of the minimal unit cell, generated from the matrices TM36 and TM48. By those preparations, we can make the semidirect product GnN . gap> au:=AutomorphismGroup(N);; gap> G:=Group(TM36,TM48);; gap> GTON:=GroupHomomorphismByImages(G,au,GeneratorsOfGroup(G),[hom1,hom2]);; gap> GPN:=SemidirectProduct(G,GTON,N);; gap> irrep:=Irr(SemidirectProduct(G,GTON,N));; Once the semidirect product G n N is computed, the representation of the point group in the cubic diamond can be deduced from a suitable subgroup of this. For this purpose let us see the embedding of G and N into the semidirect product. The command “Embedding” creates the embedding from G and N into the semidirect product, and the command “Projection” creates the projection from the semidirect product to G. gap> embd1:=Embedding(GPN,1); CompositionMapping( [ f1, f2, f3, f4, f5 ] -> [ f1, f2, f3, f4, f5 ], CompositionMapping( Pcgs([ (5,8)(6,7), (1,2)(3,5,7,4,6,8), (3,7,6)(4,8,5), (1,6)(2,5)(3,7)(4,8), (1,3)(2,4)(5,8)(6,7) ]) -> [ f1, f2, f3, f4, f5 ], <action isomorphism> ) ) gap> embd2:=Embedding(GPN,2); [ f1, f2, f3, f4 ] -> [ f6, f7, f8, f9 ] gap> GeneratorsOfGroup(G); [ [ [ 0, 1, 0 ], [ 0, 0, -1 ], [ 1, 0, 0 ] ], [ [ 0, 0, 1 ], [ 0, -1, 0 ], [ -1, 0, 0 ] ] ] gap> List(GeneratorsOfGroup(G),g->Image(embd1,g)); [ f2, f1*f3*f5 ] gap> GeneratorsOfGroup(N); 74 [ f1, f2, f3, f4 ] gap> List(GeneratorsOfGroup(N),g->Image(embd2,g)); [ f6, f7, f8, f9 ] gap> Projection(GPN); [ f1, f2, f3, f4, f5, f6, f7, f8, f9 ] -> [ [ [ 1, 0, 0 ], [ 0, 0, 1 ], [ 0, 1, 0 ] ], [ [ 0, 1, 0 ], [ 0, 0, -1 ], [ 1, 0, 0 ] ], [ [ 0, 0, -1 ], [ -1, 0, 0 ], [ 0, 1, 0 ] ], [ [ -1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, -1 ] ], [ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ] ] The correspondence of the generators is given in table21. Elements in G and N Elements in G n N TM36(in G) f2 TM48(in G) f1*f3*f5 f1(in N) (The image of (9,10,11,12)) f6 f2(in N) (The image of (5,6,7,8)) f7 f3(in N) (The image of (1,2,3,4)) f8 f4(in N) (The image of (1,3)(2,4) or (5,7)(6,8) or (1,3)(2,4)) f9 TABLE 21. The correspondence of the generators in groups G, N and G n N . The generators of the point group of the cubic diamond structure are these elements: {m36|τi } {m48|0} 75 (68) (τi can be any of three alternatives. The addition of pure fractional translations {E|τi } is superfluous in this case.) The corresponding subgroup can be constructed in this way: Subgroup(GPN,[GPN.2*GPN.6,GPN.1*GPN.3*GPN.5]) or Subgroup(GPN,[GPN.2*GPN.7,GPN.1*GPN.3*GPN.5]) or Subgroup(GPN,[GPN.2*GPN.8,GPN.1*GPN.3*GPN.5]) These three definitions generate the same group so that any choice can be used. (They are the subgroups of GPN, generated by the elements in the square brackets of the second argument.) G. 1. Crystal lattice and Cohomology A brief introduction to group cohomology In the modern style, the crystal group can be described by the theory of the cohomology, which is actually computable by the computer algebra. At first, we construct the one-cohomology. Let K ∈ GL(n, Z) and define V := Rn /Zn . The one-cocycle is defined as Z 1 (K, V ) := {ρ; k → V |ρ(1) = 0, ρ(gh) = ρ(g) + gρ(h) for all g, h ∈ K}. (69) The one-coboundary is defined as B 1 (K, V ) := {ρ ∈ Z 1 (K, V |ρ(g) = gv − v for some v ∈ V }. 76 (70) The one-cohomology is defined as their quotient: H 1 (K, V ) := Z 1 (K, V )/B 1 (K, V ) (71) We can see the vector system in the space group, which satisfies the condition τ (gh) ≡ τ (g) + g · τ (h) mod Zn (mod lattice translations) (72) is a kind of cocycle. Furthermore, the one-coboundary is interpreted as the shift of origin; we can observe this from the conjugation operation: {1|s}−1 {g|t}{1|s} = {g|(gs − s) + t} (73) Thus, the vector system could be understood in the context of one-cohomology. The above definition of the one-cohomology is derived from the general theory of group cohomology. Let G be a finite group and M be a module. Let C n (G, M ) be the set functions from Gn = (g1 , g2 , . . . , gn ) to M . The differential (dn : C n (G, M ) → C n+1 (G, M ) is defined as dn (f )(g0 , g1 , . . . , gn ) = g0 · f (g1 , . . . , gn ) n X + (−1)j f (g0 , . . . , gj−2 , gj−1 gj , gj+1 , . . . , gn ) (74) j +(−1)n+1 f (g0 , g1 , . . . , gn−1 ). It satisfies dn ◦ dn−1 = 0. (75) The n-cocycle Z i (G, M ) is defined as Ker(dn ), and the n-coboundary is as Im(dn−1 ). The n-th cohomology group is defined as H i (G, M ) := Z i (G, M )/B i (G, M ). 77 2. The possible fractional translations with one point group We make use of following matrices (as explained elsewhere in this article) in order to define the crystallographic group in the diamond crystal lattice: gap>M1:=[[0,0,1,1/4],[1,0,0,1/4],[0,-1,0,1/4],[0,0,0,1]]; gap>M2:=[[0,0,-1,0],[0,-1,0,0],[1,0,0,0],[0,0,0,1]]; gap>S:=AffineCrystGroupOnLeft([M1,M2]); gap>P:=PointGroup(S); In this definition, the fractional translation is given a priori. With regard to this, there is a question: what is the possible fractional translation compatible to the point group of the diamond crystal? Is it uniquely determined? Let us inspect this problem. For example, take the face-centered lattice. For simplicity in the following computation, the symmetry operations are represented by the “lattice axes coordinate”, by means of the vector system of the primitive lattice vectors. For this new coordinate, the new point group Q is made from the group P by the conjugation of the generators. (The symbol ^ is used for the conjugation in GAP.) gap> A:=[[0,1/2,1/2],[1/2,0,1/2],[1/2,1/2,0]]; gap> Q:=P^A; gap> Q.1;Q.2; [ [ -1, 0, 0 ], [ 0, 0, -1 ], [ 1, 1, 1 ] ] [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ -1, -1, -1 ] ] The generators of the space groups are defined now by means of unknown variables.(For the heuristic purpose, we venture to employ generators different to the first definition.) a:=Indeterminate(Rationals,1); 78 b:=Indeterminate(Rationals,2); c:=Indeterminate(Rationals,3); N1:=[[-1,0,0,0],[0,0,-1,0],[1,1,1,0],[0,0,0,1]]; N2:=[[0,1,0,a],[0,0,1,b],[-1,-1,-1,c],[0,0,0,1]]; Let us consider multiplications of two elements gi and gj in the point group, which yields the identity. If gi and gj are represented by the products of the generators, the multiplication gives a relation of the generators both in the point group and in the space group. For example, take (Q.2*Q.1)^4=I. This relation is lifted up to the space group as (N2*N1)^4≡ {I|T }, where T is a translation. The linear part of (N2*N1)^4 is the identity matrix; and the translation part [2*a+2*b,2*a+2*b,-2*a-2*b] must be one of translation vectors. In general, the translation part in the relation of the generators in the space group gives three linear equations with respect to unknown variables “a”,“b”, and “c”. These equations should be equivalent to zero, modulo translation vectors; viz. they should be integer-valued. The relations in generators in Q shall be set up now. For this purpose, each elements in the group and its inverse are represented by generators respectively, so that the product of them gives the relation in generators which yields the unity. In the following, the symbols x1 and x2 indicate the two generators of the group Q. For simplicity, the trivial relation only representing the unity ( returned as <identity ...> in the GAP result) is eliminated in the list. gap> MQ:=Elements(Q);; gap> rel:=List(MQ,i->Factorization(Q,i)*Factorization(Q,i^-1));; gap> IDENTITY:=Factorization(Q,One(Q));; gap> rel:=Filtered(rel,i->i<>IDENTITY); [ (x2^-1*x1*x2*x1)^2, x1*(x2*x1^-1)^2*x1^-1, (x2*x1^2)^2, (x2^-1*x1)^2, x1*x2^2*x1*x2^-1*x1*x2*x1^-1, x1^6, 79 (x2*x1*x2^2)^2, (x2^2*x1*x2)^2, (x2*x1*x2^2*x1^2)^2, (x2^-1*x1)^2, (x1*x2^2*x1^2)^2, x2^4, x2*x1^3*x2^-1*x1^3, x1*x2^4*x1^-1, x1^-1*(x2^-1*x1)^2*x1, x2^-1*x1*x2^3*x1, (x2^2*x1^3)^2, (x2*x1^-1)^2, x2^4, x2^-1*x1^-1*(x2^-1*x1)^2*x1*x2, (x1*x2*x1)^2, (x2^-1*x1)^2, x1^-1*x2^-1*x1*x2^3*x1^2, x2^-1*x1*x2^3*x1, x1^-1*(x2^-1*x1)^2*x1, x2^2*x1*x2^-1*x1*x2, (x2*x1)^4, (x1^2*x2)^2, (x2*(x2*x1)^2)^2, (x2*x1*x2^2*x1)^2, (x1*x2^2*x1*x2)^2, x2^-1*x1^3*x2*x1^3, x2^2*x1*x2^-1*x1*x2, (x2*x1^-1)^2, (x2^-1*x1^-1*x2^-1*x1^2)^2 ] The relations of the point group generators are lifted to the space group. The matrix relations are stored in the list “relMat”; and the fractional translations are taken out in the list “relv”. Now, if the fractional translation [a,b,c] is admissible, the list “relv” must be integer-valued by the substitutions to the indeterminates. (Apropos of this, we can use symbols of unknowns as “a”,“b”,“c” for the input, whereas the GAP results are represented by “x_1”,“x_2”,“x_3”. Be careful not to confuse indeterminates and generators of the group.) The GAP program cannot invert the symbolically represented matrices N1 and N2, so we must prepare the inverses for them (N1I and N2I) by the power products. N1I:=N1^5; N2I:=N2^3; relMat:=[ (N2I^1*N1*N2*N1)^2, N1*(N2*N1I^1)^2*N1I^1, (N2*N1^2)^2, (N2I^1*N1)^2, N1*N2^2*N1*N2I^1*N1*N2*N1I^1, N1^6, (N2*N1*N2^2)^2, (N2^2*N1*N2)^2, (N2*N1*N2^2*N1^2)^2, (N2I^1*N1)^2, (N1*N2^2*N1^2)^2, N2^4, N2*N1^3*N2I^1*N1^3, N1*N2^4*N1I^1, N1I^1*(N2I^1*N1)^2*N1, N2I^1*N1*N2^3*N1, 80 (N2^2*N1^3)^2, (N2*N1I^1)^2, N2^4, N2I^1*N1I^1*(N2I^1*N1)^2*N1*N2, (N1*N2*N1)^2, (N2I^1*N1)^2, N1I^1*N2I^1*N1*N2^3*N1^2, N2I^1*N1*N2^3*N1, N1I^1*(N2I^1*N1)^2*N1, N2^2*N1*N2I^1*N1*N2, (N2*N1)^4, (N1^2*N2)^2, (N2*(N2*N1)^2)^2, (N2*N1*N2^2*N1)^2, (N1*N2^2*N1*N2)^2, N2I^1*N1^3*N2*N1^3, N2^2*N1*N2I^1*N1*N2, (N2*N1I^1)^2, (N2I^1*N1I^1*N2I^1*N1^2)^2 ]; relv:=List(relMat,i->[i[1][4],i[2][4],i[3][4]]); [ [ 2*x_1+x_2+x_3, -2*x_1-x_2-x_3, -2*x_1-x_2-x_3 ], [ -2*x_1-x_2-x_3, 0, 2*x_1+x_2+x_3 ], [ -x_2-x_3, 2*x_2, 2*x_3 ], [ 2*x_1+x_2+x_3, -2*x_1-x_2-x_3, 0 ], [ 0, 2*x_1+x_2+x_3, 0 ], [ 0, 0, 0 ], [ 0, 0, 2*x_1+x_2+x_3 ], [ 0, 2*x_1+x_2+x_3, -2*x_1-x_2-x_3 ], [ 0, 2*x_1+4*x_2+2*x_3, 0 ], [ 2*x_1+x_2+x_3, -2*x_1-x_2-x_3, 0 ], [ -2*x_1-2*x_2, 2*x_1+2*x_2, 2*x_2+2*x_3 ], [ 0, 0, 0 ], [ 2*x_1, 2*x_2, 2*x_3 ], [ 0, 0, 0 ], [ -2*x_1-x_2-x_3, 0, 2*x_1+x_2+x_3 ], [ 2*x_1+x_2+x_3, -2*x_1-x_2-x_3, 0 ], [ 2*x_1+2*x_2, 2*x_2+2*x_3, -2*x_1-2*x_2 ], [ 2*x_1+x_2+x_3, 0, 0 ], [ 0, 0, 0 ], [ 0, -2*x_1-x_2-x_3, 0 ], [ x_2+x_3, -2*x_3, x_2+x_3 ], [ 2*x_1+x_2+x_3, -2*x_1-x_2-x_3, 0 ] , [ -2*x_1-x_2-x_3, 0, 2*x_1+x_2+x_3 ], [ 2*x_1+x_2+x_3, -2*x_1-x_2-x_3, 0 ], [ -2*x_1-x_2-x_3, 0, 2*x_1+x_2+x_3 ], [ 0, 2*x_1+x_2+x_3, -2*x_1-x_2-x_3 ], [ 2*x_1+2*x_2, 2*x_1+2*x_2, -2*x_1-2*x_2 ], [ -x_2-x_3, -x_2-x_3, 2*x_2 ], 81 [ 4*x_1+4*x_2+2*x_3, -x_2-x_3, -4*x_1-2*x_2 ], [ 4*x_1+2*x_2, x_2+x_3, x_2+x_3 ], [ -4*x_1-4*x_2-2*x_3, 4*x_1+2*x_2, x_2+x_3 ], [ 2*x_1+2*x_2+2*x_3, -2*x_1, -2*x_2 ], [ 0, 2*x_1+x_2+x_3, -2*x_1-x_2-x_3 ], [ 2*x_1+x_2+x_3, 0, 0 ], [ 2*x_2+2*x_3, -2*x_1-2*x_3, 2*x_1+2*x_3 ] ] Since there are duplicates in the linear equations of the fractional translation, the unique ones should be extracted by gap> Unique(Flat(relv*a^0)); [ 2*x_1+x_2+x_3, -2*x_1-x_2-x_3, 0, -x_2-x_3, 2*x_2, 2*x_3, 2*x_1+4*x_2+2*x_3, -2*x_1-2*x_2, 2*x_1+2*x_2, 2*x_2+2*x_3, 2*x_1, x_2+x_3, -2*x_3, 4*x_1+4*x_2+2*x_3, -4*x_1-2*x_2, 4*x_1+2*x_2, -4*x_1-4*x_2-2*x_3, 2*x_1+2*x_2+2*x_3, -2*x_1, -2*x_2, -2*x_1-2*x_3, 2*x_1+2*x_3 ] It is necessary to use an input such as “relv*a^0”, so that all entries in the list should be polynomials, for the convenience of sorting, by dint of the fact a^0 is the unity as a polynomial. Now we have following four equations to be integer-valued: x_2+x_3 2*x_1 2*x_2 2*x_3 In Q/Z, there are four representatives of the fractional translations, as are given below, with the primitive lattice vectors accompanied to them. (The translation vectors are computed by the substitution in the list “relv”, from which the basis vectors are extracted by the GAP built-in command “BaseIntMat(mat)”.) 82 Fractional translation [ 0, 1/2, 1/2 ] [ [ 1, [ [ 1, [ 1/2, 0, 0 ] [ 1/2, 1/2, 1/2 ] [ [ 1, Translation vectors 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ] 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ] 1, 1 ], [ 0, 2, 0 ], [ 0, 0, 2 ] ] TABLE 22. The fractional translations and the translation vectors. To inspect the validity, by means of GAP built-in command, the possible space groups with a given point group can be computed. In order to check the computed fractional translations, it is enough to see the generators of the space group and the primitive translation vectors. gap> SS:=SpaceGroupsByPointGroupOnLeft(Q);; gap> Display(List(SS,GeneratorsOfGroup)); [ [ [ [ -1, 0, 0, 0 ], [ 0, 0, -1, 0 ], [ 1, 1, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ -1, -1, -1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 1 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 1 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 1 ], [ 0, 0, 0, 1 ] ] ], [ [ [ -1, 0, 0, 0 ], [ 0, 0, -1, 0 ], [ 1, 1, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 0, 1, 0, 0 ], [ 0, 0, 1, 1/2 ], [ -1, -1, -1, 1/2 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 1 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 1 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 1 ], [ 0, 0, 0, 1 ] ] ], [ [ [ -1, 0, 0, 0 ], [ 0, 0, -1, 0 ], [ 1, 1, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 0, 1, 0, 1/2 ], [ 0, 0, 1, 0 ], [ -1, -1, -1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 1 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 1 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 1 ], [ 0, 0, 0, 1 ] ] ], [ [ [ -1, 0, 0, 0 ], [ 0, 0, -1, 0 ], [ 1, 1, 1, 0 ], [ 0, 0, 0, 1 ] ], 83 [ [ 0, 1, 0, 1/2 ], [ 0, 0, 1, 1/2 ], [ -1, -1, -1, 1/2 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 1 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 1 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 1 ], [ 0, 0, 0, 1 ] ] ] ] gap> Display(List(SS,TranslationBasis)); [ [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ] ] There are four space groups with the point group Q. The last three of the GAP result is the same fractional translation in Table 22. However, their translational vectors are different: the latter has larger translational vectors. This is because the GAP computation implicitly includes the primitive translations of the unit cube in generators of the space groups. Readers may question about the relationship between the fractional translation computed now and those of the definition of the space group given in the first part of this section. The generators defined earlier are rewritten in the lattice axes coordinate as: gap> MM1:=[[-1,0,0,1/4],[0,0,-1,1/4],[1,1,1,1/4],[0,0,0,1]]; gap> MM2:=[[0,1,0,0],[0,0,1,0],[-1,-1,-1,0],[0,0,0,1]]; gap> S2:=AffineCrystGroupOnLeft([MM1,MM2]); We can apply the shift of the origin to this space group by means of the conjugation {E| − s}{R|t}{E|s} = {R|t + (R − I) · s}. If the matrix R − I is normal, we can annihilate the fractional translation. Let us apply such a conjugation to the generators. (The command M^T is the abbreviation of the conjugation T−1 · M · T.) 84 gap> T:=[[1,0,0,1/8],[0,1,0,-3/8],[0,0,1,5/8],[0,0,0,1]]; gap> MM1^T; [ [ -1, 0, 0, 0 ], [ 0, 0, -1, 0 ], [ 1, 1, 1, 0 ], [ 0, 0, 0, 1 ] ] gap> MM2^T; [ [ 0, 1, 0, -1/2 ], [ 0, 0, 1, 1 ], [ -1, -1, -1, -1 ], [ 0, 0, 0, 1 ] ] Thus we can see that the shift of the origin generates the space group, which is equivalent to that composed by matrices N1 and N2 with [a,b,c]=[ -1/2, 1, -1 ]∼ =[1/2,0,0]. Incidentally, let us generate other representation of generators: N1:=[[-1,0,0,a],[0,0,-1,b],[1,1,1,c],[0,0,0,1]]; N2:=[[0,1,0,0],[0,0,1,0],[-1,-1,-1,0],[0,0,0,1]]; The linear equations for the fractional translation are given as [ 0, 4*x_3, -2*x_2-2*x_3, -2*x_2+2*x_3, -x_2+x_3, x_2-x_3, 2*x_2+2*x_3, -4*x_1-4*x_2-4*x_3, -2*x_1-2*x_3, -2*x_1+2*x_3, -2*x_1-4*x_2-2*x_3, -2*x_1-2*x_2, -2*x_1-2*x_2-4*x_3, -2*x_1-x_2-x_3, -2*x_1+2*x_2, 2*x_1-2*x_3, 2*x_1+2*x_3, 2*x_1-2*x_2, 2*x_1+x_2+x_3, 2*x_1+2*x_2+4*x_3, 2*x_1+4*x_2+2*x_3, 4*x_1+4*x_2+4*x_3 ] From them, seven possible vectors of [a,b,c] (=[x_1,x_2,x_3]) are obtained as [ 0, 1/2, 1/2 ], [ 1/4, 1/4, 1/4 ], [ 1/4, 3/4, 3/4 ], [ 1/2, 0, 0 ], [ 1/2, 1/2, 1/2 ], [ 3/4, 1/4, 1/4 ], [ 3/4, 3/4, 3/4 ] ] We can see one of the fractional translations is [1/4,1/4,1/4]. Whereas the GAP computation goes as 85 gap> Q2:=Group(Q.1,Q.2); Group([ [ [ -1, 0, 0 ], [ 0, 0, -1 ], [ 1, 1, 1 ] ], [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ -1, -1, -1 ] ] ]) gap> Q2=Q; true gap> SS2:=SpaceGroupsByPointGroupOnLeft(Q2); [ <matrix group with 5 generators>, <matrix group with 5 generators> , <matrix group with 5 generators>, <matrix group with 5 generators> ] gap> List(SS2,GeneratorsOfGroup); [ [ [ [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ -1, -1, -1, 0 ], [ 0, 0, 0, 1 ] ], [ [ -1, 0, 0, 0 ], [ 0, 0, -1, 0 ], [ 1, 1, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 1 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 1 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 1 ], [ 0, 0, 0, 1 ] ] ], [ [ [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ -1, -1, -1, 0 ], [ 0, 0, 0, 1 ] ], [ [ -1, 0, 0, 0 ], [ 0, 0, -1, 1/2 ], [ 1, 1, 1, 1/2 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 1 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 1 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 1 ], [ 0, 0, 0, 1 ] ] ], [ [ [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ -1, -1, -1, 0 ], [ 0, 0, 0, 1 ] ], [ [ -1, 0, 0, 1/4 ], [ 0, 0, -1, 1/4 ], [ 1, 1, 1, 1/4 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 1 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 1 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 1 ], [ 0, 0, 0, 1 ] ] ], [ [ [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ -1, -1, -1, 0 ], [ 0, 0, 0, 1 ] ], [ [ -1, 0, 0, 1/4 ], [ 0, 0, -1, 3/4 ], [ 1, 1, 1, 3/4 ], [ 0, 0, 0, 1 ] ], 86 [ [ 1, 0, 0, 1 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 1 ], [ 0, 0, 1, 0 ], [ 0, 0, 0, 1 ] ], [ [ 1, 0, 0, 0 ], [ 0, 1, 0, 0 ], [ 0, 0, 1, 1 ], [ 0, 0, 0, 1 ] ] ] ] Four space groups are generated by GAP: non-zero fractional translations are three in number: [ 0, 1/2, 1/2 ], [ 1/4, 1/4, 1/4 ], [ 1/4, 3/4, 3/4 ] Apparently the GAP result is lacking in some of fractional translations computed just before by means of linear equations. The GAP result should rather be interpreted as the basis vectors for the possible fractional translations. The other possible fractional translations can be generated from this basis set. It is well to remind readers of the point that the setting up of the admissible fractional translations (which is called “vector system” in the mathematical context) is nothing other than the computation of the one-cohomology. In the above example, the fractional translation in the generator N1 is chosen to be zero from the outset. It is possible to assume the non-zero translation in N1. However, a shift of the origin can cancel a nonzero fractional translation as we have seen. The shift of the origin could be caused by the conjugation, which corresponds to the choice of the representative of the elements in the map of the one-cohomology. 3. Group extension The space group of the crystal is determined by the following short exact sequence (or the group extension): π 1→K→E→ − G→1 (76) with the condition that there exists a normal subgroup of N in E which is isomorphic to K and that E/K is isomorphic to G. The group E is called an extension of G by K. 87 The equivalence classes of extension of E are computed by a concept of the cohomological algebra, i.e. two-cohomology (denoted as H 2 (G, K) = Z 2 (G, K)/B 2 (G, K)). In order to understand this concept, however, one should get acquainted with the language of commutative algebra, especially concerning homological algebra, which would necessitate long explanation. Thus if the reader would get interested in these topics, he should try advanced mathematical textbooks. However, the viewpoint of cohomological algebra might be useful in material designing, especially in studying the algebraic aspects of crystallography. For example, the Bravais lattice in two- or three-dimensional crystals can be classified by two-cohomology. Remark. The construction of the two-cohomology is briefly stated here. For every g ∈ G there are elements eg ∈ E with π(eg ) = g. However eg is not unique: another element e0g behaves similarly, if e0g (eg )−1 ∈ ker(π) = K. Now we define a map ϕg : k → eg ke−1 g , as an automorphism in K. The two-cocycle is defined by f (g, h) = eg eh e−1 gh . For each g, let us give an element kg ∈ K (as a homomorphism k(∗) from G to K). Then the two-coboundary is defined as −1 b(g, h) = kg ϕg (kh )kgh . (It will be represented as k(g) + g · k(h) − k(gh) when K is a module.) Then we have f (g, h)f (gh, k) = ϕg (f (h, k))f (g, hk) and for another choice (e0g = kg eg ), f 0 (g, h) = e0g e0h (e0gh )−1 = b(h, g)f (g, h). 88 In two-cohomology f (∗, ∗) and f 0 (∗, ∗) represent the same class. The elements of E is uniquely written in the form aeg for some a ∈ K and g ∈ G. The product is given as (aeg )(beh ) = aϕg (b)f (g, h)egh , which is the usual semidrect product when f (g, h) = 1 for all g, h. 2 2 For simplicity, consider the two-dimensional case. hx, y|x2 =   Let P =   y = (xy) = 1i, −1 0 1 0  and My =  . The action which acts on T = Z2 through Mx =  0 1 0 −1   1 −1 x y y   and on T is written as {x e1 = e−1 1 , e2 = e2 , e1 = e1 , e2 = e2 }. (e1 = 0   0 e2 =  . 1 Let us extend this group, and, if possible, let us construct space groups which have this group as their point groups. (This example is taken from the lecture notes of Webb[36]. For theoretical details, consult with that article and references therein.) There is a general procedure (Zassenhauss algorithm) to compute two-cohomology, which is based on the following theorem. Theorem 1. Let P be a finite group given by the representation P = hx1 , x2 , ..., xd |r1 , r2 , ..., rt i . Let n be the dimension of the space, and T be a module. From the relators ri , a matrix Λ ∈ Mnt,nd (Z) is computed, and the elements Λij are defined as ri − 1 = d X Λij (xj − 1) (i = 1, ..., t). j=1 89 Then the two-cohomology is given by H 2 (P, T ) ∼ = {x ∈ (RT )d |Λ · x ∈ T t }/(Ker Λ + T d ). (77) This definition says that the representative elements in two-cohomology are given as (v1 , · · · , vd ) , the concatenation of the vectors in RT n , (from which the component in Ker Λ + T d should be factored out), so as to be   v  1  ..  Λ  .  ∈ T t.   vd (78) The integer matrix Λ can be converted into its Smith normal form                  b1                b2 .. . bl 0 .. . (79) 0 with bi 6= 0, dividing bj for i < j. (A matrix A ∈ Mm,n (Z) can be converted into the diagonal form as this, by means matrix operation P · A · Q with P ∈ GL(m, Z) and Q ∈ GL(n, Z).) Then H 2 (P, T ) ∼ = Z/b1 Z ⊕ · · · ⊕ Z/bl Z. Now the relators in P are lifted in the 90 extension of P by T as    r1     r2    = Λ · v (∀v ∈ H 2 (P, T )).  ..   .    rt (80) The vector systems are given as {xi |vi } (i = 1, ..., d) in the crystallography. Remark. This algorithm is a refined style of the computation of one-cohomology given in the previous section. The relation such as xyxy = 1( in G) is lifted to exyxy = 1E , as the relation in E. The latter is rewritten by two-cocycles 1E = exyxy = f (x, yxy)−1 ϕx (f (y, xy)−1 )ϕx (ϕy (f (x, y)−1 ))ex ey ex ey It is furthermore rewritten as ex ey ex ey = ϕx (ϕy (f (x, y)))ϕx (f (y, xy))f (x, yxy). The right side of this equation lies in K. The formula of Λ̂(xy)2 in the algorithm represents the translational part in ex ey ex ey by means of those of ex and ey , and it must be in K(= T ). To find a v such as Λ · v ∈ T is to fix a representative of cocycle f (∗, ∗) in two-cohomology. 91 In the aforesaid question, the matrix Λ is computed as   2 2  Λx ,x Λx ,y  Λ =  Λy2 ,x Λy2 ,y  Λ(xy)2 ,x Λ(xy)2 ,y 0 0 0 0  0   x + 1 0    0     = 0 y+1 =    0  xy + 1 xyx + x  0       2 0 0   0 2 0   0 0 0   0 0 0  (81) 0 0 0 0 From this, it can be concluded that H 2 (P, T ) = Z/2Z⊕Z/2Z. The homomorphism representing the two-cohomology, which determines the extension of the group, is generated from these vectors:       0 0                       1e 1/2   0  0 2  2 ,  =    , 1  0   1/2      0 e 1      2       0 0 (82) The linear combination of them (with integer coefficients, of 0 or 1 ) admits four possible mappings. The  in the extension E are obtained from the entries in  relators 2  Λ̂x    Λ(c1 · e1 + c2 · e2 ) =  Λ̂y2 . They are listed as: They generate four different   Λ̂(xy)2 Λ̂x2 Λ̂y2 Λ̂(xy)2 type 1 type 2 type 3 type 4 0 · e1 + 0 · e2 0 · e1 + 1 · e2 0 · e1 + 0 · e2 0 · e1 + 1 · e2 0 · e1 + 0 · e2 0 · e1 + 0 · e2 1 · e1 + 0 · e2 1 · e1 + 1 · e2 0 · e1 + 0 · e2 0 · e1 + 0 · e2 0 · e1 + 0 · e2 0 · e1 + 0 · e2 TABLE 23. Four possible types of relators in the extensions. 92 extensions in table 24. The extensions of type 2 and type 3 are isomorphic, since they are converted with each other by interchanging x and y, and e1 and e2 . type type type type −1 x y y 1 x, y, e1 , e2 |x2 = y 2 = (xy)2 = [e1 , e2 ] = 1, x e1 = e−1 1 , e2 = e2 , e1 = e1 , e2 = e2 −1 x 2 2 2 x y y 2 x, y, e1 , e2 |x = e2 , y = (xy) = [e1 , e2 ] = 1, e1 = e1 , e2 = e2 , e1 = e1 , e2 = e−1 2 −1 x y y , e = e , e = e , e = e 3 x, y, e1 , e2 |y 2 = e1 , x2 = (xy)2 = [e1 , e2 ] = 1, x e1 = e−1 2 2 1 1 2 1 2 −1 4 x, y, e1 , e2 |x2 = e2 , y 2 = e1 , (xy)2 = [e1 , e2 ] = 1, x e1 = e1 , x e2 = e2 , y e1 = e1 , y e2 = e−1 2 TABLE 24. Four types of the extension. e1 and e2 should be assumed to be translations {E|e1 } and {E|e2 }, rather than vectors. We can see the relators of the extensions provide the relations which determine the vector system in the non-symmorphic crystal, with the point group P .(To obtain the vector system, it is enough to re-express x,y as the augmented matrix forms of the space groups, with indeterminate fractional translations. The e1 and e2 are also represented by matrices as translations. The equivalence relations in the entries of the matrix products in the group multiplications will give the vector systems, as was demonstrated elsewhere in this article. In that demonstration, the vector system was also derived from cohomological algebra, not from two-cohomology, but from one-cohomology.) From this simple example, we can observe some importance of homological algebra, which provides us the criterion of the existence of the nonsymmorphic crystal, in accordance with the non-triviality of two-cohomology. On the other hand, if the two-cohomology is trivial, or of zero-mapping, the extension of the group simply becomes a semidirect product, which is always a symmorphic crystal. In this case of zero two-cohomology, the exact sequence splits, in the sense that there is a homomorphism s : G → H such as π ◦ s = idG . It can be proved that an extension (or, the short exact sequence as above) is split if and only if the group H is the semidirect product of N and G. (We should remember this: elsewhere in this article, the point group of the non-symmorphic crystal is constructed by means of the semidirect product. In that computation, the point group of the non-symmorphic 93 crystal is not directly obtained as a semidirect product but extracted as one of its subgroups. So there is no contradiction against the above statement.) Now the relationship is established among the symmorphic properties of crystals, the splitting extension of a group, and the two-cohomology, as is shown in the table below. type type type type 1 {Mx |0}, {My |0}, {E|e1 }, {E|e2 } 2 {Mx | 12 e2 }, {My |0}, {E|e1 }, {E|e2 } 3 {Mx |0}, {My | 21 e1 }, {E|e1 }, {E|e2 } 4 {Mx | 12 e2 }, {My | 21 e1 }, {E|e1 }, {E|e2 } TABLE 25. The generators of the four types of the space groups classified by the twocohomology. In getting through this section, two necessary points for the computations in GAP are given. The first is how to derive the relators, or the finite representation: the second is the computation of the Smith Normal form. (The two-cohomology can be computed by GAP built-in command, for the case of a finite group G and a module M , over a finite field. Because of this assumption, the GAP built-in command is not applicable to the above example, in which the module M is Zn .) A definition is now needed: a group G is polycyclic if there is a series of subgroups G = C1 > C2 > · · · > Cn > Cn+1 = 1, where Ci+1 is normal in Ci and Ci /Ci+1 is a cyclic group. The generators of G is given by a sequence G := (g1 , . . . , gn ) such that Ci = hCi+1 , gi i. As a finite solvable group, the point group of the crystal is polycyclic, which is composed from the polycyclic generating system.(The point group of the crystal is always solvable, by means of a famous theorem of Burnside, which relates the order of the group to the solvability.) We have defined the point groups by means of matrix generators, or 94 the multiplication table. These groups can be converted into isomorphic polycyclic groups, and then, polycyclic groups are converted into finitely presented groups with relators. The conversion goes as follows: gap> A:=[ [ 0, 0, 1 ], [ 1, 0, 0 ], [ 0, -1, 0 ] ]; gap> B:=[ [ 0, 0, -1 ], [ 0, -1, 0 ], [ 1, 0, 0 ] ]; gap> G:=Group(A,B); Group([ [ [ 0, 0, 1 ], [ 1, 0, 0 ], [ 0, -1, 0 ] ], [ [ 0, 0, -1 ], [ 0, -1, 0 ], [ 1, 0, 0 ] ] ]) gap> p:=Pcgs(G); Pcgs([ [ [ 0, 0, 1 ], [ 0, 1, 0 ], [ -1, 0, 0 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, -1 ] ], [ [ 0, 0, -1 ], [ -1, 0, 0 ], [ 0, 1, 0 ] ], [ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ], [ [ -1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, 1 ] ] ]) gap> iso:=IsomorphismFpGroupByPcgs(p,"g"); CompositionMapping( [ (1,4,6,8)(2,3,5,7), (1,4)(2,3)(5,7)(6,8), (3,6,7)(4,5,8), (1,7)(2,8)(3,6)(4,5), (1,3)(2,4)(5,8)(6,7) ] -> [ g1, g2, g3, g4, g5 ], <action isomorphism> ) gap> fp:=Image(iso); <fp group of size 48 on the generators [ g1, g2, g3, g4, g5 ]> gap> RelatorsOfFpGroup(fp); [ g1^2*g5^-1*g4^-1, g2^-1*g1^-1*g2*g1*g5^-1*g4^-1, g3^-1*g1^-1*g3*g1*g5^-1*g4^-1*g3^-1, g4^-1*g1^-1*g4*g1*g5^-1*g4^-1, g5^-1*g1^-1*g5*g1*g5^-1*g4^-1, g2^2, g3^-1*g2^-1*g3*g2*g4^-1, g4^-1*g2^-1*g4*g2, g5^-1*g2^-1*g5*g2, g3^3, g4^-1*g3^-1*g4*g3*g5^-1*g4^-1, g5^-1*g3^-1*g5*g3*g4^-1, g4^2, g5^-1*g4^-1*g5*g4, g5^2 ] 95 The command “Pcgs(G)” returns the polycyclic generating system of G. (In this example, the generators are accessible through the list p[1],...p[5].) The command “IsomorphismOfFpGroupByPcgs(p,”g”)” gives the map which converts the polycyclic generating system into a finitely represented group. As the image of this isomorphism, the polycyclic group is given. However, the polycyclic generating system is not minimal. To generate the minimal one, we should do as this: gap> iso:=IsomorphismFpGroupByGenerators(G,GeneratorsOfGroup(G)); <composed isomorphism:[ [ [ 0, 0, 1 ], [ 1, 0, 0 ], [ 0, -1, 0 ] ], [ [ 0, 0, -1 ], [ 0, -1, 0 ], [ 1, 0, 0 ] ] ]->[ F1, F2 ]> gap> fp:=Image(iso); <fp group of size 48 on the generators [ F1, F2 ]> gap> RelatorsOfFpGroup(fp); [ F2^4, (F1*F2^-1)^2, F1^6, (F1*F2*F1)^2 ] gap> [G.2^4,(G.1*G.2^-1)^2,G.1^6,(G.1*G.2*G.1)^2]; [ [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ], [ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ] ] The smith normal form is also computed by GAP: gap> M:=[[0,0,0,0],[0,2,0,0],[0,0,0,0],[0,0,2,0],[0,0,0,0],[0,0,0,0]]; gap> SmithNormalFormIntegerMat(M); [ [ 2, 0, 0, 0 ], [ 0, 2, 0, 0 ], [ 0, 0, 0, 0 ], [ 0, 0, 0, 0 ], [ 0, 0, 0, 0 ], [ 0, 0, 0, 0 ] ] 96 H. Remarks to this section In this section, the technical details which would be important in the actual application of the computational group theory in the field of solid-state physics are explained. The chosen topics are as follows: the algorithm to determine the symmetry of the crystal; the computation of the compatibility relation, which is useful in the discussion of the splitting of the energy spectra with the reduction of the structural symmetry; the concept of the semidirect product, which is applicable to the preparation of the character table of the supercell structure; the concept of the group extension, by means of cohomology, which can be utilized to design the crystal lattice. The author hopes that the readers of this article would get familiar with these technical or advanced topics in order to deepen the knowledge of group theory, applicable to concrete problems in material science. The small programs presented in this article can be executed on a desktop PC. They are composed in accordance with the elementary formulas and definitions in the references and textbooks so that they should be as readable as possible, thus they are not are always effective in speed, and some part of them could be replaced by built-in functions in GAP. In the preceding sections of this article, the topics are taken from the solid-state physics. In the forthcoming sections, however, the application to the quantum chemistry (applicable to the isolated system, equipped with a certain symmetry, without periodicity) shall be discussed in a parallel way as the solid state physics, where the importance of the symmetry in the quantum dynamics of the molecule shall be illustrated in the different light. 97 VII. SYMMETRY IN C60 The C60 molecule is characterized by the peculiar structure, that of soccer-ball, composed of 60 atoms, 90 bonds, and 12 pentagons, and 60 hexagons. The group theoretical symmetry is of the icosahedral type, which contains 120 symmetric operations and 10 irreducible representations, according to which, the eigenstates are classified and the origins of degeneracies in energy spectrum are explained. We begin the construction of the symmetric operations by means of permutations of atoms, generate the icosahedral group by GAP, compute the irreducible representations, and compose the projection operators. We execute the electronic structure calculations of the molecule and analyze the wave-functions from the viewpoint of their irreducible representation. Furthermore, some concepts of symmetries (to which physicists pays little notice) are presented also by the analysis of the computer algebra. Throughout the study, it is necessary that whole subgroups of icosahedral symmetry should be extracted and classified by equivalence, and we will see that the utilization of the computer algebra is effective for this purpose. A. The initial set-up The C60 molecule (in Fig. 6) is projected on a plane as in the Fig. 7. The vertexes are numbered from 1 to 60, where we follow the following rule: the two atoms numbered as I and I+30 (I=1,...,30) are located in the opposite poles in the molecular sphere. The pentagons are also numbered from 1 to 12 (with under-bars), and two pentagons numbered as J and J+6 (J=1,...,6) are opposed with each other. There are two types of bonds, single and double, having slightly different lengths, distinguished by broad and broken segments in the figure. The icosahedral group are generated by three basic operations and represented by the permutations of atoms as 98 FIG. 6. A C60 molecule. The numbering is given on some atoms and pentagons, in correspondence with the projected images of the molecule, in Fig. 7. follows. The group is the direct product of the fifth alternating group “A5” (the 5-th alternating group) and the group of the inversion “I”. The generators are represented by permutations: gap> g1:=(1, 14, 20)(2, 15, 16)(3, 11, 17)(4, 12, 18)(5, 13, 19) (6, 58, 22)(7, 57, 23)( 8, 56, 24)( 9, 60, 25)( 10, 59, 21) ( 31, 44, 50)( 32, 45, 46)( 33, 41, 47)( 34, 42, 48)( 35, 43, 49) ( 36, 28, 52)( 37, 27, 53)( 38, 26, 54)( 39, 30, 55)( 40, 29, 51); gap> g2:=( 1, 5, 4, 3, 2)( 6,26,21,16,11)( 7,27,22,17,12)( 8,28,23,18,13) ( 9,29,24,19,14)(10,30,25,20,15)(31,35,34,33,32)(36,56,51,46,41) (37,57,52,47,42)(38,58,53,48,43)(39,59,54,49,44)(40,60,55,50,45); gap> g3:=( 1, 31)( 2, 32)( 3, 33)( 4, 34)( 5, 35)( 6, 36)( 7, 37)( 8, 38) ( 9, 39)( 10, 40)( 11, 41)( 12, 42)( 13, 43)( 14, 44)( 15, 45)( 16, 46) ( 17, 47)( 18, 48)( 19, 49)( 20, 50)( 21, 51)( 22, 52)( 23, 53)( 24, 54) 99 FIG. 7. The projected image of C60 on a plane. The pentagon in the center of this figure (indexed as 1) is the one located in the lower half in Fig. 6. (The pentagon at No.7, not shown in the projected image, is formed by five vertex at 31,32,33,34,35. ) ( 25, 55)( 26, 56)( 27, 57)( 28, 58)( 29, 59)( 30, 60); The elements g1 (the rotation by 120 degrees) and g2 (that by 72 degrees) generate “A5“ and g3 generates “I”. The permutation, denoted by (a, b, c, d,...,x), should be interpreted as the replacement of atoms in the following way: the atom located at the 100 site “a” is replaced by that at the site “b”, that at “b” by that at “c”, then in turn and finally, the last entry “x” by the first “a”. The usage of sixty symbols for the definition of the group is superfluous, and in fact, twelve symbols (representing the 12 vertexes of the icosahedron, or the 12 pentagons in the molecule) will do. If it is unnecessary to use the geometrical image, one can use 7 symbols, since, the icosahedral group is the direct product of the 5-th alternating group A5 and the inversion I, as the former requires five symbols “1,2,3,4,5” and the latter two symbols “6,7”. The equivalence of these different definitions is assured by constructing isomorphisms among them, which is an easy task for the computer algebra. Remark. This correspondence (between the group elements and the atoms) is consistent to the operation of the permutation in GAP. For example, the permutation (3,4,5) operates on the list [1,2,3,4,5] as follows: gap> ListPerm((3,4,5)); [1,2,4,5,3]; Here the entries 3,4,5 are replaced by 4,5,3, as our interpretation assumes. The group is constructed as gap> gp:=Group(g1,g2,g3); For the later utilization, it is more convenient to generate the group by means of matrices (which represents the permutations on sixty vertexes). We use the built-in function “ListPerm()” which computes the action on the permutation on the list [1,2,...,60]. gap> pl1:=ListPerm(g1); [ 14, 15, 11, 12, 13, 58, 57, 56, 60, 59, 17, 18, 19, 20, 16, 2, 3, 4, 5, 1, 10, 6, 7, 8, 9, 54, 53, 52, 51, 55, 44, 45, 41, 42, 43, 28, 27, 26, 30, 29, 101 47, 48, 49, 50, 46, 32, 33, 34, 35, 31, 40, 36, 37, 38, 39, 24, 23, 22, 21, 25 ] gap> pl2:=ListPerm(g2);; gap> pl3:=ListPerm(g3);; These three lists are converted into three matrices by means of this user-defined function. (The computed matrix element h[i][j] is nonzero when the symbol “i” goes to “j” by permutation given in the list “l”.) ListToMat:=function(l) local size,h,i,j; size:=Size(l); h:=List([1..size],i->List([1..size],j->0)); for i in [1..size] do h[i][l[i]]:=1; od; return h; end; gap> m1:=ListToMat(pl1);; gap> m2:=ListToMat(pl2);; gap> m3:=ListToMat(pl3);; The irreducible representations are computed now. gap> g:=Group(m1,m2,m3); gap> irr:=Irr(g); gap> Size(irr); 10 102 Remark. The computed irreducible representations by the group generated by the permutations and that by the matrices are listed by different orders (at least, in the result by GAP of the version 4.7.7.) This will cause some trouble in doing computations. In this article, to avoid confusion, the groups generated by different resources are given by different names even if they are isomorphic, and the generators are presented in each time of the definition. The characters for each element can be listed as numeral tables. gap> elm:=Elements(g); gap> A1:=List(elm,g->g^irr[1]);; gap> A2:=List(elm,g->g^irr[2]);; ............................... gap> A10:=List(elm,g->g^irr[10]);; The notation g^irr[X] means the computation of the character value of the element “g” by the X-th representation in this context. The characters of the irreducible representations are orthogonal and normalized. gap> A1*A1; 120 gap> A2*A2; 120 gap> A1*A2; 0 The virtual character is decomposed into the direct sum. gap> (4*A1+2*A2)*TransposedMat([A1,A2,A3,A4,A5,A6,A7,A8,A9,A10])/Size(elm); [4, 2, 0, 0, 0, 0, 0, 0, 0, 0] 103 I.1 I.2 I.3 I.4 I.5 I.6 I.7 I.8 I.9 I.10 I.Tr CL1 1 1 1 3 3 3 3 4 4 5 5 60 CL2 12 1 -1 -E(5)-E(5)^4 -E(5)^2-E(5)^3 E(5)^2+E(5)^3 E(5)+E(5)^4 -1 1 0 0 0 CL3 12 1 1 -E(5)^2-E(5)^3 -E(5)-E(5)^4 -E(5)-E(5)^4 -E(5)^2-E(5)^3 -1 -1 0 0 0 CL4 20 1 -1 0 0 0 0 1 -1 -1 1 0 CL5 20 1 1 0 0 0 0 1 1 -1 -1 0 CL6 15 1 -1 -1 -1 1 1 0 0 1 -1 4 CL7 12 1 -1 -E(5)^2-E(5)^3 -E(5)-E(5)^4 E(5)+E(5)^4 E(5)^2+E(5)^3 -1 1 0 0 0 CL8 1 1 -1 3 3 -3 -3 4 -4 5 -5 0 CL9 CL10 12 15 1 1 1 1 -E(5)-E(5)^4 -1 -E(5)^2-E(5)^3 -1 -E(5)^2-E(5)^3 -1 -E(5)-E(5)^4 -1 -1 0 -1 0 0 1 0 1 0 0 TABLE 26. The table of characters of the irreducible representation of the icosahedral group. Each row shows the characters of 10 conjugacy classes (CL1,...,CL10). There are 10 conjugacy classes and 10 irreducible representations. They are shown in the tables 26 and 27. In table 26, the second row shows the number of elements in each conjugacy classes (CL1,...,CL10), and the ten rows bellow are characters for each of the ten irreducible representations (I.1,...,I.10). The last row (I.Tr) shows the trace of the group elements as matrices, which is a virtual character (not irreducible). The √ notation E(5) means a complex number, the fifth root of the unity exp(2 −1π/5), thus the characters are real-valued. Simply the computed result by GAP is tabulated here, as it is. The projector on the p-th irreducible representation is computed by the formula P (p) = l(p) X (p)∗ χ (T ) · O(T ) |G| T ∈G by summing up the elements T of the group G, where l(p) is the dimension of the p-th irreducible representation, g the order of the group, χ(p) the character, O(T ) the operation of the group (which would be represented as matrices and applied to the vector representation of the wave function. The irreducible representation of the 104 The representatives CL1 <identity ...> x1^-1*x2^-2*x3 CL2 CL3 x2^-1*x1*x2*x1 x3*x2*x1*x2^2 CL4 CL5 x2^-2*x1*x2*x1 (also including x1) CL6 x3*x2^2*x1*x2^2 CL7 x3*x2^2 CL8 x3 CL9 x1^-1*x2^-2 (also including x2) CL10 x1*x2*x1 TABLE 27. The representatives in the conjugacy classes of the irreducible representations of the icosahedral group. The generators of the groups are represented by symbols x1...xN, as are numbered by GAP. In this case x1=m1,x2=m2,x3=m3. wave function is determined numerically, by the condition that the application of the projector should keep the wave function as it is, or delete it.) B. The analysis of the eigenstates Now that we have the irreducible representations and the symmetry operations, we can construct the projection operators. At first, we assume a model of C60 , where, in each vertex, one s or π orbital is located. The inter-atomic interactions are limited to those among three different neighboring sites, as are signified by single and double bonds. We permit two different strengths of interactions in the Fock matrix H, according to two types of the bonding. We neglect the overlap matrix elements between different sites, the overlapping matrix S being the unity. A computation is executed by the above assumption, with the values of Hsingle =-2 (on the single bonds in the pentagons), Hdouble =-1 (on the double bonds in the hexagons). Before the electronic structure computation, we can deduce a prediction from 105 the group theory. The group elements given by the matrices which represent the replacement of the 60 vertexes provide us the trace representation I.Tr. The virtual representation is decomposed by the irreducible representations (as the sum of row vectors in the table): I.Tr = 1×I.1+0×I.2+1×I.3+1×I.4+2×I.5+2×I.6+2×I.7+2×I.8+3×I.9+2×I.10. This relation tells us that the 60-dimensional vector space (on which the matrix group acts) is divided into the ten irreducible components, given as the ten irreducible representations of the group. The multiplicity of X-th component is equal to the coefficient to “I.X”. One of these components, belonging to “I.2”, is a null space in this case. The wave functions, computed as the eigenvectors of the Fock matrix, are also subject to this division of the vector space. Let us verify this. The eigenstates and the corresponding irreducible representations are shown in the following list. The abbreviations as “I.”,“D.”,“E” denote the index of the irreducible representation, the degeneracy of the energy, and the energies. The values of the energies are listed in the bracket. If the bracket is blank, the eigenstates in correspondence with the irreducible representations do not exist. The number of different eigenvalues in each irreducible representation is equal to the multiplicity in the above relation between I.Tr and I.1,..., I.10. I.1 D.1 E.[ -5.0000 ] I.2 D.1 E.[ None ] I.3 D.3 E.[ 4.2361 ] I.4 D.3 E.[ -0.2361 ] I.5 D.3 E.[ -4.6542, -0.5819 ] I.6 D.3 E.[ -3.6765, 2.9126 ] I.7 D.4 E.[ -1.4495, 3.4495 ] 106 I.8 D.4 E.[ -2.1623, 4.1623 ] I.9 D.5 E.[ -4.0642, -1.6946, 2.7588 ] I.10 D.5 E.[ -1.0000, 3.0000 ] For a realistic quantum chemistry computation of C60 , the similar analysis is possible. For simplicity, one can make use of the amplitudes of 1s orbitals, because those orbitals are transformed among themselves, without mixing with other types, 2s,2p,3s,3p. Except for one special case where the amplitudes of 1s orbital are null, the correspondence between the eigenstates and the irreducible representations can be well established. The result is listed in the following list. (The last entry of the list I.0 is for the case of the failures in the identification.) Even in the case of the failure of the analysis, the degeneracy is single, and one can conclude the corresponding irreducible representation is I.1 or I.2, that of 1-dimension. The numbers of the different eigenvalues in the each irreducible representations are predictable by means of the decomposition of the trace representation of the character of the transformation matrices of the 1s,2s,2px,2py,2pz,3s,3px,3py,3pz orbitals. (The p orbitals are transformed by the same matrices prepared for the vibrational mode of the molecule, as will be discussed later.) I.1 D.1 E.[ 7 different eigenvalues ] I.2 D.1 E.[ ? ] I.3 D.3 E.[ 11 different eigenvalues ] I.4 D.3 E.[ 11 different eigenvalues ] I.5 D.3 E.[ 16 different eigenvalues ] I.6 D.3 E.[ 16 different eigenvalues ] I.7 D.4 E.[ 24 different eigenvalues ] I.8 D.4 E.[ 24 different eigenvalues ] I.9 D.5 E.[ 25 different eigenvalues ] 107 I.10 D.5 E.[ 20 different eigenvalues ] I.0 E.[ C. D.1 2 different eigenvalues ] The analysis again, against the failure in the identification As the degeneracy of the energy is one, one can see the levels denoted as I.0 in the previous section belong to the representation I.1 or I.2. The characters of the one-dimensional representation in table 26 are shown here again (in table 28). CL1 CL2 CL3 CL4 CL5 CL6 CL7 CL8 CL9 CL10 I.1 1 1 1 1 1 1 1 1 1 1 I.2 1 -1 1 -1 1 -1 -1 -1 1 1 TABLE 28. The one-dimensional irreducible representations. To distinguish the representation I.1 and I.2 with ease, one may apply the element in the conjugacy class 8 (the inversion). By the inversion, one vertex moves to the opposite site with respect to the center of the geometry, and the coefficients of porbitals change signs. The amplitudes of the wave-functions (in the two atoms located in the antipodes positions) in I.0 are typically obtained as in table 29. CA 1S 2S 2PX 2PY 2PZ CB 1S 2S 2PX 2PY 2PZ 0 0 X Y Z 0 0 X Y Z TABLE 29. The amplitudes of the wave-function (coefficients for each orbital) in two opposing atoms. 108 The inversion changes the sign of non-zero coefficients. We must recall that the wave-functions are basis functions of some irreducible representations, and the traces of their transformation matrices are the characters. Since the traces are -1 in the above cases, the wave-functions belong to the representation I.2. The reason of the failure in the analysis by the projection operators applied on s orbitals are fundamental one: the projection operator of I.2 over s orbitals is exactly the zero-matrix, which gives rise to exact zero amplitudes in s orbitals (i.e. the null space.) The reason of the existence of the orbitals of the I.2 is that the actual C60 molecule has the symmetry of the inversion and the carbon atom has p-orbitals. D. The perturbation and the symmetry We often have to compute matrix elements in the perturbation theory such as hψi |Vp |ψj i = [Ii |Ip |Ij ] = [Ii |Ip ∗ Ij ]. (83) The product of the perturbation potential and the wave function belongs to the direct product of the representation, which is decomposed into the direct sum Ip ∗ Ij = X Ap,j k Ik . (84) k We can determine beforehand whether this matrix element would be zero or not, only from the group theoretical consideration: if the two irreducible representations in the inner product are the same, the matrix element will be non-zero. In the system with the high symmetry, the group theoretical constraint is so strong that it annihilates many matrix elements. However, the symmetry is reduced, there is some possibility where the matrix element will become non-zero. Indeed there is no symmetry, there 109 is no group theoretical constraint which annihilates the matrix elements. And if one uses the group theory, one can see the least reduction of the symmetry where the matrix element will become non-zero. The irreducible representation of group g ramifies in the subgroups as follows. (g,s) (g,s) (g,s) Igp = Ci,1 Is1 + Ci,2 Is2 + · · · + Ci,M IsM . (85) One can find the subgroup where the non-zero matrix element will exist, by tracing the sequence of subgroups (in the subgroup lattice) and checking the possible combinations of the ramified irreducible representations. In this stage, the concrete style of the structural deformation is not discussed yet. One of the important perturbation potentials is that of optical transition, such as E ·r. Now we determine the irreducible representation to which the perturbation E ·r (or the spatial vector r) belongs. We now construct the icosahedral group from the rotation matrices in three-dimensional Euclidean space, acting on the twelve vertexes of one icosahedron. The twelve vertexes in one icosahedron are given by 1 [ 0, 0, 1 ] 2 [ 2/5*E(5)-2/5*E(5)^2-2/5*E(5)^3+2/5*E(5)^4, 0, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4 ] 3 [ -3/5*E(5)-2/5*E(5)^2-2/5*E(5)^3-3/5*E(5)^4, -1/5*E(20)+1/5*E(20)^9+2/5*E(20)^13-2/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4 ] 4 [ 2/5*E(5)+3/5*E(5)^2+3/5*E(5)^3+2/5*E(5)^4, -2/5*E(20)+2/5*E(20)^9-1/5*E(20)^13+1/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4 ] 5 [ 2/5*E(5)+3/5*E(5)^2+3/5*E(5)^3+2/5*E(5)^4, 110 2/5*E(20)-2/5*E(20)^9+1/5*E(20)^13-1/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4 ], 6 [ -3/5*E(5)-2/5*E(5)^2-2/5*E(5)^3-3/5*E(5)^4, 1/5*E(20)-1/5*E(20)^9-2/5*E(20)^13+2/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4 ] 7 [ 0, 0, -1 ] 8 [ -2/5*E(5)+2/5*E(5)^2+2/5*E(5)^3-2/5*E(5)^4, 0, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4 ] 9 [ 3/5*E(5)+2/5*E(5)^2+2/5*E(5)^3+3/5*E(5)^4, 1/5*E(20)-1/5*E(20)^9-2/5*E(20)^13+2/5*E(20)^17, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4 ] 10 [ -2/5*E(5)-3/5*E(5)^2-3/5*E(5)^3-2/5*E(5)^4, 2/5*E(20)-2/5*E(20)^9+1/5*E(20)^13-1/5*E(20)^17, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4 ] 11 [ -2/5*E(5)-3/5*E(5)^2-3/5*E(5)^3-2/5*E(5)^4, -2/5*E(20)+2/5*E(20)^9-1/5*E(20)^13+1/5*E(20)^17, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4 ] 12 [ 3/5*E(5)+2/5*E(5)^2+2/5*E(5)^3+3/5*E(5)^4, -1/5*E(20)+1/5*E(20)^9+2/5*E(20)^13-2/5*E(20)^17, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4 ] The three generators of the group are as follows: gap> f1:=(1,2,3)(4,6,11)(5,10,12)(7,8,9);; gap> f2:=(2,6,5,4,3)(8,12,11,10,9);; gap> f3:=(1,7)(2,8)(3,9)(4,10)(5,11)(6,12);; These permutations are also represented by the rotation matrices as 111 gap> f1:=[ [ 3/10*E(5)+1/5*E(5)^2+1/5*E(5)^3+3/10*E(5)^4, 1/10*E(20)-1/10*E(20)^9-1/5*E(20)^13+1/5*E(20)^17, 2/5*E(5)-2/5*E(5)^2-2/5*E(5)^3+2/5*E(5)^4 ], [ -1/2*E(20)+1/2*E(20)^9, -1/2*E(5)-1/2*E(5)^4, 0 ], [ -3/5*E(5)-2/5*E(5)^2-2/5*E(5)^3-3/5*E(5)^4, -1/5*E(20)+1/5*E(20)^9+2/5*E(20)^13-2/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4 ] ]; gap> f2:=[ [ 1/2*E(5)+1/2*E(5)^4, -1/2*E(20)+1/2*E(20)^9, 0 ], [ 1/2*E(20)-1/2*E(20)^9, 1/2*E(5)+1/2*E(5)^4, 0 ], [ 0, 0, 1 ] ];; gap> f3:=[ [ -1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ];; N.1 N.2 N.3 N.4 N.5 N.6 N.7 N.8 N.9 N.10 Dimension 1 1 3 3 3 3 4 4 5 5 [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 0 0 0 0 0 0 0 0 0 ], ], ], ], ], ], ], ], ], ], Operator [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ [ [ [ [ [ [ [ [ [ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 0 0 0 1 0 0 0 0 0 ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] The characters of [f1,f2,f3] [ 1, 1, 1 ] [ 1, 1, -1 ] [ 0,-E(5)^2-E(5)^3, 3 ] (I.4 in table 26) [ 0,-E(5)-E(5)^4, 3 ] (I.3 in 26) [ 0,-E(5)^2-E(5)^3, -3 ] [ 0,-E(5)-E(5)^4, -3 ] [ 1, -1, 4 ] [ 1, -1, -4 ] [ -1, 0, 5 ] [ -1, 0, -5 ] TABLE 30. The projection operators. Be careful that the computation by GAP returns the representations (N.1,...,N.10) in the slightly different order from those in table 26(I.1,...,I.10). The ten projection operators are computed as in table 30. The operators, except that of the fifth representation, are exactly zero. The symmetry operations on one vector, which is subject to the icosahedral symmetry, are only representable in the fifth irreducible representation, and the perturbation term E · r is represented by the fifth representation. (The fifth representation can be distinguished from others, 112 as such having characters [0,-E(5)^2-E(5)^3,-3] for three generators. Especially, the rotation of 72 degrees should have the character value -E(5)^2-E(5)^3. The rotation by 72 degrees and its inverse (f2 and f2^-1) have the same character value, because they are conjugate.) Remark. In order to see whether the elements x and y are conjugate in group G, try the command. gap> RepresentativeAction(G,x,y); E. The possible deformation in the reduced symmetry We can construct molecular geometry which is admissible in each subgroup. If the vertexes are dislocated as V(i) → V(i)+d(i), the set of d(i) should satisfy a certain geometrical constraint in the symmetry operation in the subgroup. We should take note of this : since the icosahedral group which includes 120 operations and acts on 60 vertexes in one C60 , there are two operations, both of which equally transfers one atomic site into same, but another site. If the dislocations of atoms are still subject to the icosahedral symmetry, there is a constraint. When the atom at the site V[i] moves to V[j] by the operation R, it must be R · V[i] = V[j], and R · (V[i] + d[i]) = V[j] + d[j], i.e. R · d[i] = d[j]. If there are two possible transformations R and Q, it must be R · d[i] = Q · d[i]. 113 If we chose T=R−1 Q, then T·d[i]=d[i], and the possible dislocation is the solution of the equation (T − E) · d[i] = 0 (E: the unit matrix). In the case of the icosahedral symmetry in C60 , such a T is the reflection at the plain in which one double bond and its antipodes are located. In general, the dislocations d[i] on all of the vertex are generated as follows. For example, take V[1], and find the operation R, Q, T as above, and then find a possible solution d of (T − E) · d = 0 as the generator. The application of the 120 operations on V[1]+d shall generate 60 sites, which are represented by V[i]+d[i], and the set of d[i] is obtained. (This is equivalent to the projection on the trivial irreducible representation, in which the basis set is invariant under the group action.) In a subgroup, the symmetric operations do not act transitively, and the “orbit” of one vertex by the symmetry operations (which covers all of the vertexes in C60 by the icosahedral symmetry) splits into several subsets, as we will see later. For each subset, we construct independent d, the generator of the dislocation in each subset. If the subgroups contain the reflection, the dislocations on the atoms have similar constraints to d (being fixed on one of the reflectional planes) as in the case of the icosahedral symmetry. On the contrary, when the reflection is missing in the subgroup, we can choose arbitrary generator of dislocations in each sub-orbits. One should note that the center of mass will not be kept since d[1]+d[2]+...+d[60] is not equal to 0 in general. Concerning this topic, we can classify the vibrational mode of C60 according to the group theory. The procedure is to form the direct product of the virtual representation with respect to the replacement of atoms and the irreducible representation of the symmetry operations on the space vector, and then to decompose it into the direct sum. One will find that the vibrational mode in the icosahedral symmetry includes the duplicated trivial irreducible representation, to which the degrees of the freedom is two. The geometrical interpretation of this is that the possible distortion 114 which keeps the icosahedral symmetry is confined in one plane as discussed above. F. The reduction of the symmetry, from the viewpoint of the orbit in the permutation The full symmetry of C60 is the icosahedral group, generated by “g1”, “g2”, “g3” in the previous section, and it has 164 subgroups. All of the subgroups are computed as gap> gr:=Group(g1,g2,g3); gap> AS:=AllSubgroups(gr);; The list of the subgroups is given in the descending order of the sizes of the subgroups, and the largest of them (No.164) is the icosahedral group. gap> irrA:=Irr(AS[164]); Take a subgroup No.162. This group is of the order 24, and the irreducible representation is also computed. gap> irrB:=Irr(AS[162]);; The irreducible representations of these groups are given in tables 31,32,33, and 34. The branching relation from the group of No.164 to that of No.162 is computed now. The characters of the elements of the group of No.162 are computed and listed in two ways: the one is by the irreducible representations of the group of No.164, and another by those of the group of No.162. The representations in the first list are decomposed as the summation of the entries in the second list, and the result is the branching relation. 115 No.1 No.2 No.3 No.4 No.5 No.6 No.7 No.8 No.9 No.10 CL1 1 1 3 3 3 3 4 4 5 5 CL2 1 -1 -1 -1 1 1 0 0 1 -1 CL3 1 1 -E(5)-E(5)^4 -E(5)^2-E(5)^3 -E(5)-E(5)^4 -E(5)^2-E(5)^3 -1 -1 0 0 CL4 1 1 -E(5)^2-E(5)^3 -E(5)-E(5)^4 -E(5)^2-E(5)^3 -E(5)-E(5)^4 -1 -1 0 0 CL5 1 1 -1 -1 -1 -1 0 0 1 1 CL6 1 -1 -E(5)^2-E(5)^3 -E(5)-E(5)^4 E(5)^2+E(5)^3 E(5)+E(5)^4 -1 1 0 0 CL7 1 1 0 0 0 0 1 1 -1 -1 CL8 1 -1 0 0 0 0 1 -1 -1 1 CL9 1 -1 3 3 -3 -3 4 -4 5 -5 CL10 1 -1 -E(5)-E(5)^4 -E(5)^2-E(5)^3 E(5)+E(5)^4 E(5)^2+E(5)^3 -1 1 0 0 TABLE 31. The character table of the group AS[164]. CL1 CL2 CL3 CL4 CL5 CL6 CL7 CL8 CL9 CL10 Representative <identity ...> x1^-1*x2^-2*x3*x1*x2*x1 x2^-1 x2^-2 x2^-2*x1*x2 x2^2*x1*x2^2*x1^-1*x3 x2^2*x1*x2 x2^-1*x1^-1*x2^-2*x1^-1*x3 x3 x2^-1*x3 Size 1 15 12 12 15 12 20 (including g1) 20 1 12 TABLE 32. The conjugacy classes of the group AS[164]. gap> LA:=List(irrA,a->List(Elements(AS[162]),g->g^a)); [ [ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ], ............................................................................. ............................................................................. [ 5, -1, 1, -1, -1, 1, -1, 1, 1, -1, 1, -1, -5, 1, -1, 1, 1, -1, 1, -1, -1, 1, -1, 1 ] ] gap> LB:=List(irrB,a->List(Elements(AS[162]),g->g^a)); [ [ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ], 116 No.1 No.2 No.3 No.4 No.5 No.6 No.7 No.8 CL1 1 1 1 1 1 1 3 3 CL2 1 -1 -1 -1 1 1 1 -1 CL3 1 -1 -E(3) -E(3)^2 E(3)^2 E(3) 0 0 CL4 1 1 E(3) E(3)^2 E(3)^2 E(3) 0 0 CL5 1 1 E(3)^2 E(3) E(3) E(3)^2 0 0 CL6 1 -1 -E(3)^2 -E(3) E(3) E(3)^2 0 0 CL7 1 1 1 1 1 1 -1 -1 CL8 1 -1 -1 -1 1 1 -3 3 TABLE 33. The character table of the group AS[162]. CL1 CL2 CL3 CL4 CL5 CL6 CL7 CL8 Representative <identity ...> x2^-1*x1^-1*x2^-2*x3*x1*x2*x1 x1^-1*x2^-2*x1^-1*x3 x2^-1*x1*x2 x2^-2*x1 x1*x2^2*x1^-1*x2^-1*x3 x2*x1^-1 x3 Size 1 3 4 4 4 3 3 1 TABLE 34. The conjugacy classes of the group AS[162]. ............................................................................. ............................................................................. 0 ], [ 3, -1, 0, 0, 0, 0, -1, -1, 0, 0, 0, 0, 3, -1, 0, 0, 0, 0, -1, -1, 0, 0, 0, 0 ] ] gap> LA*TransposedMat(LB)/Size(AS[162]); The result returns as the matrix in the bellow: the irreducible representations are ramified as No.164 -> No.162 [ [ 1, 0, 0, 0, 0, 0, 0, 0 ], 1 -> 1 [ 0, 1, 0, 0, 0, 0, 0, 0 ], 2 -> 2 117 [ 0, 0, 0, 0, 0, 0, 0, 1 ], 3 -> 8 [ 0, 0, 0, 0, 0, 0, 0, 1 ], 4 -> 8 [ 0, 0, 0, 0, 0, 0, 1, 0 ], 5 -> 7 [ 0, 0, 0, 0, 0, 0, 1, 0 ], 6 -> 7 [ 1, 0, 0, 0, 0, 0, 0, 1 ], 7 -> 1 + 8 [ 0, 1, 0, 0, 0, 0, 1, 0 ], 8 -> 2 + 7 [ 0, 0, 0, 0, 1, 1, 0, 1 ], 9 -> 5 + 6 + 8 [ 0, 0, 1, 1, 0, 0, 1, 0 ] ] 10 -> 3 + 4 + 7 One can see the change in the geometry by checking the “orbit” of the vertex “1” and the bond “[1,6]”. In the icosahedral symmetry, the vertex is transferred to other sixty vertexes transitively, and this double bond is transferred to all other thirty double bonds. gap> List(Elements(AS[164]),g->OnPoints(1,g)); [ 1, 1, 2, 2, 3, 3, 4, 4, 5, 5, 6, 6, 7, 7, 8, 8, 9, 9, 10, 10, 11, 11, 12, 12, 13, 13, 14, 14, 15, 15, 16, 16, 17, 17, 18, 18, 19, 19, 20, 20, 21, 21, 22, 22, 23, 23, 24, 24, 25, 25, 26, 26, 27, 27, 28, 28, 29, 29, 30, 30, 31, 31, 32, 32, 33, 33, 34, 34, 35, 35, 36, 36, 37, 37, 38, 38, 39, 39, 40, 40, 41, 41, 42, 42, 43, 43, 44, 44, 45, 45, 46, 46, 47, 47, 48, 48, 49, 49, 50, 50, 51, 51, 52, 52, 53, 53, 54, 54, 55, 55, 56, 56, 57, 57, 58, 58, 59, 59, 60, 60 ] gap> BONDA:=Unique(List(Elements(AS[164]),g->OnSets([1,6],g))); [ [ 1, 6 ], [ 2, 11 ], [ 3, 16 ], [ 4, 21 ], [ 5, 26 ], [ 7, 30 ], [ 8, 49 ], [ 9, 53 ], [ 10, 12 ], [ 13, 54 ], [ 14, 58 ], [ 15, 17 ], [ 18, 59 ], [ 19, 38 ], [ 20, 22 ], [ 23, 39 ], [ 24, 43 ], [ 25, 27 ], [ 28, 44 ], [ 29, 48 ], [ 31, 36 ], [ 32, 41 ], [ 33, 46 ], [ 34, 51 ], [ 35, 56 ], [ 37, 60 ], [ 40, 42 ], [ 45, 47 ], [ 50, 52 ], [ 55, 57 ] ] 118 In the symmetry of the subgroup No.162, in contrast, the vertex “1” is transferred only to 24 other vertexes. The orbit of single vertexes (which covers the whole system in the case of the subgroup 164) splits into three subsets. Similarly the bond “[1,6]” is not transferred transitively, only to 24 of double bonds. The remaining six double bonds are transferred among themselves. This situation can be interpreted that one of the double bonds (one of these connecting one pentagon with five neighbors) slightly changes the length, while those of remaining four bonds are unchanged. gap> List(Elements(AS[162]),g->OnPoints(1,g)); [ 1, 5, 9, 10, 11, 15, 18, 19, 21, 22, 27, 28, 31, 35, 39, 40, 41, 45, 48, 49, 51, 52, 57, 58 ] gap> List(Elements(AS[162]),g->OnPoints(2,g)); [ 2, 4, 8, 6, 12, 14, 17, 20, 25, 23, 26, 29, 32, 34, 38, 36, 42, 44, 47, 50, 55, 53, 56, 59 ] gap> List(Elements(AS[162]),g->OnPoints(3,g)); [ 3, 3, 7, 7, 13, 13, 16, 16, 24, 24, 30, 30, 33, 33, 37, 37, 43, 43, 46, 46, 54, 54, 60, 60 ] gap> BONDB:=Unique(List(Elements(AS[162]),g->OnSets([1,6],g))); gap> Sort(BONDB); gap> BONDB; [ [ 1, 6 ], [ 2, 11 ], [ 4, 21 ], [ 5, 26 ], [ 8, 49 ], [ 9, 53 ], [ 10, 12 ], [ 14, 58 ], [ 15, 17 ], [ 18, 59 ], [ 19, 38 ], [ 20, 22 ], [ 23, 39 ], [ 25, 27 ], [ 28, 44 ], [ 29, 48 ], [ 31, 36 ], [ 32, 41 ], [ 34, 51 ], [ 35, 56 ], [ 40, 42 ], [ 45, 47 ], [ 50, 52 ], [ 55, 57 ] ] The splitting of the energy degeneracy with the symmetry reduction is verified numerically, for example, by a model computation, in which the matrix elements of these two split orbits of double bonds take slightly different values, in correspon119 dence with the change in the symmetry. In this computation, the elements of the Fock matrix which belong to the one of the split orbit (including six bonds, the complementary part of BONDB in BONDA) are enhanced slightly, multiplied by 1.005. The energy spectra at HOMO and LUMO are computed as follows.(The positions of HOMO and LUMO are ambiguous in this case. We presently assume that the half of the 60 eigenstates are occupied by 60 electrons. The left and right columns show the spectra of the full and the reduced symmetries. The HOMO and LUMO belong to the irreducible representations of No.10 and No.5 of the character table of the group AS[164], and the splitting of the spectra is deduced from the above relation.) HOMO : Split from one fivefold degeneracy to one threefold degeneracy and two single degeneracies. 26 -1.0000000 -> -1.0000021 27 -1.0000000 -> -1.0000021 28 -1.0000000 -> -1.0000021 29 -1.0000000 -> -1.0000000 30 -1.0000000 -> -1.0000000 In this case, two single states still have the same energy levels. This is due to the fact that the two single states belong to two of the one-dimensional irreducible representation which are complex-conjugates with each other. As the eigenvalue problem is the real-valued one, these two eigenvalues should be equal owing to the invariance by the complex conjugation acting on it. It could also be interpreted as of the time-reversal symmetry in the context of the quantum physics. LUMO: Without splitting. 31 -0.5818861 -> -0.5810887 32 -0.5818861 -> -0.5810887 33 -0.5818861 -> -0.5810887 120 The symmetry reduction from the icosahedral group to one of the subgroups of order 24 can be realized clearly, as supposed in this computation. On the other hand, the difference between the icosahedral group and the maximal subgroup AS[163] (the 5-th alternating group: A5) is more subtle. The splitting of the “orbits” by the group action does not occur in the transposition of the bonds between nearest or secondnearest neighbors. The length of the single or double bonds is also unique in A5 symmetry, and the change in the symmetry could be seen in the “orbit” of the bonds among more distant neighbors. Take the bond of [1,11]. gap> lg:=List(Elements(AS[164]),i->OnSets([1,11],i)); [ [ 1, 11 ], [ 1, 26 ], [ 2, 6 ], [ 2, 16 ], [ 3, 11 ], [ 3, 21 ], [ 4, 16 ], [ 4, 26 ], [ 5, 6 ], [ 5, 21 ], [ 6, 30 ], [ 6, 12 ], [ 1, 7 ], [ 7, 49 ], [ 8, 30 ], [ 8, 53 ], [ 9, 49 ], [ 9, 12 ], [ 1, 10 ], [ 10, 53 ], [ 10, 11 ], [ 11, 17 ], [ 2, 12 ], [ 12, 54 ], [ 10, 13 ], [ 13, 58 ], [ 14, 54 ], [ 14, 17 ], [ 2, 15 ], [ 15, 58 ], [ 15, 16 ], [ 16, 22 ], [ 3, 17 ], [ 17, 59 ], [ 15, 18 ], [ 18, 38 ], [ 19, 59 ], [ 19, 22 ], [ 3, 20 ], [ 20, 38 ], [ 20, 21 ], [ 21, 27 ], [ 4, 22 ], [ 22, 39 ], [ 20, 23 ], [ 23, 43 ], [ 24, 39 ], [ 24, 27 ], [ 4, 25 ], [ 25, 43 ], [ 25, 26 ], [ 7, 26 ], [ 5, 27 ], [ 27, 44 ], [ 25, 28 ], [ 28, 48 ], [ 29, 44 ], [ 7, 29 ], [ 5, 30 ], [ 30, 48 ], [ 31, 41 ], [ 31, 56 ], [ 32, 36 ], [ 32, 46 ], [ 33, 41 ], [ 33, 51 ], [ 34, 46 ], [ 34, 56 ], [ 35, 36 ], [ 35, 51 ], [ 36, 60 ], [ 36, 42 ], [ 31, 37 ], [ 19, 37 ], [ 38, 60 ], [ 23, 38 ], [ 19, 39 ], [ 39, 42 ], [ 31, 40 ], [ 23, 40 ], [ 40, 41 ], [ 41, 47 ], [ 32, 42 ], [ 24, 42 ], [ 40, 43 ], [ 28, 43 ], [ 24, 44 ], [ 44, 47 ], [ 32, 45 ], [ 28, 45 ], [ 45, 46 ], [ 46, 52 ], [ 33, 47 ], [ 29, 47 ], [ 45, 48 ], [ 8, 48 ], [ 29, 49 ], [ 49, 52 ], [ 33, 50 ], [ 8, 50 ], [ 50, 51 ], [ 51, 57 ], [ 34, 52 ], [ 9, 52 ], 121 [ 50, 53 ], [ 13, 53 ], [ 9, 54 ], [ 54, 57 ], [ 34, 55 ], [ 13, 55 ], [ 55, 56 ], [ 37, 56 ], [ 35, 57 ], [ 14, 57 ], [ 55, 58 ], [ 18, 58 ], [ 14, 59 ], [ 37, 59 ], [ 35, 60 ], [ 18, 60 ] ] On the other hand, the “orbit” by A5 includes only 60 bonds. gap> la5:=List(Elements(AS[163]),i->OnSets([1,11],i)); [ [ 1, 11 ], [ 2, 16 ], [ 3, 21 ], [ 4, 26 ], [ 5, 6 ], [ 6, 30 ], [ 7, 49 ], [ 8, 53 ], [ 9, 12 ], [ 1, 10 ], [ 10, 11 ], [ 12, 54 ], [ 13, 58 ], [ 14, 17 ], [ 2, 15 ], [ 15, 16 ], [ 17, 59 ], [ 18, 38 ], [ 19, 22 ], [ 3, 20 ], [ 20, 21 ], [ 22, 39 ], [ 23, 43 ], [ 24, 27 ], [ 4, 25 ], [ 25, 26 ], [ 27, 44 ], [ 28, 48 ], [ 7, 29 ], [ 5, 30 ], [ 31, 56 ], [ 32, 36 ], [ 33, 41 ], [ 34, 46 ], [ 35, 51 ], [ 36, 42 ], [ 31, 37 ], [ 38, 60 ], [ 19, 39 ], [ 23, 40 ], [ 41, 47 ], [ 32, 42 ], [ 40, 43 ], [ 24, 44 ], [ 28, 45 ], [ 46, 52 ], [ 33, 47 ], [ 45, 48 ], [ 29, 49 ], [ 8, 50 ], [ 51, 57 ], [ 34, 52 ], [ 50, 53 ], [ 9, 54 ], [ 13, 55 ], [ 37, 56 ], [ 35, 57 ], [ 55, 58 ], [ 14, 59 ], [ 18, 60 ] ] The remaining 60 bonds are located in the separated orbit now. gap> la5_2:=List(Elements(AS[163]),i->OnSets([2,6],i)); [ [ 2, 6 ], [ 3, 11 ], [ 4, 16 ], [ 5, 21 ], [ 1, 26 ], [ 1, 7 ], [ 8, 30 ], [ 9, 49 ], [ 10, 53 ], [ 6, 12 ], [ 2, 12 ], [ 10, 13 ], [ 14, 54 ], [ 15, 58 ], [ 11, 17 ], [ 3, 17 ], [ 15, 18 ], [ 19, 59 ], [ 20, 38 ], [ 16, 22 ], [ 4, 22 ], [ 20, 23 ], [ 24, 39 ], [ 25, 43 ], [ 21, 27 ], [ 5, 27 ], [ 25, 28 ], [ 29, 44 ], [ 30, 48 ], [ 7, 26 ], [ 35, 36 ], [ 31, 41 ], [ 32, 46 ], [ 33, 51 ], [ 34, 56 ], [ 31, 40 ], [ 36, 60 ], [ 19, 37 ], [ 23, 38 ], [ 39, 42 ], [ 32, 45 ], [ 40, 41 ], [ 24, 42 ], [ 28, 43 ], [ 44, 47 ], [ 33, 50 ], [ 45, 46 ], [ 29, 47 ], [ 8, 48 ], 122 [ 49, 52 ], [ 34, 55 ], [ 50, 51 ], [ 9, 52 ], [ 13, 53 ], [ 54, 57 ], [ 35, 60 ], [ 55, 56 ], [ 14, 57 ], [ 18, 58 ], [ 37, 59 ] ] The bonds, equivalent to “[1,11]”, with the unique length in the icosahedral symmetry, are permitted to have two different lengths in the A5 symmetry. The deformation from the icosahedral symmetry to that of A5 is realized not in the bond structures between the nearest or the second-nearest neighbors, but those between remoter atomic sites. By such deformation into A5 symmetry, the two pentagons, located in the antipodes positions, can rotate themselves in the opposite directions with each other. G. The symmetry in the eigenstates (hidden one) The irreducible representations of the same dimension show a certain similarity in the icosahedral group. For example, in table 26, the representations of I.3 and I.4 or I.5 and I.6 seem to be interchangeable, if we replace E(5), E(5)^2, E(5)^3, E(5)^4 among themselves. This suggests a certain kind of affinity of the basis functions of the wave functions. This is the symmetry in the context of the Galois theory, especially of the cyclotomic field, and manifest itself in the secular equation of the energy spectrum. I.3 I.4 I.5 I.6 CL1 3 3 3 3 CL2 -E(5)-E(5)^4 -E(5)^2-E(5)^3 E(5)^2+E(5)^3 E(5)+E(5)^4 CL3 -E(5)^2-E(5)^3 -E(5)-E(5)^4 -E(5)-E(5)^4 -E(5)^2-E(5)^3 CL4 0 0 0 0 CL5 0 0 0 0 CL6 -1 -1 1 1 CL7 -E(5)^2-E(5)^3 -E(5)-E(5)^4 E(5)+E(5)^4 E(5)^2+E(5)^3 CL8 3 3 -3 -3 CL9 CL10 -E(5)-E(5)^4 -1 -E(5)^2-E(5)^3 -1 -E(5)^2-E(5)^3 -1 -E(5)-E(5)^4 -1 TABLE 35. The three dimensional irreducible representations in the icosahedral group. Let us start again at the model computation of the electronic structure of C60 . The eigenvalue problem is solved by one of the functions in the GAP package. By this, 123 the secular equation is decomposed into polynomials with coefficients over the specified field, and the “generalized” eigenstates for these polynomials are obtained.(The eigenvalues are computed as the set of polynomials, each of which has a part of eigenvalues as the roots. The eigenstates of the matrix H are the solutions of the matrix equation p(H)·x=0, where p(t) is one of these polynomials.) Let “hh” be the Fock matrix, used in the model computation of the electronic structure of C60 , with the same parameter as in the previous section. The generators of the group g1,g2,g3 are the same as defined previously. The eigenvalue problem is solved now. The last part of the following computation is to extract the basis set of the eigenspaces. (The secular equation is representable as the product of polynomials equipped the parameter for the transfer integrals. See the appendix H.) Hgen:=function(GP,a) local i,h,tuples; h:=List([1..60],i->List([1..60],j->0)); tuples:=Orbit(GP,a,OnTuples); for i in tuples do h[i[1]][i[2]]:=1; od; return h; end; This function sets non-zero matrix elements hij , when the symmetry of the molecule demand the bond between site “i” and “j”. To do this, the bond defined in the list “a”, in the argument of this function, is transferred to equivalent bonds in the symmetry of the group “GP”. gap> G:=Group(g1,g2,g3); 124 No. Polynomial 1 2 3 4 5 6 7 8 Eigenspace dimension x_1-3 5 x_1+1 5 x_1+5 1 x_1^2-4*x_1-1 6 x_1^2-2*x_1-9 8 x_1^2-2*x_1-5 8 x_1^3+3*x_1^2-9*x_1-19 15 x_1^4+6*x_1^3-4*x_1^2-54*x_1-29 12 Degeneracy of one eigenvalue 5 5 1 3 4 4 3 3 Irreducible representation I.10 I.10 I.1 I.3,I.4 I.8 I.7 I.9 I.5,I.6 TABLE 36. The classification of the solutions of the generalized eigenvalue problem. The irreducible representations are those presented in table 26. gap> h1:=Hgen(G,[1,2]); gap> h2:=Hgen(G,[1,6]); gap> hh:=-2*h1-h2; gap> ge:=GeneralizedEigenvalues(Rationals,hh); [ x_1-3, x_1+1, x_1^2-2*x_1-5, x_1+5, x_1^2-4*x_1-1, x_1^2-2*x_1-9, x_1^3+3*x_1^2-9*x_1-19, x_1^4+6*x_1^3-4*x_1^2-54*x_1-29 ] gap> gs:=GeneralizedEigenspaces(Rationals,hh);; gap> gsbas:=List(gs,i->Basis(i));; The eight polynomials of the eigenvalues, decomposed up to the field of rational number are given as the table 36, and the basis vectors in the eigenspace are allotted into the irreducible representations. The representations of I.3 and I.4 or I.5 and I.6 belong to the same eigenspace, specified by the same polynomial. The automorphism of the cyclotomic field (E(5)+E(5)^4→E(5)^2 + E(5)^3), which forms a group, interchanges these pairs of the irreducible representation, and consequently, also interchanges the vector solutions x of the equation p(H)·x=0. From the viewpoint of the Galois theory, Let 125 us review the situation. Take the last polynomial of the four degrees. The 8-th polynomial in the above table has C4 as the Galois group, and the four roots are transported with each other by the operation of this group( as 1 → 2 → 3 → 4 → 1, by a certain sequential order of the roots.) Remark. The Galois group of the polynomial is computed by GAP. gap> ge[8]; x_1^4+6*x_1^3-4*x_1^2-54*x_1-29 gap> GaloisType(ge[8]); 1 gap> TransitiveGroup(4,1); C(4) = 4 The command Galoistype(f ) computes the Galois Group of the polynomial f, and returns an integer i if the Galois group is isomorphic to TransitiveGroup(n, i), where n is the degree of f. Let us represent this Galois group concretely as the operation of the eigenvectors. The polynomial splits in four polynomials of one degree in the 15-th cyclotomic field Q15 . The generalized eigenvalue problem is solved again in this field, for which CF(15) is the notation in GAP. gap> ge2:=GeneralizedEigenvalues(CF(15),hh); [ x_1-3, x_1+1, x_1+5, x_1+(E(5)+3*E(5)^2+3*E(5)^3+E(5)^4), x_1+(3*E(5)+E(5)^2+E(5)^3+3*E(5)^4), x_1+(E(15)+E(15)^2+E(15)^4+3*E(15)^7+3*E(15)^8+E(15)^11+E(15)^13+E(15)^14), x_1+(E(15)+E(15)^2+3*E(15)^4+E(15)^7+E(15)^8+3*E(15)^11+E(15)^13+E(15)^14), x_1+(E(15)+3*E(15)^2+E(15)^4+E(15)^7+E(15)^8+E(15)^11+3*E(15)^13+E(15)^14), x_1+(3*E(15)+E(15)^2+E(15)^4+E(15)^7+E(15)^8+E(15)^11+E(15)^13+3*E(15)^14), 126 No. Polynomial 1 2 3 4 5 6 x_1-3 x_1+1 x_1+5 x_1+(E(5)+3*E(5)^2+3*E(5)^3+E(5)^4) x_1+(3*E(5)+E(5)^2+E(5)^3+3*E(5)^4) x_1+(E(15)+E(15)^2+E(15)^4+3*E(15)^7 +3*E(15)^8+E(15)^11+E(15)^13+E(15)^14) 7 x_1+(E(15)+E(15)^2+3*E(15)^4+E(15)^7 +E(15)^8+3*E(15)^11+E(15)^13+E(15)^14) 8 x_1+(E(15)+3*E(15)^2+E(15)^4+E(15)^7 +E(15)^8+E(15)^11+3*E(15)^13+E(15)^14) 9 x_1+(3*E(15)+E(15)^2+E(15)^4+E(15)^7 +E(15)^8+E(15)^11+E(15)^13+3*E(15)^14) 10 x_1^2-2*x_1-9 11 x_1^2-2*x_1-5 12 x_1^3+3*x_1^2-9*x_1-19 Eigenspace dimension 5 5 1 3 3 3 Irreducible representation 10 10 1 3 4 6 3 5 3 6 3 5 8 8 15 8 7 9 TABLE 37. The classification of the solutions of the generalized eigenvalue problem in Q15 . x_1^2-2*x_1-9, x_1^2-2*x_1-5, x_1^3+3*x_1^2-9*x_1-19 ] gap> gs2:=GeneralizedEigenspaces(CF(15),hh);; gap> gsbas2:=List(gs2,i->Basis(i));; Remark. In fact, the splitting field of the polynomial x_1^4+6*x_1^3-4*x_1^2-54*x_1-29 is not Q15 ( of the extension of eight degrees to Q), but Q(a) (of the extension of four degrees to Q), the latter of which is obtained by adding one of the solution “a” of this polynomial to Q. It is equal to Q(E(15)+E(15)^14) (denoted as NF(15,[1,14]) in GAP). To be exact, one should discuss in this field. The Galois group of Q15 is computed as. gap> GaloisGroup(CF(15)); 127 <group with 2 generators> gap> g:=GaloisGroup(CF(15)); <group with 2 generators> gap> g.1; ANFAutomorphism( CF(15), 11 ) gap> g.2; ANFAutomorphism( CF(15), 7 ) The generator g.1 is the map, replacing E(15)→ E(15)^11, of order 2, and g.2, E(15)→ E(15)^7, of order 4. The latter generator, in table 37, transports the 6th eigenspace to the 7-th, the 7-th to the 8-th, in turn, and the 10-th to the 6-th, generating the group C4 ( the forth cyclic group.), realizing the Galois group of the polynomial x_1^4+6*x_1^3-4*x_1^2-54*x_1-29 as the following computation verifies. gap> ge2[6]*ge2[7]*ge2[8]*ge2[9]=ge[8]; true gap> for j in [1..3] do; > Print(RootsOfPolynomial(ge2[6])[1]^g.2=RootsOfPolynomial(ge2[7])[1]); > Print(RootsOfPolynomial(ge2[7])[1]^g.2=RootsOfPolynomial(ge2[8])[1]); > Print(RootsOfPolynomial(ge2[8])[1]^g.2=RootsOfPolynomial(ge2[9])[1]); > Print(RootsOfPolynomial(ge2[9])[1]^g.2=RootsOfPolynomial(ge2[6])[1]); >od; truetruetruetruetruetruetruetruetruetruetruetrue gap> for j in [1..3] do; > Print(List(gsbas2[6][j],x->x^g.2)=gsbas2[7][j]); 128 > Print(List(gsbas2[7][j],x->x^g.2)=gsbas2[8][j]); > Print(List(gsbas2[8][j],x->x^g.2)=gsbas2[9][j]); > Print(List(gsbas2[9][j],x->x^g.2)=gsbas2[6][j]); >od; truetruetruetruetruetruetruetruetruetruetruetrue The first part of the above computation shows that the polynomial ge[8] (the 8-th solution in the field of rational numbers) splits into ge2[6],...,ge2[9], (the four solutions, from the 6-th to 9-th, in Q15 ). The second part verifies the C4 group property in the transportation of the eigenvalues (the root of ge2[6],...,ge2[9]) , and the third part verifies it in the transportation of the eigenvectors, gsbas2[6],...,gsbas2[9], each of which includes three basis (gsbas2[X][1],gsbas2[X][2],gsbas2[X][3]). The irreducible representations are transported as the following sequence by g.2, I.5 → I.6 → I.5 → I.6. In this sequence, the same types of the irreducible representations appear two times, but due to the duplicity of these representations in the whole eigenspace (as we have seen the decomposition of the trace representation I.Tr in the previous section) they are two distinct subspaces which belong to the same type of the irreducible representation. Therefore the Galois group has the order 4, running through the four distinct subspaces. The replacement of the eigenspaces by this group is given in table38, from which one could extract the Galois correspondence between sub-fields and subgroup. This example may be regarded as a hidden symmetry in the sense that the wave functions are transformed into each other by the operations of a group, which is different from that of the structural symmetry of the molecule. We can approach the hidden symmetry in another direction: there is an automorphism on the icosahedral group which interchanges these two irreducible representations. For simplicity, we reduce the problem in A5. (The icosahedral group is 129 <identity ...> 1 2 3 4 5 6 7 x2*x1 1235496 x2^2 1234589 x2 1235478 x2^-1*x1 1235478 x1 1234589 x2^-1 1235496 x2^2*x1 1234567 8 7 6 9 9 6 7 8 9 8 7 6 6 7 8 9 10 10 10 10 10 10 10 10 11 11 11 11 11 11 11 11 12 12 12 12 12 12 12 12 TABLE 38. The replacement of 12 eigenspaces by the automorphism in CF(15). The x1 and x2 are the generators of the Galois group, given as g.1 and g.2 in the article. constructed from this by the direct product with the inversion.) The generators of A5 are g1 and g2, (given as the permutations in the previous section.) gap> G:=Group(g1,g2);; gap> Irr(G);; The character table is as follows (written briefly by a list in GAP). [[ 1, 1, 1, 1, 1 ], [ 3, -E(5)-E(5)^4, -E(5)^2-E(5)^3, -1, 0 ], [ 3, -E(5)^2-E(5)^3, -E(5)-E(5)^4, -1, 0 ], [ 4, -1, -1, 0, 1 ], [ 5, 0, 0, 1, -1 ] ] The conjugacy classes are computed now. (As the list of the classes is given as the permutations, it is transformed to the representations by generators, to make the list as brief as possible. The symbols x1 and x2 represent g1 and g2 respectively.) gap> A:=List(ConjugacyClasses(G),Elements);; gap> B:=List(A,i->List(i,j->Factorization(G,j))); [ [ <identity ...> ], 130 [ x2^-1, x2, x2*x1*x2, x1*x2, x2^2*x1, x2*x1, x2^-1*x1^-1, x2^-2*x1^-1, x2^-1*x1^-1*x2^-1, x1^-1*x2^-1, x1*x2^2, x1^-1*x2^-2 ], [ x2^-2, x2^2, x2^2*x1*x2^2*x1^-1, x1*x2^2*x1^-1, (x1*x2^2)^2, (x2^-1*x1^-1*x2^-1)^2, (x2*x1*x2)^2, x2^-1*x1^-1*x2^-2*x1*x2, (x2^2*x1)^2, x1^-1*x2^-2*x1, (x2*x1)^2, x2^-1*x1*x2*x1 ], [ x2^-2*x1*x2, x2^-1*x1, x2*x1^-1, x2^2*x1^-1*x2^-1, x2^2*x1*x2^2, x1^-1*x2^-2*x1*x2*x1, x1*x2*(x2*x1)^2, (x2*x1*x2)^2*x1, (x2^2*x1)^2*x2*x1, x2^-1*x1^-1*x2^-2*x1*x2*x1, x2*x1*x2^2*x1^-1, (x2*x1*x2)^2*x2, (x2^2*x1)^2*x2, x2^-1*x1^-1*x2^-2*x1, x1*x2*x1 ], [ x2^2*x1*x2, x2^-1*x1*x2, x2^-2*x1, x1, x2^2*x1^-1, x1^-1, x2^-2*x1^-1*x2^-1, x2*x1^-1*x2^-1, x2^-1*x1^-1*x2^-2, x2*x1*x2^2, x2^-1*x1^-1*x2^-2*x1^-1, x1^-1*x2^-2*x1^-1, x1^-1*x2^-2*x1^-1*x2^-1, x1*x2^2*x1^-1*x2^-1, x1*x2^2*x1*x2, x1^-1*x2^-2*x1*x2, x1*x2^2*x1, x2*x1*x2^2*x1, x2*(x2*x1)^2, x2^-2*x1*x2*x1 ] ] The group of all automorphism is computed as gap> AUALL:=AutomorphismGroup(G); Take first of the generator, AUALL.1. gap> AUALL.1; [ (1,14,20)(2,15,16)(3,11,17)(4,12,18)(5,13,19)(6,58,22)(7,57,23) (8,56,24)(9,60,25)(10,59,21)(26,54,38)(27,53,37)(28,52,36)(29,51,40) (30,55,39)(31,44,50)(32,45,46)(33,41,47)(34,42,48)(35,43,49), (1,2,3,4,5)(6,11,16,21,26)(7,12,17,22,27)(8,13,18,23,28)(9,14,19,24,29) (10,15,20,25,30)(31,32,33,34,35)(36,41,46,51,56)(37,42,47,52,57) (38,43,48,53,58)(39,44,49,54,59)(40,45,50,55,60) ] -> [ (1,57,45)(2,56,44)(3,60,43)(4,59,42)(5,58,41)(6,55,47)(7,54,46)(8,53,50) 131 (9,52,49)(10,51,48)(11,35,28)(12,34,29)(13,33,30)(14,32,26) (15,31,27)(16,37,24)(17,36,25)(18,40,21)(19,39,22)(20,38,23), (1,59,9,16,55)(2,58,10,17,54)(3,57,6,18,53)(4,56,7,19,52) (5,60,8,20,51)(11,14,12,15,13)(21,35,30,38,50)(22,34,26,37,49) (23,33,27,36,48)(24,32,28,40,47)(25,31,29,39,46)(41,44,42,45,43) ] This automorphism maps g1 and g2 in the following way. gap> Factorization(G,Image(AUALL.1,g1)); x2*(x2*x1)^2 gap> Factorization(G,Image(AUALL.1,g2)); x1^-1*x2^-2*x1 The two conjugacy classes (of the second and of the third) are interchanged with each other, while the other classes are unchanged. This causes the exchange of the character values and that of the two irreducible representation (of No.2 and No.3). Let us verify this. The image of the automorphism on the elements of the conjugacy class 2 is computed and sorted as gap> imgCl2:=List(A[2], a ->Image(AUALL.1,a));; gap> SortedList(List(imgCl2,i->Factorization(G,i))); [ x2^-2, x2^2, x1^-1*x2^-2*x1, x1*x2^2*x1^-1, x2^-1*x1*x2*x1, (x2*x1)^2, (x1*x2^2)^2, (x2^-1*x1^-1*x2^-1)^2, x2^-1*x1^-1*x2^-2*x1*x2, (x2*x1*x2)^2, x2^2*x1*x2^2*x1^-1, (x2^2*x1)^2 ] The sorted list of the conjugacy class 3 is: gap> SortedList(B[3]); [ x2^-2, x2^2, x1^-1*x2^-2*x1, x1*x2^2*x1^-1, x2^-1*x1*x2*x1, (x2*x1)^2, (x1*x2^2)^2, (x2^-1*x1^-1*x2^-1)^2, x2^-1*x1^-1*x2^-2*x1*x2, (x2*x1*x2)^2, x2^2*x1*x2^2*x1^-1, (x2^2*x1)^2 ] 132 These two lists are identical. As the automorphism AUALL.1 has the order 2, the conjugacy classes 2 and 3, or the irreducible representation (of No.2 and No.3), are interchanged with each other by this automorphism. As the each element of the group A5 has a correspondence with one of the vertexes of the C60 molecule, this automorphism can be interpreted as a geometrical operation, that of the replacement of vertex. But this replacement of atoms does not conserve the bonding structure between nearest neighbors. This means that this replacement of atoms is not the symmetry operation on the C60 . H. The super-symmetries In this section, we will see that we can construct a symmetry higher than the icosahedral one. The icosahedral group is the direct product of A5 and I. If one of the components, the group A5, is extended to a larger group, the direct product is a super-group of the icosahedral one. The bonding structure of the C60 is representable by the pairs of the sequential numbers of the two vertexes, and it can be interpreted as the “orbit” of these pairs by the action of the icosahedral group. Then the orbit of the pairs of vertex, generated by the action of this new larger group, provides us with the bonding structure in the higher symmetry. The guiding principle is based the following observation: in the previous section, we have seen the existence of a certain group automorphism which interchanges two of the irreducible representation. If a group, including A5 and this group automorphism, could be constructed, the two three-dimensional irreducible representations will be merged into one. And if a molecule obeys this higher symmetry, the electronic structure will show different features, such as sixfold degeneracies. Now, concerning the extension of a group, the concept of the semi-direct product (with the automorphism group) is usable. For this purpose, we should construct a group composed from all of the automorphisms on 133 the group A5. Taking this automorphism group or its subgroups, we can construct the semi-direct product with the group A5. The necessary computation is executed in the following way. As the full automorphism group of A5 is too large, we take a small subgroup of this (a subgroup generated by one of the generators of this group). gap> G:=Group(g1,g2); gap> AUALL:=AutomorphismGroup(G); gap> p:=SemidirectProduct(Group(AUALL.1),G); The newly created group “p” is larger than A5 (the group “G”), and contains A5 as a subgroup. The three generators are given as gap> p.1; (3,16,22)(4,17,18)(5,13,19)(6,14,20)(7,15,21)(8,60,24)(9,59,25)(10,58,26) (11,62,27)(12,61,23)(28,56,40)(29,55,39)(30,54,38)(31,53,42)(32,57,41) (33,46,52)(34,47,48)(35,43,49)(36,44,50)(37,45,51) gap> p.2; (3,7,6,5,4)(8,28,23,18,13)(9,29,24,19,14)(10,30,25,20,15)(11,31,26,21,16)(12, 32,27,22,17)(33,37,36,35,34)(38,58,53,48,43)(39,59,54,49,44)(40,60,55,50, 45)(41,61,56,51,46)(42,62,57,52,47) gap> p.3; (1,2)(4,61)(5,11)(6,18)(7,57)(8,21)(9,28)(10,42)(12,46)(13,54)(14,39) (15,49)(16,59)(17,44)(19,51)(20,26)(22,47)(23,58)(25,34)(27,45)(29,36) (31,55)(32,43)(33,50)(37,38)(40,48)(41,60)(52,53) The first and the second generators are inherited from A5, and the third is the new one. They are represented by 62 symbols. The symbols from 3 to 62 correspond to the 60 vertexes in one C60 . The extension of the group introduces extra symbols “1” and “2”. We can give a geometrical interpretation to this group in the following way. 134 From the 62 symbols, we can construct a bonding system which contains 120 atoms, located in the double C60 molecules. The atoms will be indexed as [i,j] (i=3,..,62, and j=1,2) by the duplication of single C60 . This structure (C120 ) is regulated by the symmetry of the new extended group. The operation p.1 and p.2 are the rotations by 120 and 72 degrees. The operation p.3 interchanges 60 vertexes between two C60 shells. To see this, we have only to compute the orbit of the vertex at [I, J] by these operations. The permutation (1,2), applied to the latter element of the pairs, represents the exchange of vertexes between the two C60 . By means of a function defined below, the bonding structure in this new symmetry can be set up in matrices (of 120 × 120 dimension). If one bond is bridged between the vertex [i[1],i[2]] and [i[3],i[4]], the corresponding element in the networking matrix is set to be the unity. listforh:=function(A) local h,i1,i2,i3,i4,k,l,i; h:=List([1..120],i->List([1..120],j->0)); for i in A do i1:=i[1]; i2:=i[2]; i3:=i[3]; i4:=i[4]; k:=(i1-2)+60*(i2-1); l:=(i3-2)+60*(i4-1); h[k][l]:=1; h[l][k]:=1; od; return h; 135 end; The orbits of the double bond [3,1,4,1] (read as from [3,1] to [4,1]), the single bond [3,1,8,1], and the bond between the first and the second C60 ( such as [3,1,4,2], a possible example, taken par hazard) are computed into the lists “A1”,“B1”,“C1” as bellow. The bonding structures generated from them are represented by three matrices “a1”,“b1”,“c1”. gap> A1:=Orbit(p,[3,1,4,1],OnTuples); [ [ 3, 1, 4, 1 ], [ 16, 1, 17, 1 ], [ 4, 1, 5, 1 ], [ 3, 2, 61, 2 ], [ 22, 1, 18, 1 ], [ 21, 1, 22, 1 ], [ 59, 2, 44, 2 ], [ 17, 1, 13, 1 ], [ 5, 1, 6, 1 ], [ 61, 2, 11, 2 ], [ 16, 2, 23, 2 ], [ 4, 2, 41, 2 ], ...(omitted hereafter)... gap> B1:=Orbit(p,[3,1,8,1],OnTuples);; gap> C1:=Orbit(p,[3,1,4,2],OnTuples);; gap> a1:=listforh(A1);; gap> b1:=listforh(B1);; gap> c1:=listforh(C1);; In the C60 , the symmetry operation of the icosahedral symmetry includes the inversion. The inversion itself is not included in the new group, but we can furnish this operation with first sixty vertexes (from the third to the sixty-second) in the same manner as the icosahedral case. And the inversion in the second 60 vertexes can be written in the following way. The second sixty vertex are transported from the first sixty, by the operation p.3. If the inversions on the first and second 60 vertexes are denoted as I1, I2, they are related by the conjugation I2 := (p.3) · I1 · (p.3)−1 (symbolically written here). The inversion on the total system is written by their 136 union as   I1 0 0 I2   where the each entry is assumed to be 60×60-dimensional matrices. The destinations of the vertexes by the inversion “g3” in one C60 shell are stored in the list bellow. gap> ListInv:=List([1..60],i->OnPoints(i,g3)); The destinations of the vertexes in the first C60 shell to the second one, by the operation “p.3”, is stored in the list bellow. gap> mconjg:=List([3..62],i->OnPoints(i,p.3))-2; (In the last computation, we must extract 2 from the result, due to the numbering in the atoms, which are numbered from 3 to 62.) The inversions in the first and the second C60 shell are composed now (as matrices “invrs”, “invrs2”, and by uniting them, the inversion in the full system is computed, as in the matrix “ivfull”. gap> invrs:=List([1..60],i->List([1..60],j->0)); gap> mc:=List([1..60],i->List([1..60],j->0)); gap> for i in [1..60] do invrs[i][ListInv[i]]:=1; mc[i][mconjg[i]]:=1; od; gap> invrs2:=mc*invrs*mc^-1; gap> ivfull:=List([1..120],i->List([1..120],j->0)); gap> for i in [1..60] do 137 for j in [1..60] do ivfull[i][j]:=invrs[i][j]; ivfull[i+60][j+60]:=invrs2[i][j]; od; od; The generators of the group “p”, as the symmetry operations of the 120 atoms, are also represented by matrices. At first, we prepare the lists to represent the permutation. gap> l1:=List([1..2],j->List([3..62],i->(OnPoints(i,p.1)+60*(j-1)))); gap> l1:=Flat(l1); gap> l2:=List([1..2],j->List([3..62],i->(OnPoints(i,p.2)+60*(j-1)))); gap> l2:=Flat(l2); gap> l3:=List([1..2],j->List([3..62],i->(OnPoints(i,p.3)+60*(OnPoints(j,p.3)-1)))); gap> l3:=Flat(l3); The permutations are transformed to the matrix forms by this function. ListToMat:=function(l) local size,h,i,j; size:=Size(l); h:=List([1..size],i->List([1..size],j->0)); for i in [1..size] do h[i][l[i]]:=1; od; return h; end; 138 gap> P1:=ListToMat(l1-2); gap> P2:=ListToMat(l2-2); gap> P3:=ListToMat(l3-2); We must examine the congruence of the computed data, by checking whether the matrices representing the bonding structure are subject to the symmetry of the extended group. For this purpose, we can compute the commutators between these matrices (“a1”,“b1”,“c1”) and the generators of this group (P1, P2, P3 and ivfull): the results should be zero. The matrices “a1” and “b1” pass the test, but “c1” not. As the matrix “c1” is not conserved by the matrix of the inversion “ivfull” (or not commutable), the symmetrization is necessary for the construction of the Fock matrix. One of the Fock matrices is given as, fixing the values of the transfer integrals, gap> hh:=-2*a1-b1-1/2*(c1+ivfull*c1*ivfull); The generalized eigenvalue problems is solved up to in the field of rational numbers. gap> gev:=GeneralisedEigenvalues(Rationals,hh); [ x_1-3, x_1+1, x_1+3, x_1+7, x_1^2-4*x_1-13/4, x_1^2-4*x_1-2, x_1^2-2*x_1-81/4, x_1^2-2*x_1-9/4, x_1^2-12, x_1^2-21/4, x_1^3+5*x_1^2-4*x_1-24, x_1^4+6*x_1^3-6*x_1^2-60*x_1-36 ] gap> ges:=GeneralisedEigenspaces(Rationals,hh); [ <vector space over Rationals, with 10 generators>, <vector space over Rationals, with 15 generators>, <vector space over Rationals, with 1 generators>, <vector space over Rationals, with 1 generators>, <vector space over Rationals, with 8 generators>, 139 <vector space over Rationals, with 12 generators>, <vector space over Rationals, with 8 generators>, <vector space over Rationals, with 8 generators>, <vector space over Rationals, with 10 generators>, <vector space over Rationals, with 8 generators>, <vector space over Rationals, with 15 generators>, <vector space over Rationals, with 24 generators> ] The group is composed and the irreducible representation is computed now. gap> irrg:=Irr(Group(P1,P2,P3,ivfull)); [ Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 1, -1, -1, -1, -1, -1, 1, 1, 1, 1, 1, 1, 1, -1 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 1, -1, -1, -1, 1, 1, 1, -1, 1, -1, 1, -1, -1, 1 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 1, 1, 1, 1, -1, -1, 1, -1, 1, -1, 1, -1, -1, -1 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 4, -2, 1, 0, 1, -2, 0, -1, -1, 1, 1, 0, 4, 0 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 4, 2, -1, 0, -1, 2, 0, -1, -1, 1, 1, 0, 4, 0 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 4, -2, 1, 0, -1, 2, 0, 1, -1, -1, 1, 0, -4, 0 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 4, 2, -1, 0, 1, -2, 0, 1, -1, -1, 1, 0, -4, 0 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), 140 [ 5, 1, 1, -1, 1, 1, 1, 0, 0, -1, -1, 1, 5, -1 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 5, -1, -1, 1, -1, -1, 1, 0, 0, -1, -1, 1, 5, 1 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 5, 1, 1, -1, -1, -1, 1, 0, 0, 1, -1, -1, -5, 1 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 5, -1, -1, 1, 1, 1, 1, 0, 0, 1, -1, -1, -5, -1 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 6, 0, 0, 0, 0, 0, -2, 1, 1, 0, 0, -2, 6, 0 ] ), Character( CharacterTable( <matrix group of size 240 with 4 generators> ), [ 6, 0, 0, 0, 0, 0, -2, -1, 1, 0, 0, 2, -6, 0 ] ) ] Solution x_1-3 x_1+1 x_1+3 x_1+7 x_1^2-4*x_1-13/4 x_1^2-4*x_1-2 x_1^2-2*x_1-81/4 x_1^2-2*x_1-9/4 x_1^2-12 x_1^2-21/4 x_1^3+5*x_1^2-4*x_1-24 x_1^4+6*x_1^3-6*x_1^2-60*x_1-36 Representation [ 11, 12 ] [ 10, 11, 12 ] [2] [1] [6] [ 13 ] [8] [7] [ 10 ] [5] [9] [ 14 ] Dimension 5 5 1 1 4 6 4 4 5 4 5 6 TABLE 39. The correspondence between the solutions of the generalized eigenvalue problem and the irreducible representations. The left column shows the polynomial, the center the corresponding irreducible representation by sequential numbers, and the right the dimension of the irreducible representation. The four eigenvalues, as the solutions of “x_1^4+6*x_1^3-6*x_1^2-60*x_1-36”, composed by the <vector space over Rationals, with 24 generators>, are of 141 the sixfold degeneracies, allotted to the 14th irreducible representation, which we have expected to see in this structure. Although this example is rather an imaginary one, it suggests us the importance of the concept of “group extension” in the artificial design of the electronic structure in molecular systems of high symmetries. Usually, we argue the electronic structure from the viewpoint of the splitting of the degeneracies in accordance with the reduction of the symmetry, but we will be able to proceed in the inverse direction by actually composing the “super-group”. I. Remarks to this section In this section, with the viewpoint of the group theory, we analyze the electronic properties of C60 . The group theoretical properties of the icosahedral symmetry of C60 are computed by a computer algebra program package GAP, and the obtained results are utilized to the analysis. We started in a traditional way in order to classify the eigenstates into irreducible representations. However, the possible applications of the computer algebra are not limited to this sort of the rather classical analysis, since we can construct the group and extract the group theoretical properties more freely and adroitly by the computer algebra than by the utilization of the group theoretical data given in some references. We can construct the all of the subgroups of the icosahedral symmetry. By means of the “orbitals” of the movement of the vertex by the symmetry operations, the correspondence between the subgroup and the possible deformation of the molecule can be established. The change in the energy spectra and the existence of the zero or nonzero transition moments could be discussed qualitatively, without massive computation. Furthermore, through the construction of the semi-direct group of the icosahedral group, the structure equipped with a symmetry higher than that of the icosahedral symmetry, can be generated. The interest with relation to the “molecular design” is as follows: the higher symmetry 142 in the semidirect product merges some of the irreducible representations into one and gives rise to a higher degeneracy of the energy spectra. These examples suggest the importance of the group theoretical viewpoint in the material design, re-armored (or revived) by the modern computational tools, developed as “computer algebra” among mathematicians. VIII. ANALYSIS OF VIBRATIONAL MODE IN C60 In this section, the computation of the vibrational modes of the C60 by means of the computer algebra is demonstrated. The C60 molecule has the unique symmetry, comparable to one soccer-ball (see Fig. 6). The symmetry of the molecule is described by the icosahedral group, and this group is represented by the permutation of 60 vertexes or the group of rotation matrices operating on them. Owing to this high symmetry, the molecule shows peculiar electronic and dynamic properties, both of scientific and industrial interest, and the vibrational mode might be one of the principal phenomena in governing the quantum dynamics in it. As a tool of the computation, we utilize the software GAP, developed in the field of the pure mathematics[12]. This software can construct the symmetry group and compute the irreducible representations and other group-theoretical properties and enable us to put into practice the application in the material science, possibly in a modernized way. The computation presented hereafter will be useful to the working physicists and the students, who want to deepen the understanding of the group theory that is given in the textbooks[2, 4, 5, 8, 9]. 143 A. The vibrational modes of C60 The atoms and the pentagons in the molecule are provided with sequential numbers as in Fig. 7 in the preceding section. The symmetry operations on the spatial vectors on the vertexes of C60 are made by the direct products of the two types of matrices. The first type Ri represents the replacement of 60 vertexes and the second type Gi the rotation and the reflection of the spatial vectors. The symmetry operations on the spatial vectors placed into 60 vertexes are represented as this: Oi = Rif ⊗ Gi , (86) where Ri and Gi should represent the equivalent operation, and the superscript f is the group automorphism in the group R. The matrices generates the icosahedral group, and the trace of Oi provides us with the trace representation χtr (Oi )(not irreducible). The decomposition of the trace representation by means of the irreducible representations indicates the distinct modes of the vibration, and the projection operators composed by Oi can generate the basis vectors for them. And to obtain the vibrational mode, the degrees of the freedoms of the translation and the rotation of the molecule should be removed: χtr − χT rans − χRot . (87) The presence of the automorphism f is inevitable. Consider the operation r = (1, 2, 3, 4, 5) · · · (· · · ). This operation, as the rotation G, acts on the dislocated ver144 texes (V ([j] → V [j] + d[j]): G(V [1] + d[1]) = V [2] + G · d[1] G(V [2] + d[2]) = V [3] + G · d[2] G(V [3] + d[3]) = V [4] + G · d[3] G(V [4] + d[4]) = V [5] + G · d[4] G(V [5] + d[5]) = V [1] + G · d[5] ····················· . The operation on d[i] should be represented as  0 0 0 0 G ···  G   0   0   0  .. .  d[1]     d[2]  0 0 0 0 ···        G 0 0 0 · · ·   d[3]      d[4]  0 G 0 0 ···        0 0 G 0 · · ·   d[5]   .. .. .. .. .. . . . . . so that the rotation to d[j] should be located at the correct position, while the permutation r is represented in the form which is the transposition of that operation:  0 1 0 0 0 ···  0   0   0   1  .. .   0 1 0 0 ···    0 0 1 0 ···    0 0 0 1 ···    0 0 0 0 ···   .. .. .. .. . . . . 145 It happens that the permutation r should act on d[j] as its transposition, or its inverse. And the product of the operations is given by (R1 , G1 ) ◦ (R2 , G2 ) = (R2 · R1 , G1 · G2 ), with inverse directions for Ri and Gi . This observation shows the inadequacy of the simple definition of the direct product Ri ⊗ Gi as the symmetry operation. However, the naive redefinition, such as Ri−1 ⊗ Gi for all i, does not work well. Now we can make use the fact the conjugation (A → M · A · M−1 ) is an automorphism which preserves the sequential order of the group multiplication; we should find the elements which inverts the generators of the group by the conjugation in order to define the exact symmetry operations, the products of which go from right to left both for Rif and Gi . Indeed this can be done in the final stage of the computation. So, before stepping into it, let us execute the naive computation (with the direct product Ri ⊗ Gj ). Concerning the dimension counting of the basis set, such a computation does not fail. The icosahedral group is defined in several ways. We prepare the twelve points, located at the centers of the pentagons in the molecule (or the vertexes in the icosahedron) as follows. E(5) is the fifth root of the unity, exp(2πi/5), and the symbolically presented data are all real. (The data and results are given by the expressions in GAP.) 1 [0,0,1], 2 [2/5*E(5)-2/5*E(5)^2-2/5*E(5)^3+2/5*E(5)^4, 0, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4], 3 [-3/5*E(5)-2/5*E(5)^2-2/5*E(5)^3-3/5*E(5)^4, 1/5*E(20)-1/5*E(20)^9-2/5*E(20)^13+2/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4], 4 [2/5*E(5)+3/5*E(5)^2+3/5*E(5)^3+2/5*E(5)^4, 146 2/5*E(20)-2/5*E(20)^9+1/5*E(20)^13-1/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4], 5 [2/5*E(5)+3/5*E(5)^2+3/5*E(5)^3+2/5*E(5)^4, -2/5*E(20)+2/5*E(20)^9-1/5*E(20)^13+1/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4], 6 [-3/5*E(5)-2/5*E(5)^2-2/5*E(5)^3-3/5*E(5)^4, -1/5*E(20)+1/5*E(20)^9+2/5*E(20)^13-2/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4], 7 [0,0,-1], 8 [-2/5*E(5)+2/5*E(5)^2+2/5*E(5)^3-2/5*E(5)^4, 0, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4], 9 [3/5*E(5)+2/5*E(5)^2+2/5*E(5)^3+3/5*E(5)^4, -1/5*E(20)+1/5*E(20)^9+2/5*E(20)^13-2/5*E(20)^17, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4], 10 [-2/5*E(5)-3/5*E(5)^2-3/5*E(5)^3-2/5*E(5)^4, -2/5*E(20)+2/5*E(20)^9-1/5*E(20)^13+1/5*E(20)^17, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4], 11 [-2/5*E(5)-3/5*E(5)^2-3/5*E(5)^3-2/5*E(5)^4, 2/5*E(20)-2/5*E(20)^9+1/5*E(20)^13-1/5*E(20)^17, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4], 12 [3/5*E(5)+2/5*E(5)^2+2/5*E(5)^3+3/5*E(5)^4, 1/5*E(20)-1/5*E(20)^9-2/5*E(20)^13+2/5*E(20)^17, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4] These twelve points are transported among themselves by these three operations (g1,g2,g3). The three operations (g1,g2,g3) induces the three permutations (f1,f2,f3) 147 on the 12 vertexes of the icosahedron, and(r1,r2,r3) on 60 vertexes in the C60 . gap> g1:=[ [ 3/10*E(5)+1/5*E(5)^2+1/5*E(5)^3+3/10*E(5)^4, 1/10*E(20)-1/10*E(20)^9-1/5*E(20)^13+1/5*E(20)^17, 2/5*E(5)-2/5*E(5)^2-2/5*E(5)^3+2/5*E(5)^4 ], [ -1/2*E(20)+1/2*E(20)^9, -1/2*E(5)-1/2*E(5)^4, 0 ], [ -3/5*E(5)-2/5*E(5)^2-2/5*E(5)^3-3/5*E(5)^4, -1/5*E(20)+1/5*E(20)^9+2/5*E(20)^13-2/5*E(20)^17, 1/5*E(5)-1/5*E(5)^2-1/5*E(5)^3+1/5*E(5)^4 ] ]; gap> g2:=[ [ 1/2*E(5)+1/2*E(5)^4, 1/2*E(20)-1/2*E(20)^9, 0 ], [ -1/2*E(20)+1/2*E(20)^9, 1/2*E(5)+1/2*E(5)^4, 0 ], [ 0, 0, 1 ] ]; gap> g3:=[ [ -1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ]; gap> G:=Group(g1,g2,g3); gap> f1:=(1,2,3)(4,6,11)(5,10,12)(7,8,9); gap> f2:=(2,3,4,5,6)(8,9,10,11,12); gap> f3:=(1,7)(2,8)(3,9)(4,10)(5,11)(6,12); gap> F:=Group(f1,f2,f3); gap> r1:=( ( 1, 14, 20)( 6, 58, 22)( 2, 15, 16)( 7, 57, 23)( 3, 11, 17)( 8, 56, 24)( 4, 12, 18)( 5, 13, 19) 9, 60, 25)( 10, 59, 21) ( 31, 44, 50)( 32, 45, 46)( 33, 41, 47)( 34, 42, 48)( 35, 43, 49) ( 36, 28, 52)( 37, 27, 53)( 38, 26, 54)( 39, 30, 55)( 40, 29, 51); gap> r2:=( 1, 2, 3, 4, 5)( 6, 11, 16, 21, 26)( 148 7, 12, 17, 22, 27) ( 8, 13, 18, 23, 28)( 9, 14, 19, 24, 29)( 10, 15, 20, 25, 30)( 31, 32, 33, 34, 35) ( 36, 41, 46, 51, 56)( 37, 42, 47, 52, 57)( 38, 43, 48, 53, 58)( 39, 44, 49, 54, 59) ( 40, 45, 50, 55, 60); gap> r3:=( ( 1, 31)( 2, 32)( 3, 33)( 4, 34)( 5, 35)( 6, 36)( 7, 37)( 8, 38) 9, 39)( 10, 40)( 11, 41)( 12, 42)( 13, 43)( 14, 44)( 15, 45)( 16, 46)( 17, 47) ( 18, 48)( 19, 49)( 20, 50)( 21, 51)( 22, 52)( 23, 53)( 24, 54)( 25, 55)( 26, 56) ( 27, 57)( 28, 58)( 29, 59)( 30, 60); gap> R:=Group(r1,r2,r3); gap> Irr(R); The command “Irr(R)” returns the character table of R, a part of which is listed in table 40: Rep N.1 N.2 N.3 N.4 N.5 N.6 N.7 N.8 N.9 N.10 Dim 1 1 3 3 3 3 4 4 5 5 [f1,f2,f3] [ 1, 1, 1 ] [ 1, 1, -1 ] [ 0,-E(5)-E(5)^4, 3 ] [ 0,-E(5)^2-E(5)^3, 3 ] [ 0,-E(5)-E(5)^4, -3 ] [ 0,-E(5)^2-E(5)^3, -3 ] [ 1, -1, 4 ] [ 1, -1, -4 ] [ -1, 0, 5 ] [ -1, 0, -5 ] Ag Au F2g F1g F2u F1u Hg Hu Gg Gu TABLE 40. The characters of the generators in ten irreducible representations of the icosahedral group. We use the group R as the standard. The isomorphism from R to G is set up at the three generators (from [R.1,R.2,R.3] to [G.1,G.2,G.3].) gap> hom:=GroupHomomorphismByImages(R,G,[R.1,R.2,R.3],[G.1,G.2,G.3]); 149 It is necessary to judge the irreducible representations to which the translation belongs. The projectors (applicable to three-dimensional spatial vectors) are computed now for this purpose. They are defined as P (p) = l(p) X (p)∗ χ (T ) · O(T ) |G| T ∈G by summing up the elements T of the group G, where l(p) is the dimension of the p-th irreducible representation, |G| the order of the group, χ(p) the character, O(T ) the operation of the group. The gap script is given as: Projopr:=function(irr,Em,hom) # # irr: Irreducible representation of the group. # Em: Elements in the group. # hom: Homomorphism of the permutation group to the matrix group # return List(irr,i->Sum(List(Em,j->j^i*Image(hom,j)))/Size(Em)*i[1]); end; In this function, the elements “j” (in the list “Em”) in the given group are mapped to another group by the homomorphism “hom”. The characters are computed in the first group (with the irreducible representation “irrep”) and multiplied to the images of “j” in the second group. The summation over them produces the projector. In this definition, the projectors of the matrix group G are composed through the isomorphism from the permutation group R to G, not directly from G. This is a precaution to avoid a possible confusion, since the character tables of R and G, computed by GAP, might be presented in the slightly different orders, even if these two groups are isomorphic. The result is given in table 41. The non-zero one exists 150 only in the representation N.6, so we conclude the spatial translation belongs to this representation. N.1 N.2 N.3 N.4 N.5 N.6 N.7 N.8 N.9 N.10 [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 0 0 0 0 0 0 0 0 0 ], ], ], ], ], ], ], ], ], ], Operator [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ], [ [ [ [ [ [ [ [ [ [ 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 0 0 0 0 1 0 0 0 0 ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] ] TABLE 41. The projection operators for the spatial vectors. . There is another necessity to judge the representation of the spatial rotations. The group operation T on the rotation matrix M is defined as the product from both sides, T · M · Tt . This operation should be treated with care. This product is also a rotation matrix, but the summation of such products not. Thus the projection operator defined as above will not generate the proper rotation matrix if it is naively applied to the rotation matrices. Concerning this, the exponential map is useful, which is defined as M = exp(A), T · M · Tt = exp(T · A · Tt ). The pre-image A of the rotation M is the skew-symmetric matrix. The projection operator should be applied to the linear space of these pre-images. The gap computation for the determination of the irreducible representation is now presented. The 151 projectors are computed by the formula P (p) (A) = l(p) X (p)∗ χ (T )T · A · T t |G| T ∈G by means of the function ProjoprR:=function(irr,Em,MM,hom) return List(irr,i->Sum(List(Em,j->j^i*Image(hom,j) *MM*TransposedMat(Image(hom,j))))/Size(Em)*i[1]); end; The computation is done now. gap> x:=Indeterminate(Rationals,"x"); gap> y:=Indeterminate(Rationals,"y"); gap> z:=Indeterminate(Rationals,"z"); gap> MM:=[[0*x,x,y],[-x,0*x,z],[-y,-z,0*x]]; gap> ProjoprR(Irr(R),Elements(R),MM,hom); Remark. The expressions such as 0 and 0*x signify different objects. The former is the zero as a number, and the latter the zero monomial. If one promiscuously uses 0 and 0*x, it might cause some errors. The non-zero projector is the fourth one. The spatial rotations belong to the fourth representation (N.4). Remark. In the basis vectors of the vibrational mode computed hereafter, those which 152 N.1 N.2 N.3 N.4 N.5 N.6 N.7 N.8 N.9 N.10 Operator [ [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ] ] [ [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ] ] [ [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ] ] [ [ 0, x, y ], [-x, 0, z ], [-y, -z, 0 ] ] [ [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ] ] [ [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ] ] [ [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ] ] [ [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ] ] [ [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ] ] [ [ 0, 0, 0 ], [ 0, 0, 0 ], [ 0, 0, 0 ] ] TABLE 42. The projection operators for the rotations. . belong to the fourth irreducible representation, include the elements such as   Ii  0   0  . ..  0 0 ···   Ii 0 · · ·  ·v  0 Ii · · ·   .. .. . . where v are the basis vector in the trivial irreducible representation (invariant by the symmetry operation), and Ii (i = 1, 2, 3) are       0 0 0  0 0 1  0 1 0       I1 =  −1 0 0  , I2 =  0 0 0  , I3 =  0 0 1  .       0 −1 0 −1 0 0 0 0 0 These vectors represent the degrees of freedom of the rotation. They are set of 60 of three-dimensional vectors, defined on each vertex, and located in the tangent plane to the sphere where the 60 vertexes are placed. Now we construct the symmetry operation (Oi = Ri ⊗ Gi ) on the spatial vectors 153 on the 60 vertexes. The following function converts a permutation Ri to an integer matrix which represents the replacement of vertexes. ListToMat:=function(l) local size,h,i,j; size:=Size(l); h:=List([1..size],i->List([1..size],j->0)); for i in [1..size] do h[i][l[i]]:=1; od; return h; end; The following function constructs the direct product of Ri and Gi . The isomorphism “iso” from the group R to G convert an element “rr” (in R) to the equivalence in G exactly. In the generated matrix, the non-zero entries in Ri are replaced by Gi (the rotation), as this.    0 1 0 · · · 0    0 Gi 0 · · ·     1 0 0 ··· 0   Gi 0 0 · · ·    Ri =  . → R ⊗ G = i i   .. . .   .    0 0 0 ··· 1 0 0 0 ···  0   0   ..  .   Gi LargeMatrix:=function(rr,iso) local l,rmat,rrimg,i,i1,i2,n,m; l:=ListPerm(rr,60); rmat:=List([1..Size(l)*3],i->List([1..Size(l)*3],j->0)); rrimg:=Image(iso,rr); for i in [1..Size(l)] 154 do i1:=i-1;i2:=l[i]-1; for n in [1..3] do for m in [1..3] do rmat[3*i1+n][3*i2+m]:=rrimg[n][m]; od; od; od; return rmat; end; This function at first prepares a 180×180 matrix, in order to represent the symmetry operation on the vectors at the vertex of C60 . The symmetry operation of the group element “rr” is transformed by the isomorphism “iso” to Gi and placed in the large matrix, by means of the list “l” which stores the data of the permutation Ri . The projector function, composed from the direct product, is defined as: ProjoprE:=function(irr,Em,hom) # # irr:Irreducible representation. # Em :Elements of the group R. # hom:Isomorphism from the group R to the group G. # return List(irr,i->Sum(List(Em,j->j^i*LargeMatrix(j,hom)))/Size(Em)*i[1]); end; We can make now the basis set of the mode of deformation. The projectors are 155 placed on the list of ten matrices (of dimension 180) (PRJE[1]...PRJE[10]), and each of them does the projection on each irreducible representations (N.1...N.10). The basis vectors for the each vibrational mode are generated from the column vectors of the corresponding projector. In the computation, the list “BASSIZE” gives us the dimensions of each mode. gap> PRJE:=ProjoprE(Irr(R),Elements(R),hom);; gap> BAS:=List(PRJE,i->BaseMat(TransposedMat(i)));; gap> BASSIZE:=List(BAS,Size); [ 2, 1, 12, 12, 15, 15, 24, 24, 40, 35 ] gap> BAS; [ [ [ 1, E(20)-E(20)^9+E(20)^13-E(20)^17, 0, 2*E(5)+E(5)^2+E(5)^3+2*E(5)^4, -E(20)^13+E(20)^17, 0, -2*E(5)-2*E(5)^4, 0, 0, 2*E(5)+E(5)^2+E(5)^3+2*E(5)^4, E(20)^13-E(20)^17, 0, 1, -E(20)+E(20)^9-E(20)^13+E(20)^17, 0, -1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4, 1/5*E(20)-1/5*E(20)^9+3/5*E(20)^13-3/5*E(20)^17, 12/5*E(5)+8/5*E(5)^2+8/5*E(5)^3+12/5*E(5)^4, -6/5*E(5)-4/5*E(5)^2-4/5*E(5)^3-6/5*E(5)^4, ........................................... ........................................... Remark. One might demand numerical basis as well as symbolic one. The latter can be easily modified into quasi-Fortran form. For example, by replacements of strings, a formula such as f:=-1/5*E(5)+1/5*E(5)^2+1/5*E(5)^3-1/5*E(5)^4; is rewritten as 156 FUNCTION E(I) INTEGER I COMPLEX*16 E REAL*8 TWOPI TWOPI=8.0D0*ATAN(1.0D0) E=DCMPLX(COS(TWOPI/I),SIN(TWOPI/I)) RETURN END SUBROUTINE(f) COMPLEX*16 f,E f=-1./5*E(5)+1./5*E(5)**2+1./5*E(5)**3-1./5*E(5)**4 RETURN END At present projectors “PRJE[i]” are defined by the “bare” forms, using the direct product Ri ⊗ Gi . and they should be modified to the correct ones, such as Mf · f PRJE[i] · M−1 f , composed by the direct product Ri ⊗ Gi , where f is a conjugation which inverts the generators of the permutation group R. There are two candidates for such automorphisms. gap>RPC:=Filtered(Elements(R),x->List([R.1,R.2,R.3],i->i^x)=[R.1^-1,R.2^-1,R.3^-1]); [ (1,4)(2,3)(6,21)(7,25)(8,24)(9,23)(10,22)(11,16)(12,20)(13,19)(14,18)(15, 17)(27,30)(28,29)(31,34)(32,33)(36,51)(37,55)(38,54)(39,53)(40,52)(41, 46)(42,50)(43,49)(44,48)(45,47)(57,60)(58,59), (1,34)(2,33)(3,32)(4,31)(5,35)(6,51)(7,55)(8,54)(9,53)(10,52)(11,46)(12, 50)(13,49)(14,48)(15,47)(16,41)(17,45)(18,44)(19,43)(20,42)(21,36)(22, 40)(23,39)(24,38)(25,37)(26,56)(27,60)(28,59)(29,58)(30,57) ] 157 gap> RPC[1]*r3=RPC[2]; true The conjugation is computed as a matrix through this function. ConjugMatrix:=function(rr) local l,rmat,vmat,i,i1,i2,n,m; l:=ListPerm(rr,60); vmat:=List([1..Size(l)*3],i->List([1..Size(l)*3],j->0)); for i in [1..Size(l)] do i1:=i-1;i2:=l[i]-1; for n in [1..3] do vmat[3*i1+n][3*i2+n]:=1; od; od; return vmat; end; gap> PCM:=ConjugMatrix(RPC[1]); gap> PRJEC:=List(PRJE,i->i^PCM);; gap> BASC:=List(PRJEC,i->BaseMat(TransposedMat(i)));; gap> BASCSIZE:=List(BASC,Size); [ 2, 1, 12, 12, 15, 15, 24, 24, 40, 35 ] In fact, in order to obtain the correct vibrational modes, it is enough to multiply the matrix “PCM” for the conjugation to the basis vectors “BAS” computed by the bare 158 projectors. If we neglect such corrections, it happens that the “breathing mode” would not belong to the trivial representation. To check the validity, the characters of χT r and those by the irreducible representations are computed in the two lists “CTRC” and “CIRR”. The irreducible representation of χV ec is located at the sixth component of CIRR, and that of χRot is at the fourth. CTRC:=List(Elements(R),i->Trace(ListToMat(ListPerm(i,60)))); CIRR:=List(Irr(R),r->List(Elements(R),i->i^r)); The χT r × χV ec is computed and decomposed. gap> List([1..Size(R)],i->CTRC[i]*CIRR[6][i])*TransposedMat(CIRR)/Size(R); [ 2, 1, 4, 4, 5, 5, 6, 6, 8, 7 ] gap> List([1..10],i->BASSIZE[i]/Irr(R)[i][1]); [ 2, 1, 4, 4, 5, 5, 6, 6, 8, 7 ] These results are the multiplicities to each irreducible representation (in theory and in computation) and shows the validity of the computation. The direct product of the characters (i.e. the vibrational mode plus extra terms) is decomposed as χtr ×χV ec = 2·N.1+1·N.2+4·N.3+4·N.4+5·N.5+5·N.6+6·N.7+6·N.8+8·N.9+7·N.10. B. One technical problem The modes of vibrations are decomposed into irreducible representations, some of which appear with multiplicities. Take one of the basis vectors, computed in the previous section, and apply the symmetry operations on it: for example, one of those which belong to the tenth irreducible representation. In the following computation 159 the two lists “EMR” and “AR” contains the group elements in R and the whole of the symmetry operation, “vs” is the set of the generated vectors, “vsb”, the basis set to it, and the command RankMat(...) computes the dimension of the vector space. gap> EMR:=Elements(R) ;; gap> AR:=List(Elements(R),j->LargeMatrix(j,hom));; gap> vs:=List(AR,x->x*BAS[10][1]); gab> vsb:=BaseMat(vs); gap> RankMat(vs); 25 The chosen vector generates the vector space of dimension 25 by the symmetry operation.(The basis vectors generated in this way are “vertex-wise” orthogonal to those in the trivial representation: the basis vectors are the set of 60 small threedimensional vectors, and the small vectors of the former and the latter are orthogonal at each vertex. The vectors, “vertex-wise” orthogonal to those in the trivial representation, make the subspace that includes several copies of the proper irreducible space.) But the tenth irreducible representation is of dimension 5. The generated vectors span the copies of this irreducible space, not confined to one of them. For the practical purpose, we should remove the degrees of freedoms which correspond to those of the translation and the rotation. And it is enough to the reset the dislocated origin or the disorientated axes at the proper positions when we make the structures altered by vibrations. Thus the technical problem of this kind might not be of importance. However, we can divide the multiplied irreducible spaces, so that the each component is proper minimal one, separated with each other, kept invariant under the symmetry operation. In this section, two kinds of such constructions are demonstrated. (p) The first is to use the projectors composed from matrix representations Dkl (OT ), 160 not from characters, as was explained in the previous section. The formula is given again: (p) Pkl = lp X (p)∗ D (OT ) · OT . |G| T ∈G kl The basis vectors are transformed by the matrix representation, forming the subspace which has the proper dimension of the irreducible representation. We can make the (p) plural irreducible spaces from the column vectors of the projector one of the Pkk , the diagonal part of the projectors. Unfortunately, even in this construction, the generated irreducible spaces overlap with each other, not being separated. Thus we should make the separation, projecting out overlapping subspaces. At first the matrix representation is computed in the following way. (The GAP, in each run, returns the different results concerning the matrix representation, since we can determine them up to the isomorphism, but not furthermore; there are plural possibilities.) gap> irrR:=Irr(R);; gap> irrRM:=IrreducibleRepresentations(R);; gap> EMR:=Elements(R);; gap> AM:=List(EMR,j->LargeMatrix(j,hom));; (p) The projector Pij is defined as a function PRJR:=function(i,j,p) local C,REP,dim; REP:=irrRM[p]; dim:=Trace(()^REP); C:=List([1..Size(AM)],k->AsList(EMR[k]^REP)[i][j]*AM[k]); return ComplexConjugate(Sum(C))/Size(AM)*dim; end; 161 (10) Take the P1,1 component of the projector. The basis vectors are generated from column vectors of this. As the GAP software defines the vector set by row vectors, The basis sets are computed from the transposed matrix. The basis set of the vector (10) (10) space is listed in “vtb”. The projectors P1,1 , ..., P5,1 are stored now for the afterward usage.(As for the matrix representations, see Appendix I.) gap> vt:=TransposedMat(PRJR(1,1,10));; gap> vtb:=BaseMat(vt);; gap> PRJRS:=List([1..5],i->PRJR(i,1,10));; The validity of the transformation of the partner functions is checked now. gap> PRJR(2,2,10)*PRJR(2,1,10)*vtb[1]=PRJR(2,1,10)*vtb[1]; true This function at first puts p-th irreducible matrix representation in “REP”. (The irreducible matrix representations are already stored in “irrRM”.) For a group element “x”, the matrix representation D(p) (x) is computed by “x∧ REP”. The dimension of the irreducible representation “dim” is computed from the trace of the matrix representation of the unit of the group ( represented by “( )”). Each group element “x” (p) (stored in the list “EMR”) is transformed to Dij (x), and multiplied to the equivalent matrix operation on the spatial vectors on the vertex of C60 (stored in the list “AM”). The summation over them, through the complex conjugation, makes the projector. Each of the basis vector x generates the five-dimensional, irreducible vector spaces (10) (10) under the symmetry operation, and the vector space is composed of P1,1 ·x, ..., P5,1 · x. In the following computations, the irreducible vector space for each of basis vector is stored in the list “zz” (in the seven component zz[1],...,zz[7]). However, these 162 irreducible spaces are overlapped with each other. The computations of the inner products show this. gap> zz:=List(vtb,y->List(List([1..5],i->PRJRS[i]*y)));; gap> List(zz,a->List(zz,b->RankMat(a*TransposedMat(b)))); [ [ 5, 0, 5, 0, 0, 0, 0 ], [ 0, 5, 0, 0, 0, 0, 0 ], [ 5, 0, 5, 5, 0, 0, 0 ], [ 0, 0, 5, 5, 0, 5, 0 ], [ 0, 0, 0, 0, 5, 0, 0 ], [ 0, 0, 0, 5, 0, 5, 5 ], [ 0, 0, 0, 0, 0, 5, 5 ] ] We now project out the overlapping between irreducible subspaces. We start from the one of the irreducible space, say zz[1], and construct the orthogonal space to it. (10) One of the basis vectors in the latter space, if the projector P1,1 is applied to it, (10) belongs to the irreducible space invariant by P1,1 . This vector is chosen as the generator of another irreducible space. Similarly, we construct the orthogonal space to the set of the irreducible spaces obtained until now, from this, we extract the generator of another irreducible space and proceed so on. gap> B:=ShallowCopy(zz[1]);; gap> D:=[ShallowCopy(zz[1])];; gap> for n in [2..Size(zz)] do OV:=BaseOrthogonalSpaceMat(B);; xx:=BaseMat(List(OV,x->PRJRS[1]*x))[1]; vv:=List(List([1..5],i->PRJRS[i]*xx)); Append(B,vv); Append(D,[vv]); od; We generated seven separated irreducible spaces; let us check this (by computing the inner products of vectors): 163 gap> List(D,a->List(D,b->RankMat(a*TransposedMat(b))));; [ [ 5, 0, 0, 0, 0, 0, 0 ], [ 0, 5, 0, 0, 0, 0, 0 ], [ 0, 0, 5, 0, 0, 0, 0 ], [ 0, 0, 0, 5, 0, 0, 0 ], [ 0, 0, 0, 0, 5, 0, 0 ], [ 0, 0, 0, 0, 0, 5, 0 ], [ 0, 0, 0, 0, 0, 0, 5 ] ] The vector space generated by the symmetry operations from one of the separated irreducible spaces should be orthogonal to others; let us check this (using the list “AM” of symmetry operations prepared in the preceding computation): gap> OO:=List(AM,o->o*D[1][1]);; gap> List(D,d->RankMat(OO*TransposedMat(d))); [ 5, 0, 0, 0, 0, 0, 0 ] gap> OO:=List(AM,o->o*D[2][1]);; gap> List(D,d->RankMat(OO*TransposedMat(d))); [ 0, 5, 0, 0, 0, 0, 0 ] . . . etc . . . We can see that all is done well. The second method is to divide the multiplied irreducible spaces W (as computed in the previous section, by the projectors defined by the characters) into proper minimal components, invariant under the symmetry operation. This method utilizes the coset decomposition of the group G by the subgroup H, G/H. In general, one vector v1 in W, under the operation of the elements gi in G, generates the set of vectors, the total number of which is equal to the order of G. Now let us take another vector w1 , also in W, generated by the operation of the elements hi in H, P such as w1 = i hi · v1 . Under the symmetry operation of G, it generates the set of vectors, the total number of which is equal to the order of G/H. The number of the generated vectors decreased in the latter case. We might expect the dimension of the basis vectors of the generated vectors would also be diminished in the latter 164 case. And if w1 would generate the vector space of the proper dimension of the irreducible representation, we adopt it, as the generator of the separated, proper, irreducible space. (If not, with another chose of H, this step is repeated.) Then we project out the vector space generated by w1 from W. We take another vector v2 from W, make an H-invariant vector w2 with the suitable H (if necessary, H should be chosen again) to generate the another proper irreducible space. We proceed so on until W is exhausted. This method will be applicable to the present problem in order to separate each irreducible component, even if it involves the trial-and-error, in the choice of the suitable subgroup H. At the start, the vector v1 is taken from the multiplied irreducible spaces. The candidate vector wi is generated by the projection of vi into the trivial irreducible representation of the subgroup H. (Indeed, it could also be prepared by the projection of v into other irreducible representations of H, for the purpose of diminishing the number of the generated vectors by the symmetry operation.) In order to execute this computation, the function “Cutout” (given in appendix J) is prepared. The function cuts out the subspace (as minimal as possible) from the given vector space, making use of the coset decomposition of R by the subgroups H. In projecting out the proper irreducible component from the multiplied copies, we employ slightly different step from the above description. Let W be the initial starting place, that is, the multiplied components of the irreducible representations, from which the separated proper irreducible components W1 , ..., Wi are computed. The next candidate of the generator vi+1 is not taken directly from the complementary space (W \ (W1 ∪ W2 ∪ · · · ∪ Wi )); instead, in the whole vector space S (of 180 dimension in this case), the orthogonal space to W1 ∪ W2 ∪ · · · ∪ Wi , biz, S \ (W1 ∪ W2 ∪ · · · ∪ Wi ) is constructed. The basis set in the latter space is projected into the irreducible representation under the consideration, and the candidate vi+1 is taken from this projected space (the renewed W). This treatment is to quicken the symbolic 165 computation. In our problem, the latter method works well, too. We can separate out seven distinct irreducible spaces. In the following computation the function “Cutout” tries to divide out the vector space “BAS[10]” with respect to the tenth irreducible representation. In this vector space seven copies of irreducible spaces exist. The divided subspaces are given in list “H1”. Each subspace is of dimension 5 and orthogonal to others. The symmetry operation (given in list “AM”, in the preceding computation) to each vector in each subspace generates the 5 dimensional vector space, and the generated vector space exits exactly in the same subspace of that vector. (As for the other irreducible representations, it is successful, with the suitable choice of the coset decomposition. For example, the subgroups of order 5 operate well at the first, third, fourth, fifth, sixth, ninth and tenth irreducible representations; that of order 8 does at the seventh; that of order 4 does at the eighth. ) gap> H1:=Cutout(BAS[10],PRJE[10],R,hom,5,5);; gap> List(H1,a->List(H1,b->RankMat(a*TransposedMat(b)))); [ [ 5, 0, 0, 0, 0, 0, 0 ], [ 0, 5, 0, 0, 0, 0, 0 ], [ 0, 0, 5, 0, 0, 0, 0 ], [ 0, 0, 0, 5, 0, 0, 0 ], [ 0, 0, 0, 0, 5, 0, 0 ], [ 0, 0, 0, 0, 0, 5, 0 ], [ 0, 0, 0, 0, 0, 0, 5 ] ] gap> OO:=List(AM,o->o*H1[1][1]);; gap> List(H1,d->RankMat(OO*TransposedMat(d))); [ 5, 0, 0, 0, 0, 0, 0 ] gap> OO:=List(AM,o->o*H1[2][1]);; gap> List(H1,d->RankMat(OO*TransposedMat(d))); [ 0, 5, 0, 0, 0, 0, 0 ] . . . etc . . . A warning is given: in the above discussion, the symmetry operations are defined 166 in the bare forms, using the direct product Ri ⊗ Gi . To be precise one should use Rif ⊗ Gi , even if the argument on the dimension counting on the vector space is not affected. To obtain the proper vector system one should dutifully operate Mf ( the matrix prepared in the previous section for the conjugation) to any vector v, such as Mf · v. C. Remark to this section In this section, the computation of the vibrational mode of C60 by means of the computer algebra system GAP is demonstrated. The computation can be executed by a standard desktop personal computer. Though the topic in the present article is limited to the C60 molecule, the way of the computation shall be applicable to other systems, such as crystal. The small programs in the article are composed as brief as possible and as comprehensible as possible but without considerations of the optimization, such as memory usage, or the avoidance of the re-computation of same objects. So there is the possibility to improve the efficiency, although they are computable even by the standard desktop personal computer. The computed basis of the vibrational modes are obtained as the symbolic formulas, and they are convertible to the numerical program functions simply by the rewriting of strings. Some of the formulas might be so lengthy that the generated program functions might be beyond the capacity of the compiler. However, the computations presented in this article can be done by the floating-point computation, started from the numerical representation of the rotation matrices, with a certain toleration to the numerical error under the threshold. I must add this: there are various studies on the electronic structure and the deformation of C60 in the quantitative electronic structure computations (not of the group theoretical view) such as in the references[37–39], or in the empirical 167 model (of the group theoretical view)[13]. The computations in this article, of this and the previous section, only classifies geometrically possible deformations with respect to irreducible representations and generates the basis set of deformations in the symbolic formulas. The obtained results, however, could be applied to more quantitative studies as those. IX. FINAL REMARKS The theme of this article is how to simulate the property of the material by means of electronic structure calculations with the aid of computer algebra. The collaboration of the electronic structure calculation and the computer algebra is not novel one; rather being regarded as the modernization of the union of the quantum dynamics and the group theory, the success of which was brilliantly displayed in the former half of last century. In this article, the treated topics in the group theory are rather classical ones concerning the character theory. However, there can be various applications of the myriad topics of mathematics. As for the combinatorics, the Polya counting theory is a typical example; it is applicable to determine the number of configurations, equivalent by some symmetry operations, for example, to determine the total number of possible molecular formations indicated by a single chemical formula[40]. This type of computations in combinatorics can also be executed by the computer algebra. As for the application of combinatorics in quantum physics, a sort of extension of Polya counting theorem can be useful in computing the spin weight in molecules[41–43]. In a recent study, it is shown that the framework of the electronic structure could be reconstructed by means of a concept in the algebraic geometry, so-called Groebner basis theory, through the utilization of symbolic computation[44]. In my article, I have omitted several important application of the group theory and the algebra. One of this is the treatment of magnetic or color groups. Also, I 168 omitted the treatment of Lie algebra, important in the spin system or the study of angular momentum. As for the former, a package of color groups is implemented in GAP[12]. As for the latter, the Lie algebra is computable by GAP, although it is not of the digested style, suitable for the practical usage of physicists. (Some of the implemented GAP packages are intended to study the model of spin systems, proposed in the statistical- or mathematical physics.) I must admit that I have not yet developed my skills to compute them through GAP. But I believe that the readers if they are acquainted with GAP through my article, can construct their own application in these topics. In the present circumstances of the material physics, indeed, there is an awkward inclination in which one solely relies on computer powers; only by trial and errors, or, only by varying the input data, one tries to execute “material design”, without any effective guiding principle. We must admit that the computational packages have developed so complex and so vast that a common researcher, if not being an expert, would be obliged to utilize them as black boxes, without knowing the detail of the programs; fortunately, those packages are so powerful and effective that one can obtain reliable results with ease. The blind reliance on these packages, however, should be avoided; the mere enumeration of results of computations, with the slight modification of input data, will be the waste of computational resources. Certainly, by gathering and comparing computed results we could surmise vague tendencies, but may not go anymore, if we do not know the physical or mathematical origin. Instead, it is necessary for us to have another utensil, which will compensate for such a shortcoming; the group theory, or its modernization, the computer algebra, will be of great use for this purpose. With the aid of computer algebra, advanced concepts in group theory are easily accessible and applicable, so that we can execute systematic research of material design from the mathematical first principles, as the group theoretical view illuminates for us the mathematical principles lurking behind 169 observable phenomena. I hope that the computer algebra will bring forth the blessed reunion of physics and mathematics in the research of materials; the available tool for us is not limited to the classics such as Courant-Hilbert[45], although they had been powerful in the early stages of the development of quantum dynamics. The mathematics and physics have progressed greatly since then; the forefront of these developments seems to be so esoteric that non-experts feel dismayed when urged to put it into practice. Nevertheless, one should not be timid; for the sake of ardent researchers, the computer algebra will be a most suitable guide for their efforts, and there they will find a most speedily passable bridge over the ever-deepening chasm between physics and mathematics. Appendix A: Symmetry operations in the diamond structure (real space) The symmetry operations in the diamond structure (in Cartesian coordinates) are given in the table. The operation on the atomic coordinate is given by x → R · x + T 1 · a1 + T 2 · a2 + T 3 · a3 , where (a1 , a2 , a3 ) are primitive translations.There are two types of fractional translations, according to the location of the origin of the unit cell. The first, denoted as (T1,T2,T3) corresponds to the case of atomic positions of ±(1/8 · a1 + 1/8 · a3 + 1/8 · a3 ):the second, (T1(*),T2(*),T3(*)) corresponds to positions of (0 · a1 + 0 · a3 + 0 · a3 ) and (1/4 · a1 + 1/4 · a3 + 1/4 · a3 ). Although the latter case is more conventional, the former has a merit such that the coefficients of the plane-wave-expression of the wavefunctions are real-valued. R11 R12 R13 R21 R22 R23 R31 R32 R33 T1 T2 T3 T1(*) T2(*) T3(*) 1 1 0 0 0 1 0 0 0 2 1 0 0 0 -1 0 0 3 -1 0 0 0 1 0 0 0 0 0 0 0 0 0 -1 0.5 0 0 0 0 0 0 -1 0 0.5 0 0 0 0 170 1 4 -1 0 0 0 -1 0 0 0 1 0 0 0.5 0 0 0 5 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0 6 0 1 0 0 0 -1 -1 0 0 0.5 0 0 0 0 0 7 0 -1 0 0 0 1 -1 0 0 0 0.5 0 0 0 0 8 0 -1 0 0 0 -1 1 0 0 0 0 0.5 0 0 0 9 0 0 1 1 0 0 0 1 0 0 0 0 0 0 0 10 0 0 1 -1 0 0 0 -1 0 0.5 0 0 0 0 0 11 0 0 -1 1 0 0 0 -1 0 0 0.5 0 0 0 0 12 0 0 -1 -1 0 0 0 1 0 0 0 0.5 0 0 0 13 0 -1 0 -1 0 0 0 0 -1 0 0 0 0.25 0.25 0.25 14 0 -1 0 1 0 0 0 0 1 -0.5 0 0 0.25 0.25 0.25 15 0 1 0 -1 0 0 0 0 1 0 -0.5 0 0.25 0.25 0.25 16 0 1 0 1 0 0 0 0 -1 0 0 -0.5 0.25 0.25 0.25 17 -1 0 0 0 0 -1 0 -1 0 0 0 0 0.25 0.25 0.25 18 -1 0 0 0 0 1 0 1 0 -0.5 0 0 0.25 0.25 0.25 19 1 0 0 0 0 -1 0 1 0 0 -0.5 0 0.25 0.25 0.25 20 1 0 0 0 0 1 0 -1 0 0 0 -0.5 0.25 0.25 0.25 21 0 0 -1 0 -1 0 -1 0 0 0 0 0 0.25 0.25 0.25 22 0 0 -1 0 1 0 1 0 0 -0.5 0 0 0.25 0.25 0.25 23 0 0 1 0 -1 0 1 0 0 0 -0.5 0 0.25 0.25 0.25 24 0 0 1 0 1 0 -1 0 0 0 0 -0.5 0.25 0.25 0.25 25 -1 0 0 0 -1 0 0 0 -1 0 0 0 0.25 0.25 0.25 26 -1 0 0 0 1 0 0 0 1 -0.5 0 0 0.25 0.25 0.25 27 1 0 0 0 -1 0 0 0 1 0 -0.5 0 0.25 0.25 0.25 28 1 0 0 0 1 0 0 0 -1 0 -0.5 0.25 0.25 0.25 171 0 29 0 -1 0 0 0 -1 -1 0 0 0 0 0 0.25 0.25 0.25 30 0 -1 0 0 0 1 1 0 0 -0.5 0 0 0.25 0.25 0.25 31 0 1 0 0 0 -1 1 0 0 0 -0.5 0 0.25 0.25 0.25 32 0 1 0 0 0 1 -1 0 0 0 0 -0.5 0.25 0.25 0.25 33 0 0 -1 -1 0 0 0 -1 0 0 0 0 0.25 0.25 0.25 34 0 0 -1 1 0 0 0 1 0 -0.5 0 0 0.25 0.25 0.25 35 0 0 1 -1 0 0 0 1 0 0 -0.5 0 0.25 0.25 0.25 36 0 0 1 1 0 0 0 -1 0 0 0 -0.5 0.25 0.25 0.25 37 0 1 0 1 0 0 0 0 1 0 0 0 0 0 0 38 0 1 0 -1 0 0 0 0 -1 0.5 0 0 0 0 0 39 0 -1 0 1 0 0 0 0 -1 0 0.5 0 0 0 0 40 0 -1 0 -1 0 0 0 0 1 0 0 0.5 0 0 0 41 1 0 0 0 0 1 0 1 0 0 0 0 0 0 0 42 1 0 0 0 0 -1 0 -1 0 0.5 0 0 0 0 0 43 -1 0 0 0 0 1 0 -1 0 0 0.5 0 0 0 0 44 -1 0 0 0 0 -1 0 1 0 0 0 0.5 0 0 0 45 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 46 0 0 1 0 -1 0 -1 0 0 0.5 0 0 0 0 0 47 0 0 -1 0 1 0 -1 0 0 0 0.5 0 0 0 0 48 0 0 -1 0 -1 0 1 0 0 0 0 0.5 0 0 0 TABLE 43: Symmetry operations in the point group in the diamond unit cell. If fractional translations are set to be zero, these operations are applicable to the cubic lattice. 172 Appendix B: Symmetry operations in the hexagonal lattice (real space) The symmetry operations in graphite (in Cartesian coordinates)are given in the table: R11 1 R12 R13 1 0 √ 0 1 0 0 0 1 0 0 3/2 0.5 0 0 0 1 0 0 -0.5 3/2 -0.5 0 0 0 1 0 0 -1 0 0 0 1 0 0 -0.5 -0.5 0 0 0 1 0 0 0.5 0 0 0 1 0 0 -0.5 0.5 0 0 0 -1 0 0 -0.5 -0.5 0 0 0 -1 0 0 -1 0 0 0 -1 0 0 -0.5 3/2 -0.5 0 0 0 -1 0 0 3/2 0.5 0 0 0 -1 0 0 -0.5 1 0 0 0 -1 0 0 0 -1 √ 0 - 3/2 -0.5 √ 0 - 3/2 0.5 0 0 0 -1 0 0 -0.5 0 0 0 -1 0 0 0 0 0 -1 0 0 -0.5 0 1 0 0 0 -1 0 0 3/2 0.5 0 0 0 -1 0 0 -0.5 3/2 -0.5 0 0 0 -1 0 0 0 3/2 -0.5 0 0 0 1 0 0 0 3/2 0.5 0 0 0 1 0 0 -0.5 0 0 0 1 0 0 2 0.5 - 3/2 √ 3 -0.5 - 3/2 0 4 0 0 3/2 0 3/2 0 7 -0.5 - 3/2 √ 8 0.5 - 3/2 0 9 0 -1 5 -0.5 6 0.5 √ √ √ 1 10 0.5 11 -0.5 12 -1 13 -1 14 -0.5 15 0.5 16 0 √ √ √ √ 1 3/2 0 0 0 3/2 0 0 0 0 0 3/2 3/2 0 √ 17 0.5 - 3/2 √ 18 -0.5 - 3/2 √ 19 0.5 3/2 √ 20 -0.5 3/2 0 21 0 -1 0 R21 R22 R23 R31 R32 R33 T1 T2 T3 0 0 0 0 √ √ 0 √ - 3/2 √ - 3/2 √ - 3/2 √ - 3/2 0 √ √ 0 0 √ √ √ √ 0 1 173 0 0 0 0 0 0 0 0 0 √ 22 -0.5 - 3/2 √ 23 0.5 - 3/2 √ 0 - 3/2 0.5 √ 0 - 3/2 -0.5 24 0 1 0 0 -1 0 0 0 1 0 0 -0.5 0 0 0 1 0 0 0 0 0 1 0 0 -0.5 0 TABLE 44: The symmetry operations in graphite in real space. Appendix C: Symmetry operations in the diamond structure (wave-number space) The symmetry operations in the diamond structure, as the rotation matrices in the reciprocal spaces are given in the table: R’11 R’12 R’13 R’21 R’22 R’23 R’31 R’32 R’33 T1 T2 T3 1 1 0 0 0 1 0 0 0 1 0 0 0 2 -1 0 0 -1 0 1 -1 1 0 0.5 0 0 3 0 -1 1 0 -1 0 1 -1 0 0 0.5 0 4 0 1 -1 1 0 -1 0 0 -1 0 0 0.5 5 0 1 0 0 0 1 1 0 0 0 0 0 6 0 -1 0 1 -1 0 0 -1 1 0.5 0 0 7 1 0 -1 0 0 -1 0 1 -1 0 0.5 0 8 -1 0 1 -1 1 0 -1 0 0 0 0 0.5 9 0 0 1 1 0 0 0 1 0 0 0 0 10 0 0 -1 0 1 -1 1 0 -1 0.5 0 0 11 -1 1 0 -1 0 0 -1 0 1 0 0.5 0 12 1 -1 0 0 -1 1 0 -1 0 0 0 0.5 13 0 -1 0 -1 0 0 0 0 -1 0 0 174 0 14 0 1 0 0 1 -1 -1 1 15 1 0 -1 1 0 0 1 -1 16 -1 0 1 0 -1 1 0 17 -1 0 0 0 0 -1 18 1 0 0 1 -1 19 0 -1 1 0 20 0 1 -1 21 0 0 22 0 23 0 0 0 0 -0.5 0 0 1 0 0 -0.5 0 -1 0 0 0 0 0 1 0 -1 -0.5 0 0 0 1 -1 0 1 0 -0.5 0 -1 1 0 0 1 0 0 0 -0.5 -1 0 -1 0 -1 0 0 0 0 0 0 1 -1 0 1 0 -1 1 -0.5 0 0 -1 1 0 0 1 0 0 1 -1 0 -0.5 0 24 1 -1 0 1 0 -1 1 0 0 0 0 -0.5 25 -1 0 0 0 -1 0 0 0 -1 0 0 0 26 1 0 0 1 0 -1 1 -1 0 -0.5 0 0 27 0 1 -1 0 1 0 -1 1 0 0 -0.5 0 28 0 -1 1 -1 0 1 0 0 1 0 0 -0.5 29 0 -1 0 0 0 -1 -1 0 0 0 0 0 30 0 1 0 -1 1 0 0 1 -1 -0.5 0 0 31 -1 0 1 0 0 1 0 -1 1 0 -0.5 0 32 1 0 -1 1 -1 0 1 0 0 0 0 -0.5 33 0 0 -1 -1 0 0 0 -1 0 0 0 0 34 0 0 1 0 -1 1 -1 0 1 -0.5 0 0 35 1 -1 0 1 0 0 1 0 -1 0 -0.5 0 36 -1 1 0 0 1 -1 0 1 0 0 0 -0.5 37 0 1 0 1 0 0 0 0 1 0 0 0 38 0 -1 0 0 -1 1 1 -1 0 0.5 0 0 175 0 -0.5 39 -1 0 1 -1 0 0 -1 1 0 0 0.5 0 40 1 0 -1 0 1 -1 0 0 -1 0 0 0.5 41 1 0 0 0 0 1 0 1 0 0 0 0 42 -1 0 0 -1 1 0 -1 0 1 0.5 0 0 43 0 1 -1 0 0 -1 1 0 -1 0 0.5 0 44 0 -1 1 1 -1 0 0 -1 0 0 0 0.5 45 0 0 1 0 1 0 1 0 0 0 0 0 46 0 0 -1 1 0 -1 0 1 -1 0.5 0 0 47 1 -1 0 0 -1 0 0 -1 1 0 0.5 0 48 -1 1 0 -1 0 1 -1 0 0 0 0 0.5 TABLE 45: Symmetry operations in the diamond crystal in the reciprocal space. Appendix D: Symmetry operations in the hexagonal lattice (wave-number space) The crystal axes are chosen to be a1 = (1, 0, 0), a2 = (−1/2, p (3)/2, 0), a3 = (0, 0, c). Then The symmetry operations as the operations in the wave-number space are given as: R’11 R’12 R’13 R’21 R’22 R’23 R’31 R’32 R’33 T1 T2 T3 1 1 0 0 0 1 0 0 0 1 0 0 2 0 -1 0 1 1 0 0 0 1 0 0 -0.5 3 -1 -1 0 1 0 0 0 0 1 0 0 4 -1 0 0 0 -1 0 0 0 1 0 0 -0.5 5 0 1 0 -1 -1 0 0 0 1 0 0 176 0 0 0 6 1 1 0 -1 0 0 0 0 1 0 0 -0.5 7 -1 -1 0 0 1 0 0 0 -1 0 0 -0.5 8 0 -1 0 -1 0 0 0 0 -1 0 0 9 1 0 0 -1 -1 0 0 0 -1 0 0 -0.5 10 1 1 0 0 -1 0 0 0 -1 0 0 11 0 1 0 1 0 0 0 0 -1 0 0 -0.5 12 -1 0 0 1 1 0 0 0 -1 0 0 13 -1 0 0 0 -1 0 0 0 -1 0 0 -0.5 14 0 1 0 -1 -1 0 0 0 -1 0 0 15 1 1 0 -1 0 0 0 0 -1 0 0 -0.5 16 1 0 0 0 1 0 0 0 -1 0 0 17 0 -1 0 1 1 0 0 0 -1 0 0 -0.5 18 -1 -1 0 1 0 0 0 0 -1 0 0 0 19 1 1 0 0 -1 0 0 0 1 0 0 0 20 0 1 0 1 0 0 0 0 1 0 0 -0.5 21 -1 0 0 1 1 0 0 0 1 0 0 22 -1 -1 0 0 1 0 0 0 1 0 0 -0.5 23 0 -1 0 -1 0 0 0 0 1 0 0 24 1 0 0 -1 -1 0 0 0 1 0 0 -0.5 TABLE 46: The symmetry operations in graphite in reciprocal space. 177 0 0 0 0 0 0 0 Appendix E: The computation of Wyckoff positions by GAP Computations for space groups can be executed by means of “Cryst” package in GAP. Though the manual of this package is provided, the description is too curt and the computed result is too unfriendly for beginners to utilize. So in this section, the usage of this package is illustrated. The crystallographic group is defined at first (in this example, with minimal generators): gap> M1:=[[0,0,1,0],[1,0,0,0],[0,-1,0,0],[1/4,1/4,1/4,1]]; gap> M2:=[[0,0,-1,0],[0,-1,0,0],[1,0,0,0],[0,0,0,1]]; gap> S:=AffineCrystGroup([M1,M2]); The point group is obtained by: gap> P:=PointGroup(S); The Wyckoff positions are computed now: gap> W:=WyckoffPositions(S); [ < Wyckoff position, point group 4, translation := [ 1/8, 3/8, 7/8 ], basis := [ ] > , < Wyckoff position, point group 4, translation := [ 1/8, 3/8, 3/8 ], basis := [ ] > , < Wyckoff position, point group 5, translation := [ 1/4, 1/4, 3/4 ], basis := [ ] > , < Wyckoff position, point group 5, translation := [ 1/4, 1/4, 1/4 ], basis := [ ] > , < Wyckoff position, point group 3, translation := [ 0, 0, 0 ], 178 basis := [ [ 1, -1, -1 ] ] > , < Wyckoff position, point group 6, translation := [ 1/4, 1/4, 1/2 ], basis := [ [ 0, 0, 1 ] ] > , < Wyckoff position, point group 7, translation := [ 0, 1/4, 7/8 ], basis := [ [ 1/2, 1/2, 0 ] ] > , < Wyckoff position, point group 2, translation := [ 0, 0, 0 ], basis := [ [ 1/2, -1/2, 0 ], [ 0, 0, 1 ] ] > , < Wyckoff position, point group 1, translation := [ 0, 0, 0 ], basis := [ [ 1/2, 0, 1/2 ], [ 0, 1/2, 1/2 ], [ 0, 0, 1 ] ] > ] The returned result is the list of the generating set of the Wyckoff positions. The expression such as , < Wyckoff position, point group 3, translation := [ 0, 0, 0 ], basis := [ [ 1, -1, -1 ] ] > indicates the information of a generator for the Wyckoff positions, which is located at the segment [0,0,0]+t[1,-1,-1], where t is arbitrary real number inasmuch that the segment is confined in the unit cell. Now we get nine generators. The computed result, therefore, should be read as, [ 1/8, 3/8, 7/8 ] [ 1/8, 3/8, 3/8 ] [ 1/4, 1/4, 3/4 ] [ 1/4, 1/4, 1/4 ] [ 0, 0, 0 ]+t[ 1, -1, -1 ] [ 1/4, 1/4, 1/2 ]+t[ 0, 0, 1 ] [ 0, 1/4, 7/8 ]+t[ 1/2, 1/2, 0 ] 179 [ 0, 0, 0 ]+t1[ 1/2, -1/2, 0 ]+t2[ 0, 0, 1 ] [ 0, 0, 0 ]+t1[ 1/2, 0, 1/2 ]+t2[ 0, 1/2, 1/2 ]+t3[ 0, 0, 1 ] The first four are single points, but the remaining five are one-dimensional segments, two-dimensional planes, or, a three-dimensional shape. (The last of them is the arbitrary position in the unit cell.) Let us pay attention to the fourth of them. It is the position of one carbon atom in the minimal diamond unit cell; which is moved to [0,0,0] (the position of another Carbon atom) by means of symmetry operations. In order to obtain whole of the Wyckoff positions, the equivalent coordinate points (orbits by the symmetry operations) can be evaluated in the following way. The total numbers of the equivalent coordinate points are given by gap> List(WyckoffPositions(S),x->Size(WyckoffOrbit(x))); [ 4, 4, 2, 2, 8, 12, 24, 24, 48 ] For each generating points, the equivalents coordinates can be computed separately: gap> WyckoffOrbit(WyckoffPositions(S)[1]); [ < Wyckoff position, point group 4, translation := [ 1/8, 3/8, 7/8 ], basis := [ ] > , < Wyckoff position, point group 4, translation := [ 3/8, 1/8, 7/8 ], basis := [ ] > , < Wyckoff position, point group 4, translation := [ 3/8, 3/8, 5/8 ], basis := [ ] > , < Wyckoff position, point group 4, translation := [ 1/8, 1/8, 5/8 ], basis := [ ] > ] gap> WyckoffOrbit(WyckoffPositions(S)[2]); 180 [ < Wyckoff position, point group 4, translation := [ 1/8, 3/8, 3/8 ], basis := [ ] > , < Wyckoff position, point group 4, translation := [ 3/8, 1/8, 3/8 ], basis := [ ] > , < Wyckoff position, point group 4, translation := [ 3/8, 3/8, 1/8 ], basis := [ ] > , < Wyckoff position, point group 4, translation := [ 1/8, 1/8, 1/8 ], basis := [ ] > ] gap> ................................................................... gap> WyckoffOrbit(WyckoffPositions(S)[8]); [ < Wyckoff position, point group 2, translation := [ 0, 0, 0 ], basis := [ [ 1/2, -1/2, 0 ], [ 0, 0, 1 ] ] > , < Wyckoff position, point group 2, translation := [ 1/4, 1/4, 1/4 ], basis := [ [ -1/2, 0, 1/2 ], [ 0, -1, 0 ] ] > , < Wyckoff position, point group 2, translation := [ 0, 0, 0 ], .................................................................. .................................................................. ] Appendix F: Subgroup lattice In this article, the sequence of crystalline symmetry reduction is displayed by means of the mathematical concept of the lattice of subgroups, in which the inclusion relations among them are illustrated as a graph. The GAP computation can be done as follows: gap> M1:=[[0,1,0],[0,0,1],[1,0,0]]; 181 [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ 1, 0, 0 ] ] gap> M2:=[[0,1,0],[-1,0,0],[0,0,1]]; [ [ 0, 1, 0 ], [ -1, 0, 0 ], [ 0, 0, 1 ] ] gap> G:=Group(M1,M2); Group([ [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ 1, 0, 0 ] ], [ [ 0, 1, 0 ], [ -1, 0, 0 ], [ 0, 0, 1 ] ] ]) gap> Size(G); 24 gap> l:=LatticeSubgroups(G); <subgroup lattice of Group( [ [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ 1, 0, 0 ] ], [ [ 0, 1, 0 ], [ -1, 0, 0 ], [ 0, 0, 1 ] ] ]), 11 classes, 30 subgroups> gap> ConjugacyClassesSubgroups(l); [ Group([],[ [ 1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, 1 ] ])^G, Group([ [ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ] ])^G, Group([ [ [ -1, 0, 0 ], [ 0, 0, -1 ], [ 0, -1, 0 ] ] ])^G, Group([ [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ 1, 0, 0 ] ] ])^G, Group([ [ [ -1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, -1 ] ], [ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ] ])^G, Group([ [ [ -1, 0, 0 ], [ 0, 0, -1 ], [ 0, -1, 0 ] ], [ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ] ])^G, Group([ [ [ 1, 0, 0 ], [ 0, 0, 1 ], [ 0, -1, 0 ] ], [ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ] ])^G, Group([ [ [ -1, 0, 0 ], [ 0, 0, -1 ], [ 0, -1, 0 ] ], [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ 1, 0, 0 ] ] ])^G, Group([ [ [ -1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, -1 ] ], 182 [ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ], [ [ -1, 0, 0 ], [ 0, 0, -1 ], [ 0, -1, 0 ] ] ])^G, Group([ [ [ -1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, -1 ] ], [ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ], [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ 1, 0, 0 ] ] ])^G, Group([ [ [ -1, 0, 0 ], [ 0, 1, 0 ], [ 0, 0, -1 ] ], [ [ 1, 0, 0 ], [ 0, -1, 0 ], [ 0, 0, -1 ] ], [ [ 0, 1, 0 ], [ 0, 0, 1 ], [ 1, 0, 0 ] ], [ [ -1, 0, 0 ], [ 0, 0, -1 ], [ 0, -1, 0 ] ] ])^G ] gap> DotFileLatticeSubgroups(l,"paradigm.dot"); The last command “DotfileLatticeSubgroups” is used to generate an output file for the visualization. Appendix G: A short program to compute the semidirect product of groups In the main article, the characters of C3v = Group((1, 2, 3), (1, 2)) ≡ S3 are computed by the semidirect product between C3 = Group((1, 2, 3)) and I = Group((1, 2)). The computations are tedious and complicated; a naive implementation by means of GAP programming language could be given as follows: # The definition of the groups G and A is done. # The irreducible representations and the lists # of group elements are prepared. G:=Group((1,2)); A:=Group((1,2,3)); repG:=Irr(G); 183 repA:=Irr(A); Gmem:=Elements(G); Amem:=Elements(A); # # The definition of the automorphism on A induced by G # is given in list "au". # The elements of G and A are indexed # # # G[1],G[2],... and A[1],A[2],.... # The elements in A are mapped as # # A[i]^G[j]=A[au[i,j]]; # au:=[[1,1],[2,3],[3,2]]; # This list now means the following automorphism: # x(in A)^E(in G) : E -> E, a -> a, # x(in A)^g(in_G) : E -> E, a -> a^-1, a^-1 -> a # Here a=(1,2,3), # and the elements in A are listed [e, a, a^-1]. # The following is the list of elements # in the semidirect product [A,G], # given by the Cartesian products of sequential numbers. a^-1 -> a^-1 # Elist:=[[1,1],[1,2],[2,2],[3,2],[2,1],[3,1]]; 184 GAction:=function(a,g) # # A function to compute the automorphism (a^g) # on an element "a" in A # induced by an element "g" in G. # This function returns the group element, # according to the list "au". # local apos,gpos,ha; apos:=Position(Amem,a); gpos:=Position(Gmem,g); ha:=au[apos][gpos]; return Amem[ha]; end; InvarianceCHK:=function(iA,g,au) # # This function checks whether the character x in A # (that by the iA-th representation) is # fixed by the automorphism induced by the element g in G. # # iA: index to the irreducible representation of A # au: the automorphism on A by G, defined above. # local ol,tl; # 185 # The list of characters, before the automorphism. ol:=List(Amem,x->x^repA[iA]); # The list of characters, after the automorphism. tl:=List(Amem,x->Amem[au[Position(Amem,x)][Position(Gmem,g)]]); tl:=List(tl,x->x^repA[iA]); return ol=tl; end; GetGx:=function(iA,au) # # Gx is the set of elements in G, # such that the character x in A # (that by the iA-th representation) # is fixed by the automorphism induced # by the elements in Gx. # # iA: the index to the irreducible representation of A # au: the automorphism on A by G, defined above. # # local Gx; Gx:=Filtered(G,g->InvarianceCHK(iA,g,au)); return Group(Gx); end; ProSumma:=function(a,g,Gx,iA,iG) # This is a subordinate function to compute the character 186 # of the elements (a,g), # when the representations in group A and G, # and Gx (defined above) are specified. # # iA: index to the irreducible representations of A # iG: index to the irreducible representations of G # local k,sum,l1,l2,l3,l4,repGx; l1:=List(Gmem,x->x*g*x^-1); l2:=List(Gmem,x->GAction(a,x)); l3:=List(l2,x->x^repA[iA]); repGx:=Irr(Gx); sum:=0; for k in [1..Size(l1)] do if l1[k] in Gx then l4:=l1[k]^repGx[iG]; sum:=sum+l3[k]*l4; fi; od; sum:=sum/Size(Gx); return sum; end; ProChr:=function(au,iA) # # au : the automorphism, defined in the list as above. 187 # iA : the index to the irreducible representations in A # # This function computes the characters in the semidirect product # (for each element in Elist, defined above). # local Gx,repGx,index,retTBL; Gx:=GetGx(iA,au); repGx:=Irr(Gx); retTBL:=[]; for index in [1..Size(repGx)] do; Append(retTBL, [List(Elist,x->ProSumma(Amem[x[1]],Gmem[x[2]],Gx,iA,index))] ) ; od; return retTBL; end; gap> for iA in [1..Size(repA)] do; Display(ProChr(au,iA)); od; [ [ 1, 1, 1, 1, 1, 1 ], [ 1, -1, -1, -1, 1, 1 ] ] [ [ 2, 0, 0, 0, -1, -1 ] ] [ [ 2, 0, 0, 0, -1, -1 ] ] 188 Appendix H: The analytical representation of the energy spectra of C60 . In the model of C60 in section VII B, if we chose the transfer integral as Hsingle =1 (on the single bonds in the pentagons) and Hdouble =-y (on the double bonds in the hexagons), the secular equation is decomposed into the polynomial with some multiplicity in each representation, as in table 47. The irreducible representations I.1,...,I.10 are the same as given in the main article, at table 26. The energy spectra of in the main article can be constructed from this table, setting E = 2x and y=-1/2. I.1 I.2 I.3 I.4 I.5 I.6 I.7 I.8 I.9 I.10 Polynomial [ x+y+2 ] [ ] [ x-y+(E(5)^2+E(5)^3) ] [ x-y+(E(5)+E(5)^4) ] [ x^2-y^2+(-E(5)-2*E(5)^2-2*E(5)^3-E(5)^4)*x +(-E(5)-E(5)^4)*y+(2*E(5)+2*E(5)^4) ] [ x^2-y^2+(-2*E(5)-E(5)^2-E(5)^3-2*E(5)^4)*x +(-E(5)^2-E(5)^3)*y+(2*E(5)^2+2*E(5)^3) ] [ x^2-y^2-x-1 ] [ x^2-y^2-x-2*y-1 ] [ x^3+x^2*y-x*y^2-y^3+x^2+2*x*y+y^2-3*x-y-2 ] [ x^2-y^2-x+y-1 ] multiplicity 1 3 3 3 3 4 4 5 5 TABLE 47. The decomposition of the secular equation. Appendix I: Comment on the irreducible representations in the symmetry group of C60 In section VIII we have computed the irreducible matrix representations of the symmetry group of C60 . Since the tenth irreducible matrix representation is a real representation, the generated bases are real and we can work in the real number. Meanwhile, the four-dimensional irreducible matrix representations (computed by 189 GAP) are complex and the generated basis are complex. However, the complex irreducible representation, in this case, can be remade into real one. The complexvalued matrix representation of a generator (Mi ) can be replaced by a real matrix:   Re(Mi ) −Im(Mi ) Im(Mi ) Re(Mi )  . This representation is reducible, including two copies of the irreducible representation, but as the matrix group, it is isomorphic to the original group. We extract the basis set from the columns of the projector of this matrix group and divide it into two independent irreducible vector spaces by means of the procedure explained thereafter in the article. Each of the separated vector space provides us the realvalued basis set and the real-valued matrix representation. One set of such real matrix representations (for the generators r1 and r2) is given as follows: r1:=[[1, 3/2*E(5)+1/2*E(5)^2+1/2*E(5)^3+3/2*E(5)^4, -3*E(5)-7*E(5)^2-7*E(5)^3-3*E(5)^4, -1081/2131*E(5)-1797/2131*E(5)^2-1797/2131*E(5)^3-1081/2131*E(5)^4], [0, -1/2*E(5)-E(5)^2-E(5)^3-1/2*E(5)^4, -5*E(5)-14*E(5)^2-14*E(5)^3-5*E(5)^4, -1681/2131*E(5)-3510/2131*E(5)^2-3510/2131*E(5)^3-1681/2131*E(5)^4], [0, -2*E(5)-3/2*E(5)^2-3/2*E(5)^3-2*E(5)^4, -2*E(5)-7*E(5)^2-7*E(5)^3-2*E(5)^4, -600/2131*E(5)-1713/2131*E(5)^2-1713/2131*E(5)^3-600/2131*E(5)^4], [0, 190 113/44*E(5)+92/11*E(5)^2+92/11*E(5)^3+113/44*E(5)^4, 623/22*E(5)+807/11*E(5)^2+807/11*E(5)^3+623/22*E(5)^4, 5/2*E(5)+8*E(5)^2+8*E(5)^3+5/2*E(5)^4]]; r2:=[[-4/11*E(5)-3/11*E(5)^2-3/11*E(5)^3-4/11*E(5)^4, 7/22*E(5)+19/22*E(5)^2+19/22*E(5)^3+7/22*E(5)^4, 36/11*E(5)+104/11*E(5)^2+104/11*E(5)^3+36/11*E(5)^4, 383/2131*E(5)+2127/2131*E(5)^2+2127/2131*E(5)^3+383/2131*E(5)^4], [12/11*E(5)-2/11*E(5)^2-2/11*E(5)^3+12/11*E(5)^4, -16/11*E(5)-1/11*E(5)^2-1/11*E(5)^3-16/11*E(5)^4, 57/11*E(5)+128/11*E(5)^2+128/11*E(5)^3+57/11*E(5)^4, -1516/2131*E(5)+1596/2131*E(5)^2+1596/2131*E(5)^3-1516/2131*E(5)^4], [32/11*E(5)+13/11*E(5)^2+13/11*E(5)^3+32/11*E(5)^4, -39/11*E(5)-31/22*E(5)^2-31/22*E(5)^3-39/11*E(5)^4, 53/11*E(5)+92/11*E(5)^2+92/11*E(5)^3+53/11*E(5)^4, -1784/2131*E(5)+703/2131*E(5)^2+703/2131*E(5)^3-1784/2131*E(5)^4], [0,0, -623/22*E(5)-807/11*E(5)^2-807/11*E(5)^3-623/22*E(5)^4, -2*E(5)-7*E(5)^2-7*E(5)^3-2*E(5)^4]]; We can use them in common in the two four-dimensional representations, with r3 := ±I (the four dimensional unit matrix). Appendix J: The GAP script in the computation of deformation in C60 As is pointed in the main article, some of the modes of deformation in C60 computed by the projectors includes several copies of proper irreducible representations. To decompose them into separated irreducible spaces, the following function is pre191 pared. The function tries to find the irreducible subspace of dimension “REPSIZ” in the operation of the group “R”. The function cuts out the subspace (as minimal as possible) from the given vector space, making use of the coset decomposition of R by the subgroups H of order “NMULTI”. In projecting out the proper irreducible component from the multiplied copies, we employ these steps. Let W be the initial starting place, that is, the multiplied components of the irreducible representations, from which the separated proper irreducible components W1 , ..., Wi are computed. The next candidate of the generator vi+1 is not taken directly from the complementary space (W \ (W1 ∪ W2 ∪ · · · ∪ Wi )); instead, in the whole vector space S (of 180 dimension in this case), the orthogonal space to W1 ∪ W2 ∪ · · · ∪ Wi , biz, S \ (W1 ∪ W2 ∪ · · · ∪ Wi ) is constructed. The basis set in the latter space is projected into the irreducible representation under the consideration, and the candidate vi+1 is taken from this projected space (the renewed W). This treatment is to quicken the symbolic computation. gopr:=function(O,v,i,hom) # # When i=1, This function applies the symmetry operations of Group O # to a vector v. And the generated vectors are summed up. # (In fact, this function is the operation of the projector to the vector v.) # local irr; irr:=Irr(O); return Sum(List(Elements(O),j->j^irr[i]*LargeMatrix(j,hom)*v)); end; Cutout:=function(BAS,PROJ,R,hom,NMULTI,REPSIZ) 192 # # BAS : THE VECTOR SPACE INCLUDING THE COPIES OF IRREDUCIBLE SPACES # PROJ : THE PROJECTORS # R : THE GROUP IN THE PROBLEM. # hom : THE HOMOMORPHISM FROM <R> TO THE MATRIX GROUP. # NMULTI : THE SIZE OF THE SUBGROUP TO FORM THE COSET. # REPSIZ : THE SIZE OF THE IRREDUCIBLE REPRESENTATION. # local C,D,BASN,EA,O,l,P,p,B,OV,SI,AS,OREP,ww,OT,ith,ifind; C:=[]; D:=[]; BASN:=BAS; EA:=List(Elements(R),j->LargeMatrix(j,hom));; # # The subgroups with the order of "NMULTI" are extracted. # AS:=AllSubgroups(R); while (BASN<>[]) do Print("\n",Size(BASN),"\n"); O:=Filtered(AS,g->Order(g)=NMULTI);; Print(O); # # The subgroups which generate the vector space of # the correct dimension of the irreducible representation # are chosen. # 193 if (O=[]) then O:=[Group(One(R))]; fi; l:=List([1..Size(O)],i->0); ifind:=0; ith:=1; while (ifind=0 and ith<=Size(O)) do ww:=gopr(O[ith],BASN[1],1,hom); l[ith]:=RankMat(List(EA,g->g*ww)); Print(l); if (l[ith]=REPSIZ) then ifind:=1; OT:=O[ith]; fi; ith:=ith+1; od; if (ifind=0) then Print("CHANGE THE SUPPOSITION!\n"); return 0; fi; # # By means of the chosen subgroup, the irreducible # vector space "B" is generated. # It is stored in the vector space "D". # B:=BaseMat(List(EA,g->g*gopr(OT,BASN[1],1,hom)));; 194 Append(C,[B]); Append(D,B); # # The orthogonal space "OV" to the vector space "D" is prepared. # OV:=BaseOrthogonalSpaceMat(D); # # The vector space "BASN" to be processed is renewed now, # by the projection "PROJ" on the vectors in "OV". # BASN:=BaseMat(List(OV,o->PROJ*o)); # # Instead, it is possible that "BASN" is renewed # as the intersection between "BASN" and "OV". # # SI:=SumIntersectionMat(BASN,OV); # BASN:=SI[2]; # od; # # Return C, the separated subspaces. # return C; end; 195 [1] H. Weyl, The Theory of Groups and Quantum Mechanics,(Dover,1950). [2] T. Inui, Y. Tanabe and Y. Onodera, Group Theory and Its applications in Physics (Springer-Verlag,1990). [3] M. Tinkham, Group Theory and Quantum Dynamics (Dover Books on Chemistry,2003). [4] M. S. Dresselhaus, G. Dresselhaus, and A. Jorio, Group Theory: Application to the Physics of Condensed Matter, (Springer-Verlag, 2008). [5] W. Burnside, Theory of groups of finite order,(Cambridge University Press,1897).[Now available at Project Gutenberg, <http://www.gutenberg.org/ebooks/40395>.] [6] J. W. Thomas, Abstract Algebra: Theory and applications, <http://abstract.ups. edu/> [7] T. Y. Lam, Representations of finite groups: a hundred years, Notices of the AMS (American Mathematical Society) 45(3,4):361–372 (Part I),465–474(Part II) (1998). [8] Jean-Pierre Serre, Linear Representations of Finite Groups, (Springer-Verlag,1977). [9] W. Fulton, J. Harris, Representation theory. A first course, Graduate Texts in Mathematics, Readings in Mathematics 129, (Springer-Verlag,1991). [10] D. Holt, B. Eick and E. O’Brien,Handbook of Computational Group Theory, (Chapman & Hall/CRC Press,2005) [11] A. Hulpke, Note On Computational Group Theory, <http://www.math.colostate. edu/~hulpke/CGT/cgtnotes.pdf>. [12] “GAP - Groups, Algorithms, Programming - a System for Computational Discrete Algebra”, <http://www.gap-system.org/>. [13] J. Mooij, The vibrational spectrum of Buckminsterfullerene - An application of symmetry reduction and computer algebra, Master’s Thesis in Mathematics, Katholieke 196 Universiteit Nijmegen (2003). [14] Michael El-Batanouny and F. Wooten, Symmetry and condensed matter physics: a computational approach, Cambridge University Press, 2008. [15] D. Stauffer, F.W.Hehl, N.Ito, V.Winkelmann, J.G.Zabolitzky, Computer simulation and of principle or computer algebra: lectures for beginners, (Springer Science & Business Media, 2012). [16] W.Hergert, M. Däne, “Group theoretical investigations of photonic Band Structures”, Phys. Stat. Sol. (a) 197, No. 3, 620–634 (2003). [17] W.Hergert, M. Däne, and D. Ködderitzsch, Symmetry Properties of Electronic and Photonic Band Structures, Computational Materials Science, volume 642 of the series Lecture Notes in Physics, pp 103–125, (Springer Science & Business Media, 2004). [18] J.Thijssen,Computational physics, (Cambridge university press, 2007). [19] H.Sakiyama, K.Waki, “Conformational Analysis of Hexagon’s-Thiamine Nickel(II) Complex on the Basis of Computational Group Theory and Density Functional Theory”, J. Computed. Chem. Jpn., Vol. 13, No. 4, pp. 223–228 (2014). [20] E. Rykhlinskaya, “A Computer-algebraic Approach to the Study of the Symmetry Properties of Molecules and Clusters”. Doctoral thesis, Kassel University, 2006. [21] S.Fritzshche, “Application of Point-Group Symmetries in Chemistry and Physics: A Computer-Algebraic Approach”, International Journal of Quantum Chemistry, Vol 106, 98–129 (2006). [22] M. P. Barnett,“Computer algebra in the life sciences”,Communications in Computer Algebra, Vol 36, No.4, 5–32, 2002. [23] M. I. Aroyo, J. M. Perez-Mato, D. Orobengoa, E. Tasci, G. de la Flor, A. Kirov, “Crystallography online: Bilbao Crystallographic Server”, Bulg. Chem. Commun. 43(2) 183-197 (2011). [24] M. I. Aroyo, J. M. Perez-Mato, C. Capillas, E. Kroumova, S. Ivantchev, G. 197 Madariaga, A. Kirov and H. Wondratschek “Bilbao Crystallographic Server I: Databases and crystallographic computing programs” Z. Krist. 221, 1, 15–27 (2006). doi:10.1524/zkri.2006.221.1.15. [25] M. I. Aroyo, A. Kirov, C. Capillas, J. M. Perez-Mato and H. Wondratschek “Bilbao Crystallographic Server II: Representations of crystallographic point groups and space groups” Acta Cryst. A62, 115–128 (2006). doi:10.1107/S0108767305040286. [26] B. Kostant, “The Graph of the Truncated Icosahedron and the Last Letter of Galois”, Notice of AMS, Volume 42, No. 9, 959–968, (1995). [27] F.R.K.Chung, B. Kostant, B., S. Sternberg, “Groups and the buckyball”, in Lie Theory and geometry, Birkhauser, Boston, pp 97–126,(1994). [28] B. Eick and B. Souvignier, “Algorithms for crystallographic groups”, International Journal of Quantum Chemistry 106, 316–343 (2006). [29] J. D. Dixon, “High speed computation of group characters”, Numer. Math. 10,446– 450, 1099, (1967). [30] G. J. A. Schneider,“ Dixon’s character table algorithm revisited”, J. Symbolic Comput.9(5-6):601–606, (1990). [31] A. Hulpke, “Zur Berechnung von Charaktertafeln”, Diplomarbeit, Lehrstuhl D für Mathematik, Rheinisch Westfälische Technische Hochschule, (1993). [32] C. Herring, “Character tables for two space groups”, J. Franklin, Inst. 233, 525–543 (1942). [33] R. W. Wyckoff, The Analytical Expression of the Results of the theory of Space Groups, Carnegie Institute: Washington, DC,(1922). [34] O. N. Nyrasov and A. J. Freeman, “Electronic band structure of indium tin oxide and criteria for transparent conducting behavior”, Phys.Rev.B 64,233111-1–3(2001). [35] P. Etingof, O. Golberg, S. Hensel, T. Liu, A. Schwendner, D. Vaintrob, and E. Yudovina, Introduction to representation theory, <http://math.mit.edu/~etingof/ 198 replect.pdf>, p76–77. [36] P. J. Webb, “An Introduction to the Cohomology of Groups”, <http://www.math. umn.edu/~webb/oldteaching/Year2010-11/8246CohomologyNotes.pdf>. [37] R.C.Haddon, L.E.Brus. K.Raghavachari,“Electronic structure and binding in icosahedral C60 , Chem. Phys. Lett, 125, issues 5–6, 459–464, (1986). [38] W. H. Green, Jr, S. M. Gorun, G. Fitzgerald, P. W. Fowler, A. Ceulemans and B. Titeca, “Electronic Structures and Geometries of C60 Anions via Density Functional Calculations”, J.Phys.Chem, 100, 14892–14898, (1996). [39] V. de Coulon, J.L.Martins, F.Reuse, “Electronic structure of neutral and charged C60 clusters”, Phys. Rev. B 45, No. 23, 13671–13675, (1992). [40] G. und Polya, “Kombinatorische chemische Verbindungen”, Anzahlbestimmungen Acta Mathematica für Gruppen, 68(1): Graphen 145–254(1937), doi:10.1007/BF02546665. [41] R. Schmied, K. K. Lehmann, “Computer-generated character tables and nuclear spin statistical weights: Application to benzene dimer and methane dimer”,Journal of Molecular Spectroscopy 226 201–202 (2004), DOI:10.1016/j.jms.2004.04.003. [42] D. M. Jonas,“Spin statistics: An error in Landau and Lifschitz’ Quantum Mechanics”, J.Chem.Phys.90(10),5563–5565 (1989). [43] L. D. Landau and E. M. Lifschitz, Quantum Mechanics, 3rd ed. Sec.105 (Pergamon,1977). [44] A. Kikuchi, “An approach to first principles electronic structure computation by symbolic-numeric computation”, QScience Connect 2013:14 (2013), <http://dx.doi. org/10.5339/connect.2013.14>. [45] R. Courant and D. Hilbert, Method of mathematical physics, Vol.1–2,(WileyVCH,1989). 199 SUPPLEMENT: MATRIX GENERATORS OF THE POINT GROUP In this supplement I give the matrix generators, in order to define the point group. They are written in the GAP language. # # THE MATRIX IN THE POINT GROUP OF CUBIC LATTICE. # # THE OPERATIONS IN THE REAL SPACE. # CMR:=[[[1,0,0],[0,1,0],[0,0,1]],[[1,0,0],[0,-1,0],[0,0,-1]], [[-1,0,0],[0,1,0],[0,0,-1]],[[-1,0,0],[0,-1,0],[0,0,1]], [[0,1,0],[0,0,1],[1,0,0]],[[0,1,0],[0,0,-1],[-1,0,0]], [[0,-1,0],[0,0,1],[-1,0,0]],[[0,-1,0],[0,0,-1],[1,0,0]], [[0,0,1],[1,0,0],[0,1,0]],[[0,0,1],[-1,0,0],[0,-1,0]], [[0,0,-1],[1,0,0],[0,-1,0]],[[0,0,-1],[-1,0,0],[0,1,0]], [[0,-1,0],[-1,0,0],[0,0,-1]],[[0,-1,0],[1,0,0],[0,0,1]], [[0,1,0],[-1,0,0],[0,0,1]],[[0,1,0],[1,0,0],[0,0,-1]], [[-1,0,0],[0,0,-1],[0,-1,0]],[[-1,0,0],[0,0,1],[0,1,0]], [[1,0,0],[0,0,-1],[0,1,0]],[[1,0,0],[0,0,1],[0,-1,0]], [[0,0,-1],[0,-1,0],[-1,0,0]],[[0,0,-1],[0,1,0],[1,0,0]], [[0,0,1],[0,-1,0],[1,0,0]],[[0,0,1],[0,1,0],[-1,0,0]], [[-1,0,0],[0,-1,0],[0,0,-1]],[[-1,0,0],[0,1,0],[0,0,1]], [[1,0,0],[0,-1,0],[0,0,1]],[[1,0,0],[0,1,0],[0,0,-1]], [[0,-1,0],[0,0,-1],[-1,0,0]],[[0,-1,0],[0,0,1],[1,0,0]], [[0,1,0],[0,0,-1],[1,0,0]],[[0,1,0],[0,0,1],[-1,0,0]], [[0,0,-1],[-1,0,0],[0,-1,0]],[[0,0,-1],[1,0,0],[0,1,0]], [[0,0,1],[-1,0,0],[0,1,0]],[[0,0,1],[1,0,0],[0,-1,0]], 200 [[0,1,0],[1,0,0],[0,0,1]],[[0,1,0],[-1,0,0],[0,0,-1]], [[0,-1,0],[1,0,0],[0,0,-1]],[[0,-1,0],[-1,0,0],[0,0,1]], [[1,0,0],[0,0,1],[0,1,0]],[[1,0,0],[0,0,-1],[0,-1,0]], [[-1,0,0],[0,0,1],[0,-1,0]],[[-1,0,0],[0,0,-1],[0,1,0]], [[0,0,1],[0,1,0],[1,0,0]],[[0,0,1],[0,-1,0],[-1,0,0]], [[0,0,-1],[0,1,0],[-1,0,0]],[[0,0,-1],[0,-1,0],[1,0,0]]];; # # THE OPERATIONS IN THE RECIPROCAL SPACE. # CMT:=[[[1,0,0],[0,1,0],[0,0,1]],[[-1,0,0],[-1,0,1],[-1,1,0]], [[0,-1,1],[0,-1,0],[1,-1,0]],[[0,1,-1],[1,0,-1],[0,0,-1]], [[0,1,0],[0,0,1],[1,0,0]],[[0,-1,0],[1,-1,0],[0,-1,1]], [[1,0,-1],[0,0,-1],[0,1,-1]],[[-1,0,1],[-1,1,0],[-1,0,0]], [[0,0,1],[1,0,0],[0,1,0]],[[0,0,-1],[0,1,-1],[1,0,-1]], [[-1,1,0],[-1,0,0],[-1,0,1]],[[1,-1,0],[0,-1,1],[0,-1,0]], [[0,-1,0],[-1,0,0],[0,0,-1]],[[0,1,0],[0,1,-1],[-1,1,0]], [[1,0,-1],[1,0,0],[1,-1,0]],[[-1,0,1],[0,-1,1],[0,0,1]], [[-1,0,0],[0,0,-1],[0,-1,0]],[[1,0,0],[1,-1,0],[1,0,-1]], [[0,-1,1],[0,0,1],[-1,0,1]],[[0,1,-1],[-1,1,0],[0,1,0]], [[0,0,-1],[0,-1,0],[-1,0,0]],[[0,0,1],[-1,0,1],[0,-1,1]], [[-1,1,0],[0,1,0],[0,1,-1]],[[1,-1,0],[1,0,-1],[1,0,0]], [[-1,0,0],[0,-1,0],[0,0,-1]],[[1,0,0],[1,0,-1],[1,-1,0]], [[0,1,-1],[0,1,0],[-1,1,0]],[[0,-1,1],[-1,0,1],[0,0,1]], [[0,-1,0],[0,0,-1],[-1,0,0]],[[0,1,0],[-1,1,0],[0,1,-1]], [[-1,0,1],[0,0,1],[0,-1,1]],[[1,0,-1],[1,-1,0],[1,0,0]], [[0,0,-1],[-1,0,0],[0,-1,0]],[[0,0,1],[0,-1,1],[-1,0,1]], [[1,-1,0],[1,0,0],[1,0,-1]],[[-1,1,0],[0,1,-1],[0,1,0]], 201 [[0,1,0],[1,0,0],[0,0,1]],[[0,-1,0],[0,-1,1],[1,-1,0]], [[-1,0,1],[-1,0,0],[-1,1,0]],[[1,0,-1],[0,1,-1],[0,0,-1]], [[1,0,0],[0,0,1],[0,1,0]],[[-1,0,0],[-1,1,0],[-1,0,1]], [[0,1,-1],[0,0,-1],[1,0,-1]],[[0,-1,1],[1,-1,0],[0,-1,0]], [[0,0,1],[0,1,0],[1,0,0]],[[0,0,-1],[1,0,-1],[0,1,-1]], [[1,-1,0],[0,-1,0],[0,-1,1]],[[-1,1,0],[-1,0,1],[-1,0,0]]];; # # THE PRIMITIVE TRANSLATIONS. # A:=[[0,1,1],[1,0,1],[1,1,0]]/2;; # # TRANSFORMATION FROM MR TO MT; # CMT=List(CMR,m->TransposedMat(A^-1*TransposedMat(m)*A)); # # THE MULTIPLICATION TABLE. # TBL:=List(CMR,i->List(CMR,j->Position(CMR,i*j))); # # # THE MATRIX IN THE POINT GROUP OF HEXAGONAL LATTICE. # # THE PRIMITIVE TRANSLATIONS HA:=[A1,A2,A3]; # [ Sqrt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qrt(3)/2,0,Sqrt(3)/2,1/2,0,0,0,1,0,0,-1/2], [3,-1/2,-Sqrt(3)/2,0,Sqrt(3)/2,-1/2,0,0,0,1,0,0,0], [4,-1,0,0,0,-1,0,0,0,1,0,0,-1/2], [5,-1/2,Sqrt(3)/2,0,-Sqrt(3)/2,-1/2,0,0,0,1,0,0,0], [6,1/2,Sqrt(3)/2,0,-Sqrt(3)/2,1/2,0,0,0,1,0,0,-1/2], [7,-1/2,-Sqrt(3)/2,0,-Sqrt(3)/2,1/2,0,0,0,-1,0,0,-1/2], [8,1/2,-Sqrt(3)/2,0,-Sqrt(3)/2,-1/2,0,0,0,-1,0,0,0], 206 [9,1,0,0,0,-1,0,0,0,-1,0,0,-1/2], [10,1/2,Sqrt(3)/2,0,Sqrt(3)/2,-1/2,0,0,0,-1,0,0,0], [11,-1/2,Sqrt(3)/2,0,Sqrt(3)/2,1/2,0,0,0,-1,0,0,-1/2], [12,-1,0,0,0,1,0,0,0,-1,0,0,0], [13,-1,0,0,0,-1,0,0,0,-1,0,0,-1/2], [14,-1/2,Sqrt(3)/2,0,-Sqrt(3)/2,-1/2,0,0,0,-1,0,0,0], [15,1/2,Sqrt(3)/2,0,-Sqrt(3)/2,1/2,0,0,0,-1,0,0,-1/2], [16,1,0,0,0,1,0,0,0,-1,0,0,0], [17,1/2,-Sqrt(3)/2,0,Sqrt(3)/2,1/2,0,0,0,-1,0,0,-1/2], [18,-1/2,-Sqrt(3)/2,0,Sqrt(3)/2,-1/2,0,0,0,-1,0,0,0], [19,1/2,Sqrt(3)/2,0,Sqrt(3)/2,-1/2,0,0,0,1,0,0,0], [20,-1/2,Sqrt(3)/2,0,Sqrt(3)/2,1/2,0,0,0,1,0,0,-1/2], [21,-1,0,0,0,1,0,0,0,1,0,0,0], [22,-1/2,-Sqrt(3)/2,0,-Sqrt(3)/2,1/2,0,0,0,1,0,0,-1/2], [23,1/2,-Sqrt(3)/2,0,-Sqrt(3)/2,-1/2,0,0,0,1,0,0,0], [24,1,0,0,0,-1,0,0,0,1,0,0,-1/2]];; SUPPLEMENT:SOME FUNCTIONS USED IN THE COMPUTATIONS AT ”SYMMETRY IN C60 ” # # This file contains some functions used in the computations # in VII. "SYMMETRY IN C60". # listtoh:=function(A) 207 local h,i1,i2,i3,i4,k,l,i; h:=List([1..120],i->List([1..120],j->0)); for i in A do i1:=i[1]; i2:=i[2]; i3:=i[3]; i4:=i[4]; k:=(i1-2)+60*(i2-1); l:=(i3-2)+60*(i4-1); h[k][l]:=1; h[l][k]:=1; od; return h; end; # # We construct an extended group by the direct product # between A5 and one of the automorphism group. # # The new group contains 120 elements, represented by 62 symbols. # The symbols from the 3rd to the 62nd are descendants from A5. # The symbols of the first and the second are the newcomers # in the extension. # # From the 62 symbols, we construct a bonding system # which contains 120 atoms, regulated by the symmetry of the # new group. (C120) 208 # The atoms will be indexed as (i,j) (i=3,..,62, and j=1,2) # by the duplication of single C60. # # # The generators of the group. (A5 and I) # g1:=( ( 1, 14, 20)( 6, 58, 22)( 2, 15, 16)( 7, 57, 23)( 3, 11, 17)( 8, 56, 24)( 4, 12, 18)( 5, 13, 19) 9, 60, 25)( 10, 59, 21) ( 31, 44, 50)( 32, 45, 46)( 33, 41, 47)( 34, 42, 48)( 35, 43, 49) ( 36, 28, 52)( 37, 27, 53)( 38, 26, 54)( 39, 30, 55)( 40, 29, 51); g2:=( ( 1, 2, 3, 4, 8, 13, 18, 23, 28)( 5)( 6, 11, 16, 21, 26)( 7, 12, 17, 22, 27) 9, 14, 19, 24, 29)( 10, 15, 20, 25, 30) ( 31, 32, 33, 34, 35)( 36, 41, 46, 51, 56)( 37, 42, 47, 52, 57) ( 38, 43, 48, 53, 58)( 39, 44, 49, 54, 59)( 40, 45, 50, 55, 60); g3:=( ( 1, 31)( 8, 38)( 2, 32)( 3, 33)( 4, 34)( 5, 35)( 6, 36)( 7, 37) 9, 39)( 10, 40)( 11, 41)( 12, 42)( 13, 43)( 14, 44) ( 15, 45)( 16, 46)( 17, 47)( 18, 48)( 19, 49)( 20, 50)( 21, 51) ( 22, 52)( 23, 53)( 24, 54)( 25, 55)( 26, 56)( 27, 57)( 28, 58) ( 29, 59)( 30, 60); # I define g2 in this way in the article. g2:=g2^-1; # 209 G:=Group(g1,g2); AUALL:=AutomorphismGroup(G); p:=SemidirectProduct(Group(AUALL.1),G); N:=Image(Embedding(p,2)); # # The orbits of the double bond [(3,1),(4,1)] # and the single bonds [3,1,8,1] # and the bond between the first and the second C60 # are computed as A1,B1,C1 # # The bonding structures from them are represented by # three matrices a1,b1,c1. # A1:=Orbit(p,[3,1,4,1],OnTuples); B1:=Orbit(p,[3,1,8,1],OnTuples); C1:=Orbit(p,[3,1,4,2],OnTuples); a1:=listtoh(A1); b1:=listtoh(B1); c1:=listtoh(C1); # # The symmetry operations of the 120 atoms are written as: # l1:=List([1..2],j->List([3..62],i->(OnPoints(i,p.1)+60*(j-1)))); l1:=Flat(l1); 210 l2:=List([1..2],j->List([3..62],i->(OnPoints(i,p.2)+60*(j-1)))); l2:=Flat(l2); l3:=List([1..2],j->List([3..62],i->(OnPoints(i,p.3)+60*(OnPoints(j,p.3)-1)))); l3:=Flat(l3); # # inv1:=List([1..60],i->OnPoints(i,g3)+2); inv2:=inv1+60; inv:=Flat([inv1,inv2]); ListToMat:=function(l) local size,h,i,j; size:=Size(l); h:=List([1..size],i->List([1..size],j->0)); for i in [1..size] do h[i][l[i]]:=1; od; return h; end; # # Now generators (p.1,p.2,p.3) are represented by matrix P1,P2,P3. # P1:=ListToMat(l1-2); P2:=ListToMat(l2-2); 211 P3:=ListToMat(l3-2); # # In C60, of the icosahedral symmetry, the symmetry operation also includes # the inversion. The inversion itself is not includes in the new group, # but we can write the operation of this operation on first 60 vertexes # (from the 3rd to the 62nd) # The inversion in the second 60 vertexes can be written in the following way. # The second 60 vertexes are transmuted from the first 60, by the operation p.3. # # If the inversions on the first and second 60 vertexes are denoted as I1,I2, # they are related by the conjugation I2:= (p.3)*I1*(p.3)^(-1). # The inversion on the total system is written as # [[ I1, # [ 0] 0, I2]]. # # # ListInv: the operation of "g3" in the first shell. ListInv:=List([1..60],i->OnPoints(i,g3)); # mconjg : the operation of "p.3" from the first to the second shell. mconjg:=List([3..62],i->OnPoints(i,p.3))-2; # # These operations are put into matrix, "invrs", "mc". # invrs:=List([1..60],i->List([1..60],j->0)); 212 mc:=List([1..60],i->List([1..60],j->0)); for i in [1..60] do invrs[i][ListInv[i]]:=1; mc[i][mconjg[i]]:=1; od; invrs2:=mc*invrs*mc; # "invrs": the inversion in the first shell. # "invrs2": the inversion in the second shell. # # Set the inversions in two shells in a matrix "ivfull". # ivfull:=List([1..120],i->List([1..120],j->0)); for i in [1..60] do for j in [1..60] do ivfull[i][j]:=invrs[i][j]; ivfull[i+60][j+60]:=invrs2[i][j]; od; od; # # As the matrix c1 are not conserved by the inversion "ivfull", # (as ivfull*c1*ivfull^-1 is not equal to c1) # it is modified to have inversion symmetry. # hh:=-2*a1-b1-1/2*(c1+ivfull*c1*ivfull); 213 # # The generalized eigenvalue problems are solved in # the field of rational numbers. # gev:=GeneralisedEigenvalues(Rationals,hh); ges:=GeneralisedEigenspaces(Rationals,hh); # # The irreducible representation is computed. # # "irrg" is the group of the symmetry in the composed structure. # "irrg2" is the subgroup. # irrg:=Irr(Group(P1,P2,P3,ivfull)); irrg2:=Irr(Group(P1,P2,ivfull)); Em:=Elements(Group(P1,P2,P3,ivfull));; Em2:=Elements(Group(P1,P2,ivfull));; Projopr:=function(irr,Em) # # The projector, by means of characters. # return List(irr,i->Sum(List(Em,j->j^i*j))/Size(Em)*i[1]); end; prjs:=Projopr(irrg,Em);; 214 prjs2:=Projopr(irrg2,Em2);; # # The basis vectors are computed and allotted to the irreducible representation. # bases:=List(ges,i->Basis(i)); for b in bases do;Display(List(b,j->List( prjs,p->(p*j)^2 ))); od; for b in bases do;Display(List(b,j->List(prjs2,p->(p*j)^2 )));od; SUPPLEMENT:SOME FUNCTIONS USED IN THE COMPUTATIONS AT ”ANALISYS OF VIBRATIONAL MODE IN C60 ” # # THIS FILE CONTAINS SMALL FUNCTIONS FOR THE COMPUTATION CONCERNING C60. # (VIII."ANALYSIS OF VIBRATIONAL MODE IN C60") # cc:=(E(5)+E(5)^4)/2; ss:=(E(5)-E(5)^4)/2/E(4); cc10:=(E(10)+E(10)^4)/2; ss10:=(E(10)-E(10)^4)/2/E(4); x:=Indeterminate(Rationals,"x"); z:=Indeterminate(Rationals,"z"); y:=Indeterminate(Rationals,"y"); 215 # # MATRIX OF ROTATION OF 72 DEGREES (A GENERATOR OF GROUP A5). # M72D:=[[cc,-ss,0],[ss,cc,0],[0,0,1]]; # # # HEAFTER, VERY TRIVIAL COMPUTATIONS ARE DONE # IN ORDER TO GIVE 12 VERTEX ON ICOSAHEDRON. # v:=[[0,0,0],[0,0,0],[0,0,0]]; v[1]:=[0*x,0*x,x^0]; v[2]:=[x,0*x,z]; v[3]:=M72D^-1*v[2]; v21:=v[2]-v[1]; v32:=v[3]-v[2]; L21:=v21*v21; L32:=v32*v32; B:=[L21-L32,v[2]*v[2]-1]; GB:=GroebnerBasis(B,MonomialLexOrdering()); RTPS:=RootsOfPolynomial(GB[3]); zval:=RTPS[2]; xval:=Sqrt(1-zval*zval); vval:=List(v,i->List(i,j->Value(j,[x,z],[xval,zval]))); 216 # # NOW 12 VERTEX ARE PREPARED. # sommets:=List([1..12],i->0); sommets[1]:=vval[1]; sommets[2]:= vval[2]; sommets[3]:=M72D^-1*vval[2]; sommets[4]:=M72D^-2*vval[2]; sommets[5]:=M72D^-3*vval[2]; sommets[6]:=M72D^-4*vval[2]; sommets[7]:=-vval[1]; sommets[8]:=- vval[2]; sommets[9]:=-M72D^-1*vval[2]; sommets[10]:=-M72D^-2*vval[2]; sommets[11]:=-M72D^-3*vval[2]; sommets[12]:=-M72D^-4*vval[2]; # Tv:=TransposedMat(vval); Tv2:=TransposedMat([vval[2],vval[3],vval[1]]); Inv:=[[-1,0,0],[0,-1,0],[0,0,-1]]; # # THE THREE VECTORS, STORED IN THE COLUMNS in "Tv" AND "Tv2" # ARE RELATED BY THE ROTATION, WHICH IS OTHER GENERATOR OF A5. # # THE GROUP (A5 x I) , DEFINED IN 3D-EUCLID SPACE.(THE GROUP G) 217 # # THE GENERATORS OF THIS GROUP (G.1,G.2,G.3) ARE (g1,g2,g3) IN THE ARTICLE. # G:=Group(Tv2*Tv^-1,M72D^-1,Inv); irrg:=Irr(G); elm:=Elements(G); # # THE PROJECTORS, EXPLANED IN THE ARTICLE. # Projopr:=function(irr,Em,hom) # return List(irr,i->Sum(List(Em,j->j^i*Image(hom,j)))/Size(Em)*i[1]); end; ProjoprR:=function(irr,Em,MM,hom) # return List(irr,i->Sum(List(Em,j->j^i*Image(hom,j)*MM*TransposedMat(Image(hom,j)))) /Size(Em)*i[1]); end; # # THE DEFINITION OF GROUP (A5 x I) BY THE PERMUTATION OF 12 VERTEX IN ICOSAHEDRON # (GROUP F) 218 # f1:=(1,2,3)(4,6,11)(5,10,12)(7,8,9); f2:=(2,3,4,5,6)(8,9,10,11,12); f3:=(1,7)(2,8)(3,9)(4,10)(5,11)(6,12); F:=Group(f1,f2,f3); # # THE DEFINITION OF GROUP (A5 x I) BY THE PERMUTATION OF 60 VERTEX IN C60 # (GROUP R) # r1:=( ( 1, 14, 20)( 6, 58, 22)( 2, 15, 16)( 7, 57, 23)( 3, 11, 17)( 8, 56, 24)( 4, 12, 18)( 5, 13, 19) 9, 60, 25)( 10, 59, 21) ( 31, 44, 50)( 32, 45, 46)( 33, 41, 47)( 34, 42, 48)( 35, 43, 49) ( 36, 28, 52)( 37, 27, 53)( 38, 26, 54)( 39, 30, 55)( 40, 29, 51); r2:=( ( 1, 2, 3, 4, 8, 13, 18, 23, 28)( 5)( 6, 11, 16, 21, 26)( 7, 12, 17, 22, 27) 9, 14, 19, 24, 29)( 10, 15, 20, 25, 30) ( 31, 32, 33, 34, 35)( 36, 41, 46, 51, 56)( 37, 42, 47, 52, 57) ( 38, 43, 48, 53, 58)( 39, 44, 49, 54, 59)( 40, 45, 50, 55, 60); r3:=( ( 1, 31)( 8, 38)( 2, 32)( 3, 33)( 4, 34)( 5, 35)( 6, 36)( 7, 37) 9, 39)( 10, 40)( 11, 41)( 12, 42)( 13, 43)( 14, 44) ( 15, 45)( 16, 46)( 17, 47)( 18, 48)( 19, 49)( 20, 50)( 21, 51) ( 22, 52)( 23, 53)( 24, 54)( 25, 55)( 26, 56)( 27, 57)( 28, 58) ( 29, 59)( 30, 60); R:=Group(r1,r2,r3); # # THE ISOMORPHISM BETWEEN GROUPS 219 # iso:=IsomorphismGroups(F,R); iso2:=IsomorphismGroups(F,G); hom:=GroupHomomorphismByImages(F,G,[F.1,F.2,F.3],[G.1,G.2,G.3]); hom2:=GroupHomomorphismByImages(R,G,[R.1,R.2,R.3],[G.1,G.2,G.3]); Display(List(Irr(R),r->List([R.1,R.2,R.3],i->i^r))); MM:=[[0*x,x,y],[-x,0*x,z],[-y,-z,0*x]]; PRJ:=Projopr(Irr(R),Elements(R),hom2); PRJR:=ProjoprR(Irr(R),Elements(R),MM,hom2); # # THE FUNCTIONS DEFINED AND EXPLAINED IN THE ARTICLE. # # ListToMat:=function(l) local size,h,i,j; size:=Size(l); h:=List([1..size],i->List([1..size],j->0)); for i in [1..size] do h[i][l[i]]:=1; od; return h; end; LargeMatrix:=function(rr,iso) 220 local l,rmat,rrimg,i,i1,i2,n,m; l:=ListPerm(rr,60); rmat:=List([1..Size(l)*3],i->List([1..Size(l)*3],j->0)); rrimg:=Image(iso,rr); for i in [1..Size(l)] do i1:=i-1;i2:=l[i]-1; for n in [1..3] do for m in [1..3] do rmat[3*i1+n][3*i2+m]:=rrimg[n][m]; od; od; od; return rmat; end; # # THE DEFINITION OF PROJECTOR, DEFINED IN THE ARTICLE # IN ORDER TO COMPUTE THE MODE OF DEFORMATION IN C60. # ProjoprE:=function(irr,Em,hom2) # local A,B; #A:=List(Em,j->LargeMatrix(j,hom2)); 221 #B:=List(irr,i->List(Em,j->j^i)); return List(irr,i->Sum(List(Em,j->j^i*LargeMatrix(j,hom2)))/Size(Em)*i[1]); end; PRJE:=ProjoprE(Irr(R),Elements(R),hom2); BAS:=List(PRJE,i->BaseMat(TransposedMat(i))); BASSIZE:=List(BAS,Size); CROT:=List(Elements(R),i->Trace(ListToMat(ListPerm(i,60)))); CIRR:=List(Irr(R),r->List(Elements(R),i->i^r)); # In the trace representation the basis set composed from column vectors # of the projector may include the multiplicated spaces of # the representation. The basis vectors might be transmuted # with each other transitively, not confined in the one of # the component of the multiplicated irreducible spaces. # The basis set of the decomposion into the irreduciple # representations and the conjugacy classes are prepared. cng:=ConjugacyClasses(R);; rcng:=List(cng,Representative);; rcng2:=List(rcng,j->LargeMatrix(j,hom2));; charact:=function(g,B) 222 return Trace(B*g*TransposedMat(B)*(B*TransposedMat(B))^-1); end; gopr:=function(O,v,i,hom) local irr; irr:=Irr(O); return Sum(List(Elements(O),j->j^irr[i]*LargeMatrix(j,hom)*v)); end; Cutout:=function(BAS,PROJ,R,hom,NMULTI,REPSIZ) # # BAS : THE VECTOR SPACE INCLUDING THE COPIES OF IRREDUCIBLE SPACES # PROJ : THE PROJECTORS # R : THE GROUP IN THE PROBLEM. # hom : THE HOMOMORPHISM FROM <R> TO THE MATRIX GROUP. # NMULTI : THE SIZE OF THE SUBGROUP TO FORM THE COSET. # REPSIZ : THE SIZE OF THE IRREDUCIBLE REPRESENTATION. # local C,D,BASN,EA,O,l,P,p,B,OV,SI,AS,OREP,ww,OT,ith,ifind; C:=[]; D:=[]; BASN:=BAS; EA:=List(Elements(R),j->LargeMatrix(j,hom));; # # The subgroups with the order of "NMULTI" are extracted. # 223 AS:=AllSubgroups(R); while (BASN<>[]) do Print("\n",Size(BASN),"\n"); O:=Filtered(AS,g->Order(g)=NMULTI);; Print(O); # # The subgroups which generate the vector space of # the correct dimension of the irreducible representation # are chosen. # if (O=[]) then O:=[Group(One(R))]; fi; l:=List([1..Size(O)],i->0); ifind:=0; ith:=1; while (ifind=0 and ith<=Size(O)) do ww:=gopr(O[ith],BASN[1],1,hom); l[ith]:=RankMat(List(EA,g->g*ww)); Print(l); if (l[ith]=REPSIZ) then ifind:=1; OT:=O[ith]; fi; ith:=ith+1; 224 od; if (ifind=0) then Print("CHANGE THE SUPPOSITION!\n"); return 0; fi; # # By means of the chosen subgroup, the irreducible # vector space "B" is generated. # It is stored in the vector space "D". # B:=BaseMat(List(EA,g->g*gopr(OT,BASN[1],1,hom)));; Append(C,[B]); Append(D,B); # # The orthogonal space "OV" to the vector space "D" is prepared. # OV:=BaseOrthogonalSpaceMat(D); # # The vector space "BASN" to be processed is renewed now, # by the projection "PROJ" on the vectors in "OV". # BASN:=BaseMat(List(OV,o->PROJ*o)); # # Instead, it is possible that "BASN" is renewed # as the intersection between "BASN" and "OV". # # SI:=SumIntersectionMat(BASN,OV); 225 # BASN:=SI[2]; # od; # # Return C, the separated subspaces. # return C; end; H1:=Cutout(BAS[9],PRJE[9],R,hom2,5,5); # # TO MAKE THE MATRIX NEEDED IN THE COMPUTATION OF MATRIX CONJUGATION # EXPLAINED IN THE ARTICLE. # ConjugMatrix:=function(rr) local l,rmat,vmat,i,i1,i2,n,m; l:=ListPerm(rr,60); vmat:=List([1..Size(l)*3],i->List([1..Size(l)*3],j->0)); for i in [1..Size(l)] do i1:=i-1;i2:=l[i]-1; for n in [1..3] do vmat[3*i1+n][3*i2+n]:=1; od; 226 od; return vmat; end; 227
5cs.CE
arXiv:1706.03122v1 [cs.AI] 9 Jun 2017 Off The Beaten Lane: AI Challenges In MOBAs Beyond Player Control Michael Cook Adam Summerville Simon Colton Games Academy Falmouth University Expressive Intelligence Studio UC Santa Cruz Games Academy Falmouth University Abstract MOBAs represent a huge segment of online gaming and are growing as both an eSport and a casual genre. The natural starting point for AI researchers interested in MOBAs is to develop an AI to play the game better than a human - but MOBAs have many more challenges besides adversarial AI. In this paper we introduce the reader to the wider context of MOBA culture, propose a range of challenges faced by the community today, and posit concrete AI projects that can be undertaken to begin solving them. Introduction Multiplayer Online Battle Arenas, a clumsy phrase shortened to MOBA, describes a growing genre of videogames typically designed as highly competitive eSports. Many of them are part of a family tree that traces back to Warcraft 3 mods such as DOTA Allstars, and now form a contingent of the most popular and most player games of today, including League of Legends, DOTA 2 and Heroes Of The Storm. MOBAs are huge and rapidly expanding in every sense in terms of their cultural impact on games, in terms of their financial impact on the industry, and in terms of their impact on how the games community is spending its time. As a result, they are attracting increasing interest from researchers, both those interested in building technological systems into the game, and those interested in studying the many different stakeholder groups in the community. In an age of deep learning and AIs making headlines, the obvious target for AI researchers to study would be the implementation of bots that can play the game at human or superhuman level. Google DeepMind have already stated that their next objective will be to develop a system that can play Starcraft 2, a competitive videogame with similarities to MOBAs at least culturally if not mechanically. We believe that the development of player-competitive AI represents just one small challenge offered by the complex world of MOBA playing, but that many of these challenges are hard for researchers to access because of the vast knowledge barriers that exist when trying to understand the genre or what makes it interesting. In this paper we try to pick apart interesting challenges in and around the MOBA genre. Some of them touch upon deeply technical problems within the game, others relate to ways that AI can assist in the emerging activities that happen around MOBA games, especially relating to the professional eSports scene. We do our best to present these challenges with the minimum of context for the reader, so that researchers whose background may not be in strategy games or MOBAs specifically can hopefully see why these problems are interesting and hopefully motivate more diverse research in the area. The remainder of the paper is organised as follows: in Background we provide a minimal introduction to MOBAs, primarily focusing on one specific game, DOTA 2 due to the particular experience of the authors. We discuss the game itself, the professional scene, and surrounding culture. In Challenges we outline some important challenges we have identified throughout the MOBA genre, and provide specific ideas about projects that could be conducted to help work towards solving or assisting humans in tackling these problems. In Existing & Related Work we discuss some of the work already done in the MOBA genre, as well as highlighting some work beyond MOBAs that could contribute to the challenges in this paper. Background - DOTA 2 DOTA 2 is a complicated game with a large amount of intersecting systems, lists of specific knowledge and historical trends. For the purposes of this paper we will be focusing on a light coverage of key themes and ideas, sufficient to understand the challenges we present in the next section. Additionally, although DOTA 2 is a game about exceptions and special cases, we will make generalisations in this section in order to simplify the high-level description of the game. Gameplay - Drafting A single game typically has two phases – a drafting phase where players choose heroes to play, and a gameplay phase where the main game takes place. The nature of the draft phase depends on the game mode. In this paper we will primarily discuss Captain’s Mode, a game mode used in professional play but less popular with casual players. In Captain’s Mode each player nominates a captain who chooses heroes for their team. The two captains go through a fixed order of picking heroes (which adds them to their team) and banning heroes (which stops either team from picking them). A hero can only be picked once. Figure 1 shows a screenshot from Figure 1: The drafting phase from a match between Team Empire and OG. Picked heroes appear in large portraits, while bans are listed on the left in smaller images. Team Empire are about to pick their fourth hero. a professional game’s drafting phase. Drafting is complex enough to warrant its own paper. Indeed, professional players often turn up to tournaments with ‘drafting bibles’ filled with pages of notes about enemy team strategies, their own prepared ideas for drafts, and historical information about synergies and counter-strategies. There are 112 heroes in the game in total, and each one has a particular combination of skills and strengths, some of which may overlap or synergise with other heroes. For the purposes of this paper, we will simplify heroes into two kinds: support heroes and core heroes. Support heroes are strong in the early parts of a game, typically because they have damaging spells or spells with special effects (such as a stun, which temporarily stops a hero from acting). Core heroes have properties which make them better later in the game, often because they either need to buy a particular item to become effective, or because they scale up faster than other heroes. For example, one hero is able to attack up to five targets simultaneously. This means that an item which provides increased damage is potentially five times as valuable on that hero. The number of cores selected for a team, and how much time they need to spend collecting resources, affects the kind of strategies available to a team during the game itself. Gameplay - Match The primary objective in a game of DOTA 2 is to destroy the opposing team’s Ancient, a structure protected in the centre of each team’s base. Figure 2 shows an annotated overheap drawing of the entire DOTA 2 map1 with the Ancients represented as circles in opposite corners. Connecting the two bases are three pathways called lanes, two around the edges of the map and one through the centre. Periodically, NPC creatures called creeps spawn from both bases and travel along these lanes, attacking each other when they meet. Towers are also placed along these lanes, indicated by squares in Figure 2. Towers are strong structures which at1 This map is from an earlier version of the game but is used here as the key details remain the same. Figure 2: An annotated map from a version of DOTA 2. Arrows indicate the directions creeps move along the three lanes. Squares indicate the location of towers, while the large circle is each team’s Ancient. tack nearby enemy units, provide vision for their team, and help define the borders of a team’s territory. Towers are invulnerable to damage unless they are the outermost tower in a lane, and the Ancient is invulnerable to damage unless one of the three towers at the end of a lane are destroyed. Thus, destroying towers in lanes is an important marker of overall progress in the game, and many strategies exist to achieve this, including some which intentionally avoid fighting enemy heroes in favour of destroying buildings. Games are colloquially broken up into three phases. The first phase is the early game, in which core players are focusing on obtaining gold and experience points. During this phase support players may protect their team’s cores, or they may attempt to move around the map and attack the opposing team’s cores. The second phase is the mid-game, where some cores have reached a point where they can begin to dictate the game’s direction. This might involve grouping with support heroes to destroy towers, or moving as a larger group to fight enemy heroes. Some cores may continue to obtain gold and experience if they need more than other cores. The final phase is the late game. At this point heroes have generally stopped focusing on resources and have important items and skills. This phase of the game is much less predictable as players tend to have less experience of it (all matches have an early game, but only some last long enough to enter the late game). This phase involves a larger amount of movement, fighting and strategic decision-making. Professional Play In 2011 Valve announced DOTA 2 by organising an global tournament called The International, in which sixteen profes- sional DOTA 1 teams were invited to compete for a share of $1.6m, the largest prize pool in eSports at the time. In 2015 The International’s fifth incarnation had a prize pool of over $18m. In the intervening years the professional scene has grown to become both an aspiration for young players and a big business for sponsors and organisers. Most of the top teams are run by independent organisations, have multiple sponsors, and employ managers, coaches, dedicated analysts, PR and various other staff. Most DOTA 2 tournaments, from the smallest amateur regionals to the highest-tier multi-million viewer events, are broadcast online to watch for free, with casters providing commentary, analysis and statistics on the matches. This is common across most eSports, including Heartstone, Starcraft 2 and other MOBAs like League of Legends. A common structure for an eSports broadcast has two distinct panels of people: an analysis desk which discusses games during downtime between matches; and a caster desk which describes and comments on the action during a game. Larger broadcasts may also employ statistics analysts who listen to commentary and provide relevant statistics about past events or current trends, as well as dedicated observers responsible for controlling the in-game camera based on commentator interest. Challenges In this section we describe challenges besides AI character control that we believe will become important and fruitful areas of research in the next few years. In each case we provide a little additional background where necessary, state the nature of the problem and how it is currently tackled (if at all) and then propose possible routes for AI research to take. Commentary Commentary is broken into three distinct areas, each with their own unique challenges - draft analysis, play-by-play and hypecasting. Draft Analysis During the draft the analysis desk typically discusses the heroes being picked and banned, the wider context of the game and how it reflects the current metagame, and how they expect the game itself to play out when the draft is complete. A draft timer limits the amount of time teams can spend picking heroes, but teams tend to maximise their use of this time, meaning drafts are often slow-paced and thus are a good area for researchers to focus on initially for commentary generation and assistance. Good predictive models for which heroes are likely to be picked or banned are fundamental to AI draft analysis. Machine learning is likely to perform well here, but the problem is complicated by the relative lack of data on professional matches. Towards the end of a particular patch cycle (discussed later) there may be a few thousand matches to pull from at most. More specific predictions may have much smaller datasets – data on a specific team, for example, may include only a few dozen matches. Hybrid techniques may be needed to provide useful analyses at different levels of detail, employing decision trees or linear regressions for smaller data pools. A secondary problem for good draft analysis, which also applies to statistics provided during the game, is selection. A vast quantity of data is available for DOTA 2, from the heroes drafted to the exact time at which a player bought an item in a specific game. Facts of all shapes and sizes can be discovered – records set by players, trends or preferences of certain captains, historical stories and expected performances – but selecting which are most appropriate for the current discussion is a separate challenge. This is partly a natural language processing problem, monitoring the conversation between analysts to dynamically rank facts and statistics for relevance, but models of ‘interestingness’ are also important. Subjective interestingness, and notions of ‘actionability’ and ‘unexpectedness’ from the knowledge discovery domain (Silberschatz and Tuzhilin 1995), may help inform models for statistic selection. Play-By-Play Commentating a game involves solving several different problems simultaneously and in real time. First and foremost, commentators must identify the most salient events happening in the game and describe them succinctly. During moments where many heroes are fighting together the challenge comes from identifying the most important features of the fight – which player actions are having the most impact, which actions are causing important changes in who has advantage. A major challenge here is ranking the actions of ten players simultaneously and being able to predict the next few seconds of action (since it takes time to commentate on an action, during which time more events have taken place). When large fights are not happening, the choice of what to discuss becomes broader. Commentators may talk about the emerging themes in the game – what strategies the teams are employing, how those strategies are faring, or the individual performances of a particular player. They may also identify what teams are planning to do next, based on the behaviour of players currently. In periods of downtime commentators may also discuss the game in the wider context of the tournament or series it is in – how it reflects the trends elsewhere in the tournament, or how the winner of this match might fare against the other teams they are likely to face next. Hypecasting & Wordplay It’s tempting to consider commentary as being purely concerned with conveying the facts of the game to the viewer, but a major part of MOBA commentary is in providing a sense of playfulness and excitement to proceedings. For some casters this is achieved through a sense of power and intensity in their delivery – Tobi Dawson is famous for his high-energy commentary and emotive descriptions of play. Other casters employ colourful language, phrasing and inventive wordplay to entertain viewers. Below is an excerpt from the grand final of The International in 2012, where David Gorman is addressing his co-caster, David ‘Lumi’ Zhang. There’s a freight train running down the tracks and it’s about to hit a car, and let me tell you Lumi, the car gives way – not the freight train. Inventing clever descriptions for events and coining names for teams or players links in well with existing research into metaphor, analogy and humour in computational creativity. Work in (Ritchie et al. 2007) lays out ways to create humour from linguistic collisions of concepts, and (Veale and Alnajjar 2015) describes systems for making perceptual connections between the real world and linguistic constructions. This shows that we can do more with language than simply state what is happening on screen, and research into AI casters should endeavour to go beyond this and be as engaging and innovative with language as human casters are. Camera Control Automated Camera Control In the early days of eSports commentators would broadcast their screen directly to viewers, and simultaneously describe what was happening as they tried to smoothly direct the camera’s view of proceedings. Today, the bigger tournaments and studios hire dedicated observers whose only job is to control the camera and focus on the most relevant action. Camera control is much harder in eSports compared to traditional sports as games often lack a single point of focus (such as a ball). Deciding what to show and how to show it is a difficult task. Tools that can help automate or assist in this process not only help high-end broadcasters, but also help amateur broadcasters and casual spectators a chance to focus on the game itself rather than controlling a camera. There is also a healthy body of research relating to camera control for other game genres – in (Yannakakis, Martı́nez, and Jhala 2010) the authors specifically consider the affective qualities of automated camera control, which is highly relevant for framing different kinds of action in a hectic MOBA game, while in (Burelli and Preuss 2014) the authors look at camera control as a multi-objective optimisation problem which is particularly appropriate for the dynamic action in spectator eSports. Highlighting An emerging problem for eSports design in general is a desire for succinct highlighting of matches. This is something that game designers are showing interest in not only at the professional level, highlighting important moments from top matches, but at the casual level where individual games may be able to produce their own highlight reels. DOTA 2 can be asked to automatically provide highlights of any game replay file, although the process is rudimentary and has not been improved in years. Highlighting is a mix of problems from camera control and commentary, with an additional pressure to present the results in an engaging and exciting way. The most interesting and significant moments from a game must be extracted, and framed in a way that best displays the action at hand. While many AI techniques could be used here, one promising possibility would be to leverage Twitch chat as a form of supervised learning. Twitch, a popular streaming service used to broadcast most professional DOTA 2 live, has a prolific (and, we should stress, often toxic) chat community. At times of intense action, humour, surprise or skill chatters often simultaneously send certain emotes in large quantities. These emote surges can be used to automatically label events in certain professional replays2 , which could then be cross2 Inspired by http://www.skip2.tv which implemented an emote Figure 3: A heatmap for a single player’s movement during the first ten minutes of a DOTA 2 match. referenced with replay data to train systems to recognise what causes such a strong reaction. These models could then be reapplied to ordinary games as an automated highlighter. Vision An observer ward is a cheap but limited-quantity item that can be placed on the map to provide vision in a 360 circle, obscured by certain map features like trees or cliffs. Observer wards are invisible, but can be detected and destroyed by certain items. If not destroyed, they expire naturally after seven minutes. Because observer wards are limited in number but destroyable, a tension exists between placing wards in good places while avoiding becoming predictable. Professional teams often study how certain players place wards in order to predict their behaviour in future games. This is an example of a tightly defined system within DOTA 2 that is ripe for analysis and optimisation. Publicly available replay data for any DOTA 2 match, including professional games, includes data about hero movement and ward placement, allowing a complete model to be built for which players were visible at what times, and what wards are commonly placed. Figure 3 shows a heatmap of a single player’s movement in the early game phase of a match. A tool to analyse the warding habits of a team to predict placement in an upcoming game, or to analyse common player movements and suggest ward placements for optimal coverage, would be useful for all players from new learners to professional teams. Existing research into modelling player vision may inform further work here. For example, in (Tremblay, Torres, and Verbrugge 2014) the authors analyse risk in traversing stealth game levels. The authors have published a number of papers counter to identify exciting moments in Twitch streams on related topics in stealth, which relate well to challenges related to vision and adversarial player movement in MOBAs. Patch Changes Like many videogames, MOBAs are frequently patched to fix bugs, rebalance game features and add new content. Because games like DOTA 2 are highly competitive, these patches also serve as a way to adjust the metagame by improving (or ‘buffing’) heroes, items and spells which are not used often, and weakening (or ‘nerfing’) heroes, items and spells which are overused or too powerful. Besides targeting specific entities in the game, patches can also adjust the way the game is played on a larger scale by targeting certain strategies or styles of play, adjusting the map geometry, or changing the order of drafting. New patches are significant moments in the history of the game. A major patch changes hundreds of game elements, from the cost of an item to the number of seconds a skill is on cooldown for after use. The first matches and tournaments played professionally after a new patch typically involve a lot of speculation and experimentation, and previously dominant teams and players can suddenly find themselves scrambling to compete as new strategies are stumbled upon or hypotheses are tested. Patches also represent a serious challenge for any AI system that relies on an understanding of the metagame (including player bot AI, commentary AI, draft analysis and more). The game fundamentally changes overnight in numerous ways, and existing archives of play data (and systems trained on them) no longer represent how the game currently plays. Two major challenges stand out in this area: Assessing Patch Impact In the days and weeks following a patch there is a scramble to understand what the overall effect the patch will have on the metagame. This understanding is vital for commentators to discuss in games, for teams to gain an edge on competitors, and for designers to assess the efficacy of their changes. Sometimes changes have obvious effects – if the cost of an item increases, that item will be harder to purchase. Other effects can be subtle and may take weeks to emerge – a buff to a particular item leads to a hero becoming stronger, thus picked more often, which in turn increases the value of a second hero whose primary purpose is to counter them. Being able to predict these chains or identify trends and strong strategies ahead of time is extremely valuable. We believe that building a simple forward model for DOTA 2’s combat may help assess the impact of small changes. Combining such a model with simple AI agents, replay data from the previous patch can be resimulated with the addition of one or more changes from the new patch, having AI agents take over at the point where the simulation diverges from the past data (for example, a patch change causes someone to live where they had died in the replay data, because the damage they took was reduced). From this, we can assess simple surface-level impacts from the patch such as changes to the efficacy of items or skills. While this is unlikely to provide a deep assessment of a patch’s impact on a hero, it may provide an indication on a micro-scale about what impact a patch is likely to have. Predicting Patch Content Towards the end of a patch cycle the metagame often becomes stagnant – highly-valued heroes are regularly banned and picked, many teams use the same strategies, and play approaches a state of equilibrium. A new patch will rectify this by rebalancing the game as described above, forcing strategies to be re-evaluated and a long process of experimentation and discovery to take place. A system that can assess the current metagame and predict or suggest patch changes is valuable both as a design tool (for designers, in suggesting balance changes or helping alter popular strategies) and as a competitive tool for teams to predict what new trends may emerge in the next patch, in order to prepare for them. AI learning approaches might be able to infer potential patch changes based on trends in previous patches (heroes are often buffed or nerfed in successive patches until a particular effect is achieved). We also believe the use of a forward model, as suggested above, might be able to predict possible changes based on items, heroes and strategies which are overused or have statistically abnormal winrates. Analogies may also be made between previous patch changes and their root causes. If an item was previously rebalanced after having a high winrate or being bought too often, items following similar patterns of usage might be candidates for similar rebalancings in a future patch. Inventing Techniques & Discovering Exploits Many of the crucial mechanical systems that are now built into DOTA 2 and many other MOBAs originated as bugs, exploits or emergent behaviour found by players in the game. For example, in DOTA 2 players earn gold by performing the killing blow on a non-hero creature. An unintentional feature of DOTA’s original implementation in Warcraft 3 allowed players to attack their own creeps to kill them. Players used this feature to invent the notion of ‘denying’, since attacking their own creeps stops their opponents from gaining gold (they received no gold themselves from doing this). This is now a fundamental part of contesting players for resources in DOTA 2, and recognised in the game through statistical tracking and its inclusion in tutorials. Such discoveries still happen today, as patches introduce new items, skills, systems and interactions. Discovering new mechanics has benefits for many groups: it gives players and teams a temporary edge, and allows developers to fix true exploits and adjust interesting ones (denying was balanced multiple times as it became an official mechanic, while other games like League of Legends removed it entirely). An AI system that can curiously explore a MOBA’s game systems to uncover new interactions and beneficial effects would be highly valued. This challenge bears similarities to automated playtesting research (Zook, Fruchter, and Riedl 2014) – in essence, many of these interesting discovered systems can be regarded as bugs or unintentional side effects of the game’s intentionallydesigned systems. The special case we are considering here is whether the discovered exploits provide some kind of competitive advantage or inspire a new strategy in playing the game, perhaps similar to objective-driven mechanic discovery in platformers (Cook et al. 2013). The most significant challenge here is in identifying progress or utility in a discovered system. Often these are highly innovative and creative in their application, which is the reason why they take so long to find despite hundreds of thousands of games taking place every day. Independently curious agents (Saunders 2002) playing the game as part of automated bot matches, ignoring objectives and instead seeking novel game interactions might yield interesting results. Abuse Many MOBAs are designed to be highly competitive environments which emphasise player skill, improvement and ultimately mastery. The framing of these games as sports is further enhanced by the tight links with the professional scene in which the most popular players are put forward as role models, as well as a relentless stream of statistics and records tracking the performance of players and their ranking among their peers. This atmosphere, combined with DOTA 2’s high barrier to entry and intimidating learning curve, makes the community a pressure cooker of negative emotions. Abusive players are a major problem in MOBAs. The only attempt made to curb this behaviour is a playerrun reports system which relies upon the playerbase to inform Valve when a player is acting abusively. However, this system is more often used to report players who are perceived to be playing badly, itself a form of abuse. Riot Games, developer of the MOBA League of Legends, have reportedly3 applied machine learning techniques to automatically detect abusive language, although more complex problems like sarcasm, passive-aggressiveness, or abusive in-game behaviour (to intentionally sabotage another player or their own team) remain difficult to detect. Existing research has looked into textual abuse in games (Kwak and Blackburn 2015), although much work remains to be done. The task of detecting abusive behaviour, however, including bots, scripts and intentional ability abuse is still a relatively open problem. Progress in this area benefits all games, but the richness and volume of data focused around the same structured activities makes MOBAs an appealing place to start in this case. Related Work Existing work investigating DOTA 2 as a domain for AI research primarily focus on the task of building AI agents to play the game. This is an extremely appealing challenge for adversarial AI research – playing the game requires both micro-scale decision-making with fast reactions, and macro-scale strategic planning. It also has an aspect lacking in many of the recent fashionable AI challenge domains other players. DOTA 2 is fundamentally a game about team co-operation, cohesion and communication, and this adds a much less-examined, more complex dimension to the AI problem. The research questions which have received the most attention work with readily-available data that can be extracted 3 http://tinyurl.com/riotresearch from public replays, such as analyses of the heroes making up a team. In (Pobiedina et al. 2013) the authors analyse whether a more balanced distribution of roles within a team improves a team’s chance of winning, a fundamental part of selecting heroes that works well together. (Drachen et al. 2014) takes a different approach, assessing the position of heroes and how they change throughout the game as an indicator of team performance (high movement and team grouping can be an indicator of success in some metagames). Another study in (Yang, Harrison, and Roberts 2014) focuses on the relationship between hero roles and how these develop throughout different phases of the game. Existing research of this kind may be repurposed to tackle some of the challenges outlined in this paper – for example, understanding the phases of gameplay and the expected behaviour from different roles, as shown in (Yang, Harrison, and Roberts 2014), can provide a useful baseline of knowledge for commentators, provided it can change to keep up with patches and the metagame (something which, in general, existing work does not address). Similarly, research outside the AI domain but focused on MOBAs, such as the analysis of pedagogical professional streams in (Georgen, Duncan, and Cook 2015), will help inform the creation of AI tools that teach and relay information to players and spectators. Conclusions In this paper we outlined a diverse range of challenges offered by the MOBA genre, using DOTA 2 as an illustration. They show that the genre has more to offer than simply a harder adversarial AI problem, with emerging challenges that pose problems for machine learning, natural language processing and generation, computational creativity, player modelling, and more. We proposed concrete projects and potential avenues for them, and discussed existing work that might relate to these challenges. MOBAs are a Frankensteinian genre, a patchwork of ideas and systems from RPGs, action games, sports, roguelikes, boardgames and more. As researchers come to tackle the problems posted by the genre, it will be crucial to pull in ideas, systems and inspiration from a wide sampling of research areas. MOBAs are time-consuming games to learn, taking hundreds of hours to gain an average understanding of the game’s main principles. One of the many ways in which this affects the game is that it makes it very difficult for researchers to come to this area as an outsider and apply their knowledge and expertise to it. Yet the genre contains within it a multitude of exciting research opportunities, vast stores of publicly available data, and professionals eager to work with new technology and ideas. Both the game’s community and our research community must find ways to make these challenges amenable to people and make the genre a more accessible proposition for those who are not already experienced with it. References [Burelli and Preuss 2014] Burelli, P., and Preuss, M. 2014. Applications of Evolutionary Computation: 17th European Conference, EvoApplications 2014, Granada, Spain, April 23-25, 2014, Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg. chapter Automatic Camera Control: A Dynamic Multi-Objective Perspective, 361–373. [Cook et al. 2013] Cook, M.; Colton, S.; Raad, A.; and Gow, J. 2013. Applications of Evolutionary Computation: 16th European Conference, EvoApplications 2013, Vienna, Austria, April 3-5, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg. chapter Mechanic Miner: ReflectionDriven Game Mechanic Discovery and Level Design, 284– 293. [Drachen et al. 2014] Drachen, A.; Yancey, M.; Maquire, J.; Chu, D.; Wang, Y.; Mahlmann, T.; Shubert, M.; and Klabjan, D. 2014. Skill-Based Differences in Spatio-Temporal Team Behaviour in Defence of The Ancients 2 (DotA 2). United States: IEEE. 1–8. [Georgen, Duncan, and Cook 2015] Georgen, C.; Duncan, S.; and Cook, L. 2015. From lurking to participatory spectatorship: Understanding the affordances of the dota 2 noob stream. In Proceedings of Computer-Supported Collaborative Learning. [Kwak and Blackburn 2015] Kwak, H., and Blackburn, J. 2015. Social Informatics: SocInfo 2014 International Workshops. Cham: Springer International Publishing. chapter Linguistic Analysis of Toxic Behavior in an Online Video Game, 209–217. [Pobiedina et al. 2013] Pobiedina, N.; Neidhardt, J.; del Carmen Calatrava Moreno, M.; Grad-Gyenge, L.; and Werthner, H. 2013. On successful team formation: Statistical analysis of a multiplayer online game. In CBI, 55–62. IEEE Computer Society. [Ritchie et al. 2007] Ritchie, G.; Manurung, R.; Pain, H.; Waller, A.; Black, R.; and O’Mara, D. 2007. A practical application of computational humour. In Proceedings of the 4th International Joint Workshop on Computational Creativity, 91–98. London, UK: Goldsmiths, University of London. [Saunders 2002] Saunders, R. 2002. Curious design agents and artificial creativity. phd, University of Sydney. [Silberschatz and Tuzhilin 1995] Silberschatz, A., and Tuzhilin, A. 1995. On subjective measures of interestingness in knowledge discovery. In KDD, volume 95, 275–281. [Tremblay, Torres, and Verbrugge 2014] Tremblay, J.; Torres, P. A.; and Verbrugge, C. 2014. Measuring risk in stealth games. In FDG’14: Proceedings of the 9th International Conference on Foundations of Digital Games. [Veale and Alnajjar 2015] Veale, T., and Alnajjar, K. 2015. Unweaving the lexical rainbow: Grounding linguistic creativity in perceptual semantics. In Proceedings of the Sixth International Conference on Computational Creativity (ICCC 2015), 63–70. Park City, Utah: Brigham Young University. [Yang, Harrison, and Roberts 2014] Yang, P.; Harrison, B.; and Roberts, D. L. 2014. Identifying patterns in combat that are predictive of success in moba games. In Proceedings of the Foundations of Digital Games Conference. [Yannakakis, Martı́nez, and Jhala 2010] Yannakakis, G. N.; Martı́nez, H. P.; and Jhala, A. 2010. Towards affective camera control in games. User Modeling and User-Adapted Interaction 20(4):313–340. [Zook, Fruchter, and Riedl 2014] Zook, A.; Fruchter, E.; and Riedl, M. O. 2014. Automatic playtesting for game parameter tuning via active learning. In Proceedings of the 9th International Conference on the Foundations of Digital Games.
2cs.AI
The Distance Standard Deviation arXiv:1705.05777v1 [math.ST] 16 May 2017 Dominic Edelmann,∗ Donald Richards,† and Daniel Vogel‡ May 17, 2017 Abstract The distance standard deviation, which arises in distance correlation analysis of multivariate data, is studied as a measure of spread. New representations for the distance standard deviation are obtained in terms of Gini’s mean difference and in terms of the moments of spacings of order statistics. Inequalities for the distance variance are derived, proving that the distance standard deviation is bounded above by the classical standard deviation and by Gini’s mean difference. Further, it is shown that the distance standard deviation satisfies the axiomatic properties of a measure of spread. Explicit closed-form expressions for the distance variance are obtained for a broad class of parametric distributions. The asymptotic distribution of the sample distance variance is derived. Key words and phrases. characteristic function; distance correlation coefficient; distance variance; Gini’s mean difference; measure of spread; dispersive ordering; stochastic ordering; U-statistic; order statistic; sample spacing; asymptotic efficiency. 2010 Mathematics Subject Classification. Primary: 60E15, 62H20; Secondary: 60E05, 60E10. 1 Introduction In recent years, the topic of distance correlation has been prominent in statistical analyses of dependence between multivariate data sets. The concept of distance correlation was defined in the one-dimensional setting by Feuerverger [7] and subsequently in the multivariate case by Székely, et al. [25, 26], and those authors applied distance correlation methods to testing independence between random variables and vectors. ∗ German Cancer Research Center, Im Neuenheimer Feld 280, 69120 Heidelberg, Germany. Department of Statistics, Pennsylvania State University, University Park, PA 16802, U.S.A. ‡ Institute for Complex Systems and Mathematical Biology, University of Aberdeen, Aberdeen AB24 3UE, U.K. ∗ Corresponding author; e-mail address: [email protected] † 1 2 Edelmann, Richards, and Vogel Since the appearance of [25, 26], enormous interest in the theory and applications of distance correlation has arisen. We refer to the articles [22, 27, 28] on statistical inference; [8, 9, 14, 33] on time series; [4, 5, 6] on affinely invariant distance correlation and connections with singular integrals; [19] on metric spaces; and [23] on machine learning. Distance correlation methods have also been applied to assessing familial relationships [17], and to detecting associations in large astrophysical databases [20, 21]. For z ∈ C, denote by |z| the modulus of z. For any positive integer p and s, x ∈ Rp , we denote by hs, xi the standard Euclidean inner product on Rp and by ksk = hs, si1/2 the standard Euclidean norm. Further, we define the constant cp = π (p+1)/2 . Γ (p + 1)/2 For jointly distributed random vectors X ∈ Rp and Y ∈ Rq , let √  fX,Y (s, t) = E exp −1(hs, Xi + ht, Y i) , s ∈ Rp , t ∈ Rq , be the joint characteristic function of (X, Y ) and let fX (s) = fX,Y (s, 0) and fY (t) = fX,Y (0, t) be the corresponding marginal characteristic functions. The distance covariance between X and Y is defined as the nonnegative square root of Z 1 ds dt 2 2 V (X, Y ) = fX,Y (s, t) − fX (s)fY (t) ; (1.1) p+1 cp cq Rp+q ksk ktkq+1 the distance variance is defined as Z ds dt 1 2 2 2 ; fX (s + t) − fX (s)fX (t) V (X) := V (X, X) = 2 p+1 cp R2p ksk ktkp+1 (1.2) and we define the distance standard deviation V(X) as the nonnegative square root of V 2 (X). The distance correlation coefficient is defined as V(X, Y ) R(X, Y ) = p V(X)V(Y ) (1.3) as long as V(X), V(Y ) 6= 0, and R(X, Y ) is defined to be zero otherwise. The distance correlation coefficient, unlike the Pearson correlation coefficient, characterizes independence: R(X, Y ) = 0 if and only if X and Y are mutually independent. Moreover, 0 ≤ R(X, Y ) ≤ 1; and for one-dimensional random variables X, Y ∈ R, R(X, Y ) = 1 if and only if Y is a linear function of X. The empirical distance correlation possesses a remarkably simple expression ([7], [25, Theorem 1]), and efficient algorithms for computing it are now available [13]. The objective of this paper is to study the distance standard deviation V(X). Since distance standard deviation terms appear in the denominator of the distance correlation coefficient (1.3) then properties of V(X) are crucial to understanding fully the nature 3 The Distance Standard Deviation of R(X, Y ). Now that R(X, Y ) has been shown to be superior in some instances to classical measures of correlation or dependence, there arises the issue of whether V(X) constitutes a measure of spread suitable for situations in which the classical standard deviation cannot be applied. As V(X) is possibly a measure of spread, we should compare it to other such measures. Indeed, suppose that E(kXk2 ) < ∞, and let X, X 0 , and X 00 be independent and identically distributed (i.i.d.); then, by [25, Remark 3], V 2 (X) = E(kX − X 0 k2 ) + (EkX − X 0 k)2 − 2E(kX − X 0 k · kX − X 00 k), (1.4) The second term on the right-hand side of (1.4) is reminiscent of the Gini mean difference [10, 31], which is defined for real-valued random variables Y as ∆(Y ) := E|Y − Y 0 |, (1.5) where Y and Y 0 are i.i.d. Furthermore, if X ∈ R then one-half the first summand in (1.4) equals σ 2 (X), the variance of X: 1 1 E(|X − X 0 |2 ) = E(X 2 − 2XX 0 + X 02 ) = E(X 2 ) − E(X)E(X 0 ) ≡ σ 2 (X). 2 2 Let X and Y be real-valued random variables with cumulative distribution functions F and G, respectively. Further, let F −1 and G−1 be the right-continuous inverses of F and G, respectively. Following [24, Definition 2.B.1], we say that X is smaller than Y in the dispersive ordering, denoted by X ≤ disp Y , if for all 0 < α ≤ β < 1, F −1 (β) − F −1 (α) ≤ G−1 (β) − G−1 (α). (1.6) According to [2], a measure of spread is a functional τ (X) satisfying the axioms: (C1) τ (X) ≥ 0, (C2) τ (a + bX) = |b| τ (X) for all a, b ∈ R, and (C3) τ (X) ≤ τ (Y ) if X ≤ disp Y . The distance standard deviation V(X) obviously satisfies (C1). Moreover, Székely, et al. [25, Theorem 4] prove that: 1. If V(X) = 0 then X = E[X], amost surely, 2. V(a + bX) = |b| V(X) for all a, b ∈ R, and 3. V(X + Y ) ≤ V(X) + V(Y ) if X and Y are independent. In particular, V(X) satisfies the dilation property (C2). In Section 5, we will show that V(X) satisfies condition (C3), proving that V(X) is a measure of spread in the sense 4 Edelmann, Richards, and Vogel of [2]. However, we will also derive some stark differences between V(X), on the one hand, and the standard deviation and Gini’s mean difference, on the other hand. The paper is organized as follows. In Section 2, we derive inequalities between the summands in the distance variance representation (1.4). For real-valued random variables, we will prove that V(X) is bounded above by Gini’s mean difference and by the classical standard deviation. In Section 3, we show that the representation (1.4) can be simplified further, revealing relationships between V(X) and the moments of spacings of order statistics. Section 4 provides closed-form expressions for the distance variance for numerous parametric distributions. In Section 5, we show that V(X) is a measure of spread in the sense of [2]; moreover, we point out some important differences between V(X), the standard deviation, and Gini’s mean difference. Section 6 studies the properties of the sample distance variance. 2 Inequalities between the distance variance, the variance, and Gini’s mean difference The integral representation in equation (1.2) of the distance variance V 2 (X) generally is not suitable for practical purposes. Székely, et al. [25, 26] derived an alternative representation; they show that if the random vector X ∈ Rp satisfies EkXk2 < ∞ and if X, X 0 , and X 00 are i.i.d. then V 2 (X) = T1 (X) + T2 (X) − 2 T3 (X), (2.1) where T1 (X) = E(kX − X 0 k2 ), T2 (X) = (EkX − X 0 k)2 , (2.2) and  T3 (X) = E kX − X 0 k · kX − X 00 k , (2.3) Corresponding to the representation (2.1), a sample version of V 2 (X) then is given by Vn2 (X) = T1,n (X) + T2,n (X) − 2 T3,n (X), where n n 1 XX kXi − Xj k2 , T1,n (X) = 2 n i=1 j=1 n X n 1 X 2 T2,n (X) = kX − X k , i j n2 i=1 j=1 (2.4) (2.5) 5 The Distance Standard Deviation and n n n 1 XXX T3,n (X) = 3 kXi − Xj k · kXi − Xk k. n i=1 j=1 k=1 (2.6) We remark that the version (2.4) is biased; indeed, throughout the paper, we work with biased sample versions to avoid dealing with numerous complicated, but unessential, constants in the ensuing results. In any case, an unbiased sample version can be defined in a similar fashion; see, e.g., [27]). In the following we will study inequalities between the summands showing up in equations (2.1) and (2.4). In the one-dimensional case, these inequalities will lead to crucial results concerning the relationships between the distance standard deviation, Gini’s mean difference and the standard deviation. Lemma 2.1. Let X = (X (1) , . . . , X (p) )t ∈ Rp be a random vector. Moreover let X = (X1 , . . . , Xn ) denote a random sample from X and let T1 (X), T2 (X), T3 (X), and T1,n (X), T2,n (X), T3,n (X) be defined as in equations (2.1)-(2.6). Then T2,n (X) ≤ T3,n (X) ≤ T1,n (X), T1,n (X) ≤ 2T3,n (X). (2.7) Further, if EkXk2 < ∞ then T2 (X) ≤ T3 (X) ≤ T1 (X), T1 (X) ≤ 2T3 (X). (2.8) Proof. First note that n n n 1 XXX kXi − Xj k · kXi − Xk k T3,n (X) = 3 n i=1 j=1 k=1 n n 2 1 XX = 3 kXi − Xj k . n i=1 j=1 P P By the Cauchy-Schwarz inequality, ( ni=1 ai )2 ≤ n ni=1 a2i for all a1 , . . . , an ∈ R; applying this inequality to the sums which define T1,n , T2,n and T3,n , we obtain n T2,n (X) = ≤ n 2 1 XX kX − X k i j n4 i=1 j=1 n n 2 n XX kX − X k = T3,n (X) i j n4 i=1 j=1 and n n 2 1 XX T3,n (X) = 3 kXi − Xj k n i=1 j=1 n n n XX ≤ 3 kXi − Xj k2 = T1,n (X). n i=1 j=1 6 Edelmann, Richards, and Vogel The second assertion in (2.7) follows by the triangle inequality: n n 1 XX T1,n (X) = 2 kXi − Xj k2 n i=1 j=1 n n n 1 XXX = 3 kXi − Xj k · kXi − Xk + Xk − Xj k n i=1 j=1 k=1 n n n   1 XXX kXi − Xj k kXi − Xk k + kXk − Xj k ≤ 3 n i=1 j=1 k=1 = 2 T3,n (X). The corresponding inequalities (2.8) for the population measures follow from the strong consistency of the respective sample measures. Alternatively they can be derived by applying Jensen’s inequality and the triangle inequality, respectively. Using the inequalities in Lemma 2.1, we can derive upper bounds for the distance variance in terms of the variance of the components X (1) , . . . , X (p) and the Gini mean difference of the vector X. Theorem 2.2. Let X = (X (1) , . . . , X (p) )t ∈ Rp be a random vector with EkXk < ∞, 0 0 and let X 0 = (X (1) , . . . , X (p) )t denote an i.i.d. copy of X. Then 2 V (X) ≤ p X σ 2 (X (i) ), i=1 and V 2 (X) ≤ (EkX − X 0 k)2 . Proof. To prove the first assertion, we note that  V 2 (X) = lim T1,n (X) + T2,n (X) − 2T3,n (X) n→∞ ≤ lim T2,n (X) n→∞ = (EkX − X 0 k)2 , where the inequality follows by Lemma 2.1. To extablish the second inequality we can assume, without loss of generality, that 7 The Distance Standard Deviation EkXk2 < ∞. Then T1 (X) = EkX − X 0 k2 p X =E (X (i) − X 0(i) )2 i=1 p h i2 X E (X (i) − EX (i) ) + (EX (i) − X 0(i) ) = i=1 =2 p X σ 2 (X (i) ). i=1 Applying Lemma 2.1 yields V 2 (X) = T1 (X) + T2 (X) − 2T3 (X) ≤ T1 (X) − T3 (X) ≤ 21 T1 (X) p X = σ 2 (X (i) ). i=1 The proof now is complete. In the one-dimensional case, Theorem 2.2 implies that the distance variance is bounded above by the variance and the squared Gini mean difference. Corollary 2.3. Let X be a real-valued random variable with EkXk < ∞. Then, V 2 (X) ≤ σ 2 (X), V 2 (X) ≤ ∆2 (X). Let us note further that for X ∈ R, the inequality T2 (X) ≤ T1 (X) can be sharpened. Proposition 2.4. Let X be a real-valued random variable with E(|X|2 ) < ∞. Then, T2 (X) ≤ 32 T1 (X). Proof. By [31, p. 25], 1 ≥ [Cor(X, F (X))]2 = Cov2 (X, F (X)) . σ 2 (X) σ 2 (F (X)) (2.9) By [30, equation (2.3)], Cov(X, F (X)) = ∆(X)/4; also, since F (X) is uniformly distributed on the interval [0, 1] then Var(F (X)) = 1/12. By the definition of the Gini mean difference (1.5) and by (2.2), ∆2 (X) = T2 (X) and σ 2 (X) = T1 (X)/2. Therefore, it follows from (2.9) that 12 ∆2 (X) 3 T2 (X) 1≥ = , 2 16 σ (X) 2 T1 (X) 8 Edelmann, Richards, and Vogel and the proof now is complete. Interestingly, Gini’s mean difference and the distance standard deviation coincide for distributions whose mass is concentrated on two points. Theorem 2.5. Let X be Bernoulli distributed with parameter p. Then V 2 (X) = ∆2 (X) = 4p2 (1 − p)2 . Conversely, if X is a non-trivial random variable for which V 2 (X) = ∆2 (X) then the distribution of X is concentrated on two points. Proof. It is straightforward from (2.1) to verify that, for a Bernoulli distributed random variable X, ∆(X) = 2 σ 2 (X) = 2 T3 (X) = 2 p(1 − p). Hence, by (2.1), V 2 (X) = 2 σ 2 (X) + ∆2 (X) − 2 T3 (X) = 4 p2 (1 − p)2 . Conversely, if X is a non-trivial random variable for which V 2 (X) = ∆2 (X) then the conclusion that the distribution of X is concentrated on two points follows from Theorem 3.1. For the Bernoulli distribution with p = 12 , Theorem 2.5 implies immediately that V 2 (X), σ 2 (X), and ∆2 (X) attain the same value, namely, 1/4. Hence, applying Corollary 2.3 and the dilation property V(aX) = |a|V(X) in (C2), we obtain Corollary 2.6. Let X denote the set of all real-valued random variables and let c > 0. Then max{V 2 (X) : σ 2 (X) = c} = max{V 2 (X) : ∆2 (X) = c} = c, X∈X X∈X and both maxima are attained by Z = 2 c1/2 Y , where Y is Bernoulli distributed with parameter p = 21 . This result answers a question raised by Gabor Székely (private communication, November 23, 2015). We remark, that the second implication of Theorem 2.2 as well as Theorem 2.5 also follow directly from the result for the generalized distance variance in [19, Proposition 2.3]. However, the proof presented here provides a different and more elementary approach to these findings. 3 New representations for the distance variance The representation of V given in (2.1), although more applicable than the expression given in equation (1.2), still has the drawback that it is undefined for random vectors 9 The Distance Standard Deviation with infinite second moments. This problem can be circumvented by considering the representation V 2 (X) = ∆2 (X) + W (X), (3.1) where h i W (X) = E kX − X 0 k · kX − X 0 k − 2 kX − X 00 k . In the one-dimensional case, the representation (3.1) can be further simplified using the concept of order statistics. Theorem 3.1. Let X be a real-valued random variable with E|X| < ∞, and let X, X 0 , and X 00 be i.i.d. copies of X. If X1:3 ≤ X2:3 ≤ X3:3 are the order statistics of the triple (X, X 0 , X 00 ) then V 2 (X) = ∆2 (X) − 34 E[(X2:3 − X1:3 ) (X3:3 − X2:3 )] = ∆2 (X) − 8 E[(X − X 0 )+ (X 00 − X)+ ], (3.2) (3.3) where t+ = max(t, 0), t ∈ R. Proof. We first prove the theorem for the case in which X is continuous. In this case, we apply the Law of Total Expectation and use the independence of the ranks and the order statistics [29, Lemma 13.1] to obtain W (X) h i 0 0 00 = E |X − X | |X − X | − 2 |X − X | = 3 X h i  E |X − X 0 | |X − X 0 | − 2|X − X 00 | (rX , rX 0 , rX 00 ) = (k, k 0 , k 00 ) k,k0 ,k00 =1 k,k0 ,k00 are pairwise distinct  × P (rX , rX 0 , rX 00 ) = (k, k 0 , k 00 ) . 10 Edelmann, Richards, and Vogel Using the symmetry of X, X 0 , and X 00 , it follows that 1 W (X) = 6 = 1 6 3 X h i E |Xk:3 − Xk0 :3 | |Xk:3 − Xk0 :3 | − 2 |Xk:3 − Xk00 :3 | k,k0 ,k00 =1 k,k0 ,k00 are pairwise distinct 3 h X i h i E |Xk:3 − Xk0 :3 |2 − E |Xk:3 − Xk0 :3 | · |Xk:3 − Xk0 :3 | . k,k0 ,k00 =1 k,k0 ,k00 are pairwise distinct Evaluating the first summand in the latter equation yields 1 6 3 X   E |Xk:3 − Xk0 :3 |2 k,k0 ,k00 =1 k,k0 ,k00 are pairwise distinct =      1  E (X1:3 − X2:3 )2 + E (X1:3 − X3:3 )2 + E (X2:3 − X3:3 )2 . 3 Proceeding analogously with the second summand and simplifying the outcome, we obtain  4  W (X) = − E (X2:3 − X1:3 ) (X3:3 − X2:3 ) . 3 This proves (3.2) in the continuous case. For the case of general random variables, we now apply the method of quantile transformations. Let U be uniformly distributed on the interval [0, 1] and let U , U 0 , and U 00 be i.i.d.. Further, let F denote the cumulative distribution function of X. With F −1 (p) = inf{x : F (x) ≥ p} denoting the right-continuous inverse of F , we define X̃ = F −1 (Ũ ), X̃ 0 = F −1 (Ũ 0 ), and X˜00 = F −1 (U˜00 ). By [29, Theorem 21.1], the random variables X̃, X̃ 0 , and X˜00 are i.i.d. copies of X and W (X) h i = E |X̃ − X̃ 0 | · |X̃ − X̃ 0 | − 2 |X̃ − X˜00 | = 3 X h i  E |X̃ − X̃ 0 | · |X̃ − X̃ 0 | − 2 |X̃ − X˜00 | (rU , rU 0 , rU 00 ) = (k, k 0 , k 00 ) k,k0 ,k00 =1 k,k0 ,k00 are pairwise distinct  × P (rU , rU 0 , rU 00 ) = (k, k 0 , k 00 ) 11 The Distance Standard Deviation 1 = 6 3 X h i E |Xk:3 − Xk0 :3 | · |Xk:3 − Xk0 :3 | − 2 |Xk:3 − Xk00 :3 | k,k0 ,k00 =1 k,k0 ,k00 are pairwise distinct 4 = − E[(X2:3 − X1:3 ) (X3:3 − X2:3 )]. 3 The second representation for W (X), (3.3), now follows by a combinatorial symmetry argument from the first representation. In the continuous case with finite second moment, equation (3.3) is equivalent to E(|X − X 0 | · |X 00 − X 0 |) = σ 2 (X) + 4J(X), where Z ∞ Z x Z (3.4) ∞ (x − y) (z − x)f (z) f (y)f (x)dz dy dx. J(X) = x=−∞ y=−∞ z=x Formula (3.4) is essentially the key result in the classical paper by Lomnicki [18], who also gave a simple expression for the variance of the empirical Gini mean difference, X 2 b n (X) = ∆ |Xi − Xj |. (3.5) n (n − 1) 1≤i<j≤n Indeed, it is shown in [18] that   1 b n (X) = 4 (n − 1) σ 2 (X) + 16 (n − 2)J(X) − 2 (2n − 3)∆2 (X) . (3.6) Var ∆ n (n − 1) We note two consequences of Theorem 3.1 and equation (3.6). First, Theorem 3.1 implies that the decomposition (3.6) holds in an analogous way for the non-continuous case. Second, for distributions with finite second moment, calculating the distance b n and vice versa. These considerations imply that the variance yields the variance of ∆  b b asymptotic variance ASV (∆(X)) = limn→∞ n Var( ∆(X) ) can be expressed alternatively as b ASV (∆(X)) = 4 σ 2 (X) − 2 V 2 (X) − 2 ∆2 (X). (3.7) For a random sample X1 , . . . , Xn of real-valued random variables, the difference between successive order statistics, Di:n := Xi+1:n − Xi:n , i = 1, . . . , n − 1, is called the ith spacing of X = (X1 , . . . , Xn ). Jones and Balakrishnan [15] (see also [30, 31]) studied closed-form expression for the moments of spacings and showed that ZZ 2 2 σ (X) = E(D1:2 ) = 2 F (x)(1 − F (y))dx dy (3.8) −∞<x<y<∞ and Z ∞ F (x)(1 − F (x))dx. ∆(X) = E(D1:2 ) = 2 (3.9) −∞ By applying results in [15], we obtain an analogous representation for the distance variance. 12 Edelmann, Richards, and Vogel Theorem 3.2. Let X be a real-valued variable with E(|X|) < ∞ and let X, X 0 , X 00 , and X 000 be i.i.d. Then, ZZ 2 V (X) = 8 F 2 (x)(1 − F (y))2 dx dy (3.10) −∞<x<y<∞ where X1:4 ≤ X2:4 ≤ X3:4 2 = E[(X3:4 − X2:4 )2 ], (3.11) 3 ≤ X4:4 denote the order statistics of (X, X 0 , X 00 , X 000 ). Proof. By equation (3.9), we obtain h Z ∞ i2 2 ∆ (X) = 2 F (x) (1 − F (x))dx −∞ Z ∞Z ∞ =4 F (x) [1 − F (x)] F (y) [1 − F (y)] dx dy −∞ −∞ ZZ F (x) [1 − F (x)] F (y) [1 − F (y)] dx dy. =8 −∞<x<y<∞ Moreover, by [15, equation (3.5)] E[(X2:3 − X1:3 ) (X3:3 − X2:3 )] ZZ F (x) [F (y) − F (x)] [1 − F (y)] dx dy. =8 −∞<x<y<∞ Hence, V 2 (X) = ∆2 (X) − 34 E[(X(2) − X(1) ) (X(3) − X(2) )] ZZ [F (x)]2 [1 − F (y)]2 dx dy, =8 −∞<x<y<∞ which proves (3.10). Finally, the formula (3.11) follows from (3.10) and from [15, equation (3.4)]. Theorem 3.2 now yields for the distance variance a new sample version which is distinct from Vn2 (X), as follows. Corollary 3.3. Let X be a real-valued variable with E(|X|) < ∞ and let X = (X1 , . . . , Xn ) be a random sample from X. Then, a strongly consistent sample version for V 2 (X) is  −2 X n−1 2 2 n 2 Un (X) = min(i, j) n − max(i, j) Di:n Dj:n , (3.12) 2 i,j=1 where Dk:n = Xk+1:n − Xk:n denotes the kth sample spacing of X, 1 ≤ k ≤ n − 1. The Distance Standard Deviation 13 Proof. Let h : R4 7→ R be the symmetric kernel defined by 2 h(X1 , . . . , X4 ) = (X3:4 − X2:4 )2 , 3 where X1:4 ≤ X2:4 ≤ X3:4 ≤ X4:4 are the order statistics of X1 , . . . , X4 . By Theorem 3.2, we have E[h(X1 , . . . , X4 )] < ∞. Hence, by Hoeffding [12], Ubn2 (X)  −1 2 n = 3 4 1≤i X h(Xi1 , . . . , Xi4 ) 1 <i2 <i3 <i4 ≤n is a strongly consistent estimator for V 2 (X). Using a straightforward combinatorial calculation, we obtain  −1 X 2 n 2 Ubn (X) = (i − 1) (n − j)(Xj:n − Xi:n )2 . 3 4 1≤i<j≤n On inserting the definition of the spacings, the latter equation reduces to  −1 X n 2 2 (i − 1) (n − j) (Di:n + · · · + Dj−1:n )2 Ubn (X) = 3 4 1≤i<j≤n  −1 X j−1 X 2 n (i − 1) (n − j) Dk:n Dl:n . ≡ 3 4 1≤i<j≤n k,l=i Interchanging the above summations, we obtain  −1 X min(k,l) n−1 X 2 n 2 b Un (X) = Dk:n Dl:n 3 4 i=1 k,l=1 n X (i − 1) (n − j) j=max(k,l)+1  −1 X n−1  1 n Dk:n Dl:n min(k, l) min(k, l) − 1 = 6 4 k,l=1   × n − max(k, l) n − max(k, l) − 1 , where the latter equality follows from the fact that Pk i=1 i = k(k − 1)/2. Since  −1 1 n 4 = , 6 4 n (n − 1) (n − 2) (n − 3) then we deduce that Un2 (X) = Ubn2 (X) + o(1). This completes the proof. Denoting the vector of spacings by D = (D1:n , . . . , Dn−1:n ), we can write the quadratic form in (3.12) as Un2 (X) = Dt V D, 14 Edelmann, Richards, and Vogel Figure 3.1: Illustration of (from left to right) the sample distance variance b 2 , and the sample variance Un2 , the squared sample Gini mean difference ∆ σ b2 via their respective quadratic form matrices V , G, and S for sample size n = 1, 000. The coordinate (i, j) corresponds to the (i, j)th entry of the corresponding matrix, and the size of the corresponding matrix element is specified via color code (see legend). where the (i, j)th element of the matrix V is  −2 2 2 n Vi,j = min(i, j) n − max(i, j) 2 Both the squared sample Gini mean difference and the sample variance n σ bn2 (X) X 1 (Xi − X n )2 := n (n − 1) i=1 can also be expressed as quadratic forms in the spacings vector D; specifically, b 2n (X) = Dt G D, ∆ σ bn2 (X) = Dt S D, where the elements of G and S are given by  −2 n Gi,j = i j (n − i) (n − j) 2 and Si,j  −1 1 n min(i, j) (n − max(i, j)). = 2 2 Hence, comparing Un2 , ∆2n , and σn2 is equivalent to comparing the matrices V , G and S. We use this fact to graphically illustrate differing features of V, ∆, and σ by plotting the values of the underlying matrices; see Figure 3.1. Moreover, these quadratic form representations lead to the rediscovery of results from Section 2. For example, since V and G have the same diagonal entries then it The Distance Standard Deviation 15 follows that V and ∆ are equal for Bernoulli-distributed random variables. Also, if n is even then the elements Vn/2,n/2 , Gn/2,n/2 , and Sn/2,n/2 all coincide, representing the fact that the underlying measures coincide for the Bernoulli distribution with p = 12 . Finally, since Vij ≤ Gij and Vij ≤ Sij for all i, j then we obtain an alternative proof of Corollary 2.3. It is also remarkable that V is twice the second Hadamard power of S and that V and S both are positive definite, while G is positive semidefinite with rank 1. Finally, we mention that there are numerous other statistics which can be written as quadratic forms or square-roots of quadratic forms in the spacings, e.g., the Greenwood statistic, the range, and the interquartile range. 4 Closed form expressions for the distance variance of some well-known distributions Exploiting the different representations of the distance variance derived in the preceding sections, we can now state the distance variance of many well-known distributions. In the following result, we use the standard notation 1 F1 and 2 F1 for the classical confluent and Gaussian hypergeometric functions. Theorem 4.1. 1. Let X be Bernoulli distributed with parameter p. Then V 2 (X) = 4 p2 (1 − p)2 . 2. Let X be normally distributed with mean µ and variance σ 2 . Then 2 V (X) = 4  1 − √3 π 1 2 + σ . 3 3. Let X be uniformly distributed on the interval [a, b]. Then V 2 (X) = 2(b − a)2 /45. 4. Let X be Laplace-distributed with density function, fX (x) = (2α)−1 exp(−|x − µ|/α), x ∈ R, α > 0, µ ∈ R. Then V 2 (X) = 7α2 /12. 5. Let X be Pareto-distributed with parameters α > 1 and xm > 0, and density function fX (x) = αxαm x−(α+1) , x ≥ xm . Then, 4α2 x2m V (X) = (α − 1) (2α − 1)2 (3α − 2) 2 6. Let X be exponentially distributed with parameter λ > 0 and density function fX (x) = λ exp(−λ x), x ≥ 0. Then, V 2 (X) = (3λ2 )−1 . 16 Edelmann, Richards, and Vogel 7. Let X be Gamma-distributed with shape parameter α > 0 and scale parameter 1. Then ∞ X V 2 (X) = 22(2−2 α) Aj,k (α)2 , j,k=1 where 1/2 (α)j (α)k Aj,k (α) = 2 j! k! Γ(2α + j + k − 1) × 2 F1 (−j − k + 2, 1 − α − j; 2 − 2α − j − k; 2) . Γ(α + j) Γ(α + k) −j−k  8. Let X be Poisson-distributed with parameter λ > 0. Then ∞ X 4j+k−1 j+k 2 λ Ajk , V (X) = j! k! j,k=1 2 where Ajk 1 = (j − 1)! b(j−k)/2c   j−k (−1)l ( 21 )l ( 21 )j−l−1 1 F1 (j − l − 12 ; j; −4λ). 2l X l=0 9. Let X be negative binomially distributed with parameters c and β. Then ∞ X (β)j (β)k V (X) = (1 − c) (1 + c2 )−2β−2j 22k cj+k A2jk , j! k! j,k=1 2 4β where Ajk    l j−k  ∞ X X j−k j−k 2c (β + j) − l l1 l2 = (−c) (−1) (|l1 − l2 |)! l l l! 1 + c2 1 2 l ,l =0 l=0 1 2 |l1 −l2 | × X m=0 (−2)m 2k+m−1 ( 12 )k+m−1 (m)|l1 −l2 | (|l1 − l2 | − m)! (2m)! (k + m − 1)! × 2 F1 (−l, k + m − 21 ; k + m; 2). 10. Let X = (X1 , . . . , Xp ) be a multivariate normally distributed random vector with mean µ = (µ1 , . . . , µp ) and identity covariance matrix Ip := diag(1, . . . , 1). Then c2p−1 V (X) = 4π 2 cp 2 " #  Γ( 12 p) Γ( 21 p + 1) 1 1 1 1  1 2 − 2 2 F1 − 2 , − 2 ; 2 p; 4 + 1 . Γ 2 (p + 1) The Distance Standard Deviation 17 Proof. 1. See Theorem 2.5. 2. See the proof of Theorem 7 in [25] or [4, p. 14]. 3. and 4. These follow directly from Theorem 3.1 and the results in Table 3 in [10]. 5. and 6. These results follow directly from the representation (2.1) and [32, equations (4.2) and (4.4)]. 7., 8., and 9. See [6, Propositions 5.6, 5.7, and 5.8]. 10. See [4, Corollary 3.3]. By equations (3.6) and (3.7), we can also derive expresssions for the variance and asymptotic variance of the sample Gini mean difference for the distributions 1.- 9. in Theorem 4.1. To the best of our knowledge, these expressions are novel for the Gamma, Poisson, and negative binomial distributions. 5 The distance standard deviation as a measure of spread In this section, we show that the distance standard deviation V(X) satisfies the criteria (C1)-(C3) stated in Section 1 and therefore is an axiomatic measure of spread in the sense of [2]. Moreover, we point out some differences and commonalities between V, ∆ and σ. First, we state some additional preliminaries about stochastic orders. Definition 5.1 ([24], Section 1.A.1). A random variable X is said to be stochastically smaller than a random variable Y , or X is smaller than Y in the stochastic ordering, written X ≤st Y , if P(X > u) ≤ P(Y > u) for all u ∈ R. Proposition 5.2 ([24], Section 1.A.1). A necessary and sufficient condition that X ≤st Y is that E[φ(X)] ≤ E[φ(Y )] (5.1) for all increasing functions φ for which these expectations exist. Another important ordering of random variables is the dispersive order, ≤ disp , which was stated earlier at (1.6) in the introduction. Bartoszewicz [1] proved the following result. Proposition 5.3 ([1], Proposition 3). Let (X1 , . . . , Xn ) and (Y1 , . . . , Yn ) be random samples from the random variables X and Y , respectively, and let Dj = Xj+1:n − Xj:n and Ej = Yj+1:n − Yj:n , j = 1, . . . , n − 1 denote the corresponding sample spacings. If X ≤ disp Y then Dj:n ≤ st Ej:n for all j = 1, . . . , n − 1. Applying this result to the representation of the distance variance derived in Theorem 3.2, we conclude that the distance standard deviation V is indeed a measure of spread in the sense of [2]. 18 Edelmann, Richards, and Vogel Theorem 5.4. If X ≤ disp Y then V(X) ≤ V(Y ). Proof. Let us consider i.i.d. replicates (X, Y ), (X 0 , Y 0 ), (X 00 , Y 00 ), and (X 000 , Y 000 ). Moreover, let X1:4 ≤ X2:4 ≤ X3:4 ≤ X4:4 and Y1:4 ≤ Y2:4 ≤ Y3:4 ≤ Y4:4 denote the respective order statistics. By Proposition 5.3, (X3:4 − X2:4 ) ≤ st (Y3:4 − Y2:4 ). Applying equation (5.1) and Theorem 3.2 concludes the proof. Using similar arguments, we can show that the result of Theorem 5.4 holds analogously for the standard deviation and Gini’s mean difference; see also [16]. Theorem 5.5 ([24], Theorem 3.B.7). The random variable X satisfies the property X ≤ disp X + Y for any random variable Y which is independent of X if and only if X has a log-concave density. Applying Theorem 5.5, we obtain the following corollary of Theorem 5.4. Corollary 5.6. Let X be a random variable with a log-concave density. Then V(X + Y ) ≥ V(X) for any random variable Y independent of X. In particular if X and Y are independently distributed, continuous, random variables with log-concave densities, then V(X + Y ) ≥ max(V(X), V(Y )). (5.2) It is well known, both for the standard deviation and for Gini’s mean difference, that analogous assertions hold without any restrictions on the distributions of X and Y . In particular, for any pair of independent random variables X and Y with existing first or second moments, respectively, there holds σ 2 (X + Y ) = σ 2 (X) + σ 2 (Y ) ≥ max(σ 2 (X), σ 2 (Y )). (5.3) Also, letting X 0 and Y 0 denote i.i.d. copies of X and Y , respectively, we have ∆(X + Y ) = E[max(|X − X 0 |, |Y − Y 0 |)] ≥ max(∆(X), ∆(Y )). (5.4) However we now show that this property does not hold generally for the distance standard deviation, V, thereby answering a second question raised by Gabor Székely (private communication, November 23, 2015). 19 The Distance Standard Deviation Example 5.7. Let X be Bernoulli distributed with parameter p = 21 and let Y be uniformly distributed on the interval [0, 1] and independent of X. Then V(X) > V(X + Y ). Proof. By a straightforward calculation using (2.1), we obtain V 2 (X + Y ) = T1 (X + Y ) + T2 (X + Y ) − 2 T3 (X + Y ) 2 4 14 8 = + − = . 3 9 15 45 However, by Theorem 2.5, V 2 (X) = 1/4 > V 2 (X + Y ). Other common properties of the classical standard deviation and Gini’s mean difference concerns differences and sums of independent random variables. From the representations of σ 2 (X + Y ) and ∆(X + Y ) given in (5.3) and (5.4), we see that ∆(X + Y ) = ∆(X − Y ), σ(X + Y ) = σ(X − Y ) for any independent random variables X and Y for which these expressions exist. On the other hand, these properties do not hold in general for the distance standard deviation. Example 5.8. Let X and Y be independently Bernoulli distributed with parameter p 6= 21 . Then V(X + Y ) > V(X − Y ). Proof. By a straightforward calculation using (2.1), we obtain V 2 (X + Y ) = 8 (p − p2 )2 2 (p − p2 )2 − 6 (p − p2 ) + 2  and  V 2 (X − Y ) = 8 (p − p2 )2 2 (p − p2 )2 − 2 (p − p2 ) + 1 . Hence, V 2 (X + Y ) − V 2 (X − Y ) = 8 (p − p2 )2 (1 − 2p)2 , and this difference obviously is positive for p 6= 21 . However, an analogous property holds when either of the two variables has a symmetric distribution. Theorem 5.9. Let X and Y be independent real random variables with E|X +Y | < ∞. Then V 2 (X + Y ) = V 2 (X − Y ) if either X or Y is symmetric about µ. Proof. Since V(X − Y ) = V(Y − X) then we can assume, without loss of generality, that Y is symmetric. Moreover since V 2 (X + µ) = V 2 (X) then we can assume that the point of symmetry is at 0. 20 Edelmann, Richards, and Vogel By equation (1.2), V 2 (X − Y ) Z 1 2 dsdt fX−Y (s + t) − fX (s)f−Y (t) = 2 π R2 |s|2 |t|2 Z 1 2 dsdt = 2 fX (s + t) f−Y (s + t) − fX (s)f−Y (s)fX (t)f−Y (t) π R2 |s|2 |t|2 Z 1 2 dsdt = 2 fX (s + t) fY (s + t) − fX (s)fY (s)fX (t)fY (t) π R2 |s|2 |t|2 = V 2 (X + Y ), where the third equality follows from the fact that Y and −Y have the same distribution. 6 The distance standard deviation as an estimator In this section, we investigate the properties of the sample distance variance Vn2 (X) and the sample distance standard deviation Vn (X) as estimators and derive their asymptotic distributions. For these purposes, we employ the representation (3.1), viz., V 2 (X) = W (X) + ∆2 (X) where W (X) = E [kX − Y k (kX − Y k − 2 kX − Zk)] , and ∆(X) denotes the population value of Gini’s mean difference. Throughout this section, X, Y , Z are i.i.d. p-variate random vectors with distribution F . For a sample of i.i.d. random vectors X = (X1 , . . . , Xn )t , each with distribution F , we define the corresponding empirical quantities, n n 1 XX ∆n (X) = 2 kXi − Xj k n i=1 j=1 and n n n 1 XXX kXi − Xj k (kXi − Xj k − 2kXi − Xk k) . Wn (X) = 3 n i=1 j=1 k=1 Note that Wn (X) = T1,n (X) − 2 T3,n (X), cf. (2.4), and Vn2 (X) = Wn (X) + ∆2n (X). The Distance Standard Deviation 21 Further, it is straightforward to verify that EWn (X) = (n − 1)(n − 2) W (X). n2 (6.1) b n (X), the unbiased The statistic ∆n (X) does not wear a hat to distinguish it from ∆ version of the sample Gini difference, defined for univariate observations in (3.5) and which we extend to multivariate observations by replacing the absolute value | · | by the Euclidean norm k · k; thus, ∆2n (X) = (n − 1)2 b 2 ∆n (X). n2 b n (X), we define Similar to ∆ cn (X) = W ≡ 1 n(n − 1)(n − 2) X kXi − Xj k (kXi − Xj k − 2kXi − Xk k) 1≤i,j,k≤n i6=j,j6=k,k6=i n2 Wn (X). (n − 1)(n − 2) cn (X) is an unbiased sample version of W (X). By (6.1), W bn (X) = [W cn (X) + ∆ b 2n (X)]1/2 is an alternative to Vn (X) as an empirical Also, V bn (X) is based on the version of the distance standard deviation V(X). Although V cn (X) and ∆ b n (X), the estimator V bn (X) itself has a larger bias unbiased estimators W than Vn (X). The results of Table 2 below indicate that Vn (X) is to be preferred bn (X) as an estimator of V(X) because it exhibits smaller finite-sample bias and over V smaller variance for scenarios considered in our simulations. b 2 (X) have the same asymptotic distribution. In order Nevertheless, Vn2 (X) and V n to establish that result, we define for x ∈ Rp , ψ1 (x) = Ekx − Y k2 , ψ3 (x) = E(kx − Y k · kY − Zk), ψ2 (x) = E(kx − Y k · kx − Zk), ψ4 (x) = Ekx − Y k, and, with T1 (X), T2 (X), and T3 (X) as defined in (2.2)-(2.3), we also define  2 2 m11 = 4 E ψ1 (X) − ψ2 (X) − 2ψ3 (X) − 4 T1 (X) − 3T3 (X) ,    m12 = 4 E ψ4 (X) ψ1 (X) − ψ2 (X) − 2ψ3 (X) − 4T2 (X) T1 (X) − 3T3 (X) , 2 m22 = 4 Eψ42 (X) − 4 T2 (X) . (6.2) and let γ = m11 + 4m12 ∆(X) + 4m22 ∆2 (X). We now provide in the following result the asymptotic distribution of Vn2 (X) and bn2 (X). V 22 Edelmann, Richards, and Vogel Theorem 6.1. Suppose that E(kXk4 ) < ∞. Then, as n → ∞,  d √ n Vn2 (X) − V 2 (X) −→ N (0, γ) (6.3) b 2 (X). and the same result holds for V n  bn (X) = W cn (X), ∆ b n (X) t , which has exProof. Consider the bivariate statistic B pected value B(X) = (W (X), ∆(X))t . Define the functions K, L : Rp × Rp × Rp → R such that K(x, y, z) = kx−yk(kx−yk−2kx−zk) + ky−zk(ky−zk−2ky−xk) + kz −xk(kz −xk−2kz −yk) and L(x, y, z) = (kx − yk + ky − zk + kz − xk), bn (X) can be written as a U-statistic with (x, y, z) ∈ Rp × Rp × Rp . Then the statistic B the bivariate, permutation-symmetric kernel of order three, h : Rp × Rp × Rp → R2 , where   1 K(x, y, z) h(x, y, z) = , 3 L(x, y, z) (x, y, z) ∈ Rp ×Rp ×Rp . Define the function h1 : Rp → R2 , where h1 (x) = Eh(x, Y, Z)− B(X); then, h1 is the linear part in the Hoeffding decomposition of the kernel h, and we calculate that   2 ψ1 (x) − ψ2 (x) − 2ψ3 (x) − T1 (X) + 3T3 (X) h1 (x) = , ψ4 (x) − T2 (X) 3 x ∈ Rp . Since E(kXk)4 < ∞ then E[(h(X, Y, Z))2 ] < ∞; therefore, we deduce from a classical result of Hoeffding [11, Theorem 7.1] that  d  √ bn (X) − B(X) −→ n B N2 0, 9 Eh1 (X)h1 (X)t . Denote the symmetric 2 × 2 matrix 9 Eh1 (X)h1 (X)t by M = (mij )i,j=1,2 , where the elements m11 , m12 , and m22 are given in (6.2). Define g : R2 → R by g(x, y) = x + y 2 ;  b 2 (X) = g B bn (X) . Since ∇h(x, y) = (1, 2y)t then, by applying the Delta then V n  d √ b2 2 Method, we obtain n V n (X) − V (X) −→ N (0, γ). In the case of Vn2 (X), we need only to apply the formulas Wn (X) = (n − 1)(n − cn (X)/n2 and ∆2 (X) = (n−1)2 ∆ b 2 (X)/n2 to deduce that V 2 (X)−V b 2 (X) = o(n−1 ). 2)W n n n n 2 Then it follows by the Delta Method that Vn (X) has the same asymptotic distribution as Vn2 (X), as given in (6.3). The asymptotic distribution of the sample distance standard deviation Vn (X) now follows from Theorem 6.1 by the Delta Method: 23 The Distance Standard Deviation Distribution, F N (0, 1) L(0, 1) t5 t3 ARE(Vn ; F ) 0.784 0.952 0.992 0.965 ARE(b σn ; F ) 1 0.8 0.4 0 ARE(dbn ; F ) b n; F ) ARE(∆ 0.876 1 0.941 0.681 0.978 0.964 0.859 0.524 Table 1: Asymptotic relative efficiencies with respect to the respective maximum likelihood estimators of the distance standard deviation Vn , the standard deviation σ bn , the mean devation dbn , and Gini’s mean b n at the normal distribution, the Laplace distribution, difference ∆ and the tν -distributions with ν = 5 and ν = 3. Corollary 6.2. Under the conditions of Theorem 6.1, we have  √ d n(Vn (X) − V(X)) −→ N 0, γ/4V 2 (X) , bn (X). and the same result holds for V In the following, we study the empirical distance standard deviation Vn (X) as an √ estimator of spread in the univariate case. For any n-consistent and asymptotically normal estimator sn (X), we define its asymptotic variance ASV (sn (X); F ) at √ the distribution F to be the variance of the limiting distribution of n(sn (X) − s), as n → ∞, where sn (X) is evaluated at an i.i.d. sequence drawn from F and s de(1) notes the corresponding population value of sn (X) at F . Any estimators sn (X) and (2) sn (X) which estimate possibly different population values s1 and s2 , respectively, at a given distribution F , and which obey the dilation property (C2) in Section 1, can be compared efficiency-wise by standardizing them through their respective population (1) (2) values. We define the asymptotic relative efficiency of sn (X) with respect to sn (X) at the population distribution F as (1) ARE (2) s(1) n (X), sn (X); F  = ASV (sn (X); F )/s21 (2) ASV (sn (X); F )/s22 . Even in the univariate case with normally distributed data, the integrals underlying the parameters m11 , m12 , and m22 in (6.2) do not admit straightforward analytical expressions. Nevertheless, by means of numerical integration, we can obtain values for the asymptotic variance of Vn (X) for given population distributions and thus deduce properties of the efficiency of Vn (X) in relation to other widely-used estimators of scale. In Table 1, we provide the asymptotic relative efficiency of the distance standard deviation with respect to the respective maximum likelihood estimator at the normal distribution, the Laplace distribution, and tν distributions with ν = 5 and 24 Edelmann, Richards, and Vogel 10 0.658 0.665 0.276 0.298 Sample size, 50 0.640 0.639 0.255 0.259 Distribution, F n 500 0.634 0.634 0.255 0.255 ∞ 0.633 0.633 0.256 0.256 N (0, 1) E(Vn ) bn ) E(V nVar(Vn ) bn ) nVar(V 5 0.663 0.701 0.297 0.359 L(0, 1) E(Vn ) bn ) E(V nVar(Vn ) bn ) nVar(V 0.888 0.942 0.955 1.136 0.861 0.864 0.836 0.858 0.790 0.785 0.668 0.663 0.767 0.766 0.605 0.604 0.764 0.764 0.613 0.613 t5 E(Vn ) bn ) E(V nVar(Vn ) bn ) nVar(V 0.818 0.866 0.761 0.931 0.799 0.804 0.632 0.655 0.744 0.741 0.474 0.471 0.727 0.727 0.432 0.432 0.725 0.725 0.424 0.424 t3 E(Vn ) bn ) E(V 1.003 1.074 5.762 8.420 0.960 0.967 2.001 2.177 0.861 0.855 1.089 1.067 0.817 0.816 0.777 0.774 0.810 0.810 0.680 0.680 nVar(Vn ) bn ) nVar(V Table 2: Simulated finite-sample values of the mean and the variance of the distance standard deviation Vn (X) for n = 5, 10, 50, 500 bn (X) refers to the compared to asymptotic values (last column); V cn (X) and ∆ b n (X); 10 000 version based on the unbiased estimates W repetitions. ν = 3. The maximum likelihood estimator of scale in the location-scale family generated by the N (0, 1), or standard normal, distribution is the standard deviation. In the Laplace model, the analogous estimator of scale is the mean deviation dbn (X) = P n−1 ni=1 |Xi − mn (X)|, where mn (X) denotes the sample median of X. In the case of the tν -distribution, the maximum likelihood estimator of the scale parameter does generally not admit an explicit representation. In Table 1, the asymptotic efficiencies of the distance standard deviation are compared with those of the standard deviation σ bn (X), the mean deviation dbn (X), and b n (X). The asymptotic variance of the maximum likelihood Gini’s mean difference ∆ estimator of the scale parameter for the tν -distribution is (ν + 3)/2ν. The population values and asymptotic variances of the other estimators mentioned at the respective distributions are given by Gerstenberger and Vogel [10, Tables 2 and 3]. The Distance Standard Deviation 25 While the distance standard deviation has moderate efficiency at normality, it turns out to be asymptotically very efficient in the case of heavier-tailed populations. For the t5 - and t3 -distributions, the distance standard deviation outperforms its three competitors considered here and moreover is very close to the respective maximum likelihood estimator. In Table 2, we complement our asymptotic analysis by finite-sample simulations. For sample sizes n = 5, 10, 50, and 500 and the same population distributions as above, the (simulated) expectations and variances (based on 10,000 observations) of the empirical distance standard deviation Vn (X) = [Wn (X) + ∆2n (X)]1/2 and the alternative version bn (X) = [W cn (X) + ∆ b 2n (X)]1/2 are given along with their respective asymptotic values. V b n (X) are The corresponding values for the competing estimators σ bn (X), dbn (X), and ∆ also provided by Gerstenberger and Vogel [10]. Table 2 indicates that Vn (X) indeed is bn (X) in terms of bias as well as variance. to be preferred over V References [1] Bartoszewicz, J. (1986). Dispersive ordering and the total time on test transformation. Statist. Probab. Lett., 4, 285–288. [2] Bickel, P. J., and Lehmann, E. L. (2012). Descriptive statistics for nonparametric models, IV. Spread. In: Selected Works of E. L. Lehmann (J. Rojo, editor), 519–526. Springer, New York. [3] David, H. A., and Nagaraja, H. N. (1981). Order Statistics. Wiley, New York. [4] Dueck, J., Edelmann, D., Gneiting, T., and Richards, D. (2014). The affinely invariant distance correlation. Bernoulli, 20, 2305–2330. [5] Dueck, J., Edelmann, D., and Richards, D. (2015). A generalization of an integral arising in the theory of distance correlation. Statist. Probab. Lett., 97, 116–119. [6] Dueck, J., Edelmann, D., and Richards, D. (2017). Distance correlation coefficients for Lancaster distributions, J. Multivariate Anal., 154, 19–39. [7] Feuerverger, A. (1993). A consistent test for bivariate dependence. Int. Stat. Rev., 61, 419–433. [8] Fiedler, J. (2016). Distances, Gegenbauer expansions, curls, and dimples: On dependence measures for random fields. Doctoral dissertation, University of Heidelberg. [9] Fokianos, K., and Pitsillou, M. (2016). Consistent testing for pairwise dependence in time series. Technometrics, to appear. 26 Edelmann, Richards, and Vogel [10] Gerstenberger, C., and Vogel, D. (2015). On the efficiency of Gini’s mean difference. Stat. Methods. Appt., 24, 569–596. [11] Hoeffding, W. (1948). A class of statistics with asymptotically normal distribution. Ann. Math. Stat., 19, 293–325. [12] Hoeffding, W. (1961). The strong law of large numbers for U -statistics. Institute of Statistics, Mimeograph Series No. 302. University of North Carolina, Chapel Hill, NC. [13] Huo, X., and Székely, G. J. (2016). Fast computing for distance covariance. Technometrics, 58, 435–447. [14] Jentsch, C., Leucht, A., Meyer, M., and Beering, C. (2016). Empirical characteristic functions-based estimation and distance correlation for locally stationary processes. Preprint, Mannheim University. [15] Jones, M. C., and Balakrishnan, N. (2002). How are moments and moments of spacings related to distribution functions? J. Stat. Plan. Inference, 103, 377–390. [16] Kochar, S. C. (1999) On stochastic orderings between distributions and their sample spacings. Statist. Probab. Lett., 42, 345–352. [17] Kong, J., Klein, B. E. K., Klein, R., and Wahba, G. (2012). Using distance correlation and SS-ANOVA to access associations of familial relationships, lifestyle factors, diseases, and mortality. Proc. Natl. Acad. Sci., 109, 20352–20357. [18] Lomnicki, Z. A. (1952). The standard error of Gini’s mean difference. Ann. Math. Stat., 23, 635-637. [19] Lyons, R. (2013). Distance covariance in metric spaces. Ann. Probobab, 41, 3284– 3305. [20] Martı́nez-Gómez, E., Richards, M. T., and Richards, D. St. P. (2014). Distance correlation methods for discovering associations in large astrophysical databases. Astrophys. J., 781, 39 (11 pp.). [21] Richards, M. T., Richards, D. St. P., and Martı́nez-Gómez, E. (2014). Interpreting the distance correlation results for the COMBO-17 survey. Ann. Appl. Stat., 784, L34 (5 pp.). [22] Rizzo, M. L., and Székely, G. J. (2010). DISCO analysis: A nonparametric extension of analysis of variance. Ann. Appl. Stat., 4, 1034–1055. The Distance Standard Deviation 27 [23] Sejdinovic, D., Sriperumbudur, B., Gretton, A., and Fukumizu, K. (2013). Equivalence of distance-based and RKHS-based statistics in hypothesis testing. Ann. Stat., 41, 2263–2291. [24] Shaked, M., and Shanthikumar, G. (2007) Stochastic Orders. Springer, New York. [25] Székely, G. J., Rizzo, M. L., and Bakirov, N. K. (2007). Measuring and testing independence by correlation of distances. Ann. Stat., 35, 2769–2794. [26] Székely, G. J., and Rizzo, M. (2009). Brownian distance covariance. Ann. Appl. Stat., 3, 1236–1265. [27] Székely, G. J., and Rizzo, M. (2013). The distance correlation t-test of independence in high dimension. J. Multivariate Anal., 117, 193–213. [28] Székely, G. J., and Rizzo, M. (2014). Partial distance correlation with methods for dissimilarities. Ann. Stat., 42, 2382–2412. [29] Van der Vaart, A. W. (2000) Asymptotic Statistics, Volume 3. Cambridge University Press, New York. [30] Yitzhaki, S. (2003). Gini’s mean difference: A superior measure of variability for non-normal distributions. Metron, 61, 285-316. [31] Yitzhaki, S., and Schechtman, E. (2012). The Gini Methodology: A Primer on a Statistical Methodology. Springer, New York. [32] Zenga, M., Polisicchio, M., and Greselin, F. (2004). The variance of Gini’s mean difference and its estimators. Statistica, 64, 455-475. [33] Zhou, Z. (2012). Measuring nonlinear dependence in time-series, a distance correlation approach. J. Time Series Anal., 33, 438–457.
10math.ST
A Review of Intelligent Practices for Irrigation Prediction Krupakar Hans SSN College Of Engineering Chennai, India E-mail: [email protected] Akshay Jayakumar SSN College Of Engineering Chennai, India E-mail: [email protected] Dhivya G SSN College Of Engineering Chennai, India E-mail: [email protected] ABSTRACT: Population growth and increasing droughts are creating unprecedented strain on the continued availability of water resources. Since irrigation is a major consumer of fresh water, wastage of resources in this sector could have strong consequences. To address this issue, irrigation water management and prediction techniques need to be employed effectively and should be able to account for the variabilities present in the environment. The different techniques surveyed in this paper can be classified into two categories: computational and statistical. Computational methods deal with scientific correlations between physical parameters whereas statistical methods involve specific prediction algorithms that can be used to automate the process of irrigation water prediction. These algorithms interpret semantic relationships between the various parameters of temperature, pressure, evapotranspiration etc. and store them as numerical precomputed entities specific to the conditions and the area used as the data for the training corpus used to train it. We focus on reviewing the computational methods used to determine Evapotranspiration and its implications. We compare the efficiencies of different data mining and machine learning methods implemented in this area, such as Logistic Regression, Decision Tress Classifier, SysFor, Support Vector Machine(SVM), Fuzzy Logic techniques, Artifical Neural Networks(ANNs) and various hybrids of Genetic Algorithms (GA) applied to irrigation prediction. We also recommend a possible technique for the same based on its superior results in other such time series analysis tasks. INTRODUCTION: Water scarcity is becoming a major issue throughout the world today, which in turn has increased the threat of a major food crisis. Therefore, there needs to be an efficient method to utilize the available resources judiciously. As agriculture is one of the largest water consuming sectors, managing irrigation levels can play an important part in saving water for other purposes. This is also due to the fact that 25% of the water taken for agriculture is wasted due to poor management1,2. In order to maximize water productivity and improve water management, application of statistical methods have become significant. As far as India is concerned, agriculture is the largest contributor to the GDP. As of 2010-11, the agricultural sector has contributed 14.2 percent of the GDP. Also, India's agricultural exports account for 1.4% of the world trade in agriculture3. Therefore, there is an increasing need to develop a prediction system effective management and utilization of soil nutrients and water resources. These systems based on spatial database on agriculture can improve agricultural management in India4,5. The earliest methods to address this issue involved computational models. In these methods, the focus lay on correlation between physical factors alone. Since these models relied on empirical scientific equations, they are only suitable in perfectly ideal conditions. They do not take into account the uncertainties and variations from ideal conditions that were used in determination of their implications that are found in real time data6–8. Over the last 15 years, there have been several applications of various data mining and prediction models in this area that have made coming up with an irrigation management and prediction system possible. These techniques are powerful, explorative and can perform intensive analysis on the given data. Some of the techniques used include Logistic Regression, Decision Tree Classifiers, SysFor, Support Vector Machines, Fuzzy Logic Classifiers and Artifical Neural Networks(ANNs). The models described for irrigation prediction system are generally developed and trained using a large amount of historical data (training data) of entities or features that would influence the amount of water that is required in exactitude or at least inside of a coherent range. Once built, the models are used on real time data not used in training i.e. to make a prediction of the amount of irrigation necessary to sustain the crop’s healthy growth. The nature of these models would be such that even though the algorithm allows for generalization to randomized test data, the predictions are most correspondent specifically to the area and conditions used in the training data, thereby trying to account for the otherwise invisible variations specific to that land and surroundings1,9–11. The objective of this paper is to study and review the computational various data mining techniques in the field of hydrology and to compare the efficiencies of the predictions made in the same. Section 2 of this paper looks at all the parameters or sources of features used in order to facilitate prediction of irrigation water requirement of crops. Section 3 of this paper reviews the computational parameter evapotranspiration and its implications and the different data mining techniques and the data analysis areas used in the field so far. Section 4 compares the accuracy of prediction of the different techniques discussed in Section 3. Section 5 describes a novel RNN LSTM model that is proposed in this paper that can be used to obtain better results, a richer contextualization and better semantic correlations found in the parameters used in real-time data12–17. Section 6 concludes the paper. SOURCES INFLUENCING IRRIGATION DEMAND: The sources of parameters that affect the process of crop irrigation usually tend to vary according to the terrain that agriculture is practiced. While some generic ones apply to all kinds of lands, we are going to restrict the discussion about the sources of feature vectors to terrains at ground level18. This list of features is by no means exhaustive and there are more and more parameters that can be considered with the advent of the new age Internet of Things sensors that can track various things that were previously not possible to track19,20. The sources that make irrigation water demand prediction possible can be broadly categorized into meteorological factors, crop input and agricultural parameters. 1. Meteorological Factors Meteorological factors are important in determining the water requirement in crop irrigation because there are areas of the world, like in India, where the primary source of water is rainfall. Combined with this, there are also other factors that have the potential to affect the amount of water required for the efficient management and yield of crops. One of the main factors in this respect is the temperature parameters: maximum temperature, minimum temperature and average temperature. The effect on the amount of sunshine that a region requires is undeniably crucial to the plant’s water needs as too much heat would cause lesser water availability to crops in general21. The speed of winds also tends to affect the amount of irrigation required, albeit not as much as temperature does. It is generally a practice to use a metric like Crop Water Stress Index (CWSI) to determine how much water is required for a sustained and healthy growth of plants. CWSI is the relative transpiration rate occurring from a plant by means of the temperature of the plant and the measure of humidity of the air in terms of vapour pressure deficit. It has been found that during the calculation of CWSI, predictions made during conditions of low wind speed tend to be in excess of the actual values and vice versa22. Other factors affecting crop irrigation requirement are rainfall, solar radiation intensity and duration, precipitation etc. The effects of these factors on crop irrigation demand prediction are quite straightforward as these factors affect the surface water availability and to an extent, the amount of groundwater present directly23,24. 2. Crop Input Factors One of the most important criteria that determines the irrigation demand is the soil type that is used to grow the particular crops. Major types of soil used for various crops tend to have different effects as the water retention capacity of the soil heavily depends on the composition of the soil. The difference can be seen clearly when the water requirement of various crops that grow on various types of soil are compared together25. One other factor considered include the type of crop itself. The behavior of water retention and requirement of every crop varies as the water content of each and every part of the plant (shoots, flowers, leaves, fruits etc.) varies 26. Another parameter that is important is the soil moisture stress, which is a metric used to determine the extent of water that is not present in the soil27. Also, there are several other crop data surface coefficients that change with time that influence the water requirement of plants. But the use of these parameters is something that is left up to the programmer because these parameters are found out using relationships of the other feature vectors used in the mining algorithm. It is generally not advisable to do so as precomputed values might push the model to be prone to the errors in these parameters that would occur6,28–32. 3. Agricultural Factors Some other obvious factors include the time series parameters that determine the amount required in a situation that is affected by the history of occurrence. One such parameter is the actual amount of water that is used in the time steps that have occurred before the one being trained for. Some other information like amount of time remaining till the harvest are also considered sometimes so as to enforce pressurized irrigation behavior that the mining algorithm can learn from the best patterns possible as well33. DESCRIPTION OF METHODS: The methods described in the following sections include ones that have been used for irrigation water prediction across all the parts of the world34. These methods have been used in specific parts of the world where electronically collected data about the conditions and the parameters is occurring. In the techniques discussed below, Evapotranspiration is the only one that is a computational method. All of the other methods discussed fall into the category of data mining and prediction algorithms based on historical context. Some of the comparative analyses specified in this paper comes from the work by Khan et al. from the comparative study he performed on the various data mining algorithms in terms of their performance of prediction by using the Coleambally Irrigation Area (CIA) in Australia35. 1. Evapotranspiration One of the really popular computational methods used to semantically predict the amount of water required is called EvapoTranspiration. EvapoTranspiration (ET) is a semantic measure of the total water loss that occurs due to evaporation and transpiration which specifies the amount of water essential for growth of plants. It is expressed as a depth (usually in inches). ET is based on a number of factors that can include: local temperature, precipitation, cloud cover, solar radiation, and the type of plants you are growing. The rate expresses the amount of water lost from a cropped surface in units of water depth in a unit area of land taken in the same units as the depth. The time unit can be an hour, day, decade, month or even an entire growing period or year. The parameter is usually compared with a Reference EvapoTranspiration (ET0) that is used to study the demand of water requirement independent of crop type and variations in agricultural practices used. ET0 is used to compute the ET on a hypothetical grass reference crop with specific characteristics6,36,37. Since this method involves modeling a scientific equation, there is no learning phase and the parameters for the day are simply substituted into the equation in order to calculate the score. Since empirical equations are considered, this method performs poorly on real-time scenarios due to uncertainties that are not taken into account in these equations. The Evapotranspiration measure is derived from the FAO Penman-Monteith equation is computed as: where Lv is the volumetric latent heat of vaporization i.e. the energy required per water volume vaporized, E is the mass water evapotranspiration rate in g / sec m2, ETo is the water volume evapotranspired in mm / sec, Δ is the rate of change of saturation specific humidity with air temperature in Pa / K, Rn is the net irradiance in W / m2 which is the external source of energy flux, G is the ground heat flux which is a little difficult to measure, in W / m2, Cp is the Specific heat capacity of air in J / kg K, ρa is the dry air density in kg / m3, δe is the specific humidity in Pa ga is the atmospheric conductance in m / s, gs is surface conductance in m / s, γ is the Psychrometric constant which is close to 66 Pa / K38. 2. Logistic Regression Logistic regression is a very effective binary classifier that can be used to try to predict the water requirement as a time series data. Logistic regression can be Simple or Multivariate. Simple logistic regression is used to predict binary values. In this case, given the amount of water to be used, the model can predict whether the specification is adequate or not. This is a naive approach and predicted with a rather low accuracy. Multivariate Logistic Regression takes into account various features to provide decisions39,40. This can be seen as the simplest feed-forward neural network with one hidden layer and therefore one weight. In this model, each class specifies the range of water required for irrigation. However, this model does not provide crop-specific decisions and in no way maps the temporal dependencies35. Logistic regression is modeled as: where X is the set of feature vectors of size n, Yi is the predicted class label, W and B are the weights and biases respectively that would be learned by means of the gradient descent algorithm41. 3. Decision Tree Classifier A decision tree deduces logical relationships between the class labels in the form of a hierarchical tree. The patterns explored by this algorithm is known as logic rules. Therefore, from the classifying attributes, classifier attributes are deduced42. Decision trees are made of nodes and leaves where the nodes represent the classifying attributes and the leaves represent the classifier attributes. These logical rules are framed with the use of information gain based on the C4.5 algorithm43. The model built using Decision Tree Classifiers has been found to provide greater accuracy than logistic regression. As with the problem of logistic regression, it is difficult to provide crop-specific predictions and model the temporal dependencies using this model44. Fig 1. Decision Tree Classifier 4.SysFor SysFor stands for Systematically developed Forests of multiple tress. This algorithm is a modification of the Decision Tree Classifier. The principle behind SysFor (Systematic Forests) is that better knowledge can be gained through extraction of better knowledge. This algorithm consists of several different steps. First, the ‘goodness’ of attributes and the split points in the dataset are determined using the gain ratio. The gain ratio is computed as: where Info refers to the entropy and is computed as the probability of value being every unique element in the dataset in each and every feature. The gain ratio Gain is computed as the difference in entropy before the split and after the split occurred. This ratio is used to find the split points and the best features45. The next step is the specification of the number of trees used for the forest by the user. Each good attribute found is made the root attribute of a distinct tree. The first tree's root attribute is used to logically split the feature selection and prediction process horizontally and join the trees created in each split46. These steps are repeated till the user-defined number of trees are created in the forest. From this forest, the required classifier attributes are selected based on the logic rules of each tree47,48. The model used with this algorithm provides the best results with crop-specific predictions as found out in Khan et al35. This model has been found to be superior to even ANN models for the CIA land area, even though these models are not designed to be used in time series prediction. 5.Support Vector Machine(SVM) An SVM tries to find the best amongst all the linear classifiers that can be possible between any 2 classes, over several high dimensional planes of data. This is achieved by construction of a hyperplane per dimension i.e. a set of hyperplanes in a higher dimensional space like the problem of crop irrigation demand prediction. The class labels used are identified in such a way that the distance between the hyperplanes used to find the best possible linear classifier is maximized. This ensures maximum differentiability of the class labels involved. The margin can be of two types- soft margin and hard margin. In soft margin, certain number of data points in each class are allowed to disobey the margins, which is not possible in hard margin SVMs. The margins are found using non-linear functions like sigmoid, tanh, gaussian function etc. Furthermore, if the number of features turns out to be very less, special Kernel functions can be used that form substituted combinations of the already existing features in a non linear space like sigmoid, tanh, exponential etc. A common practice used with these SVMs is the use of hierarchical microclustering to accommodate for huge datasets which all cannot be considered at once because of the complexities of computation of the centroid of a large number of data points. 49,50 The SVM classifier optimizes: where J is the cost function optimized based on the distance between the hyperplanes with respect to the linear classifier and yi is the output class label for item i. The model developed with this algorithm has found to show surprisingly low accuracy. Also, the training period of this model is large. While this model does provide predictions that are crop-specific, the lack of ability to map time series correlations is also a problem. 6. Fuzzy Systems: A. Remote Sensing and Crop Models Jones et al., in 2000, came up with an integrated module that combined remote sensing and crop models for decision support crop management. The model takes the remote sensed data, corrects and calibrates the data, and interprets this data, making it ready for training. Now, this data is sent to the crop and decision models for them to compute a fuzzy composite modeling scheme. The entire model is supplemented with ancillary data i.e. various other dependent parameters like soil type, rainfall etc. The farm management decision system involved 3 main decision-making criteria: profitability, environment and sustainability. A simple fuzzy composite programming to try to estimate various parameters relevant to the agricultural domain. It is a farm management system on the whole more than a targeted water level predictor51. B. Fuzzy Logic Crop Water Stress Index (FL-CWSI) Around the same time, Al-Faraj et al. built a rule-based Fuzzy Logic Crop Water Stress Index (FLCWSI) which returns an index between 0 and 1 corresponding to the metric CWSI using fuzzy logic techniques. This index was usually a result of sigmoid, Gaussian, absolute difference or a variety of other membership functions used in fuzzy logic52. It eliminated the necessity of using various other factors like aerodynamic resistance etc. These models were found to perform better than the rule based models used for irrigation prediction53. C. ANFIS By 2007, a new model was used for prediction of daily irrigation water demand using Adaptive NeuroFuzzy Inference Systems (ANFIS) technique. This first order Sugeno fuzzy model has 2 inputs and one output. The inputs are carried through 5 layers before an output prediction is reached. The first layer passes the input through a membership function that transforms input and convert it into a fuzzy set range. The second layer provides a product of the two membership function results on the two inputs. The third layer normalizes the influence of various rules by taking a ratio of the firing rate. The fourth layer introduces various parameters that will be used to predict accurate values The learning of these parameters usually takes place by means of a time series algorithm like ARMA, AR, ARIMA etc. The fifth layer computes a weighted average of all the input signals out of the 4th layer54. These models use the backpropagation algorithm through the 5 steps in reverse to facilitate the training process. They have a much better accuracy predicting irrigation requirement when compared to the Auto Regression and the ARMA models when Root Mean Squared (RMS) and Mean Absolute Percentage Error (MAPE)55. Fig 2. ANFIS System with 2 inputs and 1 output D. ARIMA In 2009, Wang et al. published a paper surveying the various kernel-based and other AI algorithms that were used for water flow prediction. Also, the analysis by Landeras et al. in 2009 revealed that the the ARIMA model and the ANN model, when used for calculation of evapotranspiration, gave a 6-8% reduction in the error percentage. Also, the work by Wang et al. showed that AR, ARMA, ANFIS models gave much better results when compared to the ANN models in the domain of water flow prediction56. ARIMA models are generalized class of models that can predict a stationary time series. Sometimes, stationarity detrending by means of taking the dth differential and modeling that as a stationary series, non-linear transformations etc. are carried out to ensure correct predictive results. A stationary series is constant in graph throughout the time series i.e. its central tendencies tend to remain constant inside of a range. This also acts as a disadvantage to this model as stationarity is a hard constraint to enforce on the dynamic real time data57–59. ARIMA(p,d,q) is given by: where Xt is the predicted output at time step t, µ is the mean over the entire dataset, the summation from 1 to p is the autoregressive model that learns predictions based on a weighted sum of a predefined number of time step values, the summation from 1 to q is the moving average model that maps the error in prediction of every time step, ξt is the error parameter that is permitted. The parameter d specifies the number of times the given input data needs to be differentiated in order to achieve a data distribution that is stationary, where the differentiation is carried out at each level by means of finding the difference between the timesteps. Of these parameters, ξt, Φ and γ are the learnable parameters of the model60. E. Fuzzy inference to single factor prediction By 2010, a new model that made use of fuzzy inference to single factor prediction method used to predict the amount of irrigation required. First, pre-recorded examples are taken and discretized into a universe U. Then a reasoning model of single factor prediction characterized by (e-f)-fold by e-degree compound fuzzy implicative propositional logic. The excessive dimensionality problem is taken care of using logic primitives that work to reduce the feature space. The inference rules present are taken and conformed to a required size set to ensure a rule based solution61. F. Hybrid Model There have been a lot of hybrid models that have been used for time series prediction effectively that involve various combinations of ANNs, fuzzy logic and Genetic Algorithms in various other domains61–65. In 2010, Paulido-Calvo et al. came up with a hybrid model of combining CNNs with fuzzy membership function, optimized by a genetic optimization algorithm to test the efficacy of irrigation demand prediction. He found that the selection of the best out of 5 ANN models in triangular partitions and subjecting that through a fuzzy membership function, optimized by genetic optimization algorithms using IF-THEN rules gave the best results. The application of fuzzy algorithms was quickly followed by defuzzification algorithms to produce the required output. The genetic operations of reproduction, crossover and mutation were defined to facilitate the genetic optimization. This system beat the accuracy of the conventional ANN system1. G. Inexact rough interval fuzzy linear programming Lu et al. tried to use inexact rough interval fuzzy linear programming method to generate conjunctive water allocation strategies. The rough interval method embodies dual-uncertain parameters quite robustly. The results from this model were comparable to the existing state-of-the-art even though the execution time of the algorithm was much better than the contemporary model whose performance is similar to this one. One of the main advantages in using this model is its ability to predict good results in both normal and special system conditions, making it a more generalized solution that can be achieved by selective targeting of features66. H. Decision Support System In 2014, Mousa et al. developed a fuzzy based decision support system that evaluated evapotranspiration value using the computational formula before being used in training to predict the amount of irrigation required by means of use of the decision tree algorithm. The model took input from sensors of wind speed, temperature, humidity etc and also given as input were the irrigation strategies used and the equipment used to see if these factor into the prediction methodology. The irrigation strategy planned and equipment information gave the model good performance and considerably better speed of execution. This model gave accurate and fast results when compared to some of the other models like AR, ARMA etc.67 7. ANNs Artificial Neural Networks are those architectures in which the input is morphed into a plane where a linear separation or regression is made possible by means of a non-linearity to warp the input into a plane where a straight line is enough. Various hyper-parameters used in an ANN would be hidden layer size, number of hidden layers, batch size, activation function, learning rate, optimization function, initialization strategy and normalization. The model is trained by means of various training algorithms like BackPropagation, radial basis function etc. The complexity of what the model can model is usually proportional to the number of layers in the architecture68–70. where a is the activation function used, which is usually any number of nonlinearities like sigmoid, tanh etc. The model is trained as a composition of activation functions that occurs the same number of times as the number of layers to give the final output. While these models operate in the nonlinear space and have much more scope for accommodating generic input, these models don’t have the capabilities to map the time series dependencies found in irrigation demand prediction71. Around 2001, the performance of artificial neural network architectures was compared with most of the other models at the time like ARMA, AR, SVMs etc. It was found that ANNs performed consistently worse than the SMT and the ANFIS models56. But by 2003, ANNs were tweaked efficiently enough to become better in performance than the other models like ANFIS, ARMA etc.72 Hardaha et al. did extensive work on tweaking the various parameters of the ANN to give an exploratory understanding on the dependence of each hyperparameter to the accuracy of the model. It was found that training based on the radial basis function gave the best results for prediction of water requirement of wheat crops73. A. Artificial Neuro-Genetic Networks A hybrid ANN model that incorporates a genetic algorithm on top of an ANN to improve the accuracy of the model was proposed in 2009. This model used the Artificial Neuro-Genetic Networks (ANGN) to predict the irrigation requirement of the crops. Initially, the collection of ANNs of size N are taken to be the entire population. A first generation would contain an initialized collection of ANNs all with their own hyperparameters. The output from the initial population is sent into the ANN chosen is then used to train the particular input. Now the accuracies of the different models are checked to see which ANGN selection would result in the best performance. To optimize the entire process, a pareto front is added before the output is specified. Objective evaluation functions F1 and F2 are first calculated over the entire corpus and are further used in the ANGN selection process74. A study by Khan et al. in 2013 compares different AI models and their accuracies when it comes to irrigation prediction. It was found that of all the models, the model with the 3-fold cross validation multiple decision trees SysFor model gave the best overall results. But the actual water content required by the crop was accurately predicted by ANNs really accurately. The difference in error percentage between ANNs and SysFor was almost 20%. Thus, it was concluded that SysFor, ANN and decision tree techniques are the most suitable for the task of irrigation prediction35. COMPARISION OF PERFORMANCES Model Used Dataset / Study area Time Step Accuracy (%) Reference Logistic Regression Decision Tree Classifier SysFor Support Vector Machines Remote Sensing and Crop Models FL-CWSI Coleambally, Australia Coleambally, Australia 1 day 1 day 56 74 Khan et al.35 Khan et al.35 Coleambally, Australia Coleambally, Australia 1 day 1 day 78 64 Khan et al.35 Khan et al.35 MAC, University of Arizona 58 to 78 Jones et al.51 CWSI Comparison Only MAPE comparison Only ET Comparison Only Value Comparison Only Al-Faraj et al.53 ANFIS Chania in Crete, Greece Variable (Rule Based) Index – no time series info 1 day ARIMA Álava, Basque County, Spain 1 week Fuzzy inference to Single Factor Prediction Hybrid ANN, Fuzzy, GA Inexact rough interval fuzzy Decision Support System ANNs Shangqiu, Henan, China 1 year Cordoba province, Spain 1 day Custom dataset Custom Baghdad, Iraq (Simulation) 1 month Bhakra Canal system, Rajasthan, India Bembézar Irrigation District (Spain) 1 month ANGN Horticulture Dept., UNL 1 day Atsalakis et al.55 Landeras et al.59 Chen et al.61 79.73 (in terms of 20.27 SEP %) Comparison Only Pulido-Calvo et al.1 Lu et al.66 ET Comparison Only r2 Comparison Only 87.37 (in terms of 12.63 SEP %) Mousa et al.67 Hardaha et al.73 Perea et al.74 Table 1 Comparison of Models Simply using fuzzy system architectures will help capture the randomness in the representation and the fading of hard boundaries at inflection points, but will not do much about the sequential nature of the data. ARIMA models take into context the temporal dependencies but only work for univariate regression. Multivariate regression is essential for irrigation prediction. Even the ANFIS architecture is not designed to capture time series dependencies. ANNs are very good at prediction based on training, but lack the capability of inferring semantic meaning from the sequential flow. SVMs and other kernel based methods are designed to be trained on normal data and will not be able to capture the essential sequential information. ANGN also fails to map temporal dependencies when reading features and predicting outputs. PROPOSED MODEL The above mentioned fallacies have left us in an unfortunate situation of choosing amongst a pool of ordinary choices and simply settling for whatever accuracy we can obtain. Hence, we propose a novel methodology of using a sequence learning based recurrent neural network (RNN) model that uses the LSTM activation function to model for irrigation requirement so that it doesn’t have memory problems on long input streams. The input historical context will be stored inside the context vector which will be passed on through the mapping of the output through time in the network75–78. where a is the activation function, Xt is the input at time step t, W, Wh and B are learnable parameters of the model and h refers to the hidden layer output that occurs during every time step t. The underlying architecture of the should contain three to five hidden LSTM or GRU layers, of size n, that are all back-propagated during training. The model uses BackPropagation Through Time (BPTT) algorithm for training and tweaking of the layer weights. The model will typically contain thousands of weight vectors all trained for each sequence input. The input will be in the form of features like temperature, rainfall, humidity etc. determined using real time sensors. A fixed context needs to be assigned for how much of the historic context is required for prediction. Every time step will involve processing all the features of that particular time step13,79,80. A typical LSTM circuit is described by: where i is the input gate, f the forget gate, o the output gate, c the cell gate and h the hidden layer output. The interactions in the cell state by means of which the mapping of the backpropagated gradients occurs not separately but alongwith a cell state interaction that ensures that the gradient never reaches zero81. Fig 3. RNN LSTM Model Proposed The advantages of using such an architecture are plentiful. The RNN is robust enough to map the intrinsic variations in observations that occur due to various factors like global warming, faulty equipment etc. Uncertainty will be automatically detected and ignored by the RNN. Also, RNNs are designed to incorporate sequence information inside of the hidden layer vector as context. The downsides to this model are the computational feasibility and the availability of hardware (GPUs) powerful enough to train a big model in less time, and the requirement of a huge corpus for training, which is why it was not possible to implement this model. Nevertheless, the runtime of the model will be really fast because testing is merely a few multiplications. Another advantage of this model is its efficiency in storage. Deep learning models only occupy very small amounts of space (in hundreds of MB) when compared to the traditional AI algorithms (a few GB)77. Because of all these factors, and the recent success of RNN sequence to sequence architectures, the application of this architecture should improve the current SOTA by quite a bit. REFERENCES 1. Pulido-Calvo I, Gutierrez-Estrada JC. Improved irrigation water demand forecasting using a softcomputing hybrid model. Biosyst Eng 2009; 102: 202–218. 2. Sivakumar MVK, Stigter CJ, Rijks D. Foreword. Agric For Meteorol 2000; 103: 1–2. 3. Bhalla GS, Singh G. Economic liberalisation and Indian agriculture: a district-level study. Book, SAGE Publications India, 2012. 4. Cain JD, Jinapala K, Makin IW, et al. Participatory decision support for agricultural management. A case study from Sri Lanka. Agric Syst 2003; 76: 457–482. 5. Singh V, Singh UC. Assessment of groundwater quality of parts of Gwalior (India) for agricultural purposes. Indian J Sci Technol 2008; 1: 1–5. 6. Allen RG, Pereira LS, Raes D, et al. Crop evapotranspiration-Guidelines for computing crop water requirements-FAO Irrigation and drainage paper 56. FAO, Rome 1998; 300: D05109. 7. Smith M. CROPWAT: A computer program for irrigation planning and management. Book, Food & Agriculture Org., 1992. 8. Wu IP. Energy gradient line approach for direct hydraulic calculation in drip irrigation design. Irrig Sci 1992; 13: 21–29. 9. Alvisi S, Franchini M, Marinelli A. A short-term, pattern-based model for water-demand forecasting. J Hydroinformatics 2007; 9: 39–50. 10. Zhou SL, McMahon TA, Walton A, et al. Forecasting operational demand for an urban water supply zone. J Hydrol 2002; 259: 189–202. 11. Patel H, Patel D. A Comparative Study on Various Data Mining Algorithms with Special Reference to Crop Yield Prediction. Indian J Sci Technol; 9. 12. Gers FA, Eck D, Schmidhuber J. Applying LSTM to time series predictable through time-window approaches. In: International Conference on Artificial Neural Networks. Inproceedings, 2001, pp. 669– 676. 13. Gers FA, Schmidhuber J, Cummins F. Learning to forget: Continual prediction with LSTM. Neural Comput 2000; 12: 2451–2471. 14. Graves A, Jaitly N, Mohamed A. Hybrid speech recognition with deep bidirectional LSTM. In: Automatic Speech Recognition and Understanding (ASRU), 2013 IEEE Workshop on. Inproceedings, 2013, pp. 273–278. 15. Graves A, Schmidhuber J. Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Networks 2005; 18: 602–610. 16. Sundermeyer M, Oparin I, Gauvain J-L, et al. Comparison of feedforward and recurrent neural network language models. In: 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. Inproceedings, 2013, pp. 8430–8434. 17. Sak H, Senior A, Beaufays F. Long short-term memory based recurrent neural network architectures for large vocabulary speech recognition. arXiv Prepr arXiv14021128. 18. Hanks RJ, Hill RW, others. Modeling crop responses to irrigation in relation to soils, climate and salinity. Book, International Irrigation Information Center., 1980. 19. Murthy ASR, Sudheer Y, Mounika K, et al. Cloud Technology on Agriculture using Sensors. Indian J Sci Technol; 9. 20. Kumar MK, Ravi KS. Automation of Irrigation System based on Wi-Fi Technology and IOT. Indian J Sci Technol; 9. 21. Schlenker W, Roberts MJ. Nonlinear temperature effects indicate severe damages to US crop yields under climate change. Proc Natl Acad Sci 2009; 106: 15594–15598. 22. O’Toole JC, Hatfield JL. Effect of wind on the crop water stress index derived by infrared thermometry. Agron J 1983; 75: 811–817. 23. Fritschen LJ. Net and solar radiation relations over irrigated field crops. Agric Meteorol 1967; 4: 55–62. 24. Fischer RA. Number of kernels in wheat crops and the influence of solar radiation and temperature. J Agric Sci 1985; 105: 447–461. 25. Tolk JA, Howell TA, Evett SR. Effect of mulch, irrigation, and soil type on water use and yield of maize. Soil Tillage Res 1999; 50: 137–147. 26. Rao AVMS, Chandran MAS. Crop water requirements. Agrometeorol Data Collect Anal Manag 1977; 51. 27. Slatyer RO. The influence of progressive increases in total soil moisture stress on transpiration, growth, and internal water relationships of plants. Aust J Biol Sci 1957; 10: 320–336. 28. Loew A, Ludwig R, Mauser W. Derivation of surface soil moisture from ENVISAT ASAR wide swath and image mode data in agricultural areas. IEEE Trans Geosci Remote Sens 2006; 44: 889–899. 29. Renard KG, Foster GR, Weesies GA, et al. Predicting soil erosion by water: a guide to conservation planning with the Revised Universal Soil Loss Equation (RUSLE). Book, US Government Printing Office Washington, DC, 1997. 30. Moran MS, Clarke TR, Inoue Y, et al. Estimating crop water deficit using the relation between surfaceair temperature and spectral vegetation index. Remote Sens Environ 1994; 49: 246–263. 31. Allen RG. Using the FAO-56 dual crop coefficient method over an irrigated region as part of an evapotranspiration intercomparison study. J Hydrol 2000; 229: 27–41. 32. Jensen ME, Wright JL, Pratt BJ. Estimating soil moisture depletion from climate, crop and soil data. Trans ASAE 1971; 14: 954–959. 33. Phocaides A. Technical handbook on pressurized irrigation techniques. 34. Igbadun HE. Irrigation Scheduling Impact Assessment MODel (ISIAMOD): A decision tool for irrigation scheduling. Indian J Sci Technol 2012; 5: 3090–3099. 35. Khan M.A., Islam M.Z. HM. Evaluating the Performance of Several Data Mining Methods for Predicting Irrigation Water Requirement. In: Zhao Y. LJKPJ, Christen P (eds) Data Mining and Analytics 2012 (AusDM 2012). Inproceedings, Sydney, Australia: ACS, pp. 199–208. 36. Brouwer C, Heibloem M. Irrigation water management: irrigation water needs. Train Man; 3. 37. Jensen ME, Burman RD, Allen RG. Evapotranspiration and irrigation water requirements. Inproceedings, 1990. 38. Zotarelli L, Dukes MD, Romero CC, et al. Step by step calculation of the Penman-Monteith Evapotranspiration (FAO-56 Method). Inst Food Agric Sci Univ Florida. 39. Christensen R. Linear models for multivariate, time series, and spatial data. Book, Springer Science & Business Media, 1991. 40. Christensen R. Log-linear models and logistic regression. Book, Springer Science & Business Media, 2006. 41. Bottou L. Large-scale machine learning with stochastic gradient descent. In: Proceedings of COMPSTAT’2010. Incollection, Springer, 2010, pp. 177–186. 42. Islam MZ. EXPLORE: A Novel Decision Tree Classification Algorithm. In: MacKinnon LM (ed) Data Security and Security Data: 27th British National Conference on Databases, BNCOD 27, Dundee, UK, June 29 - July 1, 2010. Revised Selected Papers. Inbook, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 55–71. 43. John GH, Kohavi R, Pfleger K, et al. Irrelevant features and the subset selection problem. In: Machine learning: proceedings of the eleventh international conference. Inproceedings, 1994, pp. 121–129. 44. Quinlan JR. C4.5: Programs for Machine Learning. Book, San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 1993. 45. Quinlan JR. Induction of decision trees. Mach Learn 1986; 1: 81–106. 46. Islam MZ, Giggins H. Knowledge Discovery through SysFor - a Systematically Developed Forest of Multiple Decision Trees. In: Vamplew P. SAOK-LCP, Kennedy PJ (eds) Australasian Data Mining Conference (AusDM 11). Inproceedings, Ballarat, Australia: ACS, pp. 195–204. 47. Islam MZ. EXPLORE: a novel decision tree classification algorithm. In: British National Conference on Databases. Inproceedings, 2010, pp. 55–71. 48. Mitchell TM. Machine learning. 1997. Burr Ridge, McGraw Hill 1997; 45: 37. 49. Burges CJC. A tutorial on support vector machines for pattern recognition. Data Min Knowl Discov 1998; 2: 121–167. 50. Vapnik VN. The Nature of Statistical Learning Theory. Book, New York, NY, USA: Springer-Verlag New York, Inc., 1995. 51. Jones D, Barnes EM. Fuzzy composite programming to combine remote sensing and crop models for decision support in precision crop management. Agric Syst 2000; 65: 137–158. 52. Zadeh LA. Fuzzy sets. Inf Control 1965; 8: 338–353. 53. Al-Faraj A, Meyer GE, Horst GL. A crop water stress index for tall fescue (Festuca arundinacea Schreb.) irrigation decision-making—a traditional method. Comput Electron Agric 2001; 31: 107–124. 54. Jang J-S. ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans Syst Man Cybern 1993; 23: 665–685. 55. Atsalakis G, Minoudaki C, others. Daily irrigation water demand prediction using Adaptive Neuro-Fuzzy Inferences Systems (ANFIS). Inproceedings. 56. Wang W-C, Chau K-W, Cheng C-T, et al. A comparison of performance of several artificial intelligence methods for forecasting monthly discharge time series. J Hydrol 2009; 374: 294–306. 57. Box GEP, Pierce DA. Distribution of residual autocorrelations in autoregressive-integrated moving average time series models. J Am Stat Assoc 1970; 65: 1509–1526. 58. Valipour M, Banihabib ME, Behbahani SMR. Comparison of the ARMA, ARIMA, and the autoregressive artificial neural network models in forecasting the monthly inflow of Dez dam reservoir. J Hydrol 2013; 476: 433–441. 59. Landeras G, Ortiz-Barredo A, López JJ. Forecasting weekly evapotranspiration with ARIMA and artificial neural network models. J Irrig Drain Eng 2009; 135: 323–334. 60. Wei WW-S. Time series analysis. Book, Addison-Wesley publ Reading, 1994. 61. Chen Q, Jing L, Gao Y. Study on Applying Fuzzy Inference to Single Factor Prediction Method for Precipitation Irrigation Requirement Forecast. In: 2010 2nd International Workshop on Intelligent Systems and Applications. Inproceedings, 2010. 62. Hassan MR, Nath B, Kirley M. A fusion model of HMM, ANN and GA for stock market forecasting. Expert Syst Appl 2007; 33: 171–180. 63. Mukerji A, Chatterjee C, Raghuwanshi NS. Flood forecasting using ANN, neuro-fuzzy, and neuro-GA models. J Hydrol Eng 2009; 14: 647–652. 64. Ruan D, Wang PP. Intelligent hybrid systems: fuzzy logic, neural networks, and genetic algorithms. Book, Springer, 1997. 65. Kavousi-Fard A. A new fuzzy-based feature selection and hybrid TLA--ANN modelling for short-term load forecasting. J Exp Theor Artif Intell 2013; 25: 543–557. 66. Lu H, Huang G, He L. An inexact rough-interval fuzzy linear programming method for generating conjunctive water-allocation strategies to agricultural irrigation systems. Appl Math Model 2011; 35: 4330–4340. 67. Mousa AK, Croock MS, Abdullah MN. Fuzzy based Decision Support Model for Irrigation System Management. Int J Comput Appl; 104. 68. Yegnanarayana B. Artificial neural networks. Book, PHI Learning Pvt. Ltd., 2009. 69. Raman H, Sunilkumar N. Multivariate modelling of water resources time series using artificial neural networks. Hydrol Sci J 1995; 40: 145–163. 70. Zhang GP. Time series forecasting using a hybrid ARIMA and neural network model. Neurocomputing 2003; 50: 159–175. 71. Zhang GP, Patuwo BE, Hu MY. A simulation study of artificial neural networks for nonlinear time-series forecasting. Comput Oper Res 2001; 28: 381–396. 72. Pulido-Calvo I, Roldán J, López-Luque R, et al. Demand forecasting for irrigation water distribution systems. J Irrig Drain Eng 2003; 129: 422–431. 73. Hardaha MK, Chouhan SS, Ambast SK. APPLICATION OF ARTIFICIAL NEURAL NETWORK IN PREDICTION OF RESPONSE OF FARMERS’WATER MANAGEMENT DECISIONS ON WHEAT YIELD. J Indian Water Resour Soc; 32. 74. Perea RG, Poyato EC, Montesinos P, et al. Irrigation Demand Forecasting Using Artificial NeuroGenetic Networks. Water Resour Manag 2015; 29: 5551–5567. 75. Medsker LR, Jain LC. Recurrent neural networks. Des Appl. 76. Funahashi K, Nakamura Y. Approximation of dynamical systems by continuous time recurrent neural networks. Neural networks 1993; 6: 801–806. 77. Connor JT, Martin RD, Atlas LE. Recurrent neural networks and robust time series prediction. IEEE Trans neural networks 1994; 5: 240–254. 78. Dorffner G. Neural networks for time series processing. In: Neural Network World. Inproceedings, 1996. 79. Werbos PJ. Backpropagation through time: what it does and how to do it. Proc IEEE 1990; 78: 1550– 1560. 80. Mikolov T, Karafiat M, Burget L, et al. Recurrent Neural Network based Language Model. Interspeech 2010; 1045–1048. 81. Hochreiter S, Schmidhuber J. LSTM can solve hard long time lag problems. Adv Neural Inf Process Syst 1997; 473–479.
9cs.NE
International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) Vol. 3, No. 2, December 2012 A NEW APPROACH IN DYNAMIC TRAVELING SALESMAN PROBLEM: A HYBRID OF ANT COLONY OPTIMIZATION AND DESCENDING GRADIENT Farhad Soleimanian Gharehchopogh1, Isa Maleki2, Seyyed Reza Khaze3 1,2,3 Computer Engineering Department, Science and Research Branch, Islamic Azad University, West Azerbaijan, Iran {bonab.farhad1, maleki.misa2, khaze.reza3}@gmail.com ABSTRACT Nowadays swarm intelligence-based algorithms are being used widely to optimize the dynamic traveling salesman problem (DTSP). In this paper, we have used mixed method of Ant Colony Optimization (AOC) and gradient descent to optimize DTSP which differs with ACO algorithm in evaporation rate and innovative data. This approach prevents premature convergence and scape from local optimum spots and also makes it possible to find better solutions for algorithm. In this paper, we’re going to offer gradient descent and ACO algorithm which in comparison to some former methods it shows that algorithm has significantly improved routes optimization. KEYWORDS DTSP, ACO, Gradient Descent, Combinational Methods. 1. INTRODUCTION Nowadays method of efficiently-solving large number of problems known as NP-Hard problems is one of the most difficult combinational optimization issues. Solving such problems means to find the best solution among a large set of solutions to the problem. DTSP is one of the most famous combinational optimization problems. This problem initially introduced by Psaraftis in 1988 [1]. In recent decades many Heuristic methods have been suggested for solving DTSP’s and these methods are more flexible in comparison to the classical and traditional methods. Some heuristic methods such as combinational algorithms [2], ACO algorithms [3, 4, and 5] and evolutionary computation [6, 7] can be mentioned in this field. Swarm intelligence methods, are tools to find optimal answers or solutions. These methods take advantage of search and cooperation to look for an optimization problem’s search space. So the more one algorithm controls these parameters, more near-optimal solutions finds to the problem. ACO algorithm refers to a class of meta-heuristic algorithms that have adapted from the social behaviour of ants in nature. These algorithms’ aim is to find optimal solutions in reasonable time. Ants are autonomous factors in nature and when they work together, their performance is really smart [8]. The optimization-problems’ aim is to find optimal or near-optimal points. In some functions in addition to public minimum there are some other local minimums.in that case it’s not possible to easily find the public optimal point. In such problems, we can use combinational algorithms in search space to find optimal solution for problem. Gradient descent is an optimization algorithm to find minimum points in function [9, 10]. Gradient descent refers to optimizing processes and adjustment of input variables affect the output of the process in them. Mathematical methods use a collection of efficient and necessary circumstances that are true in optimization problem’s answer. Presence or absence of limitations in the optimization is essential in these approaches. In optimization problems without limitations such as gradient methods, the aim is to find optimal or near-optimal solution to an objective function [11, 12]. DOI : 10.5121/ijmpict.2012.3201 1 International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) Vol. 3, No. 2, December 2012 Beside swarm intelligence methods that are known as smart optimization methods, evolutionary computation or meta-heuristic methods, using mathematical methods, depending on the application may be faster. Gradient descent algorithm can process the searching in complex combinational problems space to find near-optimal solutions with high performance by creating an appropriate balance in ACO algorithms. The overall structure of our paper is organized as follows: We have organized the general structure of this paper as following: In section second introduce literature review; in section third we introduce descent gradient algorithm; in section fourth of this paper we’ll introduce ACO; in section five we’ll explain the proposed algorithm, in section sixth we’ll discuss about valuation and results of the proposed method and finally in section seventh we will draw some conclusions from this paper. 2. LITERATURE REVIEW For more accurate optimization results, we should use pre-heuristic methods (such as ACO algorithm, Genetic Algorithm, etc.) and to optimize possible solutions, we must use computational methods (e.g. gradient descending method). As DTSP has lots of local minimums, Computational methods, start from the basic hypothetical point to find first and closest near-optimal solution, and if it find the solution, defines it as optimal point; while metaheuristic methods Randomly in high repetitions are looking for the best solution and by jump out of point to another trying to find the best and most efficient point and provide optimal solutions. In recent years meta-heuristic methods have been considered to find near-optimal solutions to combinational optimization problems. F.S.Gharehchopogh et al. in [2] has used ACO algorithm and genetic algorithm combinational algorithms to solve DTSP. They have used genetic algorithm in his paper to optimize paths obtained from ACO algorithm in search space. In this paper chromosome genes in genetic algorithm are paths obtained from ACO algorithm. M.Guntsch in [3] has solved DTSP using ACO algorithm. He has used probability of motion and update rules changes to optimization. As gradient descent is local and only has high potential to find minimum and maximum points, it offers probability of better and more acceptable answers to find optimal solutions to the DTSP in comparison to the meta-heuristic methods. The increasing usage of mathematical optimization techniques has led many researchers to focus on developing and optimize problems using mathematical operations. Since there is no unique approach to solve all the optimization problems, various computational methods for solving optimization problems have emerged. Gradient descent algorithm is the basis of many optimization algorithms and it’s being used to learn artificial neural networks and minimize the network errors to adjust the network parameters [13]. In [14] X.Wang has utilized gradient descent usages. He has used gradient descent in order to solve complex integrals. D.Kumar & Y.Kumar in [15] have used optimization methods. In their journal they have they have studied the optimization methods that are gained from the nature. Among these methods and ways they have marked gradient descent as an optimization method to find the max or min of the problems. 3. GRADIENT DESCENT ALGORITHM There is a group of gradient algorithms in which the process of searching for gradient is used with some changes, to find the optimal answer. The continuous answers which are found in continuous repeats are similar to the main optimal answer. So, we stop when the experimental answers are gotten similar to the optimal answer much enough [16, 17]. Since there is no limitation in the problem it seems that moving in the same direction as gradient could be a practical way [17]. If the purpose of the problem is to minimize the f(x) we have to move in the opposite direction as the gradient. In the other words, we should use equation (1) in order to achieve the answer [16]. 2 International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) Vol. 3, No. 2, December 2012 xn+1 = xn − t n ∇f ( xn ) (1) In the above equation (1) the function has been begun from an arbitrary point to find the optimal answer and the function also performs minimizing in the same direction as gradient. In the equation (1), t is a non-negative scalar which minimizes the function in the same direction as gradient. The new gradient is created by the previous one in each repeat. When x is decreased we move from the current experimental answer to the next answer. Thus, in order to generalize a searching method for a variable, firstly we should specify the movement direction of the gradient using the partial derivatives. As we assume that f(x) is derivable, in each point x will have a gradient vector which is represented in the equation (2) as ∇f(x') [16]. ∇f ( x′) = ( ∂f ∂f ∂f , ,..., ) ∂x1 ∂x2 ∂xn x = x′ (2) The reason that gradient is important is that we can find minimal changes in function in x point as we move in the same direction as gradient. Pseudo code for the algorithm of the gradient descent is represented in the following: Choose randomly x0 While ||f ( xn +1 ) – f ( xn ) > Ɛ|| do γ n (generally 1/n) Compute x n +1 = xn - t n ∇f ( xn ) Choose a decreasing End while Do some random restarts Return the lowest couple xn , f ( xn ) found. Figure 1. Pseudo Code for the Algorithm of the Gradient Descent As the purpose of the problem is to find the optimal answer, if we move in the same direction as gradient, we will achieve the answer much sooner [19]. The method of gradient is to move towards the optimized answer in a zigzag direction instead of a straight direction. An appropriate reaction is to start the movement from the current answer in a distinct direction and not to stop as the f(x) is decreasing. When f(x) stops decreasing we stop too and the next answer is ready there. So, the gradient is calculated again to specify the direction of the next movement [19]. In this reaction each repeat contains the changing of the current answer of the X. The repeats of the gradient will continue until the gradient equals zero, if the distance of ε is considered acceptable. According to equation (3) we stopped [16].  ∂f   ≤ε  ∂x n  n = 1,2,..., n (3) ε is the distance of the gradient. It can be assumed either short or long. If the distance is short, the convergence rate is low. If this distance is small, the convergence rate is low. Gradient with increasing distance until convergence is guaranteed, the convergence rate increases. 4. ANT COLONY OPTIMIZATION (ACO) ACO algorithm, suggested by Dorigo in 1996 [20, 21], is a branch of artificial intelligence which is known as collective intelligence group. The movement probability of the ant K from the city I to the city j in the time t is suggested based on the equation (4). In this statement ηi,j is 3 International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) Vol. 3, No. 2, December 2012 the purview and equals 1/di,j(the more nearby cities are more likely to be chosen and τi,j is the amount of pheromone on the mane in the time t. Allowed k is the group of cities that the ant hasn't met up until now but can possibly meet them at the next step. α & β are the parameters of the impact of the pheromone laid on the main and the distance impact, respectively.  [τ ij (t )]α ⋅ [η ij ]β if k ∈ allowed k  α β pijk (t ) =  ∑ [τ ij (t )] ⋅ [η ij ]  j∈allowed k  0 otherwise (4) The update rule of the laid pheromone on the mane is formed based on the equation (5). τ ij (t + n ) = (1 − ρ ) × τ ij (t ) + ∆τ ij (5) In the equation (5), 1-ρ specifies the evaporation rate of the pheromone between the time t and (t + n). ρ Is assumed as the parameter of the pheromone evaporation in the range that: (0<ρ <1). The much the amount of the ρ is, the much the speed of evaporation increases. m ∆τ ij = ∑ ∆τ ijk (6) k =1 ∆τ ijk Represents the amount of pheromone of the best tour and it is calculated according to the equation (7). Q Lk if k ant uses edge (i, j) at time (t, t + n) ∆τ ijk =  otherwise  0 (7) In the equation (7), Q is a constant parameter which is dependent on the problem and Lk is the length of the path which is travelled by the ant K. Thus, the initial level of pheromone and evaporation rate, an important influence on the optimization process and is required to be determined in an appropriate way. 5. PROPOSAL ALGORITHM A large number of optimization methods are called collective optimization methods. In these methods algorithm starts finding solutions with some numbers of population. Then the algorithm is repeated among variables until there appears a proper answer. This process will go on until there appears an optimized answer for the problem. There are a lot's of ways in order to optimize the objective function such as numerical methods or random methods. Normally, the computational methods jump over the objective function and move toward the lower slope. Combinatorial problems are often longer and cannot be solved using computational v. the answer that is achieved on thee algorithms may be very far from the optimal answer. In this proposed method, we use a combined method (which includes both ACO algorithm and gradient descent method) in order to optimize The DTSP. In this way, we have the high speed of gradient descent methods and also are able to search for the overall minima. The ACO algorithm like other collective intelligence algorithms has two major disadvantages. The first disadvantage is the premature convergence. Other disadvantages of the ACO algorithm are the impact of parameters of this algorithm on the problems. If the parameters are not adjusted properly, the ACO algorithm hades towards local optimization and the algorithm performance decreases. In order to avoid disadvantages of premature convergence and the dependence of algorithm parameters on the problems, we have applied some changes in the ACO algorithm. By these changes, we try to solve DTSP’s by increasing the variety of solutions on how to 4 International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) Vol. 3, No. 2, December 2012 update the pheromone. Math is used as a tool for finding optimization of many algorithms. Grad search method is one of the mathematical optimization techniques. The main idea of this method is that the optimization problem (here is finding the optimal path) begins by choosing any primary answer. Then all adjacent neighbours with the primary point are evaluated by objective function. Then between answers to neighbours and the primary point, the answer is the most acceptable is replaced to selected primary point and the algorithm is repeated until a point is found that no more than your neighbor is not acceptable algorithm stops. Fig. 2 shows the schema of the proposed algorithm. Figure 2. Flowchart of the Proposed Algorithm. Thus, by taking the descending gradient movement, ACO have been modified in order to reach the optimal solution can be achieved more quickly. For one problem, there are several possible answers that to compare and choose the best optimal solution, a function called the objective function is defined. Select this function is dependent on the nature of the problem. In the DTSP, path length is a common goal of optimization. Pseudo code of proposed algorithm based on optimization algorithm of ACO algorithm and descending gradient includes the Fig. 3: 1. Initialize parameters 2. Loop Each ant is positioned on a starting city Repeat State transition rule Local pheromone updating 3. Gradient descent Start with a point random Repeat Determine a descent direction Choose a step Update point Until stopping criterion is satisfied Until all ants have built a complete solution Global pheromone updating Until End condition is reached. Figure 3. Pseudo Code of Proposed Algorithm 5 International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) Vol. 3, No. 2, December 2012 To obtain the more optimal routes, descending grad algorithm is combined with the pheromone’s updating law. Pheromone’s updating law when a more optimal answer achieved for algorithm compared to previous repetitions, increased in optimized paths of ant pheromone. When a better answer than previous repetitions is obtained it is possible that in the neighbourhood of this answer, exist another best answer that can be find out the answer with further searches in the neighbourhood of current answer. As shown in Fig. 4, the algorithm works based on removing edge of the tour and reconnect it in another way. Assuming the city, is the third city, ants meet all paths connected to the third city according to descending gradient. Whatever length of the path is less, the steep of grad is more in that path, and the path is chosen. It should be noted that there are several ways to make the tour again but only the condition will be accepted that in the constraints of problem (see each city only once) applies and new tour obtained better amount than previous answer. Remove of edge and reconnect it in succession will continue as far as to not found any new improver movement for algorithm. Figure 4. How to Select Cities According to what can be seen from figure this six samples city have been obtained as a primary tour. This output of the desirable or undesirable to reduce the path length using the gradient is descending for the next tour. To increase the efficiency of the suggested algorithm mode of pheromone updating can be combined with equation (8). xn+1 = xn − t n ∇f ( xn ) (8) By putting the amount of descending gradient in the right side of the equation (3) the following equation is obtained. τ ij (t + n ) = (1 − ρ )× τ ij (t ) + ∆τ ij + xn (10) In the above equation for select the best paths, the upper limit of pheromone is obtained. A meta-innovative algorithm cannot reach the optimum quality of the final answer, if the parameters are not set correctly. In order to solve this problem, to compute the overall optimum, we should distinguish the problem-dependent parameters to algorithms is converge faster to the optimal answer. In this regard, we use descending grad for set pheromone In ACO algorithm. When we are faced with a large number of independent variables, determination the appropriate combination of these parameters to presence in problem and in order to estimate problem dependent variable, is importance. Descending gradient is a firm computational tool for selecting best combination variables of problem, that can done by ascending and descending selection approach. In descending method, the amount that has the greatest impact, is added to the model. In fact in descending gradient 6 International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) Vol. 3, No. 2, December 2012 algorithm the value that has the greatest impact is added to subject and value is less effective than the model is removed. 6. EVALUATION AND RESULTS To evaluate the proposed algorithm with other algorithms, the number of cities considered to be 30 and results is estimated for 100 times iterations of the algorithm. One of the important parameters in the design of hybrid algorithm optimization and the resulting is path length. Descending gradient algorithm performance is dependent on the initial point and it does not have the ability to search all areas of problem. Thus by using ACO, that searches large space, descending grad algorithm is capable to approach the original optimal point. Parameter amounts for the proposed algorithm results are shown in Table 1. In the proposed algorithm, there are several parameters that affect the performance, in the Table 1, by using the parameter (α) the amount of spilled pheromone on edge applied. Parameter β determine the importance of relative distance to pheromone, in the selection of the next city. Parameter (rho) weakened (evaporation) of pheromone, and the parameter (t) minimizing the function in direction of descending gradient. Table 1. Value of Parameters in the Proposed Algorithm Parameter Name Value α 1 β 5 rho 0.1 t 0.4 Experimental results show that the use of descending gradient to select path, makes a significant improvement in the efficiency and the convergence rate of the algorithm and cause the close answers to optimal. In the proposed algorithm for increase variety in the answer, after ants converging to a path, we second initialized that. This means that the value of each ant is equal to reduction of path length that ant has wended in the previous repetition and the best length achieved by other ants. Table 2, shows comparing proposed method with other algorithms. As the results show the proposed algorithm is able to achieve a better response than the other algorithms. Table 2. Results obtained of the proposed algorithm and other algorithm Algorithms ACO [2] GA [2] Hybrid Algorithm [2] Proposed Algorithm Worst Average Best Solution Solution Solution 385 340 368 464 349 826 384 340 358 365 340 347 Diagram Fig. 5, comparing the proposed algorithm with other algorithms shows. As Fig. 5 shows the performance of proposed algorithm is better. 7 International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) Vol. 3, No. 2, December 2012 Figure 5. compared performance of the proposed algorithm with other algorithms In Fig. 6, the impact of parameter (t) with 10 times performances in the proposed algorithm process is shown. According to Fig. 6, it is better for be optimized paths, reduce the amount of (t). With increase the amount of (t), the convergence rate has slowed down. Figure 6. The impact of parameter (t) Increasing the amount of (t) reduce the steep of descending grad. Because the possibility of production new parts increases and searching becomes more extensive. So, reducing the amount of (t) intensified the optimization process. 7. CONCLUSIONS In this paper, we have described a new technique for optimizing the DTSP. In problem solving of DTSP meta-innovative methods are used mainly. In this paper a combination method from analytical techniques, using descending grad and collective intelligence methods for this problem has been proposed. Algorithm Compound of ACO algorithm and descending grad algorithm causes when caught in a local minimum, with initialized pheromone as descending grad to algorithm we cause to escape from a local minimum. The results also show that answer of the proposed method is better than the quite meta-innovative methods. 8 International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT) Vol. 3, No. 2, December 2012 REFERENCES [1] H. N. Psaraftis,”Dynamic vehicle routing problems”. In: Golden, B.L., Assad, A.A. (eds.) Vehicle Routing: Methods and Studies, Elsevier, Amsterdam, pp. 223–248, 1988. [2] F.S. Gharehchopogh, I.Maleki, And M.Farahmandian, "New Approach for Solving Dynamic [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] Traveling Salesman Problem with Hybrid Genetic Algorithms and Ant Colony Optimization", International Journal of Computer Applications (IJCA), vol:53, No.1, pp. 39-44, September 2012. M.Guntsch and M.Middendorf. “Pheromone Modification Strategies for Ant Algorithms Applied to Dynamic TSP”. In Applications of Evolutionary Computing, Lecture Notes in Computer Science, Vol.2037, pp. 213-220, 2001. M. Guntsch, M. Middendorf and H. Schemck. “An Ant Colony Optimization Approach to Dynamic TSP”. Proceedings of the GECCO 2001. San Francisco, USA, 7-11 July, 2001, Morgan Kaufmann, pp.860-867, 2001. C. J. Eyckelhof, M. Snoek, “Ant systems for a dynamic TSP”. In: Proceedings of the 3rd international workshop on ant algorithms, pp. 88–99, 2002. Z.C.Huang, X.L.Hu, S.D.Chen, “Dynamic Traveling Salesman Problem based on Evolutionary Computation”, In Congress on Evolutionary Computation, IEEE Press, pp. 1283-1288, 2001. L. Kang, A. Zhou, B. McKay, Y. Li, Z. Kang, “Benchmarking Algorithms for Dynamic Travelling Salesman Problems”. In: Proceedings of the Congress on Evolutionary Computation, Portland, Oregon ,2004. M. Dorigo, V. Maniezzo, and A. Colorni, “The ant system: Optimization by a colony of cooperating agents”, IEEE Transactions on System, Man, and Cybernetics, Part B, Vol. 26, pp. 29-41, 1996. G. V. Deklaits, A. Ravindran, K.M. Rogesdell, “Engineering optimization Methods and Application”, a Wiley-Inter science Publication, 1983. A.V.Fiacco, G.P.McCormick, “Nonlinear programming: Sequential Unconstrained Minimization Techniques”, SIAM, Philadelphia, 1990. G.P.McCormick, “Nonlinear Programming- Theory, Algorithms and Applications”, Wiley, New York, 1983. E. Polak: “Computational Methods in Optimization”, Academic Press, New York, 1971. R.Battiti, “First and second order methods for learning: Between steepest descent and Newton's method,” Neural Computation, Vol. 4, No. 2, pp. 141-166, 1992. X. Wang. “Method of Steepest Descent and its Applications”, In IEEE Microwave and Wireless Components Letters, ISSN: 15311309, Vol. 12, pp. 24-26, 2008. Y. Kumar, D. Kumar, "Parametric Analysis of Nature Inspired Optimization Techniques", International Journal of Computer Applications (IJCA), Vol. 32, No.3, pp. 42-49, October 2011. F. S. Hillier, G. J. Lieberman: “Introduction to operations research”, McGraw-Hill, 2001. A. P. Engelbrecht: “Computational intelligence”, 2nd ed, Wiley, 2007. H. B. Curry, “The method of steepest descent for non-linear minimization problems”. Quart. Appl. Math., vol.2 ,pp.258-261.1944. E.K.P. Chong, S.H. Zak: “An Introduction to Optimization”, Wiley, New York, 1996. M. Dorigo, V. Maniezzo, and A. Colorni, “The ant system: Optimization by a colony of cooperating agents”, IEEE Transactions on System, Man, and Cybernetics, Part B, Vol. 26, pp. 29-41, 1996. M. Dorigo and L. M. Gambardella, “The colony system: A cooperative learning approach to the traveling salesman problem”, IEEE Transactions on Evolutionary Computation, Vol. 1, No.1, April, 1997. 9
9cs.NE
AN ANALYSIS OF GENE EXPRESSION DATA USING PENALIZED FUZZY C-MEANS APPROACH P.K. Nizar Banu1 H. Hannah Inbarani2 1 Department of Computer Applications, B. S. Abdur Rahman University, Chennai, Tamilnadu, India Email: [email protected] 2 Department of Computer Science, Periyar University, Salem, Tamilnadu, India Email: [email protected] ABSTRACT With the rapid advances of microarray technologies, large amounts of high-dimensional gene expression data are being generated, which poses significant computational challenges. A first step towards addressing this challenge is the use of clustering techniques, which is essential in the data mining process to reveal natural structures and identify interesting patterns in the underlying data. A robust gene expression clustering approach to minimize undesirable clustering is proposed. In this paper, Penalized Fuzzy C-Means (PFCM) Clustering algorithm is described and compared with the most representative off-line clustering techniques: K-Means Clustering, Rough K-Means Clustering and Fuzzy C-Means clustering. These techniques are implemented and tested for a Brain Tumor gene expression Dataset. Analysis of the performance of the proposed approach is presented through qualitative validation experiments. From experimental results, it can be observed that Penalized Fuzzy C-Means algorithm shows a much higher usability than the other projected clustering algorithms used in our comparison study. Significant and promising clustering results are presented using Brain Tumor Gene expression dataset. Thus patterns seen in genome-wide expression experiments can be interpreted as indications of the status of cellular processes. In these clustering results, we find that Penalized Fuzzy C-Means algorithm provides useful information as an aid to diagnosis in oncology. Keywords: Clustering, Microarray, Gene Expression, Brain Tumor, Fuzzy Clustering, FCM, PFCM produced. Searching for meaningful information patterns and dependencies among genes, in order to provide a basis for hypothesis testing, typically includes the initial step of a natural basis for organizing gene expression data to group genes together with similar patterns of expression. The field of gene expression data analysis has grown in the past few years from being purely datacentric to integrative, aiming at complementing microarray analysis with data and knowledge from diverse available sources. Advances in microarray technologies have made it possible to measure the expression profiles of thousands 1.INTRODUCTION Gene expression is the fundamental link between genotype and phenotype in a species, with microarray technologies facilitating the measurement of thousands of Gene expression values under tightly controlled conditions, e.g. (i) from a particular point in the cell cycle, (ii) after an interval response to some environmental change, (iii) from RNA, isolated from a tissue exhibiting certain phenotypic characteristics and so on (Kerr, et. al., 2008). A problem inherent in the use of microarray technologies is the huge amount of data 1 of genes in parallel under varying experimental conditions. Due to the large number of genes and complex gene regulation networks, clustering is a useful exploratory technique for analyzing these data. It divides data of interest into a small number of relatively homogeneous groups or clusters. Clustering is a popular data mining technique for various applications. One of the reasons for its popularity is the ability to work on datasets with minimum or on a priori knowledge. This makes clustering practical for real world applications. We can view the expression levels of different genes as attributes of the samples, or the samples as the attributes of different genes. Clustering can be performed on genes or samples (Michael et. al. 1998). This paper introduces the application of Penalized Fuzzy C-Means algorithm to cluster Brain Tumor genes. expression profiles are hierarchical clustering algorithms (Michael et. al. 1998), self-organizing maps (Paul, 1999) and K-Means clustering algorithms (Tavazoie, et. al., 1999). Hierarchical algorithms merge genes with the most similar expression profiles iteratively in a bottom-up manner. Self-organizing maps and K-means algorithms partition genes into userspecified k optimal clusters. Other full space clustering algorithms applied on gene expression data include Bayesian network (Friedman et. al. 2000) and neural network. A robust image segmentation method that combines the watershed segmentation and penalized fuzzy Hopfield neural network algorithms to minimize over-segmentation is described in (Kuo et. al. 2006). (Brehelin et. al., 2008) evaluates the stability of clusters derived from hierarchical clustering by taking repeated measurements. A wide variety of clustering algorithms are available for clustering gene expression data (Bezdek, 1981). They are mainly classified as Partitioning methods, hierarchical methods, Density based methods, Model based methods, Graph Theoretic methods, soft computing methods etc. This paper is organized as follows. In Section 2, Research background for clustering Gene Expression patterns is discussed. In Section 3, Methodology for preparing Gene Expression patterns is presented. Section 4 presents a method for extracting highly suppressed and expressed genes based on Penalized Fuzzy C-Means algorithm. The Experimental results are discussed in Section 5. Finally, section 6 concludes this paper by enumerating the merits of the proposed approaches. Multiple expression measurements are commonly recorded as a real-valued matrix, with row objects corresponding to gene expression measurements over a number of experiments and columns corresponding to the pattern of expression of all genes for a given microarray experiment. Each entry xij, is the measured expression of gene i in experiment j. Dimensionality of a gene refers to the number of expression values recorded for it. A gene/gene-profile x is a single data item (row) consisting of d measurements, x = (x1, x2, . . . , xd). An experiment/sample y is a single microarray experiment corresponding to a single column in the gene expression matrix, y = (x1, x2, …, xn)T where n is the number of 2. RESEARCH BACKGROUND 2.1. Clustering Clustering genes, groups similar genes into the same cluster based on a proximity measure. Genes in the same cluster have similar expression patterns. One of the characteristics of gene expression data is that it is meaningful to cluster both genes and samples. The most commonly applied full space clustering algorithms on gene 2 genes in the dataset. Clustering is considered an interesting approach for finding similarities in data and putting similar data into groups. Initial step in the analysis of gene expression data is the detection of groups of genes that exhibit similar expression patterns. In gene expression, elements are usually genes and the vector of each gene is its expression pattern. Patterns that are similar are allocated in the same cluster, while the patterns that differ significantly are put in different clusters. Gene expression data are usually of high dimensions and relatively small samples, which results in the main difficulty for the application of clustering algorithms. Clustering the microarray matrix can be achieved in two ways: (i) Genes can form a group which show similar expression across conditions, (ii) Samples can form a group which shows similar gene expression across all genes. This gives rise to global clustering, where a gene or sample is grouped across all dimensions. Additionally, the clustering can be complete or partial. A complete clustering assigns each gene to a cluster, whereas a partial clustering does not. Partial clustering tends to be more suited to gene expression, as the dataset often contains irrelevant genes or samples. Clearly this allows: (i) Noisy genes to be left out, with correspondingly less impact on the outcome and (ii) Genes belonging to no cluster omitting a large number of irrelevant contributions. Microarrays measure expression for the entire genome in one experiment, but genes may change expression, independent of the experimental condition. Forced inclusion in well-defined but inappropriate groups may impact the final structures found for the data. Partial clustering avoids the situation where an interesting sub-group in a cluster is hidden through forcing membership of unrelated genes (Kerr, et. al., 2008). 2.2. Categories of Gene Expression data clustering Methods of clustering can be categorized as Hard Clustering or Soft Clustering. Hard Clustering requires each gene to belong to a single cluster, whereas Soft Clustering permit genes to simultaneously be members of numerous clusters. Hard Clustering tells whether a gene belongs to a cluster or not. Whereas in Soft Clustering, with membership values, every gene belongs to each cluster with a membership weight between 0 (doesn’t belong) and 1 (belongs). Clustering algorithms which permit genes to belong to more than one cluster are more applicable to Gene expression. Gene expression data has certain special characteristics and is a challenging research problem A modern working definition of a gene is "a locatable region of genomic sequence, corresponding to a unit of inheritance, which is associated with regulatory regions, transcribed regions, and or other functional sequence regions". Currently, a typical microarray experiment contains 103 to 104 genes, and this number is expected to reach to the order of 106. However, the number of samples involved in a microarray experiment is generally less than 100. One of the characteristics of gene expression data is that it is meaningful to cluster both genes and samples. On one hand, co-expressed genes can be grouped into clusters based on their expression patterns (Ben-Dor, et. al., 1999&Michael et. al. 1998). In such gene-based clustering, the genes are treated as the objects, while the samples are the features. On the other hand, the samples can be partitioned into homogeneous groups. Each group may 3 correspond to some particular macroscopic phenotype, such as clinical syndromes or cancer types (Golub et. al., 1999). Such sample-based clustering considers the samples as the objects and the genes as the features. The distinction of gene-based clustering and sample-based clustering is based on different characteristics of clustering tasks for gene expression data. Some clustering algorithms, such as KMeans and hierarchical approaches, can be used both to group genes and to partition samples. Hard clustering algorithms like K-Means and k-medoid place a restriction that a data object can belong precisely to only one cluster during clustering process. This can be too restrictive while clustering high dimensional data like Gene Expression data because genes have a property of getting expressed in multiple conditions. Fuzzy set clustering like Fuzzy C-Means, Penalized Fuzzy C-Means allows data objects to belong to multiple clusters based on the degree of membership. to remember that when a gene expression profile is analyzed in a given sample, it is just a snapshot in time and space. 2.4 Clustering Techniques K-Means Algorithm The K-means method aims to minimize the sum of squared distances between all points and the cluster centre. This procedure includes the steps, as described by Tou and Gonzalez (Tou et. al. 1974). Rough Set Theory Rough set theory introduced by Pawlak (Pawlak, 1982) deals with uncertainty and vagueness. Rough set theory became popular among scientists around the world due to its fundamental importance in the field of artificial intelligence and cognitive sciences. Similar to fuzzy set theory it is not an alternative to classical set theory but it is embedded in it. Rough set theory can be viewed as a specific implementation of Frege’s idea of vagueness, i.e., imprecision in this approach is expressed by a boundary region of a set, and not by a partial membership, like in fuzzy set. 2.3. Analysis of Gene Expression data Gene expression data is usually represented by a matrix, with rows corresponding to genes, and columns corresponding to conditions, experiments or time points. The content of the matrix is the expression levels of each gene under each condition. Those levels may be absolute, relative or otherwise normalized. Each column contains the results obtained from a single array in a particular condition, and is called the profile of that condition. Each row vector is the expression pattern of a particular gene across all the conditions. Analyzing gene expression data is a process by which a gene's information is converted into the structures and functions of a cell. Thousands of different mRNAs are present in a given cell; together they make up the transcriptional profile. It is important Rough Clustering A rough cluster is defined in a similar manner to a rough set that is with lower and upper approximation. The lower approximation of a rough cluster contains genes that only belong to that cluster. The upper approximation of a rough cluster contains genes in the cluster which are also members of other clusters (SushmitaMitra, 2004 & SushmitaMitra, 2006). To use the theory of rough sets in clustering, the value set (Va) need to be ordered. This allows a measure of the distance between each object to be defined. Distance is a form of similarity, which is a relaxing of the strict 4 requirement of indiscernibility outlined in canonical rough sets theory, and allows the inclusion of genes that are similar rather than identical. Clusters of genes are then formed on the basis of their distance from each other. An important distinction between rough clustering and traditional clustering approaches is that, with rough clustering, an object can belong to more than one cluster. 3. METHODOLOGY Cluster analysis, is an important tool in gene expression data analysis. For experimentation, we used a set of gene expression data that contains a series of gene expression measurements of the transcript (mRNA) levels of brain tumor gene. In clustering gene expression data, the genes are treated as objects and the samples are treated as attributes. Gene pattern extraction consists of 4 steps. i) Data Preparation ii) Data Normalization iii) Clustering iv) Pattern analysis Fuzzy Clustering Cluster analysis is a method of grouping data with similar characteristics into larger units of analysis. First in (Zadeh, 1965) fuzzy set theory that gave rise to the concept of partial membership, based on a membership function, fuzziness was articulated and has received increasing attention. Fuzzy clustering which produces overlapping cluster partitions has been widely studied and applied in various areas. In fuzzy clustering, the Fuzzy C-Means (FCM) clustering algorithm is the best known and most powerful methods used in cluster analysis (Bezdek, 1981). In (Yu et. al., 2007), a general theoretical method to evaluate the performance of fuzzy clustering algorithm is proposed. The Fuzzy integrated model is accurate than rough integrated model and conventional integrated model (Banu et. al., 2011). Fuzzy clustering approach captures the uncertainty that prevails in gene expression and becomes more suitable for tumor prediction. One of the important parameters in the FCM is the weighting exponent m. When m is close to one, the FCM approaches the hard C-Means algorithm. When m approaches infinity, the only solution of the FCM will be the mass center of the data set. Therefore, the weighting exponent m plays an important role in the FCM algorithm. 3.1. Data Preparation We represent the gene expression ˆ {m |i 1,2,...,n , j 1,2,...,n}, data as ng by ns matrix: M i, j g s There are ns columns, one for each sample and ng rows, one for each gene. One row of genes is also called a gene vector, denoted  . Thus a gene as g i  m , m ,..., m vector contains the values of a particular attribute for all samples. i ,1 i,2 i ,n s 3.2. Data Normalization Data sometimes need to be transformed before being used. For example; attributes may be measured using different scales, such as centimeters and kilograms. In instances where the range of values differ widely from attribute to attribute, these differing attribute scales can dominate the results of the cluster analysis. It is therefore common to normalize the data so that all attributes are on the same scale. The following are two common approaches for data normalization of each gene vector: m i, j  m i, j  m i m i, j  5 , mi m i, j  m i i or , where mi   ns j 1 ns m i, j  m ns , i  j 1 The membership weighting system reduces noise effects, as a low membership grade is less important in centroid calculation. PFCM algorithm helps in identifying hidden pattern and providing enhanced understanding of the functional genomics in a better way.  mi  2 i, j ns  1 m i, j denotes the normalized value and for gene vector i of sample j, mi,j represents the original value for gene i of sample j, ns is the number of samples, m i is the mean of the values for gene vector i over all samples, and  i is the standard deviation of the ith gene vector. Fuzzy Clustering permit genes to belong to more than one cluster, is more applicable to Gene Expression. Noisy genes are unlikely to be members of several clusters and genes with similar change in expression for a set of samples are involved in several biological functions and groups should not be co-active under all conditions. This gives rise to high inconsistency in the gene groups and some overlap between them. The boundary of a cluster is usually fuzzy for three reasons: The Brain Tumor gene expression data is used for our experiments. This data set is publically available in Broad Institute web site. The various cluster validation techniques namely Root Mean Square Error (RMSE), Mean Absolute Error (MAE) and Xie-Beni (XB) validity index are used to validate the clusters obtained after applying the clustering algorithms. i. 4. PROPOSED PPROACH: PENALIZED FUZZY C-MEANS ii. Penalized Fuzzy C-Means (PFCM) algorithm for clustering gene expression data is introduced in this paper, which modified Fuzzy C-Means (FCM) algorithm to produce more meaningful fuzzy clusters. Genes are assigned a membership degree to a cluster indicating its percentage association with that cluster. The two algorithms differ in the weighting scheme used for the contribution of a gene to the mean of the cluster. FCM membership values for a gene are divided among clusters in proportion to similarity with that clusters mean. The contribution of each gene to the mean of a cluster is weighted, based on its membership grade. Membership values are adjusted iteratively until the variance of the system falls below a threshold. These calculations require the specification of a degree of fuzziness parameter which is problem specific (Dembele et. al., 2003). iii. The gene expression dataset might be noisy and incomplete The similarity measurement between genes is continuous and there is no clear cutoff value for group membership A gene might behave similarly to gene1 under a set of samples and behave similarly to another gene2 under another set of samples. Therefore, there is a great need for a fuzzy clustering method, which produces clusters in which genes can belong to a cluster partially and to multiple clusters at the same time with different membership degrees. The main objective of using this method is to minimize the objective function value so that the highly suppressed genes and highly expressed genes are clustered separately and also it helps to diagnose at an early stage of tumor formation. 6 Based on the numerical results PFCM is more accurate than FCM. The steps of the PFCM algorithm are given as follows: Step 1: Initialize the cluster centroids wj (2  j  c),v(v  0), fuzzification parameter, m (1  m   ), and the value   0. Gives a fuzzy C-partition  ( 0 ) and t=1. 4.1. Penalized Fuzzy C-Means Algorithm Another strategy for fuzzy clustering, called the penalized Fuzzy CMeans (PFCM) algorithm, with the addition of a penalty term was proposed by Yang (Yang, 1993 &Yang, 1994). Yang made the fuzzy extension of the Classification Maximum Likelihood (CML) procedure in conjunction with fuzzy C-partitions and called it a class of fuzzy CML procedures. The idea of penalization is also important in statistical learning. Combining the CML procedure and penalty idea, Yang (Yang, 1993) added a penalty term to the FCM objective function JFCM and then extended the FCM to the so-called Penalized FCM (PFCM) which produces more meaningful and effective results than the FCM algorithm. Thus, the PFCM objective function is defined as follows: Step 2: Calculate  (j t ) , w(jt ) with ( t 1) using Eqs. (1) and (2). Step 3: Calculate the membership matrix  ( t )  [ui , j ]with  (jt ) , w(jt ) using Eq. (3)  c n 1c n m 2 1 JPFCM ui, j || xi wj ||  vuim, j lnj 2 j1 i1 2 j1 i1 1 c n m  JFCM vui, j lnj 2 j1 i1 ( 5. EXPERIMENTAL RESULTS where  j is a proportional constant of class j and v (≥ 0) is a constant. The penalty term  1 v   u ln  is added to the c n j1 i1 m i, j 2 The effectiveness of the algorithms based on cluster validity measure is demonstrated in this section. j objective function, when v=0, JPFCM is equal to JFCM. αj, wj and ui,j are defined as n u im, j   j  c i 1 n , j  1, 2,..., c m ui, j  (1) j 1 i 1 wj  n 1 n  u   u  m i, j xi 5.1. Data Source A set of gene expression data that contains a series of gene expression measurements of the transcript (mRNA) levels of brain Tumor gene is used in this paper to analyze the efficiency of the proposed approach. The brain tumor dataset is taken from the Broad-Institute website (http://www.broadinstitute.org/cgibin/cancer/datasets.cgi). The dataset is titled as “Gene Expression-Based Classification and Outcome Prediction of Central Nervous (2) m i 1 i, j i 1 ui, j    Step 4: Compute   max |  (t 1)   ( t ) | . If    , and , t  t  1 go to Step 2; otherwise go to Step 5. ( Step 5: Find the results1for the final class centroids. )  c || x  w || 2 v ln  i j j    l 1 || x  w || 2 v ln  i l l    1 /( m 1) 1 /( m 1) 1  (3)    7 System Embryonal Tumors”. The Datasets Consists of three types of Brain Tumors data namely Medulloblastoma classic and desmoplastic, Multiple Brain tumors, Medulloblastoma treatment outcome. Each dataset contains nearly 7000 genes with 42 samples. In order to evaluate the proposed algorithm, we applied it to the Brain Tumor gene expression data taken from Broad Institute by taking 7129, 5000, 3000, and 1000 genes for all samples with various numbers of clusters. above mentioned validity measures and the effectiveness of the proposed algorithm is well understood. We tested our method for the Brain Tumour gene expression dataset to cluster the highly suppressed and highly expressed genes and are depicted for various dataset sizes. It is observed that for each set of genes taken, the value of validity measures for the proposed algorithm is lower than the value of validity measures for other algorithms and it is graphically illustrated from Figure 1 to Figure 12. Among these clustering algorithms Penalized Fuzzy C-Means produces better results in identification of differences between data sets. This helps to correlate the samples according to the level of gene expression. 5.2. Comparative Analysis A comparative study of the performance of K-Means (Tou et. al. 1974), Rough K-Means (Peters, 2006) and Fuzzy C-Means (Peters, 2006) is made with Penalized Fuzzy C-Means algorithm (Shen et. al, 2006). In terms of MAE, Penalized Fuzzy C-Means shows superior performance and K-Means and rough K-Means exhibits better performance than Fuzzy C-Means. Cluster Validation In this paper, Root Mean Square Error, Mean Absolute Error and Xie-Beni validity index are used to validate the clusters obtained after applying the clustering algorithms. To assess the quality of our method, we need an objective external criterion. In order to validate our clustering results, we employed Root Mean Square Error (RMSE), Mean Absolute Error (MAE) (Pablo de Castro et. al., 2007). Xie-Beni validity index has also been chosen as the cluster validity measure because it has been shown to be able to detect the correct number of clusters in several experiments (Pal et. al. 1995). Also, With respect to RMSE and Xie-Beni Index Penalized Fuzzy C-Means produces greater performance than the other algorithms. The comparative results based on Root Mean Square Error, Mean Absolute Error and Xie-Beni validity measure for all the Gene expression data clustering algorithms for various Brain Tumor data sets taken with different number of clusters are enumerated in Table 1. Figure 1 to Figure 3 shows the comparative analysis of various approaches for 7129 genes taking K as 7, 5 and 3 respectively. It can be observed from the figures, Penalized Fuzzy C-Means outperforms other approaches Fuzzy CMeans, Rough K-Means and K-Means. K Means, Rough K-Means, Fuzzy C-Means and Penalized Fuzzy C-Means clustering algorithm are applied and analysed for Brain Tumour genes. Table.1 shows the experimental results that are obtained by applying the 8 Data Set Size=7129 k=7 Value of Valididty Measures Value of Valididty Measures 1.2 1 0.8 0.6 0.4 0.2 0 FCMeans RKMeans KMeans MAE RMSE XB PFCMeans 1.2 1 0.8 0.6 0.4 0.2 0 Value of Valididty Measures Value of Valididty Measures FCMeans RKMeans KMeans XB PFCMeans 1.2 1 0.8 0.6 0.4 0.2 0 FCMeans 0.4 RKMeans Value of Valididty Measures Value of Valididty Measures 0.6 KMeans MAE RMSE XB PFCMeans FCMeans RKMeans KMeans RMSE XB PFCMeans Figure5: Validity Measure for Data set size = 5000, k=5 Data Set Size=7129 k=3 0.2 0 XB Validity Measures Figure 2: Validity Measure for Data set size =7129, k=5 0.8 RMSE Data Set Size=5000 k=5 MAE Validity Measures 1 KMeans Figure4: Validity Measure for Data set size =5000, k=7 Data Set Size=7129 k=5 RMSE RKMeans Validity Measures Figure 1: Validity Measure for Data set size = 7129, k=7 MAE FCMeans MAE Validity Measures 1.2 1 0.8 0.6 0.4 0.2 0 Data Set Size=5000 k=7 PFCMeans 1 0.8 Data Set Size=5000 k=3 0.6 0.4 FCMeans 0.2 KMeans RKMeans 0 MAE RMSE XB PFCMeans Validity Measures Validity Measures Figure 3: Validity Measure for Data set size = 7129, k=3 Figure6: Validity Measure for Data set size =5000, k=3 Figure 4 to Figure 6 shows the comparative analysis of various approaches for 5000 genes taking K as 7, 5 and 3 respectively. The experimental result shows that the Penalized Fuzzy C-Means outperforms other approaches Fuzzy CMeans, Rough K-Means and K-Means. Figure 7 to Figure 9 shows the comparative analysis of various approaches for 3000 genes taking K as 7, 5 and 3 respectively. The experimental result shows that the Penalized Fuzzy C-Means gives better results than the other algorithms. 9 Data Set Size=3000 k=7 3 Value of Valididty Measures Value of Valididty Measures 4 FCMeans 2 RKMeans 1 KMeans 0 MAE RMSE XB PFCMeans 3 2.5 2 1.5 1 0.5 0 Value of Valididty Measures Value of Valididty Measures FCMeans RKMeans 0.5 KMeans 0 MAE RMSE XB PFCMeans 4 3 PFCMeans Data Set Size=1000 k=5 FCMeans RKMeans 1 KMeans 0 MAE RMSE XB PFCMeans Validity Measures Figure8: Validity Measure for Data set size =3000, k=5 Figure 11: Validity Measure for Dataset Size =1000, k=5 Data Set Size=3000 k=3 Value of Valididty Measures Value of Valididty Measures XB 2 Validity Measures 1.2 1 0.8 0.6 0.4 0.2 0 KMeans Figure10: Validity Measure for Data set size =1000, k=7 Data Set Size=3000 k=5 1 RKMeans Validity Measures Figure 7: Validity Measure for Data set size = 3000, k=7 1.5 FCMeans MAE RMSE Validity Measures 2 Data Set Size=1000 k=7 FCMeans RKMeans KMeans PFCMeans Validity Measures 1.5 Data Set Size=1000 k=3 1 FCMeans RKMeans 0.5 KMeans 0 MAE RMSE XB PFCMeans Validity Measures Figure12: Validity Measure for Data set size =1000, k=3 Figure 9: Validity Measure for Data set size = 3000, k=3 Figure 10 to Figure 12 shows the comparative analysis of various approaches for 1000 genes taking K as 7, 5 and 3 respectively. The experimental result shows that the Penalized Fuzzy C-Means performs better than the other algorithms 10 Table 1: Performance Analysis of K-Means, Rough K-Means, Fuzzy C-Means and Penalized Fuzzy C-Means No. of No. of Clusters Genes 7 5 3 7 7129 5000 3000 1000 Root Mean Mean Square Absolute Error Error K-Means 0.0019 0.0044 0.2804 Rough K-Means 0.0511 0.0874 0.0020 Fuzzy C-Means 1.0438 0.8627 0.9548 Penalized Fuzzy C-Means 0.0043 0.0009 0.0001 K-Means 0.0034 0.0074 0.4798 Rough K-Means 0.0624 0.4654 0.0581 Fuzzy C-Means 1.0336 0.7504 0.0184 Penalized Fuzzy C-Means 0.0255 0.0015 0.0002 K-Means 0.0065 0.0150 0.1240 Rough K-Means 0.0336 0.0082 0.0203 Fuzzy C-Means 0.9925 0.6331 0.0624 Penalized Fuzzy C-Means 0.0079 0.0002 0.0001 K-Means 0.0225 0.0470 0.4994 Rough K-Means 0.1204 1.0548 0.1079 Fuzzy C-Means 1.8542 2.7108 0.1107 Penalized Fuzzy C-Means 0.0056 0.0015 0.0001 Clustering Algorithms Xie-Beni Index Table .2 Parameter setting and other issues Clustering Algorithm Cluster Membership Input Proximity Measure K-Means Binary Starting Prototype, Stopping Threshold, K Pair wise Distance Rough K-Means Rough Membership Starting Prototype, Stopping Threshold, K Pair wise Distance Fuzzy C-Means Fuzzy Membership Degree of fuzziness, Starting Prototypes, Stopping Threshold, K Pair wise Distance Penalized Fuzzy C-Means Improved Fuzzy Membership Fuzzification Parameter, K Pair wise Distance 11 Other Issues Very Sensitive to Input parameters and order of Input Imprecision in Gene Expression data can be captured Careful interpretations of membership values. Sensitive to Input parameters and order of Input Quality of membership is increased by introducing Penalty term Pattern Analysis The parameter setting and other issues of the clustering approaches which are discussed are given in Table.2. For each gene, red indicates a high level of expression (highly expressed Genes) relative to the mean; green indicates a low level of expression (highly suppressed Genes) relative to the mean. Transcriptional Initiation is the most important mode for control of gene expression level. Suppressed gene expression level may be stimulated by gene therapy (i.e.) promoter insertion or up regulation of suppressed gene and radiation therapy (i.e.) more amount of radiation may cause sudden mutation in gene, due to this sudden change the gene expression may be in high level. This helps to correlate the samples according to the level of gene expression. When precise functions for over or under expressed genes are determined, new avenues for intervention strategies may emerge. These studies are in their infancy; however, the improved technology employed here shows reasonable promise as our understanding of these deadly tumours increases. Therefore, future treatment decisions based on the expression profile of a primary tumour is a rational approach towards preventing the outgrowth of metastases. 6. CONCLUSION Cluster analysis applied to microarray measurements aims to highlight meaningful patterns for gene expression. The goal of gene clustering is to identify the important gene markers. Gene expression data are the representation of nonlinear interactions among genes and environmental factors. Brain Tumor is so deadly because, it is not usually diagnosed until it has reached an advance stage. Early detection can help prolong or save lives, but clinicians currently have no specific and sensitive method. Computing analysis of these data is expected to gain knowledge of gene functions and disease mechanisms. We used a set of gene expression data that contains a series of gene expression measurements of the transcript (mRNA) levels of Brain Tumor gene. Highly expressed genes and suppressed genes are identified and clustered using various clustering techniques. The following methods such as Post-Translational Modification, Small RNAs and Control of Transcript Levels, Translational Initiation, Transcript Stability, RNA Transport, Transcript Processing and Modification, Epigenetic Control and Transcriptional Initiation can be used to reduce the tumor level. The empirical results also reveal the importance of using Penalized Fuzzy CMeans (PFCM) clustering methods for clustering more meaningful highly suppressed and highly expressed genes from the gene expression data set. Meanwhile, evaluation metrics Root Mean Square Error, Figure 13: Clusters of Brain Tumor Genes Figure.13 represents the Clusters of tumor genes by Penalized Fuzzy C-Means using all genes exhibiting variation across the data set. 12 Mean Absolute Error and Xie-Beni Index is adopted to assess the quality of clusters, and the experimental results have shown that the proposed approach is capable of effectively discovering gene expression patterns and revealing the underlying relationships among genes as well. This clustering approach can be applied for any gene expression dataset and tumor growth can be predicted easily. [8] [9] REFERENCES [1] [2] [3] [4] [5] [6] [7] A. Ben-Dor, R. Shamir and Z.Yakhini, “Clustering gene expression patterns”, Journal of Computational Biology, Vol. 6, No. (3/4), pp. 281–297, 1999. J.C. Bezdek, “Fuzzy mathematics in pattern classification, Ph.D. Dissertation, Applied Mathematics”, Cornell University, Ithac, New York, 1973. J.C. Bezdek, “Pattern Recognition with Fuzzy Objective Function Algorithms”, Plenum Press, New York, 1981. P. A.D.de Castro, O. F. de França H. M. Ferreira and F. J. Von Zuben, “Applying Biclustering to Perform Collaborative Filtering”, In Proceedings of the Seventh International Conference on Intelligent Systems Design and Applications, pp. 421-426, 2007. D. Dembele and P. Kastner. “Fuzzy cmeans method for clustering microarray data”. Bioinformatics (Oxford, England), Vol. 19, No.8, pp.973-980, May 2003. J.C. Dunn, “A fuzzy relative of the ISODATA process and its use in detecting compact and well- separated clusters”, Journal of Cybernetics, Vol. 3, pp. 32-57, 1974. B. Eisen Michael, T. Spellman Paul, O. Brown Patrick and Botstein David. [10] [11] [12] [13] [14] 13 “Cluster analysis and display of genome-wide expression patterns”. Proc. Natl. Acad. Sci. USA, Vol. 95, No. 25, pp. 14863–14868, Dec. 1998. N. Friedman, M. Linial, I. Nachman, and D. Peter. “Using Bayesian network to analyze expression data”, Journal of Computational Biology, Vol. 7, pp. 601-620, Aug. 2000. T.R. Golub, D. K. Slonim, P. Tamayo, C. Huard, M. Gassenbeek, J.P. Mesirov, H. Coller, M. L. Loh, J.R. Downing, M. A. Caligiuri, D. D. Bloomfield, and E.S. Lander, “Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring”. Science, Vol. 286. No. 15, pp. 531–537, October 1999. Jian Yu and Miin-shen Yang, “A Generalized Fuzzy Clustering Regularization Model with optimality Tests and Model Complexity Analysis”, IEEE Transactions on Fuzzy Systems, Vol. 15, No. 5, pp. 904-915, 2007. G. Kerr, H. J. Ruskin, M. Crane, P. Doolan, “Techniques for Clustering Gene Expression data”, Computers in Biology and Medicine, Vol.36 No. 3, pp 283-293, March2008. Laurent Brehelin, Olivier Gascue and Olivier Martin, “Using repeated measurements to validate hierarchical gene clusters”, Bioinformatics, Vol. 24, No. 5, pp. 682-688, 2008. Miin-Shen Yang, Wen-Liang Hung and Chia-Hsuan Chang, “A penalized fuzzy clustering algorithm”, In. Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Spain, Dec. 2006. N.R. Pal and J.C. Bezdek, “On cluster validity for the fuzzy c-means model”, IEEE Trans. Fuzzy Systems, Vol. 3, pp. 370-379, 1995. [15] T. Paul, “Interpreting patterns of gene expression with self-organizing maps: Methods and application to hematopoietic differentiation”. In Proc. Natl. Acad. Sci. USA, Vol. 96, pp. 2907–2912, 1999. [16] P. K. Nizar Banu, H. Hannah Inbarani, “Analysis of Click Stream Patterns using Soft Biclustering Approaches”, International Journal of Information Technologies and Systems Approach (IJITSA), Vol. 4, No. 1, 2011. [17] Z. Pawlak, “Rough sets”, International Journal of Computer and Information Sciences, Vol.2, pp. 341–356, 1982. [18] G. Peters, “Some refinements of rough kmeans clustering”, Pattern Recognition, Vol. 39, pp. 1481–1491, 2006. [19] SushmitaMitra, “An evolutionary rough partitive clustering”, Pattern Recognition Letters Vol. 25, pp.1439– 1449, 2004. [20] SushmitaMitra, “Rough Fuzzy Colloborative Clustering”, IEEE transactions on Systems, Man and Cybernetics, Vol. 36, No. 4, August 2006. [21] S. Tavazoie, J. D. Hughes, M. J. Campbell, R. J. Cho, and G. M. Church. “Systematic determination of genetic network architecture”. In Nature Genetics, Vol. 22, pp. 281– 285, 1999. [22] J. T. Tou and R. C. Gonzalez, Pattern Recognition Principles, Massachusetts: Addision-Wesley, 1974. [23] Wen-Feng Kuo, Chi-Yuan Lin and Yung-Nien Sun, “Region Similarity Relationship between watershed and Penalzed Fuzzy Hopfield Neural Network Algorithms for Brain Image Segmentation”, International Journal of pattern Recognition and Artificial Intelligence, Vol. 22. No. 7, pp: 14031425, 2008. [24] M. S. Yang, “On a class of fuzzy classification maximum likelihood procedures”, Fuzzy Sets Syst. Vol. 57, No. 3, pp.365-375, 1993. [25] M. S. Yang and C. F. Su, “On parameter estimation for normal mixtures based on fuzzy clustering algorithms”, Fuzzy Sets Syst. Vol. 68, No. 1, pp. 13-28, 1994. [26] L.A. Zadeh, “Fuzzy sets”, Inform. Control, Vol.8, pp. 338-353, 1965. 14
5cs.CE
HOMOCLINICALLY EXPANSIVE ACTIONS AND A GARDEN OF EDEN THEOREM FOR HARMONIC MODELS arXiv:1803.03541v1 [math.DS] 8 Mar 2018 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI Abstract. Let Γ be a countable Abelian group and f ∈ Z[Γ], where Z[Γ] denotes the integral group ring of Γ. Consider the Pontryagin dual Xf of the cyclic Z[Γ]-module Z[Γ]/Z[Γ]f and suppose that f is weakly expansive (e.g., f is invertible in ℓ1 (Γ), or, when Γ is not virtually Z or Z2 , f is well-balanced) and that Xf is connected. We prove that if τ : Xf → Xf is a Γ-equivariant continuous map, then τ is surjective if and only if the restriction of τ to each Γ-homoclinicity class is injective. We also show that this −1 equivalence remains valid in the case when Γ = Zd and f ∈ Z[Γ] = Z[u1 , u−1 1 , . . . , ud , ud ] is an irreducible atoral polynomial such that its zero-set Z(f ) is contained in the image of the intersection of [0, 1]d and a finite union of hyperplanes in Rd under the quotient map Rd → Td (e.g., when d ≥ 2 such that Z(f ) is finite). These two results are analogues of the classical Garden of Eden theorem of Moore and Myhill for cellular automata with finite alphabet over Γ. Contents 1. Introduction 2. Background material and preliminaries 2.1. Group actions 2.2. Convolution 2.3. Pontryagin duality 2.4. Algebraic dynamical systems 2.5. Finitely presented algebraic dynamical systems 2.6. The homoclinic group 2.7. Connectedness of the phase space 3. Weak forms of expansivity for algebraic actions 3.1. p-expansive algebraic actions and p-homoclinic groups 3.2. Homoclinically expansive actions 3.3. Principal algebraic actions associated with weakly expansive polynomials 3.4. Expansive principal algebraic actions 3.5. Harmonic models 4. Topological rigidity 2 6 6 6 8 8 9 10 11 12 12 13 17 19 19 21 Date: March 12, 2018. 2010 Mathematics Subject Classification. 37D20, 37C29, 54H20, 37A45, 22D32, 22D45. Key words and phrases. Garden of Eden theorem, finitely presented algebraic action, principal algebraic action, harmonic model, homoclinic group, Pontryagin duality, topological rigidity, Moore property, Myhill property, expansive action, homoclinic expansive action, weakly expansive polynomial. 1 2 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI 4.1. Affine maps 4.2. Topological rigidity 5. Proof of Theorem 1.2 6. Atoral polynomials and proof of Theorem 1.5 7. Concluding remarks 7.1. Surjunctivity 7.2. Counterexamples for mixing algebraic dynamical systems 7.3. p-pre-injectivity and the p-Moore and p-Myhill properties References 21 21 23 23 25 25 26 26 27 1. Introduction Consider a dynamical system (X, α), consisting of a compact metrizable space X, called the phase space, equipped with a continuous action α of a countable group Γ. Let d be a metric on X that is compatible with the topology. Two points x, y ∈ X are said to be homoclinic if limγ→∞ d(γx, γy) = 0, i.e., for every ε > 0, there exists a finite set F ⊂ Γ such that d(γx, γy) < ε for all γ ∈ Γ \ F . Homoclinicity is an equivalence relation on X. By compactness of X, this relation does not depend on the choice of the compatible metric d. A map with source set X is called pre-injective (with respect to α) if its restriction to each homoclinicity class is injective. An endomorphism of the dynamical system (X, α) is a continuous map τ : X → X that is Γ-equivariant (i.e., τ (γx) = γτ (x) for all γ ∈ Γ and x ∈ X). The original Garden of Eden theorem is a statement in symbolic dynamics that characterizes surjective endomorphisms of shift systems with finite alphabet. To be more specific, let us fix a compact metrizable space A, called the alphabet. Given a countable group Γ, the shift over the group Γ with alphabet A is the dynamical system (AΓ , σ), where AΓ = {x : Γ → A} is equipped with the product topology and σ is the action defined by γx(γ ′ ) := x(γ −1 γ ′ ) for all x ∈ AΓ and γ, γ ′ ∈ Γ. The Garden of Eden theorem states that, under the hypotheses that the group Γ is amenable and the alphabet A is finite, an endomorphism of (AΓ , σ) is surjective if and only if it is pre-injective. It was first proved for Γ = Zd by Moore and Myhill in the early 1960s. Actually, the implication surjective =⇒ pre-injective was first proved by Moore in [27] while the converse implication was established shortly after by Myhill in [29]. The Garden of Eden theorem was subsequently extended to finitely generated groups of subexponential growth by Machı̀ and Mignosi [25] and finally to all countable amenable groups by Machı̀, Scarabotti, and the first author in [8]. Let us say that the dynamical system (X, α) has the Moore property if every surjective endomorphism of (X, α) is pre-injective and that it has the Myhill property if every preinjective endomorphism of (X, α) is surjective. We say that the dynamical system (X, α) has the Moore-Myhill property, or that it satisfies the Garden of Eden theorem, if it has both the Moore and the Myhill properties. GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 3 The goal of the present paper is to establish a version of the Garden of Eden theorem for principal algebraic dynamical systems associated with weakly expansive polynomials over countable Abelian groups and with connected phase space. By an algebraic dynamical system, we mean a dynamical system of the form (X, α), where X is a compact metrizable Abelian group and α is an action of a countable group Γ on X by continuous group automorphisms. Note that, in this case, the set ∆(X, α) = {x ∈ X : x is homoclinic to 0X } ⊂ X, where 0X is the identity element of X, is a subgroup of X, called the homoclinic group and two points x, y ∈ X are homoclinic if and only if x − y ∈ ∆(X, α), that is, they belong to the same coset of ∆(X, α) in X. By Pontryagin duality, algebraic dynamical systems with acting group Γ are in one-to-one correspondence with countable left Z[Γ]-modules. Here Z[Γ] denotes the integral group ring of Γ. This correspondence has been intensively studied in the last decades and revealed fascinating connections between commutative algebra, number theory, harmonic analysis, ergodic theory, and dynamical systems (see in particular the monograph [31] and the survey [20]). Let f ∈ Z[Γ] and consider the cyclic left Z[Γ]-module Mf := Z[Γ]/Z[Γ]f obtained by quotienting the ring Z[Γ] by the principal left ideal generated by f . The algebraic dynamical system associated by Pontryagin duality with Mf is denoted by (Xf , αf ) and is called the principal algebraic dynamical system associated with f . We denote by C0 (Γ) the real vector space of all functions g : Γ → R vanishing at infinity (i.e., for every ε > 0 there exists a finite subset Ω ⊂ Γ such that |gγ | ≤ ε for all γ ∈ Γ \ Ω). Moreover, for f ∈ Z[Γ] and g ∈ C0 (Γ) we denote by f g ∈ C0 (Γ) their convolution product (see Subsection 2.2). Definition 1.1. A polynomial f ∈ Z[Γ] is said to be weakly expansive provided: (we-1) ∀g ∈ C0 (Γ), f g = 0 ⇒ g = 0; (we-2) ∃ω ∈ C0 (Γ) such that f ω = 1Γ . Our first result is the following. Theorem 1.2 (Garden of Eden theorem for algebraic actions associated with weakly expansive polynomials). Let Γ be a countable Abelian group and f ∈ Z[Γ]. Suppose that f is weakly expansive and that Xf is connected. Then the dynamical system (Xf , αf ) has the Moore-Myhill property. There are two main ingredients in our proof of Theorem 1.2. The first one, Corollary 4.4, is a rigidity result (a generalization of [1, Corollary 1]) for algebraic dynamical systems associated with weakly expansive polynomials and with connected phase space. We use it to prove that, under the above conditions, every endomorphism of (Xf , αf ) is affine with linear part of the form x 7→ rx for some r ∈ Z[Γ]. The second one, Theorem 3.9, a generalization of [19, Lemma 4.5]), asserts that, if (Xf , αf ) is weakly expansive, then its homoclinic group ∆(Xf , αf ), equipped with the induced action of Γ, is dense in Xf and isomorphic, as a Z[Γ]-module, to Z[Γ]/Z[Γ]f ∗ , where f ∗ ∈ Z[Γ] is defined by (f ∗ )γ := fγ −1 for all γ ∈ Γ. Recall that a dynamical system (X, α) is called expansive if there exists a constant ε0 > 0 such that, for every pair of distinct points x, y ∈ X, there exists an element γ ∈ Γ such 4 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI that d(γx, γy) > ε0 . Such a constant ε0 is called an expansivity constant for (X, α, d). The fact that (X, α) is expansive or not does not depend on the choice of the metric d. For instance, the shift system (AΓ , σ) is expansive for every countable group Γ whenever the alphabet A is finite. Let f ∈ Z[Γ] and suppose that the associated principal algebraic dynamical system (Xf , αf ) is expansive. In Corollary 3.12 we show that f is weakly expansive, and from Theorem 1.2 we thus deduce the following: Corollary 1.3. Let Γ be a countable Abelian group and f ∈ Z[Γ]. Suppose that the principal algebraic dynamical system (Xf , αf ) associated with f is expansive and that Xf is connected. Then the dynamical system (Xf , αf ) has the Moore-Myhill property.  This result was obtained by the first two named authors in [7] and, shortly after, as a particular case of a much more general Garden of Eden theorem for expansive actions (where Γ is amenable and no connectedness of the phase space is assumed) proved by the third author in [18]. Recall that a polynomial f ∈ R[Γ] is said to be well-balanced (cf. [4, Definition 1.2]) if: P (wb-1) γ∈Γ fγ = 0, (wb-2) fγ ≤ 0 for all γ ∈ Γ \ {1Γ }, (wb-3) fγ = fγ −1 for all γ ∈ Γ (i.e., f is self-adjoint), (wb-4) and supp(f ) := {γ ∈ Γ : fγ 6= 0}, the support of f , generates Γ. If f ∈ Z[Γ] is well-balanced, the associated dynamical system (Xf , Γ) is called a harmonic P −1 −1 d model. For Γ = Zd and f = 2d − di=1 (ui + u−1 i ) ∈ Z[u1 , u1 , . . . , ud , ud ] = Z[Z ], the corresponding harmonic model shares interesting measure theoretic and entropic properties with other different models in mathematical physics, probability theory, and dynamical systems such as the Abelian sandpile model, spanning trees, and the dimer models [32, 4]. Since a well-balanced polynomial f ∈ Z[Γ], with Γ infinite countable not virtually Z or Z2 , is weakly expansive (cf. Proposition 3.14), from Theorem 1.2 we deduce: Corollary 1.4 (Garden of Eden theorem for harmonic models). Let Γ be an infinite countable Abelian group which is not virtually Z or Z2 (e.g. Γ = Zd , with d ≥ 3). Suppose that f ∈ Z[Γ] is well-balanced and that Xf is connected. Then the dynamical system (Xf , αf ) has the Moore-Myhill property.  Let (X, α) be an algebraic dynamical system and 1 ≤ p ≤ ∞. In [10] (see also Subsection 3.1), the notion of p-homoclinic group (denoted ∆p (X, α) ⊂ X) associated with (X, α), was introduced. We then say that a map τ : X → X is p-pre-injective if the restriction of τ to each coset of the p-homoclinic group ∆p (X, α) is injective. Note that ∆∞ (X, α) = ∆(X, α) so that ∞-pre-injectivity is the same thing as pre-injectivity. If Γ = Zd , then any polynomial f ∈ R[Γ] may be regarded, by duality, as a function b = Td . We denote by Z(f ) := {(t1 , t2 , . . . , td ) ∈ Td : f (t1 , t2 , . . . , td ) = 0} its zeroon Γ set. Recall that an irreducible polynomial f is atoral [22, Definition 2.1] if there is some g ∈ Z[Γ] such that g 6∈ Z[Γ]f and Z(f ) ⊂ Z(g). We are now in position to state the following: GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 5 Theorem 1.5 (A Garden of Eden theorem for irreducible atoral polynomials). Let f ∈ Z[Zd ] be an irreducible atoral polynomial such that Z(f ) is contained in the image of the intersection of [0, 1]d and a finite union of hyperplanes in Rd under the natural quotient map Rd → Td (e.g., when d ≥ 2 such that Z(f ) is finite). Let τ : Xf → Xf be a Γ-equivariant continuous map. Then the following conditions are equivalent: (a) τ is surjective, (b) τ is pre-injective, (c) τ is p-pre-injective for all 1 ≤ p ≤ ∞, (d) τ is 1-pre-injective. In particular, (Xf , αf ) satisfies the Moore-Myhill property. Our motivation for the present work originated from a sentence of Gromov [13, p. 195] suggesting that the Garden of Eden theorem could be extended to dynamical systems with a suitable hyperbolic flavor other than shifts and subshifts. A first step in that direction was made in [6], where the two first named authors proved that all Anosov diffeomorphisms on tori generate Z-actions with the Moore-Myhill property, and another one in [5], where sufficient conditions for expansive actions of countable amenable groups to have the Myhill property were presented. Finally, in [18] the third named author proved the very general Garden of Eden theorem for expansive actions of amenable groups we alluded to above. The paper is organized as follows. Section 2 introduces notation and collects background material on Pontryagin duality and algebraic dynamical systems. In particular, in Subsection 2.6 we present a characterization of the homoclinic group. In Section 3 we consider several weak forms of expansivity: first we recall from [10] the notions of p-expansivity (1 ≤ p ≤ ∞) and p-homoclinicity for general algebraic actions. Then we introduce and study the notion of homoclinically expansive action: when the algebraic dynamical system is finitely generated, homoclinic expansivity is a stronger condition than p-expansivity for 1 ≤ p < ∞ (Proposition 3.5), and a characterization is derived (Theorem 3.6). Then, we study principal algebraic actions associated with weakly expansive polynomials with an emphasis on the corresponding homoclinic group. In Subsection 3.4 we then show that polynomials yielding principal algebraic expansive actions are weakly expansive and, in Subsection 3.5, we prove that well-balanced polynomials, with not virtually Z or Z2 infinite countable group, are weakly expansive as well. In Section 4, we discuss topological rigidity of algebraic dynamical systems associated with weakly expansive polynomials. The proof of Theorem 1.2 is then given in Section 5. In the following section we discuss the notion of atorality for irreducible polynomials in Z[Zd ], we present a few examples, and give the proof of Theorem 1.5. In the last section, we collect some final remarks. In particular, we exhibit some examples showing that Theorem 1.2 becomes false if weak expansivity of f ∈ Z[Γ] is replaced by the weaker hypothesis that the homoclinic group ∆(Xf , αf ) is dense in Xf , or that the dynamical system (Xf , αf ) is mixing. We also introduce and discuss the notions of p-pre-injectivity, p-Moore, and p-Myhill properties for algebraic actions, and prove some variations on the Garden of Eden theorem in this framework. Acknowledgments. Hanfeng Li was partially supported by NSF and NSFC grants. 6 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI 2. Background material and preliminaries 2.1. Group actions. Let Γ be a countable group. We use multiplicative notation for the group operation in Γ and denote by 1Γ its identity element. An action of Γ on a set X is a map α : Γ × X → X such that α(1Γ, x) = x and α(γ1 , α(γ2, x)) = α(γ1 γ2 , x) for all γ1 , γ2 ∈ Γ and x ∈ X. In the sequel, to simplify, we shall write γx instead of α(γ, x), if there is no risk of confusion. If α is an action of Γ on a set X, we denote by Fix(X, α) the set of points of X that are fixed by α, i.e., the set of points x ∈ X such that γx = x for all γ ∈ Γ. If Γ acts on two sets X and Y , a map τ : X → Y is said to be Γ-equivariant if one has τ (γx) = γτ (x) for all γ ∈ Γ and x ∈ X. 2.2. Convolution. Let Γ be a countable group. We denote by ℓ∞ (Γ) the vector space consisting of all formal series X f= fγ γ, γ∈Γ with coefficients fγ ∈ R for all γ ∈ Γ and kf k∞ := sup |fγ | < ∞. γ∈Γ For 1 ≤ p < ∞ we denote by ℓp (Γ) the vector subspace of ℓ∞ (Γ) consisting of all f ∈ ℓ∞ (Γ) such that ! p1 X kf kp := |fγ |p < ∞. γ∈Γ 1 Note that ℓ (Γ) ⊂ ℓ (Γ) ⊂ ℓ (Γ) ⊂ ℓ (Γ) for all 1 < p < q < ∞. When f ∈ ℓ∞ (Γ) and g ∈ ℓ1 (Γ) (resp. f ∈ ℓ1 (Γ) and g ∈ ℓ∞ (Γ)) we define the convolution product f g ∈ ℓ∞ (Γ) by setting X X fγδ−1 gδ fγ1 gγ2 = (2.1) (f g)γ := p q ∞ γ1 ,γ2 ∈Γ: γ1 γ2 =γ δ∈Γ for all γ ∈ Γ. Note that kf gk∞ ≤ kf k∞ · kgk1 (resp. kf gk∞ ≤ kf k1 · kgk∞ ). We have the associativity rule (2.2) (f g)h = f (gh) for all f ∈ ℓ∞ (Γ), g, h ∈ ℓ1 (Γ) (resp. f, g ∈ ℓ1 (Γ), h ∈ ℓ∞ (Γ)). We denote by R[Γ] = {f ∈ ℓ∞ (Γ) : fγ = 0 for all but finitely many γ ∈ Γ} and by Z[Γ] = {f ∈ R[Γ] : fγ ∈ Z for all γ ∈ Γ} the real and, respectively, the integral group ring of Γ. Observe that the convolution product extends the group operation on Γ ⊂ Z[Γ] ⊂ R[Γ]. Note also that, as a Z-module, Z[Γ] is free with base Γ. ±1 If we take Γ = Zd , then Z[Γ] is the Laurent polynomial ring Rd := Z[u±1 1 , . . . , ud ] on d commuting indeterminates u1 , . . . , ud . GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 7 Recall that C0 (Γ) denotes the vector space consisting of all functions f : Γ → R vanishing at infinity: we express this condition by writing limγ→∞ f (γ) = 0. We then have the inclusions Γ ⊂ Z[Γ] ⊂ R[Γ] ⊂ ℓ1 (Γ) ⊂ ℓp (Γ) ⊂ C0 (Γ) ⊂ ℓ∞ (Γ), (2.3) for all 1 ≤ p < ∞. Moreover, there is a natural involution f 7→ f ∗ on ℓ∞ (Γ) defined by (f ∗ )γ := fγ −1 (2.4) for all f ∈ ℓ∞ (Γ) and γ ∈ Γ. Observe that every set in (2.3) is ∗-invariant and that (2.5) (f g)∗ = g ∗ f ∗ for all f ∈ ℓ∞ (Γ) and g ∈ ℓ1 (Γ) (resp. f ∈ ℓ1 (Γ) and g ∈ ℓ∞ (Γ)). The normed space (ℓ1 (Γ), k · k1 ) is a unital Banach *-algebra for the convolution product and the involution. The unity element of ℓ1 (Γ) is 1Γ . Lemma 2.1. Let f, h ∈ R[Γ] and g ∈ ℓ∞ (Γ). Then (f g)h = f (gh). Proof. By linearity we can reduce to the case when f = γ and h = δ with γ, δ ∈ Γ. For η ∈ Γ we have ((γg)δ)η = (γg)ηδ−1 = gγ −1 (ηδ−1 ) =∗ g(γ −1 η)δ−1 = (gδ)γ −1 η = (γ(gδ))η , where =∗ follows from the associative rule in Γ.  Let now k, n ∈ N and denote by Matn,k (Z[Γ]) := {(aij )1≤i≤n : aij ∈ Z[Γ]} the space 1≤j≤k of all n-by-k matrices with coefficients in the group ring Z[Γ]. We identify Z[Γ]k (resp. Z[Γ]n ) and Mat1,k (Z[Γ]) (resp. Mat1,n (Z[Γ])) so that if g = (g 1, g 2 , . . . , g n) ∈ Z[Γ]n and P A = (aij )1≤i≤n ∈ Matn,k (Z[Γ]), the element gA ∈ Z[Γ]k is defined by (gA)j := ni=1 g i aij ∈ 1≤j≤k Z[Γ], that is, (2.6) (gA)jγ = n X X i gγη aij η−1 i=1 η∈Γ for all j = 1, 2, . . . , k and γ ∈ Γ. Given A = (aij )1≤i≤n ∈ Matn,k (Z[Γ]), we define (2.7) A∗ = (aji )  ∗ 1≤j≤k 1≤i≤k 1≤j≤n ∈ Matk,n (Z[Γ]). Note that when k = n = 1 and A = f ∈ Z[Γ], then (2.7) reduces to (2.4). Also, we set kAk∞ = sup sup |aij γ| 1≤i≤n γ∈Γ 1≤j≤k and kAk1 = X 1≤i≤n 1≤j≤k kaij k1 = X X 1≤i≤n γ∈Γ 1≤j≤k |aij γ |. 8 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI 2.3. Pontryagin duality. Let us briefly review some basic facts and results regarding Pontryagin duality. For more details and complete proofs, the reader is refered to [28]. Let X be an LCA group, i.e., a locally compact, Hausdorff, Abelian topological group. A continuous group morphism from X into the circle T := R/Z is called a character of X. b of all characters of X, equipped with pointwise multiplication and the topology The set X of uniform convergence on compact sets, is also an LCA group, called the character group or Pontryagin dual of X. b × X → T, given by hχ, xi = χ(x) for all x ∈ X and χ ∈ X b The natural map h·, ·i : X bb is bilinear and non-degenerate. Moreover, the evaluation map ι : X → X, defined by bb ι(x)(χ) := hχ, xi, is a topological group isomorphism from X onto its bidual X. This bb canonical isomorphism is used to identify X with X. The space X is compact (resp. discrete, resp. metrizable, resp. σ-compact) if and only b is discrete (resp. compact, resp. σ-compact, resp. metrizable). In particular, X is if X b is discrete and countable. When X is compact, compact and metrizable if and only if X b is a torsion-free group (i.e., a group with no non-trivial X is connected if and only if X elements of finite order). If X is an LCA group and Y a closed subgroup of X, then X/Y is an LCA group whose Pontryagin dual is canonically isomorphic, as a topological group, to the closed subgroup b defined by Y ⊥ of X b : hχ, yi = 0 for all y ∈ Y }. Y ⊥ := {χ ∈ X Let X, Y be LCA groups and ϕ : X → Y a continuous group morphism. The map b defined by ϕ(χ) := χ ◦ ϕ for all χ ∈ Yb is a continuous group morphism, ϕ b : Yb → X, b bb = ϕ. If called the dual of ϕ. If we identify X and Y with their respective biduals, then ϕ ϕ is surjective, then ϕ b is injective. Conversely, if ϕ is injective, then ϕ b has dense image (and it may happen that ϕ b is not surjective; however, if ϕ is both injective and open, then ϕ b is surjective). As a consequence, if X and Y are either both compact or both discrete, then ϕ is injective (resp. surjective) if and only if ϕ b is surjective (resp. injective) [28, Proposition 30]. Let X be an LCA group and suppose that there is a countable group Γ acting continuously on X by group automorphisms. By linearity, this action induces a left Z[Γ]-module b by continuous group automorphisms, structure on X. There is a dual action of Γ on X defined by b γχ(x) := χ(γ −1 x) for all γ ∈ Γ, x ∈ X, and χ ∈ X. b Note that the canonical topoTherefore there is also a left Z[Γ]-module structure on X. bb logical group isomorphism ι : X → X is Γ-equivariant and hence a left Z[Γ]-module isomorphism. 2.4. Algebraic dynamical systems. An algebraic dynamical system is a pair (X, α), where X is a compact metrizable Abelian topological group and α is an action of a countable group Γ on X by continuous group automorphisms. GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 9 As an example, if A is a compact metrizable Abelian topological group (e.g. A = T) and Γ a countable group, then the system (AΓ , σ), where AΓ = {x : Γ → A} is equipped with the product topology, and σ is the shift action, defined by (σ(γ, x))(γ ′ ) := x(γ −1 γ ′ ) for all γ, γ ′ ∈ Γ and x ∈ AΓ , is an algebraic dynamical system. Let (X, α) be an algebraic dynamical system with acting group Γ. As X is compact b is a discrete countable Abelian group. We have and metrizable, its Pontryagin dual X b seen at the end of the previous subsection that there is a left Z[Γ]-module structure on X induced by the action of Γ on X. Conversely, if M is a countable left Z[Γ]-module and we c is a compact metrizable equip M with its discrete topology, then its Pontryagin dual M c by continuous group Abelian group and there is, by duality, an action αM of Γ on M c automorphisms, so that (M , αM ) is an algebraic dynamical system. In this way, algebraic dynamical systems with acting group Γ are in one-to-one correspondence with countable left Z[Γ]-modules. 2.5. Finitely presented algebraic dynamical systems. Let Γ be a countable group. One says that an algebraic dynamical system (X, α) with acting group Γ is finitely generated b equipped with the dual action α provided its Pontryagin dual X, b of Γ, is a finitely generated left Z[Γ]-module. Recall (cf. [16, Definition 4.25]) that for a unital ring R, a left R-module M is said to be finitely presented provided there exist k ∈ N and some finitely generated left R-submodule J ≤ Rk such that M = Rk /J. Let now k, n ∈ N and A ∈ Matn,k (Z[Γ]). Then Z[Γ]n A is a finitely generated left Z[Γ]-submodule of Z[Γ]k . We denote by MA := Z[Γ]k /Z[Γ]n A the corresponding finitely presented left Z[Γ]-module. d To simplify notation, let us write XA instead of M A and αA instead of αMA . The algebraic dynamical system (XA , αA ) is called the finitely presented algebraic dynamical system associated with A. For example, if k = n = 1 and A = f ∈ Z[Γ], then Mf = Z[Γ]/Z[Γ]f , where Z[Γ]f is the principal left ideal of Z[Γ] generated by f , and the algebraic dynamical system (Xf , αf ) is called the principal algebraic dynamical system associated with f . One can regard (XA , αA ) as a group subshift of ((Tk )Γ , σ), i.e., as a closed subgroup of (Tk )Γ that is invariant under the shift action σ of Γ on (Tk )Γ , in the following way. The Pontryagin dual of (Tk )Γ is Z[Γ]k with pairing h·, ·i : Z[Γ]k × (Tk )Γ → T given by hg, xi = k X X gηj xj (η) j=1 η∈Γ for all g = (g 1 , g 2, . . . , g k ) ∈ Z[Γ]k and x = (x1 , x2 , . . . , xk ) ∈ (TΓ )k = (Tk )Γ . 10 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI Therefore, writing A = (aij )1≤i≤n and Ai = (ai1 , ai2 , . . . , aik ) ∈ Z[Γ]k for i = 1, 2, . . . , n, 1≤j≤k we have k /Z[Γ]n A XA = Z[Γ]\ = (Z[Γ]n A)⊥ = {x ∈ (Tk )Γ : hg, xi = 0 for all g ∈ Z[Γ]n A} =∗ {x ∈ (Tk )Γ : hγAi , xi = 0 for all γ ∈ Γ and i = 1, 2, . . . , n} k Γ = {x ∈ (T ) : k X X aij η xj (γη) = 0 for all γ ∈ Γ and i = 1, 2, . . . , n} j=1 η∈Γ k Γ = {x ∈ (T ) : k X X xj (γη)(aij )∗η−1 = 0 for all γ ∈ Γ and i = 1, 2, . . . , n}, j=1 η∈Γ where =∗ follows by taking g := γ(0, . . . , 0, 1Γ, 0, . . . , 0)A = γAi ∈ Z[Γ]k . In other words, (2.8) XA = {x ∈ (Tk )Γ : xA∗ = 0(Tn )Γ }, with the action αA of Γ on XA ⊂ (Tk )Γ obtained by restricting to XA the shift action σ. In particular, if A = f ∈ Z[Γ], then (2.8) becomes (2.9) Xf = {x ∈ TΓ : xf ∗ = 0TΓ }. Consider the surjective map π : ℓ∞ (Γ)k → (Tk )Γ defined by π(g)(γ)i = gγi mod 1 for all g = (g 1, g 2 , . . . , g k ) ∈ ℓ∞ (Γ)k , γ ∈ Γ, and i = 1, 2, . . . , k. Denote by ℓ∞ (Γ, Z)k the set consisting of all g ∈ ℓ∞ (Γ)k such that gγi ∈ Z for all γ ∈ Γ and i = 1, 2, . . . , k. Proposition 2.2. Let Γ be a countable group. Let x ∈ (Tk )Γ and g ∈ ℓ∞ (Γ)k such that π(g) = x. With the above notation, the following conditions are equivalent: (a) x ∈ XA ; (b) gA∗ ∈ ℓ∞ (Γ, Z)n . Proof. This follows immediately from (2.8) and the equality π(gA∗ ) = π(g)A∗ = xA∗ .  2.6. The homoclinic group. Let (X, α) be an algebraic dynamical system with acting group Γ. The set of points in X that are homoclinic to 0X with respect to α is a Z[Γ]submodule ∆(X, α) ⊂ X, which is called the homoclinic group of (X, α) (cf. [19], [20]). Note that x ∈ ∆(X, α) if and only if limγ→∞ γx = 0X . We can choose a compatible metric d on X that is translation-invariant so that d(γx, γy) = d(γx − γy, 0X ) = d(γ(x − y), 0X ) for all x, y ∈ X and γ ∈ Γ. We deduce that x and y are homoclinic if and only if x − y ∈ ∆(X, α). Lemma 2.3. Let Γ be a countable group, k ∈ N, and let x ∈ (Tk )Γ . The following conditions are equivalent. GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 11 (a) x ∈ ∆((Tk )Γ , σ); (b) limγ→∞ x(γ) = 0Tk ; (c) there exists g ∈ C0 (Γ)k such that x = π(g). Proof. Suppose (a). Then limγ→∞ γ −1 x = 0(Tk )Γ . As x(γ) = γ −1 x(1Γ ), this implies lim x(γ) = lim γ −1 x(1Γ ) = 0Tk . γ→∞ γ→∞ This shows (a) =⇒ (b). Conversely, suppose (b). Let W be a neighborhood of 0(Tk )Γ in (Tk )Γ and let us show that there exists a finite subset Ω ⊂ Γ such that (2.10) γx ∈ W for all γ ∈ Γ \ Ω. By definition of the product topology, we can find a neighborhood V of 0Tk in Tk and a finite subset Ω1 ⊂ Γ such that W contains all y ∈ (Tk )Γ that satisfy y(ω1) ∈ V for all ω1 ∈ Ω1 . On the other hand, since limγ→∞ x(γ) = 0Tk , we can find a finite subset Ω2 ⊂ Γ such that (2.11) x(γ) ∈ V for all γ ∈ Γ \ Ω2 . Take Ω := Ω1 Ω−1 2 ⊂ Γ and suppose that γ ∈ Γ \ Ω. Then for every ω1 ∈ Ω1 , we have that γ −1 ω1 ∈ Γ \ Ω2 and hence γx(ω1 ) = x(γ −1 ω1 ) ∈ V by (2.11). This implies that γx ∈ W . Thus (2.10) is satisfied. This proves (b) =⇒ (a). The fact that (c) implies (b) is an immediate consequence of the continuity of the quotient map Rk → Rk /Zk = Tk . Conversely, if we assume (b), then the unique g ∈ ℓ∞ (Γ)k such that −1/2 ≤ gγj < 1/2 and xj (γ) = gγj mod 1 for all γ ∈ Γ and j = 1, 2, . . . , k, clearly satisfies (c).  2.7. Connectedness of the phase space. A non-zero element f ∈ Z[Γ] is called primitive if there is no integer n ≥ 2 that divides all coefficients of f . Every nonzero element f ∈ Z[Γ] can be uniquely written in the form f = mf0 with m a positive integer and f0 primitive. The integer m is called the content of f . For principal algebraic dynamical systems with elementary amenable acting group we have the following criterion for connectedness of the phase space. Recall (cf. for instance [9]) that the class of elementary amenable groups is the smallest class of groups containing all finite groups and all Abelian groups that is closed under the operations of taking subgroups, quotiens, extensions, and direct limits. Proposition 2.4. Let Γ be a countable torsion-free elementary amenable group (e.g. Γ = Zd ). Let f ∈ Z[Γ] with f 6= 0. Then the following conditions are equivalent: (a) Xf is connected; (b) f is primitive. 12 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI Proof. (a) ⇒ (b): Suppose that f is not primitive. Then f = mg for some integer m ≥ 2 and g ∈ Z[Γ]. By [15, Theorem 1.4] the ring Q[Γ] is a domain. If g = hf for some h ∈ Z[Γ], then m1 f = hf in Q[Γ], and hence h = m1 1Γ , which is a contradiction. Thus g + Z[Γ]f is a nonzero element of Z[Γ]/Z[Γ]f , while m(g + Z[Γ]f ) = 0. Therefore g + Z[Γ]f is a nonzero torsion element of Mf , and hence Xf is not connected. (b) ⇒ (a): Suppose that f is primitive and that Xf is not connected. Then Mf has torsion, so that there exists a ∈ Mf with finite order n ≥ 2. Replacing a by some integral multiple of a, we may assume that n is a prime number p. Write a = g + Z[Γ]f for some g ∈ Z[Γ]. Then pg = hf for some h ∈ Z[Γ]. Denote by ψ the natural ring morphism Z[Γ] → (Z/pZ)[Γ] obtained by reducing coefficients modulo p. Then ψ(h)ψ(f ) = 0. By [15, Theorem 1.4], the ring (Z/pZ)[Γ] is a domain. Since f is primitive, ψ(f ) 6= 0. Thus ψ(h) = 0, i.e. h = pw for some w ∈ Z[Γ]. Then pg = hf = pwf , and hence g = wf ∈ Z[Γ]. This means that a = 0, which is a contradiction.  3. Weak forms of expansivity for algebraic actions In this section we present and study weak forms of expansivity for algebraic actions. This applies in particular to the harmonic models introduced in [32] (see also [4]). 3.1. p-expansive algebraic actions and p-homoclinic groups. In this section we review the notions of p-expansive algebraic actions and of p-homoclinic groups introduced by Chung and the third named author in [10, Sections 4 and 5]. Let Γ be a countable group acting by automorphisms of a compact metrizable Abelian group X. Let also 1 ≤ p ≤ ∞. b define the function Ψ′ on Γ by setting For x ∈ X and χ ∈ X, x,χ (3.1) Ψ′x,χ (γ) = e2πihγx,χi − 1, for all γ ∈ Γ. One then says that the algebraic dynamical system (X, α) is p-expansive provided there b and ε > 0 such that 0X is the only point x ∈ X satisfying exists a finite subset W ⊂ X X (3.2) kΨ′x,χkp < ε. χ∈W The following collects the main properties of p-expansivity. Theorem 3.1 ([10, Proposition 4.3 and Theorem 4.11]). Let (X, Γ, α) be an algebraic dynamical system. Let 1 ≤ p ≤ ∞. Then the following hold: (1) If α is p-expansive, then it is q-expansive for all 1 ≤ q ≤ p. b is a finitely generated left Z[Γ]-module. (2) If α is p-expansive, then X b generating X b as a left Z[Γ](3) If α is p-expansive, then for any finite subset W ⊂ X module, there exists ε > 0 such that 0X is the only point x ∈ X satisfying (3.2). (4) α is ∞-expansive if and only if it is expansive. GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 13 (5) Let k, n ∈ N and A ∈ Matn,k (Z[Γ]). Then αA is p-expansive if an only if the R[Γ]morphism ℓp (Γ)k → ℓp (Γ)n sending g to gA∗ is injective. Moreover, if in addition, Γ is amenable, then the following conditions are equivalent: (a) the topological entropy of (XA , αA ) is finite; (b) αA is 1-expansive; (c) αA is 2-expansive; (d) the Z[Γ]-morphism Z[Γ]k → Z[Γ]n sending g to gA∗ is injective; (e) the R[Γ]-morphism R[Γ]k → R[Γ]n sending g to gA∗ is injective. We now recall the definitions of a p-homoclinic point and of the p-homoclinic group (cf. [10, Section 5]). Let Γ be a countable group acting by automorphisms of the compact metrizable Abelian group X and let 1 ≤ p < ∞. One says that a point x ∈ X is pb Let then ∆p (X, α) denote the set of homoclinic provided that Ψ′x,χ ∈ ℓp (Γ) for all χ ∈ X. all p-homoclinic points of X. This is called the p-homoclinic group (cf. Theorem 3.2.(2)) of the algebraic dynamical system (X, α). Also one sets ∆∞ (X, α) := ∆(X, α). Note that for p = 1, the set ∆1 (X, α) was studied in [32] and [21]. Here below we collect some basic properties of the p-homoclinic groups. Theorem 3.2 ([10, Proposition 5.2, Lemma 5.3, and Lemma 5.4]). Let Γ be a countable group acting by automorphisms of the compact metrizable Abelian group X and let 1 ≤ p ≤ ∞. Then the following hold: One has ∆p (X, α) ⊂ ∆q (X, α) for all p ≤ q ≤ ∞. ∆p (X, α) is a Γ-invariant subgroup of X. If α is p-expansive, then ∆p (X, α) is countable. If Z[Γ] is left Noetherian and α is p-expansive, then ∆p (X, α) is a finitely generated left Z[Γ]-module. (5) Assume that p < ∞ and let k, n ∈ N and A ∈ Matn,k (Z[Γ]). If αA is p-expansive, then ∆p (XA , αA ) is isomorphic to a Z[Γ]-submodule of Z[Γ]n /Z[Γ]k A∗ . If, in addition, the R[Γ]-morphism ℓp (Γ)k → ℓp (Γ)n sending g to gA∗ is invertible, then ∆p (XA , αA ) is isomorphic to Z[Γ]n /Z[Γ]k A∗ . (1) (2) (3) (4) 3.2. Homoclinically expansive actions. In this section we introduce and study a new form of weak expansivity for dynamical systems. Definition 3.3. Let (X, α) be a dynamical system with acting group Γ. One says that the action is homoclinically expansive if there exists a constant ε0 > 0 such that, for each pair of distinct homoclinic points x, y ∈ X, there exists an element γ ∈ Γ such that d(γx, γy) > ε0 , where d is any compatible metric on X. Such a constant ε0 is then called a homoclinic-expansivity constant for (X, α, d). Note that the fact that (X, α) is homoclinically expansive is in fact independent of the choice of the metric d by compactness of X. A pseudometric d˜ on X is said to be ˜ dynamically-generating if for all distinct x, y ∈ X there is γ ∈ Γ such that d(γx, γy) > 0 (cf. [14, Definition 9.35]). Now, given a dynamically-generating continuous pseudometric 14 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI d˜ on X, we can define a compatible metric d on X by setting ∞ X 1 ˜ d(γn x, γn y), d(x, y) = n 2 n=0 where γ0 = 1Γ , γ1 , . . . is an enumeration of the elements of Γ. Then ˜ ˜ sup d(γx, γy) ≤ sup d(γx, γy) ≤ 2 sup d(γx, γy) γ∈Γ γ∈Γ γ∈Γ for all x, y ∈ X. Thus in Definition 3.3 we may take d to be any dynamically-generating continuous pseudometric on X. In the following, we study homoclinic expansivity for algebraic actions. Let (X, α) be an algebraic dynamical system with acting group Γ. For any t ∈ R, we set |t + Z| := minm∈Z |t + m|. More generally, for k ∈ N and t = (t1 , t2 , . . . , tk ) ∈ Rk we set |t + Zk | := max |tj + Z|. (3.3) 1≤j≤k b define a function Ψx,χ on Γ by setting Given x ∈ X and χ ∈ X, (3.4) Ψx,χ (γ) = |hγx, χi|, for all γ ∈ Γ. As a comparison between (3.1) and (3.4), note that there is some constant C > 0 such that C|t| ≤ |e2πit − 1| ≤ C −1 |t| for all t ∈ [−1/2, 1/2]. It follows that, for all 1 ≤ p ≤ ∞, CkΨx,χ kp ≤ kΨ′x,χ kp ≤ C −1 kΨx,χ kp . It is easy to see that for any x ∈ X, one has that x ∈ ∆(X, α) if and only if Ψx,χ ∈ C0 (Γ) b for all χ ∈ X. Proposition 3.4. Let (X, α) be an algebraic dynamical system with acting group Γ. Then the following conditions are equivalent: (a) the action α is homoclinically expansive; b and ε > 0 such that 0X is the only point x in ∆(X, α) (b) there exist a finite subset W of X satisfying X (3.5) kΨx,χ k∞ < ε. χ∈W b such that h(χ) > 0 for every χ ∈ X. b Consider the Proof. Take a function h ∈ ℓ1 (X) compatible metric ρ on X defined by X X ρ(x, y) = h(χ)|hx, χi − hy, χi| = h(χ)|hx − y, χi|. b χ∈X b χ∈X GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 15 Assume that (b) holds with W and ε and let us set ε0 := ε minχ∈W h(χ)/|W |. Let (x, y) be a homoclinic pair of X with supγ∈Γ ρ(γx, γy) < ε0 . Note that X sup ρ(γx, γy) = sup h(χ)|hγx − γy, χi| γ∈Γ γ∈Γ = sup γ∈Γ b χ∈X X h(χ)Ψx−y,χ (γ) b χ∈X ≥ sup(min h(χ)) γ∈Γ χ∈W ≥ X Ψx−y,χ (γ) χ∈W minχ∈W h(χ) X kΨx−y,χ k∞ . |W | χ∈W P Thus χ∈W kΨx−y,χ k∞ < ε, and hence x = y. This shows that ε0 is a homoclinicexpansivity constant for (X, α), and (b)⇒(a) follows. Now assume that (a) holds and let ε0 > 0 be a homoclinic-expansivity constant for P b such that (X, α). Take a finite subset W of X h(χ) < ε0 /2 and set ε := b χ∈X\W P ε0 /(2 maxχ∈W h(χ)). Let x ∈ ∆(X, α) with χ∈W kΨx,χ k∞ < ε. Then X sup ρ(γx, γ0X ) = sup h(χ)Ψx,χ (γ) γ∈Γ γ∈Γ b χ∈X ≤ ε0 /2 + sup γ∈Γ X h(χ)Ψx,χ (γ) χ∈W ≤ ε0 /2 + (max h(χ)) χ∈W < ε0 , X kΨx,χ k∞ χ∈W and hence x = 0X . This shows that (a)⇒(b).  Proposition 3.5. Let (X, Γ, α) be an algebraic dynamical system. Suppose that α is homob is finitely generated (as a left Z[Γ]-module). Then the following clinically expansive and X hold: (1) α is p-expansive for all 1 ≤ p < ∞; b generating X b as a left Z[Γ]-module, there exists ε > 0 (2) for any finite subset W of X P such that 0X is the only point x in ∆(X, α) satisfying χ∈W kΨx,χ k∞ < ε. b and u, v ∈ Z[Γ] we have Proof. Note that for any x ∈ X, χ, χ′ ∈ X, (3.6) kΨx,uχ+vχ′ kq ≤ kuk1 kΨx,χ kq + kvk1 kΨx,χ′ kq for all 1 ≤ q ≤ ∞. (1). Since α is homoclinically expansive, by virtue of Proposition 3.4 we can find a finite b and ε > 0 satisfying (3.5). Enlarging W if necessary, we may assume that subset W of X b as a left Z[Γ]-module. Let 1 ≤ p < ∞. If x ∈ X and P W generates X χ∈W kΨx,χ kp < ε, 16 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI P then from (3.6) we know that x ∈ ∆p (X, α) ⊂ ∆(X, α), and using χ∈W kΨx,χ k∞ ≤ P kΨ k < ε, we conclude that x = 0 . Therefore α is p-expansive. x,χ p X χ∈W (2) follows from Proposition 3.4 and (3.6).  For finitely presented (e.g. principal) algebraic actions we have the following characterization of homoclinic expansivity (compare with Theorem 3.1.(5)). Theorem 3.6. Let Γ be a countable group. Let k, n ∈ N and A ∈ Matn,k (Z[Γ]). Then the following conditions are equivalent: (a) (XA , αA ) is homoclinically expansive; (b) the linear map C0 (Γ)k → C0 (Γ)n sending g to gA∗ is injective. Proof. For x ∈ XA consider the function Φx ∈ ℓ∞ (Γ) defined by Φx (γ) := |xγ | for all γ ∈ Γ, where | · | is as in (3.3). Assume that (b) fails. Then gA∗ = 0 for some nonzero g ∈ C0 (Γ)k . As a consequence, for all λ ∈ R one also has λgA∗ = 0 and hence π(λg) ∈ ∆(XA , αA ), by Proposition 2.2 cA denote the image of the canonical basis of Z[Γ]k under and Lemma 2.3. Let W ⊂ X c the quotient map Z[Γ]k → Z[Γ]k /Z[Γ]n A. Note that W then Pgenerates XA as a left Z[Γ]module. When λ → 0, one has kΦπ(λg) k∞ → 0, and hence χ∈W kΨπ(λg),χ k∞ → 0. Since g 6= 0, when |λ| is sufficiently small and nonzero, π(λg) 6= 0XA . From Proposition 3.5.(2), we deduce that (XA , αA ) is not homoclinically expansive. This shows (a)⇒(b). Now assume that (b) holds so that, in particular, A 6= 0. Let d be a translationinvariant compatible metric on XA . Then there is some ε0 > 0 such that for any x ∈ XA with d(x, 0XA ) ≤ ε0 , one has |x1Γ | < 1/(2kAk1 ). Let x, y ∈ XA be two homoclinic points with maxγ∈Γ d(γx, γy) ≤ ε0 . Then x − y ∈ ∆(XA , αA ), and for any γ ∈ Γ we have d(γ(x − y), 0XA ) ≤ ε0 , and hence |(x − y)γ −1 | = |(γ(x − y))1Γ | < 1/(2kAk1 ). Let g be the unique element of ℓ∞ (Γ)k satisfying kgk∞ ≤ 1/(2kAk1 ) and π(g) = x − y. Since x − y is in ∆(XA , αA ), we have g ∈ C0 (Γ)k . It follows that kgA∗k∞ ≤ kgk∞ kAk1 ≤ 1/2 and, by Proposition 2.2, gA∗ ∈ ℓ∞ (Γ, Z). Therefore, gA∗ = 0. By (b) we have g = 0, and hence x = y. This shows that ε0 is a homoclinic expansivity constant for (XA , αA ), and (b)⇒(a) follows as well.  Note that when n = k = 1 and A = f ∈ Z[Γ], condition (b) in Theorem 3.6 (and therefore homoclinic expansivity of αf ) is equivalent to (we-1) in Definition 1.1. Proposition 3.7. Let Γ be a countable group. Let k, n ∈ N and A ∈ Matn,k (Z[Γ]) and suppose that (XA , αA ) is homoclinically expansive. Then ∆(XA , αA ) is isomorphic to a left Z[Γ]-submodule of Z[Γ]n /Z[Γ]k A∗ . Proof. For each x ∈ ∆(XA , αA ), take x̃ ∈ C0 (Γ)k with π(x̃) = x (cf. Lemma 2.3). Then, by virtue of Proposition 2.2, x̃A∗ ∈ ℓ∞ (Γ, Z)n ∩ C0 (Γ)n = Z[Γ]n . If we choose another x̃′ ∈ C0 (Γ)k with π(x̃′ ) = x, then x̃−x̃′ ∈ ℓ∞ (Γ, Z)k ∩C0 (Γ)k = Z[Γ]k , and hence x̃A∗ −x̃′ A∗ ∈ Z[Γ]k A∗ . Thus the map ϕ : ∆(XA , αA ) → Z[Γ]n /Z[Γ]k A∗ sending x to x̃A∗ + Z[Γ]k A∗ is well defined. Clearly, ϕ is a left Z[Γ]-module morphism. Let x ∈ ker(ϕ). Then x̃A∗ = gA∗ , for some g ∈ Z[Γ]k . By virtue of Theorem 3.6, we have x̃ = g and hence x = 0XA . Thus ϕ is injective.  GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 17 Examples 3.8. Here below we describe some examples of principal algebraic actions and discuss their homoclinic expansivivity. (1) Suppose that γ ∈ Γ has infinite order and denote by Γ′ ∼ = Z the subgroup of Γ it generates. It follows from [23, Theorem 5.1] that for any nonzero f ∈ C[Γ′ ] and any nonzero g ∈ C0 (Γ′ ), one has f g 6= 0. Using the right-coset decomposition of Γ, it follows that for any nonzero f ∈ Z[Γ′ ] and any nonzero g ∈ C0 (Γ), one has f g 6= 0. This shows that the associated principal algebraic action αf is homoclinically expansive. Note that if f := 1Γ − γ ∈ Z[Γ′ ], then f is not invertible in ℓ1 (Γ) and hence, by [11, Theorem 3.2] (cf. Theorem 3.11 below), αf is not expansive. (cf. [10, Example 4.6].) (2) Let Γ = Zd and let f ∈ R[Γ]. Note that f may be regarded, by duality, as a function b = Td . We denote by Z(f ) ⊂ Td its zero set. It follows from [24, Theorem 2.2] on Γ that Z(f ) is contained in the image of the intersection of [0, 1]d and a finite union of hyperplanes in Rd under the natural quotient map P : Rd → Td if and only if f g 6= 0 for all nonzero g ∈ C0 (Γ). From Theorem 3.6 we thus deduce that the principal algebraic action associated with f ∈ Z[Γ] is homoclinically expansive if and only if Z(f ) is contained in the image of the intersection of [0, 1]d and a finite union of hyperplanes in Rd under P . This is the case, for instance, if Z(f ) is finite. (cf. [10, Example 4.9].) (3) Suppose that Γ contains two elements γ, γ ′ ∈ Γ that generate a non-Abelian free subsemigroup. Consider the polynomial f := ±3 · 1Γ − (1Γ + γ − γ 2 )γ ′ ∈ Z[Γ]. It follows from an argument similar to that in [19, Example 7.2] that the associated principal algebraic action is homoclinically expansive (though not expansive by [17, Example A.1] and [11, Theorem 3.2]). (cf. [10, Example 4.10].) (4) In [10, Example 4.7] it is shown that for Γ = Zd , d ≥ 2, the element h = 2d − 1 − Pd −1 −1 −1 2d d j=1 (uj + uj ) ∈ Z[u1 , u1 , · · · , ud , ud ] = Z[Z ] satisfies that, for any d−1 < p ≤ +∞, the corresponding principal algebraic action αh is not p-expansive. It follows from Proposition 3.5.(1) that αh is not homoclinically expansive either. 3.3. Principal algebraic actions associated with weakly expansive polynomials. Theorem 3.9. Let Γ be a countable group and suppose that f ∈ Z[Γ] is weakly expansive. Then the following hold: (1) The element ω ∈ C0 (Γ) satisfying (we-2) in Definition 1.1 is unique and, moreover, ωf = 1Γ . (2) ∆(Xf , αf ) is dense in Xf . (3) ∆(Xf , αf ) is isomorphic to Z[Γ]/Z[Γ]f ∗ as a left Z[Γ]-module. Proof. Let ω, ω ′ ∈ C0 (Γ) satisfying (we-2). Then f ω = 1Γ = f ω ′ yields f (ω − ω ′ ) = 0 and condition (we-1) in Definition 1.1 infers ω = ω ′. This proves uniqueness of ω. Moreover, from Lemma 2.1 and (we-2) we deduce f (ωf ) = (f ω)f = 1Γ f = f = f 1Γ . Thus, f (ωf − 1Γ ) = 0, and, again by (we-1), we get ωf = 1Γ . This shows (1). 18 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI In order to prove (2), let now a ∈ Z[Γ]/Z[Γ]f with ha, π(γω ∗ )i = 0 for all γ ∈ Γ (where π : ℓ∞ (Γ) → TΓ is as in Subsection 2.5). Write a = g + Z[Γ]f for some g ∈ Z[Γ]. Then 0 = ha, π(γω ∗ )i X = (γω ∗ )δ gδ + Z δ∈Γ = X (γω ∗ )δ (g ∗ )δ−1 + Z δ∈Γ = (γω ∗ g ∗ )1Γ + Z = (ω ∗ g ∗ )γ −1 + Z = (gω)γ + Z for all γ ∈ Γ. Thus h := gω lies in ℓ∞ (Γ, Z). Since ω ∈ C0 (Γ) and g ∈ Z[Γ], one has gω ∈ C0 (Γ). Therefore h ∈ ℓ∞ (Γ, Z) ∩ C0 (Γ) = Z[Γ]. Using Lemma 2.1 and (1) it follows that hf = (gω)f = g(ωf ) = g1Γ = g, and hence g = hf ∈ Z[Γ]f , which means that a = 0. By Lemma 2.3 we have {π(γω ∗ ) : γ ∈ Γ} ⊂ ∆(Xf , αf ) and by Pontryagin duality we conclude that ∆(Xf , αf ) is dense in Xf . We are only left to prove (3). In the proof of Proposition (3.7) (here we take n = k = 1 and A = f ) we have defined an injective left Z[Γ]-module morphism ϕ : ∆(Xf , αf ) → Z[Γ]/Z[Γ]f ∗ sending x to x̃f ∗ + Z[Γ]f ∗ . Let us show that ϕ is surjective. Let h ∈ Z[Γ]. Using (we-2) and Lemma 2.1 we deduce that ϕ(hπ(ω ∗ )) = ϕ(π(hω ∗)) = (hω ∗ )f ∗ + Z[Γ]f ∗ = h(ω ∗ f ∗ ) + Z[Γ]f ∗ = h(f ω)∗ + Z[Γ]f ∗ = h1Γ + Z[Γ]f ∗ = h + Z[Γ]f ∗ . This shows that ϕ is surjective. Therefore ϕ is indeed an isomorphism.  It follows from the proof of Theorem 3.9.(3) and the notation therein that the cyclic Z[Γ]-module ∆(Xf , αf ) is generated by the element x∆ := π(ω ∗) ∈ ∆(Xf , αf ), called the fundamental homoclinic point of (Xf , αf ) (cf. [19]). Let (X, α) be an algebraic dynamical system with an infinite acting group Γ and denote by µ the Haar probability measure on X. Let r ∈ N with r ≥ 2. One says that (X, α) is mixing of order r if, for all measurable subsets B1 , B2 , . . . , Br ⊂ X, one has (3.7) µ(γ1 B1 ∩ γ2 B2 ∩ · · · ∩ γr Br ) −→ µ(B1 )µ(B2 ) · · · µ(Br ) as γi−1 γj → ∞ in Γ for all 1 ≤ i < j ≤ r. If (X, α) is mixing of order r = 2, one simply says that (X, α) is mixing. Note that every mixing algebraic dynamical system is ergodic. If (X, α) is mixing of order r for all r ≥ 2, one then says that (X, α) is mixing of all orders. Observe that if A is a compact metrizable Abelian group and Γ is any infinite countable group, then the Γ-shift (AΓ , σ) is mixing of all orders since (3.7) is trivially satisfied when the Bi s are cylinders, for all r ≥ 2. GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 19 It follows from [4, Proposition 4.6] that an algebraic dynamical system (X, α) admitting a dense homoclinic group is mixing of all orders. From Theorem 3.9.(2) we then deduce the following: Corollary 3.10. Let Γ be an infinite countable group and suppose that f ∈ Z[Γ] is weakly expansive. Then the associated algebraic dynamical system (Xf , αf ) is mixing of all orders. 3.4. Expansive principal algebraic actions. The following result is due to Deninger and Schmidt [11, Theorem 3.2] (see also [20, Theorem 5.1]). Theorem 3.11. Let Γ be a countable group and f ∈ Z[Γ]. Then the following conditions are equivalent: (a) the dynamical system (Xf , αf ) is expansive; (b) f is invertible in ℓ1 (Γ). For other characterizations of expansivity for algebraic dynamical systems we refer to [30, 31] (for Γ = Zd , d ∈ N), [26] (for Γ Abelian), [12] (for (X, α) finitely presented), [2] (for X connected and finite-dimensional), and [10, Theorem 3.1]. i.e., there exists an element γ0 ∈ Γ such that |fγ0 | > PAs observed in [20], if f is lopsided, 1 γ6=γ0 |fγ |, then f is invertible in ℓ (Γ). On the other hand, there are f ∈ Z[Γ] invertible in 1 ℓ (Γ) that are not lopsided. For instance, if we take Γ = Z, then the polynomial u2 −u−1 ∈ Z[Γ] = Z[u, u−1] is not lopsided although it is invertible in ℓ1 (Γ) (the associated principal algebraic dynamical system is conjugate to the Z-system generated by Arnold’s cat map (x1 , x2 ) 7→ (x2 , x1 + x2 ) on the 2-dimensional torus T2 , see e.g. [31, Example 2.18.(2)]). The following result justifies our terminology for weakly expansive polynomials. Corollary 3.12. Let Γ be a countable group and f ∈ Z[Γ]. Suppose that the dynamical system (Xf , αf ) is expansive. Then f is weakly expansive. Proof. Expansivity of (Xf , αf ) implies, by Theorem 3.11, that f is invertible in ℓ1 (Γ). Then ω := f −1 ∈ ℓ1 (Γ) ⊂ C0 (Γ) yields (we-2) in Definition 1.1. Let now g ∈ C0 (Γ) and suppose that f g = 0. Then, recalling (2.2), we deduce that 0 = ω0 = ω(f g) = (ωf )g = 1Γ g = g, and (we-1) follows as well.  3.5. Harmonic models. Let f ∈ Z[Γ] be well-balanced. It follows from (2.9) that x ∈ TΓ belongs to Xf if and only if x satisfies the harmonicity equation (mod 1) X fη x(γη) = 0, η∈Γ for all γ ∈ Γ. This explains the terminology. Note that for Γ = Zd , the polynomial −1 f ∈ Z[Γ] = Z[u1 , u−1 1 , . . . , ud , ud ] given by f = 2d − d X i=1 (ui + u−1 i ) 20 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI is well-balanced and the corresponding harmonicity equation is the discrete analogue of the Laplace equation (cf. Eq. (4.5) in [32]). Lemma 3.13. Let Γ be a countable infinite group and f ∈ R[Γ]. Suppose that f is wellbalanced. Then the map g 7→ f g from C0 (Γ) to C0 (Γ) is injective. In particular, harmonic models are homoclinically expansive. Proof. Set (3.8) µ := 1Γ − 1 f ∈ R[Γ]. f1Γ Then µ is a probability measure on Γ which is symmetric and its support S := supp(µ) generates Γ as a semigroup, by (wb-1), (wb-3), and (wb-4), respectively. In order to show (we-1) we apply the maximum principle. Let g ∈ C0 (Γ) and suppose that f g = 0, equivalently, µg = g. Set M := maxδ∈Γ |gδ | and observe that A := {γ ∈ Γ : |gγ | = M} is non-empty. Moreover, if γ ∈ A one has, using the triangle inequality and the properties of µ we alluded to above, X X Mµδ = M, M = |gγ | = |(µg)γ | ≤ µδ−1 |gδγ | ≤ δ∈S δ∈S forcing |gδγ | = M for all δ ∈ S. This shows that SA ⊂ A. A recursive argument immediately shows that S n A ⊂ A for all n ∈ N. Since S generates Γ as a semigroup, we get that A = Γ. In other words, |g| is a constant function. As g ∈ C0 (Γ), we conclude that g = 0. The last statement follows immediately after Theorem 3.6.  In the arguments preceding Lemma 4.8 in [4] it is shown that if Γ is a countable infinite group which is not virtually Z or Z2 and f ∈ Z[Γ] is well-balanced, then (3.9) ∞ 1 X k ω := µ ∈ C0 (Γ), f1Γ k=0 where µ is as in (3.8), satisfies that f ω = 1Γ , so that (we-2) holds. Combining this with Lemma 3.13, we deduce: Proposition 3.14. Let Γ be a countable infinite group Γ that is not virtually Z or Z2 . Then every balanced polynomial f ∈ Z[Γ] is weakly expansive. Remark 3.15. It is a well known fact in the theory of Markov chains (cf. for instance [36, Definition 1.14]) that the sum in (3.9) expressing ω is (pointwise) convergent if and only if the random walk on Γ associated with µ is transient (i.e., given any finite subset Ω ⊂ Γ, there exists t(Ω) ∈ N such that, with probability one, the position x(t) ∈ Γ of the random walker on Γ at time t ≥ t(Ω) satisfies that x(t) ∈ Γ \ Ω) and it is a deep result of Varopoulos (cf. [33, 34] and [36, Theorem 3.24]) that this is the case exactly if Γ is not virtually Z or Z2 . GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 21 4. Topological rigidity 4.1. Affine maps. Let X and Y be two topological Abelian groups. A map τ : Y → X is called affine if there is a continuous group morphism λ : Y → X and an element t ∈ X such that τ (y) = λ(y) + t for all y ∈ Y . Note that λ and t are then uniquely determined by τ since they must satisfy t = λ(0Y ) and λ(y) = τ (y) − t for all y ∈ Y . One says that λ and t are respectively the linear part and the translational part of the affine map τ . The following two obvious criteria will be useful in the sequel. Proposition 4.1. Let (X, α) be an algebraic dynamical system and let τ : X → X be an affine map with linear part λ : X → X. Then the following conditions are equivalent: (a) τ is pre-injective; (b) λ is pre-injective; (c) Ker(λ) ∩ ∆(X, α) = {0X }. Proposition 4.2. Let (X, α) be an algebraic dynamical system and let τ : X → X be an affine map with linear part λ : X → X and translational part t ∈ X. Then the following conditions are equivalent: (a) τ is Γ-equivariant; (b) λ is Γ-equivariant and t ∈ Fix(X, α). 4.2. Topological rigidity. One says that the algebraic dynamical system (X, α) is topologically rigid if every endomorphism τ : X → X of (X, α) is affine. Before stating our rigidity results, let us introduce some notation. Let L(X) denote b → R equipped with the topology of the real vector space of all group homomorphisms X pointwise convergence. Note that Γ acts on L(X) by setting [γψ](χ) := ψ(γ −1 χ) for all b Moreover, the map E : L(X) → X defined by E(ψ)(χ) := ψ(χ) + Z ψ ∈ L(X) and χ ∈ X. b is a continuous (Γ-equivariant) group homomorphism. for all ψ ∈ L(X) and χ ∈ X Theorem 4.3. Let (X, α) and (Y, β) be algebraic dynamical systems with acting group Γ. Suppose that Y is connected and that the homoclinic group ∆(Y, β) is dense in Y . Also suppose that (X, α) is homoclinically expansive. Then every Γ-equivariant continuous map Y → X is affine. Proof. Let τ : Y → X be a Γ-equivariant continuous map. By Bhattacharya’s extension of van Kampen theorem [1, Theorem 1], there are a Γ-equivariant affine map λ : Y → X and a Γ-equivariant continuous map Φ : Y → L(X) such that Φ(0Y ) = 0 and τ = λ + E ◦ Φ. (Note that in the statement of [1, Theorem 1], X is assumed to be connected as well; however, in its proof, this condition is never used.) Thus it suffices to show that Φ = 0. b For any γ ∈ Γ we have Let y ∈ ∆(Y, β) and χ ∈ X. [Φ(γy)](χ) = [γΦ(y)](χ) = [Φ(y)](γ −1 χ). 22 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI When γ → ∞, we have Φ(γy) → Φ(0Y ) = 0, and hence [Φ(y)](γ −1 χ) → 0. For any t ∈ R, we have ΨE(tΦ(y)),χ (γ) = |hγE(tΦ(y)), χi| = |hE(tΦ(y)), γ −1χi| ≤ |[tΦ(y)](γ −1 χ)| = |t| · |[Φ(y)](γ −1χ)| for all γ ∈ Γ, and hence ΨE(tΦ(y)),χ ∈ C0 (Γ). Therefore E(tΨ(y)) ∈ ∆(X, α). Since α is b and ε > 0 homoclinically expansive, by Proposition 3.4 there exist a finite subset W of X such that 0X is the only point x in ∆(X, α) satisfying X kΨx,χ k∞ < ε. χ∈W Set C := P χ∈W supγ∈Γ |[Φ(y)](γ −1χ)| < ∞. Then X kΨE(tΦ(y)),χ k∞ ≤ |t|C. χ∈W Thus for all t ∈ R with |t| < ε/C we have E(tΦ(y)) = 0X , which means that tΦ(y) takes integer values. It follows that Φ(y) = 0. Since ∆(Y, β) is dense in Y and Φ is continuous, we conclude that Φ = 0 as desired.  Corollary 4.4. Let Γ be a countable group. Suppose that f ∈ Z[Γ] satisfies that (Xf , αf ) is homoclinically expansive and ∆(Xf , αf ) is dense in Xf (e.g., that f is weakly expansive), and the phase space Xf is connected. Then (Xf , αf ) is topologically rigid. If, in addition, Γ is Abelian, then for a map τ : Xf → Xf the following conditions are equivalent: (a) τ is an endomorphism of the dynamical system (Xf , αf ); (b) there exist r ∈ Z[Γ] and t ∈ Fix(Xf , αf ) such that τ (x) = rx + t for all x ∈ Xf . Proof. The first statement follows immediately from Theorem 4.3 after taking X = Y = Xf (if f is weakly expansive, recall Theorem 3.6 and Theorem 3.9.(2)). Suppose now that Γ is Abelian and let τ : Xf → Xf be a map. For each r ∈ Z[Γ], the self-mapping of Xf given by x 7→ rx is Γ-equivariant since Z[Γ] is commutative. Therefore, the fact that (b) implies (a) follows from Proposition 4.2. To prove the converse, suppose that τ is an endomorphism of the dynamical system (Xf , αf ). It follows from the first statement that τ is affine. Therefore, by using Proposition 4.2, there exist a continuous Z[Γ]-module morphism λ : Xf → Xf and t ∈ Fix(Xf , αf ) cf = such that τ (x) = λ(x) + t for all x ∈ Xf . As the ring Z[Γ] is commutative and X cf . Z[Γ]/Z[Γ]f is a cyclic Z[Γ]-module, there is s ∈ Z[Γ] such that b λ(χ) = sχ for all χ ∈ X b b setting r := s∗ ∈ Z[Γ] it follows that λ(x) = s∗ x = rx, and hence τ (x) = rx+t, Since λ = λ, for all x ∈ Xf .  GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 23 5. Proof of Theorem 1.2 Proof of Theorem 1.2. Let Γ be a countable Abelian group and let f ∈ Z[Γ] be a weakly expansive polynomial such that Xf is connected. Also let τ be an endomorphism of (Xf , αf ), i.e., a Γ-equivariant continuous map τ : Xf → Xf . We want to show that τ is surjective if and only if it is pre-injective. By Corollary 4.4, there exists r ∈ Z[Γ] such that τ is affine with linear part λ : Xf → Xf given by λ(x) = rx for all x ∈ Xf . Clearly τ is surjective if and only if λ is. As Xf is compact, we know that surjectivity of λ is equivalent to injectivity of its Pontryagin dual b: X b cf → X cf . Now we observe that λ(χ) cf . λ = r ∗ χ for all χ ∈ X cf = Z[Γ]/Z[Γ]f → Z[Γ]/Z[Γ]f ∗ defined by As Γ is Abelian, the natural mapping Φ : X Φ(g + Z[Γ]f ) = g ∗ + Z[Γ]f ∗ for all g ∈ Z[Γ] is a group isomorphism. Note that Φ(g1 (g2 + Z[Γ]f )) = Φ(g1 g2 + Z[Γ]f ) = (g1 g2 )∗ + Z[Γ]f ∗ = g1∗ g2∗ + Z[Γ]f ∗ = g1∗ Φ(g2 + Z[Γ]f ) cf → ∆(Xf , αf ) the composition for all g1 , g2 ∈ Z[Γ]. As a consequence, denoting by κ : X ∗ of Φ with the Z[Γ]-module isomorphism Z[Γ]/Z[Γ]f → ∆(Xf , αf ) in Theorem 3.9.(3), we have the commuting diagram cf X   κy χ7→r ∗ χ −−−−→ x7→rx cf X  κ y ∆(Xf , αf ) −−−→ ∆(Xf , αf ). b is equivalent to injectivity of the group endomorphism We deduce that injectivity of λ µ of ∆(Xf , αf ) defined by µ(x) := rx for all x ∈ ∆(Xf , αf ). As µ is the restriction of λ to ∆(Xf , αf ), we conclude that surjectivity of τ is equivalent to pre-injectivity of τ , by using Proposition 4.1.  From the proof of Theorem 1.2 and Proposition 3.7 we immediately deduce the following: Corollary 5.1. Let Γ be a countable Abelian group and let f ∈ Z[Γ]. Suppose that (Xf , αf ) is homoclinically expansive, ∆(Xf , αf ) is dense in Xf , and that Xf is connected. Then (Xf , αf ) has the Moore property. 6. Atoral polynomials and proof of Theorem 1.5 Lind, Schmidt, and Verbistkiy [22, Theorem 3.2] gave the following geometric-dynamical characterization of atorality for irreducible polynomials in Z[Zd ]. Theorem 6.1. Let Γ = Zd and suppose that f ∈ Z[Γ] is irreducible. Then the following conditions are equivalent: (a) ∆1 (Xf , αf ) 6= {0Xf }; (b) ∆1 (Xf , αf ) is dense in Xf ; 24 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI (c) f is atoral in the sense that there is some g ∈ Z[Γ] such that g 6∈ Z[Γ]f and Z(f ) ⊂ Z(g); (d) dim Z(f ) ≤ d − 2. The meaning of dim(·) in Theorem 6.1.(d) is explained in [22, page 1063]; in particular, one has dim(∅) := −∞. Also remark that, if d = 1, an irreducible polynomial f ∈ Z[Z] = Z[u1 , u−1 1 ] is atoral if and only if Z(f ) = ∅ and this, in turn, is equivalent to (Xf , αf ) being expansive (cf. [19, Lemmma 2.1.(1)]). Examples 6.2. Here below, we present some examples of irreducible atoral polynomials f ∈ Z[Zd ], mainly from [21, Section 3] and [22, Section 4]. We can then apply Theorem 1.5 and deduce that the corresponding algebraic dynamical systems (Xf , αf ) satisfy the Garden of Eden theorem. (1) Let d = 1 and f (u) = u2 − u − 1 ∈ Z[u, u−1] = Z[Z]. Then f is irreducible and, since Z(f ) = ∅, atoral. The associated principal algebraic dynamical system , αf )  (Xf  0 1 is conjugated to the hyperbolic dynamical system (T2 , ϕA ), where A = ∈ 1 1 GL(2, Z) is Arnold’s cat and ϕA : T2 → T2 is the associated hyperbolic automorphism of the two-dimensional torus. Note that (Xf , αf ) is expansive so that we can deduce the Moore-Myhill property also from Corollary 1.3 (this is a particular case of the Garden of Eden theorem for Anosov diffeomorphisms on tori [5], we alluded to in the Introduction). −1 2 (2) Let d = 2 and f (u1, u2 ) = 2 − u1 − u2 ∈ Z[u1 , u−1 1 , u2 , u2 ] = Z[Z ]. Then Z(f ) = {(1, 1)}, and so f is atoral. Thus, by Example 3.8.(2), (Xf , αf ) is homoclinically expansive. Also, it follows from [21, §5] and [22, Example 4.3]) that there is some ω in C0 (Z2 ) with f ω = ωf = 1Γ . As a consequence, f is weakly expansive (though not wellbalanced). Moreover, f is also primitive, so that, by Proposition 2.4, Xf is connected. Applying Theorem 1.2, we obtain an alternative proof of the fact that (Xf , αf ) has the Moore-Myhill property. −1 (3) Let d = 2, and consider the harmonic model f (u1, u2 ) = 4 − u1 − u−1 1 − u2 − u2 ∈ −1 −1 Z[u1 , u1 , u2 , u2 ] = Z[Z2 ]. One has Z(f ) = {(1, 1)}. Thus f is atoral and (Xf , αf ) satisfies the Garden of Eden theorem, by virtue of Theorem 1.5. (Note that we cannot apply Theorem 1.2.) −1 2 (4) Let d = 2, and f (u1 , u2) = 1 + u1 + u2 ∈ Z[u1 , u−1 1 , u2 , u2 ] = Z[Z ]. Then Z(f ) = {(ω, ω 2), (ω 2, ω)}, where ω = exp(2πi/3). The algebraic dynamical system (Xf , αf ) is called the connected Ledrappier shift. −1 2 (5) Let d = 2, and f (u1, u2 ) = 2 − u21 + u2 − u1u2 ∈ Z[u1 , u−1 1 , u2 , u2 ] = Z[Z ]. One has Z(f ) = {(ξ, η), (ξ, η)}, where ξ, η are algebraic numbers. −1 2 (6) Let d = 2, and f (u1 , u2) = 2 − u31 + u2 − u1 u2 − u21 u2 ∈ Z[u1 , u−1 1 , u2 , u2 ] = Z[Z ]. Here Z(f ) = {(1, 1), (i, ζ), (−i, ζ), (ξ, η), (ξ, η)}, where ζ, ξ, η are algebraic numbers. −1 −1 3 (7) Let d = 3 and f (u1 , u2, u3 ) = 1 + u1 + u2 + u3 ∈ Z[u1 , u−1 1 , u2 , u2 , u3 , u3 ] = Z[Z ]. The corresponding zero-set Z(f ) is the union of three circles, namely, {(−1, s, −s) : s ∈ T}, {(s, −1, −s) : s ∈ T}, and {(s, −s, −1) : s ∈ T}. Hence, f is atoral. GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 25 −1 −1 (8) Let d = 3 and f (u1, u2 , u3 ) = 3 + 3u1 − 3u31 + u41 − u2 − u3 ∈ Z[u1 , u−1 1 , u2 , u2 , u3 , u3 ] = Z[Z3 ]. One has has Z(f ) = {(η, η, η), (η, η, η)}, where η is an algebraic integer. We are now in position to prove Theorem 1.5. Proof of Theorem 1.5. We first note that, by Example 3.8.(2), αf is homoclinically expansive. Moreover, by Theorem 6.1, ∆1 (Xf , αf ) and therefore ∆(Xf , αf ) are dense in Xf . Finally, since f is irreducible it is primitive and hence (cf. Proposition 2.4) Xf is connected. Thus we may apply Corollary 4.4 and deduce that (Xf , αf ) is topologically rigid. (a)⇒(b) is given by Corollary 5.1. (b)⇒(c) follows from ∆p (Xf , αf ) ⊂ ∆(Xf , αf ) for all 1 ≤ p ≤ ∞ (cf. Theorem 3.2.(1)). (c)⇒(d) this is trivial. (d)⇒(a). Let τ : Xf → Xf be a Γ-equivariant 1-pre-injective continuous map. By topological rigidity, there exists r ∈ Z[Γ] and t ∈ Xf such that the group endomorphism λ of Xf defined by setting λ(x) := rx for all x ∈ Xf satisfies that τ (x) = λ(x) + t for all b: X b cf → X cf is given by λ(χ) cf . Set x ∈ Xf . Then the dual map λ = r ∗ χ for all χ ∈ X mf = Z[Γ] ∩ (f ℓ1 (Γ)), which is an ideal of Z[Γ]. For each g ∈ mf , one has g = f vg for a unique vg ∈ ℓ1 (Γ). Then x(g) := π(vg∗ ) lies in ∆1 (Xf , αf ), where π is, as usual, the projection map ℓ∞ (Γ) → TΓ . The map g + Z[Γ]f 7→ x(g) is clearly a group isomorphism from mf /Z[Γ]f onto ∆1 (Xf , αf ) (cf. [22, Corollary 3.3]). Take g ∈ mf \ Z[Γ]f . cf to Since f is irreducible, the group homomorphism h + Z[Γ]f 7→ hg + Z[Γ]f from X cf → ∆1 (Xf , αf ) defined by mf /Z[Γ]f is injective. Thus the group homomorphism κ : X (hg) κ(h + Z[Γ]f ) := x is injective. We have the commutative diagram: cf X   κy χ7→r ∗ χ −−−−→ x7→rx cf X   yκ ∆1 (Xf , αf ) −−−→ ∆1 (Xf , αf ). Since τ is 1-pre-injective, so is λ, that is, λ is injective on ∆1 (Xf , αf ). Hence the dual b is injective. By Pontryaging duality, this is equivalent to λ being surjective. It map λ follows that τ is surjective as well.  7. Concluding remarks 7.1. Surjunctivity. A dynamical system (X, α) is called surjunctive if every injective endomorphism of (X, α) is surjective (and hence a homeomorphism). As injectivity implies pre-injectivity, we deduce from Theorem 1.2 that if Γ is a countable Abelian group, f ∈ Z[Γ] is weakly expansive and Xf is connected, then the dynamical system (Xf , αf ) is surjunctive. Actually, in the case Γ = Zd , this last result is a particular case of Theorem 1.5 in [3] c, αM ) is which asserts that if Γ = Zd and M is a finitely generated Z[Γ]-module, then (M surjunctive. 26 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI 7.2. Counterexamples for mixing algebraic dynamical systems. Recall (cf. Corollary 3.10) that if Γ is infinite and f ∈ Z[Γ] is weakly expansive, then the associated algebraic dynamical system (Xf , αf ) is mixing of all orders. The examples below show that Theorem 1.2 becomes false if the hypothesis that f ∈ Z[Γ] is weakly expansive is replaced by the weaker hypotheses that the homoclinic group ∆(Xf , αf ) is dense and that (Xf , αf ) is mixing. Example 7.1. Let T = R/Z, Γ = Zd , d ≥ 1, and consider the Γ-shift (TΓ , σ) (this is (Xf , αf ) for f = 0 ∈ Z[Γ]). Then the endomorphism τ of (TΓ , σ) defined by τ (x)(γ) = 2x(γ) for all x ∈ TΓ and γ ∈ Γ, is clearly surjective. However, τ is not pre-injective since the configuration y ∈ TΓ , defined by y(γ) = 1/2 mod 1 if γ = 1Γ and 0 otherwise, is a non-trivial element in the homoclinic group of (TΓ , σ) and satisfies τ (y) = τ (0TΓ ) = 0TΓ . It follows that (TΓ , σ) does not have the Moore property. Example 7.2. Let Γ = Z and consider the polynomial f = 1 − 2u1 + u21 − 2u31 + u41 ∈ Z[u1 , u−1 1 ] = Z[Γ]. The associated algebraic dynamical system (Xf , αf ) is conjugate to the system (T4 , β), where β is the action of Z on T4 generated by the companion matrix of f . It is mixing since f is not divisible by a cyclotomic polynomial (cf. [31, Theorem 6.5.(2)]). On the other hand, f has four distinct roots in C, two on the unit circle, one inside and one outside. As f is irreducible over Q, it follows that the homoclinic group ∆(Xf , αf ) is reduced to 0 (cf. [19, Example 3.4]). The trivial endomorphism of (Xf , αf ), that maps each x ∈ Xf to 0, is pre-injective but not surjective. Consequently, (Xf , αf ) does not have the Myhill property. However, (Xf , αf ) has the Moore property since each homoclinicity class of (Xf , αf ) is reduced to a single point, so that every map with source set Xf is pre-injective. Note that (Xf , αf ) = (T4 , β) is topologically rigid since every mixing toral automorphism is topologically rigid by a result of Walters [35]. 7.3. p-pre-injectivity and the p-Moore and p-Myhill properties. In Subsection 3.1 we have recalled from [10] the notions and the main properties of p-expansivity and of p-homoclinic group (denoted ∆p (X, α)) for an algebraic dynamical system (X, α). In the Introduction we have also defined the notion of a p-pre-injective map τ : X → X. Note that, if τ is a group endomorphism of X, then (cf. Proposition 4.1): (7.1) τ is p-pre-injective if and only if ker(τ ) ∩ ∆p (X, α) = {0X }. We shall then say that the algebraic dynamical system (X, α) has the p-Moore property if every surjective endomorphism of (X, α) is p-pre-injective and that it has the p-Myhill property if every p-pre-injective endomorphism of (X, α) is surjective. Note that the ∞Moore property (resp. ∞-Myhill property) is nothing but the Moore property (resp. Myhill property). It follows immediately from Theorem 3.2.(1) that if 1 ≤ p ≤ q ≤ ∞ the every qpre-injective map τ : X → X is p-pre-injective, so that every algebraic dynamical system satisfying the q-Moore property (resp. the p-Myhill property) satisfies the p-Moore property (resp. the q-Myhill property). GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 27 From the proof of Theorem 1.2 and from Theorem 3.2.(5) we immediately deduce the following: Corollary 7.3. Let Γ be a countable Abelian group and let f ∈ Z[Γ]. Let also 1 ≤ p < ∞. Suppose that (Xf , αf ) is p-expansive and topologically rigid. Then (Xf , αf ) has the p-Moore property. In the following result we relax the commutativity condition for the acting group Γ. Theorem 7.4. Let (X, α) be a finitely generated algebraic dynamical system. Suppose that Γ is amenable and that (X, α) is topologically rigid and has finite entropy. Then (X, α) has the 1-Moore property. Proof. Let τ : X → X be a continuous Γ-equivariant surjective map. By topological rigidity, we can find a continuous group endomorphism λ : X → X and t ∈ X such that τ (x) = λ(x) + t for all x ∈ X. Since τ is surjective (resp. injective) if and only if λ is surjective (resp. injective), it is not restrictive to suppose that t = 0, that is, τ is a group endomorphism of X. Then the entropy addition formula (cf. [17, Corollary 6.3], see also [14, Theorem 13.48]) yields (we denote by h(·) topological entropy) h(ker(τ )) = h(X) − h(X/ ker(τ )) = h(X) − h(τ (X)) = 0, since τ is surjective and X has finite entropy. For any finitely generated algebraic dynamical system (Y, β) with acting group Γ, if ∆1 (Y, β) is nontrivial, then h(Y ) > 0 (cf. [10, Theorem b is 7.3 and Propositions 5.7 and 7.10], see also [14, Theorems 13.23 and 13.35]). Since X \) is a quotient Z[Γ]-module of X, \) is b ker(τ a finitely generated left Z[Γ]-module and ker(τ also a finitely generated left Z[Γ]-module. It follows that ∆1 (X, α) ∩ ker(τ ) = ∆1 (ker(τ ), α|ker(τ ) ) = {0X }. This, together with (7.1), shows that τ is 1-pre-injective.  References [1] S. Bhattacharya, Orbit equivalence and topological conjugacy of affine actions on compact Abelian groups, Monatsh. Math. 129 (2000), pp. 89–96. [2] S. Bhattacharya, Expansiveness of algebraic actions on connected groups, Trans. Am. Math. Soc. 356 (12) (2004), pp. 4687–4700. [3] S. Bhattacharya, T. Ceccherini-Silberstein, and M. Coornaert, Surjunctivity and topological rigidity of algebraic dynamical systems, arXiv:1702.06201, to appear in Ergodic Theory and Dynamical Systems. [4] L. Bowen and H. Li, Harmonic models and spanning forsets of residually finite groups, J. Funct. Anal. 263 (2012), pp. 1769–1808. [5] T. Ceccherini-Silberstein and M. Coornaert, Expansive actions of countable amenable groups, homoclinic pairs, and the Myhill property, Illinois J. Math. 59 (2015), pp. 597–621. [6] T. Ceccherini-Silberstein and M. Coornaert, A Garden of Eden theorem for Anosov diffeomorphisms on tori, Topology Appl. 212 (2016), pp. 49–56. [7] T. Ceccherini-Silberstein and M. Coornaert, A Garden of Eden theorem for principal algebraic actions, arXiv:1706.06548. 28 TULLIO CECCHERINI-SILBERSTEIN, MICHEL COORNAERT, AND HANFENG LI [8] T. Ceccherini-Silberstein, A. Machı̀, and F. Scarabotti, Amenable groups and cellular automata, Ann. Inst. Fourier (Grenoble) 49 (1999), pp. 673–685. [9] C. Chou, Elementary amenable groups, Ill. J. Math. 24(3) (1980), pp. 396–407. [10] N.-Ph. Chung and H. Li, Homoclinic group, IE groups, and expansive algebraic actions, Invent. math. 199 (2015), pp. 805–858. [11] C. Deninger and K. Schmidt, Expansive algebraic actions of discrete residually finite amenable groups and their entropy, Ergodic Theory Dynam. Systems 27 (2007), pp. 769–786. [12] M. Einsiedler and H. Rindler, Algebraic actions of the discrete Heisenberg group and other nonabelian groups, Aequ. Math. 62(1-2) (2001), pp. 117–135. [13] M. Gromov, Endomorphisms of symbolic algebraic varieties, J. Eur. Math. Soc. (JEMS) 1 (1999), pp. 109–197. [14] D. Kerr and H. Li, Ergodic theory. Independence and dichotomies. Springer Monographs in Mathematics. Springer, Cham, 2016. [15] P. H. Kropholler, P. A. Linnell, and J. A. Moody, Applications of a new K-theoretic theorem to soluble group rings, Proc. Amer. Math. Soc. 104 (1988), pp. 675–684. [16] T. Y. Lam, Lectures on modules and rings. Graduate Texts in Mathematics. Springer, New York (1999). [17] H. Li, Compact group automorphisms, addition formulas and Fuglede-Kadison determinants, Ann. of Math. (2) 176 (2012), pp. 303–347. [18] H. Li, Garden of Eden and specification, Ergodic Theory Dynam. Systems (to appear). arXiv:1708.09012. [19] D. Lind and K. Schmidt, Homoclinic points of algebraic Zd -actions, J. Amer. Math. Soc. 12 (1999), pp. 953–980. [20] D. Lind and K. Shmidt, A survey of algebraic actions of the discrete Heisenberg group, Uspekhi Mat. Nauk 70 (2015), pp. 77–142. [21] D. Lind, K. Schmidt and E. Verbitskiy, Entropy and growth rate of periodic points of algebraic Zd -actions. In: Dynamical numbers: interplay between dynamical systems and number theory, ed. S. Kolyada, Yu. Manin, M. Möller, P. Moree and T. Ward, pp. 195–211, Contemporary Mathematics, vol. 523. American Mathematical Society, Providence (RI) (2010). [22] D. Lind, K. Schmidt, and E. Verbitskiy, Homoclinic points, atoral polynomials, and periodic points of algebraic Zd -actions, Ergodic Theory Dynam. Systems 33 (2013), pp. 1060–1081. [23] P.A. Linnel, Analytic versions of the zero divisor conjecture. In: Geometry and cohomology in group thoery (Durham, 1994), Lecture Notes Series, vol. 252, pp. 209–248. London Mathematical Society, Cambridge University Press, Cambridge (1998). [24] P.A. Linnel and M.J. Puls, Zero divisors and Lp (G), II, New York J. Math. 7 (2001), pp. 49–58. [25] A. Machı̀ and F. Mignosi, Garden of Eden configurations for cellular automata on Cayley graphs of groups, SIAM J. Discrete Math. 6 (1993), pp. 44–56. [26] R. Miles, Expansive algebraic actions of countable abelian groups, Mon. Math. 147(2) (2006), pp. 155– 164. [27] E. F. Moore, Machine models of self-reproduction, vol. 14 of Proc. Symp. Appl. Math., American Mathematical Society, Providence, 1963, pp. 17–34. [28] S. A. Morris, Pontryagin duality and the structure of locally compact Abelian groups, Cambridge University Press, Cambridge-New York-Melbourne, 1977. London Mathematical Society Lecture Note Series, No. 29. [29] J. Myhill, The converse of Moore’s Garden-of-Eden theorem, Proc. Amer. Math. Soc. 14 (1963), pp. 685–686. [30] K. Schmidt, Automorphisms of compact abelian groups and affine varieties, Proc. London Math. Soc. (3) 61 (1990), pp. 480–496. [31] K. Schmidt, Dynamical systems of algebraic origin, vol. 128 of Progress in Mathematics, Birkhäuser Verlag, Basel, 1995. GARDEN OF EDEN THEOREM FOR HARMONIC MODELS 29 [32] K. Schmidt and E. Verbitskiy, Abelian sandpiles and the harmonic model, Comm. Math. Phys. 292 (2009), pp. 721–759. [33] N.Th. Varopoulos, Long range estimates for Markov chains, Bull. Sci. Math. (2) 109 (1985), pp. 225–252. [34] N.Th. Varopoulos, L. Saloff-Coste, and Th. Coulhon, Analysis and geometry on groups, Cambridge Tracts in Math., vol. 100, Cambridge University Press, Cambridge, 1992. [35] P. Walters, Topological conjugacy of affine transformations of tori, Trans. Amer. Math. Soc. 131 (1968), pp. 40–50. [36] W. Woess, Random walks on infinite graphs and groups, Cambridge Tracts in Math., vol. 138, Cambridge University Press, Cambridge, 2000. Dipartimento di Ingegneria, Università del Sannio, 82100 Benevento, Italy E-mail address: [email protected] Université de Strasbourg, CNRS, IRMA UMR 7501, F-67000 Strasbourg, France E-mail address: [email protected] Department of Mathematics, Chongqing University, Chongqing 401331, China Department of Mathematics, SUNY at Buffalo, Buffalo, NY 14260-2900, USA E-mail address: [email protected]
4math.GR
Conditional Generation and Snapshot Learning in Neural Dialogue Systems arXiv:1606.03352v1 [cs.CL] 10 Jun 2016 Tsung-Hsien Wen, Milica Gašić, Nikola Mrkšić, Lina M. Rojas-Barahona, Pei-Hao Su, Stefan Ultes, David Vandyke, Steve Young Cambridge University Engineering Department, Trumpington Street, Cambridge, CB2 1PZ, UK {thw28,mg436,nm480,lmr46,phs26,su259,djv27,sjy11}@cam.ac.uk Abstract Recently a variety of LSTM-based conditional language models (LM) have been applied across a range of language generation tasks. In this work we study various model architectures and different ways to represent and aggregate the source information in an endto-end neural dialogue system framework. A method called snapshot learning is also proposed to facilitate learning from supervised sequential signals by applying a companion cross-entropy objective function to the conditioning vector. The experimental and analytical results demonstrate firstly that competition occurs between the conditioning vector and the LM, and the differing architectures provide different trade-offs between the two. Secondly, the discriminative power and transparency of the conditioning vector is key to providing both model interpretability and better performance. Thirdly, snapshot learning leads to consistent performance improvements independent of which architecture is used. 1 Introduction Recurrent Neural Network (RNN)-based conditional language models (LM) have been shown to be very effective in solving a number of real world problems, such as machine translation (MT) (Cho et al., 2014) and image caption generation (Karpathy and Fei-Fei, 2015). Recently, RNNs were applied to task of generating sentences from an explicit semantic representation (Wen et al., 2015a). Attention-based methods (Mei et al., 2016) and Long Short-term Memory (LSTM)-like (Hochreiter and Schmidhuber, 1997) gating mechanisms (Wen et al., 2015b) have both been studied to improve generation quality. Although it is now clear that LSTMbased conditional LMs can generate plausible natural language, less effort has been put in comparing the different model architectures. Furthermore, conditional generation models are typically tested on relatively straightforward tasks conditioned on a single source (e.g. a sentence or an image) and where the goal is to optimise a single metric (e.g. BLEU). In this work, we study the use of conditional LSTMs in the generation component of neural network (NN)-based dialogue systems which depend on multiple conditioning sources and optimising multiple metrics. Neural conversational agents (Vinyals and Le, 2015; Shang et al., 2015) are direct extensions of the sequence-to-sequence model (Sutskever et al., 2014) in which a conversation is cast as a source to target transduction problem. However, these models are still far from real world applications because they lack any capability for supporting domain specific tasks, for example, being able to interact with databases (Sukhbaatar et al., 2015; Yin et al., 2016) and aggregate useful information into their responses. Recent work by Wen et al. (2016a), however, proposed an end-to-end trainable neural dialogue system that can assist users to complete specific tasks. Their system used both distributed and symbolic representations to capture user intents, and these collectively condition a NN language generator to generate system responses. Due to the diversity of the conditioning information sources, the best way to represent and combine them is non-trivial. In Wen et al. (2016a), the objective function for learning the dialogue policy and language generator depends solely on the likelihood of the output sentences. However, this sequential supervision signal may not be informative enough to learn a good conditioning vector representation resulting in a generation process which is dominated by the LM. This can often lead to inappropriate system outputs. In this paper, we therefore also investigate the use of snapshot learning which attempts to mitigate this problem by heuristically applying companion supervision signals to a subset of the conditioning vector. This idea is similar to deeply supervised nets (Lee et al., 2015) in which the final cost from the output layer is optimised together with the companion signals generated from each intermediary layer. We have found that snapshot learning offers several benefits: (1) it consistently improves performance; (2) it learns discriminative and robust feature representations and alleviates the vanishing gradient problem; (3) it appears to learn transparent and interpretable subspaces of the conditioning vector. 2 Related Work Machine learning approaches to task-oriented dialogue system design have cast the problem as a partially observable Markov Decision Process (POMDP) (Young et al., 2013) with the aim of using reinforcement learning (RL) to train dialogue policies online through interactions with real users (Gašić et al., 2013). In order to make RL tractable, the state and action space must be carefully designed (Young et al., 2010) and the understanding (Henderson et al., 2014; Mrkšić et al., 2015) and generation (Wen et al., 2015b; Wen et al., 2016b) modules were assumed available or trained standalone on supervised corpora. Due to the underlying hand-coded semantic representation (Traum, 1999), the conversation is far from natural and the comprehension capability is limited. This motivates the use of neural networks to model dialogues from end to end as a conditional generation problem. Interest in generating natural language using NNs can be attributed to the success of RNN LMs for large vocabulary speech recognition (Mikolov et al., 2010; Mikolov et al., 2011). Sutskever et al. (2011) showed that plausible sentences can be obtained by sampling characters one by one from the output layer of an RNN. By conditioning an LSTM on a sequence of characters, Graves (2013) showed that machines can synthesise handwriting indistinguishable from that of a human. Later on, this conditional generation idea has been tried in several research fields, for example, generating image captions by conditioning an RNN on a convolutional neural network (CNN) output (Karpathy and Fei-Fei, 2015; Xu et al., 2015); translating a source to a target language by conditioning a decoder LSTM on top of an encoder LSTM (Cho et al., 2014; Bahdanau et al., 2015); or generating natural language by conditioning on a symbolic semantic representation (Wen et al., 2015b; Mei et al., 2016). Among all these methods, attention-based mechanisms (Bahdanau et al., 2015; Hermann et al., 2015; Ling et al., 2016) have been shown to be very effective improving performance using a dynamic source aggregation strategy. To model dialogue as conditional generation, a sequence-to-sequence learning (Sutskever et al., 2014) framework has been adopted. Vinyals and Le (2015) trained the same model on several conversation datasets and showed that the model can generate plausible conversations. However, Serban et al. (2015b) discovered that the majority of the generated responses are generic due to the maximum likelihood criterion, which was latter addressed by Li et al. (2016a) using a maximum mutual information decoding strategy. Furthermore, the lack of a consistent system persona was also studied in Li et al. (2016b). Despite its demonstrated potential, a major barrier for this line of research is data collection. Many works (Lowe et al., 2015; Serban et al., 2015a; Dodge et al., 2016) have investigated conversation datasets for developing chat bot or QA-like general purpose conversation agents. However, collecting data to develop goal oriented dialogue systems that can help users to complete a task in a specific domain remains difficult. In a recent work by Wen et al. (2016a), this problem was addressed by designing an online, parallel version of Wizard-of-Oz data collection (Kelley, 1984) which allows large scale and cheap in-domain conversation data to be collected using Amazon Mechanical Turk. An NNbased dialogue model was also proposed to learn from the collected dataset and was shown to be able to assist human subjects to complete specific tasks. Snapshot learning can be viewed as a special form of weak supervision (also known as distant- or self supervision) (Craven and Kumlien, 1999; Snow et al., 2004), in which supervision signals are heuristically labelled by matching unlabelled corpora with entities or attributes in a structured database. It has been widely applied to relation extraction (Mintz et al., 2009) and information extraction (Hoffmann et al., 2011) in which facts from a knowledge base (e.g. Freebase) were used as objectives to train classifiers. Recently, self supervision was also used in memory networks (Hill et al., 2016) to improve the discriminative power of memory attention. Conceptually, snapshot learning is related to curriculum learning (Bengio et al., 2009). Instead of learning easier examples before difficult ones, snapshot learning creates an easier target for each example. In practice, snapshot learning is similar to deeply supervised nets (Lee et al., 2015) in which companion objectives are generated from intermediary layers and optimised altogether with the output objective. 3 Neural Dialogue System The testbed for this work is a neural network-based task-oriented dialogue system proposed by Wen et al. (2016a). The model casts dialogue as a source to target sequence transduction problem (modelled by a sequence-to-sequence architecture (Sutskever et al., 2014)) augmented with the dialogue history (modelled by a belief tracker (Henderson et al., 2014)) and the current database search outcome (modelled by a database operator). The model consists of both encoder and decoder modules. The details of each module are given below. 3.1 Encoder Module At each turn t, the goal of the encoder is to produce a distributed representation of the system action mt , which is then used to condition a decoder to generate the next system response in skeletal form1 . It consists of four submodules: intent network, belief tracker, database operator, and policy network. Intent Network The intent network takes a sequence of tokens1 and converts it into a sentence embedding representing the user intent using an LSTM 1 Delexicalisation: slots and values are replaced by generic tokens (e.g. keywords like Chinese food are replaced by [v.food] [s.food] to allow weight sharing. network. The hidden layer of the LSTM at the last encoding step zt is taken as the representation. As mentioned in Wen et al. (2016a), this representation can be viewed as a distributed version of the speech act (Traum, 1999) used in traditional systems. Belief Trackers In addition to the intent network, the neural dialogue system uses a set of slot-based belief trackers (Henderson et al., 2014; Mrkšić et al., 2015) to track user requests. By taking each user input as new evidence, the task of a belief tracker is to maintain a multinomial distribution p over values v ∈ Vs for each informable slot s2 , and a binary distribution for each requestable slot2 . These probability distributions pst are called belief states of the system. The belief states pst , together with the intent vector zt , can be viewed as the system’s comprehension of the user requests up to turn t. Database Operator Based on the belief states pst , a DB query is formed by taking the union of the maximum values of each informable slot. A vector xt representing different degrees of matching in the DB (no match, 1 match, ... or more than 5 matches) is produced by counting the number of matched entities and expressing it as a 6-bin 1-hot encoding. If xt is not zero, an associated entity pointer is maintained which identifies one of the matching DB entities selected at random. The entity pointer is updated if the current entity no longer matches the search criteria; otherwise it stays the same. Policy Network Based on the vectors zt , pst , and xt from the above three modules, the policy network combines them into a single action vector mt by a three-way matrix transformation, mt = tanh(Wzm zt + Wxm xt + s s s∈G Wpm pt ) P (1) s , and W where matrices Wzm , Wpm xm are parameters and G is the domain ontology. 3.2 Decoder Module Conditioned on the system action vector mt provided by the encoder module, the decoder module uses a conditional LSTM LM to generate the required system output token by token in skeletal form1 . The final system response can then be formed 2 Informable slots are slots that users can use to constrain the search, such as food type or price range; Requestable slots are slots that users can ask a value for, such as phone number. This information is specified in the domain ontology. (a) Language model type LSTM (b) Memory type LSTM (c) Hybrid type LSTM Figure 1: Three different conditional generation architectures. by substituting the actual values of the database entries into the skeletal sentence structure. 3.2.1 Conditional Generation Network In this paper we study and analyse three different variants of LSTM-based conditional generation architectures: Language Model Type The most straightforward way to condition the LSTM network on additional source information is to concatenate the conditioning vector mt together with the input word embedding wj and previous hidden layer hj−1 ,    ij sigmoid  fj   sigmoid  =  oj   sigmoid tanh ĉj    mt   W4n,3n  wj   hj−1 ĉj = tanh Wc (wj ⊕ hj−1 ) cj = fj cj−1 + ij hj = o j cj−1 + ij hj = oj      ij sigmoid  fj   sigmoid     oj  =  sigmoid sigmoid rj ĉj tanh(cj ) where index j is the generation step, n is the hidden layer size, ij , fj , oj ∈ [0, 1]n are input, forget, and output gates respectively, ĉj and cj are proposed cell value and true cell value at step j, and W4n,3n are the model parameters. The model is shown in Figure 1a. Since it does not differ significantly from the original LSTM, we call it the language model type (lm) conditional generation network. Memory Type The memory type (mem) conditional generation network was introduced by Wen et al. (2015b), shown in Figure 1b, in which the conditioning vector mt is governed by a standalone reading gate rj . This reading gate decides how much information should be read from the conditioning vector and directly writes it into the memory cell cj ,    ij sigmoid mt  fj   sigmoid   =  W4n,3n  wj   oj   sigmoid  hj−1 rj sigmoid ĉj + rj mt tanh(cj ) where Wc is another weight matrix to learn. The idea behind this is that the model isolates the conditioning vector from the LM so that the model has more flexibility to learn to trade off between the two. Hybrid Type Continuing with the same idea as the memory type network, a complete separation of conditioning vector and LM (except for the gate controlling the signals) is provided by the hybrid type network shown in Figure 1c,  cj = f j     mt   W4n,3n  wj   hj−1 ĉj = tanh Wc (wj ⊕ hj−1 ) cj = f j hj = o j cj−1 + ij tanh(cj ) + rj  ĉj mt This model was motivated by the fact that long-term dependency is not needed for the conditioning vector because we apply this information at every step j anyway. The decoupling of the conditioning vector and the LM is attractive because it leads to better interpretability of the results and provides the potential to learn a better conditioning vector and LM. 3.2.2 Attention and Belief Representation Attention An attention-based mechanism provides an effective approach for aggregating multiple information sources for prediction tasks. Like Wen et al. (2016a), we explore the use of an attention mechanism to combine the tracker belief states in which the policy network in Equation 1 is modified as mjt = tanh(Wzm zt + Wxm xt + j s s s∈G αs Wpm pt ) P where the attention weights αsj are calculated by,  αsj = softmax r| tanh Wr · (vt ⊕ pst ⊕ wjt ⊕ htj−1 ) where vt = zt + xt and matrix Wr and vector r are parameters to learn. Belief Representation The effect of different belief state representations on the end performance are also studied. For user informable slots, the full belief state pst is the original state containing all categorical values; the summary belief state contains only three components: the summed value of all categorical probabilities, the probability that the user said they “don’t care” about this slot and the probability that the slot has not been mentioned. For user requestable slots, on the other hand, the full belief state is the same as the summary belief state because the slot values are binary rather than categorical. 3.3 Snapshot Learning Learning conditional generation models from sequential supervision signals can be difficult, because it requires the model to learn both long-term word dependencies and potentially distant source encoding functions. To mitigate this difficulty, we introduce a novel method called snapshot learning to create a vector of binary labels Υjt ∈ [0, 1]d , d < dim(mjt ) as the snapshot of the remaining part of the output sentence Tt,j:|Tt | from generation step j. Each element of the snapshot vector is an indicator function of a certain event that will happen in the future, which can be obtained either from the system response or dialogue context at training time. A companion cross entropy error is then computed to force a subset of the conditioning vector m̂jt ⊂ mjt to be close to the snapshot vector, Lss (·) = − P P t j j j E[H(Υt , m̂t )] (2) where H(·) is the cross entropy function, Υjt and m̂jt are elements of vectors Υjt and m̂jt , respectively. In order to make the tanh activations of m̂jt compatible with the 0-1 snapshot labels, we squeeze each Figure 2: The idea of snapshot learning. The snapshot vector was trained with additional supervisions on a set of indicator functions heuristically labelled using the system response. value of m̂jt by adding 1 and dividing by 2 before computing the cost. The indicator functions we use in this work have two forms: (1) whether a particular slot value (e.g., [v.food]1 ) is going to occur, and (2) whether the system has offered a venue3 , as shown in Figure 2. The offer label in the snapshot is produced by checking the delexicalised name token ([v.name]) in the entire dialogue. If it has occurred, every label in subsequent turns is labelled with 1. Otherwise it is labelled with 0. To create snapshot targets for a particular slot value, the output sentence is matched with the corresponding delexicalised token turn by turn, per generation step. At each generation step, the target is labelled with 0 if that delexicalised token has been generated; otherwise it is set to 1. However, for the models without attention, the targets per turn are set to the same because the condition vector will not be able to learn the dynamically changing behaviour without attention. 4 Experiments Dataset The dataset used in this work was collected in the Wizard-of-Oz online data collection described by Wen et al. (2016a), in which the task of the system is to assist users to find a restaurant in Cambridge, UK area. There are three informable slots (food, pricerange, area) that users can use to constrain the search and six requestable slots (address, phone, postcode plus the three informable 3 Details of the specific application used in this study are given in Section 4 below. Architecture Belief Success(%) SlotMatch(%) T5-BLEU T1-BLEU Belief state representation lm full 72.6 / 74.5 lm summary 74.5 / 76.5 52.1 / 60.3 57.4 / 61.2 0.207 / 0.229 0.221 / 0.231 0.216 / 0.238 0.227 / 0.240 Conditional architecture lm summary mem summary hybrid summary 74.5 / 76.5 75.5 / 77.5 76.1 / 79.2 57.4 / 61.2 59.2 / 61.3 52.4 / 60.6 0.221 / 0.231 0.222 / 0.232 0.202 / 0.228 0.227 / 0.240 0.231 / 0.243 0.212 / 0.237 Attention-based model lm summary mem summary hybrid summary 79.4 / 78.2 76.5 / 80.2 79.0 / 81.8 60.6 / 60.2 57.4 / 61.0 56.2 / 60.5 0.228 / 0.231 0.220 / 0.229 0.214 / 0.227 0.239 / 0.241 0.228 / 0.239 0.224 / 0.240 Table 1: Performance comparison of different model architectures, belief state representations, and snapshot learning. The numbers to the left and right of the / sign are learning without and with snapshot, respectively. The model with the best performance on a particular metric (column) is shown in bold face. slots) that the user can ask a value for once a restaurant has been offered. There are 676 dialogues in the dataset (including both finished and unfinished dialogues) and approximately 2750 turns in total. The database contains 99 unique restaurants. Training The training procedure was divided into two stages. Firstly, the belief tracker parameters θb were pre-trained using cross entropy errors between tracker labels and predictions. Having fixed the tracker parameters, the remaining parts of the model θ\b are trained using the cross entropy errors from the generation network LM, L(θ\b ) = − P P t j H(yjt , ptj ) + λLss (·) (3) where yjt and ptj are output token targets and predictions respectively, at turn t of output step j, Lss (·) is the snapshot cost from Equation 2, and λ is the tradeoff parameter in which we set to 1 for all models trained with snapshot learning. We treated each dialogue as a batch and used stochastic gradient descent with a small l2 regularisation term to train the model. The collected corpus was partitioned into a training, validation, and testing sets in the ratio 3:1:1. Early stopping was implemented based on the validation set considering only LM log-likelihoods. Gradient clipping was set to 1. The hidden layer sizes were set to 50, and the weights were randomly initialised between -0.3 and 0.3 including word embeddings. The vocabulary size is around 500 for both input and output, in which rare words and words that can be delexicalised have been removed. Decoding In order to compare models trained with different recipes rather than decoding strategies, we decode all the trained models with the average log probability of tokens in the sentence. We applied beam search with a beamwidth equal to 10, the search stops when an end-of-sentence token is generated. In order to consider language variability, we ran decoding until 5 candidates were obtained and performed evaluation on them. Metrics We compared models trained with different recipes by performing a corpus-based evaluation in which the model is used to predict each system response in the held-out test set. Three evaluation metrics were used: BLEU score (on top-1 and top5 candidates) (Papineni et al., 2002), slot matching rate and objective task success rate (Su et al., 2015). The dialogue is marked as successful if both: (1) the offered entity matches the task that was specified to the user, and (2) the system answered all the associated information requests (e.g. what is the address?) from the user. The slot matching rate is the percentage of delexicalised tokens (e.g. [s.food] and [v.area]1 ) appear in the candidate also appear in the reference. We computed the BLEU scores on the skeletal sentence forms before substituting with the actual entity values. All the results were averaged over 10 random initialised networks. Results Table 1 shows the evaluation results. The numbers to the left and right of each table cell are the same model trained w/o and w/ snapshot learning. (a) Hybrid LSTM w/o snapshot learning (b) Hybrid LSTM w/ snapshot learning Figure 3: Learned attention heat maps over trackers. The first three columns in each figure are informable slot trackers and the rest are requestable slot trackers. The generation model is the hybrid type LSTM. The first observation is that snapshot learning consistently improves on most metrics regardless of the model architecture. This is especially true for BLEU scores. We think this may be attributed to the more discriminative conditioning vector learned through the snapshot method, which makes the learning of the conditional LM easier. In the first block belief state representation, we compare the effect of two different belief representations. As can be seen, using a succinct representation is better (summary>full) because the identity of each categorical value in the belief state does not help when the generation decisions are done in skeletal form. In fact, the full belief state representation may encourage the model to learn incorrect coadaptation among features when the data is scarce. In the conditional architecture block, we compare the three different conditional generation architectures as described in section 3.2.1. This result shows that the language model type (lm) and memory type (mem) networks perform better in terms of BLEU score and slot matching rate, while the hybrid type (hybrid) networks achieve higher task success. This is probably due to the degree of separation between the LM and conditioning vector: a coupling approach (lm, mem) sacrifices the conditioning vector but learns a better LM and higher BLEU; while a complete separation (hybrid) learns a better conditioning vector and offers a higher task success. Lastly, in the attention-based model block we train the three architectures with the attention mech- Model hybrid, full hybrid, summary + att. ij fj rj /oj 0.567 0.539 0.540 0.502 0.540 0.559 0.405 0.428 0.459 Table 2: Average activation of gates on test set. anism and compare them again. Firstly, the characteristics of the three models we observed above also hold for attention-based models. Secondly, we found that the attention mechanism improves all the three architectures on task success rate but not BLEU scores. This is probably due to the limitations of using n-gram based metrics like BLEU to evaluate the generation quality (Stent et al., 2005). 5 Model Analysis Gate Activations We first studied the average activation of each individual gate in the models by averaging them when running generation on the test set. We analysed the hybrid models because their reading gate to output gate activation ratio (rj /oj ) shows clear tradeoff between the LM and the conditioning vector components. As can be seen in Table 2, we found that the average forget gate activations (fj ) and the ratio of the reading gate to the output gate activation (rj /oj ) have strong correlations to performance: a better performance (row 3>row 2>row 1) seems to come from models that can learn a longer word dependency (higher forget gate ft activations) and a better conditioning vector (therefore (a) (b) Figure 4: Two example responses generated from the hybrid model trained with snapshot and attention. Each line represents a neuron that detects a particular snapshot event. higher reading to output gate ratio rj /oj ). 6 Learned Attention We have visualised the learned attention heat map of models trained with and without snapshot learning in Figure 3. The attention is on both the informable slot trackers (first three columns) and the requestable slot trackers (the other columns). We found that the model trained with snapshot learning (Figure 3b) seems to produce a more accurate and discriminative attention heat map comparing to the one trained without it (Figure 3a). This may contribute to the better performance achieved by the snapshot learning approach. This paper has investigated different conditional generation architectures and a novel method called snapshot learning to improve response generation in a neural dialogue system framework. The results showed three major findings. Firstly, although the hybrid type model did not rank highest on all metrics, it is nevertheless preferred because it achieved the highest task success and also it provided more interpretable results. Secondly, snapshot learning provided gains on virtually all metrics regardless of the architecture used. The analysis suggested that the benefit of snapshot learning mainly comes from the more discriminative and robust subspace representation learned from the heuristically labelled companion signals, which in turn facilitates optimisation of the final target objective. Lastly, the results suggested that by making a complex system more interpretable at different levels not only helps our understanding but also leads to the highest success rates. However, there is still much work left to do. This work focused on conditional generation architectures and snapshot learning in the scenario of generating dialogue responses. It would be very helpful if the same comparison could be conducted in other application domains such as machine translation or image caption generation so that a wider view of the effectiveness of these approaches can be assessed. Snapshot Neurons As mentioned earlier, snapshot learning forces a subspace of the conditioning vector m̂jt to become discriminative and interpretable. Two example generated sentences together with the snapshot neuron activations are shown in Figure 4. As can be seen, when generating words one by one, the neuron activations were changing to detect different events they were assigned by the snapshot training signals: e.g. in Figure 4b the light blue and orange neurons switched their domination role when the token [v.address] was generated; the offered neuron is in a high activation state in Figure 4b because the system was offering a venue, while in Figure 4a it is not activated because the system was still helping the user to find a venue. More examples can be found in the Appendix. Conclusion and Future Work Acknowledgments Tsung-Hsien Wen and David Vandyke are supported by Toshiba Research Europe Ltd, Cambridge Research Laboratory. References Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2015. Neural machine translation by jointly learning to align and translate. In ICLR. Yoshua Bengio, Jérôme Louradour, Ronan Collobert, and Jason Weston. 2009. Curriculum learning. In ICML. Kyunghyun Cho, Bart van Merrienboer, Çaglar Gülçehre, Fethi Bougares, Holger Schwenk, and Yoshua Bengio. 2014. Learning phrase representations using RNN encoder-decoder for statistical machine translation. In EMNLP. Mark Craven and Johan Kumlien. 1999. Constructing biological knowledge bases by extracting information from text sources. In ISMB. Jesse Dodge, Andreea Gane, Xiang Zhang, Antoine Bordes, Sumit Chopra, Alexander Miller, Arthur Szlam, and Jason Weston. 2016. Evaluating prerequisite qualities for learning end-to-end dialog systems. ICLR. Milica Gašić, Catherine Breslin, Matthew Henderson, Dongho Kim, Martin Szummer, Blaise Thomson, Pirros Tsiakoulis, and Steve Young. 2013. On-line policy optimisation of bayesian spoken dialogue systems via human interaction. In ICASSP. Alex Graves. 2013. Generating sequences with recurrent neural networks. arXiv preprint:1308.0850. Matthew Henderson, Blaise Thomson, and Steve Young. 2014. Word-based dialog state tracking with recurrent neural networks. In SIGdial. Karl Moritz Hermann, Tomás Kociský, Edward Grefenstette, Lasse Espeholt, Will Kay, Mustafa Suleyman, and Phil Blunsom. 2015. Teaching machines to read and comprehend. In NIPS. Felix Hill, Antoine Bordes, Sumit Chopra, and Jason Weston. 2016. The goldilocks principle: Reading children’s books with explicit memory representations. In ICLR. Sepp Hochreiter and Jürgen Schmidhuber. 1997. Long short-term memory. Neural Computation. Raphael Hoffmann, Congle Zhang, Xiao Ling, Luke Zettlemoyer, and Daniel S. Weld. 2011. Knowledgebased weak supervision for information extraction of overlapping relations. In ACL. Andrej Karpathy and Li Fei-Fei. 2015. Deep visualsemantic alignments for generating image descriptions. In CVPR. John F. Kelley. 1984. An iterative design methodology for user-friendly natural language office information applications. ACM Transaction on Information Systems. Chen-Yu Lee, Saining Xie, Patrick Gallagher, Zhengyou Zhang, and Zhuowen Tu. 2015. Deeply-supervised nets. In AISTATS. Jiwei Li, Michel Galley, Chris Brockett, Jianfeng Gao, and Bill Dolan. 2016a. A diversity-promoting objective function for neural conversation models. In NAACL-HLT. Jiwei Li, Michel Galley, Chris Brockett, Jianfeng Gao, and Bill Dolan. 2016b. A persona-based neural conversation model. arXiv perprint:1603.06155. Wang Ling, Edward Grefenstette, Karl Moritz Hermann, Tomás Kociský, Andrew Senior, Fumin Wang, and Phil Blunsom. 2016. Latent predictor networks for code generation. arXiv preprint:1603.06744. Ryan Lowe, Nissan Pow, Iulian Serban, and Joelle Pineau. 2015. The ubuntu dialogue corpus: A large dataset for research in unstructured multi-turn dialogue systems. In SIGdial. Hongyuan Mei, Mohit Bansal, and Matthew R. Walter. 2016. What to talk about and how? selective generation using lstms with coarse-to-fine alignment. In NAACL. Tomáš Mikolov, Martin Karafit, Lukáš Burget, Jan Černocký, and Sanjeev Khudanpur. 2010. Recurrent neural network based language model. In InterSpeech. Tomáš Mikolov, Stefan Kombrink, Lukáš Burget, Jan H. Černocký, and Sanjeev Khudanpur. 2011. Extensions of recurrent neural network language model. In ICASSP. Mike Mintz, Steven Bills, Rion Snow, and Dan Jurafsky. 2009. Distant supervision for relation extraction without labeled data. In ACL. Nikola Mrkšić, Diarmuid Ó Séaghdha, Blaise Thomson, Milica Gašić, Pei-Hao Su, David Vandyke, TsungHsien Wen, and Steve Young. 2015. Multi-domain Dialog State Tracking using Recurrent Neural Networks. In ACL. Kishore Papineni, Salim Roukos, Todd Ward, and WeiJing Zhu. 2002. Bleu: a method for automatic evaluation of machine translation. In ACL. Iulian Vlad Serban, Ryan Lowe, Laurent Charlin, and Joelle Pineau. 2015a. A survey of available corpora for building data-driven dialogue systems. arXiv preprint:1512.05742. Iulian Vlad Serban, Alessandro Sordoni, Yoshua Bengio, Aaron C. Courville, and Joelle Pineau. 2015b. Hierarchical neural network generative models for movie dialogues. In AAAI. Lifeng Shang, Zhengdong Lu, and Hang Li. 2015. Neural responding machine for short-text conversation. In ACL. Rion Snow, Daniel Jurafsky, and Andrew Y. Ng. 2004. Learning syntactic patterns for automatic hypernym discovery. In NIPS. Amanda Stent, Matthew Marge, and Mohit Singhai. 2005. Evaluating evaluation methods for generation in the presence of variation. In CICLing 2005. Pei-Hao Su, David Vandyke, Milica Gasic, Dongho Kim, Nikola Mrksic, Tsung-Hsien Wen, and Steve J. Young. 2015. Learning from real users: Rating dialogue success with neural networks for reinforcement learning in spoken dialogue systems. In Interspeech. Sainbayar Sukhbaatar, Arthur Szlam, Jason Weston, and Rob Fergus. 2015. End-to-end memory networks. In NIPS. Ilya Sutskever, James Martens, and Geoffrey E. Hinton. 2011. Generating text with recurrent neural networks. In ICML. Ilya Sutskever, Oriol Vinyals, and Quoc V. Le. 2014. Sequence to sequence learning with neural networks. In NIPS. David R. Traum, 1999. Foundations of Rational Agency, chapter Speech Acts for Dialogue Agents. Springer. Oriol Vinyals and Quoc V. Le. 2015. A neural conversational model. In ICML Deep Learning Workshop. Tsung-Hsien Wen, Milica Gašić, Dongho Kim, Nikola Mrkšić, Pei-Hao Su, David Vandyke, and Steve Young. 2015a. Stochastic language generation in dialogue using recurrent neural networks with convolutional sentence reranking. In SIGdial. Tsung-Hsien Wen, Milica Gašić, Nikola Mrkšić, Pei-Hao Su, David Vandyke, and Steve Young. 2015b. Semantically conditioned lstm-based natural language generation for spoken dialogue systems. In EMNLP. Tsung-Hsien Wen, Milica Gašić, Nikola Mrkšić, Pei-Hao Su, Stefan Ultes, David Vandyke, and Steve Young. 2016a. A network-based end-to-end trainable taskoriented dialogue system. arXiv preprint:1604.04562. Tsung-Hsien Wen, Milica Gašić, Nikola Mrkšić, Pei-Hao Su, David Vandyke, and Steve Young. 2016b. Multidomain neural network language generation for spoken dialogue systems. In NAACL-HLT. Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron C. Courville, Ruslan Salakhutdinov, Richard S. Zemel, and Yoshua Bengio. 2015. Show, attend and tell: Neural image caption generation with visual attention. In ICML. Pengcheng Yin, Zhengdong Lu, Hang Li, and Ben Kao. 2016. Neural enquirer: Learning to query tables. In IJCAI. Steve Young, Milica Gašić, Simon Keizer, François Mairesse, Jost Schatzmann, Blaise Thomson, and Kai Yu. 2010. The hidden information state model: A practical framework for pomdp-based spoken dialogue management. Computer, Speech and Language. Steve Young, Milica Gašić, Blaise Thomson, and Jason D. Williams. 2013. Pomdp-based statistical spoken dialog systems: A review. Proceedings of IEEE. Appendix: More snapshot neuron visualisation Figure 5: More example visualisation of snapshot neurons and different generated responses.
9cs.NE
Large deformation and post-failure simulations of segmental retaining walls using mesh-free method (SPH) Simulations de grandes déformations et post-rupture des murs de soutènement segmentaires utilisant la méthode des mailles-libres (SPH) Bui H.H., Kodikara J.A, Pathegama R., Bouazza A., Haque A. Department of Civil Engineering, Monash University, Melbourne, Vic 3800, Australia. ABSTRACT: Numerical methods are extremely useful in gaining insights into the behaviour of reinforced soil retaining walls. However, traditional numerical approaches such as limit equilibrium or finite element methods are unable to simulate large deformation and post-failure behaviour of soils and retaining wall blocks in the reinforced soil retaining walls system. To overcome this limitation, a novel numerical approach is developed aiming to predict accurately the large deformation and post-failure behaviour of soil and segmental wall blocks. Herein, soil is modelled using an elasto-plastic constitutive model, while segmental wall blocks are assumed rigid with full degrees of freedom. A soft contact model is proposed to simulate the interaction between soil-block and block-block. A two dimensional experiment of reinforced soil retaining walls collapse was conducted to verify the numerical results. It is shown that the proposed method can simulate satisfactory post-failure behaviour of segmental wall blocks in reinforced soil retaining wall systems. The comparison showed that the proposed method can provide satisfactory agreement with experiments. RÉSUMÉ : Les méthodes numériques sont extrêmement utiles pour obtenir un aperçu du comportement des murs de soutènement en sol renforcé. Cependant, les approches numériques traditionnelles tels que l'équilibre limite ou méthodes d'éléments finis sont incapables de simuler les déformations importantes et le comportement post-rupture des sols et les blocs de béton des murs de soutènement segmentaires. Pour contourner cette limitation, une nouvelle approche numérique est présentée dans cet article. Le sol est modélisé à l'aide d'un modèle élasto-plastique, tandis que les blocs segmentaires muraux sont supposés être rigides avec une degré de liberté total. Un modèle de contact souple a été développé pour modéliser l'interaction entre le sol-bloc et bloc-bloc. Un modèle expérimentale en deux dimensions d’un effondrement d’un mur de soutènement renforcé a été réalisé pour vérifier les résultats numériques. Il est montré que la méthode de simulation proposée permet de simuler le comportement post-rupture des blocs de mur segmentaires des murs de soutènement renforcé. La comparaison a montré que la méthode proposée peut fournir un accord satisfaisant avec les résultats expérimentaux. KEYWORDS: retaining wall modelling, segmental walls, large deformation and failure, mesh-free, SPH. 1 modelled by spring and dashpot systems (Cundall & Strack, 1979). The main advantages of this approach are that it can handle large deformation and failure problems; and the concept is relatively simple and easy to implement in a computer code. Thus, DEM could be considered an ideal method to simulate the full degrees-of-freedom motion of the retaining wall blocks in SRW systems. However, to model soil behaviour, DEM suffers from low accuracy because suitable parameters for the contact model are difficult to determine. The discontinuous deformation analysis (DDA) method proposed by Shi et al. (1998) has also been applied to geotechnical applications, but is mainly used for rock engineering, etc. Other continuum based mesh-free methods such as the mesh-free Galerkin element method (EFG), material point method (MPM), particle in cell method (PIC), etc., could be also applied to simulate large deformation of soil. However, these methods are quite time consuming and complicated to implement into a computer code as they consist of both interpolation points and the background mesh. On the other hand, the smoothed particle hydrodynamics (SPH) method, originally proposed by Gingold & Monaghan (1977), has been recently developed for solving large deformation and postfailure behaviour of geomaterials (Bui et al. 2007-2012; Pastor et al. 2009, Blanc et al. 2012) and represents a powerful way to understand and quantify the failure mechanisms of soil in such challenging problems. In this paper, taking into consideration this unique advantage, SPH is further extended to simulate large deformation and post-failure of SRW systems. INTRODUCTION In recent years, segmental retaining walls (SRWs) have received great attentions for their low material cost, short construction period, ease of construction, and aesthetic appearance. They have been used as an effective method to stabilize cuts and fills adjacent to highways, and embankments, amongst many other applications. Because of the flexible structural materials used (no mortar, or concrete footing), SRWs can tolerate minor ground movement and settlement without causing damage or cracks. In addition, dry stacked SRW construction allows free draining of water through the wall face, thereby reducing hydrostatic pressure build-up behind the wall. Thus far, several analytical and numerical approaches have been developed to assist SWR design. Among these techniques, the finite element method (FEM) has been frequently applied to investigate stability and settlement of segmental retaining wall systems. FEM has also been used to simulate seismic loadinduced large deformation of SRW systems. However, because of the mesh-based nature, FEM suffers from mesh entangling when dealing with large deformation problems, even when the updated Lagrangian method is adopted. Re-meshing may help to resolve this problem but the procedure is quite complicated. It is also worth mentioning that the free rotation motion of retaining wall blocks in SWR systems could not be modeled by FEMs. As an alternative for such computational complications, it is attractive to develop mesh-free methods. So far, the most popular mesh-free method applied in geotechnical engineering is the discrete element method (DEM) which tracks the motion of a large number of particles, with inter-particle contacts 687 Proceedings of the 18th International Conference on Soil Mechanics and Geotechnical Engineering, Paris 2013 2 SIMULATION APPROACHES 2.1 In the SPH method, motion of a continuum is modeled using a set of moving particles (interpolation points); each assigned a constant mass and “carries” field variables at the corresponding location. The continuous fields and their spatial derivatives are taken to be interpolated from the surrounding particles by a weighted summation, in which the weights diminish with distance according to an assumed kernel function. Details of the interpolation procedure and its application to soil can be found in Bui et al. (2008). The motion of a continuum can be described through the following equation,  σ  g  f ext  u where I1 and J2 are the first and second invariants of the stress tensor; and  and kc are Drucker-Prager constants that are calculated from the Coulomb material constants c (cohesion) and  (internal friction). In plane strain, the Drucker-Prager constants are computed by, 9  12 tan  kc  3c (6) 9  12 tan 2  (7)  g p  I 1  J 2  constant where  is a dilatancy factor that can be related to the dilatancy angle  in a fashion similar to that between  and friction angle . Substituting Equation (7) into Equation (4) in association with the consistency condition, that is the stress state must be always located on the yield surface f during the plastic loading, the stress-strain relation of the current soil model at particle a can be written as, d a  2Ga ea  K aa  a dt  a 3K a a   (Ga / J 2 a ) sa  (2) (8)  where e is the deviatoric strain-rate tensor; s is the deviatoric shear stress tensor; and is the rate of change of plastic multiplier of particle a, which in SPH is specified by a  3 a K aa  (Ga / J 2 a )sa a (9) 9 a K a a  Ga where the strain-rate tensor is computed by  a 1    u    u  2   (10) a When considering a large deformation problem, a stress rate that is invariant with respect to rigid-body rotation must be employed for the constitutive relations. In the current study, the Jaumann stress rate is adopted:  a  a   a  a   a  a ̂ where (3) where De is the elastic constitutive tensor; is the strain rate tensor; and is its plastic component. An additive decomposition of the strain rate tensor has been assumed into elastic and plastic components. The plastic component can be calculated using the plastic flow rule, g p ε p   σ and 2 The non-associated plastic flow rule specifies the plastic potential function by, (1) where  and  denote Cartesian components x, y, z with the Einstein convention applied to repeated indices; a indicates the particle under consideration; a and b are the densities of particles a and b respectively; N is the number of “neighbouring particles”, i.e. those in the support domain of particle a; mb is the mass of particle b; C is the stabilization term employed to remove the stress fluctuation and tensile instability (Bui et al., 2011); W is the kernel function which is taken to be the cubic Spline function (Monaghan & Lattanzio 2005); and fext a is the unit external force acting on particle a. The stress tensor of soil particles in Equation (2) can be computed using any soil constitutive model developed in the literature. For the purpose of soil-structure interaction, the Drucker-Prager model has been chosen with non-associated flow rule, which was implemented in the SPH framework by Bui et al. (2008) and shown to be a useful soil model for simulating large deformation and post-failure behaviour of aluminum rods used in the current paper as model ground. The stress-strain relation of this soil model is given by,  σ D e : (ε  ε p ) tan    where u is the displacement; a raised dot denotes the time derivative;  is the density;  is the total stress tensor, where negative is assumed for compression; g is the acceleration due to gravity; and fext is the additional external force(s). The total stress tensor of soil is normally composed of the effective stress (´) and the pore-water pressure (pw), and follows Terzaghi’s concept of effective stress. Because the pore-water pressure is not considered, the total stress tensor and the effective stress are identical throughout this paper and can be computed using a constitutive model. In the SPH framework, Equation (1) is often discretized using the following form, N           a Wab  g a  f ext ua   mb  a2  b2  Cab a   b 1 b  a  (5) f    I 1  J 2  k c 0 Soil modelling in SPH framework (4) where is the rate of change of plastic multiplier, and gp is the plastic potential function. The plastic deformation occurs only if the stress state reaches the yield surface. Accordingly, plastic deformation will occur only if the following yield criterion is satisfied, 688   a (11) is the spin-rate tensor computed by 1    u    u  2   (12) a As a result, the final form of the stress-strain relationship for the current soil model is modified to d a   a  a   a  a  2Ga ea  K a a  a dt  a 3K a a   (G / J 2 ) a s a   (13) Equations (2) and (13) are finally integrated using Leapfrog algorithm to describe the motion of soil medium. Validation of this soil model with SPH has been extensively documented in Technical Committee 103 / Comité technique 103 the literature (Bui et al. 2008-2012), and reader can refer to these references for further details on the validation process. Rigid body motion of retaining wall blocks 2.2 The segmental retaining wall simulated in this paper is comprised of individual rectangular blocks; each is assumed as a rigid body and has complete degrees-of-freedom. The motion of the block can be determined by specifying the motion of the central mass and the rotation about its mass central. The equation of motion of the central mass is given as follows, M dV F dt (14) where M is the central mass, V is the velocity vector of the central mass, F is total force vector acting on the body. The equation of rotation about the central mass is, d I T dt (15) where I is the inertial moment,  is the angular velocity which is perpendicular to the plane of the motion, and T is the total torque about the central mass. In the computation, the rectangular block is represented by the set of boundary particles that are equi-spaced around the boundary. Denoting the force vector acting on each boundary particle i located on the moving block is fi, Equations (14) and (15) can be rewritten, respectively, as follows, dV   fi dt i d I  k (ri  R)  f i dt (16) M dri  V    ( ri  R ) dt (18)  n  d ai  ( ha  hi ) / 2 (21) cn  2 mai K ai (22)  k   cs vais f asi   ai s 0  In this paper, a soft contact model based on a concept of the spring and dash-pot system is proposed to model the interaction between soil and retaining wall blocks and between blocks. Accordingly, the radial force acting between two particles can be calculated using the following equation, (19) where K is the radial stiffness; n is the allowable overlapping distance between two particles; cn is the radial damping coefficient; vn is the relative radial velocity vector between particle a and particle i; ha and hi are the initial distance (so-called smoothing length in SPH) between soil particles and between boundary particles, respectively; and dai is the distance between two particles. The stiffness, overlapping 689 ( ha  hi )  2d ai (ha  hi )  2d ai (23) where kai is the shear stiffness; s is the relative displacement between the two particles in the shear direction; cs is the shear damping coefficient; vs is the relative shear velocity vector between particle a and particle i. These unknown variables can be calculated using the following relationships, k ai  4Geq heq n (24)  s   vais dt (25) cn  2 mai k ai (26) where Geq is the equivalent shear modulus. The current shear force must satisfy Coulomb’s friction law which implies that the maximum shear force must not exceed the maximum resisting force, s n f a i s (27) Finally, these forces are converted to the conventional coordinate system and added to Equations (2), (16) and (17) to progress the motion of soil and rigid bodies. 3 Contact force model (ha  hi )  2d ai ( ha  hi )  2d ai (20) f asi   The force fi acting on a boundary particle on the rigid body is due to the surrounding soil particles or boundary particles that belong to different rigid bodies. This force can be calculated using a suitable contact model which will be described in the next section.  K ai n3 / 2  cn vakn f ani   0  K ai  Eeff heff / 3 where Eeq and heq are equivalent Young’s modulus and smoothing length, respectively. The contact force in the shear direction which is perpendicular to the radial direction can be calculated in the same manner, (17) where ri and R are vector coordinates of boundary particle and central mass, respectively. The rigid body boundary particles move as a part of the rigid body, thus the change on position of boundary particle i is given by, 2.3 distance and damping coefficient can be calculated using the following relationships, OUTLINE OF MODEL TEST Two-dimensional experiments of retaining wall collapse were conducted to validate the SPH numerical results. Figure 1 shows a schematic diagram of the two-dimensional experimental setup and Figure 2 shows the initial setup condition of the model ground and retaining wall blocks in the experiment. The size of the model ground is 15cm in height and 50cm in width at the base. Aluminum rods of 5cm in length, having diameters of 1.5 to 3mm and mixed with the ratio 3:2 in weights, are used as the model ground. The total unit weight of the model ground is 23kN/m3. The retaining block is 3.2cm in width, 2.5cm in height, and 5cm in length, which is manufactured from aluminum (Young’s modulus of 69GPa and unit weight of 26.5kN/m3). In the experiment, the segmental retaining wall system was constructed by successively placing one block on the top of the other with an overlapping of 1.9cm, followed by filling the model ground at each layer. To visualize the failure pattern of the model ground, square grids (2.52.5cm) were drawn on the specimen. The experiments were initiated by quickly removing the stopper stand and digital photos were taken to record the failure process as well as the final configuration of the retaining wall system after collapse. Proceedings of the 18th International Conference on Soil Mechanics and Geotechnical Engineering, Paris 2013 Model ground (Aluminium bars) Retaining blocks a) Experimental results Stopper barrier 5cm Figure 1. Schematic diagram of 2D experimental model. Model ground (Aluminium bars) Wall blocks after collapse 6 Stopper stand 5 4 2 1 3 b) Computed results 5cm Retaining blocks Wall blocks after collapse 6 5 4 3 2 1 5cm 6 5 4 3 Figure 3. Comparison between experiment and SPH simulation. 2 1 5 Figure 2. Initial setting condition of the model test. In addition, tests were conducted to measure static friction coefficients. It was found that the static friction () between retaining wall blocks is  0.62, between wall block and the bottom wall boundary is  0.60, and between the retaining wall block and model ground is  0.56. The experiment series were conducted starting from one block and then gradually increasing the number of blocks in the retaining wall system until the retaining wall collapsed. It was observed that the retaining wall system collapsed when reaching 6 blocks. Accordingly, a numerical model consisting of 6 retaining wall blocks was conducted for the benchmark study. 4 RESULT AND DISCUSSION The model test shown in Figure 2 was simulated using 11,304 SPH particles arranged in a rectangular lattice with an initial separation of 0.25cm. Rigid blocks were created by placing boundary particles uniformly around the boundary at a constant distance. In order to simulate the smooth surface, half of particle spacing was chosen for the rigid body boundary particles. Model ground parameters including elastic modulus E =1.5MPa, Poisson’s ratio  = 0.3, friction angle  = 19.8o, dilatant angle  = 0o, and cohesion c = 0kPa were taken similar to those used in Bui et al. (2008). The unit weight of the ground model is s = 23kN/m3. The friction coefficients between the rigid blocks, between the block and the bases of the wall boundary, and between the block and the ground model were taken to be similar to those measured in the experiment as mentioned in Section 3. The boundary conditions for the model ground are restrained with a free-slip boundary at the lateral boundaries and fixed in both directions at the base. Figure 3 shows the comparison between the experiment and the computation. It can be seen that, because the complete degrees-of-freedom of the rigid body was taken into consideration, the computed result could predict fairly well the behaviour of all rigid blocks observed in the experiment after the SWR system collapsed. The final run-out distance of Block No.1 in the simulation is 67.5cm from the left-most solid boundary. This result is in very good agreement with that observed in experiment (68cm). It is suggested that the proposed soft contact model could be applied to simulate the soil-structure interaction in the SRW system. However, further refinement of the contact model should be considered to provide more accurate prediction of the retaining wall blocks and the model ground as the simulation results showed a slight overprediction of the failure zone observed in the experiment. 690 CONCLUSION AND FUTURE WORKS This paper presented a novel numerical approach for simulation of large deformation and post-failure of segmental retaining wall. It was shown that the proposed method provides good agreement with the experimental results. The most significant advantage of the new method is that the complete degrees-offreedom of the retaining wall blocks, which could not be simulated using traditional numerical approaches, can now be simulated in the proposed numerical framework. Large deformation and post-failure behaviour of geomaterials can also be readily simulated. To broaden the application of the proposed numerical approach, further implementations such as coupling with geo-grid reinforcement, modelling seismic earthquake loading, and bonding between blocks should be considered in the future. Full extension to three-dimension code would yield significant benefits to gain further insights into the mechanisms of SWR. 6 REFERENCES Bui H.H, Sako K, Fukagawa R. 2007. Numerical simulation of soilwater interaction using smoothed particle hydrodynamics (SPH) method. Journal of Terramechanics, 44, 339-346. Bui H.H, Fukagawa R, Sako K. and Ohno S. 2008. Lagrangian meshfree particle method (SPH) for large deformation and post-failure of geomaterials using elastic-plastic soil constitutive model, International Journal for Numerical and Analytical Methods in Geomechanics, 32, 1537-1570. Bui H.H, Fukagawa R, and Sako K. 2011. Slope stability analysis and discontinuous slope failure simulation by elasto-plastic smoothed particle hydrodynamics (SPH). Géotechnique, 61, 565-574. Bui H.H. and Fukagawa R. 2012. An improvement of SPH for saturated soils and its application to investigate the mechanisms of embankment failure: Case of hydrostatic pore-water pressure, International Journal for Numerical and Analytical Methods in Geomechanics. doi: 10.1002/nag.1084. Cundall P.A, Struck ODL. 1979. A discrete numerical model for granular assemblies. Géotechnique, 29, 47-65. Gingold R.A., Monaghan J.J. 1977. Smoothed particle hydrodynamics: Theory and application to non-spherical stars. Mon. Not. Roy. Astron. Soc., 181: 375-389. Monaghan J.J. 2003. SPH elastic dynamics. Computer Methods in Applied Mechanics and Engineering, 190, 6641-6662. Monaghan J.J, Lattanzio J.C. 1985. A refined particle method for astrophysical problems. Astronomic & Astrophysics, 149,135-143. Pastor M., Haddad B., Sorbino G., Cuomo S., Drempetic V. 2009. A depth-integrated, coupled SPH model for flow-like landslides and related phenomena. International Journal for Numerical and Analytical Methods in Geomechanics, 33, 143-172. Shi G.H. 1988. Discontinuous deformation analysis: a new numerical model for the static and dynamics of block systems. Ph.D. thesis, University of California, Berkeley.
5cs.CE
1 Dynamic Modularity Approach to Adaptive Inner/Outer Loop Control of Robotic Systems arXiv:1603.05557v4 [cs.SY] 7 Jan 2017 Hanlei Wang, Wei Ren, Chien Chern Cheah, Yongchun Xie, and Shangke Lyu Abstract—Modern applications of robotics typically involve a robot control system with an inner PI (proportional-integral) or PID (proportional-integral-derivative) control loop and an outer user-specified control loop. The existing outer loop controllers, however, do not take into consideration the dynamic effects of robots and their effectiveness relies on the ad hoc assumption that the inner PI or PID control loop is fast enough, and other torque-based control algorithms cannot be implemented in robotics with closed architecture. This paper investigates the adaptive control of robotic systems with an inner/outer loop structure, taking into full account the effects of the dynamics and the system uncertainties, and both the task-space control and joint-space control are considered. We propose a dynamic modularity approach to resolve this issue, and a class of adaptive outer loop control schemes is proposed and their role is to dynamically generate the joint velocity (or position) command for the low-level joint servoing loop. Without relying on the ad hoc assumption that the joint servoing is fast enough or the modification of the low-level joint controller structure, we rigorously show that the proposed outer loop controllers can ensure the stability and convergence of the closed-loop system. We also propose the outer loop versions of several standard joint-space direct/composite adaptive controllers for rigid or flexible-joint robots, and a promising conclusion may be that most torque-based adaptive controllers for robots can be designed to fit the inner/outer loop structure by using the new definition of the joint velocity (or position) command. Simulation results are provided to show the performance of various adaptive outer loop controllers, using a threeDOF (degree-of-freedom) manipulator, and experiment results using the UR10 robotic system are also presented. Index Terms—Inner/outer loop, adaptive control, dynamic modularity approach, robotics. I. I NTRODUCTION User-friendliness is an important aspect of modern automatic machines, especially if they are expected to do extensive work in cooperation with human beings. The control systems for modern robotic systems, unfortunately, have not yet reach this expectation though numerous control algorithms have been developed over the past several decades. To serve this purpose, the controlled robotic system might have to be reliable, robust, and flexible to satisfy the user’s needs. As we take a deep look at the development of computers (for instance, the recent hybrid computers—Surface Pro 4, iPad Pro, etc.), the module design plays a vital role in promoting their success in our everyday life. The relationship between the operating systems (e.g., the Windows System) and the application programs further validates the desirability of this module design philosophy. Historically, the applications of robotics have undergone the following phases: 1) Traditional industrial applications—factory automation in a structured environment with a simple joint-space PID (proportional-integral-derivative) inner loop control as well as inverse kinematics; H. Wang and Y. Xie are with the Science and Technology on Space Intelligent Control Laboratory, Beijing Institute of Control Engineering, Beijing 100094, China (e-mail: [email protected]; [email protected]). W. Ren is with the Department of Electrical and Computer Engineering, University of California, Riverside, CA 92521 USA (e-mail: [email protected]). C. C. Cheah and S. Lyu are with the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Republic of Singapore (e-mail: [email protected]; [email protected]). 2) Modern applications—beyond factory automation in an unstructured environment with sensory feedback in the task space, e.g., (outer loop) visual servoing and task-space control, which, however, either cannot be implemented in robotics with closed architecture or rely on the ad hoc assumption that the combination of the inner and outer loops is stable and the effect of the dynamics can be neglected. This ad hoc assumption typically (approximately) holds only on the occasion that the given task is slow enough. The inner/outer loop structure of robotic systems (e.g., most commercial robotic systems) enjoys certain module design flavor and has some desirable properties, e.g., it is beneficial for generating a high joint stiffness by employing a fast inner joint servoing while it is not reliable as directly specifying the control torque due to the limitation of the communication (generally required for exerting a coupling control action) reliability. For this reason, the gap between the study of advanced robot control theory and practical applications is longstanding. In the academic field, most advanced controller designs are torque-based and typically require an open torque control loop. In practical applications, the much more reliable and robust velocity control mode is adopted. It seems necessary here to recall the standard inner/outer loop structure of most commercial (industrial) robotic systems: 1) an outer (kinematic) loop using a centralized computer with enough computing power; 2) an inner dynamic loop that consists of n independent processors equipped at each joint in a decentralized way (i.e., each processor only receives/sends signals from/to its local sensors, actuator, and the centralized computer). The inner dynamic loop usually evolves at a much faster sampling than the outer (kinematic) loop. The attempts that aim to address the control of this kind of robotic systems in the task space occur in, e.g., [1], [2], [3], [4]. However, these controllers cannot ensure the tracking error convergence without significantly modifying the low-level PI (proportional-integral) controller to be a more complex one. One may note that these control algorithms are all based on the standard resolved motion rate control proposed by [5] to design the joint velocity command. Then what actually prevents the application of advanced robot controllers? Let us first retrospect the realization of the standard computed torque controller that has been discussed in [6, p. 209, p. 210] (see also the trajectory precorrection based on the computed torque feedforward in [7]). The specific procedure in [6] is to modify the terms in the feedforward action that may involve coupling by replacing certain signals (positions or velocities) with their desired values. In this way, no communication between the joint processors at the dynamic servoing loop is required since the desired values of all the joints are stored in each joint’s computer a priori (which would, on the other hand, mean that this algorithm is not flexible in the case that the desired trajectory is subjected to changes). The overall impression is that for the sake of reducing computational burden, this scheme performs the feedforward at the joint control loop in a relatively limited manner and with many nonlinear terms being neglected. Another important well-recognized reason is that most commercial/industrial robotic systems do not have an open torque control loop (see, e.g., [8]). These two factors give rise to the awkward situation of the modern torque-based robot control algorithms (e.g., the adaptive algorithms in [9], [10], [11], [12], [13], [14], [15] and the robust algorithms in [16], [17]), i.e., it is hard to apply these algorithms to robotic systems with an inner/outer loop structure. The precorrection scheme in [7], by producing a trajectory correction term based on the inverse manipulator dynamics and then adding it to the desired joint trajectory, improves the performance of the industrial robotic system without modifying the low-level controller structure. The main proofs 2 of the performance improvement, however, are by the experimental results rather than by the rigorous analysis. In this paper, we rigorously address this issue in the context of adaptive task-space/joint-space control for robotic systems with an embedded low-level PI joint velocity controller (or PID joint position controller) and with uncertain dynamics (and kinematics). The use of PI velocity controller or PID position controller in most industrial/commercial robotic systems is well recognized (see, e.g., [18], [19]). Our main purpose here is to develop a class of adaptive outer loop controllers that can ensure the stability and convergence of the robotic systems with the dynamic effect being taken into full account and without modifying the embedded inner PI or PID control loop. The application of the current adaptive (or robust) task-space regulation/tracking algorithms (e.g., [20], [21], [12], [13], [15], [22], [23], [14], [24], [25]) to robotic systems with an inner/outer loop structure, for a long period, relies on the ad hoc assumption that the inner joint servoing loop is fast enough or the modification of the inner joint controller structure. A preliminary version of the paper was presented in [26] where the simultaneous opening of the position and velocity commands is required. We here extend this preliminary result to address the case that only the position (or velocity) command is designable (which is considered to be much more common in most industrial/commercial robots), and to additionally consider the case of composite adaptation and joint flexibility as well as include the experimental results. We first propose two adaptive task-space regulation controllers that rule out the fundamental limitations of the existing results, by dynamically incorporating an adaptively scaled dynamic compensation that exploits the physically independent nature of the lowlevel controller structure. The first controller, by introducing an adaptive filter, avoids the task-space velocity measurement, and the second one avoids the use of the task-space velocity by using an observer [motivated by the one in [27] with a modified feedback gain (which depends on the estimated Jacobian matrix) to achieve feedback separation]. Both of the adaptive controllers are qualified outer loop control schemes that can be applied to robotic systems with an unmodifiable joint servoing controller (PI velocity or PID position controller) (e.g., most industrial/commercial robots), taking into account the dynamic loop of the robotic systems. From a robot control perspective, most existing kinematic algorithms are not mathematically rigorous in that either the effects of the inner joint control loop are not considered (e.g., [28], [29], [30]), or the low-level joint servoing controller is assumed to be strong enough to ensure (yet cannot rigorously guarantee due to the absence of dynamic compensation action in the low-level dynamic loop) the square-integrability and boundedess of the velocity tracking error (e.g., [31], [32]), or even the modification of the low-level controller structure (e.g., [1], [2], [3]). These limitations are mainly caused by the inner/outer loop structure and closed controller architecture. The proposed outer loop controller here, by dynamically incorporating adaptively scaled dynamic compensation action and adaptive transpose Jacobian feedback, ensures the singularity-robust stability and convergence of the task-space position error without relying on any modification of the low-level PI/PID controller structure. Due to the independence of the design of the outer loop controller and that of the low-level PI/PID controller and the injection of the dynamic compensation, the proposed design approach is referred to as dynamic modularity approach. We then show that the observer-based task-space regulation scheme can be extended to the case of task-space tracking. The obtained control scheme has an interesting feature that the inverse of the estimated Jacobian matrix is used for introducing feedforward and its transpose is used for introducing feedback, in contrast to most .LQHPDWLF SODQQHU qc  qc 3,YHORFLW\ 3,' SRVLWLRQ FRQWUROOHU 0DQLSXODWRU G\QDPLFV ,QQHU ORRS q q 2XWHU ORRS x 0DQLSXODWRU NLQHPDWLFV Fig. 1. Inner/outer loop control (qc is the position command, q̇c is the velocity command, and q, q̇, and x are the joint position, joint velocity, and task-space position, respectively). existing task-space algorithms that only employ the inverse of the Jacobian matrix to exert feedforward and feedback actions (see, e.g., [9], [33], [21], [14]), and the benefit of this lies in two folds: 1) it yields the feedback separation of the kinematic and dynamic loops, thus reducing the activity of the dynamic compensation action; 2) it is reducible in the sense that once the desired task-space velocity becomes zero, the tracking control law reduces to the regulation control law without involving the inverse of the estimated Jacobian matrix. Finally, we illustrate how the adaptively scaled dynamic compensation enables several typical adaptive robot controllers for jointspace trajectory tracking to be applicable to robotic systems with an inner/outer loop structure (e.g., most industrial/commercial robotic systems). In particular, the proposed dynamic modularity approach is further shaped to incorporate the composite adaptation for improving performance and to address the issue of joint flexibility. By these additional examples, it seems hopeful that most adaptive dynamic controllers for robots in the literature with the use of adaptively scaled dynamic compensation and new definition of the joint velocity (or position) command would be rendered to be qualified outer loop schemes. Another potential favorable point may be the reduction of the cost of the laboratory experimental research on advanced robot control theory in that there no longer needs to develop a specific manipulator with an open torque control loop (usually requiring extensive efforts and time) and any commercial robot (cost-efficient due to the large-scale production) can be directly used. II. P RELIMINARIES A. Background and Motivation Inner/outer loop control is typical in modern applications of robotic systems (see Fig. 1), and generally the inner loop is designed by the robot production company and closed and only the outer loop is open to the user. The user can specify the position or velocity command within the outer loop based on measurements in joint space [and task space (e.g., image space)], which is then sent to the inner loop as a reference signal. The main benefit of adopting an inner/outer loop structure may be that the inner loop (due to simplicity) can be operated at a high sampling rate and thus a high stiffness can be maintained, and that the outer loop can be operated at a low sampling rate allowing relatively complicated communication and sensing. In addition, inner/outer loop structure does help to realize the relative independence of the manipulator production company and the users, and to promote the large-scale production of manipulators due to the invariance of the inner control loop. Historically, most theoretical results on adaptive manipulator control are presented in the context that the joint torque is directly designable rather than in the framework of the inner/outer loop. This results in the longstanding gap between the study of advanced robot control theory and the applications of robots. The existing results (e.g., [1], [2], [3], [7], [28], [29], [30]) are either ad hoc, e.g., effective 3 under the assumption that the joint servoing is fast enough, relying on the modification of the low-level controller structure which is unmodifiable in practice, or not theoretically rigorous. Our main purpose is to develop a class of adaptive outer loop controllers using the task-space and joint-space sensory measurement (instead of obtaining the task-space information based on the kinematics as in Fig. 1 since the kinematics is unknown) to take place of the kinematic planner in Fig. 1 so that the stability and convergence of the closed-loop robotic systems with uncertain dynamics (and kinematics) can rigorously be ensured, and to finally approach the goal of “modularity”. B. Manipulator Kinematics and Dynamics Consider an n-DOF (degree-of-freedom) manipulator actuated by permanent magnet DC motors. Let x ∈ Rm be the position of the end-effector in the task space and it is relevant to the joint position by the following nonlinear mapping [34], [35] x = f (q) (1) where q ∈ Rn denotes the joint position and f : Rn → Rm is the mapping from joint space to task space. We here assume that n ≥ m, i.e., the manipulator can either be nonredundant or redundant. Differentiating (1) with respect to time yields the relation between the task-space velocity ẋ and joint velocity q̇ [34], [35] ẋ = J(q)q̇ III. A DAPTIVE I NNER /O UTER L OOP C ONTROL Kinematic control typically appears in the context of inner/outer loop control of robot manipulators and its focus is on the design of the joint velocity (or position) command. Historically, the effectiveness of kinematic control stands on the relatively strong assumption that the inner control (PI velocity control or PID position control) loop is fast enough so that the dynamic effects of the inner loop can be neglected. Here, we present a dynamic modularity approach to ensure the convergence of the task-space position error, without relying on this ad hoc assumption or the modification of the inner control loop. Let xd ∈ Rm denote the desired task-space position. For the regulation problem, it is set as constant; for the tracking problem, it can be set as time-varying and in this case, we assume that xd , ẋd , and ẍd are all bounded. A. Filter-Based Adaptive Regulation Control Consider the case that the inner control loop employs a PI velocity control, and the PI gains of the inner PI velocity control loop (the case of PID position control is discussed in Sec. III-D) are supposed to be KP and KI (diagonal and positive definite). Then, the PI action can be written as u = −KP (q̇ − q̇c ) − KI (q − qc ) . To avoid the task-space velocity measurement, we introduce the following adaptive passive filter (2) ẏ = −K1 y + K1 JˆT (q)∆x, m×n where J(q) ∈ R is the Jacobian matrix. If the kinematic parameters are unknown, the task-space position/velocity can no longer be derived by the direct kinematics given above. The typical practice in this case is to employ certain task-space sensors (e.g., a camera) to obtain the task-space position information. The dynamics of the manipulator can be written as [35] M (q)q̈ + C(q, q̇)q̇ + B q̇ + g(q) = Ku (3) where M (q) ∈ Rn×n is the inertia matrix, C(q, q̇) ∈ Rn×n is the Coriolis and centrifugal matrix, B ∈ Rn×n is a constant diagonal positive definite matrix, g(q) ∈ Rn is the gravitational torque, u ∈ Rn is the armature voltage, and K ∈ Rn×n is a constant diagonal positive definite matrix. Four basic properties associated with (2) and (3) that shall be useful for the controller design and stability analysis are listed as follows. Property 1 ([21]): The kinematics (2) depends linearly on a constant kinematic parameter vector ak , which gives rise to J(q)ψ = Yk (q, ψ)ak M (q)ζ̇ + C(q, q̇)ζ + Bζ + g(q) = Yd (q, q̇, ζ, ζ̇)ad (5) where ζ ∈ Rn is a differentiable vector, ζ̇ is the time derivative of ζ, and Yd (q, q̇, ζ, ζ̇) is the dynamic regressor matrix. (7) upon which, we define the joint reference velocity as q̇r = −K2 y (8) where ∆x = x − xd , K1 and K2 are diagonal positive definite matrices, and Jˆ(q) is the estimate of the Jacobian matrix J(q) and is obtained by replacing ak in J(q) with its estimate âk . Define a sliding vector s = q̇ − q̇r . (9) Substituting (8) into (2) and using Property 1 gives ˆ q̇r + J(q) ˆ q̇ ẋ = − Jˆ(q)K2 y − [Jˆ(q) − J(q)]q̇ − J(q) ˆ ˆ = − J (q)K2 y − Yk (q, q̇)∆ak + J (q)s. (10) where ∆ak = âk − ak . We define the joint velocity command by the following dynamic system (4) where ψ ∈ Rn is a vector and Yk (q, ψ) is the kinematic regressor matrix. Property 2 ([36], [35]): The inertia matrix M (q) is symmetric and uniformly positive definite. Property 3 ([36], [35]): The matrix C(q, q̇) can be appropriately defined such that the matrix Ṁ (q) − 2C(q, q̇) is skew-symmetric. Property 4 ([36], [35]): The dynamics (3) depends linearly on a constant dynamic parameter vector ad , which yields (6) with q̇c + K̂I qc =q̇r + K̂I qr + diag[ŵi , i = 1, . . . , n] h i × −αJˆT (q)∆x + Yd (q, q̇, q̇r , q̈r )âd qr =qr (0) + Z (11) t q̇r (σ)dσ (12) 0 where qr (0) can be chosen as an arbitrary constant vector, α is a positive design constant, âd is the estimate of ad , ŵi denotes the scale weight, i = 1, . . . , n, diag[ŵi , i = 1, . . . , n][−αJˆT (q)∆x + Yd (q, q̇, q̇r , q̈r )âd ] denotes the adaptively scaled dynamic compensation action, and K̂I denotes the estimate of KI = KP−1 KI , which can be expressed as K̂I = diag[ŵI ] (13) 4 with ŵI being an n-dimensional vector. The adaptation laws for âk , ŵ = [ŵ1 , . . . , ŵn ]T , âd , and ŵI are given as â˙ k = Γk YkT (q, q̇)∆x ŵ˙ = −Λdiag[−αJˆT (q)∆x + Yd (q, q̇, q̇r , q̈r )âd ]s â˙ d = −Γd YdT (q, q̇, q̇r , q̈r )s ŵ˙ I = ΛI diag[qc − qr ]s (14) (15) (16) (17) where Λ and ΛI are diagonal positive definite matrices, and Γk and Γd are symmetric positive definite matrices. ˆ Theorem 1: Suppose that K̂I is uniformly positive definite and J(q) has full row rank. Then, the adaptive outer loop controller given by (11), (12), (14), (15), (16), and (17) for the robotic system (2) and (3) under the inner PI controller (6) ensures the stability of the system and convergence of the task-space position error, i.e., ∆x → 0 as t → ∞. Proof: Substituting (6) and (11) into the manipulator dynamics (3) and taking into account Property 4 gives M (q)ṡ + C(q, q̇)s 3) V̇ = −αy T K2 y − sT (K ∗ + B)s ≤ 0. (20) Rt Then we obtain that y ∈ L2 ∩ L∞ , s ∈ L2 ∩ L∞ , 0 s(σ)dσ ∈ L∞ ∆x ∈ L∞ , ŵ ∈ L∞ , âk ∈ L∞ , âd ∈ L∞ , and ŵI ∈ L∞ . From (7), we obtain that ẏ ∈ L∞ and thus y is uniformly continuous. From the properties of square-integrable and uniformly continuous functions [37, p. 232], we obtain that y → 0 as t → ∞. From (8), we know that q̇r ∈ L∞ and thus q̇ ∈ L∞ . From (14), we obtain ˆ˙ that â˙ k ∈ L∞ , giving rise to the boundedness of J(q). From (2), we obtain that ẋ ∈ L∞ , and we then obtain that ÿ ∈ L∞ based on (7). This means that ẏ is uniformly continuous and thus ẏ → 0 as t → ∞ according to Barbalat’s Lemma [36]. From (7), we then obtain that JˆT (q)∆x → 0 as t → ∞. This means that ∆x → 0 as t → ∞ ˆ since J(q) has full row rank. Furthermore, the result that ẏ ∈ L∞ yields the conclusion that q̈r ∈ L∞ . Rewrite (11) as (q̇c − q̇r ) + K̂I (qc − qr ) h i = diag[ŵi , i = 1, . . . , n] −αJˆT (q)∆x + Yd (q, q̇, q̇r , q̈r )âd , and it can be directly shown that qc − qr ∈ L∞ and q̇c − q̇r ∈ L∞ since K̂I is uniformly positive definite. We then obtain that q̇c ∈ L∞ . From (18), we obtain that ṡ ∈ L∞ using Property 2, and further that − K ∗ ∆KI qc − Yd (q, q̇, q̇r , q̈r )ad   q̈ ∈ L∞ . Hence s is uniformly continuous, yielding the result that = − Bs − K ∗ (q̇ + KI q) + K ∗ q̇r + K̂I qr s → 0 as t → ∞ according to the properties of square-integrable h i and uniformly continuous functions [37, p. 232]. This immediately ∗ T + K diag[ŵi , i = 1, . . . , n] −αJˆ (q)∆x + Yd (q, q̇, q̇r , q̈r )âd gives the conclusion that q̇ → 0 as t → ∞ since q̇r = −K2 y → 0 as t → ∞.  − K ∗ ∆KI qc − Yd (q, q̇, q̇r , q̈r )ad ∗ ∗ Remark 1: The introduction of the adaptive scales ŵ and ŵ I = − Bs − K (q̇ + KI q) + K (q̇r + KI qr ) h i is to accommodate the uncertain diagonal matrices K ∗ = KKP + K ∗ diag[ŵi , i = 1, . . . , n] −αJˆT (q)∆x + Yd (q, q̇, q̇r , q̈r )âd and KP−1 KI , and their uncertainty comes from both the actuator ∗ model and low-level controller design (generally performed by the − K ∆KI (qc − qr ) − Yd (q, q̇, q̇r , q̈r )ad   Z t robot production company). The part due to the actuator model (i.e., K) is inherently uncertain and may possibly be subjected to slow q̇r (σ)dσ + δ0 = − (K ∗ + B)s − KKI q − q(0) − 0 variation. The uncertainty of the part due to the low-level controller + K ∗ diag[ŵi , i = 1, . . . , n][−αJˆT (q)∆x + Yd (q, q̇, q̇r , q̈r )âd ] design (i.e., KP and KI ) is a business strategy for protecting the intellectual property right and thus it is and will be impossible to be − Yd (q, q̇, q̇r , q̈r )ad  Z t disclosed thoroughly in the short run. In addition, the adaptive scale s(σ)dσ + δ0 = − (K ∗ + B)s − αJˆT (q)∆x − KKI ŵ used here is computationally efficient and free of computational 0 singularity since it does not involve the computation of inverse of ∗ ∗−1 + K (diag[ŵi − ki , i = 1, . . . , n]) an estimated quantity (which, however, would be encountered if we × [−αJˆT (q)∆x + Yd (q, q̇, q̇r , q̈r )âd ] directly estimate the matrix K ∗ ). Similar techniques for handling the ∗ uncertainty of the diagonal torque-constant matrix (which describes − K ∆KI (qc − qr ) + Yd (q, q̇, q̇r , q̈r )∆ad  Z t the relation between the torque and current) appear in the context s(σ)dσ + δ0 = − (K ∗ + B)s − αJˆT (q)∆x − KKI of adaptive control for rigid-link electrically-driven robots or robots 0 with actuator uncertainty, yet with an open controller structure (i.e., + diag[−αJˆT (q)∆x + Yd (q, q̇, q̇r , q̈r )âd ]K ∗ ∆w the voltage can be directly specified by the user) [38], [11]. Remark 2: The uniform positive definiteness of K̂P can be con− K ∗ diag[qc − qr ]∆wI + Yd (q, q̇, q̇r , q̈r )∆ad (18) veniently ensured by using the projection algorithms [39], and the where δ0 = q(0) − qr (0) is a constant vector, K ∗ = KKP = full row rank of Jˆ(q) can be ensured by the assumption of being ∗ ∗ diag[kii , i = 1, . . . , n] with kii , i = 1, . . . , n being positive away from the singular configuration and the use of the projection ∗−1 ∗−1 T , . . . , ŵn − knn ] , algorithms [21], [13]. constants, ∆ad = âd − ad , ∆w = [ŵ1 − k11 and ∆wI = ŵI − wI with the entries of wI being from the diagonal Remark 3: The adaptive filter (7) with K1 JˆT (q)∆x as the input entries of KI . Consider the following Lyapunov function candidate can be considered as an extension of [40] to address the avoidance of 1  task-space velocity measurement in the context of adaptive task-space 1 T 1 T −1 T −1 V =α ∆x ∆x + y K2 K1 y + ∆ak Γk ∆ak control. Clearly, the joint velocity command given by (11) no longer 2 2 2  Z t T Z t involves the task-space velocity measurement since q̈r = −K2 ẏ and 1 1 + sT M (q)s + s(σ)dσ + δ0 ẏ given by (7) does not involve the task-space velocity. s(σ)dσ + δ0 KKI 2 2   = − Bs − K ∗ (q̇ + KI q) + K ∗ q̇c + K̂I qc 0 0 1 1 1 ∗ ∆wIT Λ−1 + ∆wT Λ−1 K ∗ ∆w + ∆aTd Γ−1 I K ∆wI d ∆ad + 2 2 2 (19) whose derivative with respect to time along the trajectories of (18), (7), (10), (14), (15), (16), and (17) can be written as (using Property B. Observer-Based Adaptive Regulation Control The task-space observer is given as ẋo = Jˆ(q)q̇r − β Jˆ(q)JˆT (q)∆xo (21) 5 where xo ∈ Rm denotes the observed quantity of x, ∆xo = xo − x, and β is a positive design constant, and the joint reference velocity q̇r is now defined as ˆT q̇r = −J (q) [γ(xo − xd )] (22) where γ is a positive design constant. The observer (21) is motivated ˆ JˆT (q) for the purpose of by [27] yet with a new feedback gain β J(q) achieving feedback separation, and the idea behind is that the actual joint velocity finally approaches the joint reference velocity q̇r and ˆ q̇r would approach the estimated task-space velocity Jˆ(q)q̇. thus J(q) The desirable point is that the observer no longer depends on the joint velocity and is thus not influenced by the noise of the velocity signal. The joint velocity command is defined as q̇c + K̂I qc =q̇r + K̂I qr + diag[ŵi , i = 1, . . . , n] × Yd (q, q̇, q̇r , q̈r )âd (23) which no longer needs the scaled dynamic compensation action diag[ŵi , i = 1, . . . , n][−αJˆT (q)∆x]. The adaptation laws for âk and ŵ are given as â˙ k = Γk YkT (q, q̇)(∆x − ∆xo ) ŵ˙ = −Λdiag[Yd (q, q̇, q̇r , q̈r )âd ]s (24) ˆ JˆT (q)∆xo + Yk (q, q̇)∆ak − J(q)s. ˆ ∆ẋo = −β J(q) (26) ˆ JˆT (q) [γ(xo − xd )] + Yk (q, q̇)∆ak . Jˆ(q)s =ẋ + J(q) (27) ˆ By premultiplying s = q̇ − q̇r with J(q) and using Property 1, we obtain Therefore, at the outer loop, we obtain ˆ ∆ẋo = − β Jˆ(q)JˆT (q)∆xo + Yk (q, q̇)∆ak − J(q)s (28) T ẋ = − Jˆ(q)Jˆ (q) [γ(xo − xd )] − Yk (q, q̇)∆ak + Jˆ(q)s. (29) We are presently ready to formulate the following theorem. Theorem 2: Suppose that K̂I is uniformly positive definite and ˆ J(q) has full row rank, and let the controller parameters β and γ be chosen such that β > 4γ/9. (30) The adaptive outer loop controller given by (23), (12), (21), (24), (25), (16), and (17) with q̇r being given as (22) for the robotic system (2) and (3) under the inner PI controller (6) ensures the stability of the system and convergence of the task-space position error, i.e., ∆x → 0 as t → ∞. Proof: Substituting (6), (23), and (12) into (3) and using Property 4 gives  Z t s(σ)dσ + δ0 M (q)ṡ + C(q, q̇)s = − (K ∗ + B)s − KKI 0 + diag[Yd (q, q̇, q̇r , q̈r )âd ]K ∗ ∆w + Yd (q, q̇, q̇r , q̈r )∆ad . Consider the Lyapunov-like function candidate T Z t 1 1 V ∗ = sT M (q)s + s(σ)dσ + δ0 KKI 2 2 0  Z t 1 s(σ)dσ + δ0 + ∆wT Λ−1 K ∗ ∆w × 2 0 1 1 ∗ + ∆aTd Γ−1 ∆wIT Λ−1 I K ∆wI d ∆ad + 2 2 V̇ ∗ = −sT (K ∗ + B)s ≤ 0 (31) (32) (33) where we have used RProperty 3. This directly gives the conclusion t that s ∈ L2 ∩ L∞ , 0 s(r)dr ∈ L∞ , ŵ ∈ L∞ , âd ∈ L∞ , and ŵ R tI T∈ L∞ . Then, there exists a positive constant ℓM such that s (σ)s(σ)dσ ≤ ℓM , ∀t ≥ 0. Let us now consider the following 0 quasi-Lyapunov function candidate 1 1 1 V ∗∗ = ∆xTo ∆xo + ∆xT ∆x + ∆aTk Γ−1 k ∆ak 2  2 h Z t 2 i 1 1 + + ℓM − sT (σ)s(σ)dσ β γ 0 (34) with the choice of the last term following the typical practice (see, e.g., [41, p. 118]), and the derivative of V ∗∗ along the trajectories of (28), (29), and (24) can be written as V̇ ∗∗ = − β∆xTo Jˆ(q)JˆT (q)∆xo ˆ ˆ JˆT (q)∆xo − ∆xTo J(q)s − γ∆xT J(q) ˆ JˆT (q)∆x + ∆xT Jˆ(q)s − − γ∆xT J(q) (25) The adaptation laws for âd and ŵI remain the same as (16) and (17), respectively. Combining (21) and (2) and using Property 1 yields − K ∗ diag[qc − qr ]∆wI whose derivative with respect to time along the trajectories of (31), (25), (16), and (17) can be written as  1 1 + β γ  sT s. (35) Using the following results derived from the standard basic inequalities β ˆ JˆT (q)∆xo + 1 sT s ˆ (36) ∆xTo J(q)s ≤ ∆xTo J(q) 4 β 1 γ ˆ (37) ∆xT J(q)s ≤ ∆xT Jˆ(q)JˆT (q)∆x + sT s 4 γ we obtain from (35) that 3β ˆ JˆT (q)∆xo ∆xTo J(q) 4 3γ ˆ JˆT (q)∆x − γ∆xT Jˆ(q)JˆT (q)∆xo − ∆xT J(q) 4  T T   T  Jˆ (q)∆xo (3β/4)In (γ/2)In Jˆ (q)∆xo ≤ − ˆT ≤0 T (γ/2)In (3γ/4)In J (q)∆x Jˆ (q)∆x {z } | V̇ ∗∗ ≤ − Q (38) due to the positive definiteness of Q in the case that β > 4γ/9, where In is the n × n identity matrix. Then using similar procedures as in the proof of Theorem 1, we can show the stability of the ˆ system [regardless of the estimated Jacobian matrix J(q)] and the convergence of ∆x and ∆xo .  Remark 4: The existing adaptive (or robust) task-space regulation algorithms either assume the exact knowledge of the gravitational torques [21], [12], or require the careful choice of the controller parameters [20], [42], [22], or encounter the overparametrization problem [22]. Furthermore, many adaptive visual tracking schemes (e.g., [21], [24], [14], [25]) have also been proposed, yet the necessity of investigating task-space regulation algorithms is due to the consideration that the choice of specific controllers should take into account the properties of the specific tasks. It is well accepted that given a specific task, the control law should be as (computationally) simple as possible; while the adaptive tracking controllers can also achieve the regulation of the task-space position to the desired one (constant), it is not cost-effective to rely on such kind of complexity (usually involves the inverse of the estimated Jacobian and the singularity issues) for regulation tasks. The two adaptive regulation controllers presented here rule out the limitations of the above results, and in addition the proposed controllers can be applied to robotic systems with an inner/outer loop structure (e.g., most industrial/commercial 6 robotic systems) that have an unmodifiable joint servoing controller but admit the design of the joint velocity (or position) command, benefiting from the dynamic feedback design and the use of the adaptively scaled dynamic compensation action. need to make some modifications. We take the filter-based adaptive regulation control in Sec. III-A as an illustrating example and the other controllers can be similarly formulated. Specifically, we define two quantities below C. Extension to Task-Space Tracking q̇r∗ =q̇r − Kc (q − qr ) In the case of task-space tracking, a feedforward action needs to be introduced in the definition of the joint reference velocity. Specifically we define q̇r as q̇r = JˆT (q)[Jˆ(q)JˆT (q)]−1 ẋd −γ JˆT (q)(xo − xd ) | {z }| {z } feeforward =q̈r − Kc (q̇ − q̇r ) (44) with qr being generated by ˆ where the use of the generalized inverse of J(q) follows the typical practice. The definition given by (39) extends the one in [31] to address the case of no task-space velocity measurement. The ˆ interesting point here is that both the inverse and transpose of J(q) are incorporated, and one is for introducing a feedforward action and the other for introducing a feedback action. This is in contrast to most existing task-space control algorithms that rely on the use of the inverse of the (estimated) Jacobian matrix to exert both the feedforward and feedback actions (see, e.g., [9], [33], [14]). As can be clearly observed, once the desired task-space velocity becomes zero, q̇r in (39) reduces to the one defined by (22), and this means that the regulation and tracking cases are unified. Theorem 3: Suppose that K̂I is uniformly positive definite and ˆ J(q) has full row rank, and let the controller parameters β and γ be chosen such that β > 4γ/9. (40) The adaptive outer loop controller given by (23), (12), (21), (24), (25), (16), and (17) with q̇r being given as (39) for the robotic system (2) and (3) under the inner PI controller (6) ensures the stability of the system and convergence of the task-space tracking errors, i.e., ∆x → 0 and ∆ẋ → 0 as t → ∞. The proof of Theorem 3 can be straightforwardly completed based on that of Theorem 2, and the major difference lies in the fact that equation (29) for the case of regulation problem now becomes ˆ J (q) [γ(xo − xd )] − Yk (q, q̇)∆ak + Jˆ(q)s. ∆ẋ = −J(q) (43) (39) feedback ˆT q̈r∗ q̇r = −Kc qr − K2 y + Kc q −1 where Kc is a diagonal positive definite matrix. Let KP = KD KP −1 and KI = KD KI and denote by K̂P and K̂I the estimate of KP and that of KI , respectively, which are specifically written as K̂P =diag[ŵP ] D. Task-Space Adaptive Control With an Inner PID Position Controller We here investigate another case that the low-level controller takes the PID position control action, i.e., Z t u = −KD (q̇ − q̇c ) − KP (q − qc ) − KI [q(σ) − qc (σ)]dσ (42) 0 where KD , KP , and KI are the derivative, proportional, and integral gains (diagonal and positive definite), respectively. In this case, to ensure the stability and convergence of the robotic system, we (46) K̂I =diag[ŵI ] (47) with ŵP and ŵI being n-dimensional vectors. The joint velocity command for the low-level PID controller is defined as q̇c + K̂P qc + K̂I Z t 0 [qc (σ) − qr (σ)] dσ =q̇r∗ + K̂P qr + diag[ŵi , i = 1, . . . , n] h i × −αJˆT (q)∆x + Yd (q, q̇, q̇r∗ , q̈r∗ )âd . (41) By an analysis of the system given by (28), (41), and (24), we can derive the stability of the system and convergence of the task-space tracking errors. Remark 5: The filter-based adaptive regulation algorithm is computationally simpler in comparison with the observer-based one. But the main issue of the filter-based algorithm is that it is difficult to quantitatively evaluate the performance. Here the observer-based algorithm is extended to cover the case of task-space tracking by additionally introducing feedforward based on the generalized inverse of the estimated Jacobian matrix [see (39)]. The extension of the filter-based algorithm to realize the task-space tracking can be completed in a similar way. (45) (48) The adaptation laws for ŵ, âd , ŵP , and ŵI are now given as ŵ˙ = −Λdiag[−αJˆT (q)∆x + Yd (q, q̇, q̇r∗ , q̈r∗ )âd ]ξ â˙ d = −Γd YdT (q, q̇, q̇r∗ , q̈r∗ )ξ ŵ˙ P = ΛP diag[qc − qr ]ξ Z t  ŵ˙ I = ΛI diag [qc (σ) − qr (σ)]dσ ξ (49) (50) (51) (52) 0 with ξ = q̇ − q̇r∗ = s + Kc Z t  s(σ)dσ + δ0 , 0 (53) and ΛP and ΛI being diagonal positive definite matrices, and the adaptation law for âk is still the same as (14). With these modifications and using the fact that q − qr = 7 Rt 0 inite. The derivative of V can be written as s(σ)dσ + δ0 , equation (18) becomes V̇ = − αy T K2 y − sT (K̄ ∗ + B)s Z T Z t − s(σ)dσ + δ0 KMKc M (q)ξ̇ + C(q, q̇)ξ = − (K̄ ∗ + B)ξ − αJˆT (q)∆x Z t − KKP (q − qr ) − KKI [q(σ) − qr (σ)]dσ 0 t 0  s(σ)dσ + δ0 ≤ 0. (58) 0 Theorem 4: Suppose that K̂P and K̂I evolve such that the following + diag[−αJˆT (q)∆x + Yd (q, q̇, q̇r∗ , q̈r∗ )âd ]K̄ ∗ ∆w  Z t system [qc (σ) − qr (σ)]dσ ∆wI − K̄ ∗ diag[qc − qr ]∆wP − K̄ ∗ diag z̈ + K̂P ż + K̂I z = 0 (59) 0 + Yd (q, q̇, q̇r∗ , q̈r∗ )∆ad = − (K̄ ∗ + B)ξ − αJˆT (q)∆x − (KKP − KKI Kc−1 )(q − qr )   Z t [q(σ) − qr (σ)]dσ − KKI Kc−1 q − qr + Kc 0 + diag[−αJˆT (q)∆x + Yd (q, q̇, q̇r∗ , q̈r∗ )âd ]K̄ ∗ ∆w Z t  − K̄ ∗ diag[qc − qr ]∆wP − K̄ ∗ diag [qc (σ) − qr (σ)]dσ ∆wI 0 + Yd (q, q̇, q̇r∗ , q̈r∗ )∆ad = − (K̄ ∗ + B)ξ − αJˆT (q)∆x  Z t s(σ)dσ + δ0 − (KKP − KKI Kc−1 ) 0  Z t −1 ξ(σ)dσ + δ0 − KKI Kc 0 + diag[−αJˆT (q)∆x + Yd (q, q̇, q̇r∗ , q̈r∗ )âd ]K̄ ∗ ∆w  Z t [qc (σ) − qr (σ)]dσ ∆wI − K̄ ∗ diag[qc − qr ]∆wP − K̄ ∗ diag 0 + Yd (q, q̇, q̇r∗ , q̈r∗ )∆ad (54) where K̄ ∗ = KKD . The above equation can further be written as M (q)ξ̇ + C(q, q̇)ξ =diag[−αJˆT (q)∆x + Yd (q, q̇, q̇r∗ , q̈r∗ )âd ]K̄ ∗ ∆w  Z t [qc (σ) − qr (σ)]dσ ∆wI − K̄ ∗ diag[qc − qr ]∆wP − K̄ ∗ diag 0 + Yd (q, q̇, q̇r∗ , q̈r∗ )∆ad − αJˆT (q)∆x h − K (KD + K −1 B)s + [(KD + K −1 B)Kc + (KP − KI Kc−1 )]  Z t −1 ξ(σ)dσ + δ0 . − KKI Kc Z t s(σ)dσ + δ0 0 i (55) 0 Consider the Lyapunov function candidate 1  1 1 V =α ∆xT ∆x + y T K2 K1−1 y + ∆aTk Γ−1 k ∆ak 2 2 2  Z t T Z t 1 1 T ξ(σ)dσ + δ0 ξ(σ)dσ + δ0 KKI + ξ M (q)ξ + 2 2 0 0 T Z t 1 + s(σ)dσ + δ0 (KM + KKc KD + Kc B) 2  Z t 0 1 1 × s(σ)dσ + δ0 + ∆wT Λ−1 K̄ ∗ ∆w + ∆aTd Γ−1 d ∆ad 2 2 0 1 1 ∗ ∗ ∆wIT Λ−1 (56) + ∆wPT Λ−1 P K̄ ∆wP + I K̄ ∆wI 2 2 where M = (KD + K −1 B)Kc + KP − KI Kc−1 . (57) By suitably choosing Kc , we can ensure that M is positive semidef- ˆ with z ∈ Rn is uniformly exponentially stable and that J(q) has full row rank, and choose the matrix Kc such that M given by (57) is positive semidefinite. Then the adaptive outer loop controller given by (48), (12), (7), (45), (49), (50), (51), (52), and (14) for the robotic system (2) and (3) under the inner PID position controller (42) ensures the stability of the system and convergence of the task-space position error, i.e., ∆x → 0 as t → ∞. The proof of Theorem 4 can be completed by following similar steps as in the proof of Theorem 1. Remark 6: 1) One key issue in the case of using a low-level PID controller is the choice of Kc , and obviously large enough Kc can ensure that M is positive semidefinite. The remaining thing is how to determine the gain Kc . In practice, since the damping matrix B may be quite small, we thus neglect it and this implies that kc,ii (i.e., the i-th diagonal entry of Kc ) should satisfy kc,ii ≥ kP,ii + 2kI,ii q , ∀i = 1, . . . , n 2 kP,ii + 4kI,ii kD,ii (60) where kD,ii is the i-th diagonal entry of KD , kP,ii is the i-th diagonal entry of KP , and kI,ii is the i-th diagonal entry of KI . Here we face the similar situation as the control engineers of the robot production company. The control engineers are usually careful about the choice of the integral gain and large gain may cause instability; a trade-off has to be made between the attenuation of constant disturbances and the stability margin of the control system. In practice, kP,ii and kD,ii are possibly/generally chosen to be not less than kI,ii , √and in this case, we can simply choose kc,ii as kc,ii ≥ ( 5 − 1)/2, ∀i = 1, . . . , n. 2) An important issue in proving Theorem 4 is to clarify the inputoutput properties of the following system [derived from (48)] Z t [qc (σ) − qr (σ)]dσ q̇c − q̇r + K̂P (qc − qr ) + K̂I 0 h i =diag[ŵi , i = 1, . . . , n] −αJˆT (q)∆x + Yd (q, q̇, q̇r∗ , q̈r∗ )âd − Kc (q − qr ) (61) where the right side is bounded. The main issue can now be reduced to investigating the stability of the linear timevarying system (59). By the assumption that the system (59) is uniformly R t exponentially stable, we can directly obtain from (61) that 0 [qc (σ)−qr (σ)]dσ, qc −qr , and q̇c − q̇r are bounded. Then the boundedness of q̈ can be ensured. On the other hand, by the standard projection algorithms [39], we can conveniently ensure that K̂P and K̂I are uniformly positive. In addition, the boundedness of K̂P and K̂I is a direct consequence of that of the Lyapunov function candidate given by (56). But even under these two conditions, we still cannot ensure the uniform exponential stability of (59) [which is a sufficient condition to ensure the uniform bounded-input bounded-output stability of (61) according to the standard linear 8 system theory] since the coefficient matrices are time-varying. In practice, we may slow down the adaptation to KP and KI (i.e., slow down the variation of K̂P and K̂I ) so that the system (59) is a slowly time-varying (or quasi-time-invariant) linear system. IV. G ENERALIZATIONS AND F URTHER D ISCUSSIONS Let us now discuss the proposed framework in other closely related topics concerning adaptive robot control. A. Direct Adaptation The first result that we would like to discuss is the well-known Slotine and Li adaptive controller [9] and the result there is presented in the context of open joint torque control. If we redefine q̇r in (22) as q̇r = q̇d − ᾱ(q − qd ) (62) with qd ∈ Rn being the desired joint position and ᾱ a positive design constant, then the adaptive controller given by (23), (12), (15), (16), and (17) with q̇r being defined by (62) becomes an outer loop (“applicable”) version of Slotine and Li adaptive controller suitable for practical robotic systems (without opening the torque control module) with an unmodifiable inner PI velocity control loop (in the case of an inner PID position controller, its outer loop version can be similarly developed by following the steps in Sec. III-D). In this case of the joint-space position tracking, one can easily show that the position command qc = qd is also qualified for ensuring the stability of the robotic system and convergence of the joint tracking errors. B. Composite Adaptation The implementation of the standard composition adaptation algorithm given in [43] in the framework of inner/outer controller structure seems not straightforward and we need to ensure that no additional number of parameters appear in the filtered dynamic model (i.e., avoiding the overparameterization). For this purpose, we rewrite the dynamics (3) as diag[wi , i = 1, . . . , n][M (q)q̈ + C(q, q̇)q̇ + B q̇ + g(q)] = KP−1 u = −(q̇ − q̇c ) − KP−1 KI (q − qc ) (63) and by using the filtering technique in [43], we then have the following equation without involving joint acceleration measurement diag[wi , i = 1, . . . , n]Yf (q, q̇, t)ad = u∗f − diag[wI,i , i = 1, . . . , n]hf ki∗−1 , (64) −1 wI,i = kP,ii kI,ii , i = 1, . . . , n, Yf (q, q̇, t) = λ λf ∗ f uf = − p+λf (q̇ − q̇c ), and hf = p+λ (q − qc ) f where wi = λf Y (q, q̇, q̇, q̈), p+λf d with p and λf > 0 being the Laplace variable and the filter parameter, respectively. Let û∗f = diag[ŵ]Yf âd + diag[hf ]ŵI (65) T where ŵI is the estimate of wI = [wI,1 , . . . , wI,n ] . Then we define a prediction error ef =û∗f − u∗f =diag[w]Yf ∆ad + diag[Yf âd ]∆w + diag[hf ]∆wI (66) and the composite adaptive version of (15), (16), and (17) is given as ŵ˙ = − Λ(diag[Yd (q, q̇, q̇r , q̈r )âd ]s + γ0 diag[Yf âd ]ef ) â˙ d = − Γd (YdT (q, q̇, q̇r , q̈r )s + γ0 YfT ef ) ŵ˙ I =ΛI (diag[qc − qr ]s − γ0 diag[hf ]ef ) (67) (68) (69) where γ0 is a positive design constant. Remark 7: The interesting and also distinguished point here is that the prediction error ef given by (66) contains the unknown coefficient matrix diag[w], due to which the regressor matrix is actually only partially known. This motivates us to wonder whether or not the stability of the closed-loop robotic system can still be guaranteed under the composite adaptation here. Consider the nonnegative function T −1 ∗ V1 = (1/2)[∆wT Λ−1 K ∗ ∆w + ∆aTd Γ−1 d ∆ad + ∆wI ΛI K ∆wI ] (70) whose derivative along (67), (68), and (69) can be written as V̇1 = − ∆wT K ∗ diag[Yd (q, q̇, q̇r , q̈r )âd ]s − ∆aTd YdT (q, q̇, q̇r , q̈r )s + ∆wIT K ∗ diag[qc − qr ]s − γ0 (∆wT K ∗ diag[Yf âd ]ef + ∆aTd YfT ef + ∆whT K ∗ diag[hf ]ef ) =−∆wT K ∗ diag[Yd (q, q̇, q̇r , q̈r )âd ]s − ∆aTd YdT (q, q̇, q̇r , q̈r )s + ∆wIT K ∗ diag[qc − qr ]s − γ0 eTf K ∗ × (diag[Yf âd ]∆w + diag[w]Yf ∆ad + diag[hf ]∆wI ) (71) | {z } ef where the first three terms are used to compensate for the indefinite terms due to the parametric uncertainty, and in this way, the stability is ensured. The key point here is to exploit the independent nature of the joint processors which means that K ∗ is diagonal. The other versions of composite adaptation, e.g., BGF composite adaptation and CF composite adaptation (see, e.g., [43]) can also be used so that smoother parameter adaptation and better tracking performance can be achieved. Specifically, the CF composite adaptation laws can be given as  ŵ˙ = −Λ(diag[Yd (q, q̇, q̇r , q̈r )âd ]s + γ0 diag[Yf âd ]ef )      Λ̇ = λ1 (Λ − ΛΛ̄−1 Λ) − γ0 Λ(diag[Yf âd ])2 Λ    â˙ = −Γ (Y T (q, q̇, q̇ , q̈ )s + γ Y T e ) r r 0 f f d d d (72) −1 T  Γ̇ d = λ2 (Γd − Γd Γ̄d Γd ) − γ0 Γd Yf Yf Γd      ŵ˙ I = ΛI (diag[qc − qr ]s − γ0 diag[hf ]ef )    2 Λ̇I = λ3 (ΛI − ΛI Λ̄−1 I ΛI ) − γ0 ΛI (diag[hf ]) ΛI where λ1 , λ2 , and λ3 are strictly positive forgetting factors (timevarying or constant), and Λ̄, Γ̄d , and Λ̄I denote the upper bounds of Λ, Γd , and ΛI , respectively. Note that Λ(0) and ΛI (0) are chosen as diagonal positive definite matrices satisfying 0 < Λ(0) ≤ Λ̄ and 0 < ΛI (0) ≤ Λ̄I , and Γd (0) can be chosen as a symmetric positive definite matrix satisfying 0 < Γd (0) ≤ Γ̄d , and in this way, it can be shown that Λ(t) and ΛI (t) are always diagonal, ∀t ≥ 0. The derivative of the nonnegative function V1 defined by (70) in this case becomes V̇1 =−∆wT K ∗ diag[Yd (q, q̇, q̇r , q̈r )âd ]s − ∆aTd YdT (q, q̇, q̇r , q̈r )s + ∆wIT K ∗ diag[qc − qr ]s λ1 λ2 −1 − ∆wT (Λ−1 − Λ̄−1 )K ∗ ∆w − ∆aTd (Γ−1 d − Γ̄d )∆ad 2 2 γ0 T ∗ λ3 −1 ∗ ∆wIT (Λ−1 e K ef . (73) − I − Λ̄I )K ∆wI − 2 2 f Obviously, the stability of the system and convergence of the joint tracking errors can be guaranteed. C. Adaptive Control of Flexible-Joint Manipulators The typical result may be the singular-perturbation-based adaptive control approach [10], [44]. Consider a flexible-joint manipulator 9 governed by [45] ( M0 (q)q̈ + C(q, q̇)q̇ + B q̇ + g(q) = Ks (θ − q) Dr θ̈ + Br θ̇ = Ku − Ks (θ − q) (74) where θ ∈ Rn is the rotor position, Ks is the constant, diagonal, and positive definite stiffness matrix, Dr ∈ Rn×n is the rotor inertia matrix seen from the link side, and Br ∈ Rn×n is the damping matrix. In this case, the motor velocity command is defined as q̇c + K̂I qc =q̇r + K̂I qr + diag[ŵi , i = 1, . . . , n] × Yd (q, q̇, q̇r , q̈r )âd (75) D. Further Discussions with q̇r being defined as q̇r =q̇d − ᾱ(q − qd ). (76) The adaptation laws for ŵ, âd , and ŵI are given as ŵ˙ = −Λdiag[Yd (q, q̇, q̇r , q̈r )âd ]s â˙ d = −Γd YdT (q, q̇, q̇r , q̈r )s ŵ˙ I = ΛI diag[qc − qr ]s (77) (78) (79) The low-level PI control action in this case of flexible-joint robots would typically take the form u = −KP (θ̇ − q̇c ) − KI (θ − qc ) . (80) Substituting (80) into the second equation of (74) with some further manipulations gives Dr (θ̈ − q̈) + Br (θ̇ − q̇) = − K ∗ (θ̇ − q̇c ) − KKI (θ − qc ) − Dr q̈ − Br q̇ − Ks (θ − q) (81) and the above equation can further be written as Dr (θ̈ − q̈) + (Br + K ∗ )(θ̇ − q̇) + [(Ks + KKI )Ks−1 ]Ks (θ − q) = − K ∗ (q̇ − q̇c ) − KKI (q − qc ) − Dr q̈ − Br q̇. (82) As the fast dynamics becomes settled, i.e., Ks (θ − q) is quasiconstant, we obtain that n Ks (θ − q) = − Ks (Ks + KKI )−1 K ∗ (q̇ − q̇c ) o + KKI (q − qc ) + Dr q̈ + Br q̇ (83) and thus the slow dynamics becomes [M0 (q) + Ks∗ Dr ]q̈ + C(q, q̇)q̇ + (B + Ks∗ Br )q̇ + g(q) = − Ks∗ K ∗ [(q̇ − q̇c ) + KI (q − qc )] Ks∗ −1 even without the need of any modification (in practice, any robot has certain joint flexibility). In fact, the relative damping suggested in [10] is naturally included as applying the scaled-dynamic-compensation versions of most control schemes valid for rigid robots to (flexiblejoint) robots in practice. More remarks in terms of the roles of the rotor inertias and joint stiffness are presented in the later simulation. One may also be interested in deriving a composite adaptive version of the adaptive scheme for flexible-joint manipulators and it shall be feasible by using similar techniques as those for rigid manipulators. (84) where = Ks (Ks + KKI ) . The fast/slow-dynamics-based analysis given above is based on [10], [44], and one can rigorously obtain the stability and convergence of the system by following similar arguments as in [10], [44]. Remark 8: Different from the rigid robot case, the actual value of the scale parameter now satisfies diag[w] = Ks∗ K ∗ . Part of the low-level integral action in (80) −KI (θ − q) is the same as the relative position feedback in [44] and its effect is to increase the joint stiffness, providing the possibility of applying the control to manipulators with a relatively low joint stiffness [44]. Remark 9: It is interesting to note that the joint velocity and position commands in the flexible joint case remains the same as the rigid joint case. This provides a good understanding and more importantly an effective justification of why most results derived in the case of rigid robots are generally applicable to (not justified in the previous literature though) practical robotic systems with inner/output loop structure (e.g., most industrial/commercial robotic systems), Here, we take several standard adaptive robot control schemes for illustrating how the scaled dynamic compensation makes them to be qualified adaptive outer loop schemes and further the possible applications to robotic systems with an inner/outer loop structure. It seems hopeful that most adaptive robot control schemes in the literature can be reshaped to be adaptive outer loop schemes by accommodating such modifications. The inner/outer controller structure basically performs the inner joint servoing much faster and the outer loop relatively slower, and thus the scaled dynamic compensation is actually exerted at a quite lower updating cycle. In the case of fast operating process, this would result in degrading of the performance and even instability at certain extreme cases. The main objective of the study and results presented here is to provide the possibility of exerting dynamic compensation (feedforward) even in the standard setting of industrial robotic systems, of course, under the limit of the operation speed. Once upon a while, direct-drive robots are believed to be promising in taking over the role of the standard robots using gear reduction in that direct-drive robots are much efficient and less influenced by friction and backlash, etc. But this hope advances not so favorably, especially in applications, and the reasons may perhaps be the following: • The torque output of direct-drive robots is small and large torque output would require large and heavy joint motors, which, however, are significantly constrained by the weight limit of the manipulator; • direct-drive robots, as is typically expected, are torque-based, but torque-based design is relatively risky and not so reliable since all factors are taken into account at the same time and in addition the communication constraint presents a limit of the coupling torque exerting cycle. These unfavorable factors concerning torque-based design and directdrive robots give rise to the welcome of the inner/outer loop structure in most practical robotic applications and this may still be going in the future. A very recent example is Robonaut 2 [46] which uses harmonic gear transmission instead of the direct-drive configuration, and the feedforward is shown to be necessary to improve the control accuracy as well as the system response within the range of the torque limit. In this specific example, the joint torque control loop is open just for admitting the injection of feedforward or dynamic control action, but from a long run and for promoting the large-scale production and decreasing the cost, the inner/outer loop structure with the joint control loop sealed may perhaps be more desirable. V. S IMULATION R ESULTS A. Task-Space Adaptive Control Consider a three-DOF manipulator with a tool, as is shown in Fig. 2. Its physical parameters are given in Table I with the labels 1, 2, 3, and E denoting link 1, 2, 3, and the tool, respectively, and the diagonal rotor inertia matrix (seen from the link side) Dr = 10 < 0.6 = ∆x regulation errors (m) ; = < ; Fig. 2. (1) ∆x(2) 0.4 ∆x 0.2 (3) 0 −0.2 −0.4 −0.6 −0.8 0 Three-DOF manipulator. 2 4 6 8 10 time (s) TABLE I P HYSICAL PARAMETERS OF THE MANIPULATOR lC,i (m) 0.4320, 0.0720, 0.4320 1.8000 0.9000 0.0054, 0.1620, 0.1620 1.8000 0.9000 0.6000 0.0054, 0.1620, 0.1620 1.8000 0.9000 0.8000 0.0032, 0.0960, 0.0960 1.2000 0.6000 mi (kg) 1 1.6000 2 0.6000 3 E diag[0.6, 0.3, 0.1]. The diagonal matrix B and K are set as B = diag[0.20, 0.15, 0.10] and K = diag[60.0, 30.0, 10.0], respectively. The angle about the axis Z3 between the tool and the third link is δ = 30 deg. The inner joint servoing loop with a PI velocity controller (the case of PID position controller is considered in Sec. V-D) is operated at a high-rate cycle with the sampling period being 0.5 ms, and the outer loop is operated at a low-rate cycle with the sampling period being 20 ms. The gains of the low-level PI controller are set as KP = 30.0I3 1 and KI = 15.0I3 , and this means that the effective PI gains are KP∗ = diag[1800.0, 900.0, 300.0] and KI∗ = diag[900.0, 450.0, 150.0]. 1) Regulation problem: We first perform the simulations of the system under the filter-based and observer-based task-space regulation schemes. The manipulator starts at the configuration q(0) = [π/6, π/3, −5π/6]T and the corresponding task-space position is x(0) = [−0.7500, 1.2990, 0.5196]T . The desired task-space position is set as xd = [−1.0, 2.0, 0.8]T . In the case of using the filterbased scheme, the controller parameters are set as K1 = 60.0I3 , K2 = 2.0I3 , α = 2.0, Γk = 20.0I3 , Λ = 0.001I3 , Γd = 0.006I15 , and ΛI = 100.0I3 . The initial values of the parameter estimates are chosen as âk (0) = [3.0, 5.0, 2.0]T , ŵ(0) = 03 , âd (0) = 015 , and ŵI (0) = [1, 1, 1]T . Simulation results are shown in Fig. 3, Fig. 4, and Fig. 5, which, respectively, give the task-space position errors, the scale parameter estimates, and the estimate of wI . In the case of using the observer-based scheme, the controller parameters β and γ are determined as β = 1.0 and γ = 1.0, which obviously satisfy the condition (30), and the other controller parameters and the initial parameter estimates are chosen to be the same as those of the filter-based scheme. The task-space position error, the scale parameter estimates, and the estimate of wI are shown in Fig. 6, Fig. 7, and Fig. 8, respectively. 2) Tracking problem: Let us now consider the case of using the observer-based tracking controller given by (23), (12), (21), (24), (25), (16), and (17). The desired task-space trajectory is given as xd = [−1.0500 + 0.3 cos(πt/3), 1.2990 + 0.3 sin(πt/3), 0.5196 + 0.3 sin(πt/3)]T . The initial configuration of the manipulator is set to be the same as the above. The controller parameters are chosen as β = 0.8, γ = 0.8, Γk = 200.0I3 , Λ = 6.0I3 , Γd = 27.0I15 , 1I ℓ denotes the ℓ × ℓ identity matrix, ℓ = 2, 3, . . . . 0.03 0.025 parameter estimates li (m) i-th body Task-space position errors (filter-based control). estimate of w 1 0.02 estimate of w2 estimate of w3 0.015 0.01 0.005 0 0 2 4 6 8 10 time (s) Fig. 4. Scale parameter estimates (filter-based control). 4.5 4 parameter estimates · m2 ) Fig. 3. estimate of wI,1 3.5 estimate of wI,2 3 estimate of wI,3 2.5 2 1.5 1 0 2 4 6 8 10 time (s) Fig. 5. Estimate of wI (filter-based control). 0.6 ∆x(1) (2) 0.4 regulation errors (m) xx , I yy , I zz (kg IC,i C,i C,i ∆x ∆x(3) 0.2 0 −0.2 −0.4 −0.6 −0.8 0 Fig. 6. 5 10 time (s) 15 Task-space position errors (observer-based control). 20 11 0.04 scale parameter estimates scale parameter estimates 0.015 0.01 estimate of w1 0.005 estimate of w2 0.03 0.02 0.01 estimate of w1 0 estimate of w estimate of w2 3 0 0 Fig. 7. 5 10 time (s) 15 estimate of w3 −0.01 0 20 Scale parameter estimates (observer-based control). Fig. 10. 2.5 estimate of wI,1 estimate of w I,2 estimate of wI,3 2 1.5 5 10 time (s) 15 Fig. 11. and ΛI = 100.0I3 . The task-space position tracking errors, the scale parameter estimates, and the estimate of wI are shown in Fig. 9, Fig. 10, and Fig. 11, respectively. The gains are increased, in comparison with the the case of regulation, and this is feasible since in the tracking problem here, the desired trajectory starts at the current position of the manipulator. B. Joint-Space Adaptive Control Consider first the outer loop version of the direct adaptive controller proposed by Slotine and Li with the controller parameters being chosen as ᾱ = 2.0, Λ = 0.5I3 , Γd = 0.5I15 , and ΛI = 100.0I3 . The desired joint trajectory is set as qd = 36[(1 − cos πt), sin πt, sin πt]T deg. The initial parameter estimates are chosen as ŵ(0) = 03 , âd (0) = 015 , and ŵI (0) = [1.0, 1.0, 1.0]T . 2.5 20 estimate of wI,1 estimate of wI,2 estimate of wI,3 2 1.5 1 0 20 Estimate of wI (observer-based control). 5 10 time (s) 15 20 Estimate of wI (observer-based tracking control). The joint position tracking errors and parameter estimates are shown in Fig. 12, Fig. 13, and Fig. 14. We next consider the case of using the composite adaptation in Sec. IV-B with the controller parameters γ0 and λf being chosen as γ0 = 0.3 and λf = 1.0 and the other controller parameters the same as those of the direct adaptive controller. The simulation results are shown in Fig. 15, Fig. 16, and Fig. 17, and in comparison with Fig. 12, Fig. 13, and Fig. 14, we see smoother tracking errors and parameter estimates as well as the improved convergence of the tracking errors. C. Joint-Space Adaptive Control Considering Joint Flexibility The joint stiffness matrix Ks is set as Ks = 106 × diag[6.0, 3.0, 1.0] and the diagonal matrix Br is set as Br = 3 0.04 ∆x(1) (2) 2 (3) 1 ∆x 0.02 ∆x tracking errors (deg) tracking errors (m) 15 3 parameter estimates parameter estimates Fig. 8. 10 time (s) Scale parameter estimates (observer-based tracking control). 3 1 0 5 0 −0.02 ∆q(1) ∆q(2) ∆q(3) 0 −1 −2 −3 −0.04 −4 −0.06 0 5 10 time (s) 15 −5 0 20 Fig. 9. Task-space position tracking errors (observer-based tracking control). Fig. 12. 5 10 time (s) 15 20 Joint position tracking errors (direct adaptive controller). 12 2.5 0.5 estimate of w I,1 2 parameter estimates parameter estimates 0.4 estimate of w1 0.3 estimate of w 2 estimate of w3 0.2 Fig. 13. 5 10 time (s) 15 2.5 estimate of wI,1 estimate of wI,2 parameter estimates 2 estimate of wI,3 1.5 1 0.5 0 Fig. 14. 5 10 time (s) 15 20 Estimate of wI (direct adaptive controller). 3 (1) ∆q tracking errors (deg) 2 ∆q(2) ∆q(3) 1 0 −1 −2 −3 −4 −5 0 Fig. 15. 5 10 time (s) 15 20 Joint position tracking errors (composite adaptive controller). 0.5 scale parameter estimates estimate of w1 Fig. 16. estimate of w2 0.4 estimate of w 3 0.3 0.2 0.1 0 0 1.5 1 5 10 time (s) 15 0 0 20 Scale parameter estimates (direct adaptive controller). −0.5 0 estimate of wI,3 0.5 0.1 0 0 estimate of wI,2 20 Scale parameter estimates (composite adaptive controller). Fig. 17. 5 10 time (s) 15 20 Estimate of wI (composite adaptive controller). diag[0.30, 0.20, 0.15]. The controller parameters are chosen to be the same as the rigid manipulator case except that the adaptation gain ΛI is reduced to ΛI = 60.0I3 . The simulation results are shown in Fig. 18, and we see that the performance is comparable with the rigid manipulator case. But one may need to be cautious about the choice of the rotor inertias, and if the rotor inertias are too small [compared with the manipulator inertia matrix due to the link motion, i.e., M0 (q) in (74)], it is hard to choose a group of controller parameters that can stabilize the system. This is understandable as we recall the standard practice in terms of the design of the motor inertia, i.e., in the case that the motor inertia is strikingly smaller than the load inertia, the whole system would be quite difficult to stabilize and the use of advanced control algorithms does not help much. In particular, we perform a simulation for the case of reduced joint stiffness matrix, i.e., setting Ks to be Ks = 104 × diag[6.0, 3.0, 1.0] with the rotor inertias remaining unchanged. In addition, as the joint becomes more flexible, it is hard for the manipulator to track a fast time-varying trajectory, and therefore we slow down the evolution of the desired trajectory as qd = 36[1 − cos(πt/3), sin(πt/3), sin(πt/3)]T deg. The joint tracking errors are shown in Fig. 19. But as we reduce the rotor inertias to, e.g., 50% of the original, it is very difficult to stabilize the system even with the joint stiffness being unchanged (relatively high). To illustrate the reason behind this phenomenon, we calculate the link inertia matrix M0 (q) at q = q(0) = 03 and its value is  18.9058 M0 (q) =  0 0 0 18.9290 9.4327  0 9.4327 . 5.1205 The three eigenvalues of M0 (q) are 0.3352, 18.9058, and 23.7143. This means that the maximum load/rotor inertia ratio reaches 23.7143/0.3 ≈ 79 (happening at the second joint) and such a ratio makes it challenging to stabilize the system. One solution to this problem, as suggested by the standard results in the design of the load/motor ratio, is to increase the joint stiffness, and in other words, larger stiffness allows the specification of larger load/rotor inertia ratio. Fig. 20 shows the joint tracking errors as the stiffness is increased to Ks = 108 × diag[6.0, 3.0, 1.0] with the desired joint position being still the same as the rigid manipulator case. However, in the simulation, we have to decrease the integration step size so that the stability of the numerical integration can be ensured since the degree of stiffness of the system dynamics is increased. In this particular case (i.e., increased joint stiffness and decreased rotor inertia), the step size is decreased from 0.5 ms to 0.05 ms. 13 3 4 ∆q(1) ∆q(1) (2) ∆q ∆q(2) 2 ∆q(3) 1 tracking errors (deg) tracking errors (deg) 2 0 −1 −2 −3 ∆q(3) 0 −2 −4 −4 −5 0 Fig. 18. 5 10 time (s) 15 −6 0 20 Joint position tracking errors (flexible joint case). 5 10 time (s) 15 20 Fig. 21. Joint position tracking errors (adaptive outer loop controller with an inner PID position controller). 1 r 0 r c q(3)−q(3) r c 10 −0.5 qc−qr (deg) tracking errors (deg) c q(2)−q(2) ∆q(1) −1 ∆q(2) −1.5 ∆q(3) 5 0 −2 −2.5 −3 0 Fig. 19. q(1)−q(1) 15 0.5 −5 5 10 time (s) 15 20 −10 0 5 10 time (s) 15 20 Joint position tracking errors (reduced joint stiffness). Fig. 22. qc − qr (adaptive outer loop controller with an inner PID position controller). D. Joint-Space Adaptive Control With an Inner PID Position Controller The gains of the inner PID position controller is set as KD = 30.0I3 , KP = 15.0I3 , and KI = 10.0I3 . The controller parameters for the joint-space adaptive outer loop controller (which can be developed similarly to the one in Sec. III-D) are chosen as ᾱ = 1.5, Kc = 0.8, Γd = 0.5I15 , Λ = 0.5I3 , ΛP = 100.0I3 , and ΛI = 50.0I3 . The initial parameter estimates are chosen as âd (0) = 015 , ŵ(0) = 03 , ŵP (0) = [1.0, 1.0, 1.0]T , and ŵI (0) = [1.0, 1.0, 1.0]T . The desired trajectory is set to be the same as the case of an inner PI velocity controller. The joint position tracking errors are shown in Fig. 21, which is comparable with the case of an inner PI velocity controller (Fig. 12). Interestingly, no unstable phenomenon is observed even with very fast adaptation to KP and KI although 3 ∆q(1) tracking errors (deg) 2 ∆q(2) ∆q(3) 1 0 −1 −2 −3 −4 −5 0 5 10 time (s) 15 20 Fig. 20. Joint position tracking errors (increased joint stiffness and decreased rotor inertias). it is currently still challenging to rigorously ensure the uniform exponential stability of (59), and the evolution of qc − qr is plotted in Fig. 22. The quantity qc − qr (which is apparently bounded based on the data shown in Fig. 22) characterizes the injected dynamic compensation of the proposed controller. E. Further Remarks One key issue in the above simulations is the choice of controller parameters including those of the low-level PI controller. Different from most theoretical results in the literature that design control laws at the torque level, the system here actually has two loops with strikingly different updating frequency, namely, the low-rate outer loop and the high-rate inner joint servoing loop. Due to this structure, to guarantee the robustness and performance of the whole system, high gains are specified in the high-rate joint servoing loop while low gains are specified in the low-rate outer loop. We naturally produce a system that consists of two loops with two time-scales and interestingly, it is the system constraint that gives rise to the two-timescale behavior of the closed-loop system that we cannot modify. Another issue often involved in practice is the computational efficiency, especially in the case that the number of the DOFs of the manipulator is very large. The typical solution to this problem is the recursive implementation of the adaptive controllers—see, e.g., [33], [47], [48]. The recursive direct adaptive controller as detailed in [33], [47] has the complexity O(n) and the complexity of the recursive composite adaptive controller in [48] is O(n2 ), where n denotes the number of the DOFs of the manipulator. We may also note that all the complicated computations of the nonlinear and coupling terms take place in the low-rate outer loop with a powerful computer, and thus 14 0.03 ∆x(1) ∆x(2) tracking errors (m) 0.02 ∆x(3) 0.01 0 −0.01 Fig. 23. Experimental setup with UR10. the complexity up to O(n) or O(n2 ) is expected to be acceptable. −0.02 0 Fig. 24. 20 40 60 time (s) 80 100 Position tracking errors (using qc as the joint position command). VI. E XPERIMENTAL R ESULTS The controller parameters are chosen as γ = 0.5, Kc = 0.8, Γd = 1.0I16 , Λ = 0.01I3 , ΛP = 0.02I3 , and ΛI = 0.02I3 . The initial values of the dynamic parameter estimates are set to be zero, i.e., âd (0) = 016 . Note that here we expand ad in (5) to include the parameters associated with the Coulomb friction which can be written as [36] fc = Dsgn(q̇) (86) where sgn(q̇) = [sgn(q̇1 ), sgn(q̇2 ), sgn(q̇3 )]T and D is a 3 × 3 diagonal positive definite matrix with its diagonal entries unknown. Correspondingly, the dynamic regressor matrix used in the experiment is the combination of Yd (q, q̇, q̇r , q̈r ) and diag[sgn(q̇r )]. The initial values of w, wP , and wI are chosen as ŵ(0) = 03 , ŵP (0) = [1.8, 1.8, 1.8]T , and ŵI (0) = [1.2, 1.2, 1.2]T , respectively. The position tracking errors as using the proposed controller are shown in Fig. 24. For comparison, the position tracking errors as using qr as the joint position command (i.e., the conventional kinematic controller) are shown in Fig. 25. The tracking accuracy is apparently improved by using the proposed dynamic modularity approach. VII. C ONCLUSION In this paper, we have proposed a dynamic modularity approach to adaptive control of robotic systems with an inner/outer loop structure, and both the task-space and joint-space control are taken into consideration under this framework. The proposed adaptive outer loop controllers take into full account the system dynamic effects while ∆x(1) 0.06 ∆x(2) ∆x(3) 0.04 tracking errors (m) To further show the practical performance of the proposed adaptive outer loop controllers, we perform the experimental study using the UR10 of Universal Robots at Nanyang Technological University (see Fig. 23). We fix the position of upper three joints of the UR10 robotic system to be [0, −1.57, 0]T rad, and only the motion of the first three DOFs is considered, and the low-level inner loop controller is considered to take the PID position control action. Either the position or velocity command for the UR10 robot can be designed and it is not allowed to deign the position and velocity commands simultaneously. The sampling period of the outer loop is around (not exactly) 0.2 s. We here only take into consideration the Cartesian-space tracking control problem with unknown system dynamics and unknown lowlevel PID controller parameters while the kinematics of the system is accurately known. That is, we use the joint reference velocity defined by (39) yet with the estimated Jacobian matrix being replaced by the actual Jacobian matrix and with xo being replaced by x. The desired trajectory in the Cartesian space is specified as   −0.45 + 0.1 sin(t) (85) xd (t) =  0.45 + 0.1 cos(t)  . 0.5 0.02 0 −0.02 −0.04 −0.06 0 10 20 time (s) 30 Fig. 25. Position tracking errors (using qr as the joint position command, i.e., the conventional kinematic controller). most existing kinematic controllers rely on the ad hoc assumption of fast enough joint servoing loop or the modification of the lowlevel joint servoing controller to be much more complicated one. From an application perspective, most existing results cannot ensure the stability of the system or convergence of the tracking/regulation error as applied to robotic systems with an inner/outer loop structure (e.g., most commercial/industrial robotic systems) while the proposed adaptive outer loop schemes can guarantee the stability and convergence of the system without the need to modify the low-level joint servoing loop. The goal of the study here is to yield a module robot control system where the adaptive outer loop is user-defined and the inner loop is factory-defined and embedded. It might be worth discussing the roles of feedback separation in the proposed controllers. Feedback separation is a design objective introduced in the context of Cartesian-space control and visual servoing control of robots with uncertain kinematics (see, e.g., [31], [32]). Feedback separation is initially for generating simple adaptive kinematic controllers for industrial/commertial robots, and on the other hand it can potentially reduce the activity of the dynamic compensation action. For instance, the filter-based regulation algorithm in Sec. III-A actually does not achieve feedback separation and thus the scaled dynamic compensation action given in (11) involves an additional term −αJˆT (q)∆x (i.e., a stronger compensation action is required). In contrast, both the observer-based regulation and tracking controllers achieve the feedback separation, benefiting from which, the scaled dynamic compensation action defined in (23) no longer involves additional terms (of course, the controller structure becomes more complex since an observer is introduced). From a control viewpoint, this leads us to reconsider the issue of the cancellation of indefinite terms in the standard backstepping-based control. The 15 cancellation of indefinite terms can lead to a good form of the derivative of the Lyapunov function but often gives rise to potentially decreased robustness and strong coupling between different control loops. The realization of feedback separation may help avoid the unfavorable cancellations of indefinite terms. Furthermore, the proposed approach may possibly be applicable to other classes of (commercial) mechanical systems (e.g., space robots, mobile robots, or aerial vehicles) that have a hidden torque/force control loop yet admit the design of the velocity (or position) command. ACKNOWLEDGMENT The authors would like to thank Dr. Tiantian Jiang, Dr. Yong Hu, and Dr. Yong Wang for the helpful discussions and comments on stability issues concerning the linear time-varying systems. R EFERENCES [1] M. Aicardi, A. Caiti, G. Cannata, and G. Casalino, “Stability and robustness analysis of a two layered hierarchical architecture for the closed loop control of robots in the operational space,” in Proceedings of the IEEE International Conference on Robotics and Automation, Nagoya, Japan, 1995, pp. 2771–2778. [2] J. Roy and L. L. Whitcomb, “Adaptive force control of position/velocity controlled robots: Theory and experiment,” IEEE Transactions on Robotics and Automation, vol. 18, no. 2, pp. 121–137, Apr. 2002. [3] R. Kelly and J. Moreno, “Manipulator motion control in operational space using joint velocity inner loops,” Automatica, vol. 41, no. 8, pp. 1423–1432, Aug. 2005. [4] K. Camarillo, R. Campa, V. Santibáñez, and J. Moreno-Valenzuela, “Stability analysis of the operational space control for industrial robots using their own joint velocity PI controllers,” Robotica, vol. 26, no. 6, pp. 729–738, Nov. 2008. [5] D. E. Whitney, “Resolved motion rate control of manipulators and human prostheses.” IEEE Transactions on Man-Machine Systems, vol. MMS-10, no. 2, pp. 47–53, Jun. 1969. [6] M. W. Spong and M. Vidyasagar, Robot Dynamics and Control. New York: Wiley, 1989. [7] M. Grotjahn and B. Heimann, “Model-based feedforward control in industrial robotics,” The International Journal of Robotics Research, vol. 21, no. 1, pp. 45–60, Jan. 2002. [8] F. Sanfilippo, L. I. Hatledal, H. Zhang, M. Fago, and K. Y. Pettersen, “Controlling Kuka industrial robots: Flexible communication interface JOpenShowVar,” IEEE Robotics & Automation Magazine, vol. 22, no. 4, pp. 96–109, Dec. 2015. [9] J.-J. E. Slotine and W. Li, “On the adaptive control of robot manipulators,” The International Journal of Robotics Research, vol. 6, no. 3, pp. 49–59, Sep. 1987. [10] M. W. Spong, “Adaptive control of flexible joint manipulators,” Systems & Control Letters, vol. 13, no. 1, pp. 15–21, Jul. 1989. [11] C. C. Cheah, C. Liu, and J.-J. E. Slotine, “Adaptive Jacobian tracking control of robots with uncertainties in kinematic, dynamic and actuator models,” IEEE Transactions on Automatic Control, vol. 51, no. 6, pp. 1024–1029, Jun. 2006. [12] Y.-H. Liu, H. Wang, C. Wang, and K. K. Lam, “Uncalibrated visual servoing of robots using a depth-independent interaction matrix,” IEEE Transactions on Robotics, vol. 22, no. 4, pp. 804–817, Aug. 2006. [13] W. E. Dixon, “Adaptive regulation of amplitude limited robot manipulators with uncertain kinematics and dynamics,” IEEE Transactions on Automatic Control, vol. 52, no. 3, pp. 488–493, Mar. 2007. [14] H. Wang, “Adaptive visual tracking for robotic systems without imagespace velocity measurement,” Automatica, vol. 55, pp. 294–301, May 2015. [15] H. Wang, M. Jiang, W. Chen, and Y.-H. Liu, “Visual servoing of robots with uncalibrated robot and camera parameters,” Mechatronics, vol. 22, no. 6, pp. 661–668, Sep. 2012. [16] M. W. Spong, “On the robust control of robot manipulators,” IEEE Transactions on Automatic Control, vol. 37, no. 11, pp. 1782–1786, Nov. 1992. [17] B. Yao and M. Tomizuka, “Smooth robust adaptive sliding mode control of manipulators with guaranteed transient performance,” Journal of Dynamic Systems, Measurement, and Control, vol. 118, no. 4, pp. 764– 775, Dec. 1996. [18] F. Caccavale and P. Chiacchio, “Identification of dynamic parameters and feedforward control for a conventional industrial manipulator,” Control Engineering Practice, vol. 2, no. 6, pp. 1039–1050, Dec. 1994. [19] J. Swevers, W. Verdonck, and J. D. Schutter, “Dynamic model identification for industrial robots,” IEEE Control Systems Magazine, vol. 27, no. 5, pp. 58–71, Oct. 2007. [20] C. C. Cheah, M. Hirano, S. Kawamura, and S. Arimoto, “Approximate Jacobian control for robots with uncertain kinematics and dynamics,” IEEE Transactions on Robotics and Automation, vol. 19, no. 4, pp. 692– 702, Aug. 2003. [21] C. C. Cheah, C. Liu, and J.-J. E. Slotine, “Adaptive tracking control for robots with unknown kinematic and dynamic properties,” The International Journal of Robotics Research, vol. 25, no. 3, pp. 283–296, Mar. 2006. [22] X. Liang, H. Wang, W. Chen, and Y.-H. Liu, “Uncalibrated image-based visual servoing of rigid-link electrically driven robotic manipulators,” Asian Journal of Control, vol. 16, no. 3, pp. 714–728, May 2014. [23] H. Wang and Y. Xie, “Prediction error based adaptive Jacobian tracking for free-floating space manipulators,” IEEE Transactions on Aerospace and Electronic Systems, vol. 48, no. 4, pp. 3207–3221, Oct. 2012. [24] H. Wang, Y.-H. Liu, and W. Chen, “Uncalibrated visual tracking control without visual velocity,” IEEE Transactions on Control Systems Technology, vol. 18, no. 6, pp. 1359–1370, Nov. 2010. [25] A. C. Leite, A. R. L. Zachi, F. Lizarralde, and L. Hsu, “Adaptive 3D visual servoing without image velocity measurement for uncertain manipulators,” in 18th IFAC World Congress, Milano, Italy, 2011, pp. 14 584–14 589. [26] H. Wang, W. Ren, C. C. Cheah, and Y. Xie, “Dynamic modularity approach to adaptive inner/outer loop control of robotic systems,” in Proceedings of the Chinese Control Conference, Chengdu, China, 2016, pp. 3249–3255. [27] H. Wang and Y. Xie, “Observer-based task-space consensus of networked robotic systems: A separation approach,” in Proceedings of the Chinese Control Conference, Hangzhou, China, 2015, pp. 7604–7609. [28] L. E. Weiss, A. C. Sanderson, and C. P. Neuman, “Dynamic sensorbased control of robots with visual feedback,” IEEE Journal of Robotics and Automation, vol. 3, no. 5, pp. 404–417, Oct. 1987. [29] B. Siciliano, “A closed-loop inverse kinematic scheme for on-line jointbased robot control,” Robotica, vol. 8, no. 3, pp. 231–243, Jul. 1990. [30] S. Hutchinson, G. D. Hager, and P. I. Corke, “A tutorial on visual servo control,” IEEE Transactions on Robotics and Automation, vol. 12, no. 5, pp. 651–670, Oct. 1996. [31] H. Wang, “Adaptive control of robot manipulators with uncertain kinematics and dynamics,” IEEE Transactions on Automatic Control, DOI: 10.1109/TAC.2016.2575827. [32] ——, “Passivity-based adaptive control for visually servoed robotic systems,” arXiv preprint arXiv:1506.08762, 2015. [33] G. Niemeyer and J.-J. E. Slotine, “Performance in adaptive manipulator control,” The International Journal of Robotics Research, vol. 10, no. 2, pp. 149–161, Apr. 1991. [34] J. J. Craig, Introduction to Robotics: Mechanics and Control, 3rd ed. Upper Saddle River, NJ: Prentice-Hall, 2005. [35] M. W. Spong, S. Hutchinson, and M. Vidyasagar, Robot Modeling and Control. New York: Wiley, 2006. [36] J.-J. E. Slotine and W. Li, Applied Nonlinear Control. Englewood Cliffs, NJ: Prentice-Hall, 1991. [37] C. A. Desoer and M. Vidyasagar, Feedback Systems: Input-Output Properties. New York: Academic Press, 1975. [38] M. M. Bridges, D. M. Dawson, and X. Gao, “Adaptive control of rigidlink electrically-driven robots,” in Proceedings of the IEEE Conference on Decision and Control, San Antonio, TX, 1993, pp. 159–165. [39] P. A. Ioannou and J. Sun, Robust Adaptive Control. Englewood Cliffs, NJ: Prentice-Hall, 1996. [40] H. Berghuis and H. Nijmeijer, “Global regulation of robots using only position measurements,” Systems & Control Letters, vol. 21, no. 4, pp. 289–293, Oct. 1993. [41] R. Lozano, B. Brogliato, O. Egeland, and B. Maschke, Dissipative Systems Analysis and Control: Theory and Applications. London, U.K.: Springer-Verlag, 2000. [42] C. C. Cheah, C. Liu, and J.-J. E. Slotine, “Adaptive Jacobian vision based control for robots with uncertain depth information,” Automatica, vol. 46, no. 7, pp. 1228–1233, Jul. 2010. [43] J.-J. E. Slotine and W. Li, “Composite adaptive control of robot manipulators,” Automatica, vol. 25, no. 4, pp. 509–519, Jul. 1989. [44] M. W. Spong, “Adaptive control of flexible joint manipulators: Comments on two papers,” Automatica, vol. 31, no. 4, pp. 585–590, Apr. 1995. 16 [45] ——, “Modeling and control of elastic joint robots,” Journal of Dynamic Systems, Measurement, and Control, vol. 109, no. 4, pp. 310–318, Dec. 1987. [46] T. D. Ahlstrom, M. A. Diftler, R. B. Berka, J. M. Badger, S. Yayathi, A. W. Curtis, and C. A. Joyce, “Robonaut 2 on the International Space Station: Status update and preparations for IVA mobility,” in AIAA Space Conference and Exposition, San Diego, CA, 2013, pp. 1–14. [47] H. Wang, “On the recursive implementation of adaptive control for robot manipulators,” in Chinese Control Conference, Beijing, China, 2010, pp. 2154–2161. [48] ——, “Recursive composite adaptation for robot manipulators,” Journal of Dynamic Systems, Measurement, and Control, vol. 135, no. 2, pp. 021 010–1–021 010–8, Mar. 2013.
3cs.SY
1 Operational Interpretation of Rényi Information Measures via Composite Hypothesis Testing Against Product and Markov Distributions Marco Tomamichel† , Senior Member, IEEE and Masahito Hayashi‡∗ , Fellow, IEEE arXiv:1511.04874v3 [cs.IT] 10 Dec 2017 Abstract We revisit the problem of asymmetric binary hypothesis testing against a composite alternative hypothesis. We introduce a general framework to treat such problems when the alternative hypothesis adheres to certain axioms. In this case we find the threshold rate, the optimal error and strong converse exponents (at large deviations from the threshold) and the second order asymptotics (at small deviations from the threshold). We apply our results to find operational interpretations of various Rényi information measures. In case the alternative hypothesis is comprised of bipartite product distributions, we find that the optimal error and strong converse exponents are determined by variations of Rényi mutual information. In case the alternative hypothesis consists of tripartite distributions satisfying the Markov property, we find that the optimal exponents are determined by variations of Rényi conditional mutual information. In either case the relevant notion of Rényi mutual information depends on the precise choice of the alternative hypothesis. As such, our work also strengthens the view that different definitions of Rényi mutual information, conditional entropy and conditional mutual information are adequate depending on the context in which the measures are used. Index Terms composite hypothesis testing, error exponent, strong converse exponent, second order, Rényi divergence, mutual information, conditional entropy, conditional mutual information I. I NTRODUCTION Let us first consider simple hypothesis testing. Here the null hypothesis states that a random variable X n follows the independent and identical (i.i.d.) law P ×n and the alternative hypothesis states that X n follows the i.i.d. law Q×n , where P and Q are probability mass functions on a finite set X . We write this as follows: null hypothesis: X n ∼ P ×n , alternative hypothesis: X n ∼ Q×n . (1) Assume now that our test T n is given as a randomized function from the observed event in X n to {0, 1}. Here the values 1 and 0 signify that we accept and reject the null hypothesis, respectively. We are particularly interested in the asymmetric case where two kind of errors are treated differently. The type-I error, given as αn = P ×n [T n (X n ) = 0], is the probability that the test rejects the null hypothesis when it is true. The type-II error, given as βn = Q×n [T n (X n ) = 1], is the probability that the test confirms the null hypothesis when the alternative hypothesis is true. (See Section II-A for formal definitions of these quantities.) On the one hand, if we impose a constant constraint on the type-I error, namely if we require that αn ≤ ε for some ε ∈ (0, 1), then the there exists a sequence of tests such that βn goes zero exponentially fast in n. The exponent is known to be the relative entropy, D(P kQ). This is Stein’s lemma [8] (see also [14], [5]) and we also call this exponent the threshold rate of the problem. (See Section II-B for definitions of the relevant operational † Centre for Quantum Software and Information, University of Technology Sydney, Australia (Email: [email protected]) Graduate School of Mathematics, Nagoya University, Japan (Email: [email protected]) ∗ Centre for Quantum Technologies, National University of Singapore (NUS), Singapore This paper was presented in part at the 2015 International Symposium on Information Theory in Hong Kong, China. ‡ 2 quantities.) Further, Yushkevich [64] derived the second order expansion (see also Strassen [54] for a higher order expansion) of the optimal exponent as p √ − log βn = nD(P kQ) − nV (P kQ)Φ−1 (ε) + o( n) , (2) where Φ is the cumulative standard normal distribution function and V is the variance of the logarithmic likelihood ratio. (See Section II-C for definitions of the relevant information quantities.) All our statements are independent of the basis choice for the logarithm as long as exp is taken as the inverse of log, unless it is otherwise noted. On the other hand, if we impose an exponential constraint on the type-II error, namely if we require that βn ≤ exp(−nR) for some rate R ∈ (0, D(P kQ)), we find that the optimal type-I error decreases exponentially fast to zero with  1−s − log αn = n sup Ds (P kQ) − R + o(n) , (3) s 0<s<1 where Ds (P kQ) is the Rényi relative entropy. This is known as Hoeffding’s bound [34], and the exponent is called error exponent in the following. Moreover, if the rate R exceeds the threshold rate D(P kQ), the minimum probability of the second error goes to 1 exponentially fast with  s−1 − log(1 − αn ) = n sup R − Ds (P kQ) + o(n) . (4) s s>1 This is called strong converse exponent in the following [12], [21].1 These results can partially be extended to the case when the null hypothesis is composite (i.e. when the null hypothesis is comprised of a set of distributions) as a consequence of Sanov’s theorem [51]. In contrast, our goal is to extend the above results, in particular Eq. (2)–(4), to the setting where the alternative hypothesis is composite. More precisely, we want to consider a set Q of distributions on X and the maximal type-II error βn = maxQ∈Q Q×n [T n (X n ) = 1]. We write the corresponding hypothesis testing problem as follows: null hypothesis: X n ∼ P ×n , alternative hypothesis: X n ∼ Q×n for some Q ∈ Q. (5) Sanov’s theorem allows the alternative hypothesis to be the set Q = {Q : D(P kQ) > R} for a given real number R > 0. More precisely, when the first kind of error probability is restricted to αn ≤ ε, the optimal exponent for βn is given as − log βn = nR + o(n). Moreover, the Hoeffding bound (3) was extended to certain classes of composite hypotheses which are composed of i.i.d. distributions [60], [52]. Our Contributions: Our first main result establishes that, if the alternative hypothesis satisfies certain axioms discussed in Section II-D, the above results, Eq. (2)-(4), hold as stated after we substitute D(P kQ) → min D(P kQ) = D(P kQ̂), Q∈Q V (P kQ) → V (P kQ̂), Ds (P kQ) → min Ds (P kQ), Q∈Q (6) where Q̂ ∈ Q is the distribution that minimizes the relative entropy. Hence, we generalize Stein’s lemma, Yushkevich’s second order expansion, the Hoeffding bound and the Han-Kobayashi bound to the case of a composite alternative hypothesis. Moreover, we do not need to restrict the alternative hypothesis to i.i.d. distributions but can allow permutation invariant or even more general distributions. We formally state all of our results in Section III. Our second main result, which is an application of the first, is to give an operational interpretation to various measures of Rényi mutual information, Rényi conditional entropy, and Rényi conditional mutual information. A complete discussion of this can be found in Section IV, and here we exhibit a few representative examples: 1) Let (X, Y ) be two random variables governed by a joint probability distribution PXY with marginal PX . We find that the hypothesis testing problem null hypothesis: alternative hypothesis: 1 ×n , (X n , Y n ) ∼ PXY X n ∼ PX×n independent of Y n , The form of (4) is due to Ogawa-Nagaoka [46]. Moreover, Nakagawa-Kanaya [45] first treat the case of large R. (7) 3 originally proposed by Polyanskiy [47, Sec. II] in the context of channel coding, leads to an operational interpretation of Sibson’s [53] definition (see also [10, p. 27]) of Rényi mutual information, (8) Is↑↓ (X : Y ) = min Ds (PXY kPX × QY ) . QY A similar hypothesis testing problem where the alternative hypothesis further requires that X n is uniform leads to an operational interpretation of Arimoto’s definition of Rényi conditional entropy [3]. 2) We further treat the problem of detecting correlations in a collection of random variables. Specifically, consider a null hypothesis that the random random variables (X1 , X2 , . . . , Xk ) are governed by a specific distribution PX1 X2 ...Xk and compare this to the alternative hypothesis that these random variables are independent, which is a natural formulation from the viewpoint of statistics. This can be phrased as the hypothesis testing problem null hypothesis: alternative hypothesis: , (X1n , X2n , . . . , Xkn ) ∼ PX×n 1 X2 ...Xk (X1n , X2n , . . . , Xkn ) ∼ QX1 × QX2 × . . . × QXk ×n for some QXi . (9) The quantity D(PX1 X2 ...Xk kPX1 × PX2 × . . . × PXk ) is a measure of correlations for k-partite systems. We show that it attains operational significance as a threshold rate for the above problem. We also derive error exponents and strong converse exponents for this problem as long as R is close enough to the threshold rate. These are determined by the quantities min QX1 ,QX2 ,...QXk Ds (PX1 X2 ...Xk kQX1 × QX2 × . . . × QXk ) . (10) Our test depends on the specific distribution PX1 X2 ...Xk , so it is not able to detect arbitrary correlations in these random variables. 3) Let PXY Z be a joint probability distribution. We find that the hypothesis testing problem null hypothesis: alternative hypothesis: ×n (X n , Y n , Z n ) ∼ PXY Z , (X n , Y n , Z n ) ∼ Q×n XY Z for some QXZY that is Markov X ↔ Y ↔ Z , (11) yields an operational interpretation for the conditional mutual information, I(X : Z|Y ), as the threshold rate. Moreover, the error exponents are determined by a certain Rényi conditional mutual information, Is↓↓↓ (X : Z|Y ) = min Ds (PXY Z kQY × QX|Y × QZ|Y ) . QXY Z (12) However, this definition of Rényi conditional mutual information is by no means the only definition that attains operational significance. If we vary the problem slightly and only consider alternative hypotheses with ×n we recover the same threshold rate but different exponents determined by a fixed marginal (X n , Y n ) ∼ PXY Is↑↑↓ (X : Z|Y ) = min Ds (PXY Z kPXY × QZ|Y ) . QZ|Y (13) Our results thus yield an operational interpretation for this definition of Rényi conditional mutual information for all positive s, and we provide a closed form of this quantity in (75). To the best of our knowledge this definition has not appeared in the literature before. From the operational perspective we have chosen here, it is a natural extension of Sibson’s definition of Rényi mutual information to the conditional setting, and we expect it to have other applications in information theory. On a technical level, our work introduces the concept of a universal distribution and a universal channel. The purpose of the former is to dominate any i.i.d. product (or permutation invariant) distribution in terms of the relative entropy and the Rényi relative entropy (cf. Lemmas 7 and 14). More formally, we show that there exists a sequence of distributions U n on X n such that Ds (P n kQ×n ) ≥ Ds (P n kU n ) + O(log n) for any P n , Q uniformly for all s ≥ 0. Similarly, the output distribution of the universal channel dominates the output distribution of any memoryless product (or permutation covariant) channel, whenever both channels are given the same input (cf. Lemma 17). A similar kind of approximation was discussed perviously by Davisson [13] (see also Clarke and Barron [9]) but they only showed the approximation (using a Baysian mixture) for the case s = 1 corresponding to the relative entropy.2 2 Their result was extended in a recent paper [29] to the approximation in terms of the Rényi relative entropy, even in the continuous case. 4 We also note that the concept of universal decoding was studied in [17], but in this work the universal decoder can only dominate finitely many decoders whereas our universal states and channels dominate a continuous set of states and channels, respectively. Therefore, the methods in References [13], [9], [17] cannot be directly applied to our analysis. The universal distribution is the classical analogue of the universal state originally introduced in the quantum setting by one of the authors in [26] and [25]. The latter paper also introduced universal classical-quantum channels (see also [16] for a fully quantum universal channel). Another contribution is the axiomatic approach we have taken to the problem. We derive a sufficient condition for the hypotheses testing problems to derive analogues of Yushkevich’s bound, Hoeffding’s bound and the HanKobayashi bound. Since this approach accepts hypotheses containing non-i.i.d. distributions, we expect it to have wide applicability. Outline: The remainder of the paper is structured as follows. In Section II we introduce the axiomatic framework for composite hypothesis testing that we build on, and also define our information quantities, the Rényi divergences. In Section III we present our main results and treat some generic examples, with the proofs deferred to the later sections. The examples discussed in the introduction, which yield an operational interpretation of various notions of Rényi conditional entropy, mutual information, and conditional mutual information, are then treated in detail in Section IV. In fact, Section IV can be understood without referring to Section III. The proofs for the Hoeffding bound are discussed in Section V, the Han-Kobayashi bound follows in Section VI and the second order analysis of Stein’s lemma is found in Section VII. We conclude our work with a discussion and outlook in Section VIII. II. A F RAMEWORK FOR C OMPOSITE H YPOTHESIS T ESTING In this section we introduce a general framework for composite hypothesis that encompasses, but is not restricted to, the examples mentioned in the introduction. A. Binary Hypothesis Testing with Composite Alternative Hypothesis We restrict our attention to finite alphabets. Let X be such an alphabet. The set of probability mass functions (in the following Poften just called distributions) on X is denoted by P(X ) and comprised of positive valued functions on X with x∈X P (x) = 1. For P ∈ P(X ) and a random variable X on X , we write X ∼ P to denote that X is distributed according to the law P . we use X n to denote the n-fold Cartesian product of X and its elements by vectors xn = (x1 , x2 , . . . , xn )Q . For any P ∈ P(X ), we use P ×n to denote the identical and independent distribution ×n n (i.i.d.) given by P (x ) = ni=1 P (xi ). We consider hypothesis testing problems with a composite alternative hypothesis of the following form. Definition 1. A sequence of hypothesis testing problems with composite alternative hypothesis is determined by  a triple H = X , P, {Qn }n∈N , comprised of a finite set X , a distribution P ∈ P(X ), and a sequence of sets Qn ⊆ P(X n ) for all n ∈ N. This determines a hypothesis testing problem Hn for each n ∈ N. Namely, we consider n instances of a random variable X on X and the following two hypotheses. Hn : null hypothesis: X n ∼ P ×n , alternative hypothesis: X n ∼ Qn for some Qn ∈ Qn . (14) We will analyze this problem for sequences of sets Qn that satisfy certain axioms (cf. Section II-D). For convenience we employ the shorthand notation Q ≡ Q1 and we use Qn to denote the convex hull of Qn . Consider probabilistic hypothesis tests, given by a function T : X → [0, 1], where T (x) is the probability of accepting the null hypothesis when observing x. We then define the type-I error probability and type-II error probability, respectively, as follows: X X α(T ; P ) := P (x)(1 − T (x)), and β(T ; Q) := sup Q(x)T (x) . (15) Q∈Q x∈X x∈X In this work we focus on asymmetric hypothesis testing. In this context it is convenient to define the quantity α̂(µ; P kQ) as the minimum type-I error probability when the type-II error probability is below a threshold µ ≥ 0, i.e. we consider the following optimization problem:  α̂(µ; P kQ) := min α(T ; P ) β(T ; Q) ≤ µ , for µ ∈ R . (16) T 5 Note that µ 7→ α̂(µ; P kQ) is monotonically decreasing and evaluates to 0 for µ ≥ 1. Note that we always have α̂(µ; P kQ) = α̂(µ; P kQ) . (17) Moreover, since the sum over which we take the supremum in (15) is linear in Q and the maximum is thus achieved on the boundary. B. Operational Quantities for Asymmetric Hypothesis Testing Let us now discuss the main operational quantities that we want to investigate. 1) Threshold Rate: We will study the following properties of asymmetric composite hypothesis tests. The first concept concerns the threshold rate of a sequence of such tests.  Definition 2. Let H = X , P, {Qn }n∈N be a sequence of hypothesis testing problems. We define the threshold rate of the sequence H as    ×n (18) Rth (H) := sup R ∈ R : lim sup α̂ exp(−nR); P kQn = 0 . n→∞ Similarly, we define the strong converse threshold rate of the sequence H as (cf. [22, Def. 4.3.1] and [44])    ∗ (H) = inf R ∈ R : lim inf α̂ exp(−nR); P ×n kQn = 1 . Rth n→∞ (19) ∗ (H) always holds. Moreover, we note that the threshold rate is always nonnegative because Clearly Rth (H) ≤ Rth  ×n α̂ exp(−nR); P kQn vanishes for R ≤ 0. The problems we study in this paper are particularly well-behaved and we will find that the threshold rate and the strong converse threshold rate agree. 2) Error and Strong Converse  Exponents: Moreover, if we choose a rate R below Rth (H) then we will observe that α̂ exp(−nR); P ×n kQn converges exponentially fast to 0 as n increases. The exponent characterizing this decrease is called the error exponent of the sequence with regards to R.  Definition 3. Let H = X , P, {Qn }n∈N be a sequence of hypothesis testing problems. For every R > 0, the error exponent of H with regards to R is defined as  1 eR (H) := lim inf − log α̂ exp(−nR); P ×n kQn , (20) n→∞ n if this limit exists, or +∞ otherwise.  If we choose a rate R exceeding Rth (H) then we will instead observe that α̂ exp(−nR); P ×n kQn converges exponentially fast to 1 as n increases. The exponent characterizing this convergence is called the strong converse exponent of the sequence with regards to R.  Definition 4. Let H = X , P, {Qn }n∈N be a sequence of hypothesis testing problems. For every R > 0, the strong converse exponent of H with regards to R is defined as   1 scR (H) := lim sup − log 1 − α̂ exp(−nR); P ×n kQn , (21) n n→∞ if this limit exists, or +∞ otherwise. C. Information Measures for Asymmetric Hypothesis Testing All our results will be stated as an equivalence between one of the above-mentioned operational quantities and an information measures derived from the Rényi divergence. We formally define the Rényi divergence [49] here. Definition 5. Let P ∈ P(X ) and Q : X → [0, ∞). For s ∈ (0, 1) ∪ (1, ∞), define X X 1−s P (x)s Q(x)1−s , P (x)s Q(x) + ε = gs (P kQ) := lim ε→0 x∈X x∈X P (x)>0 (22) 6 where the latter expression is finite either if s < 1 or if Q(x) = 0 implies P (x) = 0 for all x ∈ X . Otherwise, we set gs (P kQ) = +∞. The Rényi divergence of P with regards to Q of order s is then defined as Ds (P kQ) := log gs (P kQ) s−1 (23) For s ∈ {0, 1, ∞} the Rényi divergence is defined as the corresponding limit. See [61] for a comprehensive discussion of its properties, which we summarize here. The Rényi divergence is lower semi-continuous and diverges to +∞ if the support condition is violated and s > 1 or if s < 1 and P and Q do not share any support, in which case gs (P kQ) = 0. Our sets Qn may contain elements that violate these conditions. Nonetheless, sets consistent with our axioms will always contain at least one element that satisfies the support conditions. One of the most important properties of the latter functional is that gs (·k·) is jointly concave for s ∈ (0, 1) and jointly convex for s ∈ (1, ∞). Moreover, the function s 7→ log gs (P kQ) is convex and s 7→ Ds (P kQ) is monotonically increasing. Furthermore, the Kullback-Leibler divergence is given by X  D(P kQ) := D1 (P kQ) = P (x) log P (x) − log Q(x) . (24) x Q′ For two positive valued functions Q and on X , we observe that Q(x) ≤ Q′ (x) for all x ∈ X implies Ds (P kQ) ≥ Ds (P kQ′ ). Furthermore, for any scalar v , we have Ds (P kvQ) = Ds (P kQ) − log v . To present the second order of Stein’s lemma we need to introduce some additional quantities. The variance of the logarithmic likelihood ratio is given by X 2 (25) V (P kQ) := P (x) log P (x) − log Q(x) − D(P kQ) . x∈X This variance is proportional to the derivative of the Rényi divergence at s = 1, a consequence of the fact that the Rényi divergence is proportional to the cumulant generating function of the logarithmic likelihood ratio. More precisely, the first order Taylor expansion of Ds (P kQ) around s = 1 is given by Ds (P kQ) = D(P kQ) + s−1 V (P kQ) + O(s2 ) . 2 log e (26) Finally, we define the Rényi divergence of P with regards to a set Q of positive valued functions as Ds (P kQ) := inf Ds (P kQ) . Q∈Q (27) The minimizer, if it is unique, is defined as Q̂s := arg min Ds (P kQ) . (28) Q∈Q We define V (P kQ) := V (P kQ̂1 ). Similarly, taking note of the sign of (s − 1), we define   sup gs (P kQ) if s ∈ (0, 1)  Q∈Q gs (P kQ) := exp (s − 1)Ds (P kQ) = .   inf gs (P kQ) if s ∈ (1, ∞) (29) Q∈Q D. Axioms for Alternative Hypotheses Let us fix a probability distribution P ∈ P(X). We present a collection of axioms that the sets {Qn }n∈N must satisfy in order for our main results to hold. The first axiom ensures that the base set, Q, is convex. Axiom 1 (convexity). The set Q ⊆ P(X ) is compact convex. Moreover, for all s > 0 the minimizer Q̂s in (28) is unique and lies in relint(Q).3 The second axiom ensures that i.i.d. products of distributions in Q are elements of Qn . Axiom 2 (product distributions). The set Qn contains the element Q×n for every Q ∈ Q. 3 The relative interior of a convex set Θ is the set relint(Θ) := {x ∈ Θ : ∀y ∈ Θ ∃λ > 1 s.t. λx + (1 − λ)y ∈ Θ}. 7 As a direct consequence of Axiom 2 and the additivity of the Rényi divergence for product distributions, we find the following lemma. Lemma 6 (subadditivity). Assuming Axiom 2, we have Ds (P ×n kQn ) ≤ nDs (P kQ) for all s > 0 and n ∈ N. The purpose of the next axiom is to ensure that this is in fact an equality. Axiom 3 (additivity). For all s > 0 and n ∈ N, we have Ds (P ×n kQn ) ≥ nDs (P kQ). The next axiom concerns the existence of a sequence of universal distributions. Before we state it, let us introduce some additional notation. We denote the symmetric group of permutations of n elements by Sn . This group has a natural representation as bistochastic matrices. For every π ∈ Sn , the matrix W n [π] is defined by the relation P n W n [π](x1 , x2 , . . . , xn ) = P n (xπ(1) , xπ(2) , . . . , xπ(n) ). We say that a probability distribution P n ∈ P(X n ) is permutation invariant if P n W n [π] = P n holds for all π ∈ Sn . The set of all permutation invariant distributions on X n is denoted P sym (X n ) and permutation invariant distributions in Qn comprise the subset Qsym n . Axiom 4 (universal distribution). There exists a sequence of probability mass functions {U n }n∈N with U n ∈ P sym (X n ) and a polynomial v(n) such that the following relation holds. For all n ∈ N and Q ∈ Qsym n , Q(xn ) ≤ v(n) U n (xn ), ∀ xn ∈ X n , and Ds (P ×n kU n ) ≥ Ds (P ×n kQn ) . The former condition is rewritten as Dmax (QkU n ) ≤ log v(n) for Q ∈ Qsym n , where Dmax (QkP ) := log maxx sym 1 P n n n Moreover, the set Qn is closed under symmetrization, i.e. if P ∈ Qn then n! π∈Sn P W [π] ∈ Qn . (30) Q(x) P (x) . sym The latter condition in (30) is automatically satisfied if U n ∈ Qn , but this is not necessary. The above axioms have the following immediate consequence. Lemma 7. Assume Axioms 3 and 4 hold. Then, for all s > 0 1 lim Ds (P ×n kU n ) = Ds (P kQ) , n→∞ n and the map s 7→ φ(s) := log gs (P kQ) is convex. (31) Proof: We first show (31). Additivity implies that n1 Ds (P ×n kU n ) ≥ n1 Ds (P ×n kQn ) = Ds (P kQ). To establish the other direction, we use Axiom 4. For any Q ∈ Q, we have  1 1 1 Ds (P ×n kQ×n ) + log v(n) = Ds (P kQ) + log v(n) Ds (P ×n kU n ) ≤ (32) n n n Hence, minimizing over all such Q we can replace Ds (P kQ) with Ds (P kQ) on the right hand side. Moreover, using the property that v(n) grows polynomially in n, we find lim supn→∞ n1 Ds (P ×n kU n ) ≤ Ds (P kQ). Finally, since s 7→ log gs (P kQ) is the point-wise limit of convex functions, it is also convex. Finally, we note that convexity in Axiom 1 is quite a strong requirement and not satisfied by some of the examples we consider. Instead of requiring that the set Q is convex, it suffices to assume that there exists a convenient convex parametrization of the set such that concavity and convexity of gs (P k·) are preserved. Axiom 5 (convex parametrization, replaces Axiom 1). There exists a compact convex set Θ in a finite-dimensional vector space, a twice continuously differentiable (C 2 ) function Θ ∋ θ 7→ Qθ ∈ Q, and an open interval (a, b) containing 1 such that the following holds: • We have Q = {Qθ : θ ∈ Θ}. • For all s ∈ (a, b), the minimizer θ̂ s := arg minθ∈Θ Ds (P kQθ ) is unique and lies in relint(Θ). • The map θ 7→ gs (P kQθ ) has negative definite Hessian at θ̂ s for all s ∈ (a, 1) and positive definite Hessian at θ̂ s for all s ∈ (1, b). Moreover, the map θ 7→ Ds (P kQθ ) has positive definite Hessian at θ̂ 1 . Since the map in Axiom 5 is assumed to be C 2 and (s, Q) 7→ Ds (P kQ) is C 2 , Axiom 5 implies that (s, θ) 7→ Ds (P kQθ ) is C 2 as well. Further note that Axiom 1 implies Axiom 5 using the trivial parametrization Θ = Q and (a, b) = (0, ∞).4 If we assume Axiom 5 instead of Axiom 1 we must also relax the additivity property. Namely, additivity in Axiom 3 is only required in the interval s ∈ (a, b) and Lemma 7 only holds for s ∈ (a, b). 4 However, the converse argument is not true because for any two points θ and θ′ and λ ∈ (0, 1), the distribution Qλθ+(1−λ)θ′ ∈ Q does not necessarily equal the distribution λQθ + (1 − λ)Qθ′ ∈ P(X ). That is, the convex combination in the parameter space is different from the convex combination in P(X ), in general. (Examples will be given in Section III-B.) 8 III. M AIN R ESULTS AND E XAMPLES A. Statement of Main Results Our first result considers the asymptotic situation where the type-II error probability goes to zero exponentially with a rate below D(P kQ). In this case, we find that type-I error probability converges to zero exponentially fast, and the exponent is determined by the Rényi divergence, Ds (P kQ) with s < 1. To state our result we need the following concept. Definition 8. Fix P ∈ P(X ) and Q ⊆ P(X ). For any c ≥ 0, the c-critical rate is defined as  Rc := lim sφ′ (s) − φ(s) s→c (33) with φ(s) = (s − 1)Ds (P kQ) as defined in Lemma 7. The map c 7→ Rc on (a, b) is monotonically increasing (cf. Lemma 20), and furthermore we find R0 = D0 (P kQ) and R1 = D(P kQ), as well as R∞ ≥ D∞ (P kQ).  Theorem 9. Let H = X , P, {Qn }n∈N be such that Axioms 2–5 are satisfied on (a, 1]. Then, for any R > Ra ,    1−s Ds (P kQ) − R . (34) eR (H) = sup s s∈(a,1) The proof is given in Section V. The case where Qn = {Q×n } are singletons is attributed to Hoeffding [34]. Note that if R ≥ D(P kQ) the right hand side of (34) evaluates to zero, revealing that in this case the error of the first kind will decay slower than exponential in n. Otherwise the right hand side is always positive. Our second result considers the case where type-II error probability goes to zero exponentially with a rate exceeding the mutual information D(P kQ). In this case, we find that type-I error probability converges to 1 exponentially fast, and the exponent is determined by the Rényi divergence Ds (P kQ), with s > 1.  Theorem 10. Let H = X , P, {Qn }n∈N be such that Axioms 2–5 are satisfied on [1, b). Then, for any R < Rb ,    s−1 R − Ds (P kQ) . (35) scR (H) = sup s s∈(1,b) The proof is given in Section VI. The case where Qn are singletons is attributed to Csiszár-Longo [12] and Han-Kobayashi [21]. Note that even in the singleton case, the original results do not apply for R > R∞ . In fact Nakagawa-Kanaya [45] showed that in this setting the above optimal exponent can be attained only by a randomized test. We will not further discuss this case. Again we note that if R ≤ D(P kQ) the right hand side of (35) evaluates to zero, otherwise it is strictly positive. The threshold rates are thus determined by the above results, and we find the following corollary of Theorems 9 and 10.  Corollary 11. Let H = X , P, {Qn }n∈N be such that Axioms 2–5 are satisfied with any (a, b) containing 1. Then, ∗ Rth (H) = Rth (H) = D(P kQ) . (36) For completeness, we also investigate the second order behavior, namely we investigate the error of the first kind √ when the error of the second kind vanishes as exp(−nD(P kQ) − nr). This analysis takes a step beyond Stein’s lemma and extends Yushkevich’s work for simple alternative hypotheses [64]. Theorem 12. Assume Axioms 2–5 hold for any (a, b) ∋ {1}. Then, for any r ∈ R, we have !   √  ×n r Qn = Φ p , lim α̂ exp − nD(P kQ) − nr ; P n→∞ V (P kQ) y2 1 R x where Φ(x) := (2π)− 2 −∞ e− 2 dy and V (P kQ) is defined in the line following (28). (37) The proof is given in Section VII. The achievability proof is of a different flavor than previous proofs of the singleton case and relies on Lévy’s continuity theorem. 9 B. Examples In the following we will discuss various examples of hypothesis testing problems that can be tackled with the above framework. The cases we treat here in particular cover the examples in Section IV. 1) Product distributions with a fixed marginal: Let X and Y be two finite sets. Consider a pair of random variables (X, Y ) ∼ PXY that are governed by a joint probability distribution PXY ∈ P(X × Y). We denote by PX|Y =y the distribution of X conditioned on the event Y = y . The conditional distribution PX|Y is interpreted as a stochastic matrix mapping or channel from Y to X . In particular, we write PXY = PY × PX|Y and PX = PY PX|Y . We assume without loss of generality that PX and PY have full support, i.e. we restrict the sets X and Y to the support of the marginals PX and PY , respectively. Moreover, let TX ∈ P(X ) be such that TX has full support as well. Now consider the sets  (38) Qn = TX×n × QY n : QY n ∈ P(Y n ) . We emphasize that the distributions QY n are unstructured, in particular they do not have to be n-fold i.i.d. products.  Proposition 13. The sequence of tests X × Y, PXY , {Qn }n∈N with Qn in (38) satisfies Axioms 1–4. Moreover, this still holds if we restrict Qn to permutation invariant or i.i.d. product distributions. The proof is given in Appendix A-B and relies on the following Lemma, which might be of independent interest. sym n n } (X n ) such that, for every n ∈ N Lemma 14. The exists a sequence of distributions {UX n n∈N with UX n ∈ P n (xn ) for all xn ∈ X n . and QX n ∈ P sym (X n ), we have QX n (xn ) ≤ |Tn (X )| UX n In the above lemma we used Tn (X ) to denote the set of X -types of length n. This is the classical analogue of the universal state originally introduced in the quantum setting [26], [25]. The proof uses the method of types [11], and the result is only sensible for finite sets. Proof: The universal distributions are given by X 1 1 n n UX 1{xn is of type λ} , (39) n (x ) = |Tn (X )| |λ| λ∈Tn (X ) 1 1{xn is of type λ} is the uniform distribution over all sequences of type λ. Every permutation invariant where |λ| distribution in QX n ∈ P sym (X ) has to be flat over sequences of the same type. Namely, it has to be of the form X q(λ) QX n (xn ) = 1{xn is of type λ} (40) |λ| λ∈Tn (X ) for some distribution q ∈ P(Tn (X )). The desired bound can now be verified easily. 2) General (permutation invariant) product distributions: Consider finite sets X1 , X2 , . . . , Xk and a distribution PX1 X2 ...Xk Y ∈ P(X1 ×X2 ×. . .×Xk ×Y). Without loss of generality we assume that all the marginals of PX1 X2 ...Xk Y have full support. Then, consider  Qn = QX1n × QX2n × . . . × QXkn × QY n : QXin ∈ P sym (Xin ), i ∈ [k] and QY n ∈ P(Y n ) , . (41) Note that these sets are not convex, so Axiom 1 is certainly violated. Moreover, note that the restriction that the QXin be permutation invariant is necessary. Without such a restriction, even a correlated null hypothesis lies in the convex hull of the set of alternative hypothesis since P(X × Y) equals the convex hull of P(X ) × P(Y). Clearly it is then no longer possible to distinguish these two hypotheses.  Proposition 15. The sequence of tests X × X × . . . × X × Y, P , {Q } with Qn in (41) satisfy 1 2 X X ...X Y n n∈ N k 1 2 k  k , ∞ . Moreover, this still holds if we restrict Qn to i.i.d. product distributions. Axioms 2–5 with (a, b) = k+1 The proof is given in Appendix A-C. 10 3) Recovered and other Markov distributions: Let PXY Z ∈ P(X ×Y ×Z) be a joint probability distribution with marginals PX and PY and PZ . A natural test considers alternative hypothesis comprised of Markov distributions where only two marginals are fixed. We can see this as the problem of distinguishing a fixed tripartite distribution PXY Z from the set of distributions that can be “recovered” from its marginal PXY via a probabilistic operation. We assume without loss of generality that PX (x) and PY (y) and PZ (z) have full support, i.e. we restrict the sets X , Y , Z to the support of the marginals PX , PY and PZ , respectively. The set of conditional probability distributions of Z given Y , or channels from Y to Z , is denoted by P(Z|Y). Consider the sets  ×n × QZ n |Y n : QZ n |Y n ∈ P(Z n |Y n ) . (42) Qn = PXY  Proposition 16. The sequence of tests X ×Y ×Z, PXY Z , {Qn }n∈N with Qn in (42) satisfy Axioms 1–4. Moreover, this still holds if we restrict Qn to permutation invariant or i.i.d. product distributions. This proposition relies on the following lemma, which is of independent interest. Lemma 17. There exists a sequence of channels, {UYn n |X n }n∈N , where UYn n |X n ∈ P sym (Y n |X n ) such that the following holds. For every n ∈ N, QY n |X n ∈ P sym (Y n |X n ) and PX n ∈ P(X n ), we have PX n × QY n |X n (xn , y n ) ≤ |Tn (X × Y)| PX n × UYn n |X n (xn , y n ), ∀xn ∈ X n , y n ∈ Y n . (43) Both of the above statements, Proposition 16 and Lemma 17, are proven in Appendix A-D. Another natural question is to distinguish between a null hypothesis PXY Z and all Markov distributions X ↔ Y ↔ Z , i.e. distributions QXY Z = QY × QX|Y × QZ|Y . Consider the set   Qn = QX n Y n Z n ∈ P sym (X ×Y ×Z)n : QX n Y n Z n = QY n × QX n |Y n × QZ n |Y n . (44)  Proposition 18. The sequence of tests X × Y × Z, PXY Z , {Qn }n∈N with Qn in (44) satisfy Axioms 2–5 with (a, b) = ( 23 , ∞). Moreover, this still holds if we restrict Qn to i.i.d. product distributions. Again note that every distribution is contained in the convex hull of all Markov distributions, and hence some restrictions on the set are necessary. It is possible to slightly weaken the condition that (X n , Y n , Z n ) is permutation invariant, but we will not discuss this here. This is shown in Appendix A-E. IV. O PERATIONAL I NTERPRETATION OF R ÉNYI I NFORMATION M EASURES In this section we present the main application of our results, finding operational interpretations of various measures of Rényi mutual information, conditional entropy and conditional mutual information. A. Rényi Mutual Information: Testing Against Independent Distributions It is well known that the mutual information can be expressed in terms of the Kullback-Leibler divergence in several ways. Consider two random variables X and Y and a joint distribution PXY ∈ P(X × Y) with marginals PX and PY . We are interested in the identities I(X : Y ) = D(PXY kPX × PY ) = = min QY ∈P(Y ) D(PXY kPX × QY ) min QX ∈P(X), QY ∈P(Y ) D(PXY kQX × QY ) (45) (46) (47) Each of these identities gives rise to a different hypothesis testing problem and a different notion of Rényi mutual information. In the following we treat these three problems in the above order. 11 1) All marginals fixed: As a warmup consider the following (simple) hypothesis testing problem. Hmi ↑↑ : ×n , null hypothesis: (X n , Y n ) ∼ PXY alternative hypothesis: X n ∼ PX×n and Y n ∼ PY×n are independent. (48) That is, we set Qn = {PX×n × PY×n } for all n in Defintion 1. Stein’s Lemma and its strong converse ensure that mi ∗ Rth (Hmi ↑↑ ) = Rth (H↑↑ ) = D(PXY kPX × PY ) = I(X : Y ) . (49) Moreover, the Hoeffding [34] and Han-Kobyashi [21] bounds give an operational interpretation for the following Rényi mutual information:   X X 1 Is↑↑ (X : Y ) := Ds (PXY kPX × PY ) = PY (y) PX|Y =y (x)s PX (x)1−s  . log  (50) s−1 y∈Y x∈X As an example, in wire-tap channel coding, this kind of Rényi mutual information is used to express the exponents of leaked mutual information [27], [23]. 2) One marginal fixed: Here we consider a hypothesis test where the alternative hypothesis is comprised of product distributions where one marginal is fixed. This is the example discussed in Section III-B1 with TX = PX . This hypothesis test figures prominently when analyzing the converse to various channel coding questions in the fixed error regime, for example for second-order analysis of the discrete memoryless channels [48], [24] and beyond [57]. In this context, Polyanskiy [47, Sec. II] raised the following hypothesis testing problem: ×n , null hypothesis: (X n , Y n ) ∼ PXY alternative hypothesis: X n ∼ PX×n independent of Y n . (51) This problem has the same threshold, I(X : Y ), but gives an operational interpretation for Sibson’s [53] definition of Rényi mutual information, which is given by Is↑↓ (X : Y ) := = = min Ds (PXY kPX × QY )  !1 s X X log  PY (y) PX|Y =y (x)s PX (x)1−s  QY ∈P(Y) s s−1 s E0 s−1 y∈Y  (52) (53) x∈X  s−1 , PX , s (54) where E0 is Gallager’s error exponent function [20].5 The explicit form of the distribution QY that achieves the minimum is given by Sibson’s identity (cf. Appendix A). Our results for the optimal error and strong converse exponents then read   1 − s ↑↓ s−1 eR (Hmi Is (X : Y ) − R and scR (Hmi R − Is↑↓ (X : Y ) , (55) ↑↓ ) = sup ↑↓ ) = sup s s s>1 s∈(0,1) mi In the setting of channel coding with constant composition codes of type PX , the exponents eR (Hmi ↑↓ ) and scR (H↑↓ ) are equal to the error exponent [20] and the strong converse exponents [2], respectively. In wire-tap channel coding, it is used for expressing the exponents of leaked information when the leaked information is measured in terms of the variational distance [28, Thm. 5]. 5 Verdú [62] recently surveyed Sibson’s definition and pointed out its favorable mathematical properties in the case of general alphabets. 12 3) Arbitrary product distributions, permutation invariant: Let us now consider the most general problem, ×n , null hypothesis: (X n , Y n ) ∼ PXY Hmi ↓↓ : alternative hypothesis: X n and Y n independent, (X n , Y n ) permutation invariant. (56) This is covered by the example in Section III-B2. In fact, it is sufficient to require that either X n or Y n be permutation invariant (cf. Proposition 15). We find that for R sufficiently close to the threshold I(X : Y ), we have   1 − s ↓↓ s−1 eR (Hmi sup Is (X : Y ) − R and scR (Hmi R − Is↓↓ (X : Y ) , (57) ↓↓ ) = ↓↓ ) = sup s s s>1 s∈( 1 ,1) 2 with a different definition of Rényi mutual information, Is↓↓ (X : Y ) := min QX ∈P(X ), QY ∈P(Y) Ds (PXY kQX × QY ) . (58) Our result gives an operational interpretation for this definition of Rényi mutual information. However, this operational interpretation only applies for s ≥ 12 . In fact, it is unclear if our results can be extended to smaller s and we do not know of a closed form expression for this quantity. While this work was completed, the properties of this definition have been independently studied in [37]. B. Rényi Conditional Entropy: Testing Against Uniform and Independent Distribution The conditional entropy can be expressed in terms of the Kullback-Leiber divergence very similarly to the mutual information, with the difference that we require one marginal to be fixed to a uniform distribution. This leads to the following two expressions: (59) H(X|Y ) = log |X | − D(PXY kRX × PY ) = log |X | − min QY ∈P(Y) D(PXY kRX × QY ), (60) where RX is the uniform distribution over X and, as in the previous section, X and Y are two random variables governed by a joint distribution PXY ∈ P(X × Y) with marginals PX and PY . Note that the term log |X | can easily be incorporated in the relative entropy term if we do not require the second argument to be a normalized probability distribution but instead allow arbitrary positive distributions. Our results extend to this more general setup but we will restrict to normalized distributions as otherwise the corresponding hypothesis testing problems are unnatural. 1) Fixed marginal distribution: Consider the following hypothesis testing problem: Hc↑ : ×n , null hypothesis: (X n , Y n ) ∼ PXY ×n and Y n ∼ PY×n are independent. alternative hypothesis: X n ∼ RX (61) We find that the threshold rate is D(PXY kRX × PY ) = log |X | − H(X|Y ) and the Hoeffding [34] and HanKobyashi [21] bounds establish an operational meaning for the Rényi conditional entropy   X X 1 Hs↓ (X|Y ) := log |X | − Ds (PXY kRX × PY ) = PY (y) PX|Y =y (x)s  . log  (62) 1−s y∈Y x∈X This definition of conditional Rényi entropy is for example used to express the leaked modified mutual information in the secure random number generation [27, Thm. 2] and [31, Thm. 2]. 13 2) Arbitrary marginal distribution: We consider the following problem, in analogy with Section IV-A2: ×n , null hypothesis: (X n , Y n ) ∼ PXY Hc↓ : ×n independent of Y n . alternative hypothesis: X n ∼ RX (63) This is covered by the example in Section III-B1 with TX the uniform distribution. Again we determine the threshold log |X | − H(X|Y ) and the error and strong converse exponents given operational significance to Arimoto’s [3] definition of Rényi conditional entropy,  !1 s X X s s . PY (y) PX|Y log  (64) Hs↑ (X|Y ) := log |X | − min Ds (PXY kRX × QY ) = =y 1−s QY ∈Q(Y) y∈Y x∈X The minimum was evaluated using Sibson’s identity (cf. Lemma 29 in Appendix A). This definition has recently be reviewed in [18] and compares favorably to other definitions of Rényi conditional entropy that have recently been put forward [55], [35]. For example, it has an operational interpretation determining the moments of the number of rounds required to guess X from Y [1], and relatedly as an exponent for task encoding with side information [6]. More precsiely, we have   1−s s−1 eR (Hc↑↓ ) = sup log |X | − Hs↑↓ (X : Y ) − R and scR (Hc↑↓ ) = sup R − log |X | + Hs↑↓ (X : Y ) , s s s>1 s∈(0,1) (65) As a further example, in secure random number extraction, sclog |X |−R (Hc↑↓ ) expresses the error exponent under the universal composability criterion [28, Thm. 4] and [33, Thm. 30]. C. Rényi Conditional Mutual Information: Testing Against Markov Distributions Let X, Y and Z be three random variables with a joint distribution PXY Z ∈ P(X × Y × Z). The conditional mutual information, I(X : Z|Y ), can be seen as a measure of how close the distribution PXY Z is to a Markov chain X ↔ Y ↔ Z . For example, we can write (66) I(X : Z|Y ) = D(PXY Z kPY × PX|Y × PZ|Y ) = = min QZ|Y ∈P(Z|Y ) (67) D(PXY Z kPY × PX|Y × QZ|Y ) min QXY Z ∈P(X ×Y×Z) QXY Z =QX|Y ×QZ|Y ×QZ (68) D(PXY Z kQY × QX|Y × QZ|Y ) , where the latter optimization is over all distributions satisfying the Markov condition QXY Z = QX|Y × QZ|Y × QZ . These are only a few of all the possible expressions for the conditional mutual information, but we will focus our attention on these examples and follow a similar discussion as with the mutual information. 1) All marginals fixed: Again we first consider a simple alternative hypothesis. Hcmi ↑↑↑ : ×n null hypothesis: (X n , Y n , Z n ) ∼ PXY Z, ×n (69) , and (Y n , Z n ) ∼ PY×n alternative hypothesis: X n ↔ Y n ↔ Z n is Markov, (X n , Y n ) ∼ PXY Z.  This corresponds to the sets Qn := (PY × PX|Y × PZ|Y )×n . The threshold rate for this problem is the conditional mutual information, I(X : Z|Y ). Furthermore, the Hoeffding [34] and Han-Kobyashi [21] bounds yield an operational interpretation of the Rényi conditional mutual information given as Is↑↑↑ (X : Z|Y ) := Ds (PXY Z kPY × PX|Y × PZ|Y )  X X 1 = PY (y) PZ|Y =y (z) log  s−1 y∈Y z∈Z (70) X x∈X PX|Y =y,Z=z (x)s PX|Y =y (x)1−s !! . (71) In the special case where PXY Z = PY Z × PX|Z , this kind of Rényi mutual information describes the exponent for leaked mutual information when we employ a superposition code in the wire-tap channel [63, Lem. 16] and [30, Thm. 20]. 14 2) Two marginals fixed, recovery channels: The expression in (67) corresponds to the following problem: ×n null hypothesis: (X n , Y n , Z n ) ∼ PXY Z, Hcmi ↑↑↓ : ×n . alternative hypothesis: X n ↔ Y n ↔ Z n is Markov, (X n , Y n ) ∼ PXY (72) This problem is discussed in Section III-B3. We show that the threshold for this test is again given by I(X : Z|Y ). Moreover, the optimal error and strong converse exponents for R close to the threshold are given by   s−1 1 − s ↑↑↓ Is (X : Z|Y ) − R and scR (Hcmi R − Is↑↑↓ (X : Z|Y ) , (73) eR (Hcmi ↑↑↓ ) = sup ↑↑↓ ) = sup s s s>1 s∈(0,1) where we have introduced a new definition of the Rényi conditional mutual information. This is given by Is↑↑↓ (X : Z|Y ) := = min Ds (PXY Z kPY × PX|Y × QZ|Y )   !1 s  s X X X log  PY (y)  PZ|Y =y (z) PX|Y =y,Z=z (x)s PX|Y =y (x)1−s   . QZ|Y ∈P(Z|Y) 1 s−1 y∈Y z∈Z (74) (75) x∈X The minimum was evaluated using Sibson’s identity in Lemma 29 for the distribution QZ|Y =y seperately for each y ∈ Y . (See Appendix A-D for details.) The resulting expression can be regarded as a conditional version of the ρ Gallager function by replacing s with ρ−1 . In the special case where PXY Z = PY Z × PX|Z , this quantity is used in superposition coding to describe the error exponent [36, Sec. II] and the exponent of leaked information [30, Thm. 22]. 3) Arbitrary Markov distribution, permutation invariant: The most general alternative hypothesis that we consider is comprised of all distributions that have a Markov structure X ↔ Y ↔ Z . More precisely, the following problem: Hcmi ↓↓↓ : ×n null hypothesis: (X n , Y n , Z n ) ∼ PXY Z, alternative hypothesis: X n ↔ Y n ↔ Z n is Markov, (X n , Y n , Z n ) permutation invariant. (76) This is covered in Section III-B3. The threshold is again I(X : Z|Y ) and the optimal error and strong converse exponents for R close to the threshold are given by   s−1 1 − s ↓↓↓ Is (X : Z|Y ) − R and scR (Hcmi R − Is↓↓↓ (X : Z|Y ) , (77) sup eR (Hcmi ↓↓↓ ) = sup ↓↓↓ ) = s s s>1 s∈( 2 ,1) 3 with yet another Rényi conditional mutual information, Is↓↓↓ (X : Z|Y ) := min QXY Z ∈P(X ×Y×Z) Ds (PXY Z kQY × QX|Y × QZ|Y ) . (78) Note that we only have an operational interpretation of this quantity for s > 23 , and, moreover, we do not know of a closed form expression. V. P ROOFS : H OEFFDING B OUND The proof of Theorem 9 is split into two parts, achievability and optimality, which both rely on different Axioms. A. Some Properties of φ(s) Before we state our result, let us introduce some helpful notation. Recall that φ(s) := (s − 1)Ds (P kQ) = log gs (P kQ) and define φ̄s0 (s) := (s − 1)Ds (P kQ̂s0 ) = log gs (P kQ̂s0 ) , (79) where Q̂s0 := Qθ̂s0 . Clearly, φ(s0 ) = φ̄s0 (s0 ) by definition of θ̂ s in Axiom 5. An important consequence of this Axiom is the following lemma, which shows that the first derivative of φ and φ̄ agree as well at s = s0 . Lemma 19. Assume Axiom 5 holds on (a, b). Then, for s0 ∈ (a, b), we have d Ds (P kQ) ds s=s0 = d Ds (P kQθ̂s0 ) ds s=s0 . (80) 15 Moreover, the function φ(s) on (a, b) is continuously differentiable and satisfies φ′ (s0 ) = φ̄′s0 (s0 ). Proof: Let us define f (s, θ) = gs (P kQθ ). Write θ = (θ1 , . . . , θd ) as a d-dimensional real vector. The point θ̂ s is determined by the implicit functions ∂ Fi (s, θ) := f (s, θ) = 0, ∀i ∈ {1, 2, . . . , d} . (81) ∂θi Moreover, the Hessian matrix Hs of θ 7→ f (s, θ) at θ̂ s is given by (Hs )i,j = ∂2 f (s, θ) ∂θi ∂θj θ=θ̂ s (82) . The map s 7→ Hs is continuous since (s, θ) 7→ f (s, θ) is C 2 by Axiom 5. Let us first treat the case s0 > 1. By Axiom 5 we have that Hs is positive definite and thus invertible. Then, the implicit function theorem yields ∂ θ̂is ∂s s=s0 =− d X Hs−1 0 j=1  i,j · ∂Fj (s, θ̂ s0 ) ∂s (83) s=s0 and in particular s 7→ θ̂ s is continuously differentiable. We further find that d f (s, θ̂ s ) ds s=s0 ∂ f (s, θ̂ s0 ) = ∂s s=s0 + d X i=1 F i (s0 , θ̂ s0 ) · ∂ θ̂is ∂s = s=s0 ∂ f (s, θ̂ s0 ) ∂s s=s0 , (84) where we used that F i (s0 , θ̂ s0 ) = 0 by definition of θ̂ s0 . This establishes the result for s0 ∈ (1, b). An analogous argument yields the same result for s0 < 1. For s0 = 1 we instead choose f (s, θ) = Ds (P kQθ ). Again the Hessian matrix for the derivative with regards to θ is strictly positive definite, and the remainder of the argument proceeds as before. Finally, since s 7→ Ds (P kQ) is C 2 for fixed P, Q ∈ P(X) and θ 7→ Qθ as well as s 7→ θ̂ s are continuous, we deduce that the functions s 7→ Ds (P kQ) and φ(s) = (s − 1)Ds (P kQ) are continuously differentiable. B. Some Properties of Convex C 1 Functions In this section let φ̃(s) be a general convex C 1 function on (a, b) ⊆ [0, ∞) and define ψ̃(s) := sφ̃′ (s) − φ̃(s). Moreover, define R̃c := lims→c ψ̃(s) for every c ∈ [a, b]. Lemma 20. The function ψ̃(s) is continuous and monotonically nondecreasing on (a, b). Proof: Let a < s0 < s1 < b. By the mean value theorem there exists an s ∈ [s0 , s1 ] such that (s1 − s0)φ̃′ (s) = φ̃(s1 ) − φ̃(s0 ). Thus,  ψ̃(s1 ) − ψ̃(s0 ) = s1 φ̃′ (s1 ) − s0 φ̃′ (s0 ) − φ̃(s1 ) − φ̃(s0 ) (85) = s1 φ̃′ (s1 ) − s0 φ̃′ (s0 ) − (s1 − s0 )φ̃′ (s)   = s1 φ̃′ (s1 ) − φ̃′ (s) + s0 φ̃′ (s) − φ̃′ (s0 ) ≥ 0 . (86) (87) The inequality follows from the assumption that φ̃(s) is convex, and φ̃′ (s) thus monotonically increasing. Lemma 21. Let R ∈ (R̃a , R̃b ). Then, there exists an ŝ ∈ (a, b) such that ψ̃(ŝ) = R and (ŝ − 1)R − φ̃(ŝ) (s − 1)R − φ̃(s) = s ŝ s∈(a,b) sup (88) Proof: By continuity, for every R ∈ (R̃a , R̃b ), there exists (at least one) value ŝ ∈ (a, b) such that ψ̃(ŝ) = R. φ̃(s) . This yields Let us first calculate the derivative of g(s) := (s−1)R− s sR − sφ̃′ (s) − (s − 1)R + φ̃(s) R − ψ̃(s) = . (89) 2 s s2 Note that the numerator is monotonically decreasing in s due to Lemma 20 and vanishes at s = ŝ. In particular, we find that g′ (s) ≥ 0 for a < s < ŝ and g′ (s) ≤ 0 for ŝ < s < b. We conclude that ŝ maximizes g(s) on (a, b). g′ (s) = 16 C. Proof of Achievability Achievability for Theorem 9 follows from the following statement. Proposition 22. Assume Axioms 3 and 4 hold with parameter a. Then, we have      1 1−s ×n Ds (P kQ) − R . lim inf − log α̂ exp(−nR); P Qn ≥ sup n→∞ n s s∈(a,1) (90) Proof: Note that the expression on the right hand side of (90) is zero if R ≥ D(P kQ) and the inequality thus holds trivially for that case. We assume that R < D(P kQ) for the remainder of this proof. Let us fix any s ∈ (a, 1) for the moment. Moreover, let us define the sequence of tests ( 1 if P ×n (xn ) ≥ exp(λn )U n (xn ) Tn (xn ) := , (91) 0 otherwise where U n is the universal distribution of Axiom 4. We also choose the sequence {λn }n∈N of real numbers as  1 λn = log v(n) + nR + (s − 1)Ds (P ×n kU n ) . (92) s Axiom 4 implies that Qn is closed under symmetrization. Moreover, the test Tn is permutation invariant. Hence, for all π ∈ Sn , we have Qn [Tn ] = Qn [Tn Wπn ] = Qn Wπn−1 [T n ] and we can in particular replace Qn with its symmetrization. This yields  ×n n  n n n Q P (X ) ≥ exp(λ )U (X ) (93) β(Tn ; Qn ) = max n Qn ∈Qn   = maxsym Qn P ×n (X n ) ≥ exp(λn )U n (X n ) . (94) Qn ∈Qn Next we use the universal distribution in Axiom 4 to further bound X  β(Tn ; Qn ) ≤ v(n) U n (xn ) 1 P ×n (xn ) ≥ exp(λn )U n (xn ) (95) xn ∈X n ≤ v(n) exp(−sλn ) ≤ v(n) exp(−sλn ) X xn ∈X n X xn ∈X n 1−s ×n s  ×n n U n (x) P (x) 1 P (x ) ≥ exp(λn )U n (xn ) 1−s ×n s U n (x) P (x)  = v(n) exp (−sλn ) exp (s − 1)Ds (P ×n kU n ) . (96) (97) (98) Hence, the requirement that β(Tn ; Qn ) ≤ exp(−nR) is satisfied by the choice of λn in (92). Note that this statement can directly be extended to the convex hull due to (17). Let us now take a closer look at the error of the first kind. Using a similar development as above, we find    (99) α̂ exp(−nR); P ×n Qn ≤ α(Tn ; P ×n ) = P ×n P ×n (X n ) < exp(λn )U n (X n )   ×n n (100) ≤ exp (1 − s)λn exp (s − 1)Ds (P kU ) 1 − s   = exp (101) log v(n) + nR − Ds (P ×n kU n ) s where we substituted λn from (92) in the last step. Further using the additivity property of Axiom 3, we find that Ds (P ×n kU n ) ≥ Ds (P ×n kQn ) ≥ nDs (P kQ), (102) and thus we arrive at the bound  1−s  nR − nDs (P kQ) + log v(n) . log α̂ exp(−nR); P ×n Qn ≤ s Since log v(n) = O(log n), taking the limit n → ∞ yields   1−s 1 lim inf − log α̂ exp(−nR); P ×n Qn ≥ Ds (P kQ) − R . n→∞ n s Finally, since this derivation holds for all s ∈ (a, 1), we established the direct part. (103) (104) 17 D. Proof of Optimality To show optimality, we will directly employ the converse of the Hoeffding bound. Proposition 23. Assume Axioms 2–5 hold with parameter a. Then, for any R > Ra , we have      1−s 1 Ds (P kQ) − R . lim sup − log α̂ exp(−nR); P ×n Qn ≤ sup n s n→∞ s∈(a,1) (105) Proof: Let us first consider the case R ∈ (Ra , D(P kQ)). We will use the results of Sections V-A and V-B. Take ŝ ∈ (a, 1) to be the optimizer in Lemma 21 for the functions φ̃ = φ and ψ̃ = ψ on (a, 1). Then we have that ψ(ŝ) = ŝφ′ (ŝ) − φ(ŝ) = R and 1 − ŝ 1−s (Ds (P kQ) − R) = (Dŝ (P kQ) − R) s ŝ s∈(a,1) sup (106) The following consequence of Lemma 19 is crucial. Recall that φ̄(s) = log gs (P kQθ̂ŝ ) and ψ̄(s) = sφ̄′ (s) − φ̄(s) , (107) where θ̂ ŝ is the optimal θ at s = ŝ. Note that the function s 7→ φ̄(s) is a C 1 convex function on all of (0, 1) since gs is evaluated for fixed distributions P and Qθ̂ŝ . Moreover, Lemma 19 implies that φ′ (ŝ) = φ̄′ (ŝ), and hence, ψ̄(ŝ) = ψ(ŝ) = R. We can thus also apply Lemma 21 for the functions φ̃ = φ̄ and ψ̃ = ψ̄ on (0, 1) and find that  1 − ŝ 1−s sup (Dŝ (P kQ) − R) . (108) Ds (P kQθ̂ŝ ) − R = s ŝ s∈(0,1) Next we note that, due to Axiom 2, we have     α̂ exp(−nR); P ×n Qn ≥ α̂ exp(−nR); P ×n Q×n (109) for any Q ∈ Q. After applying this for Q = Qθ̂ŝ , we can further apply the converse of the Hoeffding bound (we take the formulation in [43, Thm. 1]) to the expression on the right-hand side, which yields    1 ×n Qn (110) lim sup − log α̂ exp(−nR); P n n→∞     1 ≤ lim sup − log α̂ exp(−nR); P ×n Q×n (111) θ̂ ŝ n n→∞  1−s = sup (112) Ds (P kQθ̂ŝ ) − R . s s∈(0,1) which proves the result together with (106) and (108). If R ≥ D(P kQ) the right hand side of (105) evaluates to zero. Moreover, there exists at least one Q ∈ Q such that R ≥ D(P kQ). The result then follows from the converse of Hoeffding’s bound since     1 1 lim sup − log α̂ exp(−nR); P ×n Qn ≤ lim sup − log α̂ exp(−nR); P ×n Q×n = 0 . (113) n n n→∞ n→∞ VI. P ROOFS : S TRONG C ONVERSE E XPONENTS Again we treat achievability and optimality with separate proofs that rely on different axioms. 18 A. Proof of Achievability Our proof relies on a variant of the Gärtner-Ellis theorem of large deviation theory (see, e.g., [14, Sec. 2 and Sec. 3.4] for an overview), which we recall here. Given a sequence of random variables {Zn }n∈N we introduce its asymptotic cumulant generating function as    1 log E [exp(ntZn )] , (114) ΛZ (t) := lim n→∞ n if it exists. For our purposes it is sufficient to use the following variant of the Gärtner-Ellis theorem due to Chen [7, Thm. 3.6] (see also [40, Lem. A.2] for this exact statement). Lemma 24. Let us assume that t 7→ ΛZ (t) as defined in (114) exists and is differentiable in some interval (a, b).  Then, for any z ∈ limtցa Λ′Z (t), limtրb Λ′Z (t) , we have   1 (115) lim sup − log Pr[Zn ≥ z] ≤ sup {tz − ΛZ (t)} . n n→∞ t∈(a,b) Achievability follows from the following statement. Proposition 25. Assume Axioms 3–5 hold with parameter b. For any R ∈ (0, Rb ), we have       s−1 1 ×n Qn ≤ sup lim − log 1 − α̂ exp(−nR); P R − Ds (P kQ) . n→∞ n s s∈(1,b) (116) Proof: Let us first assume that R ∈ (D(P kQ), Rb ). Using Lemma 21 with φ̃ = φ on (1, b), we find the value ŝ ∈ (1, b) that satisfies  ŝ − 1  s−1 sup R − Ds (P kQ) = R − Dŝ (P kQ) (117) s ŝ s∈(1,b) and ψ(ŝ) = ŝφ′ (ŝ) − φ(ŝ) = R. We use the same sequence of tests Tn as in (91) and the sequence λn of (92), substituting ŝ for s. This ensures that β(Tn ; Qn ) ≤ exp(−nR), as shown in the proof of Proposition 22. Moreover,   (118) 1 − α̂ exp(−nR); P ×n Qn ≥ 1 − α(Tn ; P ×n )   = P ×n P ×n (X n ) ≥ exp(λn )U n (X n ) = Pr[Zn ≥ 0] , (119) where we defined the sequence of random variables Zn (X n ) following the law X n ← P ×n and   1 P ×n (xn ) Zn (xn ) = log n n − λn n U (x )   1 nR P ×n (xn ) log v(n) ŝ − 1 ×n n = − Dŝ (P kU ) − log n n − . n U (x ) ŝ ŝ ŝ Its asymptotic cumulant generating function then evaluates to    1 log E [exp(n(t − 1)Zn )] ΛZ (t − 1) = lim n→∞ n  ×n n t−1     P (X ) log v(n) ŝ − 1 R 1 ×n n log E + Dŝ (P kU ) + − (t − 1) = lim n→∞ n U n (X n )t−1 nŝ nŝ ŝ   1 ŝ − 1 R log v(n) = (t − 1) lim Dt (P ×n kU n ) − Dŝ (P ×n kU n ) − − n→∞ n nŝ ŝ nŝ t−1 (φ(ŝ) + R) = φ(t) − ŝ = φ(t) − (t − 1)φ′ (ŝ) . (120) (121) (122) (123) (124) (125) (126) Here we used the expression for Zn given in (121) and the defintion of the Rényi divergence in the second and third equality, respectively. To arrive at (125) we evaluated the limit n → ∞ using Lemma 7. The last equality follows from the relation between ŝ and R given in the line following (117). 19 Note that t 7→ ΛZ (t − 1) is differentiable on (1, b) due to Lemma 19. Moreover, in order to apply Lemma 24 with z = 0, we need to verify the following two inequalities:     d d ′ ′ lim ΛZ (t − 1) = φ (1) − φ (ŝ) < 0 and lim ΛZ (t − 1) = φ′ (b) − φ′ (ŝ) > 0 . (127) t→1 dt t→b dt We cannot invoke strict convexity of φ(s) to verify the above bounds; instead, note that D(P kQ) < R, and thus 1 ŝ − 1 Dŝ (P kQ) − R ŝ ŝ  ŝ − 1 D(P kQ) − Dŝ (P kQ) ≤ 0 . < ŝ To prove the second inequality in (127), we use the fact that Rb > R to show b−1 1 ŝ − 1 1 Db (P kQ) − R − Dŝ (P kQ) φ′ (b) − φ′ (ŝ) = Rb + b b ŝ ŝ 1 b−1 1 ŝ − 1 > R+ Db (P kQ) − R − Dŝ (P kQ) b b ŝ ŝ  b−1  ŝ − 1 = R − Dŝ (P kQ) − R − Db (P kQ) ≥ 0 , ŝ b where the last inequality follows by the definition of ŝ. We have now verified the conditions of Lemma 24 with z = 0, which yields 1 lim − log Pr[Zn ≥ 0] = sup (t − 1)φ′ (ŝ) − φ(t) n→∞ n t∈(1,b) φ′ (1) − φ′ (ŝ) = D(P kQ) − = (ŝ − 1)φ′ (ŝ) − φ(ŝ)    ŝ − 1 ŝ − 1 1 ′ = φ(ŝ) = R − Dŝ (P kQ) . ŝφ (ŝ) − φ(ŝ) + ŝ ŝ − 1 ŝ (128) (129) (130) (131) (132) (133) (134) (135) To evaluate the supremum in (133), we note that the objective function t 7→ (t − 1)φ′ (ŝ) − φ(t) is concave in t and its derivative vanishes at t = ŝ. This establishes (134). Combining this with (118) concludes the proof. For R ≤ D(P kQ) the right hand side of (116) evaluates to zero. Since the expression on the left hand side is clearly monotonically increasing in R we deduce that, for all such R,       1 s−1 ×n R − Ds (P kQ) = 0. (136) lim − log 1 − α̂ exp(−nR); P Qn ≤ inf sup n→∞ n s R>D(P kQ) s∈(1,b) B. Proof of Optimality Optimality follows as a corollary of Han and Kobayashi’s [21] derivation of the strong converse exponent. Proposition 26. Assume Axiom 2 holds. For any R ≥ 0, we have       1 s−1 ×n lim inf − log 1 − α̂ exp(−nR); P Qn R − Ds (P kQ) . ≥ sup n→∞ n s s>1 (137) Proof: If R < D(P kQ) the bound holds trivially. Otherwise, analogous to the optimality proof for Theorem 9, we first fix Q ∈ Q and apply the Han-Kobayashi converse bound [21] (in the form of [46, Ch. VI] and [39, Thm. IV.9]). This yields     1 ×n Qn lim inf − log 1 − α̂ exp(−nR); P (138) n→∞ n      1 ≥ lim inf − log 1 − α̂ exp(−nR); P ×n Q×n (139) n→∞ n    s−1 = sup R − Ds (P Q) . (140) s s>1 As this holds for all Q ∈ Q, we maximize the expression in (140) over Q to arrive at the desired result. 20 VII. P ROOFS : S ECOND O RDER A SYMPTOTICS OF S TEIN ’ S L EMMA In the proofs of this section we assume that log denotes the natural logarithm for ease of presentation. The following result refines Lemma 7, and is the key ingredient of our proof. Lemma 27. Assume Axioms 2–5 holds on (a, b) ⊃ {1}. For all t ∈ R,    t2 t  lim √ D1+ √t (P ×n kU n ) − nD(P kQ) = V (P kQ) . n n→∞ n 2 (141) Proof: By combining Lemma 19 at s0 = 1 with the Taylor expansion in (26), we find D1+s (P kQ) = D(P kQ) + 2s V (P kQ) + O(s2 ). From (32) we learn that √ t n ×n n V (P kQ) + O(log n) . (142) D1+ √t (P kU ) ≤ nD1+ √t (P kQ) + log v(n) = nD(P kQ) + n n 2 Furthermore, employing additivity from Axiom 3 yields √ t n ×n n V (P kQ) + O(log n) . (143) D1+ √t (P kU ) ≥ nD1+ √t (P kQ) = nD(P kQ) + n n 2 Combining (142) and (143)  yields the desired statement. Now let MX (t) := E exp(tX) denote the moment generating function of a real random variable X . We also need the following property of moment generating functions, a variant of Lévi’s continuity theorem [41, Thm. 2]. Lemma 28. Let 0 < a < b. If a sequence of random variables {Xn }n∈N satisfies limn→∞ MXn (t) = MX (t) for some random variable X and all t ∈ (a, b), then limn→∞ Pr[Xn ≤ k] = Pr[X ≤ k] for all k ∈ R. We prove the direct and converse part of Theorem 12 together. Proof of Theorem 12: We first show the converse statement. Choosing the optimal distribution Q̂ = Q̂1 ∈ Q as defined in (28), we find   √ √ α̂ exp(−nD(P kQ) − nr); P ×n Qn ≥ α̂ exp(−nD(P kQ̂) − nr); P ×n Q̂×n , (144) and the limiting statement then follows using [64, Thm. 2] (see also [54, Thm. 1.1]). √ To show achievability we again rely on the test given in (91) and set λn = nD(P kQ) + nr + log v(n). Then by Axiom 4 and using the argument leading to (94) to establish the first identity, we have   β(Tn ; Qn ) = maxsym Qn P ×n (X n ) ≥ exp(λn )U n (X n ) (145) Qn ∈Qn   ≤ v(n)U n P ×n (X n ) ≥ exp(λn )U n (X n ) (146)  ×n n  ×n n n ≤ v(n) exp(−λn )P P (X ) ≥ exp(λn )U (X ) (147) √  ≤ exp − nD(P kQ) − nr . (148) Furthermore, we find   √ α(Tn ; P ×n ) = P ×n log P ×n (X n ) − log U n (X n ) < nD(P kQ) + nr + log v(n) n = Pr[Yn (X ) < r] , where X n ∼ P ×n and we defined the following sequence of random variables as  1 Yn (X n ) := √ log P ×n (X n ) − log U n (X n ) − nD(P kQ) − log v(n) . n Lemma 27 then implies that the cumulant generating function converges to   log MY (t) = lim log E exp(tY n ) n→∞    t √ t √ − √tn  n n n n + ntD(P kQ) − √ log v(n) = lim log E PX n (x ) U (x ) n→∞ n    t = lim √ D1+ √t (P ×n kU n ) − nD(P kQ) − log v(n) n n→∞ n 2 t = V (P kQ) . 2 (149) (150) (151) (152) (153) (154) (155) 21 Hence, by Lemma 28, the sequence of random variable {Yn }n converges in distribution to a random variable Y with cumulant generating function log MY (t), i.e., a Gaussian random variable with zero mean and variance V (P kQ). In particular, this yields ! r lim P ×n [Yn < r] = Pr [Y < r] = Φ p . (156) n→∞ V (P kQ)  √ Since α̂ exp(−nD(P kQ) − nr); P ×n Qn ≤ α(Tn ; P ×n ), this concludes the proof. VIII. C ONCLUSION We have introduced a general framework to treat binary hypothesis testing with a composite alternative hypothesis. In this general framework we show analogues of Stein’s Lemma, Hoeffding’s optimal error exponents and HanKobyashi’s optimal strong converse exponents. We have discussed several concrete examples that lead to operational interpretations of various Rényi information measures. The coincidence between our obtained exponents for the hypothesis testing problem in (51) and the corresponding exponents for channel coding is quite interesting. A similar coincidence has been observed for the case of source coding with side information and (63). These facts seem to indicate a deep relation between coding and the composite alternative hypotheses given in (51) and (63). Its further clarification is an interesting future direction of study, for example one could try to find coding problems that are closely related to (72). In statistics, the χ2 test is used in an asymptotic setting similar to (9). The test assumes i.i.d. distributions and is used for the case when both hypotheses are composite (see, e.g., [38]). For small samples and k = 2, Fisher’s exact test [19] can be used to replace the χ2 test. Recently, the setting of small samples and general k has been studied using a Gröbner basis approach [15], [50]. In contrast to their formulation, we have not assumed i.i.d. structure for the independent case; instead, we only require permutation invariance for each random variable. Our result suggests that we can replace the i.i.d. condition by a permutation invariant condition when testing independence, which can be expected to have wider applications. The key ingredient of our derivation is an axiomatic approach based on the universal distribution. Due to its generality, we can treat many composite hypothesis testing problems without i.i.d. assumption (for the composite hypothesis), and it will be interesting to explore further examples that fit into our framework. Moreover, because the universal distribution plays an important role in universal channel coding [24], we can expect that it will play an important role when analyzing universal protocols for other problems in information theory. As explained in Section III-B2, we cannot remove the permutation invariance condition in that example, an essential difference to the example given in Section III-B1. This kind of difference sheds light on the difference between channel coding and secure random number generation. Originally, for the channel coding, the meta converse was introduced using simple hypothesis testing [42, Sec. 3] and [48]. Polyanskiy [47, Sec. II] then extended it to the composite hypothesis testing of the form (7). Although this improvement does not effect the exponents and the second-order coding rate, it can improve the bound in the finite blocklength regime. Recently, Tyagi-Watanabe [58], [59] introduced a converse bound for secure random number generation by using simple hypothesis testing between a true joint distribution and an arbitrary product distribution. Although in their converse bound, we can choose an arbitrary product distribution as the alternative hypothesis, we cannot replace the alternative hypothesis by a composite hypothesis composed of all of product distributions. Hence, for secure random number generation, we cannot extend their bound to a bound based on the composite hypothesis as in [47]. In prior work [32] the present authors have analyzed composite hypothesis testing in the non-commutative (quantum) regime and found an operational interpretation for various definitions of quantum Rényi mutual information and quantum Rényi conditional entropy [56]. However, the present work is more general than the classical specialization of that work and requires new techniques. This allows us to deal with more complex composite alternative hypotheses, and in particular allows for a characterization of Rényi conditional mutual information. Furthermore, finding appropriate definitions for Rényi conditional mutual information in the non-commutative setting is an ongoing topic of research [4]. It is possible that an adaption of our analysis to quantum hypothesis testing will lead to further progress in this direction. However, some caution is advised since already the definitions of the regular conditional mutual information in (66)–(68) are not equivalent in the quantum case. 22 Acknowledgements: We thank Vincent Y. F. Tan for helpful comments and Christoph Pfister for alterting us to several typos and small gaps in our presentation. MH is partially supported by a MEXT Grant-in-Aid for Scientific Research (A) No. 23246071, and by the National Institute of Information and Communication Technology (NICT), Japan. MT is funded by an University of Sydney Postdoctoral Fellowship and acknowledges support from the ARC Centre of Excellence for Engineered Quantum Systems (EQUS). R EFERENCES [1] E. Arikan. “An Inequality on Guessing and its Application to Sequential Decoding”. IEEE Trans. Inf. Theory 42(1): 99–105 (1996). [2] S. Arimoto. “On the Converse to the Coding Theorem for Discrete Memoryless Channels”. IEEE Trans. Inf. Theory 19(3): 357–359 (1973). [3] S. Arimoto. “Information Measures and Capacity of Order Alpha for Discrete Memoryless Channels”. Colloq. Math. Soc. János Bolya 16: 41–52, (1975). [4] M. Berta, K. Seshadreesan, and M. Wilde. “Rényi Generalizations of the Conditional Quantum Mutual Information”. J. Math. Phys. 56(2): 022205 (2015). [5] J. A. Bucklew. Large Deviation Techniques in Decision, Simulation, and Estimation. Wiley (1990). [6] C. Bunte and A. Lapidoth. “Encoding Tasks and Rényi Entropy”. IEEE Trans. Inf. Theory 60(9): 5065–5076 (2014). [7] P.-N. Chen. “Generalization of Gärtner-Ellis Theorem”. IEEE Trans. Inf. Theory 46(7): 2752–2760, (2000). [8] H. Chernoff. “Large-Sample Theory: Parametric Case”. Ann. Math. Stat. 27(1): 1–22 (1956). [9] B. Clarke and A. Barron. “Information-Theoretic Asymptotics of Bayes Methods”. IEEE Trans. Inf. Theory 36(3): 453–471 (1990). [10] I. Csiszár. “Generalized Cutoff Rates and Renyi’s Information Measures”. IEEE Trans. Inf. Theory 41(1): 26–34 (1995). [11] I. Csiszár. “The Method of Types”. IEEE Trans. Inf. Theory 44(6): 2505–2523 (1998). [12] I. Csiszár and G. Longo. “On the Error Exponent for Source Coding and for Testing Simple Statistical Hypotheses”. Stud. Sci. Math. Hungarica 6: 181–191, (1971). [13] L. Davisson. “Universal noiseless coding”. IEEE Trans. Inf. Theory 19(6): 783–795 (1973). [14] A. Dembo and O. Zeitouni. Large Deviations Techniques and Applications. Springer (1998). [15] P. Diaconis and B. Sturmfels. “Algebraic Algorithms for Sampling from Conditional Distributions”. Ann. Stat. 26(1): 363–397 (1998). [16] O. Fawzi and R. Renner. “Quantum Conditional Mutual Information and Approximate Markov Chains”. Commun. Math. Phys. 340(2): 575–611 (2015). [17] M. Feder and A. Lapidoth. “Universal decoding for channels with memory”. IEEE Trans. Inf. Theory 44(5): 1726–1745 (1998). [18] S. Fehr and S. Berens. “On the Conditional Rényi Entropy”. IEEE Trans. Inf. Theory 60(11): 6801–6810 (2014). [19] R. A. Fisher. “On the Interpretation of chi-square from Contingency Tables, and the Calculation of P”. J. R. Stat. Soc. 85(1): 87 (1922). [20] R. G. Gallager. Information Theory and Reliable Communication. Wiley (1968). [21] T. Han and K. Kobayashi. “The Strong Converse Theorem for Hypothesis Testing”. IEEE Trans. Inf. Theory 35(1): 178–180 (1989). [22] T. S. Han. Information-Spectrum Methods in Information Theory. Springer (2002). [23] T. S. Han, H. Endo, and M. Sasaki. “Reliability and Secrecy Functions of the Wiretap Channel Under Cost Constraint”. IEEE Trans. Inf. Theory 60(11): 6819–6843 (2014). [24] M. Hayashi. “Information Spectrum Approach to Second-Order Coding Rate in Channel Coding”. IEEE Trans. Inf. Theory 55(11): 4947–4966 (2009). [25] M. Hayashi. “Universal Approximation of Multi-copy States and Universal Quantum Lossless Data Compression”. Commun. Math. Phys. 293(1): 171–183 (2009). [26] M. Hayashi. “Universal Coding for Classical-Quantum Channel”. Commun. Math. Phys. 289(3): 1087–1098 (2009). [27] M. Hayashi. “Exponential Decreasing Rate of Leaked Information in Universal Random Privacy Amplification”. IEEE Trans. Inf. Theory 57(6): 3989–4001 (2011). [28] M. Hayashi. “Tight Exponential Analysis of Universally Composable Privacy Amplification and Its Applications”. IEEE Trans. Inf. Theory 59(11): 7728–7746 (2013). [29] M. Hayashi. “Universal Channel Coding for Exponential Family of Channels”. Preprint, arXiv: 1502.02218 (2015). [30] M. Hayashi and R. Matsumoto. “Secure Multiplex Coding with Dependent and Non-Uniform Multiple Messages”. Preprint, arXiv: 1202.1332 (2012). [31] M. Hayashi and V. Y. F. Tan. “Equivocations, Exponents and Second-Order Coding Rates under Various Rényi Information Measures”. Preprint, arXiv: 1504.02536 (2015). [32] M. Hayashi and M. Tomamichel. “Correlation Detection and an Operational Interpretation of the Renyi Mutual Information”. Preprint, arXiv: 1408.6894 (2014). [33] M. Hayashi and S. Watanabe. “Uniform Random Number Generation from Markov Chains: Non-Asymptotic and Asymptotic Analyses”. Preprint, arXiv: 1503.04371 (2015). [34] W. Hoeffding. “Asymptotically Optimal Tests for Multinomial Distributions”. Ann. Math. Stat. 36(2): 369–401, (1965). [35] M. Iwamoto and J. Shikata. “Information Theoretic Security for Encryption Based on Conditional Rényi Entropies”. In C. Padró, editor, Proc. ICITS 2013, volume 8317 of LNCS, pages 103–121, (2014). [36] Y. Kaspi and N. Merhav. “Error Exponents for Broadcast Channels With Degraded Message Sets”. IEEE Trans. Inf. Theory 57(1): 101–123 (2011). [37] A. Lapidoth and C. Pfister. “Two measures of dependence”. In 2016 IEEE Int. Conf. Sci. Electr. Eng., pages 1–5, (2016). [38] E. Lehmann and J. P. Romano. Testing Statistical Hypotheses. Springer (2005). [39] M. Mosonyi and T. Ogawa. “Quantum Hypothesis Testing and the Operational Interpretation of the Quantum Rényi Relative Entropies”. Commun. Math. Phys. 334(3): 1617–1648 (2015). 23 [40] M. Mosonyi and T. Ogawa. “Two Approaches to Obtain the Strong Converse Exponent of Quantum Hypothesis Testing for General Sequences of Quantum States”. IEEE Trans. Inf. Theory (2015). [41] A. Mukherjea, M. Rao, and S. Suen. “A Note on Moment Generating Functions”. Stat. Probab. Lett. 76(11): 1185–1189 (2006). [42] H. Nagaoka. “Strong Converse Theorems in Quantum Information Theory”. In Proc. ERATO Work. Quantum Inf. Sci. 2001, page 33, (2001). [43] H. Nagaoka. “The Converse Part of The Theorem for Quantum Hoeffding Bound”. Preprint, arXiv: quant-ph/0611289 (2006). [44] H. Nagaoka and M. Hayashi. “An Information-Spectrum Approach to Classical and Quantum Hypothesis Testing for Simple Hypotheses”. IEEE Trans. Inf. Theory 53(2): 534–549 (2007). [45] K. Nakagawa and F. Kanaya. “On the Converse Theorem in Statistical Hypothesis Testing”. IEEE Trans. Inf. Theory 39(2): 623–628 (1993). [46] T. Ogawa and H. Nagaoka. “Strong Converse and Stein’s Lemma in Quantum Hypothesis Testing”. IEEE Trans. Inf. Theory 46(7): 2428–2433 (2000). [47] Y. Polyanskiy. “Saddle Point in the Minimax Converse for Channel Coding”. IEEE Trans. Inf. Theory 59(5): 2576–2595 (2013). [48] Y. Polyanskiy, H. V. Poor, and S. Verdú. “Channel Coding Rate in the Finite Blocklength Regime”. IEEE Trans. Inf. Theory 56(5): 2307–2359 (2010). [49] A. Rényi. “On Measures of Information and Entropy”. In Proc. 4th Berkeley Symp. Math. Stat. Probab., volume 1, pages 547–561, Berkeley, California, USA(1961). [50] T. Sakata and R. Sawae. “Algebraic Theory of Conditional and Sequential Conditional Tests of Three Way Contingency Tables”. Bull. informatics Cybern. 37: 41–48, (2005). [51] I. N. Sanov. “On the Probability of Large Deviations of Random Variables”. In Sel. Transl. Math. Stat. Probab., volume 1, pages 213–224. AMS (1961). [52] O. Shayevitz. “On Rényi Measures and Hypothesis Testing”. In Proc. IEEE ISIT 2011, pages 894–898, (2011). [53] R. Sibson. “Information radius”. Zeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete 14(2): 149–160 (1969). [54] V. Strassen. “Asymptotische Abschätzungen in Shannons Informationstheorie”. In Trans. Third Prague Conf. Inf. Theory, pages 689–723, Prague(1962). [55] A. Teixeira, A. Matos, and L. Antunes. “Conditional Rényi Entropies”. IEEE Trans. Inf. Theory 58(7): 4273–4277 (2012). [56] M. Tomamichel, M. Berta, and M. Hayashi. “Relating Different Quantum Generalizations of the Conditional Rényi Entropy”. J. Math. Phys. 55(8): 082206 (2014). [57] M. Tomamichel and V. Y. F. Tan. “A Tight Upper Bound for the Third-Order Asymptotics for Most Discrete Memoryless Channels”. IEEE Trans. Inf. Theory 59(11): 7041–7051 (2013). [58] H. Tyagi and S. Watanabe. “A Bound for Multiparty Secret Key Agreement and Implications for a Problem of Secure Computing”. In Proc. EUROCRYPT 2014, LNCS, pages 369–386, (2014). [59] H. Tyagi and S. Watanabe. “Converses for Secret Key Agreement and Secure Computing”. Preprint, arXiv: 1404.5715 (2014). [60] J. Unnikrishnan, D. Huang, S. P. Meyn, A. Surana, and V. V. Veeravalli. “Universal and Composite Hypothesis Testing via Mismatched Divergence”. IEEE Trans. Inf. Theory 57(3): 1587–1603 (2011). [61] T. van Erven and P. Harremoes. “Rény Divergence and Kullback-Leibler Divergence”. IEEE Trans. Inf. Theory 60(7): 3797–3820 (2014). [62] S. Verdú. “Alpha-Mutual Information”. In Proc. IEEE ITA 2015, (2015). [63] S. Watanabe and Y. Oohama. “The Optimal Use of Rate-Limited Randomness in Broadcast Channels With Confidential Messages”. IEEE Trans. Inf. Theory 61(2): 983–995 (2015). [64] A. A. Yushkevich. “On limit theorems connected with the concept of entropy of Markov chains”. Uspechi Mat. Nauk VIII(5): 177, (1953). Marco Tomamichel (M’13–SM’16) is a Senior Lecturer at the Centre for Quantum Software and Information and School of Software, Faculty of Engineering and Information Technology at the University of Technology Sydney. He received a M.Sc. in Electrical Engineering and Information Technology degree from ETH Zurich (Switzerland) in 2007. He then graduated with a Ph.D. in Physics at the Institute of Theoretical Physics at ETH Zurich in 2012. Before commencing his current position, he has been a Senior Research Fellow at the Centre for Quantum Technologies at the National University of Singapore and a Lecturer at the School of Physics at the University of Sydney. His research interests include classical and quantum information theory with finite resources as well as applications to cryptography. 24 Masahito Hayashi (M’06–SM’13–F’17) was born in Japan in 1971. He received the B.S. degree from the Faculty of Sciences in Kyoto University, Japan, in 1994 and the M.S. and Ph.D. degrees in Mathematics from Kyoto University, Japan, in 1996 and 1999, respectively. He worked in Kyoto University as a Research Fellow of the Japan Society of the Promotion of Science (JSPS) from 1998 to 2000, and worked in the Laboratory for Mathematical Neuroscience, Brain Science Institute, RIKEN from 2000 to 2003, and worked in ERATO Quantum Computation and Information Project, Japan Science and Technology Agency (JST) as the Research Head from 2000 to 2006. He also worked in the Superrobust Computation Project Information Science and Technology Strategic Core (21st Century COE by MEXT) Graduate School of Information Science and Technology, The University of Tokyo as Adjunct Associate Professor from 2004 to 2007. He worked in the Graduate School of Information Sciences, Tohoku University as Associate Professor from 2007 to 2012. In 2012, he joined the Graduate School of Mathematics, Nagoya University as Professor. He also worked in Centre for Quantum Technologies, National University of Singapore as Visiting Research Associate Professor from 2009 to 2012 and as Visiting Research Professor from 2012 to now. In 2011, he received Information Theory Society Paper Award (2011) for “Information-Spectrum Approach to Second-Order Coding Rate in Channel Coding”. In 2016, he received the Japan Academy Medal from the Japan Academy and the JSPS Prize from Japan Society for the Promotion of Science. In 2006, he published the book “Quantum Information: An Introduction” from Springer, whose revised version was published as “Quantum Information Theory: Mathematical Foundation” from Graduate Texts in Physics, Springer in 2016. In 2016, he published other two books “Group Representation for Quantum Theory” and “A Group Theoretic Approach to Quantum Information” from Springer. He is on the Editorial Board of International Journal of Quantum Information and International Journal On Advances in Security. His research interests include classical and quantum information theory and classical and quantum statistical inference. V ERIFICATION OF THE A PPENDIX A A XIOMS FOR E XAMPLES IN S ECTION III-B A. Sibson’s identity This appendix proves that the examples satisfy our axioms. One of the main ingredients is Sibson’s identity [53], as presented in [10, Eq. (11)–(13)]. Lemma 29. For any distributions PXY ∈ P(X × Y), TX ∈ P(X ) and QY ∈ P(Y), and any s ∈ (0, 1) ∪ (1, ∞), Ds (PXY kTX × QY ) = Ds (PXY kTX × Q̂sY ) + Ds (Q̂sY kQY ) where the optimal distribution Q̂sY ∈ P(Y) is given by Q̂sY (157) 1 PY (y)gs (PX|Y =y kTX ) s (y) = P 1 . s y PY (y)gs (PX|Y =y kTX ) (158) Thus, in particular, arg minQY ∈P(Y) Dα (PXY kTX × QY ) = {Q∗Y }. Proof: We rewrite (157) as gs (PXY kTX ×QY ) = gs (PXY kTX × Q̂sY )·gs (Q̂sY kQY ), at which point the equality can be verified by close inspection. The fact that Q̂sY is the unique minimizer is then a consequence of the positive definiteness of the Rényi divergence. B. Proof of Proposition 13 Proof: Clearly Q is compact convex and we explicitly find the optimizer using Sibson’s identity in Lemma 29. Up to normalization it is given by 1 Q̂sY (y) ∼ PY (y)gs (PX|Y =y kTX ) s , (159) and thus Axiom 1 is verified. Axiom 2 holds by definition and Axiom 3 can be verified by noting that Q̂s in (159) ×n and TX×n are i.i.d. products. takes on an i.i.d. product form when both PXY Next, note that Qn is closed under permutations and convex. The universal distributions are X 1 1 ×n n n n n (y ) = , with U 1{y n is of type λ} , (160) × U UX n n nY n = T Y Y X |Tn (Y)| |λ| λ∈Tn (Y) Qsym n ∈ and thus. we find that Axiom 4 is satisfied with v(n) = |Tn (Y )| = poly(n). as in Lemma 14. Clearly Finally note that all the above remains true if we restrict Qn to permutation invariant or i.i.d. product distributions, n denoted Q′n , except that now UX / Q′n . However, we still have nY n ∈ n UX nY n ′ ×n ×n n ×n kUX Ds (PXY n Y n ) ≥ Ds (P XY kQn ) = Ds (PXY kQn ), ×n kQn ) is taken by a product distribution. since additivity property guarantees that the minimum in Ds (PXY (161) 25 C. Proof of Proposition 15 We give the proof for the case k = 1 and set X1 = X . The generalization to larger k does not require further conceptual insights, and we will remark in a footnote where nontrivial changes are necessary. Proof: Axiom 2 holds by definition. To verify Axiom 4 we first note that the joint permutations of X n and Y n separate as WXn n Y n [π] = WXn n [π] × WYnn [π]. Thus, we can write X 1 X 1 X 1  QX n WXn n [π] × QY n WYnn [π] = QX n × QY n WYnn [π] , (162) QX n × QY n WXn n Y n [π] = n! n! n! π∈Sn π∈Sn π∈Sn sym where we used that QX n ∈ P to establish the last equality. Clearly the resulting distribution lies in Qn . n n n n n Next, consider the universal distribution UX n Y n = UX n × UY n with UX n and UY n given as in (40). Clearly, since sym Qn = P sym (X n ) × P sym (Y n ) we then find that every symmetric distribution satisfies (X n ) n n QX n × QY n ≤ |Tn (X )|UX n × |Tn (Y)|UY n (163) and Axiom 4 holds with v(n) = |Tn (X )||Tn (Y)| = poly(n). For Axiom 5 we chose the following parametrization. Since P(X ) is convex subset of R|X |−1, there exists a natural smooth parametrization Θ1 ∋ θ1 7→ QX,θ1 ∈ P(X ) where Θ1 is a convex subset of R|X |−1, and similarly for P(Y). Combining these two parameterizations, we introduce a Θ ⊂ R|X |+|Y|−2 such that (164) Θ ∋ θ = (θ1 , θ2 ) 7→ QX,θ1 × QY,θ2 = QXY,θ ∈ Q . The set Θ is evidently convex. Let us next verify the required convexity and concavity properties. First note that the map f (x, y) = x1−s y 1−s for x, y ≥ 0 is strictly jointly concave when s ∈ ( 12 , 1) and strictly jointly convex when s > 1. This follows, for example, from studying the Hessian matrix for f , which is !   ∂2f ∂2f −sx−1 y (1 − s) −s −s ∂x2 ∂x∂y (165) = x y (1 − s) ∂2f ∂2f (1 − s) −sxy −1 ∂y∂x ∂y 2 and its determinant x−2s y −2s (1 − s)2 (2s − 1). The Hessian is negative definite for s ∈ ( 12 , 1) and positive definite for s > 1 when x, y > 0.6 From this and the above parametrization we conclude that the Hessian of the map Θ 7→ gs (PXY kQX × QY ) is negative definite for s ∈ ( 12 , 1) and positive definite for s > 1 in the relative interior of Θ. Moreover, the function g(x, y) = − log xy = − log x−log y evidently has a positive definite Hessian for x, y > 0. Hence the desired concavity and convexity properties for the maps θ 7→ gs (PXY kQXY,θ ) and θ 7→ Ds (PXY kQXY,θ ) hold. As a consequence, the minimizer is unique if it exists in the relative interior of Q (as we will show below). Let us assume that Ds (PXY kQ) = Ds (PXY kQ̂sX × Q̂sY ) for some optimal distributions Q̂sX and Q̂sY . To verify Axiom 3 we note that distributions are optimal only if they satisfy the self-consistency relation for a local optimum given in Eq. (159). This implies that 1 Q̂sX (x) ∼ PX (x)gs (PY |X=x kQ̂sY ) s 1 and Q̂sY (y) ∼ PY (y)gs (PX|Y =y kQ̂sX ) s . (166) This solution is in the relative interior of Q and thus unique (for α > 21 ). Furthermore, we find that the product distributions Q̂sX × Q̂sX and Q̂sY × Q̂sY satisfy the self-consistency relations ×2 kQ2 ). More precisely, we find for the local optimal solution of Ds (PXY 1 Q̂sX (x1 )Q̂sX (x2 ) ∼ PX (x1 )PX (x2 )gs (PY |X=x1 × PY |X=x2 kQ̂sY × Q̂sY ) s , (167) and vice versa. Moreover, due to the fact that the function is either convex or concave for α > 21 , we can conclude that these product distributions are globally optimal as well. Namely  ×2 ×2 kQ2 ) = Ds PXY Ds (PXY (Q̂X × Q̂Y )×2 = 2Ds (PXY kQ) . (168) Applying this argument inductively yields the condition of Axiom 3. 6 For k ≥ 2 we need to consider the function f (x1 , x2 , . . . , xk , y) = k . concave in all its arguments is further restricted to s > k+1 Qk i=1 x1−s y 1−s and the range of s where this function is jointly i 26 D. Proof of Proposition 16 Before we commence with the proof we need to introduce some additional concepts and auxiliary results. Let us introduce the following representation of channels, which is reminiscent of the Choi-Jamiołkowski isomorphism in quantum information theory. Let X and Y be finite sets. For any channel QY |X ∈ P(Y|X ) we define a vector representation Q̃XY = 1X × QY |X , where 1X is the identity vector for the Schur (element-wise) product of vectors, i.e. 1X (x) = 1 for all x ∈ X . More concretely, the vector is given by Q̃XY (x, y) = QY |X (y|x). Note that Q̃XY is not a probability distribution but clearly we must have X Q̃XY (x, y) = 1, ∀x ∈ X . (169) y∈Y Using this representation we can write joint distribution after the application of the channel as (170) PX × QY |X = (PX × 1Y ) ◦ Q̃XY , where ◦ denotes the Schur product between the vectors and 1Y (y) = 1 for all y ∈ Y . Note also that the normalization condition (169) enforces that the resulting vector is a probability distribution, and hence every vector with positive elements that satisfies (169) corresponds to a valid channel. Lemma 30. QY n |X n is covariant under permutations if and only if Q̃X n Y n is permutation invariant. Formally, ∀π ∈ Sn : QY n |X n WY n [π] = WX n [π]QY n |X n ⇐⇒ ∀π ∈ Sn : Q̃X n Y n WX n Y n [π] = Q̃X n Y n . Proof: The following equalities can be verified by close inspection:   Q̃X n Y n WX n Y n [π] = 1X n × QY n |X n WX n [π] × WY n [π]  = (1X n WX n [π]) × WX n [π ]QY n |X n WY n [π]  = 1X n × WX n [π −1 ]QY n |X n WY n [π] . −1 (171) (172) (173) (174) The equivalence of the two conditions then follows from the fact that WX n [π −1 ]WX n [π] is the identity channel. Proof of Lemma 17: Let QY n |X n be covariant under permutations. Then from Lemma 30 we learn that Q̃X n Y n is permutation invariant and thus in particular can be written in the form X q̃XY (λXY ) 1{(xn , y n ) is of type λXY } , (175) Q̃X n Y n (xn , y n ) = #λXY λXY ∈Tn (X ×Y) where q̃XY is a probability distribution over joint types λXY and #λXY denotes the number of sequences of type λXY . Moreover, Eq. (169) enforces that for every type µX ∈ Tn (X ), and any sequence xn of type µX , we have X X q̃XY (λXY ) X 1{(xn , y n ) is of type λXY } , (176) Q̃X n Y n (xn , y n ) = 1= #λ XY n n n n y ∈Y y ∈Y λXY ∈Tn (X ×Y) | {z } = #λY |X (xn ) where the number of sequences of type λXY with marginal xn , denoted #λY |X (xn ), clearly only depend on the type µX of the marginal. Moreover, if the type of xn does not correspond to the marginal type λX of λXY then XY #λY |X (xn ) vanishes. Generally, we have #λY |X (xn ) = 1{µx = λx } #λ #λX . Hence (176) simplifies to X q̃XY (λXY ) λXY ∈Tn (X ×Y) λX =µX 1 =1 #λX ∀µX ∈ Tn (X ) . (177) A direct consequence of this condition is that q̃XY (λXY ) ≤ #λX for all λXY . Now let us define a universal permutation covariant channel ŨX n Y n by the choice ũXY (λXY ) := {κXY #λX ∈ Tn (X × Y) : κX = λX } (178) 27 which evidently satisfies (177). Moreover, for all permutation covariant channels with representation Q̃XY of the form (175), we have the bound q̃XY (λXY ) ≤ #λX ≤ {κXY ∈ Tn (X × Y) : κX = λX } ũXY (λXY ) ≤ |Tn (X × Y)|ũXY (λXY ) . (179) Hence also Q̃XY ≤ |Tn (X × Y)| ŨXY . The statement of the lemma then follows from the expression in (170). Proof of Proposition 16: The set Q is clearly compact convex. Note that X gs (PXY Z kPY × PX|Y × QZ|Y ) = PY (y) gs (PXZ|Y =y kPX|Y =y × QZ|Y =y ) . (180) y∈Y From this we can then deduce, as in (159), that the optimal channel takes on the form 1 Q̂sZ|Y =y (z) ∼ PZ|Y =y (z)gs PX|Y =y,Z=z TX|Y =y s , (181) for all y ∈ Y . As such, it is clear that Axioms 1–3 are satisfied. It remains to verify Axiom 4. First note that Qn is closed under symmetrization. Moreover, any channel QZ n |Y n sym corresponding to a permutation invariant element of Qn satisfies QZ n |Y n WZ n [π] = WY n [π]QZ n |Y n , ∀π ∈ Sn , (182) i.e. QZ n |Y n is permutation covariant. Hence, Lemma 17 applies and guarantees the existence of a sequence of such that universal channels {UZnn |Y n }n∈N with UZnn |Y n ∈ Qsym n ×n ×n × UZnn |Y n (xn , y n , z n ) × QZ n |Y n (xn , y n , z n ) ≤ v(n)PXY PXY ∀xn ∈ X n , y n ∈ Y n , z n ∈ Z n . (183) E. Proof of Proposition 18 Proof: The proof proceeds similarly to the proofs of Propositions 15 and 16. Axiom 2 holds by definition and Axiom 4 can be verified using the universal distributions n n n n UX n Y n Z n = UY n × U X n |Y n × UZ n |Y n (184) n n with the universal distributions UYn n as in (40) and the universal maps UX n |Y n and UZ n |Y n provided by Lemma 17. Axiom 5 is verified with a construction analogous to Proposition 15 but this time we need to consider the function (x, y, z) 7→ x1−s y 1−s z 1−s which is strictly jointly concave for s ∈ ( 23 , 1) and strictly jointly convex for s > 1.Finally, Axiom 3 is again verified using the self-consistency relations.
7cs.IT
ZU064-05-FPR main 28 March 2017 0:56 arXiv:1703.08683v1 [cs.PL] 25 Mar 2017 Under consideration for publication in J. Functional Programming 1 Applied Type System: An Approach to Practical Programming with Theorem-Proving Hongwei Xi∗ Boston University, Boston, MA 02215, USA (e-mail: [email protected]) Abstract The framework Pure Type System (PTS) offers a simple and general approach to designing and formalizing type systems. However, in the presence of dependent types, there often exist certain acute problems that make it difficult for PTS to directly accommodate many common realistic programming features such as general recursion, recursive types, effects (e.g., exceptions, references, input/output), etc. In this paper, Applied Type System (ATS) is presented as a framework for designing and formalizing type systems in support of practical programming with advanced types (including dependent types). In particular, it is demonstrated that ATS can readily accommodate a paradigm referred to as programming with theorem-proving (PwTP) in which programs and proofs are constructed in a syntactically intertwined manner, yielding a practical approach to internalizing constraint-solving needed during type-checking. The key salient feature of ATS lies in a complete separation between statics, where types are formed and reasoned about, and dynamics, where programs are constructed and evaluated. With this separation, it is no longer possible for a program to occur in a type as is otherwise allowed in PTS. The paper contains not only a formal development of ATS but also some examples taken from ATS, a programming language with a type system rooted in ATS, in support of employing ATS as a framework to formulate advanced type systems for practical programming. Contents 1 7 8 19 28 29 1 Introduction 2 Untyped λ -Calculus λdyn 3 Formal Development of ATS0 4 Formal Development of ATSpf 5 Related Work and Conclusion References 1 Introduction A primary motivation for developing Applied Type System (ATS) stems from an earlier attempt to support a restricted form of dependent types in practical programming (Xi, 2007). ∗ Supported in part by NSF grants no. CCR-0224244, no. CCR-0229480, and no. CCF-0702665 ZU064-05-FPR main 2 28 March 2017 0:56 Hongwei Xi While there is already a framework Pure Type System (PTS) (Barendregt, 1992) that offers a simple and general approach to designing and formalizing type systems, it is well understood that there often exist some acute problems (in the presence of dependent types) making it difficult for PTS to accommodate many common realistic programming features. In particular, various studies reported in the literature indicate that great efforts are often required in order to maintain a style of pure reasoning as is advocated in PTS when features such as general recursion (Constable & Smith, 1987), recursive types (Mendler, 1987), effects (Honsell et al., 1995), exceptions (Hayashi & Nakano, 1988) and input/output are present. The framework ATS is formulated to allow for designing and formalizing type systems that can readily support common realistic programming features. The formulation of ATS given in this paper is primarily based on the work reported in two previous papers (Xi, 2004; Chen & Xi, 2005) but there are some fundamental changes in terms of the handling of proofs and proof construction. In particular, the requirement is dropped that a proof in ATS must be represented as a normalizing lambda-term (Xi, 2008a). In contrast to PTS, the key salient feature of ATS lies in a complete separation between statics, where types are formed and reasoned about, from dynamics, where programs are constructed and evaluated. This separation, with its origin in a previous study on a restricted form of dependent types developed in Dependent ML (DML) (Xi, 2007), makes it straightforward to support dependent types in the presence of effects such as references and exceptions. Also, with the introduction of two new (and thus somewhat unfamiliar) forms of types: guarded types and asserting types, ATS is able to capture program invariants in a manner that is similar to the use of pre-conditions and post-conditions (Hoare, 1969). By now, studies have shown amply and convincingly that a variety of traditional programming paradigms (e.g., functional programming, object-oriented programming, metaprogramming, modular programming) can be directly supported in ATS without relying on ad hoc extensions, attesting to the expressiveness of ATS. In this paper, the primary focus of study is set on a novel programming paradigm referred to as programming with theoremproving (PwTP) and its support in ATS. In particular, a type-theoretical foundation for PwTP is to be formally established and its correctness proven. The notion of type equality plays a pivotal rôle in type system design. However, the importance of this rôle is often less evident in commonly studied type systems. For instance, in the simply typed λ -calculus, two types are considered equal if and only if they are syntactically the same; in the second-order polymorphic λ -calculus (λ2 ) (Reynolds, 1972) and System F (Girard, 1986), two types are considered equal if and only if they are α equivalent; in the higher-order polymorphic λ -calculus (λω ), two types are considered equal if and only if they are β η -equivalent. This situation immediately changes in ATS, and let us see a simple example that stresses this point. In Figure 1, the presented code implements a function in ATS (Xi, 2008b), which is a substantial system such that its compiler alone currently consists of more than 165K lines of code implemented in ATS itself.1 The concrete syntax used in the implementation should be accessible to those who are familiar with Standard ML (SML) (Milner et al., 1997)). Note that ATS is a programming language equipped with a type system rooted in ATS, and 1 Please see http://www.ats-lang.org for more details. ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 3 fun append {a:type}{m,n:nat} ( xs: list (a, m), ys: list (a, n) ) : list (a, m+n) = case xs of | nil() => ys (* the first clause *) | cons(x, xs) => cons (x, append(xs, ys)) (* the second clause *) // end of [append] Fig. 1. List-append in ATS the name of ATS derives from that of ATS. The type constructor list takes two arguments; when applied to a type T and an integer I, list(T, I) forms a type for lists of length I in which each element is of type T . Also, the two list constructors nil and cons are assigned the following types: nil cons : : ∀a : type. () → list(a, 0) ∀a : type.∀n : nat. (a, list(a, n)) → list(a, n + 1) So nil constructs a list of length 0, and cons takes an element and a list of length n to form a list of length n + 1. The header of the function append indicates that append is assigned the following type: ∀a : type.∀m : nat.∀n : nat. (list(a, m), list(a, n)) → list(a, m + n) which simply means that append returns a list of length m + n when applied to one list of length m and another list of length n. Note that type is a built-in sort in ATS, and a static term of the sort type stands for a type (for dynamic terms). Also, int is a built-in sort for integers in ATS, and nat is the subset sort {a : int | a ≥ 0} for all nonnegative integers. When the above implementation of append is type-checked, the following two constraints are generated: 1. ∀m : nat.∀n : nat. m = 0 ⊃ n = m + n 2. ∀m : nat.∀n : nat.∀m′ : nat. m = m′ + 1 ⊃ (m′ + n) + 1 = m + n The first constraint is generated when the first clause is type-checked, which is needed for determining whether the types list(a, n) and list(a, m + n) are equal under the assumption that list(a, m) equals list(a, 0). Similarly, the second constraint is generated when the second clause is type-checked, which is needed for determining whether the types list(a, (m′ + n) + 1) and list(a, m + n) are equal under the assumption that list(a, m) equals list(a, m′ + 1). Clearly, certain restrictions need to be imposed on the form of constraints allowed in practice so that an effective approach can be found to perform constraintsolving. In DML, a programming language based on DML (Xi, 2007), the constraints generated during type-checking are required to be linear inequalities on integers so that the problem of constraint satisfaction can be turned into the problem of linear integer programming, for which there are many highly practical solvers (albeit the problem of linear integer programming itself is NP-complete). This is indeed a very simple design, but ZU064-05-FPR main 28 March 2017 4 0:56 Hongwei Xi it can also be too restrictive, sometimes, as nonlinear constraints (e.g., ∀n : int.n ∗ n ≥ 0) are commonly encountered in practice. Furthermore, the very nature of such a design indicates its being inherently ad hoc. By combining programming with theorem-proving, a fundamentally different design of constraint-solving can provide the programmer with an option to handle nonlinear constraints through explicit proof construction. For the sake of a simpler presentation, let us assume for this moment that even the addition function on integers cannot appear in the constraints generated during type-checking. Under such a restriction, it is still possible to implement a list-append function in ATS that is assigned a type capturing the invariant that the length of the concatenation of two given lists xs and ys equals m + n if xs and ys are of length m and n, respectively. Let us first see such an implementation given in Figure 2, which is presented here as a motivating example for programming with theorem-proving (PwTP). The datatypes Z and S are declared in Figure 2 solely for representing natural numbers: Z represents 0, and S(N) represents the successor of the natural number represented by N. The data constructors associated with Z and S are of no use. Given a type T and another type N, mylist(T, N) is a type for lists containing n elements of the type T , where n is the natural number represented by N. Note that mylist is not a standard datatype (as is supported in ML); it is a guarded recursive datatype (GRDT) (Xi et al., 2003), which is also known as generalized algebraic datatype (GADT) (Cheney & Hinze, 2003) in Haskell and OCaml. The datatype addrel is declared to capture the relation induced by the addition function on natural numbers. Given types M, N, and R representing natural numbers m, n, and r, respectively, the type addrel(M, N, R) is for a value representing some proof of m + n = r. Note that addrel is also a GRDT or GADT. There are two constructors addrel z and addrel s associated with addrel, which encode the following two rules: 0+n = (m + 1) + n = n for every natural number n (m + n) + 1 for every pair of natural numbers m and n Let us now take a look at the implementation of myappend. Formally, the type assigned to myappend can be written as follows: ∀a : type.∀m : type.∀n : type. (mylist(a, m), mylist(a, n)) → ∃r : type. (addrel(m, n, r), mylist(a, r)) In essence, this type states the following: Given two lists of length m and n, myappend returns a pair such that the first component of the pair is a proof showing that m + n equals r for some natural number r and the second component is a list of length r. Unlike append, type-checking myappend does not generate any linear constraints on integers. As a matter of fact, myappend can be readily implemented in both Haskell and OCaml (extended with support for generalized algebraic datatypes), where there is no built-in support for handling linear constraints on integers. This is an example of great significance in the sense that it demonstrates concretely an approach to allowing the programmer to write code of the nature of theorem-proving so as to simplify or even eliminate certain constraints that need otherwise to be solved directly during type-checking. With this approach, constraint-solving is effectively internalized, and the programmer can ac- ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 5 datatype Z() = Z of () datatype S(a:type) = S of a // datatype mylist(type, type) = | {a:type} mynil(a, Z()) | {a:type}{n:type} mycons(a, S(n)) of (a, mylist(a, n)) // datatype addrel(type, type, type) = | {n:type} addrel_z(Z(), n, n) of () | {m,n:type}{r:type} addrel_s(S(m), n, S(r)) of addrel(m, n, r) // fun myappend {a:type} {m,n:type} ( xs: mylist(a, m) , ys: mylist(a, n) ) : [r:type] ( addrel(m, n, r), mylist(a, r) ) = ( case xs of | mynil() => let val pf = addrel_z() in (pf, ys) end // end of [mynil] | mycons(x, xs) => let val (pf, res) = myappend(xs, ys) in (addrel_s(pf), mycons(x, res)) end // end of [mycons] ) Fig. 2. A motivating example for PwTP in ATS tively participate in constraint simplification, gaining a tight control in determining what constraints should be passed to the underlying constraint-solver. There are some major issues with the implementation given in Figure 2. Clearly, representing natural numbers as types is inadequate since there are types that do not represent any natural numbers. More seriously, this representation turns quantification over natural numbers (which is predicative) into quantification over types (which is impredicative), causing unnecessary complications. Also, proof construction (that is, construction of values of types formed by addrel) needs to be actually performed at run-time, which causes inefficiency both time-wise and memory-wise. Probably the most important issue is that proof validity is not guaranteed. For instance, it is entirely possible to fake proof construction by making use of non-terminating functions. ZU064-05-FPR main 6 28 March 2017 0:56 Hongwei Xi datasort mynat = Z of () | S of mynat // datatype mylist(type, mynat) = | {a:type} mynil(a, Z()) | {a:type}{n:mynat} mycons(a, S(n)) of (a, mylist(a, n)) // dataprop addrel(mynat, mynat, mynat) = | {y:mynat} addrel_z(Z, y, y) of () | {x,y:mynat}{r:mynat} addrel_s(S(x), y, S(r)) of addrel(x, y, r) // fun myappend {a:type} {m,n:mynat} ( xs: mylist(a, m) , ys: mylist(a, n) ) : [r:mynat] ( addrel(m, n, r) | mylist(a, r) ) = ( case xs of | mynil() => let val pf = addrel_z() in (pf | ys) end // end of [mynil] | mycons(x, xs) => let val (pf | res) = myappend(xs, ys) in (addrel_s(pf) | mycons(x, res)) end // end of [mycons] ) Fig. 3. An example making use of PwTP in ATS In Figure 3, another implementation of myappend is given that makes use of the support for PwTP in ATS. Instead of representing natural numbers as types, a datasort of the name mynat is declared and natural numbers can be represented as static terms of the sort mynat. Also, a dataprop addrel is declared for capturing the relation induced by the addition function on natural numbers. As a dataprop, addrel can only form types for values representing proofs, which are erased after type-checking and thus need no construction at run-time. In the implementation of myappend, the bar symbol (|) is used in place of the comma symbol to separate components in tuples; the components appearing to the left of the bar symbol are proof expressions (to be erased) and those to the right are dynamic expressions (to be evaluated). After proof-erasure, the implementation of myappend essentially matches that of append given in Figure 1. ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 7 As a framework to facilitate the design and formalization of advanced type systems for practical programming, ATS is first formulated with no support for PwTP (Xi, 2004). This formulation is the basis for a type system referred to as ATS0 in this paper. The support for PwTP is added into ATS in a subsequent formulation (Chen & Xi, 2005), which serves as the basis for a type system referred to as ATSpf in this paper. However, a fundamentally different approach is adopted in ATSpf to justify the soundness of PwTP, which essentially translates each well-typed program in ATSpf into another well-typed one in ATS0 of the same dynamic semantics. The identification and formalization of this approach, which is both simpler and more general than one used previously (Chen & Xi, 2005), consists of a major technical contribution of the paper. It is intended that the paper should focus on the theoretical development of ATS, and the presentation given is of a minimalist style. The organization for the rest of the paper is given as follows. An untyped λ -calculus λdyn is first presented in Section 2 for the purpose of introducing some basic concepts needed to formally assign dynamic (that, operational) semantics to programs. In Section 3, a generic applied type system ATS0 is formulated and its type-soundness established. Subsequently, ATS0 is extended to ATSpf in Section 4 with support for PwTP, and the type-soundness of ATSpf is reduced to that of ATS0 through a translation from well-typed programs in the former to those in the latter. Lastly, some closely related work is discussed in Section 5 and the paper concludes. 2 Untyped λ -Calculus λdyn The purpose of formulating λdyn , an untyped lambda-calculus extended with constants (including constant constructors and constant functions), is to set up some machinery needed to formalize dynamic (that is, operational) semantics for programs. It is to be proven that a well-typed program in ATS can be turned into one in λdyn through type-erasure and prooferasure while retaining its dynamic semantics, stressing the point that types and proofs in ATS play no active rôle in the evaluation of a program. In this regard, the form of typing studied in ATS is of Curry-style (in contrast with Church-style) (Reynolds, 1998). There are no static terms in λdyn . The syntax for the dynamic terms in λdyn is given as follows: dynamic terms e ::= x | dcx(~e) | he1 , e2 i | fst(e) | snd(e) | lam x.e | app(e1 , e2 ) | let x = e1 in e2 where the notation ~e is for a possibly empty sequence of dynamic terms. Let dcx range over external dynamic constants, which include both dynamic constructors dcc and dynamic functions dcf . The arguments taken by a dynamic constructor or function are often primitive values (instead of those constructed by lam and h·, ·i) and the result returned by it is often a primitive value as well. The meaning of various forms of dynamic terms should become clear when the rules for evaluating them are given. The values in λdyn are just special forms of dynamic terms, and the syntax for them is given as follows: values v ::= x | dcc(~v) | hv1 , v2 i | lam x.e ZU064-05-FPR main 28 March 2017 0:56 8 Hongwei Xi where ~v is for a possibly empty sequence of values. A standard approach to assigning dynamic semantics to terms is based on the notion of evaluation contexts: evaluation contexts E ::= [] | dcx(v1 , . . . , vi−1 , E, ei+1 , . . . , en ) | hE, ei | hv, Ei | app(E, e) | app(v, E) | let x = E in e Essentially, an evaluation context E is a dynamic term in which a subterm is replaced with a hole denoted by []. Note that only subterms at certain positions in a dynamic term can be replaced to form valid evaluation contexts. Definition 2.1 The redexes in λdyn and their reducts are defined as follows: • • • • fst(hv1 , v2 i) is a redex, and its reduct is v1 . snd(hv1 , v2 i) is a redex, and its reduct is v2 . app(lam x.e, v) is a redex, and its reduct is e[x 7→ v]. dcf (~v) is a redex if it is defined to equal some value v; if so, its reduct is v. Note that it may happen later that a new form of redex can have more than one reducts. Given a dynamic term of the form E[e1 ] for some redex e1 , E[e1 ] is said to reduce to E[e2 ] in one-step if e2 is a reduct of e1 , and this one-step reduction is denoted by E[e1 ] → E[e2 ]. Let →∗ stand for the reflexive and transitive closure of →. Given a program (that is, a closed dynamic term) e0 in λdyn , a finite reduction sequence starting from e0 can either lead to a value or a non-value. If a non-value cannot be further reduced, then the non-value is said to be stuck or in a stuck form. In practice, values can often be represented in special manners to allow various stuck forms to be detected through checks performed at run-time. For instance, the representation of a value in a dynamically typed language most likely contains a tag to indicate the type of the value. If it is detected that the evaluation of a program reaches a stuck form, then the evaluation can be terminated abnormally with a raised exception. Detecting potential stuck forms that may occur during the evaluation of a program can also be done statically (that is, at compiler-time). One often imposes a type discipline to ensure the absence of various stuck forms during the evaluation of a well-typed program. This is the line of study to be carried out in the rest of the paper. 3 Formal Development of ATS0 As a generic applied type system, ATS0 consists of a static component (statics), where types are formed and reasoned about, and a dynamic component (dynamics), where programs are constructed and evaluated. The statics itself is a simply typed lambda-calculus (extended with certain constants), and the types in it are called sorts so as to avoid confusion with the types for classifying dynamic terms, which are themselves static terms. The syntax for the statics of ATS0 is given in Figure 4. Let b range over the base sorts in ATS0 , which include at least bool for static booleans and type for types (assigned to dynamic terms). The base sort int for static integers is not really needed for formalizing ATS0 but it is often used in the presented examples. Let a and s range over static variables and static terms, respectively. There may be some built-in static constants scx, which are either static constant constructors scc or static constant functions scf. A c-sort is of the ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming sorts static terms static var. ctx. static subst. σ s Σ Θ ::= ::= ::= ::= 9 b | σ1 → σ2 a | scx(s1 , . . . , sn ) | λ a : σ .s | s1 (s2 ) 0/ | Σ, a : σ [] | Θ[a 7→ s] Fig. 4. The syntax for the statics of ATS0 form (σ1 , . . . , σn ) ⇒ b, which can only be assigned to static constants. Note that a c-sort is not considered a (regular) sort. Given a static constant scx, a static term scx(s1 , . . . , sn ) is of sort b if scx is assigned a c-sort (σ1 , . . . , σn ) ⇒ b for some sorts σ1 , . . . , σn and si can be assigned the sorts σi for i = 1, . . . , n. It is allowed to write scc for scc() if there is no risk of confusion. In ATS0 , the existence of the following static constants with the assigned c-sorts is assumed: true : () ⇒ bool false : () ⇒ bool ≤ty : (type, type) ⇒ bool ∗ : (type, type) ⇒ type → : (type, type) ⇒ type ∧ : (bool, type) ⇒ type ⊃ : (bool, type) ⇒ type : (σ → type) ⇒ type ∀σ ∃σ : (σ → type) ⇒ type Note that infix notation may be used for certain static constants. For instance, s1 → s2 stands for → (s1 , s2 ) and s1 ≤ty s2 stands for ≤ty (s1 , s2 ). In addition, ∀a : σ .s and ∃a : σ .s stand for ∀σ (λ a : σ .s) and ∃σ (λ a : σ .s), respectively. Given a static constant constructor scc, if the c-sort assigned to scc is (σ1 , . . . , σn ) ⇒ type for some sorts σ1 , . . . , σn , then scc is a type constructor. For instance, ∗, →, ∧, ⊃, ∀σ and ∃σ are all type constructors. Additional built-in base type constructors may be assumed. Given a proposition B and a type T , B ⊃ T is a guarded type and B ∧ T is an asserting type. Intuitively, if a value v is assigned a guarded type B ⊃ T , then v can be used only if the guard B is satisfied; if a value v of an asserting type B ∧ T is generated at a program point, then the assertion B holds at that point. For instance, suppose that int is a sort for (static) integers and int is a type constructor of the sort (int) ⇒ type; given a static term s of the sort int, int(s) is a singleton type for the integer equal to s; hence, the usual type Int for (dynamic) integers can be defined as ∃a : int. int(a), and the type Nat for natural numbers can be defined as ∃a : int. (a ≥ 0) ∧ int(a). Moreover, the following type is for the (dynamic) division function on integers: ∀a1 : int.∀a2 : int. a2 6= 0 ⊃ (int(a1 ), int(a2 )) → int(a1 /a2 ) where the meaning of 6= and / should be obvious. With such a type, division by zero is disallowed during type-checking (at compile-time). Also, suppose that bool is a type constructor of the sort (bool) ⇒ type such that for each proposition B, bool(B) is a singleton type for the truth value equal to B. Then the usual type Bool for (dynamic) booleans can be defined as ∃a : bool. bool(a). The following type is an interesting one: ∀a : bool. bool(a) → a ∧ 1 ZU064-05-FPR main 10 28 March 2017 0:56 Hongwei Xi Σ(a) = σ (st-var) Σ⊢a:σ ⊢ scx : (σ1 , . . . , σn ) ⇒ b Σ ⊢ s1 : σ1 · · · Σ ⊢ sn : σn (st-scx) Σ ⊢ scx(s1 , . . . , sn ) : b Σ, a : σ1 ⊢ s : σ2 (st-lam) Σ ⊢ λ a : σ1 .s : σ1 → σ2 Σ ⊢ s1 : σ1 → σ2 Σ ⊢ s2 : σ1 (st-app) Σ ⊢ s1 (s2 ) : σ2 Fig. 5. The sorting rules for the statics of ATS0 where 1 stands for the unit type. Given a function f of this type, we can apply f to a boolean value v of type bool(B) for some proposition B; if f (v) returns, the B must be true; therefore f acts like dynamic assertion-checking. For those familiar with qualified types (Jones, 1994), which underlies the type class mechanism in Haskell, it should be noted that a qualified type cannot be regarded as a guarded type. The simple reason is that the proof of a guard in ATS0 bears no computational significance, that is, it cannot affect the run-time behavior of a program, while a dictionary, which is just a proof of some predicate on types in the setting of qualified types, can and is mostly likely to affect the run-time behavior of a program. The standard rules for assigning sorts to static terms are given in Figure 5, where the judgement ⊢ scx : (σ1 , . . . , σn ) ⇒ b means that the static constant scx is assumed to be of the c-sort (σ1 , . . . , σn ) ⇒ b. Given ~s = s1 , . . . , sn and ~σ = σ1 , . . . , σn , a judgement of the form Σ ⊢ ~s : ~σ means Σ ⊢ si : σi for i = 1, . . . , n. Let B stand for a static term that can be assigned the sort bool (under some context Σ) and ~B a possibly empty sequence of static boolean terms. Also, let T stand for a type (for dynamic terms), which is a static term that can be assigned the sort type (under some context Σ). Given contexts Σ1 and Σ2 and a substitution Θ, the judgement Σ1 ⊢ Θ : Σ2 means that Σ1 ⊢ Θ(a) : Σ2 (a) is derivable for each a ∈ dom(Θ) = dom(Σ2 ). Proposition 3.1 Assume Σ ⊢ s : σ is derivable. If Σ = Σ1 , Σ2 and Σ1 ⊢ Θ : Σ2 holds, then Σ1 ⊢ s[Θ] : σ is derivable. Proof By structural induction on the derivation of Σ ⊢ s : σ . Definition 3.1 (Constraints in ATS0 ) A constraint in ATS0 is of the form Σ; ~B |= B0 , where Σ ⊢ B : bool holds for each B in ~B and Σ ⊢ B0 : bool holds as well, and the constraint relation in ATS0 is the one that determines whether each constraint is true or false. Each regularity rule in Figure 6 is assumed to be met, that is, the conclusion of each regularity rule holds if all of its premisses hold, and the following regularity conditions on ≤ty are also satisfied: 1. Σ; ~B |= T ≤ty T holds for every T . ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 11 B ∈ ~B (reg-id) Σ; ~B |= B (reg-true) Σ; ~B |= true Σ; ~B |= false (reg-false) Σ; ~B |= B Σ; ~B |= B (reg-var-thin) Σ, a : σ ; ~B |= B Σ ⊢ B1 : bool Σ; ~B |= B2 (reg-bool-thin) Σ; ~B, B1 |= B2 Σ, a : σ ; ~B |= B Σ ⊢ s : σ (reg-subst) Σ; ~B[a 7→ s] |= B[a 7→ s] Σ; ~B |= B1 Σ; ~B, B1 |= B2 Σ; ~B |= B2 (reg-cut) Fig. 6. The regularity rules for the constraint relation in ATS0 dynamic terms e ::= dynamic values v ::= dynamic var. ctx. ∆ ::= x | dcx{~s}(e1 , . . . , en ) | he1 , e2 i | fst(e) | snd(e) | lam x. e | app(e1 , e2 ) | ⊃+ (e) | ⊃− (e) | slam a. e | sapp(e, s) | ∧(e) | let ∧(x) = e1 in e2 | hs, ei | let ha, xi = e1 in e2 x | dcc{~s}(v1 , . . . , vn ) | hv1 , v2 i | lam x. e |⊃+ (e) | slam a. e | ∧(v) | hs, vi 0/ | ∆, x : T dynamic subst. Θ ::= [] | Θ[x 7→ e] Fig. 7. The syntax for the dynamics in ATS0 2. 3. 4. 5. 6. 7. 8. 9. Σ; ~B |= T ≤ty T ′ and Σ; ~B |= T ′ ≤ty T ′′ implies Σ; ~B |= T ≤ty T ′′ . Σ; ~B |= T1 ∗ T2 ≤ty T1′ ∗ T2′ implies Σ; ~B |= T1 ≤ty T1′ and Σ; ~B |= T2 ≤ty T2′ . Σ; ~B |= T1 → T2 ≤ty T1′ → T2′ implies Σ; ~B |= T1′ ≤ty T1 and Σ; ~B |= T2 ≤ty T2′ . Σ; ~B |= B ∧ T ≤ty B′ ∧ T ′ implies Σ; ~B, B |= B′ and Σ; ~B, B |= T ≤ty T ′ . Σ; ~B |= B ⊃ T ≤ty B′ ⊃ T ′ implies Σ; ~B, B′ |= B and Σ; ~B, B′ |= T ≤ty T ′ . Σ; ~B |= ∀a : σ .T ≤ty ∀a : σ .T ′ implies Σ, a : σ ; ~B |= T ≤ty T ′ . Σ; ~B |= ∃a : σ .T ≤ty ∃a : σ .T ′ implies Σ, a : σ ; ~B |= T ≤ty T ′ . 0; / 0/ |= scc(T1 , . . . , Tn ) ≤ty T ′ implies T ′ = scc(T1′ , . . . , Tn′ ) for some T1′ , . . . , Tn′ . The need for these conditions is to become clear when proofs are constructed in the following presentation for formally establishing various meta-properties of ATS0 . For instance, the last of the above conditions can be invoked to make the claim that T ′ ≤ty T1 → T2 implies T ′ being of the form T1′ → T2′ . Note that this condition actually implies the consistency of the constraint relation as not every constraint is valid. Let us now move onto the dynamic component (dynamics) of ATS0 . The syntax for the dynamics of ATS0 is given in Figure 7. Let x range over dynamic variables and dcx ZU064-05-FPR main 28 March 2017 0:56 12 Hongwei Xi dynamic constants, which include both dynamic constant constructors dcc and dynamic constant functions dcf . Some (unfamiliar) forms of dynamic terms are to be understood when the rules for assigning types to them are presented. Let v range over values, which are dynamic terms of certain special forms, and ∆ range over dynamic variable contexts, which assign types to dynamic variables. During the formal development of ATS0 , proofs are often constructed by induction on derivations (represented as trees). Given a judgement J, D :: J means that D is a derivation of J, that is, the conclusion of D is J. Given a derivation D, ht(D) stands for the height of the tree that represents D. In ATS0 , a typing judgement is of the form Σ; ~B; ∆ ⊢ e : T , and the rules for deriving such a judgement are given in Figure 8. Note that certain obvious side conditions associated with some of the typing rules are omitted for the sake of brevity. For instance, the variable a is not allowed to have free occurrences in ~B, ∆, or T when the rule (ty-∀-intr) is applied. Given ~B = B1 , . . . , Bn , ~B ⊃ T stands for B1 ⊃ (· · · (Bn ⊃ T ) · · ·). Given ~a = a1 , . . . , an and ~σ = σ1 , . . . , σn , ∀~a : ~σ stands for the sequence of quantifiers: ∀a : σ1 . · · · ∀a : σn . A c-type in ATS0 is of the form ∀~a : ~σ . ~B ⊃ (T1 , . . . , Tn ) ⇒ T . The notation ⊢ dcx : ∀~a : ~σ . ~B ⊃ (T1 , . . . , Tn ) ⇒ T means that dcx is assumed to have the c-type following it; if dcx is a constructor dcc, then T is assumed to be constructed by some scc and dcc is said to be associated with scc. For instance, the list constructors and the integer addition and division functions can be given the following c-types: nil cons iadd isub imul idiv : : : : : : ∀a : type. list(a, 0) ∀a : type.∀n : int. n ≥ 0 ⊃ (a, list(a, n)) → list(a, n + 1) ∀a1 : int.∀a2 : int. (int(a1 ), int(a2 )) ⇒ int(a1 + a2 ) ∀a1 : int.∀a2 : int. (int(a1 ), int(a2 )) ⇒ int(a1 − a2 ) ∀a1 : int.∀a2 : int. (int(a1 ), int(a2 )) ⇒ int(a1 ∗ a2 ) ∀a1 : int.∀a2 : int. a2 6= 0 ⊃ (int(a1 ), int(a2 )) ⇒ int(a1 /a2) where the type constructors int and list are type constructors of the c-sorts (int) ⇒ type and (type, int) ⇒ type, respectively, and +, −, ∗, and / are static constant functions of the c-sort (int, int) ⇒ int. For a technical reason, the rule (ty-var) is to be replaced with the following one: ∆(x) = T Σ; ~B |= T ≤ty T ′ Σ; ~B; ∆ ⊢ x : T ′ (ty-var’) which combines (ty-var) with (ty-sub). This replacement is needed for establishing the following lemma: Lemma 3.1 Assume D :: Σ; ~B; ∆, x : T1 ⊢ e : T2 and Σ; ~B |= T1′ ≤ty T1 . Then there is a derivation D ′ for the typing judgement Σ; ~B; ∆, x : T1′ ⊢ e : T2 such that ht(D ′ ) = ht(D). Proof The proof follows from structural induction on D immediately. The only interesting case is the one where the last applied rule is (ty-var’), and this case can be handled by simply merging two consecutive applications of the rule (ty-var’) into one (with the help of the regularity condition stating that ≤ty is transitive). ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 13 ⊢ Σ; ~B; ∆ ∆(x) = T (ty-var) Σ; ~B; ∆ ⊢ x : T Σ; ~B; ∆ ⊢ e : T Σ; ~B |= T ≤ty T ′ (ty-sub) Σ; ~B; ∆ ⊢ e : T ′ ⊢ dcx : ∀~a : ~σ .~B0 ⊃ (T1 , . . . , Tn ) ⇒ T Σ; ~B |= B[~a 7→ ~s] for each B ∈ ~B0 Σ ⊢~s : ~σ ~ Σ; B; ∆ ⊢ ei : Ti [~a 7→ ~s] for i = 1, . . . , n (ty-dcx) Σ; ~B; ∆ ⊢ dcx{~s}(e1 , . . . , en ) : T [~a 7→ ~s] Σ; ~B; ∆ ⊢ e1 : T1 Σ; ~B; ∆ ⊢ e2 : T2 (ty-tup) Σ; ~B; ∆ ⊢ he1 , e2 i : T1 ∗ T2 Σ; ~B; ∆ ⊢ e : T1 ∗ T2 Σ; ~B; ∆ ⊢ e : T1 ∗ T2 (ty-fst) (ty-snd) ~ Σ; B; ∆ ⊢ fst(e) : T1 Σ; ~B; ∆ ⊢ snd(e) : T2 Σ; ~B; ∆, x : T1 ⊢ e : T2 (ty-lam) Σ; ~B; ∆ ⊢ lam x.e : T1 → T2 Σ; ~B; ∆ ⊢ e1 : T1 → T2 Σ; ~B; ∆ ⊢ e2 : T1 (ty-app) Σ; ~B; ∆ ⊢ app(e1 , e2 ) : T2 Σ; ~B, B; ∆ ⊢ e : T (ty-⊃-intr) Σ; ~B; ∆ ⊢ ⊃+ (e) : B ⊃ T Σ; ~B; ∆ ⊢ e : B ⊃ T Σ; ~B |= B (ty-⊃-elim) Σ; ~B; ∆ ⊢ ⊃− (e) : T Σ; ~B |= B Σ; ~B; ∆ ⊢ e : T (ty-∧-intr) Σ; ~B; ∆ ⊢ ∧(e) : B ∧ T Σ; ~B; ∆ ⊢ e1 : B ∧ T1 Σ; ~B, B; ∆, x : T1 ⊢ e2 : T2 (ty-∧-elim) Σ; ~B; ∆ ⊢ let ∧ (x) = e1 in e2 : T2 Σ, a : σ ; ~B; ∆ ⊢ e : T (ty-∀-intr) Σ; ~B; ∆ ⊢ slam a.e : ∀a : σ .T Σ; ~B; ∆ ⊢ e : ∀a : σ .T Σ ⊢ s : σ (ty-∀-elim) Σ; ~B; ∆ ⊢ sapp(e, s) : T [a 7→ s] Σ ⊢ s : σ Σ; ~B; ∆ ⊢ e : T [a 7→ s] (ty-∃-intr) Σ; ~B; ∆ ⊢ hs, di : ∃a : σ .T Σ; ~B; ∆ ⊢ e1 : ∃a : σ .T1 Σ, a : σ ; ~B; ∆, x : T1 ⊢ e2 : T2 (ty-∃-elim) Σ; ~B; ∆ ⊢ let ha, xi = e1 in e2 : T2 Fig. 8. The typing rules for the dynamics of ATS0 Given Σ, ~B, ∆1 , ∆2 and θ , the judgement Σ; ~B; ∆1 ⊢ θ : ∆2 means that the typing judgement Σ; ~B; ∆1 ⊢ θ (x) : ∆2 (x) is derivable for each x ∈ dom(θ ) = dom(∆2 ). Lemma 3.2 (Substitution in ATS0 ) Assume D :: Σ; ~B; ∆ ⊢ e : T in ATS0 . ZU064-05-FPR main 28 March 2017 14 0:56 Hongwei Xi 1. If ~B = ~B1 , ~B2 and Σ; ~B1 |= ~B2 holds, then Σ; ~B1 ; ∆ ⊢ e : T is also derivable, where Σ; ~B1 |= ~B2 means Σ; ~B1 |= B holds for each B ∈ ~B2 . 2. If Σ = Σ1 , Σ2 and Σ1 ⊢ Θ : Σ2 holds, then Σ1 ; ~B[Θ]; ∆[Θ] ⊢ d[Θ] : T [Θ] is also derivable. 3. If ∆ = ∆1 , ∆2 and Σ; ~B; ∆1 ⊢ θ : ∆2 is derivable, then Σ; ~B; ∆1 ⊢ d[θ ] : T is also derivable. Proof By structural induction on the derivation D. Lemma 3.3 (Canonical Forms) Assume D :: 0; / 0; / 0/ ⊢ v : T . Then the following statements hold: 1. 2. 3. 4. 5. 6. 7. If T If T If T If T If T If T If T = T1 ∗ T2, then v is of the form hv1 , v2 i. = T1 → T2 , then v is of the form lam x.e. = B ∧ T0 , then v is of the form ∧(v0 ). = B ⊃ T0 , then v is of the form ⊃+ (e). = ∀a : σ .T0 , then v is of the form slam a.e. = ∃a : σ .T0 , then v is of the form hs, v0 i. = scc(~s1 ), then v is of the form dcc{~s2 }(~v) for some dcc associated with scc. Proof With Definition 3.1, the lemma follows from structural induction on D. If the last applied rule in D is (ty-sub), then the proof goes through by invoking the induction hypothesis on the immediate subderivation of D. Otherwise, the proof follows from a careful inspection of the typing rules in Figure 8. In order to assign (call-by-value) dynamic semantics to the dynamic terms in ATS0 , let us introduce evaluation contexts as follows: eval. ctx. E ::= [] | dcx{~s}(~v, E,~e) | hE, di | hv, Ei | app(E, e) | app(v, E) | ⊃− (E) | ∧(E) | let ∧(x) = E in e | sapp(E, s) | hs, Ei | let ha, xi = E in e Definition 3.2 The redexes and their reducts are defined as follows. • • • • • • • • fst(hv1 , v2 i) is a redex, and its reduct is v1 . snd(hv1 , v2 i) is a redex, and its reduct is v2 . app(lam x.e, v) is a redex, and its reduct is e[x 7→ v]. dcf {~s}(~v) is a redex if it is defined to equal some value v; if so, its reduct is v. ⊃− (⊃+ (e)) is a redex, and its reduct is e. sapp(slam a.e, s) is a redex, and its reduct is e[a 7→ s]. let ∧(x) = ∧(v) in e is a redex, and its reduct is e[x 7→ v]. let ha, xi = hs, vi in e is a redex, and its reduct is e[a 7→ s][x 7→ v]. Given two dynamic terms e1 and e2 such that e1 = E[e] and e2 = E[e′ ] for some redex e and its reduct e′ , e1 is said to reduce to e2 in one step and this one-step reduction is denoted by e1 → e2 . Let →∗ stand for the reflexive and transitive closure of →. ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 15 It is assumed that the type assigned to each dynamic constant function dcf is appropriate, that is, 0; / 0; / 0/ ⊢ v : T is derivable whenever 0; / 0; / 0/ ⊢ dcf {~s}(v1 , . . . , vn ) : T is derivable and v is a reduct of dcf {~s}(v1 , . . . , vn ). Lemma 3.4 (Inversion) Assume D :: Σ; ~B; ∆ ⊢ e : T in ATS0 . 1. If e = he1 , e2 i, then there exists D ′ :: Σ; ~B; ∆ ⊢ e : T such that ht(D ′ ) ≤ ht(D) and the last rule applied in D ′ is (ty-tup). 2. If e = lam x.e1 , then there exists D ′ :: Σ; ~B; ∆ ⊢ e : T such that ht(D ′ ) ≤ ht(D) and the last applied rule in D ′ is (ty-lam). 3. If e =⊃+ (e1 ), then there exists D ′ :: Σ; ~B; ∆ ⊢ e : T such that ht(D ′ ) ≤ ht(D) and the last rule applied in D ′ is (ty-⊃-intr). 4. If e = ∧(e1 ), then there exists D ′ :: Σ; ~B; ∆ ⊢ e : T such that ht(D ′ ) ≤ ht(D) and the last rule applied in D ′ is (ty-∧-intr). 5. If e = slam a.e1 , then there exists D ′ :: Σ; ~B; ∆ ⊢ e : T such that ht(D ′ ) ≤ ht(D), and the last rule applied in D ′ is (ty-∀-intr). 6. If e = hs, e1 i, then there exists D ′ :: Σ; ~B; ∆ ⊢ e : T such that ht(D ′ ) ≤ ht(D), and the last rule applied in D ′ is (ty-∃-intr). Proof Let D ′ be D if D does not end with an application of the rule (ty-sub). Hence, in the rest of the proof, it can be assumed that the last applied rule in D is (ty-sub), that is, D is of the following form: D1 :: Σ; ~B; ∆ ⊢ e : T ′ Σ; ~B |= T ′ ≤ty T (ty-sub) Σ; ~B; ∆ ⊢ e : T Let us prove (1) by induction on ht(D). By induction hypothesis on D1 , there exists a derivation D1′ :: Σ; ~B; ∆ ⊢ e : T ′ such that ht(D1′ ) ≤ ht(D1 ) and the last applied rule in D1′ is (ty-tup): ′ :: Σ; ~ ′ :: Σ; ~ D21 B; ∆ ⊢ e1 : T1′ D22 B; ∆ ⊢ e2 : T2′ (ty-tup) Σ; ~B; ∆ ⊢ he1 , e2 i : T1′ ∗ T2′ where T ′ = T1′ ∗ T2′ and e = he1 , e2 i. By one of the regularity condition, T = T1 ∗ T2 for some T1 and T2 . By another regularity condition, both Σ; ~B |= T1′ ≤ty T1 and Σ; ~B |= T2′ ≤ty T2 hold. ′ , one obtains D :: Σ; ~ By applying (ty-sub) to D21 B; ∆ ⊢ e1 : T1 . By applying (ty-sub) to 21 ′ ′ ~ D22 , one obtains D22 :: Σ; B; ∆ ⊢ e2 : T2 . Let D be D21 :: Σ; ~B; ∆ ⊢ e1 : T1 D22 :: Σ; ~B; ∆ ⊢ e2 : T2 (ty-tup) Σ; ~B; ∆ ⊢ he1 , e2 i : T1 ∗ T2 and the proof for (1) is done since ht(D ′ ) = 1 + max(ht(D21 ), ht(D22 )), which equals 1 + ′ ), ht(D ′ )) = 1 + ht(D ′ ) ≤ 1 + ht(D ) = ht(D). 1 + max(ht(D21 1 22 1 Let us prove (2) by induction on ht(D). By induction hypothesis on D1 , there exists a derivation D1′ :: Σ; ~B; ∆ ⊢ e : T ′ such that ht(D1′ ) ≤ ht(D1 ) and the last applied rule in D1′ is (ty-lam): D2′ :: Σ; ~B; ∆, x : T1′ ⊢ e1 : T2′ (ty-lam) Σ; ~B; ∆ ⊢ lam x.e1 : T1′ → T2′ ZU064-05-FPR main 28 March 2017 0:56 16 Hongwei Xi where T ′ = T1′ → T2′ and e = lam x.e1 . By one of the regularity conditions, T = T1 → T2 for some T1 and T2 . By another regularity condiditon, both Σ; ~B |= T1 ≤ty T1′ and Σ; ~B |= T2′ ≤ty T2 hold. Hence, by Lemma 3.1, there is a derivation D2′′ :: Σ; ~B; ∆, x : T1 ⊢ e1 : T2′ such that ht(D2′′ ) = ht(D2′ ). Let D ′ be the following derivation, D2′′ :: Σ; ~B; ∆, x : T1 ⊢ e1 : T2′ Σ; ~B |= T2′ ≤ty T2 (ty-sub) Σ; ~B; ∆, x : T1 ⊢ e1 : T2 (ty-lam) Σ; ~B; ∆ ⊢ lam x.e1 : T1 → T2 and the proof for (2) is done since ht(D ′ ) = 1+1+ht(D2′′ ) = 1+1+ht(D2′ ) = 1+ht(D1′ ) ≤ 1 + ht(D1 ) = ht(D). The rest of statements (3), (4), (5), and (6) can all be proven similarly. Theorem 3.1 (Subject Reduction in ATS0 ) Assume D :: Σ; ~B; ∆ ⊢ e : T in ATS0 and e → e′ holds. Then Σ; ~B; ∆ ⊢ e′ : T is also derivable in ATS0 . Proof The proof proceeds by induction on ht(D). • The last applied rule in D is (ty-sub): D1 :: Σ; ~B; ∆ ⊢ e : T ′ Σ |= T ′ ≤ty T Σ; ~B; ∆ ⊢ e : T By induction hypothesis on D1 , D1′ :: Σ; ~B; ∆ ⊢ e′ : T ′ is derivable, and thus the following derivation is obtained: D1′ :: Σ; ~B; ∆ ⊢ e′ : T ′ Σ |= T ′ ≤ty T Σ; ~B; ∆ ⊢ e′ : T • The last applied rule in D is not (ty-sub). Assume that e = E[e0 ] and e′ = E[e′0 ], where e0 is a redex and e′0 is a reduct of e0 . All the cases where E is not [] can be readily handled, and some details are given as follows on the case where E = [] (that is, e is itself a redex). — D is of the following form: D1 :: Σ; ~B; ∆ ⊢ hv11 , v12 i : T1 ∗ T2 (ty-fst) Σ; ~B; ∆ ⊢ fst(hv11 , v12 i) : T1 where T = T1 and e = fst(hv11 , v12 i). By Lemma 3.4, D1 may be assumed to be of the following form: D21 :: Σ; ~B; ∆ ⊢ v11 : T1 D22 :: Σ; ~B; ∆ ⊢ v12 : T2 (ty-tup) Σ; ~B; ∆ ⊢ hv11 , v12 i : T1 ∗ T2 Note that e′ = v11 , and the case concludes. — D is of the following form: D1 :: Σ; ~B; ∆ ⊢ lam x.e1 : T1 → T2 D2 :: Σ; ~B; ∆ ⊢ v2 : T1 (ty-app) Σ; ~B; ∆ ⊢ app(lam x.e1 , v2 ) : T2 ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 17 where T = T2 and e = app(lam x.e1 , v2 ). By Lemma 3.4, D1 may be assumed to be of the following form: Σ; ~B; ∆, x : T1 ⊢ e1 : T2 Σ; ~B; ∆ ⊢ lam x.e1 : T1 → T2 By Lemma 3.2 (Substitution), Σ; ~B; ∆ ⊢ e1 [x 7→ v2 ] : T2 is derivable. Note that e′ = e1 [x 7→ v2 ], and the case concludes. All of the other cases can be handled similarly. For a less involved presentation, let us assume that any well-typed closed value of the form dcf {~s}(v1 , . . . , vn ) is a redex, that is, the dynamic constant function dcf is well-defined at the arguments v1 , . . . , vn . Theorem 3.2 (Progress in ATS0 ) Assume that D :: 0; / 0; / 0/ ⊢ e : T in ATS0 . Then either e is a value or e → e′ holds for some ′ dynamic term e . Proof With Lemma 3.3 (Canonical Forms), the proof proceeds by a straightforward structural induction on D. By Theorem 3.1 and Theorem 3.2, it is clear that for each closed well-typed dynamic term e, e →∗ v holds for some value v, or there is an infinite reduction sequence starting from e: e = e0 → e1 → e2 → · · ·. In other words, the evaluation of a well-typed program in ATS0 either reaches a value or goes on forever (as it can never get stuck). This metaproperty of ATS0 is often referred to as its type-soundness. Per Robin Milner, a catchy slogan for type-soundness states that a well-typed program can never go wrong. kxk kdcx{~s}(e1 , . . . , en )k klam x. ek kapp(e1 , e2 )k k⊃+ (e)k k⊃− (e)k k∧(e)k klet ∧(x) = e1 in e2 k kslam a. ek ksapp(e, s)k = = = = = = = = = = x dcx(ke1 k, . . . , ken k) lam x. kek app(ke1 k, ke2 k) kek kek kek let x =ke1 k in ke2 k kek kek Fig. 9. The type-erasure function k·k on dynamic terms After a program in ATS passes type-checking, it goes through a process referred to as type-erasure to have the static terms inside it completely erased. In Figure 9, a function performing type-erasure is defined, which maps each dynamic term in ATS0 to an untyped dynamic term in λdyn . In order to guarantee that a value in ATS0 is mapped to another value in λdyn by the function k·k, the following syntactic restriction is needed: ZU064-05-FPR main 28 March 2017 0:56 18 Hongwei Xi • Only when e is a value can the dynamic term ⊃+ (e) be formed. • Only when e is a value can the dynamic term slam a.e be formed. This kind of restriction is often referred to as value-form restriction. Proposition 3.2 With the value-form restriction being imposed, kvk is a value in λdyn for every value v in ATS0 . Proof By structural induction on v. Note that it is certainly possible to have a non-value e in ATS0 whose type-erasure is a value in λdyn . From this point on, the value-form restriction is always assumed to have been imposed when type-erasure is performed. Proposition 3.3 Assume that e1 is a well-typed closed dynamic term in ATS0 . If e1 → e2 holds, then either ke1 k=ke2 k or ke1 k→ke2 k holds in λdyn . Proof By a careful inspection of the forms of redexes in Definition 3.2. Proposition 3.4 Assume that e1 is a well-typed closed dynamic term in ATS0 . If ke1 k→ e′2 holds in λdyn , then there exists e2 such that e1 →∗ e2 holds in ATS0 and ke2 k= e′2 . Proof By induction on the height of the typing derivation for e1 . By Proposition 3.3 and Proposition 3.4, it is clear that type-erasure cannot alter the dynamic semantics of a well-typed dynamic term in ATS0 . The formulation of ATS0 presented in this section is of a minimalist style. In particular, the constraint relation in ATS0 is treated abstractly. In practice, if a concrete instance of ATS0 is to be implemented, then rules need to be provided for simplifying constraints. For instance, the following rule may be present: Σ; ~B |= I1 = I2 Σ; ~B |= int(I1 ) ≤ty int(I2 ) With this rule, int(I1 ) ≤ty int(I2 ) can be simplified to the constraint I1 = I2 , where the equality is on static integer terms. The following rule may also be present: Σ; ~B |= T1 ≤ty T2 Σ; ~B |= I1 = I2 Σ; ~B |= list(T1 , I1 ) ≤ty list(T2 , I2 ) With this rule, list(T1 , I1 ) ≤ty list(T2 , I2 ) can be simplified to the two constraints T1 ≤ty T2 and I1 = I2 . For those interested in implementing an applied type system, please find more details in a paper on DML (Xi, 2007), which is regarded a special kind of applied type system. ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 19 4 Formal Development of ATSpf Let us extend ATS0 to ATSpf in this section with support for programming with theoremproving (PwTP). A great limitation on employing ATS0 as the basis for a practical programming language lies in the very rigid handling of constraint-solving in ATS0 . One is often forced to impose various ad hoc restrictions on the syntactic form of a constraint that can actually be supported in practice (so as to match the capability of the underlying constraint-solver), greatly diminishing the effectiveness of using types to capture programming invariants. For instance, only quantifier-free constraints that can be translated into problems of linear integer programming are allowed in the DML programming language (Xi, 2001). With PwTP being supported in a programming language, programming and theoremproving can be combined in a syntactically intertwined manner (Chen & Xi, 2005); if a constraint cannot be handled directly by the underlying constraint-solver, then it is possible to simplify the constraint or even eliminate it through explicit proof construction. PwTP advocates an open style of constraint-solving by providing a means within the programming language itself to allow the programmer to actively participate in constraint-solving. In other words, PwTP can be viewed as a programming paradigm for internalizing constraintsolving. ≤ pr ∗ ∗ → → ∧ ⊃ ∀σ ∃σ : : : : : : : : : (prop, prop) ⇒ bool (prop, prop) ⇒ prop (prop, type) ⇒ type (prop, prop) ⇒ prop (prop, type) ⇒ type (bool, prop) ⇒ prop (bool, prop) ⇒ prop (σ → prop) ⇒ prop (σ → prop) ⇒ prop Fig. 10. Additional static constants in ATSpf Let us now start with the formulation of ATSpf , which extends that of ATS0 fairly lightly. In addition to the base sorts in ATS0 , ATSpf contains another base sort prop, which is for static terms representing types for proofs. A static term of the sort prop may be referred to as a prop (or, sometimes, a type for proofs). Also, it is assumed that the static constants listed in Figure 10 are included in ATSpf . Note that the symbols referring to these static constants may be overloaded. In the following representation, P stands for a prop, T stands for a type, and T ∗ stands for either a prop or a type. The syntax for dynamic terms in ATSpf is essentially the same as that in ATS0 but with a few minor changes to be mentioned as follows. Some dynamic constructs in ATS0 need to be split when they are incorporated into ATSpf . The construct he1 , e2 i for forming tuples is split into he1 , e2 ipp , he1 , e2 ipt , and he1 , e2 itt for prop-type pairs, prop-type pairs and type-type pairs, respectively. For instance, a prop-type pair is one where the first component is assigned a prop and the second one a type. Note that there are no typeprop pairs. The construct lam x.e for forming lambda-abstractions is split into lampp x. e, lampt x. e, and lamtt x. e for prop-prop functions, prop-type functions and type-type func- ZU064-05-FPR main 20 28 March 2017 0:56 Hongwei Xi tions, respectively. For instance, a prop-type function is one where the argument is assigned a prop and the body a type. The construct app(e1 , e2 ) for forming applications is split into apppp (e1 , e2 ), apptp (e1 , e2 ), and apptt (e1 , e2 ) for prop-prop applications, type-prop applications and type-type applications. For instance, a type-prop application is one where the function part is assigned a type and the argument a prop. Note that there are no typeprop functions. The dynamic variable contexts in ATSpf are defined as follows: dynamic var. ctx. ∆ ::= 0/ | ∆, x : T ∗ The regularity conditions on ≤ty needs to be extended with the following two for the new forms of types: 3.2 Σ; ~B |= P1 ∗ T2 ≤ty P1′ ∗ T2′ implies Σ; ~B |= P1 ≤ pr P1′ and Σ; ~B |= T2 ≤ty T2′ . 4.2 Σ; ~B |= P1 → T2 ≤ty P1′ → T2′ implies Σ; ~B |= P1′ ≤ pr P1 and Σ; ~B |= T2 ≤ty T2′ . It should be noted that there are no regularity conditions imposed on props (as it is not expected for proofs to have any computational meaning). There are two kinds of typing rules in ATSpf : p-typing rules and t-typing rules, where the former is for assigning props to dynamic terms (encoding proofs) and the latter for assigning types to dynamic terms (to be evaluated). The typing rules for ATSpf are essentially those for ATS0 listed in Figure 8 except for the following changes: • Each occurrence of T in the rules for ATS0 needs to be replaced with T ∗ . • The premisses of each p-typing rule (that is, one for assigning a prop to a dynamic term) are required to be p-typing rules themselves. As an example, let us take a look at the following rule: Σ; ~B; ∆ ⊢ e : T Σ; ~B |= T ≤ty T ′ (ty-sub) Σ; ~B; ∆ ⊢ e : T ′ which yields the following two valid versions: Σ; ~B; ∆ ⊢ e : P Σ; ~B |= P ≤ pr P′ (ty-sub-p) Σ; ~B; ∆ ⊢ e : P′ Σ; ~B; ∆ ⊢ e : T Σ; ~B |= T ≤ty T ′ (ty-sub-t) Σ; ~B; ∆ ⊢ e : T ′ As another example, let us take a look at the following rule: Σ; ~B; ∆ ⊢ e : T1 ∗ T2 (ty-fst) Σ; ~B; ∆ ⊢ fst(e) : T1 which yields the following two valid versions: Σ; ~B; ∆ ⊢ e : P1 ∗ P2 (ty-fst-pp) Σ; ~B; ∆ ⊢ fst(e) : P1 Σ; ~B; ∆ ⊢ e : T1 ∗ T2 (ty-fst-tt) Σ; ~B; ∆ ⊢ fst(e) : T1 ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 21 Note that there is no type of the form T1 ∗ P2 (for the sake of simplicity). The following version is invalid: Σ; ~B; ∆ ⊢ e : P1 ∗ T2 (ty-fst-pt) Σ; ~B; ∆ ⊢ fst(e) : P1 because a p-typing rule cannot have any t-typing rule as its premise. Instead, the following typing rule is introduced as the elimination rule for P1 ∗ T2 : Σ; ~B; ∆ ⊢ e : P1 ∗ T2 Σ; ~B; ∆, x1 : P1 , x2 : T2 ⊢ e0 : T0 (ty-∗-elim-pt) Σ; ~B; ∆ ⊢ let hx1 , x2 ipt = e in e0 : T0 As yet another example, let us take a look at the following rule: Σ; ~B; ∆ ⊢ e1 : T1∗ → T2∗ Σ; ~B; ∆ ⊢ e2 : T1∗ (ty-app) Σ; ~B; ∆ ⊢ app(e1 , e2 ) : T2∗ which yields the following three versions: Σ; ~B; ∆ ⊢ e1 : P1 → P2 Σ; ~B; ∆ ⊢ e2 : P1 (ty-app-pp) Σ; ~B; ∆ ⊢ apppp (e1 , e2 ) : P2 Σ; ~B; ∆ ⊢ e1 : P1 → T2 Σ; ~B; ∆ ⊢ e2 : P1 (ty-app-tp) Σ; ~B; ∆ ⊢ apptp (e1 , e2 ) : T2 Σ; ~B; ∆ ⊢ e1 : T1 → T2 Σ; ~B; ∆ ⊢ e2 : T1 (ty-app-tt) Σ; ~B; ∆ ⊢ apptt (e1 , e2 ) : T2 The first one is a p-typing rule while the other two are t-typing rules. In ATSpf , the two sorts bool and prop are intimately related but are also fundamentally different. Gaining a solid understanding of the relation between these two is the key to understanding the design of ATSpf . One may see prop as an internalized version of bool. Given a static boolean term B, its truth value is determined by a constraint-solver outside ATSpf . Given a static term P of the sort prop, a proof of P can be constructed inside ATSpf to attest to the validity of the boolean term encoded by P. For clarification, let us see a simple example illustrating the relation between bool and prop in concrete terms. dataprop fact_p(int, int) = | fact_p_bas(0, 1) of () | {n:nat}{r:int} fact_p_ind(n+1, (n+1)*r) of fact_p(n, r) Fig. 11. A dataprop for encoding the factorial function In Figure 11, the dataprop fact p declared in ATS is associated with two proof constructors that are assigned the following c-types (or, more precisely, c-props): fact p bas fact p ind : : fact p(0, 1) ∀n : nat.∀r : int. (fact p(n, r)) ⇒ fact p(n + 1, (n + 1) ∗ r) Let fact(n) be the value of the factorial function on n, where n ranges over natural numbers. Given a natural number n and an integer r, the prop fact p(n, r) encodes the relation ZU064-05-FPR main 22 28 March 2017 0:56 Hongwei Xi stacst fact_b : (int, int) -> bool praxi fact_b_bas ( // argless ) : [fact_b(0, 1)] unit_p praxi fact_b_ind{n:int}{r:int} ( // argless ) : [n >= 0 && fact_b(n, r) ->> fact_b(n+1, (n+1)*r)] unit_p Fig. 12. A static predicate and two associated proof functions fact(n) = r. In other words, if a proof of the prop fact p(n, r) can be constructed, then fact(n) equals r. In Figure 12, a static predicate fact b is introduced, which corresponds to fact p. Given a natural number n and an integer r, fact b(n, r) simply means fact(n) = r. The two proof functions fact b bas and fact b ind are assigned the following c-props: fact b bas : () ⇒ fact b(0, 1) ∧ 1 fact b ind : ∀n : int.∀r : int. () ⇒ (n ≥ 0 ∧ fact b(n, r) ⊃ fact b(n + 1, (n + 1) · r)) ∧ 1 where 1 is the unit prop (instead of the unit type) that encodes the static truth value true. Note that the keyword praxi in ATS is used to introduce proof functions that are treated as axioms. In Figure 13, a verified implementation of the factorial function is given in ATS. Given a natural numbers n, f fact p returns an integer r paired with a proof of fact p(n, r) that attests to the validity of fact(n) = r. Note that this implementation makes explicit use of proofs. The constraints generated from type-checking the code in Figure 13 are quantifierfree, and they can be readily solved by the built-in constraint-solver (based on linear integer programming) for ATS. In Figure 14, another verified implementation of the factorial function is given in ATS. Given a natural numbers, f fact b returns an integer r plus the assertion fact b(n, r) that states fact(n) = r. This implementation does not make explicit use of proofs. Applying the keyword $solver assert to a proof turns the prop of the proof into a static boolean term (of the same meaning) and then adds the term as an assumption to be used for solving the constraints generated subsequently in the same scope. For instance, the two applications of $solver assert essentially add the following two assumptions: fact b(0, 1) ∀n : int.∀r : int. n ≥ 0 ∧ fact b(n, r) ⊃ fact b(n + 1, (n + 1) · r) Note that the second assumption is universally quantified. In general, solving constraints involving quantifiers is much more difficult than those that are quantifier-free. For instance, the constraints generated from type-checking the code in Figure 14 cannot be solved by the built-in constraint-solver for ATS. Instead, these constraints need to be ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming fun f_fact_p {n:nat} ( n: int(n) ) : [r:int] (fact_p(n, r) | int(r)) = let // fun loop { i:nat | i <= n } {r:int} ( pf: fact_p(i, r) | i: int(i), r: int(r) ) : [r:int] (fact_p(n, r) | int(r)) = if i < n then loop(fact_p_ind(pf) | i+1, (i+1)*r) else (pf | r) // end of [if] // in loop(fact_p_bas() | 0(*i*), 1(*r*)) end // end of [f_fact_p] Fig. 13. A verified implementation of the factorial function fun f_fact_b {n:nat} ( n: int(n) ) : [r:int] (fact_b(n, r) && int(r)) = let // prval() = $solver_assert(fact_b_bas) prval() = $solver_assert(fact_b_ind) // fun loop { i:nat | i <= n} { r:int | fact_b(i, r) } ( i: int(i), r: int(r) ) : [r:int] (fact_b(n, r) && int(r)) = if i < n then loop(i+1, (i+1)*r) else (r) // in loop(0, 1) end // end of [f_fact_b] Fig. 14. Another verified implementation of the factorial function 23 ZU064-05-FPR main 28 March 2017 0:56 24 Hongwei Xi exported so that external constraint-solvers (for instance, one based on the Z3 theoremprover (de Moura & Bjørner, 2008)) can be invoked to solve them. By comparing these two verified implementations of the factorial function, one sees a concrete case where PwTP (as is done in Figure 13) is employed to simplify the constraints generated from type-checking. This kind of constraint simplification through PwTP is a form of internalization of constraint-solving, and it can often play a pivotal rôle in practice, especially, when there is no effective method available for solving general unsimplified constraints. Instead of assigning (call-by-value) dynamic semantics to the dynamic terms in ATSpf directly, a translation often referred to as proof-erasure is to be defined that turns each dynamic term in ATSpf into one in ATS0 of the same dynamic semantics. Given a sort σ , its proof-erasure |σ | is the one in which every occurrence of prop in σ is replaced with bool. Given a static variable context Σ, its proof-erasure |Σ| is obtained from replacing each declaration a : σ with a : |σ |. For every static constant scx of the c-sort (σ1 , . . . , σn ) ⇒ σ , it is assumed that there exists a corresponding scx′ of the c-sort (|σ1 |, . . . , |σn |) ⇒ |σ |; this corresponding scx′ may be denoted by |scx|. Note that it is possible to have |scx1 | = |scx2 | for different constants scx1 and scx2 . Let us assume the existence of the following static constants: ∧ ⊃ ∀σ ∃σ : : : : (bool, bool) ⇒ bool (bool, bool) ⇒ bool (σ → bool) ⇒ bool (σ → bool) ⇒ bool Note that the symbols referring to these static constants are all overloaded. Naturally, ∧ and ⊃ are interpreted as the boolean conjunction and boolean implication, respectively, and ∀σ and ∃σ are interpreted as the standard universal quantification and existential quantification, respectively. For instance, some pairs of corresponding static constants are listed as follows: • The boolean implication function ⊃ corresponds to the prop predicate ≤ pr . • The boolean implication function ⊃ corresponds to the prop constructor → of the c-sort (prop, prop) ⇒ prop. • The boolean implication function ⊃ corresponds to the prop constructor ⊃ of the c-sort (bool, prop) ⇒ prop. • The boolean conjunction function ∧ corresponds to the prop constructor ∗ of the c-sort (prop, prop) ⇒ prop. • The boolean conjunction function ∧ corresponds to the prop constructor ∧ of the c-sort (bool, prop) ⇒ prop. • The type constructor ∧ of the c-sort (bool, type) ⇒ type corresponds to the type constructor ∗ of the c-sort (prop, type) ⇒ type. • The type constructor ⊃ of the c-sort (bool, type) ⇒ type corresponds to the type constructor → of the c-sort (prop, type) ⇒ type. • For each sort σ , the universal quantifier ∀σ of the sort (σ → bool) ⇒ bool corresponds to the universal quantifier ∀σ of the sort (σ → prop) ⇒ prop. ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming |x| |dcx{~s}(~e)| |he1 , e2 ipt | |he1 , e2 itt | |fst(e)| |snd(e)| |let hx p , xt ipt = e1 in e2 | |lampt x. e| |lamtt x. e| |apptp (e1 , e2 )| |apptt (e1 , e2 )| | ⊃+ (e)| | ⊃− (e)| | ∧(e)| |let ∧(x) = e1 in e2 | |slam a. e| |sapp(e, s)| = = = = = = = = = = = = = = = = = 25 x dcx{|~s|}(|~e|) ∧(|e2 |) h|e1 |, |e2 |itt fst(|e|) snd(|e|) let ∧(xt ) = |e1 | in |e2 | ⊃+ (|e|) lam x.|e| ⊃− (|e1 |) app(|e1 |, |e2 |) ⊃+ (|e|) ⊃− (|e|) ∧(|e|) let ∧(x) = |e1 | in |e2 | slam a. |e| sapp(|e|, |s|) Fig. 15. The proof-erasure function | · | on dynamic terms • For each sort σ , the existential quantifier ∃σ of the sort (σ → bool) ⇒ bool corresponds to the existential quantifier ∃σ of the sort (σ → prop) ⇒ prop. For every static term s, |s| is the static term obtained from replacing in s each σ with |σ | and each scx with |scx|. Proposition 4.1 Assume that Σ ⊢ s : σ is derivable. Then |Σ| ⊢ |s| : |σ | is also derivable. Proof By induction on the sorting derivation of Σ ⊢ s : σ . For a sequence ~B of static boolean terms, |~B| is the sequence obtained from applying | · | to each B in ~B. There are two functions | · | p and | · |t for mapping a given dynamic variable context ∆ to a sequence of boolean terms and a dynamic variable context, respectively: • |∆| p is a sequence of boolean terms ~B such that each B in ~B is |P| for some a : P declared in Σ. • |∆|t is a dynamic variable context such each declaration in it is of the form a : |T | for some a : T declared in Σ. The proof-erasure function on dynamic terms is defined in Figure 15. Clearly, given a dynamic term e in ATSpf , |e| is a dynamic term in ATS0 if it is defined. As the proof-erasure of ≤ pr is chosen to be the boolean implication function, it needs to be assumed that Σ; ~B ⊢ P1 ≤ pr P2 implies |Σ|; |~B| ⊢ |P1 | ⊃ |P2 | Lemma 4.1 (Constraint Internalization) Assume that the typing judgment Σ; ~B; ∆ ⊢ e : P is derivable in ATSpf . Then the constraint |Σ|; |~B|, |∆| p |= |P| holds. Proof ZU064-05-FPR main 26 28 March 2017 0:56 Hongwei Xi By structural induction on the typing derivation D of Σ; ~B; ∆ ⊢ e : P. Note that the typing rule (ty-sub-p) is handled by the assumption that Σ; ~B ⊢ P1 ≤ pr P2 implies |Σ|; |~B| ⊢ |P1 | ⊃ |P2 | for any props P1 and P2 . • Assume that the last applied rule in D is (ty-tup-pp): D1 :: Σ; ~B; ∆ ⊢ e1 : P1 D2 :: Σ; ~B; ∆ ⊢ e2 : P2 (ty-tup-pp) Σ; ~B; ∆ ⊢ he1 , e2 ipp : P1 ∗ P2 where P = P1 ∗ P2 . By induction hypothesis on D1 , |Σ|; |~B|, |∆| p |= |P1 | holds. By induction hypothesis on D2 , |Σ|; |~B|, |∆| p |= |P2 | holds. Note that |P| = |P1 ∗ P2 | = |P1 | ∧ |P2 |, where ∧ stands for the boolean conjunction. Therefore, |Σ|; |~B|, |∆| p |= |P| holds. • Assume that the last applied rule in D is either (ty-fst-pp) or (ty-snd-pp). This case immediately follows from the fact that |P1 ∗ P2| = |P1 | ∧ |P2 | for any props P1 and P2 , where ∧ stands for the boolean conjunction • Assume that the last applied rule in D is (ty-lam-pp): D1 :: Σ; ~B; ∆, x1 : P1 ⊢ e2 : P2 (ty-lam-pp) Σ; ~B; ∆ ⊢ lampp x1 . e2 : P1 → P2 where P = P1 → P2 . By induction hypothesis on D1 , |Σ|; |~B|, |∆| p , |P1 | |= |P2 | holds. By the regularity rule (reg-cut), |Σ|; |~B|, |∆| p |= |P2 | holds whenever |Σ|; |~B|, |∆| p |= |P1 | holds. Therefore, |Σ|; |~B|, |∆| p |= |P1 | ⊃ |P2| holds, where ⊃ stands for the boolean implication. Note that |P| = |P1 | ⊃ |P2 |, and this case concludes. • Assume that the last applied rule in D is (ty-app-pp): D1 :: Σ; ~B; ∆ ⊢ e1 : P1 → P2 D2 :: Σ; ~B; ∆ ⊢ e2 : P1 (ty-app-pp) Σ; ~B; ∆ ⊢ apppp (e1 , e2 ) : P2 where P = P2 . By induction hypothesis on D1 , |Σ|; |~B|, |∆| p |= |P1 | ⊃ |P2 | holds, where ⊃ stands for the boolean implication. By induction hypothesis on D2 , the constraint |Σ|; |~B|, |∆| p |= |P1 | holds. Therefore, the constraint |Σ|; |~B|, |∆| p |= |P2 | also holds. The rest of the cases can be handled similarly. Note that a proof in ATSpf can be non-constructive as it is not expected for the proof to have any computational meaning. In particular, one can extend the proof construction in ATSpf with any kind of reasoning based on classical logic (e.g., double negation elimination). If a c-type CT assigned to a dynamic (proof) constant is of the form ∀Σ.~B ⊃ (~P) ⇒ P0 , then it is assumed that the following constraint holds in ATS0 : 0; / 0/ |= ∀|Σ|.|~B| ⊃ (|~P| ⊃ |P0 |) For instance, the c-types assigned to fact p bas and fact p ind imply the validity of the following constraints: 0; / 0/ ⊢ fact b(0, 1) 0; / 0/ ⊢ ∀n : int.∀r : int. (n ≥ 0 ∧ fact b(n, r) ⊃ fact b(n + 1, (n + 1) · r)) ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 27 which are encoded directly into the c-types assigned to fact b bas and fact b ind. If a c-type CT is of the form ∀Σ.~B ⊃ (~P, T1 , . . . , Tn ) ⇒ T0 , then |CT| is defined as follows: ∀|Σ|.|~B| ⊃ (|~P| ⊃ ((|T1 |, . . . , |Tn |) ⇒ |T0 |)) If a dynamic constant dcx is assigned the c-type CT in ATSpf , then it is assumed to be of the c-type |CT| in ATS0 . Theorem 4.1 Assume that Σ; ~B; ∆ ⊢ e : T is derivable in ATSpf . Then |Σ|; |~B|, |∆| p ; |∆|t ⊢ |e| : |T | is derivable in ATS0 , Proof By structural induction on the typing derivation D of Σ; ~B; ∆ ⊢ e : T . • Assume that the last applied rule in D is (ty-∗-elim-pt): D1 :: Σ; ~B; ∆ ⊢ e12 : P1 ∗ T2 D2 :: Σ; ~B; ∆, x1 : P1 , x2 : T2 ⊢ e0 : T0 (ty-∗-elim-pt) Σ; ~B; ∆ ⊢ let hx1 , x2 ipt = e12 in e0 : T0 where e is let hx1 , x2 ipt = e12 in e0 and T = T0 . By induction hypothesis on D1 , there exists the following derivation in ATS0 : D1′ :: |Σ|; |~B|, |∆| p ; |∆|t ⊢ |e12 | : |P1 | ∧ |T2 | By induction hypothesis on D2 , there exists the following derivation in ATS0 : D2′ :: |Σ|; |~B|, |∆| p , |P1 |; |∆|t , x2 : |T2 | ⊢ |e0 | : |T0 | Applying the rule (ty-∧-elim) to D1′ and D2′ yields the following derivation: D ′ :: |Σ|; |~B|, |∆| p ; |∆|t ⊢ let ∧(x2 ) = |e12 | in |e0 | : |T0 | Note that |e| equals let ∧(x2 ) = |e12 | in |e0 |, and the case concludes. • Assume that the last applied rule in D is (ty-app-tp): D1 :: Σ; ~B; ∆ ⊢ e1 : P1 → T2 D2 :: Σ; ~B; ∆ ⊢ e2 : P1 (ty-app-tp) Σ; ~B; ∆ ⊢ apptp (e1 , e2 ) : T2 where e is apptp (e1 , e2 ) and T = T2 . By induction hypothesis on D1 , there exists the following derivation in ATS0 : D1′ :: |Σ|; |~B|, |∆| p ; |∆|t ⊢ |e1 | : |P1 | ⊃ |T2 | Applying Lemma 4.1 to D2 yields that the constraint |Σ|; |~B|, |∆| p ; |∆|t ⊢ |P1 | is valid. Applying the rule (ty-⊃-elim) to D1′ and the valid constraint yields the following derivation: |Σ|; |~B|, |∆| p ; |∆|t ⊢⊃− (|e1 |) : |T2 | Note that |e| equals ⊃− (|e1 |), and the case concludes. The rest of the cases can be handled similarly. By Theorem 4.1, the proof-erasure of a program is well-typed in ATS0 if the program itself is well-typed in ATSpf . In other words, Theorem 4.1 justifies PwTP in ATSpf as an approach to internalizing constraint-solving through explicit proof-construction. ZU064-05-FPR main 28 28 March 2017 0:56 Hongwei Xi 5 Related Work and Conclusion Constructive type theory, which was originally proposed by Martin-Löf for the purpose of establishing a foundation for mathematics, requires pure reasoning on programs. Generalizing as well as extending Martin-Löf’s work, the framework Pure Type System (PTS) offers a simple and general approach to designing and formalizing type systems. However, type equality depends on program equality in the presence of dependent types, making it highly challenging to accommodate effectful programming features as these features often greatly complicate the definition of program equality (Constable & Smith, 1987; Mendler, 1987; Honsell et al., 1995; Hayashi & Nakano, 1988). The framework Applied Type System (ATS) (Xi, 2004) introduces a complete separation between statics, where types are formed and reasoned about, and dynamics, where programs are constructed and evaluated, thus eliminating by design the need for pure reasoning on programs in the presence of dependent types. The development of ATS primarily unifies and also extends the previous studies on both Dependent ML (DML) (Xi & Pfenning, 1999; Xi, 2007) and guarded recursive datatypes (Xi et al., 2003). DML enriches ML with a restricted form of dependent datatypes, allowing for specification and inference of significantly more precise type information (when compared to ML), and guarded recursive datatypes can be thought of as an impredicative form of dependent types in which type indexes are themselves types. Given the similarity between these two forms of types, it is only natural to seek a unified presentation for them. Indeed, both DML-style dependent types and guarded recursive datatypes are accommodated in ATS. In terms of theorem-proving, there is a fundamental difference between ATS and various theorem-proving systems such as NuPrl (Constable et al. , 1986) (based on Martin-Löf’s constructive type theory) and Coq (Dowek et al., 1993) (based on the calculus of construction (Coquand & Huet, 1988)). In ATS, proof construction is solely meant for constraint simplification and proofs are not expected to contain any computational meaning. On the other hand, proofs in NuPrl and Coq are required to be constructive as they are meant for supporting program extraction. The theme of combining programming with theorem-proving is also present in the programming language Ωemga (Sheard, 2004). The type system of Ωemga is largely built on top of a notion called equality constrained types (a.k.a. phantom types (Cheney & Hinze, 2003)), which are closely related to the notion of guarded recursive datatypes (Xi et al., 2003). In Ωemga, there seems no strict separation between programs and proofs. In particular, proofs need to be constructed at run-time. In addition, an approach to simulating dependent types through the use of type classes in Haskell is given in (McBride, 2002), which is casually related to proof construction in the design of ATS. Please also see (Chen et al., 2004) for a critique on the practicality of simulating dependent types in Haskell. In summary, a framework ATS is presented in this paper to facilitate the design and formalization of type systems to support practical programming. With a complete separation between statics and dynamics, ATS removes by design the need for pure reasoning on programs in the presence of dependent types. Additionally, ATS allows programming and theorem-proving to be combined in a syntactically intertwined manner, providing the programmer with an approach to internalizing constraint-solving through explicit proofconstruction. As a minimalist formulation of ATS, ATS0 is first presented and its type- ZU064-05-FPR main 28 March 2017 0:56 Journal of Functional Programming 29 soundness formally established. Subsequently, ATS0 is extended to ATSpf so as to support programming with theorem-proving, and the correctness of this extension is proven based on a translation often referred to as proof-erasure, which turns each well-typed program in ATSpf into a corresponding well-typed program in ATS0 of the same dynamic semantics. References Barendregt, Hendrik Pieter. (1992). Lambda Calculi with Types. Pages 117–441 of: Abramsky, S., Gabbay, Dov M., & Maibaum, T.S.E. (eds), Handbook of Logic in Computer Science, vol. II. Oxford: Clarendon Press. Chen, Chiyan, & Xi, Hongwei. 2005 (September). Combining Programming with Theorem Proving. Pages 66–77 of: Proceedings of the Tenth ACM SIGPLAN International Conference on Functional Programming. Chen, Chiyan, Zhu, Dengping, & Xi, Hongwei. (2004). Implementing Cut Elimination: A Case Study of Simulating Dependent Types in Haskell. Proceedings of the 6th International Symposium on Practical Aspects of Declarative Languages. Dallas, TX: Springer-Verlag LNCS vol. 3057. Cheney, James, & Hinze, Ralf. (2003). Phantom Types. Technical Report CUCIS-TR2003-1901. Cornell University. Constable, Robert L., & Smith, Scott Fraser. 1987 (June). Partial objects in constructive type theory. Pages 183–193 of: Proceedings of Symposium on Logic in Computer Science. Constable, Robert L., et al. . (1986). Implementing mathematics with the NuPrl proof development system. Englewood Cliffs, New Jersey: Prentice-Hall. Coquand, Thierry, & Huet, Gérard. (1988). The calculus of constructions. Information and computation, 76(2–3), 95–120. de Moura, Leonardo Mendonça, & Bjørner, Nikolaj. (2008). Z3: an efficient SMT solver. Pages 337–340 of: Tools and Algorithms for the Construction and Analysis of Systems, 14th International Conference, TACAS 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings. Dowek, Gilles, Felty, Amy, Herbelin, Hugo, Huet, Gérard, Murthy, Chet, Parent, Catherine, PaulinMohring, Christine, & Werner, Benjamin. (1993). The Coq proof assistant user’s guide. Rapport Technique 154. INRIA, Rocquencourt, France. Version 5.8. Girard, Jean-Yves. (1986). The System F of variable types, fifteen years later. Theoretical computer science, 45(2), 159–192. Hayashi, Susumu, & Nakano, Hiroshi. (1988). PX: A computational logic. The MIT Press. Hoare, C. A. R. (1969). An axiomatic basis for computer programming. Communications of the acm, 12(10), 576–580 and 583. Honsell, Furio, Mason, Ian A., Smith, Scott, & Talcott, Carolyn. (1995). A variable typed logic of effects. Information and computation, 119(1), 55–90. Jones, Mark P. (1994). Qualified types: Theory and practice. The Edinburgh Building, Cambridge CB2 2RU, UK: Cambridge University Press. McBride, Conor. (2002). Faking It. Journal of functional programming, 12(4 & 5), 375–392. Mendler, N.P. 1987 (June). Recursive types and type constraints in second-order lambda calculus. Pages 30–36 of: Proceedings of Symposium on Logic in Computer Science. The Computer Society of the IEEE, Ithaca, New York. Milner, Robin, Tofte, Mads, Harper, Robert W., & MacQueen, D. (1997). The definition of standard ml (revised). Cambridge, Massachusetts: MIT Press. Reynolds, John C. (1972). Definitional interpreters for higher-order programming languages. Pages 717–740 of: Proceedings of the ACM Annual Conference. Reynolds, John C. (1998). Theories of programming languages. Cambridge University Press. ZU064-05-FPR main 30 28 March 2017 0:56 Hongwei Xi Sheard, Tim. (2004). Languages of the future. Proceedings of the Onward! Track of ObjectedOriented Programming Systems, Languages, Applications (OOPSLA). Vancouver, BC: ACM Press. Xi, Hongwei. (2001). Dependent ML. Available at: http://www.cs.bu.edu/~hwxi/DML/DML.html. Xi, Hongwei. (2004). Applied Type System (extended abstract). Pages 394–408 of: post-workshop Proceedings of TYPES 2003. Springer-Verlag LNCS 3085. Xi, Hongwei. (2007). Dependent ML: An approach to practical programming with dependent types. Journal of functional programming, 17(2), 215–286. Xi, Hongwei. (2008a). ATS/LF: a type system for constructing proofs as total functional programs. Benzmüller, Christoph, Brown, Chad, Siekmann, Jörg, & Statman, Rick (eds), Festschrift in Honour of Peter B. Andrews on his 70th Birthday. Studies in Logic and the Foundations of Mathematics. IFCoLog. Xi, Hongwei. (2008b). The ATS Programming Language System. Available at: http://www.ats-lang.org/. Xi, Hongwei, & Pfenning, Frank. (1999). Dependent Types in Practical Programming. Pages 214–227 of: Proceedings of 26th ACM SIGPLAN Symposium on Principles of Programming Languages. San Antonio, Texas: ACM press. Xi, Hongwei, Chen, Chiyan, & Chen, Gang. (2003). Guarded Recursive Datatype Constructors. Pages 224–235 of: Proceedings of the 30th ACM SIGPLAN Symposium on Principles of Programming Languages. New Orleans, LA: ACM press.
6cs.PL